diff --git a/hyperledger_fabric/README.md b/hyperledger_fabric/README.md index e298b29c..3a4a00c5 100644 --- a/hyperledger_fabric/README.md +++ b/hyperledger_fabric/README.md @@ -16,6 +16,7 @@ Fabric Release | Description [Fabric Latest](latest/) | latest fabric code, unstable. [Fabric v2.1.0](v2.0.0/) | stable fabric 2.1.0 release. [Fabric v2.0.0](v2.0.0/) | stable fabric 2.0.0 release. +[Fabric v1.4.6](v1.4.7/) | stable fabric 1.4.7 LTS release. [Fabric v1.4.6](v1.4.6/) | stable fabric 1.4.6 LTS release. [Fabric v1.4.5](v1.4.5/) | stable fabric 1.4.5 LTS release. [Fabric v1.4.4](v1.4.4/) | stable fabric 1.4.4 LTS release. diff --git a/hyperledger_fabric/v1.4.7/.env b/hyperledger_fabric/v1.4.7/.env new file mode 100644 index 00000000..aa3dc91b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/.env @@ -0,0 +1,4 @@ +# for docker-compose usage +FABRIC_IMG_TAG=1.4.7 +EXT_IMG_TAG=0.4.20 +NETWORK=hlf_net diff --git a/hyperledger_fabric/v1.4.7/2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.7/2orgs-4peers-solo.yaml new file mode 100644 index 00000000..f3fec66a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/2orgs-4peers-solo.yaml @@ -0,0 +1,95 @@ +--- +version: '2.0' +services: + orderer.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - '7050' + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls:/var/hyperledger/orderer/tls + peer0.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com # will generated automatically + hostname: peer1.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer0.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com # will generated automatically + hostname: peer0.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com # will generated automatically + hostname: peer1.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 diff --git a/hyperledger_fabric/v1.4.7/Makefile b/hyperledger_fabric/v1.4.7/Makefile new file mode 100644 index 00000000..c5a73405 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/Makefile @@ -0,0 +1,308 @@ +# Makefile to bootup the network, and do testing with channel, chaincode +# Run `make test` will pass all testing cases, and delete the network +# Run `make ready` will create a network, pass testing cases, and stand there for manual test, e.g., make test_channel_list + + +# support advanced bash grammar +SHELL:=/bin/bash + +# mode of the network: solo, kafka, raft +HLF_MODE ?= raft + +# mode of db: golevel, couchdb +DB_MODE ?= golevel + +# mode of dev +DEV_MODE ?= non-dev + +NETWORK_INIT_WAIT ?= 2 # time to wait the fabric network finish initialization + +COMPOSE_FILE ?= "docker-compose-2orgs-4peers-raft.yaml" + +LOG_PATH ?= solo/logs + +ifeq ($(HLF_MODE),kafka) + NETWORK_INIT_WAIT=30 +else ifeq ($(HLF_MODE),raft) + NETWORK_INIT_WAIT=5 +endif + +COMPOSE_FILE="docker-compose-2orgs-4peers-$(HLF_MODE).yaml" + +LOG_PATH=$(HLF_MODE)/logs + +ifeq ($(DB_MODE),couchdb) + COMPOSE_FILE="docker-compose-2orgs-4peers-couchdb.yaml" +endif + +ifeq ($(DEV_MODE),dev) + COMPOSE_FILE="docker-compose-2orgs-4peers-dev.yaml" +endif + +all: test + +test: + @echo "Run test with $(COMPOSE_FILE)" + @echo "Please make sure u have setup Docker and pulled images by 'make setup download'." + make ready # Run all testing till ready + + make stop clean + +ready: # create/join channel, install/instantiate cc + make stop + + # make clean_config_channel # Remove existing channel artifacts + make gen_config_crypto # Will ignore if local config path exists + make gen_config_channel # Will ignore if local config path exists + + make start + + sleep ${NETWORK_INIT_WAIT} + + make channel_test + + make update_anchors + + make cc_test # test_cc_install test_cc_instantiate test_cc_invoke_query + + make test_lscc # test lscc operations + make test_qscc # test qscc operations + make test_cscc # test cscc operations + + make test_fetch_blocks # fetch block files + + make test_config_update + make test_channel_update + + make test_fetch_blocks # fetch block files again + make test_configtxlator + + make test_channel_list + make test_channel_getinfo + + make logs_save + + @echo "Now the fabric network is ready to play" + @echo "* run 'make cli' to enter into the fabric-cli container." + @echo "* run 'make stop' when done." + +# channel related operations +channel_test: test_channel_create test_channel_join test_channel_list test_channel_getinfo + +# chaincode related operations +cc_test: test_cc_install test_cc_instantiate test_cc_invoke_query + +restart: stop start + +start: # bootup the fabric network + @echo "Start a fabric network with ${COMPOSE_FILE}..." + @make clean + @echo "Make sure the local hlf_net docker bridge exists" + docker network ls|grep hlf_net > /dev/null || docker network create hlf_net + @docker-compose -f ${COMPOSE_FILE} up -d # Start a fabric network + +stop: # stop the fabric network + @echo "Stop the fabric network with ${COMPOSE_FILE}..." + @docker-compose -f ${COMPOSE_FILE} down >& /tmp/docker-compose.log + +chaincode_dev: restart chaincode_init test_cc_peer0 stop + +################## Channel testing operations ################ + +test_channel_list: # List the channel that peer joined + @echo "List the joined channels" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_list.sh" + +test_channel_getinfo: # Get info of a channel + @echo "Get info of the app channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_getinfo.sh" + +test_channel_create: # Init the channel + @echo "Create channel on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_create.sh" + +test_channel_join: # Init the channel + @echo "Join channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_join.sh" + +update_anchors: # Update the anchor peer + @echo "Update anchors on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_update_anchors.sh" + +test_channel_update: # send the channel update transaction + @echo "Test channel update with adding new org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_update.sh" + +################## Configtxlator testing operations ################ +test_configtxlator: # Test change config using configtxlator + @echo "Testing decoding and encoding with configtxlator" + bash scripts/test_configtxlator.sh ${HLF_MODE} + @echo "Flattening the json files of all blocks" + python3 scripts/json_flatter.py ${HLF_MODE}/channel-artifacts/ + +test_config_update: # Test change config to add new org + bash scripts/test_config_update.sh ${HLF_MODE} + +################## Chaincode testing operations ################ +test_cc: # test chaincode, deprecated + if [ "$(HLF_MODE)" = "dev" ]; then \ + make test_cc_peer0; \ + else \ + make test_cc_invoke_query; \ + fi + +test_cc_install: # Install the chaincode + @echo "Install chaincode to all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_install.sh" + +test_cc_approve: # Approve the chaincode definition + @echo "Approve the chaincode by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_approve.sh" + +test_cc_queryapprove: # Query the approval status of chaincode + @echo "Query the chaincode approval status by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_queryapprove.sh" + +test_cc_commit: # Commit the chaincode definition + @echo "Commit the chaincode by any org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_commit.sh" + +test_cc_querycommit: # Query the commit status of the chaincode definition + @echo "Query the commit status of chaincode" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_querycommit.sh" + +test_cc_instantiate: # Instantiate the chaincode + @echo "Instantiate chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_instantiate.sh" + +test_cc_upgrade: # Upgrade the chaincode + @echo "Upgrade chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_upgrade.sh" + +test_cc_list: # List the chaincode + @echo "List chaincode information (installed and instantited)" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_list.sh" + +test_cc_invoke_query: # test user chaincode on all peers + @echo "Invoke and query cc example02 on all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_invoke_query.sh" + +test_cscc: # test cscc queries + @echo "Test CSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cscc.sh" + +test_qscc: # test qscc queries + @echo "Test QSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_qscc.sh" + +test_lscc: # test lscc quries + @echo "Test LSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_lscc.sh" + +# FIXME: docker doesn't support wildcard in cp right now +test_fetch_blocks: # test fetching channel blocks fetch + @echo "Test fetching block files" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_fetch_blocks.sh" + +test_eventsclient: # test get event notification in a loop + @echo "Test fetching event notification" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/start_eventsclient.sh" + +test_sidedb: # test sideDB/private data feature + @echo "Test sideDB" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_sideDB.sh" + +temp: # test temp instructions, used for experiment + @echo "Test experimental instructions" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_temp.sh" + +################## Env setup related, no need to see usually ################ + +setup: # setup the environment + bash scripts/env_setup.sh # Installing Docker and Docker-Compose + +check: # Check shell scripts grammar + @echo "Check shell scripts grammar" + [ `which shellcheck` ] && shellcheck scripts/*.sh + +clean: # clean up containers and chaincode images + @echo "Clean all HLF containers and chaincode images" + @-docker ps -a | awk '{ print $$1,$$2 }' | grep "hyperledger/fabric" | awk '{ print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker ps -a | awk '$$2 ~ /dev-peer/ { print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker images | awk '$$1 ~ /dev-peer/ { print $$3 }' | xargs -r -I {} docker rmi -f {} + echo "May clean the config: HLF_MODE=${HLF_MODE} make clean_config_channel" + +# Clean deeply by removing all generated files: container, artifacts, credentials +purge: clean + HLF_MODE=solo make clean_config_channel + HLF_MODE=kafka make clean_config_channel + HLF_MODE=raft make clean_config_channel + make clean_config_crypto + +env_clean: # clean up Docker environment + @echo "Clean all images and containers" + bash scripts/env_clean.sh + +cli: # enter the cli container + docker exec -it fabric-cli bash + +orderer: orderer0 + +orderer0: # enter the orderer0 container + docker exec -it orderer0.example.com bash + +orderer1: # enter the orderer0 container + docker exec -it orderer1.example.com bash + +peer: peer0 + +peer0: # enter the peer container + docker exec -it peer0.org1.example.com bash + +peer1: # enter the peer container + docker exec -it peer1.org1.example.com bash + +ps: # show existing docker images + docker ps -a + +logs: # show logs + docker-compose -f ${COMPOSE_FILE} logs -f --tail 200 + +logs_check: logs_save logs_view + +logs_save: # save logs + @echo "All tests done, saving logs locally" + [ -d $(LOG_PATH) ] || mkdir -p $(LOG_PATH) + docker logs peer0.org1.example.com >& $(LOG_PATH)/dev_peer0.log + docker logs orderer0.example.com >& $(LOG_PATH)/dev_orderer.log + docker-compose -f ${COMPOSE_FILE} logs >& $(LOG_PATH)/dev_all.log + +logs_view: # view logs + less $(LOG_PATH)/dev_peer.log + +elk: # insert logs into elk + # curl -XDELETE http://localhost:9200/logstash-\* + nc localhost 5000 < $(LOG_PATH)/dev_all.log + +gen_config_crypto: # generate crypto config + bash scripts/gen_config_crypto.sh + +gen_config_channel: # generate channel artifacts + bash scripts/gen_config_channel.sh ${HLF_MODE} + +clean_config_channel: # clean channel related artifacts + rm -rf ${HLF_MODE}/channel-artifacts/* + +clean_config_crypto: # clean config artifacts + echo "Warning: Cleaning credentials will affect artifacts in solo/kafka/raft mode" + rm -rf crypto-config/* + rm -rf org3/crypto-config/* + +download: # download required images + @echo "Download Docker images" + bash scripts/download_images.sh + +################## chaincode dev mode ################ +chaincode_init: # start chaincode in dev mode and do install/instantiate + @echo "Install and instantiate cc example02 on the fabric dev network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/init_chaincode_dev.sh" diff --git a/hyperledger_fabric/v1.4.7/base-event.yaml b/hyperledger_fabric/v1.4.7/base-event.yaml new file mode 100644 index 00000000..ff1de801 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/base-event.yaml @@ -0,0 +1,78 @@ +# All elements in this file should depend on the base-solo.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + ca.org2.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + orderer.example.com: # orderer node for example org + extends: + file: base-solo.yaml + service: orderer.example.com + environment: + - ORDERER_GENERAL_TLS_ENABLED=false + + cli: # client node + extends: + file: base-solo.yaml + service: cli + environment: + #- GOPATH=/opt/gopath + - CORE_PEER_TLS_ENABLED=false # to enable TLS, change to false + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + event-listener: + extends: + file: base-solo.yaml + service: event-listener diff --git a/hyperledger_fabric/v1.4.7/base-kafka.yaml b/hyperledger_fabric/v1.4.7/base-kafka.yaml new file mode 100644 index 00000000..a9ca9b11 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/base-kafka.yaml @@ -0,0 +1,276 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 kafka nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/opt/gopath/src/examples + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + - 8052:7052 + - 8053:7053 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + - 9052:7052 + - 9053:7053 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + - 10052:7052 + - 10053:7053 + + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper0 + hostname: zookeeper0 + environment: + - ZOO_MY_ID=1 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper1: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper1 + hostname: zookeeper1 + environment: + - ZOO_MY_ID=2 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper2: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper2 + hostname: zookeeper2 + environment: + - ZOO_MY_ID=3 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base.yaml + service: kafka-base + container_name: kafka0 + hostname: kafka0 + environment: + - KAFKA_BROKER_ID=0 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka1: + extends: + file: base.yaml + service: kafka-base + container_name: kafka1 + hostname: kafka1 + environment: + - KAFKA_BROKER_ID=1 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka2: + extends: + file: base.yaml + service: kafka-base + container_name: kafka2 + hostname: kafka2 + environment: + - KAFKA_BROKER_ID=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka3: + extends: + file: base.yaml + service: kafka-base + container_name: kafka3 + hostname: kafka3 + environment: + - KAFKA_BROKER_ID=3 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 diff --git a/hyperledger_fabric/v1.4.7/base-raft.yaml b/hyperledger_fabric/v1.4.7/base-raft.yaml new file mode 100644 index 00000000..a9154f4a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/base-raft.yaml @@ -0,0 +1,207 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 raft nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # below 4 must be defined/undefined together, for using separate network for raft + - ORDERER_GENERAL_CLUSTER_LISTENADDRESS=0.0.0.0 + - ORDERER_GENERAL_CLUSTER_LISTENPORT=7055 # this must be the same with channel config + - ORDERER_GENERAL_CLUSTER_SERVERCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_SERVERPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer2.example.com + hostname: orderer2.example.com + ports: + - "9050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer2.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./raft/channel-artifacts:/tmp/channel-artifacts + - ./raft/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/go/src/examples + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric diff --git a/hyperledger_fabric/v1.4.7/base-solo.yaml b/hyperledger_fabric/v1.4.7/base-solo.yaml new file mode 100644 index 00000000..749b42d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/base-solo.yaml @@ -0,0 +1,190 @@ +# All elements in this file should depend on the base.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: # ca node for org2 + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + - "8443:8443" + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./solo/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "7051:7051" + - "7052:7052" + - "7053:7053" + - "9443:9443" + + peer1.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "8051:7051" + - "8052:7052" + - "8053:7053" + + peer0.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "9051:7051" + - "9052:7052" + - "9053:7053" + + peer1.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "10051:7051" + - "10052:7052" + - "10053:7053" + + peer0.org3.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org3.example.com + hostname: peer0.org3.example.com + environment: + - CORE_PEER_ID=peer0.org3.example.com + - CORE_PEER_ADDRESS=peer0.org3.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org3.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org3.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org3.example.com:7051 + - CORE_PEER_LOCALMSPID=Org3MSP + volumes: + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "11051:7051" + - "11052:7052" + - "11053:7053" + + cli: # client node + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./solo/channel-artifacts:/tmp/channel-artifacts + - ./examples:/opt/gopath/src/examples + + prometheus: # prometheus will pull metrics from fabric + extends: + file: base.yaml + service: prometheus + container_name: prometheus + hostname: prometheus + ports: + - "9090:9090" diff --git a/hyperledger_fabric/v1.4.7/base.yaml b/hyperledger_fabric/v1.4.7/base.yaml new file mode 100644 index 00000000..fe06fbfc --- /dev/null +++ b/hyperledger_fabric/v1.4.7/base.yaml @@ -0,0 +1,165 @@ +# Contains the base template for all Hyperledger Fabric services +# Never directly use services in this template, but inherent +# All services are abstract without any names, config or port mapping +# https://github.com/yeasy/docker-compose-files +# +# * ca-base: base for fabric-ca +# * orderer-base: base for fabric-orderer +# * peer-base: base for fabric-peer +# * cli-base: base for fabric peer client +# * event-listener-base: base for fabric eventhub listener +# * kafka-base: base for kafka +# * zookeeper-base: base for fabric-zookeeper +# * couchdb-base: base for couchdb +# * explorer-base: base for Hyperledger blockchain-explorer +# * mysql-base: base for MySQL + +version: '2' # compose v3 still doesn't support `extends`, shame! + +services: + ca-base: + image: yeasy/hyperledger-fabric-ca:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_CA_HOME=/etc/hyperledger/fabric-ca-server + - FABRIC_CA_SERVER_TLS_ENABLED=true # change to false to disable TLS + + orderer-base: + image: yeasy/hyperledger-fabric-orderer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + # Default config can be found at https://github.com/hyperledger/fabric/blob/master/orderer/common/localconfig/config.go + environment: + - FABRIC_LOGGING_SPEC=INFO # default: INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - ORDERER_GENERAL_LISTENADDRESS=0.0.0.0 # default: 127.0.0.1 + - ORDERER_GENERAL_LISTENPORT=7050 + - ORDERER_GENERAL_GENESISMETHOD=file # default: provisional + - ORDERER_GENERAL_GENESISFILE=/var/hyperledger/orderer/orderer.genesis.block + - ORDERER_GENERAL_LOCALMSPID=OrdererMSP # default: DEFAULT + - ORDERER_GENERAL_LOCALMSPDIR=/var/hyperledger/orderer/msp + - ORDERER_GENERAL_LEDGERTYPE=file + #- ORDERER_GENERAL_LEDGERTYPE=json # default: file + - ORDERER_OPERATIONS_LISTENADDRESS=0.0.0.0:8443 # operation RESTful API + - ORDERER_METRICS_PROVIDER=prometheus # prometheus will pull metrics from orderer via /metrics RESTful API + #- ORDERER_RAMLEDGER_HISTORY_SIZE=100 #only useful when use ram ledger + # enabled TLS + - ORDERER_GENERAL_TLS_ENABLED=true # default: false + - ORDERER_GENERAL_TLS_PRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_TLS_CERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_TLS_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # Only required by raft mode + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + #volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + expose: + - "7050" # gRPC + - "8443" # Operation REST + #command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + command: orderer start + + peer-base: # abstract base for fabric-peer, will be used in peer.yaml + image: yeasy/hyperledger-fabric-peer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_LOGGING_SPEC=INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - CORE_PEER_ADDRESSAUTODETECT=false + - CORE_VM_DOCKER_HOSTCONFIG_NETWORKMODE=${NETWORK} # uncomment this to use specific network + - CORE_PEER_GOSSIP_USELEADERELECTION=true + - CORE_PEER_GOSSIP_ORGLEADER=false # whether this node is the org leader, default to false + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=0.0.0.0:7051 # change to external addr for peers in other orgs + - CORE_OPERATIONS_LISTENADDRESS=0.0.0.0:9443 # operation RESTful API + - CORE_METRICS_PROVIDER=prometheus # prometheus will pull metrics from fabric via /metrics RESTful API + - CORE_PEER_PROFILE_ENABLED=false + - CORE_PEER_TLS_ENABLED=true + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/tls/ca.crt + - CORE_CHIANCODE_BUILDER=hyperledger/fabric-ccenv:${FABRIC_IMG_TAG} + - CORE_CHIANCODE_NODE_RUNTIME=hyperledger/fabric-nodeenv:${FABRIC_IMG_TAG} + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{longpkg}] %{callpath} -> %{level:.4s}%{color:reset} %{message} + volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # docker.sock is mapped as the default CORE_VM_ENDPOINT + - /var/run/docker.sock:/var/run/docker.sock + expose: + - "7051" # gRPC + - "9443" # Operation REST + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: peer node start + + cli-base: + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{module}] %{shortfunc} -> %{level:.4s}%{color:reset} %{message} + - CORE_PEER_TLS_ENABLED=true # to enable TLS, change to true + - ORDERER_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem + working_dir: /opt/gopath/src/github.com/hyperledger/fabric/peer + command: bash -c 'cd /tmp; source scripts/func.sh; while true; do sleep 20170504; done' + + prometheus: # prometheus will pull metrics from fabric + image: prom/prometheus:v2.6.0 + restart: always + network_mode: ${NETWORK} + tty: true + volumes: + - ./prometheus.yml:/etc/prometheus/prometheus.yml + + zookeeper-base: + image: hyperledger/fabric-zookeeper:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + expose: + - '2181' + - '2888' + - '3888' + + kafka-base: + # official repo doesn't have 1.1.0-alpha tag, however, kafka changes version recently + #image: yeasy/hyperledger-fabric-kafka:0.10.2.0 + image: hyperledger/fabric-kafka:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - KAFKA_MESSAGE_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_REPLICA_FETCH_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_UNCLEAN_LEADER_ELECTION_ENABLE=false + - KAFKA_LOG_RETENTION_MS=-1 + expose: + - '9092' + + couchdb-base: + image: hyperledger/fabric-couchdb:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + + explorer-base: + image: yeasy/blockchain-explorer:0.1.0-preview # Till we have official image + expose: + - "8080" # HTTP port + command: bash -c 'sleep 10; node main.js' + + mysql-base: # mysql service + image: mysql:8.0 + restart: always + network_mode: ${NETWORK} + expose: + - "3306" + +networks: + default: + external: + name: ${NETWORK} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/crypto-config.yaml b/hyperledger_fabric/v1.4.7/crypto-config.yaml new file mode 100644 index 00000000..44c6f47e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config.yaml @@ -0,0 +1,113 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "OrdererOrgs" - Definition of organizations managing orderer nodes +# --------------------------------------------------------------------------- +OrdererOrgs: + # --------------------------------------------------------------------------- + # Orderer + # --------------------------------------------------------------------------- + - Name: Orderer + Domain: example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco +# Template: +# Count: 2 + # --------------------------------------------------------------------------- + # "Specs" - See OrdererOrgs below for complete description + # --------------------------------------------------------------------------- + Specs: + - Hostname: orderer0 + - Hostname: orderer1 + - Hostname: orderer2 + - Hostname: orderer3 +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org1 + # --------------------------------------------------------------------------- + - Name: Org1 + Domain: org1.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + # --------------------------------------------------------------------------- + # "Specs" + # --------------------------------------------------------------------------- + # Uncomment this section to enable the explicit definition of hosts in your + # configuration. Most users will want to use Template, below + # + # Specs is an array of Spec entries. Each Spec entry consists of two fields: + # - Hostname: (Required) The desired hostname, sans the domain. + # - CommonName: (Optional) Specifies the template or explicit override for + # the CN. By default, this is the template: + # + # "{{.Hostname}}.{{.Domain}}" + # + # which obtains its values from the Spec.Hostname and + # Org.Domain, respectively. + # --------------------------------------------------------------------------- + # Specs: + # - Hostname: foo # implicitly "foo.org1.example.com" + # CommonName: foo27.org5.example.com # overrides Hostname-based FQDN set above + # - Hostname: bar + # - Hostname: baz + # --------------------------------------------------------------------------- + # "Template" + # --------------------------------------------------------------------------- + # Allows for the definition of 1 or more hosts that are created sequentially + # from a template. By default, this looks like "peer%d" from 0 to Count-1. + # You may override the number of nodes (Count), the starting index (Start) + # or the template used to construct the name (Hostname). + # + # Note: Template and Specs are not mutually exclusive. You may define both + # sections and the aggregate nodes will be created for you. Take care with + # name collisions + # --------------------------------------------------------------------------- + Template: + Count: 2 + # Start: 5 + # Hostname: {{.Prefix}}{{.Index}} # default + # --------------------------------------------------------------------------- + # "Users" + # --------------------------------------------------------------------------- + # Count: The number of user accounts _in addition_ to Admin + # --------------------------------------------------------------------------- + Users: + Count: 1 + # --------------------------------------------------------------------------- + # Org2: See "Org1" for full specification + # --------------------------------------------------------------------------- + - Name: Org2 + Domain: org2.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 + + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk new file mode 100644 index 00000000..c30174ea --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqBG8Hwh5mYu43r5j +GeY8shFS4tWliS2C6Eo1DqKodwmhRANCAATS6dielFhgzyrdDwU8IRpzPgyLE50P +N3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk new file mode 100644 index 00000000..6a7655f7 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgg7VsR5c+YXJaAIbQ +/RyVK3s/RIu+tgC4e7bvyQvlo/uhRANCAAS7PZnfjljPssg33bRu492D7dj5nwKm +Bir/2loPey1VLIr8DNhHxAc5wGNYrTkPbGhT2v+m+RObE3SfITlnRgem +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem new file mode 100644 index 00000000..c985b158 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt new file mode 100644 index 00000000..f4d873e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key new file mode 100644 index 00000000..833ebc4c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwlr7b9VCz3Gb7Cn1 +jeYmgZv+hxsqNmaNTnIqWdkRpXWhRANCAASMcu7M7of/gjW2lbwRnr+ZxJNz67fq +1S5udVxiSqEDuwrdKRDEq36ZBDoxn3AuhnsOxZVPscbm5ze5Smoc7oro +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk new file mode 100644 index 00000000..e09d04c2 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg55SPn8cI2tmrOxU6 +a/fs6bQBeJdhWlGgodxpVlEcpXuhRANCAASyro+MTim5CYT5TsjvTzOMJf87xHZv +ixu9uo2HCm3Nh7DacEo6lNM0xEdiVCs2T4kjmOxwLSnKhKN6v7vWLxSc +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem new file mode 100644 index 00000000..f78ccae3 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +zT4JIZZIt8ZQKDz2PbySBfC+rA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt new file mode 100644 index 00000000..c95f8576 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key new file mode 100644 index 00000000..2b5b9d11 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg42GOYalmMEBy3LWI +qRxiDkoV89hxS06FFKR7oVdO3qShRANCAARXyAMSPDpxTP0kx2zoBfLJChu8+NhC +l3RQPiVC0IfsdrIrjHfWnQGuhW7rE5tmSFXHUPtAVTzA+yLMNxhe4Fgh +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk new file mode 100644 index 00000000..1e3ec4bd --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkdlWCmGUbNdEPcds +b6wf/bksls0ITnrRGIE2pPhg+WuhRANCAARPwHu+83+vF0ypYYr7Kq+Pa+PNyiHQ +805N+jBOMrOCDGcY2ObntNpt7yZISncnv0g35nQFSOVFft497Vj0ydA/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem new file mode 100644 index 00000000..a3b8b8bb --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +WFUnXFrrWMedpv6WCUtVYuZy +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt new file mode 100644 index 00000000..b393548e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key new file mode 100644 index 00000000..9ea6314c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgeFRhsNgcc5n6aEOs +g3eKHRSeKW8uRkFASkrmXJKNStuhRANCAARi0GkifFEfO18xLpBbADxN0HA1H+iK +RYSPepstZ5Bf9xF/RKbAFEV4yLg82lazX52epBcd4o6dSJGuHF7UErbO +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk new file mode 100644 index 00000000..6e058b71 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLWIybO6Te+EtYH7e +UBASAyCtVYoHY3gXQtkWsh89FvyhRANCAASDdIB7HKOhJS4ic24F3Fwba39VyDRL +pTb7Kr5WWDsQLnmvoRt9tuUZDBknjg6l+LoE61amUkr7ssqLoo3sD0Lx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem new file mode 100644 index 00000000..f0ec8d30 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQNB5/cbq9Av+/iGkL70qNmDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIzLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEg3SAexyjoSUuInNuBdxcG2t/ +Vcg0S6U2+yq+Vlg7EC55r6EbfbblGQwZJ44Opfi6BOtWplJK+7LKi6KN7A9C8aNN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +X6lK+YFJKWFOkm8REkQkAOft/GJHZF6TV4mnrR+FBvcCICrmpowTeNkx9SRIDJGV +16xdzWz/i3/8zsaxYRlAcllY +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt new file mode 100644 index 00000000..ff31671f --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAPsAy4zBIdPWDaz42uM3PhkwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMy5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABP+BC8hFOA4Z6YXKOsW5DV1vkrL5lMy9jR5IaXBTKIsA +OkgmXBAxigvOMCDWbRffLmUGoVplSGEyjDex0TvHEACjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIzLmV4YW1wbGUuY29tgghvcmRlcmVyMzAKBggq +hkjOPQQDAgNIADBFAiEA3qYzyv4Zuap2StCsi7bNUhDhe2Wkl17xQdsbskhq8fYC +IGCLCNwtHpGJu1PKeVQ05dXP7tVyG+6X99Kol5yR5b50 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key new file mode 100644 index 00000000..df7ddf2b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggEkbssbogR9aGUd6 +i7ArkBFke4DVDCTjwjEQkZV3tEShRANCAAT/gQvIRTgOGemFyjrFuQ1db5Ky+ZTM +vY0eSGlwUyiLADpIJlwQMYoLzjAg1m0X3y5lBqFaZUhhMow3sdE7xxAA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk new file mode 100644 index 00000000..d66eecd5 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgSz7TzhWtfJWnPJbC +jqKcjNIeerJFi8hz8KK/FAmaG5uhRANCAAR19yWUX7oV+QhBRs1OJMZe9zjmxaaD +W/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYYa8Mq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk new file mode 100644 index 00000000..7c191aa4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwl9zte7tkAXaH4X0 +0HRu250f0JeUz9xSE/huhZXjKoWhRANCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7t +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..7526ce41 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt new file mode 100644 index 00000000..a669485f --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLDCCAdKgAwIBAgIQcwGtMNlpDs3BPLJbDh516zAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowVjELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAE38zsx5udq3fPJ+3gtilspQaZbEmfXLAdrMM+1GUfdx8weOUW +e6LqbJrzw3S6N3DGdPm8z9qaDeBt2ESXTMjYFKNsMGowDgYDVR0PAQH/BAQDAgWg +MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMCsG +A1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqG +SM49BAMCA0gAMEUCIQD6UvUxCjTE1BobKWfCWiV/CcXsNOgIgNkHrI5G4tVJ1AIg +eITXCKnE7XAGZe74ewkqIiIcVHLZo0Ve3vI886odvsM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key new file mode 100644 index 00000000..0a1ea59b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgiWglBLqGYifGdUuN +tmP78YzHJzo18qgSyBL041wq4AuhRANCAATfzOzHm52rd88n7eC2KWylBplsSZ9c +sB2swz7UZR93HzB45RZ7oupsmvPDdLo3cMZ0+bzP2poN4G3YRJdMyNgU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk new file mode 100644 index 00000000..8e3064ee --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgpl436lDqjqEwe7qt +SbJ1vZWwdTAmzNGp8MO8gE7vT6WhRANCAARYN0FEkqJU8FyOzhlwvN9C8vzq4KNJ +NJUSGoGdlXLepZfi6qFjlwFMqiLei0B+yh3qfTCQN6TZ/MFowLyc/6/6 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk new file mode 100644 index 00000000..ffdc4dc9 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgm0D+OkYABIIuG7N4 +QkU2o+Sdg+AzA8y6GScUHhwl1jihRANCAARpIC9sgC5Ie27g8k4ggc+MU0WzQQgI +Fp54ifC8GKqFWG2jQX2092SI4bJIthBfXZ8rp1A5cFHP31V0MtT8+Ve3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem new file mode 100644 index 00000000..c16590c7 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt new file mode 100644 index 00000000..9cedb1fe --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAOC5poegWgqD1BvaIJ6XrAQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEuXtrj4F6eKCsBVjasRnFiTRRG2 +OLg0UtJx1cX1I9HnNw4KWX4enKPwouNutf4KaxfCAxmuRgzZI5BKU5x3oDKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcP +B2TeZbyays5dKX0AMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQDfhE88/mTlFPyB8j8NK9t1xMFt3g1t +LCf2QOjePfTsiAIgZnpUMmPjtg78sNnPNYJeGbGr883CwwRn7N5ao2opLeQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key new file mode 100644 index 00000000..1691eafa --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgxsEAmr439JoRs7Xc +7OIKgYSbo+bFM1zPrW1V/JZGgKShRANCAARLl7a4+BenigrAVY2rEZxYk0URtji4 +NFLScdXF9SPR5zcOCll+Hpyj8KLjbrX+CmsXwgMZrkYM2SOQSlOcd6Ay +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk new file mode 100644 index 00000000..6345f590 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgS3ZKSdWVpwrlMiAB +GNMv02TwWh3ebDVP7cmS+sFTVDihRANCAAQAM18H+Xw4mrVjYCudNH4mtoBoLXn5 +NAM7euZw/7mnOMf4w8QyaKc/Tmj/JDbTya7CqTF1Nl2W8dmSYgjjiF75 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem new file mode 100644 index 00000000..44dc5271 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt new file mode 100644 index 00000000..9795c4ff --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAMzR1ry+c/2vJ+AlkNZ1Hm8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEMRsEolFihr73o8uuekTzvdqc0U +zkDA67j6oQL6kj8BaGTyGsbnrZM/N5gHtmFLNS/KXsB33sgtwDLR8c8MXk2jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcP +B2TeZbyays5dKX0AMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIDwQEU7PPSpMh1nAseqDbETJvWc8cBHD +DSjdi3eGcCfxAiB/xoTRgxPVYoDWmTdfMb7LmiFKEUKORiTdFdB/Vw+NuA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key new file mode 100644 index 00000000..157c5c44 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgy3PX7MfHycwgXba7 +WYukETpSmbp7nGDWKneN6QQUI96hRANCAARDEbBKJRYoa+96PLrnpE873anNFM5A +wOu4+qEC+pI/AWhk8hrG562TPzeYB7ZhSzUvyl7Ad97ILcAy0fHPDF5N +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk new file mode 100644 index 00000000..18dbc0a3 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkDRcAA6YkwHf8mtg +3heHEEaMNklyl7Oc3uphAxUKoTGhRANCAARLYbic3FBmxtFeUtGOsq91ly/xCh8/ +ee3vTw05WmOvgwob7H+s/AtTD9tToaF805rXPgkP/ZTcJxtpcEZiyY4Y +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk new file mode 100644 index 00000000..6f48f879 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg5akjxEuWvHG6aITD +u+t7ju1Bpw4KY+OO7LiIBHh3VwyhRANCAAQdWZbur272mq4WmfyMoK/VtdqU87eW +ghFXPrVsAvQxc/OenVISSYhjmPzAoP8ur4B3uEK4Xq/njMSNSFH4epQo +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..3e04c481 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt new file mode 100644 index 00000000..d2232ee1 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAPrbDSSjkh7EyYEcPe/b0dAwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCFrSYyQZaPtM/UVKYEkvqSzHdbK +UIX3Izosv4Rg7VDcQJMpTPkIduB1FAyE94HpFjxfk/DI6VervaHu2R0Rqb2jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCC1GiOE7oRtNQgW6UMPJxpIL45HDwdk +3mW8msrOXSl9ADAKBggqhkjOPQQDAgNHADBEAiBv/os8LFWwYsnOhyCD7rywVqLv +9OL4kcV7A96Il9tPrAIgIEChTI9Q5d6AJYaLW7M+PYtJU3e9OKSYGgIXIVib45c= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key new file mode 100644 index 00000000..c28fc5d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgR5e9u+BSn8n7W2OG +TYq8vbXNSkE/k9oYUNcjuWNVZ0ihRANCAAQha0mMkGWj7TP1FSmBJL6ksx3WylCF +9yM6LL+EYO1Q3ECTKUz5CHbgdRQMhPeB6RY8X5PwyOlXq72h7tkdEam9 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk new file mode 100644 index 00000000..9708b14c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgVXcZ4NAEWy62iBMw +8ECM4jK3k4Vi8evUvDgWmKgsA1mhRANCAASjjlOlw3aD74R2e3vsiPeDRteGfGo7 +4Lz6FfxbfXGpjdoo/vG8ov5/YxrRbVECTlZdEUeLPobeh5+R53alJQE8 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem new file mode 100644 index 00000000..ec8da49b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIQCk2AHIw5PFgn0G8QvDZN6TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzEuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASjjlOlw3aD +74R2e3vsiPeDRteGfGo74Lz6FfxbfXGpjdoo/vG8ov5/YxrRbVECTlZdEUeLPobe +h5+R53alJQE8o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCduiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjO +PQQDAgNIADBFAiEAgYeVEacqESp4PiS3JT5zFzn5Bjlsa1iVCghtbBcK4TUCIBMe +Frc355l4WLYAP1PDOVIyaDCuWVEjiAHJYc7Hptkb +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt new file mode 100644 index 00000000..da90925b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOjCCAeGgAwIBAgIQaUnVYwmRmHoHYo5/x+pKwTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmcxLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEvsHIKgtVnnido7xhsy4SWFihxNPK +5wINUlX9+u6EgKB20fOolTkJNcwfwtMYx5J6ckhJblaMMKcb/4LQhgNbdqNsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcPB2Te +Zbyays5dKX0AMAoGCCqGSM49BAMCA0cAMEQCIC4YrdIwmCDEYoxUwVt9Pwl2mbXX +v1wQzfYpIhw6XXnqAiAX7NDLq1bru/qdH2qjfprPDsK5ZFhy0A1TF4XoyrbRzQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key new file mode 100644 index 00000000..f193bd00 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWHXvGiFp0wG8+MQj +5fssH8o5G46+0BdS5imUzq/hc5mhRANCAAS+wcgqC1WeeJ2jvGGzLhJYWKHE08rn +Ag1SVf367oSAoHbR86iVOQk1zB/C0xjHknpySEluVowwpxv/gtCGA1t2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk new file mode 100644 index 00000000..f458a2e6 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsN2FAVzvfC70M0m4 +wHJYcImLI/5h5N7yzAkN7Lq7fQChRANCAASzOavl2GiHVuVLPw5P7oC0vaQvdUoD +vLSCiGujtCPxAHqVBrewEgOAKRqSqmL0GjSA6MxB+Z+PHNr+KroL2o28 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk new file mode 100644 index 00000000..840a1058 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg4NCDjNODS5nSNONy +5E/YpMtSLBBKrx0EddttAxcMFS+hRANCAARXx8ir3hfKkOOiGdz12mvdb3qkqGnG +1cOBD48aP7/hYldtpXla1T21/5kVYROFQjdxM6tZqfgTkEj5+5jFfidt +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem new file mode 100644 index 00000000..dcebf264 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt new file mode 100644 index 00000000..6424baa0 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZjCCAg2gAwIBAgIQM8Vg1bLDpyxAd6BIOqYohzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENY9m240hcekeVHNB+CQHuVztqXBt +p3yJM91bGFnopaIgGo9Cel9Tq6s2WNXldArb35RrbtVauf1qP9Nv9c2gV6OBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgNK0vHlCcN7f1NCfM4EnijyxaTWFp +wjKueZOmXuOtVfIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMi5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDRwAwRAIgd0GROzWACQdQSNqG/pIHC2eycm/KgDvj +sxCxe2VU3h4CIHQQBFlg1sXUwyqIw3i8tQPKBN+sTcMiuOcCi1VarXbt +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key new file mode 100644 index 00000000..c2bccb2b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtUWon1YB6QpLXR2z +XBIVoDp/r2x14gyQw99hUC7jgp+hRANCAAQ1j2bbjSFx6R5Uc0H4JAe5XO2pcG2n +fIkz3VsYWeiloiAaj0J6X1OrqzZY1eV0CtvflGtu1Vq5/Wo/02/1zaBX +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk new file mode 100644 index 00000000..3e9960ce --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1/n4dcnvNycd2+vy +ANhb6QG9EdA+f5puR+M8c1Amd3OhRANCAARp2NN0WH/l3sCfzTEMOuGvmCZKzD/t +GIOsNJMeaAarsdk3FhjlFSYZ+j69Ij7LsxRsiCqCtmJqM/bP7ju0lP6F +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem new file mode 100644 index 00000000..4f5dc5a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt new file mode 100644 index 00000000..8d1105c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAIjb8IdfJz1e5H52KVzOpVQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABOD0uahM0Ax+pirE9CeaG6yANVjt +LCV6SDSbNkw//hX8o1EWwPSZCE79YRRNEGN+bQ1nR6TEMAkVL0VicT4NUeqjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIDStLx5QnDe39TQnzOBJ4o8sWk1h +acIyrnmTpl7jrVXyMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzIuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIAJMMT6R0t2EKylcnKe9O40ZOgjipmBj +CIzPUP7MMd9mAiBWDMzScRQ77PjugAqXg6rvCxqKhNUqxd3r45khtE4EBg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key new file mode 100644 index 00000000..bafcfd1e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghgLrYgTaqSf3Ih6I +FJoVLGpsqaxaU6b+tDgBnnAEk6KhRANCAATg9LmoTNAMfqYqxPQnmhusgDVY7Swl +ekg0mzZMP/4V/KNRFsD0mQhO/WEUTRBjfm0NZ0ekxDAJFS9FYnE+DVHq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk new file mode 100644 index 00000000..fdfa0e06 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgthZDJnqPCOsQg4KG +dhx43GwuER7lKHu14yJ8vu33FIOhRANCAAQsKCE1EV0joZez7XCfunpXKhcy1D5j +529UDkguyteOWUqlnY48C6KkcnwOqpelW7uARvknStetMuafR/qKZNIA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk new file mode 100644 index 00000000..8fc6e018 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgETCyE8tH/4+tFzqM +YNYMpYluwFFttidE7Ryx1VHDxzahRANCAAQWt9+MdW1ruN7ScmOfWSBnWnu2vV5h +rDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuREyIHuT5XoWWeF +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..f7f34fee --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt new file mode 100644 index 00000000..8cbded46 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRALNK6TSEn8rEQXsqcPz+DG0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGBB9Slwt7N5Ww9jRe2UIxP7lMwq +Vla6hz0MVKtA0Ojgk/c/rTypjtKOqqfd4908bbiNB9vUeT+Qu+XQu9h5E0GjbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCA0rS8eUJw3t/U0J8zgSeKPLFpNYWnC +Mq55k6Ze461V8jAKBggqhkjOPQQDAgNIADBFAiEAizmCbZffW8z2c0vtPlcQikTy +A4Ush951ya6GZ4FS8hECIHxGFjleS8Xb1Nd5LQJT9jUMNKbrIefKajpvTY9uySBE +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key new file mode 100644 index 00000000..c78724a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgraF5AKtD/k4mHbnK +QnUKlgIqLvmp2eB0I90cfcjc48ehRANCAARgQfUpcLezeVsPY0XtlCMT+5TMKlZW +uoc9DFSrQNDo4JP3P608qY7Sjqqn3ePdPG24jQfb1Hk/kLvl0LvYeRNB +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk new file mode 100644 index 00000000..55e08e27 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgvVw7t+gUM+o+26i6 +rF6eb6RM5J/qBacbThGKQw+weCyhRANCAAQ0kd7LKlXrHRpBbENUyb/15Z3cdPll +aSdHXmnFzJOmK6+9OiR5TW5CE1banrUGbZ1ulDsO9AxcDZ9fDJ2WkGHl +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem new file mode 100644 index 00000000..f5285063 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAODOluu3YjbZu72m/PLLiaowCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENJHeyypV +6x0aQWxDVMm/9eWd3HT5ZWknR15pxcyTpiuvvTokeU1uQhNW2p61Bm2dbpQ7DvQM +XA2fXwydlpBh5aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZI +zj0EAwIDSAAwRQIhAOSd1zxQIxaQwnPzqHuOPPBiUwi5yhAx4DuKvmKDCnJOAiAM +erTwrKFaE4uoJFKIjeG77DqG8SIhaq/C65Jbp0t5Qg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt new file mode 100644 index 00000000..dfafedee --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQQ6fSQbyG5UApGiz4kNwY7jAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEJkd+OQUuDymCGvc9fnUGdY09IdmL +q/Ep/AsS0cD3jB/3jReHkzr0TWya0z4K0EzSi0jnCHCtWEYw1CJdsiA7kKNsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIDStLx5QnDe39TQnzOBJ4o8sWk1hacIy +rnmTpl7jrVXyMAoGCCqGSM49BAMCA0gAMEUCIQCKTue/ffx647l0pBHOMFBvER/e +nMjtmoCBmhZAcS0jjAIgEu1ujbYZVr51A80uvt2P2bjNnKf+S99jiNxId8hO7jc= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key new file mode 100644 index 00000000..a7828eb1 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgmZf8ohzyrlzEUO9H +3i/Yfn7ys9+N+M2CHbcLHiMMruShRANCAAQmR345BS4PKYIa9z1+dQZ1jT0h2Yur +8Sn8CxLRwPeMH/eNF4eTOvRNbJrTPgrQTNKLSOcIcK1YRjDUIl2yIDuQ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk new file mode 100644 index 00000000..475f2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZ6kmxJp0ZEgRfZiZ +3vL7cUTXnxHBGPvzQr5Y0ZUELNehRANCAAR8pL1w0Dlv2Qvhn6/unNhWijsdnM87 +zmYd+sAobhDNKE9bD41AYDiCTwb7AnLICNVZlmnP8+gMa1CZDgCaSf2i +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk new file mode 100644 index 00000000..4b460799 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqwmpPvUDiOL62Bmo +68+QDgqipuolZa/AMhVHhF717WqhRANCAAT4r/XB7lS5FTk66IZfURkPoIodoke9 +uabulh9dUTC4MYHDm6zDghLeZN4nlnu1ZevH1J3VubwqRM9GzKZiesg/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk new file mode 100644 index 00000000..d38d371b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgQNOTmFbR71Dz/EFw +yBsMZNIKTqvhSZy6YjfVbcT0tAyhRANCAAQNKM2jWjFOSihaRIZk2I51o8He51id +UdYh0ExMOdtHvdfTRwg5AJg7VkTJQDmodMY8iedj3FXDlxACDK+Gmw8b +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk new file mode 100644 index 00000000..ecee703f --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghkNqow5JLXSbeDeQ +lRCmzcGLSZQZBKrx7v9FVx25OYehRANCAATCOSYS446QZsFg6pDXm4To3Bkuagh+ +4Ct1GdF0emcYBdHfzy1azLA5Vg91j2cMSlAfJkOZkBq85j18+MrkOOIY +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..1d62087b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQVxW0tEMqJsClUdnHjmIurTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDSjNo1oxTkoo +WkSGZNiOdaPB3udYnVHWIdBMTDnbR73X00cIOQCYO1ZEyUA5qHTGPInnY9xVw5cQ +AgyvhpsPG6NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANy2ytrmVtCxzJumHStEymgmVSrV6wxICjqjtMuBeodvAiBMxA3I +kmS+4fl2DUDy5Ynedi1EFfLFUprMPJ2+iO6vgg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..abbb6442 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg2gAwIBAgIQRjQ96YrYiKq//VIfxWI4IzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEK71x/g2MV0OhHE8L/Y7fOUdNnsSm +fgpUXLV28l4K6TXSz901v0Ef+34psiHPUGFNPWfQ2dojKFAsqHfJai+94KOBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAggiM01mEhKAN5vQrQ6R+YxvWpPZtu +b648WpBR8eLqiqIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMy5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDSAAwRQIhAMIy5szhbPp+6ajmWY1M1gQlxTV5G+Lo +RLHrKvva3CEzAiBPhHWpgKQe0IGIl1wPT4O7mV15ghvjC5mpi6+qzscKGg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..a3d5fc23 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgs1OoP184IQ3sgFeP +9D19HuUnGz7YpKoXXjiedg9zzFGhRANCAAQrvXH+DYxXQ6EcTwv9jt85R02exKZ+ +ClRctXbyXgrpNdLP3TW/QR/7fimyIc9QYU09Z9DZ2iMoUCyod8lqL73g +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk new file mode 100644 index 00000000..a15ec962 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgn+L3iS4Rth+xOcGF +iNvPbf85PQeniZBZOtcJqOWbdbuhRANCAARLWcEhH+7KxzFeK3ZhgaFG7kprhkT6 +1djvz8ahXo2pmGgqJRUT8ApRsON/qYqbKBKiSd3IbOSKAMwgkGGpwDCa +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk new file mode 100644 index 00000000..91c7dc3e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgY+uANW502vvq6Y/K +eZGnY+87wDnXbWJD6ItGV8hPDR6hRANCAAT1EFG8e7J1gnOrJb6PR9RhdkKudvCz +DIC7a/MBH2ZYuK2XiSmfm77KXnhWbU5fjF7thyFhrTeIFvfNxTE94LI2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..00af6e41 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQaj+S0lJTmPOrotSRR+exSDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE9RBRvHuydYJz +qyW+j0fUYXZCrnbwswyAu2vzAR9mWLitl4kpn5u+yl54Vm1OX4xe7YchYa03iBb3 +zcUxPeCyNqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANbK656AQowBlOr4pK8hF+iSe6LbqXxfzTnlE5jLJAroAiBLfMGC +j4fXFvV5YgxspWg1nX8fF6XGu/oPGkHFX+81dg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..4b62807d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMo5kQAauTlIkdgMVD8xqUYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAQhwl+kSqDroCPbYWTHUeO1huet +dkU46BdEqzOCB7AtNnqZbF614Vrr5yS1SyWsOtEmDQInCnDmbzSxD1kPLAKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2b +bm+uPFqQUfHi6oqiMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDP4pTybfCsQGeIX+D3m2OPtYyr8hEs +JJUEjF0avVQzJwIgag3DyYWNRmXxlsQEFyyJrgSXl8n2FfIRTt+nGLXATRM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..6e849742 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLeRIXFMa/9duYkO6 +3XD6KFu/lYumYJ7dfH72RzKdfJ6hRANCAAQEIcJfpEqg66Aj22Fkx1HjtYbnrXZF +OOgXRKszggewLTZ6mWxeteFa6+cktUslrDrRJg0CJwpw5m80sQ9ZDywC +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk new file mode 100644 index 00000000..82f970b4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbNzuM3DxKH1Jw5pl +ahYpbNN82fwfPrFqCCxBjiu9v9ihRANCAAS55b42HQCpBeT7llOqOyz49wBKo56g +BForbLK4UoXUjSxKI3SUxYr+o/s92jwQA663ybpOv53Sqt/wuzHTULuE +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk new file mode 100644 index 00000000..0d9d2078 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgw+PlBWl2jW5yoRdf +XBuqvBNd0XhkfEc9AZ59syEvV8KhRANCAARD6FpxBsxLsHL7dimnHG1VglEbQiv2 +d3HVQ7FitUJccCZDmFfg/Jo9LYhLicSQnmET9X6zBDOK4+qRTW1MWFPP +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk new file mode 100644 index 00000000..3cd6c459 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgahPS7k+5zVcEpjQp +U9KYQ9sClfTQqUxIdubrfMxtc3ChRANCAARU4sXSddFmhQH5cXws0Ai14L2qdcFv +n19aIHxWdWP6NycnIAvl4EefmwcTGzPd/DYK9VWKZxMBFjOBBtSG1jqx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk new file mode 100644 index 00000000..d59485ac --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgMCD31/c0/DmpD/D1 +LoHBu20f5+aFyase6HOw5qDvzeWhRANCAAQsX1cU5gSsKVUSIvE9OcILF0kS9c1A +aXxGXXm2TWQ3Xy9lEgrP4lwqx4jrI6chSWCiek8G+Vt3Wmr4KBFFkjDU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..dbd3fdb0 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQChkJXZ77cw2XYcZw7N/ZfDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFTixdJ10WaF +AflxfCzQCLXgvap1wW+fX1ogfFZ1Y/o3JycgC+XgR5+bBxMbM938Ngr1VYpnEwEW +M4EG1IbWOrGjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGtfwyLyNNtneENJhFlrLzi6469Hgk5RcF7Naqa04tNFMAoGCCqGSM49 +BAMCA0gAMEUCIQC4QfvvZmFTTu3tGnYIYMl1gamWueuf6AW9SKkSclQxjgIgWQDu +29pl8iPDqsl42ykAQygJo25MUjJiLpBJV7RYBt8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dfcf853 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQKa5eObvsHxvupA2rahA3RDAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE5q3We3H2vVxe2291bquQfuMAcOBa +wWZjuVutHC9P50CLCdiud28dL+Bl9lX4+TxUAkVWtEx5+2K66+A9/YVMN6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2bbm+u +PFqQUfHi6oqiMAoGCCqGSM49BAMCA0gAMEUCIQCgBPbErcsPfvWS656tesHBcvL8 +2+uPQ6KIAPQ8xgMurAIgegRhEztZz346n80Of44KuE9eJHCxgHSko8BB4PTYDQI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key new file mode 100644 index 00000000..8bfc64af --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkW6Iy52FIAxDhuVU +zRLLrd3pru3ULE0jmc9mSIly6SWhRANCAATmrdZ7cfa9XF7bb3Vuq5B+4wBw4FrB +ZmO5W60cL0/nQIsJ2K53bx0v4GX2Vfj5PFQCRVa0THn7Yrrr4D39hUw3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk new file mode 100644 index 00000000..e05d7e38 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGpXiTLDYWSb3WFVD ++C7qcLIU+7W//zM/2D7bq842BUWhRANCAARSleBGqLKUcT93WNRQ89ghyJ5Yex5y +jh4NyVtpvJ4avCWwvnDvPo5U4nOv7QS8acoxa8Y8dZlkkXZC16Qr/lXZ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk new file mode 100644 index 00000000..f755e5cd --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLVaOOXh5IqTIxkCm +IiGOENZlC32XHQqwFyyILNFZBqmhRANCAATMnNMCRrNVbWNS56rA5T9FfDlAAeep +xbDQNHQGtqCE67gwnqlTzUZ02g85xzt4HxBzdb8oN8KUnoO5E3BmVyIe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..a2c2d846 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdGgAwIBAgIRALJ8p65zSztDjce0vxKEVp8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEzJzTAkaz +VW1jUueqwOU/RXw5QAHnqcWw0DR0BraghOu4MJ6pU81GdNoPOcc7eB8Qc3W/KDfC +lJ6DuRNwZlciHqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZI +zj0EAwIDRwAwRAIgRYa/+oW0gyH4HpFXt2/TdKIL6kMx+koYkGvv9A+5Bn8CIH/X +ey0ZDFaRc33uctv2In4dD9HqvsKI0AKdpfZiRA7l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dc7c89e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAMviHBBgGLER1MPyrbPcZtQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLdIYyUvUqO3F2tl5jjOrv0J7IbF +nMtcQuZYKVu9/OpfM0R5WbD3pMuremuj59I8o692CtGvYDL7Klt0F0apNgujbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCCCIzTWYSEoA3m9CtDpH5jG9ak9m25v +rjxakFHx4uqKojAKBggqhkjOPQQDAgNIADBFAiEAsOK+kRpL7Jbw9aDTgDPlsmLu +Elt0xGn9Aj26W0XgbeECIGG654v86gvmny3ttNnpAcSLZt+YfBY6kH0GjNPZAaLM +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..6299df14 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwgmBcva6NSpRyxLm +pBGUdkxZ+2NeYpJ6Xm+FCBblDvihRANCAAS3SGMlL1KjtxdrZeY4zq79CeyGxZzL +XELmWClbvfzqXzNEeVmw96TLq3pro+fSPKOvdgrRr2Ay+ypbdBdGqTYL +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-couchdb.yaml b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-couchdb.yaml new file mode 100644 index 00000000..18291a49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-couchdb.yaml @@ -0,0 +1,107 @@ +# github.com/yeasy/docker-compose-files +# fabric network with couchdb as the peer state db. +# including: +# orderer.example.com: orderer node +# peer0.org1.example.com: peer0 node +# peer1.org1.example.com: peer1 node +# peer0.org2.example.com: peer2 node +# peer1.org2.example.com: peer3 node +# couchdb0: couchdb node +# couchdb1: couchdb node +# couchdb2: couchdb node +# couchdb3: couchdb node +# cli: cli node + +version: '2' + +services: + orderer.example.com: + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb0:5984 + depends_on: + - couchdb0 + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb1:5984 + depends_on: + - couchdb1 + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb2:5984 + depends_on: + - couchdb2 + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb3:5984 + depends_on: + - couchdb3 + + couchdb0: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb0 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "5984:5984" # this is the restful API addr, can also access fauxton web ui thru http://localhost:5984/_utils/ + + couchdb1: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb1 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "6984:5984" + + couchdb2: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb2 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "7984:5984" + + couchdb3: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb3 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "8984:5984" + + cli: + extends: + file: base-solo.yaml + service: cli + diff --git a/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-dev.yaml b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-dev.yaml new file mode 100644 index 00000000..28add973 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-dev.yaml @@ -0,0 +1,93 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.4 in dev mode, including +# It will map the $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric on peer0 +# * 2 ca (not in use now) +# * 3 orderers +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + command: /go/src/github.com/hyperledger/fabric/peer/peer node start + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-event.yaml b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-event.yaml new file mode 100644 index 00000000..5c4efd0d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-event.yaml @@ -0,0 +1,59 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: + + orderer.example.com: # There can be multiple orderers + extends: + file: base-event.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-event.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + peer1.org1.example.com: + extends: + file: base-event.yaml + service: peer1.org1.example.com + depends_on: + - orderer.example.com + + peer0.org2.example.com: + extends: + file: base-event.yaml + service: peer0.org2.example.com + depends_on: + - orderer.example.com + + peer1.org2.example.com: + extends: + file: base-event.yaml + service: peer1.org2.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-event.yaml + service: cli + + event-listener: + extends: + file: base-event.yaml + service: event-listener + depends_on: + - orderer.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com diff --git a/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-kafka.yaml b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-kafka.yaml new file mode 100644 index 00000000..1a1aac67 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-kafka.yaml @@ -0,0 +1,134 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-kafka.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer0.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer1.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-kafka.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-kafka.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-kafka.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-kafka.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-raft.yaml b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-raft.yaml new file mode 100644 index 00000000..281b4f1b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-raft.yaml @@ -0,0 +1,80 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.4 MVE, including +# * 2 ca (not in use now) +# * 3 orderers +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-solo-be.yaml b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-solo-be.yaml new file mode 100644 index 00000000..5e5b2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-solo-be.yaml @@ -0,0 +1,82 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing +# * blockchain-explorer + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + + explorer: + extends: + file: base.yaml + service: explorer-base + container_name: explorer + hostname: explorer + depends_on: + - mysql + volumes: + - ./explorer-artifacts/config.json:/blockchain-explorer/config.json + - ./crypto-config:/blockchain-explorer/first-network/crypto-config + ports: + - "8080:8080" # HTTP port + + mysql: # mysql service + extends: + file: base.yaml + service: mysql-base + container_name: mysql + hostname: mysql + environment: + - MYSQL_ROOT_PASSWORD=root + - MYSQL_DATABASE=fabricexplorer + volumes: + - ./explorer-artifacts/fabricexplorer.sql:/docker-entrypoint-initdb.d/fabricexplorer.sql + #command: bash -c 'mysqld; sleep 1; mysql -uroot -proot < /tmp/fabricexplorer.sql; while true; do sleep 20171117; done' + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-solo.yaml new file mode 100644 index 00000000..082fb4c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/docker-compose-2orgs-4peers-solo.yaml @@ -0,0 +1,73 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer0.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + + prometheus: + extends: + file: base-solo.yaml + service: prometheus + depends_on: + - orderer0.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/README.md b/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/README.md new file mode 100644 index 00000000..22338f1d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/README.md @@ -0,0 +1,23 @@ +# Debug Chaincode with MockShim +Baohua Yang, 2019-01-17 + +The package will demonstrate how to debug the chaincode with the MockShim lib. + +This way is more efficient and quick to debug locally without any fabric network setup. + +## Usage + +Unzip the package and enter the package path, then run + +```bash +# Regular testing should return OK +$ go test . + +# Debug with more logs output +$ go test -v . +``` + +## Files + +* chaincode_example02.go: example02 chaincode from HLF repo; +* cc_test.go: test code to verify the example02 chaincode logic. diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/cc_test.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/cc_test.go new file mode 100644 index 00000000..6fb11c2c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/cc_test.go @@ -0,0 +1,58 @@ +package main + +import ( + "strconv" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +// TestMockShim test the chaincode with MockShim +func TestMockShim(t *testing.T) { + var Aval int + var err error + + // Instantiate mockStub using the sample example02 chaincode + stub := shim.NewMockStub("mockStub", new(SimpleChaincode)) + if stub == nil { + t.Fatalf("MockStub creation failed") + } + + // Init with tx_uuid, args + result := stub.MockInit("000001", [][]byte{[]byte("init"), []byte("a"), []byte("100"), []byte("b"), []byte("200")}) + if result.Status != shim.OK { + t.Fatalf("Error to Init the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000002", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 100 { + t.Errorf("Value is not equal to expected from query result") + } + + // Invoke to transfer + result = stub.MockInvoke("000003", [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.invoke the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000004", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 90 { + t.Errorf("Value is not equal to expected from query result") + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/chaincode_example02.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/chaincode_example02.go new file mode 100644 index 00000000..945084b1 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/cc02_mockTest/chaincode_example02.go @@ -0,0 +1,200 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +//WARNING - this chaincode's ID is hard-coded in chaincode_example04 to illustrate one way of +//calling chaincode from a chaincode. If this example is modified, chaincode_example04.go has +//to be modified as well with the new ID of chaincode_example02. +//chaincode_example05 show's how chaincode ID can be passed in as a parameter instead of +//hard-coding. + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + fmt.Printf("args = %+v\n", args) + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example01/chaincode_example01.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example01/chaincode_example01.go new file mode 100644 index 00000000..302f2d98 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example01/chaincode_example01.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +var A, B string +var Aval, Bval, X int + +// Init callback representing the invocation of a chaincode +// This chaincode will manage two accounts A and B and will transfer X units from A to B upon invoke +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + /************ + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval)) + if err != nil { + return nil, err + } + + stub.PutState(B, []byte(strconv.Itoa(Bval)) + err = stub.PutState(B, []byte(strconv.Itoa(Bval)) + if err != nil { + return nil, err + } + ************/ + return shim.Success(nil) +} + +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // Transaction makes payment of X units from A to B + X, err := strconv.Atoi(args[0]) + if err != nil { + fmt.Printf("Error convert %s to integer: %s", args[0], err) + return shim.Error(fmt.Sprintf("Error convert %s to integer: %s", args[0], err)) + } + Aval = Aval - X + Bval = Bval + X + ts, err2 := stub.GetTxTimestamp() + if err2 != nil { + fmt.Printf("Error getting transaction timestamp: %s", err2) + return shim.Error(fmt.Sprintf("Error getting transaction timestamp: %s", err2)) + } + fmt.Printf("Transaction Time: %v,Aval = %d, Bval = %d\n", ts, Aval, Bval) + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example02/chaincode_example02.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example02/chaincode_example02.go new file mode 100644 index 00000000..eb6f430b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example02/chaincode_example02.go @@ -0,0 +1,193 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go new file mode 100644 index 00000000..c6c8ed7f --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go @@ -0,0 +1,112 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample02_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func TestExample02_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345"), []byte("B"), []byte("456")}) + + // Query A + checkQuery(t, stub, "A", "345") + + // Query B + checkQuery(t, stub, "B", "456") +} + +func TestExample02_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}) + checkQuery(t, stub, "A", "444") + checkQuery(t, stub, "B", "801") + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}) + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example03/chaincode_example03.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example03/chaincode_example03.go new file mode 100644 index 00000000..d667a822 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example03/chaincode_example03.go @@ -0,0 +1,100 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// This program is an erroneous chaincode program that attempts to put state in query context - query should return error +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init takes a string and int. These are stored as a key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is legal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke is a no-op +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"query\"") +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is illegal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + jsonResp := "{\"Error\":\"Cannot put state within chaincode query\"}" + return shim.Error(jsonResp) + } + + return shim.Success(nil) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go new file mode 100644 index 00000000..812650e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", res.Message) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample03_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=123 B=234 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123")}) + + checkState(t, stub, "A", "123") +} + +func TestExample03_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=345 B=456 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345")}) + + // Invoke "query" + checkInvoke(t, scc, stub, [][]byte{[]byte("query"), []byte("A"), []byte("345")}) +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example04/chaincode_example04.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example04/chaincode_example04.go new file mode 100644 index 00000000..b874ad73 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example04/chaincode_example04.go @@ -0,0 +1,174 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode invoking another chaincode - invokes chaincode_example02 + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. These are stored in the key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var event string // Indicates whether event has happened. Initially 0 + var eventVal int // State of event + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + event = args[0] + eventVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for event status") + } + fmt.Printf("eventVal = %d\n", eventVal) + + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke invokes another chaincode - chaincode_example02, upon receipt of an event and changes event state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var eventVal int // State of event + var err error + + if len(args) != 3 && len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 3 or 4") + } + + chainCodeToCall := args[0] + event = args[1] + eventVal, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Expected integer value for event state change") + } + channelID := "" + if len(args) == 4 { + channelID = args[3] + } + + if eventVal != 1 { + fmt.Printf("Unexpected event. Doing nothing\n") + return shim.Success(nil) + } + + f := "invoke" + invokeArgs := toChaincodeArgs(f, "a", "b", "10") + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channelID) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", string(response.Payload)) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + fmt.Printf("Invoke chaincode successful. Got response %s", string(response.Payload)) + + // Write the event state back to the ledger + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return response +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var err error + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting entity to query") + } + + event = args[0] + var jsonResp string + + // Get the state from the ledger + eventValbytes, err := stub.GetState(event) + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + event + "\"}" + return shim.Error(jsonResp) + } + + if eventValbytes == nil { + jsonResp = "{\"Error\":\"Nil value for " + event + "\"}" + return shim.Error(jsonResp) + } + + if len(args) > 3 { + chainCodeToCall := args[1] + queryKey := args[2] + channel := args[3] + f := "query" + invokeArgs := toChaincodeArgs(f, queryKey) + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channel) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + jsonResp = string(response.Payload) + } else { + jsonResp = "{\"Name\":\"" + event + "\",\"Amount\":\"" + string(eventValbytes) + "\"}" + } + fmt.Printf("Query Response: %s\n", jsonResp) + + return shim.Success([]byte(jsonResp)) +} + +// Invoke is called by fabric to execute a transaction +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go new file mode 100644 index 00000000..9d252e2d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go @@ -0,0 +1,119 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +// this is the response to any successful Invoke() on chaincode_example04 +var eventResponse = "{\"Name\":\"Event\",\"Amount\":\"1\"}" + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample04_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("123")}) + + checkState(t, stub, "Event", "123") +} + +func TestExample04_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Query A + checkQuery(t, stub, "Event", eventResponse) +} + +func TestExample04_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + chaincodeToInvoke := "ex02" + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeToInvoke, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeToInvoke, stubEx2) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "101") + checkQuery(t, stubEx2, "b", "232") + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "91") + checkQuery(t, stubEx2, "b", "242") +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example05/chaincode_example05.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example05/chaincode_example05.go new file mode 100644 index 00000000..35ef5074 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example05/chaincode_example05.go @@ -0,0 +1,215 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode querying another chaincode - invokes chaincode_example02 and computes the sum of a and b and stores it as state + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. The string will be a key with +// the int as a value. +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var sum string // Sum of asset holdings across accounts. Initially 0 + var sumVal int // Sum of holdings + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + sum = args[0] + sumVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for sum") + } + fmt.Printf("sumVal = %d\n", sumVal) + + // Write the state to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke queries another chaincode and updates its own state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + // Write sumVal back to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Printf("Invoke chaincode successful. Got sum %d\n", sumVal) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + fmt.Printf("Query chaincode successful. Got sum %d\n", sumVal) + jsonResp := "{\"Name\":\"" + sum + "\",\"Value\":\"" + strconv.Itoa(sumVal) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Success([]byte("Invalid invoke function name. Expecting \"invoke\" \"query\"")) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go new file mode 100644 index 00000000..1f6d3047 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go @@ -0,0 +1,128 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +var chaincodeName = "ex02" + +// chaincode_example05 looks like it wanted to return a JSON response to Query() +// it doesn't actually do this though, it just returns the sum value +func jsonResponse(name string, value string) string { + return fmt.Sprintf("jsonResponse = \"{\"Name\":\"%v\",\"Value\":\"%v\"}", name, value) +} + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, expect string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != expect { + fmt.Println("State value", name, "was not", expect, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, args [][]byte, expect string) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query", args, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", args, "failed to get result") + t.FailNow() + } + if string(res.Payload) != expect { + fmt.Println("Query result ", string(res.Payload), "was not", expect, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample05_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("432")}) + + checkState(t, stub, "sumStoreName", "432") +} + +func TestExample05_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 111 + 222 = 333 + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "333") // example05 doesn't return JSON? +} + +func TestExample05_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("222"), []byte("b"), []byte("333")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 222 + 333 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "222") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "333") + + // update A-=10 and B+=10 + checkInvoke(t, stubEx2, [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + + // a + b = 212 + 343 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "212") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "343") +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/README.md b/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/README.md new file mode 100644 index 00000000..eca40073 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/README.md @@ -0,0 +1,80 @@ +# Using EncCC + +To test `EncCC` you need to first generate an AES 256 bit key as a base64 +encoded string so that it can be passed as JSON to the peer chaincode +invoke's transient parameter. + +Note: Before getting started you must use govendor to add external dependencies. Please issue the following commands inside the "enccc_example" folder: +``` +govendor init +govendor add +external +``` + +Let's generate the encryption and decryption keys. The example will simulate a shared key so the key is used for both encryption and decryption. +``` +ENCKEY=`openssl rand 32 -base64` && DECKEY=$ENCKEY +``` + +At this point, you can invoke the chaincode to encrypt key-value pairs as +follows: + +Note: the following assumes the env is initialized and peer has joined channel "my-ch". +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key1","value1"]}' --transient "{\"ENCKEY\":\"$ENCKEY\"}" +``` + +This call will encrypt using a random IV. This may be undesirable for +instance if the chaincode invocation needs to be endorsed by multiple +peers since it would cause the endorsement of conflicting read/write sets. +It is possible to encrypt deterministically by specifying the IV, as +follows: at first the IV must be created + +``` +IV=`openssl rand 16 -base64` +``` + +Then, the IV may be specified in the transient field + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key2","value2"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"IV\":\"$IV\"}" +``` + +Two such invocations will produce equal KVS writes, which can be endorsed by multiple nodes. + +The value can be retrieved back as follows + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key1"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key2"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +Note that in this case we use a chaincode query operation; while the use of the +transient field guarantees that the content will not be written to the ledger, +the chaincode decrypts the message and puts it in the proposal response. An +invocation would persist the result in the ledger for all channel readers to +see whereas a query can be discarded and so the result remains confidential. + +To test signing and verifying, you also need to generate an ECDSA key for the appopriate +curve, as follows. + +``` +On Intel: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64 -w0` && VERKEY=$SIGKEY + +On Mac: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64` && VERKEY=$SIGKEY +``` + +At this point, you can invoke the chaincode to sign and then encrypt key-value +pairs as follows + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPTSIGN","key3","value3"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"SIGKEY\":\"$SIGKEY\"}" +``` + +And similarly to retrieve them using a query + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPTVERIFY","key3"]}' --transient "{\"DECKEY\":\"$DECKEY\",\"VERKEY\":\"$VERKEY\"}" +``` diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/enccc_example.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/enccc_example.go new file mode 100644 index 00000000..284695d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/enccc_example.go @@ -0,0 +1,223 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "fmt" + + "github.com/hyperledger/fabric/bccsp" + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + pb "github.com/hyperledger/fabric/protos/peer" +) + +const DECKEY = "DECKEY" +const VERKEY = "VERKEY" +const ENCKEY = "ENCKEY" +const SIGKEY = "SIGKEY" +const IV = "IV" + +// EncCC example simple Chaincode implementation of a chaincode that uses encryption/signatures +type EncCC struct { + bccspInst bccsp.BCCSP +} + +// Init does nothing for this cc +func (t *EncCC) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Encrypter exposes how to write state to the ledger after having +// encrypted it with an AES 256 bit key that has been provided to the chaincode through the +// transient field +func (t *EncCC) Encrypter(stub shim.ChaincodeStubInterface, args []string, encKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, encKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function Encrypter") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we encrypt cleartextValue and assign it to key + err = encryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("encryptAndPutState failed, err %+v", err)) + } + return shim.Success(nil) +} + +// Decrypter exposes how to read from the ledger and decrypt using an AES 256 +// bit key that has been provided to the chaincode through the transient field. +func (t *EncCC) Decrypter(stub shim.ChaincodeStubInterface, args []string, decKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function Decrypter") + } + + key := args[0] + + // here we decrypt the state associated to key + cleartextValue, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateAndDecrypt failed, err %+v", err)) + } + + // here we return the decrypted value as a result + return shim.Success(cleartextValue) +} + +// EncrypterSigner exposes how to write state to the ledger after having received keys for +// encrypting (AES 256 bit key) and signing (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) EncrypterSigner(stub shim.ChaincodeStubInterface, args []string, encKey, sigKey []byte) pb.Response { + // create the encrypter/signer entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, encKey, sigKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function EncrypterSigner") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we sign cleartextValue, encrypt it and assign it to key + err = signEncryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("signEncryptAndPutState failed, err %+v", err)) + } + + return shim.Success(nil) +} + +// DecrypterVerify exposes how to get state to the ledger after having received keys for +// decrypting (AES 256 bit key) and verifying (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) DecrypterVerify(stub shim.ChaincodeStubInterface, args []string, decKey, verKey []byte) pb.Response { + // create the decrypter/verify entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, decKey, verKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256DecrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function DecrypterVerify") + } + key := args[0] + + // here we decrypt the state associated to key and verify it + cleartextValue, err := getStateDecryptAndVerify(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateDecryptAndVerify failed, err %+v", err)) + } + + // here we return the decrypted and verified value as a result + return shim.Success(cleartextValue) +} + +// RangeDecrypter shows how range queries may be satisfied by using the decrypter +// entity directly to decrypt previously encrypted key-value pairs +func (t *EncCC) RangeDecrypter(stub shim.ChaincodeStubInterface, decKey []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance and the key + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, nil) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + bytes, err := getStateByRangeAndDecrypt(stub, ent, "", "") + if err != nil { + return shim.Error(fmt.Sprintf("getStateByRangeAndDecrypt failed, err %+v", err)) + } + + return shim.Success(bytes) +} + +// Invoke for this chaincode exposes functions to ENCRYPT, DECRYPT transactional +// data. It also supports an example to ENCRYPT and SIGN and DECRYPT and +// VERIFY. The Initialization Vector (IV) can be passed in as a parm to +// ensure peers have deterministic data. +func (t *EncCC) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + // get arguments and transient + f, args := stub.GetFunctionAndParameters() + tMap, err := stub.GetTransient() + if err != nil { + return shim.Error(fmt.Sprintf("Could not retrieve transient, err %s", err)) + } + + switch f { + case "ENCRYPT": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient encryption key %s", ENCKEY)) + } + + return t.Encrypter(stub, args[0:], tMap[ENCKEY], tMap[IV]) + case "DECRYPT": + + // make sure there's a key in transient - the assumption is that + // it's associated to the string "DECKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient decryption key %s", DECKEY)) + } + + return t.Decrypter(stub, args[0:], tMap[DECKEY], tMap[IV]) + case "ENCRYPTSIGN": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "ENCKEY" and "SIGKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", ENCKEY)) + } else if _, in := tMap[SIGKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", SIGKEY)) + } + + return t.EncrypterSigner(stub, args[0:], tMap[ENCKEY], tMap[SIGKEY]) + case "DECRYPTVERIFY": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "DECKEY" and "VERKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } else if _, in := tMap[VERKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", VERKEY)) + } + + return t.DecrypterVerify(stub, args[0:], tMap[DECKEY], tMap[VERKEY]) + case "RANGEQUERY": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } + + return t.RangeDecrypter(stub, tMap[DECKEY]) + default: + return shim.Error(fmt.Sprintf("Unsupported function %s", f)) + } +} + +func main() { + factory.InitFactories(nil) + + err := shim.Start(&EncCC{factory.GetDefault()}) + if err != nil { + fmt.Printf("Error starting EncCC chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/enccc_test.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/enccc_test.go new file mode 100644 index 00000000..7daf2813 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/enccc_test.go @@ -0,0 +1,234 @@ +package main + +import ( + "bytes" + "encoding/json" + "testing" + + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/stretchr/testify/assert" +) + +const ( + AESKEY1 = "01234567890123456789012345678901" + AESKEY2 = "01234567890123456789012345678902" + ECDSAKEY1 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIH4Uv66F9kZMdOQxwNegkGm8c3AB3nGPOtxNKi6wb/ZooAoGCCqGSM49 +AwEHoUQDQgAEEPE+VLOh+e4NpwIjI/b/fKYHi4weU7r9OTEYPiAJiJBQY6TZnvF5 +oRMvwO4MCYxFtpIRO4UxIgcZBj4NCBxKqQ== +-----END EC PRIVATE KEY-----` + ECDSAKEY2 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIE8Seyc9TXx+yQfnGPuzjkuEfMbkq203IYdfyvMd0r3OoAoGCCqGSM49 +AwEHoUQDQgAE4dcGMMroH2LagI/s5i/Bx4t4ggGDoJPNVkKBDBlIaMYjJFYD1obk +JOWqAZxKKsBxBC5Ssu+fS26VPfdNWxDsFQ== +-----END EC PRIVATE KEY-----` + IV1 = "0123456789012345" +) + +func TestInit(t *testing.T) { + factory.InitFactories(nil) + + scc := new(EncCC) + stub := shim.NewMockStub("enccc", scc) + stub.MockTransactionStart("a") + res := scc.Init(stub) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) +} + +// unfortunately we can't tese this cc though invoke since the +// mock shim doesn't support transient. We test failure scenarios +// and the tests below focus on the functionality by invoking +// functions as opposed to cc +func TestInvoke(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + res := stub.MockInvoke("tx", [][]byte{[]byte("barf")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("ENC")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("SIG")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("RANGE")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestEnc(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key", "value"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key", "value"}, []byte("badkey"), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"badkey"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY2), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestSig(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad signing key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY2)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"badkey"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) +} + +func TestEncCC_RangeDecrypter(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key2", "value2"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key3", "value3"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // failed range query + res = scc.RangeDecrypter(stub, nil) + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success range query + stub.MockTransactionStart("a") + res = scc.RangeDecrypter(stub, []byte(AESKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + keys := []keyValuePair{} + err := json.Unmarshal(res.Payload, &keys) + assert.NoError(t, err) + assert.Equal(t, keys[0].Key, "key1") + assert.Equal(t, string(keys[0].Value), "value1") + assert.Equal(t, keys[1].Key, "key2") + assert.Equal(t, string(keys[1].Value), "value2") + assert.Equal(t, keys[2].Key, "key3") + assert.Equal(t, string(keys[2].Value), "value3") + + _, err = getStateByRangeAndDecrypt(stub, nil, string([]byte{0}), string([]byte{0})) + assert.Error(t, err) +} + +func TestDeterministicEncryption(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c1, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c2, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + assert.True(t, bytes.Equal(c1, c2)) +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/utils.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/utils.go new file mode 100644 index 00000000..9af6e6fa --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/enccc_example/utils.go @@ -0,0 +1,147 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + "github.com/pkg/errors" +) + +// the functions below show some best practices on how +// to use entities to perform cryptographic operations +// over the ledger state + +// getStateAndDecrypt retrieves the value associated to key, +// decrypts it with the supplied entity and returns the result +// of the decryption +func getStateAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string) ([]byte, error) { + // at first we retrieve the ciphertext from the ledger + ciphertext, err := stub.GetState(key) + if err != nil { + return nil, err + } + + // GetState will return a nil slice if the key does not exist. + // Note that the chaincode logic may want to distinguish between + // nil slice (key doesn't exist in state db) and empty slice + // (key found in state db but value is empty). We do not + // distinguish the case here + if len(ciphertext) == 0 { + return nil, errors.New("no ciphertext to decrypt") + } + + return ent.Decrypt(ciphertext) +} + +// encryptAndPutState encrypts the supplied value using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func encryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string, value []byte) error { + // at first we use the supplied entity to encrypt the value + ciphertext, err := ent.Encrypt(value) + if err != nil { + return err + } + + return stub.PutState(key, ciphertext) +} + +// getStateDecryptAndVerify retrieves the value associated to key, +// decrypts it with the supplied entity, verifies the signature +// over it and returns the result of the decryption in case of +// success +func getStateDecryptAndVerify(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string) ([]byte, error) { + // here we retrieve and decrypt the state associated to key + val, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return nil, err + } + + // we unmarshal a SignedMessage from the decrypted state + msg := &entities.SignedMessage{} + err = msg.FromBytes(val) + if err != nil { + return nil, err + } + + // we verify the signature + ok, err := msg.Verify(ent) + if err != nil { + return nil, err + } else if !ok { + return nil, errors.New("invalid signature") + } + + return msg.Payload, nil +} + +// signEncryptAndPutState signs the supplied value, encrypts +// the supplied value together with its signature using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func signEncryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string, value []byte) error { + // here we create a SignedMessage, set its payload + // to value and the ID of the entity and + // sign it with the entity + msg := &entities.SignedMessage{Payload: value, ID: []byte(ent.ID())} + err := msg.Sign(ent) + if err != nil { + return err + } + + // here we serialize the SignedMessage + b, err := msg.ToBytes() + if err != nil { + return err + } + + // here we encrypt the serialized version associated to args[0] + return encryptAndPutState(stub, ent, key, b) +} + +type keyValuePair struct { + Key string `json:"key"` + Value string `json:"value"` +} + +// getStateByRangeAndDecrypt retrieves a range of KVS pairs from the +// ledger and decrypts each value with the supplied entity; it returns +// a json-marshalled slice of keyValuePair +func getStateByRangeAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, startKey, endKey string) ([]byte, error) { + // we call get state by range to go through the entire range + iterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return nil, err + } + defer iterator.Close() + + // we decrypt each entry - the assumption is that they have all been encrypted with the same key + keyvalueset := []keyValuePair{} + for iterator.HasNext() { + el, err := iterator.Next() + if err != nil { + return nil, err + } + + v, err := ent.Decrypt(el.Value) + if err != nil { + return nil, err + } + + keyvalueset = append(keyvalueset, keyValuePair{el.Key, string(v)}) + } + + bytes, err := json.Marshal(keyvalueset) + if err != nil { + return nil, err + } + + return bytes, nil +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/eventsender/eventsender.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/eventsender/eventsender.go new file mode 100644 index 00000000..45606252 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/eventsender/eventsender.go @@ -0,0 +1,92 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// EventSender example simple Chaincode implementation +type EventSender struct { +} + +// Init function +func (t *EventSender) Init(stub shim.ChaincodeStubInterface) pb.Response { + err := stub.PutState("noevents", []byte("0")) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke function +func (t *EventSender) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + noevts, _ := strconv.Atoi(string(b)) + + tosend := "Event " + string(b) + for _, s := range args { + tosend = tosend + "," + s + } + + err = stub.PutState("noevents", []byte(strconv.Itoa(noevts+1))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.SetEvent("evtsender", []byte(tosend)) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(nil) +} + +// Query function +func (t *EventSender) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + jsonResp := "{\"NoEvents\":\"" + string(b) + "\"}" + return shim.Success([]byte(jsonResp)) +} + +func (t *EventSender) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(EventSender)) + if err != nil { + fmt.Printf("Error starting EventSender chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go new file mode 100644 index 00000000..78d4ec61 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go @@ -0,0 +1,133 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init method of chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte("OK")) +} + +// Invoke transaction makes payment of X units from A to B +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte(fmt.Sprintf("{%d,%d}", Aval, Bval))) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go new file mode 100644 index 00000000..1d9d1e1f --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go @@ -0,0 +1,97 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } + if retval != nil { + if res.Payload == nil { + fmt.Printf("Init returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Init returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } + + if retval != nil { + if res.Payload == nil { + fmt.Printf("Invoke returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Invoke returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func Test_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}, []byte("OK")) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func Test_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}, []byte("OK")) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}, []byte("{444,801}")) + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}, []byte("{567,678}")) +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/map/map.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/map/map.go new file mode 100644 index 00000000..b45b8471 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/map/map.go @@ -0,0 +1,200 @@ +// +build !experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/map/map_experimental.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/map/map_experimental.go new file mode 100644 index 00000000..16c9780f --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/map/map_experimental.go @@ -0,0 +1,311 @@ +// +build experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "putPrivate": + if len(args) < 3 { + return shim.Error("put operation on private data must include three arguments: [collection, key, value]") + } + collection := args[0] + key := args[1] + value := args[2] + + if err := stub.PutPrivateData(collection, key, []byte(value)); err != nil { + fmt.Printf("Error putting private data%s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + return shim.Success(nil) + + case "removePrivate": + if len(args) < 2 { + return shim.Error("remove operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + + err := stub.DelPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation on private data failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "getPrivate": + if len(args) < 2 { + return shim.Error("get operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + value, err := stub.GetPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation on private data failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keysPrivate": + if len(args) < 3 { + return shim.Error("range query operation on private data must include three arguments, a collection, key and value") + } + collection := args[0] + startKey := args[1] + endKey := args[2] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 3 { + stime, _ = strconv.Atoi(args[3]) + } + + keysIter, err := stub.GetPrivateDataByRange(collection, startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed on private data. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "queryPrivate": + collection := args[0] + query := args[1] + keysIter, err := stub.GetPrivateDataQueryResult(collection, query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02/marbles_chaincode.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02/marbles_chaincode.go new file mode 100644 index 00000000..4ea4654a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02/marbles_chaincode.go @@ -0,0 +1,627 @@ +/* +Licensed to the Apache Software Foundation (ASF) under one +or more contributor license agreements. See the NOTICE file +distributed with this work for additional information +regarding copyright ownership. The ASF licenses this file +to you under the Apache License, Version 2.0 (the +"License"); you may not use this file except in compliance +with the License. You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, +software distributed under the License is distributed on an +"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +KIND, either express or implied. See the License for the +specific language governing permissions and limitations +under the License. +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble1","blue","35","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble2","red","50","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble3","blue","70","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarblesBasedOnColor","blue","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C myc1 -n marbles -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getMarblesByRange","marble1","marble3"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getHistoryForMarble","marble1"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +//The following examples demonstrate creating indexes on CouchDB +//Example hostname:port configurations +// +//Docker or vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for chaincodeid, docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":["chaincodeid","data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[\"chaincodeid\",\"data.docType\",\"data.owner\"]},\"name\":\"indexOwner\",\"ddoc\":\"indexOwnerDoc\",\"type\":\"json\"}" http://hostname:port/myc1/_index +// + +// Index for chaincodeid, docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"chaincodeid":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[{\"data.size\":\"desc\"},{\"chaincodeid\":\"desc\"},{\"data.docType\":\"desc\"},{\"data.owner\":\"desc\"}]},\"ddoc\":\"indexSizeSortDoc\", \"name\":\"indexSizeSortDesc\",\"type\":\"json\"}" http://hostname:port/myc1/_index + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + if function == "initMarble" { //create a new marble + return t.initMarble(stub, args) + } else if function == "transferMarble" { //change owner of a specific marble + return t.transferMarble(stub, args) + } else if function == "transferMarblesBasedOnColor" { //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + } else if function == "delete" { //delete a marble + return t.delete(stub, args) + } else if function == "readMarble" { //read a marble + return t.readMarble(stub, args) + } else if function == "queryMarblesByOwner" { //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + } else if function == "queryMarbles" { //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + } else if function == "getHistoryForMarble" { //get history of values for a marble + return t.getHistoryForMarble(stub, args) + } else if function == "getMarblesByRange" { //get marbles based on range query + return t.getMarblesByRange(stub, args) + } + + fmt.Println("invoke did not find func: " + function) //error + return shim.Error("Received unknown function invocation") +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0 1 2 3 + // "asdf", "blue", "35", "bob" + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) <= 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) <= 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) <= 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) <= 0 { + return shim.Error("4th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutState(marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutState(colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetState(name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetState(marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelState(marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelState(colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutState(marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetStateByPartialCompositeKey("color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetQueryResult(queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} + +func (t *SimpleChaincode) getHistoryForMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + marbleName := args[0] + + fmt.Printf("- start getHistoryForMarble: %s\n", marbleName) + + resultsIterator, err := stub.GetHistoryForKey(marbleName) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing historic values for the marble + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + response, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"TxId\":") + buffer.WriteString("\"") + buffer.WriteString(response.TxId) + buffer.WriteString("\"") + + buffer.WriteString(", \"Value\":") + // if it was a delete operation on given key, then we need to set the + //corresponding value null. Else, we will write the response.Value + //as-is (as the Value itself a JSON marble) + if response.IsDelete { + buffer.WriteString("null") + } else { + buffer.WriteString(string(response.Value)) + } + + buffer.WriteString(", \"Timestamp\":") + buffer.WriteString("\"") + buffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String()) + buffer.WriteString("\"") + + buffer.WriteString(", \"IsDelete\":") + buffer.WriteString("\"") + buffer.WriteString(strconv.FormatBool(response.IsDelete)) + buffer.WriteString("\"") + + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getHistoryForMarble returning:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/collections_config.json b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/collections_config.json new file mode 100644 index 00000000..e26017bd --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/collections_config.json @@ -0,0 +1,18 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999, + "memberOnlyRead": true +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":3, + "memberOnlyRead": true + } +] diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/collections_config_new.json b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/collections_config_new.json new file mode 100644 index 00000000..33ddd71a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/collections_config_new.json @@ -0,0 +1,16 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 + } +] diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json new file mode 100644 index 00000000..305f0904 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json @@ -0,0 +1 @@ +{"index":{"fields":["docType","owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go new file mode 100644 index 00000000..385687c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go @@ -0,0 +1,634 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble1","blue","35","tom","99"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble2","red","50","tom","102"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble3","blue","70","tom","103"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarblePrivateDetails","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["getMarblesByRange","marble1","marble3"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +// INDEXES TO SUPPORT COUCHDB RICH QUERIES +// +// Indexes in CouchDB are required in order to make JSON queries efficient and are required for +// any JSON query with a sort. As of Hyperledger Fabric 1.1, indexes may be packaged alongside +// chaincode in a META-INF/statedb/couchdb/indexes directory. Or for indexes on private data +// collections, in a META-INF/statedb/couchdb/collections//indexes directory. +// Each index must be defined in its own text file with extension *.json with the index +// definition formatted in JSON following the CouchDB index JSON syntax as documented at: +// http://docs.couchdb.org/en/2.1.1/api/database/find.html#db-index +// +// This marbles02_private example chaincode demonstrates a packaged index which you +// can find in META-INF/statedb/couchdb/collection/collectionMarbles/indexes/indexOwner.json. +// For deployment of chaincode to production environments, it is recommended +// to define any indexes alongside chaincode so that the chaincode and supporting indexes +// are deployed automatically as a unit, once the chaincode has been installed on a peer and +// instantiated on a channel. See Hyperledger Fabric documentation for more details. +// +// If you have access to the your peer's CouchDB state database in a development environment, +// you may want to iteratively test various indexes in support of your chaincode queries. You +// can use the CouchDB Fauxton interface or a command line curl utility to create and update +// indexes. Then once you finalize an index, include the index definition alongside your +// chaincode in the META-INF/statedb/couchdb/indexes directory or +// META-INF/statedb/couchdb/collections//indexes directory, for packaging +// and deployment to managed environments. +// +// In the examples below you can find index definitions that support marbles02_private +// chaincode queries, along with the syntax that you can use in development environments +// to create the indexes in the CouchDB Fauxton interface. +// + +//Example hostname:port configurations to access CouchDB. +// +//To access CouchDB docker container from within another docker container or from vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":["data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} + +// Index for docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +type marblePrivateDetails struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Price int `json:"price"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + switch function { + case "initMarble": + //create a new marble + return t.initMarble(stub, args) + case "readMarble": + //read a marble + return t.readMarble(stub, args) + case "readMarblePrivateDetails": + //read a marble private details + return t.readMarblePrivateDetails(stub, args) + case "transferMarble": + //change owner of a specific marble + return t.transferMarble(stub, args) + case "transferMarblesBasedOnColor": + //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + case "delete": + //delete a marble + return t.delete(stub, args) + case "queryMarblesByOwner": + //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + case "queryMarbles": + //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + case "getMarblesByRange": + //get marbles based on range query + return t.getMarblesByRange(stub, args) + default: + //error + fmt.Println("invoke did not find func: " + function) + return shim.Error("Received unknown function invocation") + } +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0-name 1-color 2-size 3-owner 4-price + // "asdf", "blue", "35", "bob", "99" + if len(args) != 5 { + return shim.Error("Incorrect number of arguments. Expecting 5") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) == 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) == 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) == 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) == 0 { + return shim.Error("4th argument must be a non-empty string") + } + if len(args[4]) == 0 { + return shim.Error("5th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + price, err := strconv.Atoi(args[4]) + if err != nil { + return shim.Error("5th argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Save marble private details ==== + objectType = "marblePrivateDetails" + marblePrivateDetails := &marblePrivateDetails{objectType, marbleName, price} + marblePrivateDetailsBytes, err := json.Marshal(marblePrivateDetails) + if err != nil { + return shim.Error(err.Error()) + } + err = stub.PutPrivateData("collectionMarblePrivateDetails", marbleName, marblePrivateDetailsBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutPrivateData("collectionMarbles", colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarbles", name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// =============================================== +// readMarblereadMarblePrivateDetails - read a marble private details from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarblePrivateDetails(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarblePrivateDetails", name) //get the marble private details from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get private details for " + name + ": " + err.Error() + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble private details does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetPrivateData("collectionMarbles", marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelPrivateData("collectionMarbles", marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelPrivateData("collectionMarbles", colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // Delete private details of marble + err = stub.DelPrivateData("collectionMarblePrivateDetails", marbleName) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetPrivateDataByRange("collectionMarbles", startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetPrivateDataByPartialCompositeKey("collectionMarbles", "color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetPrivateDataQueryResult("collectionMarbles", queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/passthru/passthru.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/passthru/passthru.go new file mode 100644 index 00000000..49d978bf --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/passthru/passthru.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// PassthruChaincode passes thru invoke and query to another chaincode where +// called ChaincodeID = function +// called chaincode's function = args[0] +// called chaincode's args = args[1:] +type PassthruChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +//Init func will return error if function has string "error" anywhere +func (p *PassthruChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + function, _ := stub.GetFunctionAndParameters() + if strings.Index(function, "error") >= 0 { + return shim.Error(function) + } + return shim.Success([]byte(function)) +} + +//helper +func (p *PassthruChaincode) iq(stub shim.ChaincodeStubInterface, function string, args []string) pb.Response { + if function == "" { + return shim.Error("Chaincode ID not provided") + } + chaincodeID := function + + return stub.InvokeChaincode(chaincodeID, toChaincodeArgs(args...), "") +} + +// Invoke passes through the invoke call +func (p *PassthruChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + return p.iq(stub, function, args) +} + +func main() { + err := shim.Start(new(PassthruChaincode)) + if err != nil { + fmt.Printf("Error starting Passthru chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/sleeper/sleeper.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/sleeper/sleeper.go new file mode 100644 index 00000000..088b598c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/sleeper/sleeper.go @@ -0,0 +1,124 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +// Sleeper chaincode sleeps and works with one state variable +// Init - 1 param, a sleep time in millisecs +// Invoke - 4 or 3 params, "put" or "get", value to set and sleep time in millisecs +// +// Sleeper can be used to test the "chaincode.executetimeout" property + +import ( + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SleeperChaincode example simple Chaincode implementation +type SleeperChaincode struct { +} + +func (t *SleeperChaincode) sleep(sleepTime string) { + st, _ := strconv.Atoi(sleepTime) + if st >= 0 { + time.Sleep(time.Duration(st) * time.Millisecond) + } +} + +// Init initializes chaincode...all it does is sleep a bi +func (t *SleeperChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + args := stub.GetStringArgs() + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + sleepTime := args[0] + + t.sleep(sleepTime) + + return shim.Success(nil) +} + +// Invoke sets key/value and sleeps a bit +func (t *SleeperChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "put" { + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "get" { + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"put\" or \"get\"") +} + +// Transaction makes payment of X units from A to B +func (t *SleeperChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // set state + key := args[0] + val := args[1] + + err := stub.PutState(key, []byte(val)) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[2] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success([]byte("OK")) +} + +// query callback representing the query of a chaincode +func (t *SleeperChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + key := args[0] + + // Get the state from the ledger + val, err := stub.GetState(key) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[1] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success(val) +} + +func main() { + err := shim.Start(new(SleeperChaincode)) + if err != nil { + fmt.Printf("Error starting Sleeper chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/Dockerfile b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/Dockerfile new file mode 100644 index 00000000..e3aa5d5f --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/Dockerfile @@ -0,0 +1,40 @@ +# FIXME: someone from the UTXO team will need to verify or rework this +# Copyright London Stock Exchange Group All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# +FROM ubuntu:latest + +RUN apt-get update && apt-get install pkg-config autoconf libtool -y +RUN cd /tmp && git clone https://github.com/bitcoin/secp256k1.git && cd secp256k1/ +WORKDIR /tmp/secp256k1 +RUN ./autogen.sh +RUN ./configure --enable-module-recovery +RUN make +RUN ./tests +RUN make install + +WORKDIR /tmp +RUN apt-get install libtool libboost1.55-all-dev -y +RUN git clone https://github.com/libbitcoin/libbitcoin-consensus.git +WORKDIR /tmp/libbitcoin-consensus +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now SWIG +WORKDIR /tmp +# Need pcre lib for building +RUN apt-get install libpcre3-dev -y +RUN wget http://prdownloads.sourceforge.net/swig/swig-3.0.8.tar.gz && tar xvf swig-3.0.8.tar.gz +WORKDIR /tmp/swig-3.0.8 +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now add this for SWIG execution requirement to get missing stubs-32.h header file +RUN apt-get install g++-multilib -y + +ENV CGO_LDFLAGS="-L/usr/local/lib/ -lbitcoin-consensus -lstdc++" diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/README.md b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/README.md new file mode 100644 index 00000000..6b7f42c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/README.md @@ -0,0 +1,79 @@ +### UTXO Chaincode + +The UTXO example chaincode contains a single invocation function named `execute`. This function accepts BASE64 encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction components to the Bitcoin libconsensus C library for script verification. + +The purpose of this chaincode is to + +1. Demonstrate how the world state can be used to store and process unspent transaction outputs (UTXO). + +2. Demonstrate how to include and use a C library from within a chaincode. + +A client for exercising this chaincode is avilable at https://github.com/srderson/hyperledger-fabric-utxo-client-java. + + +The following are instructions for building and deploying the UTXO chaincode in Hypereledger Fabric. All commands should be run with vagrant. + +First, build the Docker image for the UTXO chaincode. + +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +docker build -t utxo:0.1.0 . +``` + +Next, modify the `core.yaml` file in the Hyperledger Fabric project to point to the local Docker image that was built in the previous step. In the core.yaml file find `chaincode.golang.Dockerfile` and change it from from `hyperledger/fabric-baseimage` to `utxo:0.1.0` + +Start the peer using the following commands +``` +peer node start +``` + +In a second window, deploy the example UTXO chaincode +``` +CORE_PEER_ADDRESS=localhost:7051 peer chaincode deploy -p github.com/hyperledger/fabric/examples/chaincode/go/utxo -c '{"Function":"init", "Args": []}' +``` +Wait about 30 seconds for the chaincode to be deployed. Output from the window where the peer is running will indicate that this is successful. + +Next, find the `image ID` for the deployed chaincode. Run +``` +docker images +``` +and look for the image ID of the most recently deployed chaincode. The image ID will likely be similar to +``` + dev-jdoe-cbe6be7ed67931b9be2ce31dd833e523702378bef91b29917005f0eaa316b57e268e19696093d48b91076f1134cbf4b06afd78e6afd947133f43cb51bf40b0a4 + ``` + Make a note of this as we'll be using it later. + +Stop the running peer. + +Build a peer docker image by running the following test. This will allow for easy testing of the chaincode by giving us the ability to reset the database to a clean state. +``` +go test github.com/hyperledger/fabric/core/container -run=BuildImage_Peer +``` + +Using the Docker image that we just built, start a peer within a container in `chaincodedev` mode. +``` +docker run -it -p 7051:7051 -p 7053:7053 hyperledger/fabric-peer peer node start --peer-chaincodedev +``` + + +In another window, start UTXO chaincode in a container. The refers to the UTXO image ID noted in a prior step. +``` +docker run -it /bin/bash +``` + +Build the UTXO chaincode. +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +go build +CORE_PEER_ADDRESS=172.17.0.2:7051 CORE_CHAINCODE_ID_NAME=utxo ./utxo +``` + +In another window, deploy the chaincode +``` +peer chaincode deploy -n utxo -c '{"Function":"init", "Args": []}' +``` + +The chaincode is now deployed and ready to accept transactions. + +Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License. +s diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/chaincode.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/chaincode.go new file mode 100644 index 00000000..ca1a2878 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/chaincode.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "encoding/base64" + "errors" + "fmt" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// The UTXO example chaincode contains a single invocation function named execute. This function accepts BASE64 +// encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction +// components to the Bitcoin libconsensus C library for script verification. A table of UTXOs is maintained to ensure +// each transaction is valid. +// Documentation can be found at +// https://github.com/hyperledger/fabric/blob/master/examples/chaincode/go/utxo/README.md + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init does nothing in the UTXO chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return nil, nil +} + +// Invoke callback representing the invocation of a chaincode +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "execute": + + if len(args) < 1 { + return nil, errors.New("execute operation must include single argument, the base64 encoded form of a bitcoin transaction") + } + txDataBase64 := args[0] + txData, err := base64.StdEncoding.DecodeString(txDataBase64) + if err != nil { + return nil, fmt.Errorf("Error decoding TX as base64: %s", err) + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + execResult, err := utxo.Execute(txData) + if err != nil { + return nil, fmt.Errorf("Error executing TX: %s", err) + } + + fmt.Printf("\nExecResult: Coinbase: %t, SumInputs %d, SumOutputs %d\n\n", execResult.IsCoinbase, execResult.SumPriorOutputs, execResult.SumCurrentOutputs) + + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + return nil, fmt.Errorf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + return nil, nil + + case "getTran": + + if len(args) < 1 { + return nil, errors.New("queryBTC operation must include single argument, the TX hash hex") + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + tx, err := utxo.Query(args[0]) + if err != nil { + return nil, fmt.Errorf("Error querying for transaction: %s", err) + } + if tx == nil { + var data []byte + return data, nil + } + return tx, nil + + default: + return nil, errors.New("Unsupported operation") + } + +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/consensus/consensus.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/consensus/consensus.go new file mode 100644 index 00000000..74b5b20c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/consensus/consensus.go @@ -0,0 +1,482 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +package consensus + +/* +#define intgo swig_intgo +typedef void *swig_voidp; + +#include + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + +typedef long long swig_type_1; +typedef long long swig_type_2; +extern void _wrap_Swig_free_consensus_0731991c73947514(uintptr_t arg1); +extern swig_intgo _wrap_verify_result_eval_false_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_eval_true_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_script_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_push_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_stack_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_verify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_equalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_der_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_return_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_none_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_dersig_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_low_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_script_consensus_0731991c73947514(swig_voidp arg1, swig_type_1 arg2, swig_voidp arg3, swig_type_2 arg4, swig_intgo arg5, swig_intgo arg6); +#undef intgo +*/ +import "C" + +import "unsafe" +import _ "runtime/cgo" +import "sync" + +type _ unsafe.Pointer + +var Swig_escape_always_false bool +var Swig_escape_val interface{} + +type _swig_fnptr *byte +type _swig_memberptr *byte + +type _ sync.Mutex + +func Swig_free(arg1 uintptr) { + _swig_i_0 := arg1 + C._wrap_Swig_free_consensus_0731991c73947514(C.uintptr_t(_swig_i_0)) +} + +const LIBBITCOIN_CONSENSUS_VERSION string = "2.0.0" +const LIBBITCOIN_CONSENSUS_MAJOR_VERSION int = 2 +const LIBBITCOIN_CONSENSUS_MINOR_VERSION int = 0 +const LIBBITCOIN_CONSENSUS_PATCH_VERSION int = 0 + +type LibbitcoinConsensusVerify_result_type int + +func _swig_getverify_result_eval_false() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_false_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_false LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_false() + +func _swig_getverify_result_eval_true() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_true_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_true LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_true() + +func _swig_getverify_result_script_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_script_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_script_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_script_size() + +func _swig_getverify_result_push_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_push_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_push_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_push_size() + +func _swig_getverify_result_op_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_count() + +func _swig_getverify_result_stack_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_stack_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_stack_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_stack_size() + +func _swig_getverify_result_sig_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_count() + +func _swig_getverify_result_pubkey_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkey_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkey_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkey_count() + +func _swig_getverify_result_verify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_verify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_verify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_verify() + +func _swig_getverify_result_equalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_equalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_equalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_equalverify() + +func _swig_getverify_result_checkmultisigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checkmultisigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checkmultisigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checkmultisigverify() + +func _swig_getverify_result_checksigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checksigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checksigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checksigverify() + +func _swig_getverify_result_numequalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_numequalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_numequalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_numequalverify() + +func _swig_getverify_result_bad_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_bad_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_bad_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_bad_opcode() + +func _swig_getverify_result_disabled_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_disabled_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_disabled_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_disabled_opcode() + +func _swig_getverify_result_invalid_stack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_stack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_stack_operation() + +func _swig_getverify_result_invalid_altstack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_altstack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_altstack_operation() + +func _swig_getverify_result_unbalanced_conditional() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unbalanced_conditional LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unbalanced_conditional() + +func _swig_getverify_result_sig_hashtype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_hashtype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_hashtype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_hashtype() + +func _swig_getverify_result_sig_der() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_der_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_der LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_der() + +func _swig_getverify_result_minimaldata() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_minimaldata LibbitcoinConsensusVerify_result_type = _swig_getverify_result_minimaldata() + +func _swig_getverify_result_sig_pushonly() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_pushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_pushonly LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_pushonly() + +func _swig_getverify_result_sig_high_s() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_high_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_high_s LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_high_s() + +func _swig_getverify_result_sig_nulldummy() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_nulldummy LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_nulldummy() + +func _swig_getverify_result_pubkeytype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkeytype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkeytype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkeytype() + +func _swig_getverify_result_cleanstack() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_cleanstack LibbitcoinConsensusVerify_result_type = _swig_getverify_result_cleanstack() + +func _swig_getverify_result_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_discourage_upgradable_nops LibbitcoinConsensusVerify_result_type = _swig_getverify_result_discourage_upgradable_nops() + +func _swig_getverify_result_op_return() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_return_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_return LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_return() + +func _swig_getverify_result_unknown_error() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unknown_error_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unknown_error LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unknown_error() + +func _swig_getverify_result_tx_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_invalid() + +func _swig_getverify_result_tx_size_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_size_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_size_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_size_invalid() + +func _swig_getverify_result_tx_input_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_input_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_input_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_input_invalid() + +func _swig_getverify_result_negative_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_negative_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_negative_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_negative_locktime() + +func _swig_getverify_result_unsatisfied_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unsatisfied_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unsatisfied_locktime() + +type LibbitcoinConsensusVerify_flags_type int + +func _swig_getverify_flags_none() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_none_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_none LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_none() + +func _swig_getverify_flags_p2sh() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_p2sh_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_p2sh LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_p2sh() + +func _swig_getverify_flags_strictenc() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_strictenc_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_strictenc LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_strictenc() + +func _swig_getverify_flags_dersig() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_dersig_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_dersig LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_dersig() + +func _swig_getverify_flags_low_s() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_low_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_low_s LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_low_s() + +func _swig_getverify_flags_nulldummy() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_nulldummy LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_nulldummy() + +func _swig_getverify_flags_sigpushonly() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_sigpushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_sigpushonly LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_sigpushonly() + +func _swig_getverify_flags_minimaldata() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_minimaldata LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_minimaldata() + +func _swig_getverify_flags_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_discourage_upgradable_nops LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_discourage_upgradable_nops() + +func _swig_getverify_flags_cleanstack() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_cleanstack LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_cleanstack() + +func _swig_getverify_flags_checklocktimeverify() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_checklocktimeverify LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_checklocktimeverify() + +func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + _swig_i_0 := arg1 + _swig_i_1 := arg2 + _swig_i_2 := arg3 + _swig_i_3 := arg4 + _swig_i_4 := arg5 + _swig_i_5 := arg6 + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_script_consensus_0731991c73947514(C.swig_voidp(_swig_i_0), C.swig_type_1(_swig_i_1), C.swig_voidp(_swig_i_2), C.swig_type_2(_swig_i_3), C.swig_intgo(_swig_i_4), C.swig_intgo(_swig_i_5))) + return swig_r +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx new file mode 100644 index 00000000..a2259cd0 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx @@ -0,0 +1,812 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +#define SWIGMODULE consensus + +#ifdef __cplusplus +/* SwigValueWrapper is described in swig.swg */ +template class SwigValueWrapper { + struct SwigMovePointer { + T *ptr; + SwigMovePointer(T *p) : ptr(p) { } + ~SwigMovePointer() { delete ptr; } + SwigMovePointer& operator=(SwigMovePointer& rhs) { T* oldptr = ptr; ptr = 0; delete oldptr; ptr = rhs.ptr; rhs.ptr = 0; return *this; } + } pointer; + SwigValueWrapper& operator=(const SwigValueWrapper& rhs); + SwigValueWrapper(const SwigValueWrapper& rhs); +public: + SwigValueWrapper() : pointer(0) { } + SwigValueWrapper& operator=(const T& t) { SwigMovePointer tmp(new T(t)); pointer = tmp; return *this; } + operator T&() const { return *pointer.ptr; } + T *operator&() { return pointer.ptr; } +}; + +template T SwigValueInit() { + return T(); +} +#endif + +/* ----------------------------------------------------------------------------- + * This section contains generic SWIG labels for method/variable + * declarations/attributes, and other compiler dependent labels. + * ----------------------------------------------------------------------------- */ + +/* template workaround for compilers that cannot correctly implement the C++ standard */ +#ifndef SWIGTEMPLATEDISAMBIGUATOR +# if defined(__SUNPRO_CC) && (__SUNPRO_CC <= 0x560) +# define SWIGTEMPLATEDISAMBIGUATOR template +# elif defined(__HP_aCC) +/* Needed even with `aCC -AA' when `aCC -V' reports HP ANSI C++ B3910B A.03.55 */ +/* If we find a maximum version that requires this, the test would be __HP_aCC <= 35500 for A.03.55 */ +# define SWIGTEMPLATEDISAMBIGUATOR template +# else +# define SWIGTEMPLATEDISAMBIGUATOR +# endif +#endif + +/* inline attribute */ +#ifndef SWIGINLINE +# if defined(__cplusplus) || (defined(__GNUC__) && !defined(__STRICT_ANSI__)) +# define SWIGINLINE inline +# else +# define SWIGINLINE +# endif +#endif + +/* attribute recognised by some compilers to avoid 'unused' warnings */ +#ifndef SWIGUNUSED +# if defined(__GNUC__) +# if !(defined(__cplusplus)) || (__GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4)) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +# elif defined(__ICC) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +#endif + +#ifndef SWIG_MSC_UNSUPPRESS_4505 +# if defined(_MSC_VER) +# pragma warning(disable : 4505) /* unreferenced local function has been removed */ +# endif +#endif + +#ifndef SWIGUNUSEDPARM +# ifdef __cplusplus +# define SWIGUNUSEDPARM(p) +# else +# define SWIGUNUSEDPARM(p) p SWIGUNUSED +# endif +#endif + +/* internal SWIG method */ +#ifndef SWIGINTERN +# define SWIGINTERN static SWIGUNUSED +#endif + +/* internal inline SWIG method */ +#ifndef SWIGINTERNINLINE +# define SWIGINTERNINLINE SWIGINTERN SWIGINLINE +#endif + +/* exporting methods */ +#if (__GNUC__ >= 4) || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4) +# ifndef GCC_HASCLASSVISIBILITY +# define GCC_HASCLASSVISIBILITY +# endif +#endif + +#ifndef SWIGEXPORT +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# if defined(STATIC_LINKED) +# define SWIGEXPORT +# else +# define SWIGEXPORT __declspec(dllexport) +# endif +# else +# if defined(__GNUC__) && defined(GCC_HASCLASSVISIBILITY) +# define SWIGEXPORT __attribute__ ((visibility("default"))) +# else +# define SWIGEXPORT +# endif +# endif +#endif + +/* calling conventions for Windows */ +#ifndef SWIGSTDCALL +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# define SWIGSTDCALL __stdcall +# else +# define SWIGSTDCALL +# endif +#endif + +/* Deal with Microsoft's attempt at deprecating C standard runtime functions */ +#if !defined(SWIG_NO_CRT_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) +# define _CRT_SECURE_NO_DEPRECATE +#endif + +/* Deal with Microsoft's attempt at deprecating methods in the standard C++ library */ +#if !defined(SWIG_NO_SCL_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_SCL_SECURE_NO_DEPRECATE) +# define _SCL_SECURE_NO_DEPRECATE +#endif + +/* Deal with Apple's deprecated 'AssertMacros.h' from Carbon-framework */ +#if defined(__APPLE__) && !defined(__ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES) +# define __ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES 0 +#endif + +/* Intel's compiler complains if a variable which was never initialised is + * cast to void, which is a common idiom which we use to indicate that we + * are aware a variable isn't used. So we just silence that warning. + * See: https://github.com/swig/swig/issues/192 for more discussion. + */ +#ifdef __INTEL_COMPILER +# pragma warning disable 592 +#endif + + +#include +#include +#include +#include +#include + + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + + + +#define swiggo_size_assert_eq(x, y, name) typedef char name[(x-y)*(x-y)*-2+1]; +#define swiggo_size_assert(t, n) swiggo_size_assert_eq(sizeof(t), n, swiggo_sizeof_##t##_is_not_##n) + +swiggo_size_assert(char, 1) +swiggo_size_assert(short, 2) +swiggo_size_assert(int, 4) +typedef long long swiggo_long_long; +swiggo_size_assert(swiggo_long_long, 8) +swiggo_size_assert(float, 4) +swiggo_size_assert(double, 8) + +#ifdef __cplusplus +extern "C" { +#endif +extern void crosscall2(void (*fn)(void *, int), void *, int); +extern char* _cgo_topofstack(void) __attribute__ ((weak)); +extern void _cgo_allocate(void *, int); +extern void _cgo_panic(void *, int); +#ifdef __cplusplus +} +#endif + +static char *_swig_topofstack() { + if (_cgo_topofstack) { + return _cgo_topofstack(); + } else { + return 0; + } +} + +static void _swig_gopanic(const char *p) { + struct { + const char *p; + } a; + a.p = p; + crosscall2(_cgo_panic, &a, (int) sizeof a); +} + + + + +#define SWIG_contract_assert(expr, msg) \ + if (!(expr)) { _swig_gopanic(msg); } else + + +static void Swig_free(void* p) { + free(p); +} + + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +void _wrap_Swig_free_consensus_0731991c73947514(void *_swig_go_0) { + void *arg1 = (void *) 0 ; + + arg1 = *(void **)&_swig_go_0; + + Swig_free(arg1); + +} + + +intgo _wrap_verify_result_eval_false_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_false; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_eval_true_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_true; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_script_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_script_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_push_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_push_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_stack_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_stack_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkey_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_verify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_verify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_equalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_equalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checkmultisigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checksigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_numequalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_bad_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_disabled_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_stack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_altstack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unbalanced_conditional; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_hashtype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_der_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_der; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_pushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_high_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkeytype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_return_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_return; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unknown_error; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_size_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_input_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_negative_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unsatisfied_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_none_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_none; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_p2sh; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_strictenc; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_dersig_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_dersig; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_low_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_low_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_sigpushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_checklocktimeverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_script_consensus_0731991c73947514(char *_swig_go_0, long long _swig_go_1, char *_swig_go_2, long long _swig_go_3, intgo _swig_go_4, intgo _swig_go_5) { + unsigned char *arg1 = (unsigned char *) 0 ; + size_t arg2 ; + unsigned char *arg3 = (unsigned char *) 0 ; + size_t arg4 ; + unsigned int arg5 ; + unsigned int arg6 ; + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + arg1 = *(unsigned char **)&_swig_go_0; + arg2 = (size_t)_swig_go_1; + arg3 = *(unsigned char **)&_swig_go_2; + arg4 = (size_t)_swig_go_3; + arg5 = (unsigned int)_swig_go_4; + arg6 = (unsigned int)_swig_go_5; + + result = (libbitcoin::consensus::verify_result_type)libbitcoin::consensus::verify_script((unsigned char const *)arg1,arg2,(unsigned char const *)arg3,arg4,arg5,arg6); + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +#ifdef __cplusplus +} +#endif + diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/store.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/store.go new file mode 100644 index 00000000..cc107411 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/store.go @@ -0,0 +1,91 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// Store struct uses a chaincode stub for state access +type Store struct { + stub shim.ChaincodeStubInterface +} + +// MakeChaincodeStore returns a store for storing keys in the state +func MakeChaincodeStore(stub shim.ChaincodeStubInterface) util.Store { + store := &Store{} + store.stub = stub + return store +} + +func keyToString(key *util.Key) string { + return key.TxHashAsHex + ":" + string(key.TxIndex) +} + +// GetState returns the transaction for a given key +func (s *Store) GetState(key util.Key) (*util.TX_TXOUT, bool, error) { + keyToFetch := keyToString(&key) + data, err := s.stub.GetState(keyToFetch) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + // Value found, unmarshal + var value = &util.TX_TXOUT{} + err = proto.Unmarshal(data, value) + if err != nil { + return nil, false, fmt.Errorf("Error unmarshalling value: %s", err) + } + return value, true, nil +} + +// DelState deletes the transaction for the given key +func (s *Store) DelState(key util.Key) error { + return s.stub.DelState(keyToString(&key)) +} + +// PutState stores the given transaction and key +func (s *Store) PutState(key util.Key, value *util.TX_TXOUT) error { + data, err := proto.Marshal(value) + if err != nil { + return fmt.Errorf("Error marshalling value to bytes: %s", err) + } + return s.stub.PutState(keyToString(&key), data) +} + +// GetTran returns a transaction for the given hash +func (s *Store) GetTran(key string) ([]byte, bool, error) { + data, err := s.stub.GetState(key) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + return data, true, nil +} + +// PutTran adds a transaction to the state with the hash as a key +func (s *Store) PutTran(key string, value []byte) error { + return s.stub.PutState(key, value) +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt new file mode 100644 index 00000000..36fb2e3a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////9NBP//AB0BBEVUaGUgVGltZXMgMDMvSmFuLzIwMDkgQ2hhbmNlbGxvciBvbiBicmluayBvZiBzZWNvbmQgYmFpbG91dCBmb3IgYmFua3P/////AQDyBSoBAAAAQ0EEZ4r9sP5VSCcZZ/GmcTC3EFzWqCjgOQmmeWLg6h9h3rZJ9rw/TO84xPNVBOUewRLeXDhN97oLjVeKTHAra/EdX6wAAAAA +Block: 1 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCDnSU0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGury+GOKEpoxVvvn5e9jUiawuv1JX/A6/iyEPX46S1GsAAAAAA== +Block: 2 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDLnSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDin9u8cjKDFiKpT+oYBKAd8nmwR5oMPTX7k52Ola3cY+sAAAAAA== +Block: 3 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIbnSU0BUQYvUDJTSC//////AQDyBSoBAAAAIyED9tn/TBKVlEXKVUnIEWg7+ciOY3siLdLgMRFUxMhc9COsAAAAAA== +Block: 4 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrnSU0BHQYvUDJTSC//////AQDyBSoBAAAAIyECH3LeHP8Xd6lYTzGtxFgEGBTDvDnGYkGsTUMTbXEGrr6sAAAAAA== +Block: 5 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBjoSU0BagYvUDJTSC//////AQDyBSoBAAAAIyEDc+pzmn503u60Qxptd99BlywYXm6D4cMA65ExCWM5g+esAAAAAA== +Block: 6 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDHoSU0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDoO+Q7VYFbhJuvloUwRLwuciQyU/ytKvp5xSIo6qUABasAAAAAA== +Block: 7 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIHoSU0BUAYvUDJTSC//////AQDyBSoBAAAAIyEChbxHksK4djxvfgi4VoytTM664Bd6zgo+7E8+TQRHFE+sAAAAAA== +Block: 8 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKDoSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECMETlaS4M62G/iAGKu5m89dAGPi8IKk5Fh5oWQHKNtbysAAAAAA== +Block: 9 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP3oSU0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDnBGEA/SSj8H0oPqm/ML/5R5FShONBOGCB2tmehT/dUasAAAAAA== +Block: 10 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDXpSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDjIZh3LP/iadr3RHpVxLAn7AZWAajLl8O1zmwZHVne/+sAAAAAA== +Block: 11 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3pSU0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDH96UU8YWwE7gP4Cf+gSH7sk0QMqxrQbuaga2oYw4kpasAAAAAA== +Block: 12 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBELqSU0CwgAGL1AyU0gv/////wEA8gUqAQAAACMhAgIKNC4+LiDFAAd8tDBKMVXae1qYWOoTaazXtuyzwyUErAAAAAA= +Block: 13 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJnqSU0BUgYvUDJTSC//////AQDyBSoBAAAAIyECKjNeYBvHflQBDnsV9ZeC1vcEhbC64+uF3yW6QeOtfIesAAAAAA== +Block: 14 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKHqSU0BBQYvUDJTSC//////AQDyBSoBAAAAIyEDrIfcVRiUMUkBOa7g5pC4wNQedwKRq5DOjaHqqOE732isAAAAAA== +Block: 15 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK3qSU0BCQYvUDJTSC//////AQDyBSoBAAAAIyECpAwbcwsLplZwrckU2YVwjav4xSSwMl1E7id30QVVbKGsAAAAAA== +Block: 16 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMPqSU0BEgYvUDJTSC//////AQDyBSoBAAAAIyECwfrFEBgeQHRGx3JzWrx2WrgZdbsMPKmxYXSY6SnIhW+sAAAAAA== +Block: 17 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFHrSU0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAu9x/ERPDFCLH+Zz9EkGacdLHUNJBNJlrjHPj8qij36nrAAAAAA= +Block: 18 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3rSU0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDsbskjzdWg95PsEVNPlF9UYlBUaDX7pRlaPutz07igl2sAAAAAA== +Block: 19 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLDrSU0BLwYvUDJTSC//////AQDyBSoBAAAAIyECAela3YC/7QecmoXpwcVBHvmq9Igg7/pPrp6+po6gOeasAAAAAA== +Block: 20 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLPrSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyECOCTb7SV0yI7jdXiNlWnfDqCyTM/Socpx6ix0Q2fec1usAAAAAA== +Block: 21 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBnsSU0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDOxvsrCrf3LzfkqF6sW2hdDI0STQcvDDKFaguehlJhjSsAAAAAA== +Block: 22 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBbtSU0C+gAGL1AyU0gv/////wEA8gUqAQAAACMhA7eHkgWUy0f7/M7pFb765ArC4rKVIkRg7uB1rQraTAxUrAAAAAA= +Block: 23 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE3tSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECKifvqihaTQSfERtUPc1YLGxxuyHyCyKniRx3yXX7O8OsAAAAAA== +Block: 24 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGnuSU0CFwEGL1AyU0gv/////wEA8gUqAQAAACMhA8BULZnHhUkkwRuChgNlmiruT0O6R8lNAKmIjwuhr7/zrAAAAAA= +Block: 25 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP/wSU0CjQIGL1AyU0gv/////wEA8gUqAQAAACMhAxGkBMZd+Vjgbo7VWoLTzgo/gcV4AiFLSVS9x890lFRirAAAAAA= +Block: 26 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDrxSU0BMwYvUDJTSC//////AQDyBSoBAAAAIyECffJ5kZ4Q7JLmSbsjk86Kh21LCmDi2MuN4ESioZnesPKsAAAAAA== +Block: 27 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFnxSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECcJP3Vfc3TUatwc3raJDpEf2EI3rQ30yLph5MO/sy012sAAAAAA== +Block: 28 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF7xSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDhOZsm1BYwtjpDfh7mAKxflVlaFthoun6idSM7fGafSOsAAAAAA== +Block: 29 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNrxSU0BdwYvUDJTSC//////AQDyBSoBAAAAIyECWXKM/kRtVcixvUPEg9y21vCzgqdLCEQG4Ig8mZMlzKisAAAAAA== +Block: 30 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIHySU0CowAGL1AyU0gv/////wEA8gUqAQAAACMhAs/LJ+fERSyRleiLOeSxjUX14Ecz5yzVWDF3lx/L0wJTrAAAAAA= +Block: 31 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrySU0BJwYvUDJTSC//////AQDyBSoBAAAAIyECPU5mVU5PatRnuw8wIibdoUzITkeZQhk67Kpv5ezUjTSsAAAAAA== +Block: 32 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL/ySU0BEwYvUDJTSC//////AQDyBSoBAAAAIyECtvPaaw1EP0rmDVLOibHEztobgYLCWYhVSXZJArIwpHusAAAAAA== +Block: 33 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM7ySU0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDzFQB490ZDRQ1WMOuhSC4sZ651G9sh2DJ+ZcuWuIflWCsAAAAAA== +Block: 34 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNPySU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECSylQW41EXWOZ31CvExD6+aXabV0TrFSinEwMY9+pj86sAAAAAA== +Block: 35 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBTzSU0BPgYvUDJTSC//////AQDyBSoBAAAAIyECE8p6oDbtxI7jSmW2lNfLn6oxtoLi88KLdQB7BfBeBlusAAAAAA== +Block: 36 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG3zSU0BVgYvUDJTSC//////AQDyBSoBAAAAIyEChAl8To2kjVb58pc1oWzLfRImNg9q8srVh4VHczZYV12sAAAAAA== +Block: 37 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3zSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDE5yzxxZ4WFoduT16wym78lpcAw+rP70r2eMnHZ94ScqsAAAAAA== +Block: 38 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN/0SU0CXwEGL1AyU0gv/////wEA8gUqAQAAACMhAhPWoDG6689omfxxvV8+TJgHb8Id0gkb2k3i0rkvZ/oorAAAAAA= +Block: 39 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA71SU0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDQIng3kzxC1cm+G0Bnth9Sa7KOHFuCm3z4xLyYCJ7O4+sAAAAAA== +Block: 40 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJD1SU0BfgYvUDJTSC//////AQDyBSoBAAAAIyECoY1wflhE9PVB9dwhSknejApBY/eIE0CvIKObEuf6B+asAAAAAA== +Block: 41 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNL2SU0CPwEGL1AyU0gv/////wEA8gUqAQAAACMhAmcdzpOspNYs6o/TN5CzDiqhx9K96neEhROlO47zm49arAAAAAA= +Block: 42 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOP2SU0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDfO7OWX00d7xOLX5GiwhH9WSnZqMSzmnOLg1oZ86i4cGsAAAAAA== +Block: 43 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE/3SU0BawYvUDJTSC//////AQDyBSoBAAAAIyEDOsp3p/iuhz87/hjiQaW5MLFTEAMjdHBG9toI78bR6CWsAAAAAA== +Block: 44 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI/3SU0BPQYvUDJTSC//////AQDyBSoBAAAAIyEDWGIJZypV1ghaNLShPzAtGfr2hY41jb8JAJ8hk9v2NwusAAAAAA== +Block: 45 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBC34SU0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAp+9ICcmETU29ZlGo4RRY25HXEhmg91nRnSBASYH18B7rAAAAAA= +Block: 46 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFD6SU0CHQIGL1AyU0gv/////wEA8gUqAQAAACMhA4XwdH0k+Heveh7uQ3phvM9SVCbtT1l9Eq0Y3fPYsjtQrAAAAAA= +Block: 47 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGb6SU0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDZhcjinxBQXVgFLA+iAGp1VZsalDx+gptnX5pzTFgLomsAAAAAA== +Block: 48 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHv6SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyEC1/pOUjVLwQLKHrbmzekcK3mM5m27Pw2DfceQQWGPIAesAAAAAA== +Block: 49 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKD7SU0CIgEGL1AyU0gv/////wEA8gUqAQAAACMhAiDrQHypfIhJFYRfd0eD5sw0sUdED2ddyxZjTYRiTU0OrAAAAAA= +Block: 50 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNn7SU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECzrgonxvoWIwfydrc0JwZfPFzpoqE7TRNHP6fDLJXYR6sAAAAAA== +Block: 51 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFz8SU0BfQYvUDJTSC//////AQDyBSoBAAAAIyEDr0DSfmYfDJs++dvPnylmZNXo6w+uI1FSJ9pE0/LgxQisAAAAAA== +Block: 52 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGX8SU0BBgYvUDJTSC//////AQDyBSoBAAAAIyECR0ME6erPMG6zEPONKd2e4PkWuxQbS3McimdcBviLh5SsAAAAAA== +Block: 53 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBX9SU0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhA/EIOKqd9tFpqUFm5q8D3f0UmaPOpXYHzC+BdKh9Q11lrAAAAAA= +Block: 54 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDX9SU0BGgYvUDJTSC//////AQDyBSoBAAAAIyEClk2EdET+f2E7Kt/Ayfl+I9X7zZ6Mz8jkqR2flAMszmusAAAAAA== +Block: 55 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPn9SU0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA8v9vShdzgiq3fYDiu7o2fmp0vTpVdo8k7kTuWLDU+xtrAAAAAA= +Block: 56 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP39SU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECmp028rYoYhYHasQ1vK47uroaK1B6WLIP1WHqfo4iAzisAAAAAA== +Block: 57 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEr+SU0BSQYvUDJTSC//////AQDyBSoBAAAAIyECej6GuUWYaRu62yUOCQje4vi8K9C+VTDELG/6lMPSPbqsAAAAAA== +Block: 58 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF/+SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyECcEE7ucUapHJFm85zreQ3upb18xlIoRNc+wdnsfzPUVSsAAAAAA== +Block: 59 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKP+SU0BQgYvUDJTSC//////AQDyBSoBAAAAIyECyPrrEQItHPOXtZlEQ9qQrCdLxzTF327jDNhBP+e9kHmsAAAAAA== +Block: 60 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLP+SU0BDgYvUDJTSC//////AQDyBSoBAAAAIyECyEpYC2LXJzJqHz8198VHG19CD1+n/kSCnxc2e6ZpBfqsAAAAAA== +Block: 61 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCX/SU0BbwYvUDJTSC//////AQDyBSoBAAAAIyEC5QZU5g1XN84Sap0NGdZwTrxu4t3M+0A+VJ1mYM0LMcSsAAAAAA== +Block: 62 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH7/SU0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDydEjy+7iKghK4PUM8ZyOqRFwsROlC5uw/gNCN2Q9UdqsAAAAAA== +Block: 63 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNL/SU0BTQYvUDJTSC//////AQDyBSoBAAAAIyED1WiZB9m6NTr+d+ME7Wj2XpWGXSnNkIsP72cPYxEHU42sAAAAAA== +Block: 64 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0ASk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECzGG9c2zi1DiTrg9QPSeB2rX+VIf/oONq+eJVPLX0qgasAAAAAA== +Block: 65 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJQASk0BUgYvUDJTSC//////AQDyBSoBAAAAIyEDeVzpequjyO8ZQQeEmHHhsoYTJsewby6iJGgc6KSWwpqsAAAAAA== +Block: 66 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKMASk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECAiEO+Qdmz5FpUwry8Ro1MOTfWXk5J1THOTFvnXFi6VysAAAAAA== +Block: 67 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKgASk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECirk7Gw8pjP7Ir8lsWfcMStVKPfkms+Go/OqOJmr0lXGsAAAAAA== +Block: 68 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOIASk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECh5wT3uZUInQ/YidZdpAh8mLwMJ7VCQxJR6ieVMBNRrGsAAAAAA== +Block: 69 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBMBSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDA66EL4cQecB7lIS2SvJhOKdVbBqDvMz2sUpg3XCrwK6sAAAAAA== +Block: 70 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4BSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDk1oBxCVyg2vY53MZolz9+ZSWC+MZx9p3j3k8OFAHJ9GsAAAAAA== +Block: 71 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGYBSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECDmH2JO8GPQAM7t9hooYcj5sUinvZ78qBuw4Dd4n0K5usAAAAAA== +Block: 72 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKUBSk0BOgYvUDJTSC//////AQDyBSoBAAAAIyECFF5f5/Z+jml3cQzeXcJRDdK8UipNynl5WxeDmlSjq1SsAAAAAA== +Block: 73 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwBSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyECnhA+aRuRezF2e8WEGG/s7V8nc8EtaztPL+0EpbfjPZqsAAAAAA== +Block: 74 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM0CSk0CzQAGL1AyU0gv/////wEA8gUqAQAAACMhA8IkXPeRF5hovk2URYw48sE8qBZN2/hVmGHDTqfIOUPqrAAAAAA= +Block: 75 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCEESk0CTwEGL1AyU0gv/////wEA8gUqAQAAACMhAyF77cSm6Fcc1+7SixaXLAjqbcACJueGouOB/8fL9KdbrAAAAAA= +Block: 76 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgESk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhA4Q4ZrFzL7O+rRNPn1GlFZSj1QPbpIB2mB+Nl8BtW3JgrAAAAAA= +Block: 77 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEFSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDBWUMsPAGRZhzGK/mJPCnGUdp9Uv+IEvklL2r1UTpj8CsAAAAAA== +Block: 78 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLgFSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDeN6b8cqvdr+sNsSTYFnPf1UdCFbmKi0gWv1FKVHr7mqsAAAAAA== +Block: 79 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcFSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyECxtpvDSQjzrxLIXUx1r9SY34QVRzE+AzhV/lFnFMV2aisAAAAAA== +Block: 80 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP8GSk0CIQEGL1AyU0gv/////wEA8gUqAQAAACMhA4fXPIkMjM8Fw51yXPpY0LpoBqIRi49vNM2NvDZZRrNCrAAAAAA= +Block: 81 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoHSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDPiCVXPu1XICM1gydMr47Nc0ePwNmnm7hUBXmqskaY0SsAAAAAA== +Block: 82 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI4HSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyED4YYspc2ccGWimDbH1cofSdDAkepk8ackLroibbzSpIusAAAAAA== +Block: 83 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ8HSk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECTp/aW1UTcPN28O7w1Go7jamne+51lR8QCiSC57OzxWWsAAAAAA== +Block: 84 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLwHSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDLD0fFf178690BLd3hIBRMWutBwHaeksqee/yOiAdxNmsAAAAAA== +Block: 85 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPkISk0COgEGL1AyU0gv/////wEA8gUqAQAAACMhA8ku4jTOrGgCQdXBhEmQwa8CIcIYVrgKek4mIuFlxOr8rAAAAAA= +Block: 86 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH4JSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhArdNqbvb9LnevbFlhSY+uK9qvP7Ue7psxbAcg4rlJ3eWrAAAAAA= +Block: 87 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUKSk0CcgEGL1AyU0gv/////wEA8gUqAQAAACMhA6S52CxTnl/IQyoeBkQYmzBZckrsJoGYVwOEOiZERacPrAAAAAA= +Block: 88 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDcLSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC/xp5RA5PGqknb6ogNmXbB87Wz3BDHcexnVgIQRSCbeysAAAAAA== +Block: 89 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDsLSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECERJMGxQyGb/271PHI4bhd1jU9F3RNHBSRzEgBKCY0BmsAAAAAA== +Block: 90 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgMSk0CCQEGL1AyU0gv/////wEA8gUqAQAAACMhAknGp243wvzVZofd5rdbvfcvze6rb+gVYanEGskNnR9IrAAAAAA= +Block: 91 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIkMSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECC6nvDf8UAxjJV0TJgszNp0/vSx6s/xp3jS9KNQPNECqsAAAAAA== +Block: 92 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLMMSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDX/Pb/4LxrP8BUqJ5toAAX7zLYkAnR6CSS73Mza4uJ/SsAAAAAA== +Block: 93 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAYNSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyED238//BrNaXpFgoJQqhDfbG03KklVowE63vIF/LhRwzWsAAAAAA== +Block: 94 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDgOSk0CKQEGL1AyU0gv/////wEA8gUqAQAAACMhA3Lt3dFjLO00uwOF5Qi0rbMWM5i4w1Px/zIKRDhJNU8ArAAAAAA= +Block: 95 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0OSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDuKDxIuMDhmTrMmCxNE6VDkEzSChCj8yFp/VZ9ydLsASsAAAAAA== +Block: 96 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEOSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDaMPL9oFu1z1Q8EjbqHa/qAZLxBTLLyVrKxEi3Yok30SsAAAAAA== +Block: 97 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFsOSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyECA23/zJ/0yI3V3PGTelRLpNJwSDDjSmV4vwATu0APHSusAAAAAA== +Block: 98 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGIOSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECseBU+/S+VjT6CZMxNhF7s7MdCesDGFzR3+7ebDcDIJGsAAAAAA== +Block: 99 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHQOSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDYJIpTSiKIZSZb4WuYs6egFJKl/UljgFQHNA+aU+wlzSsAAAAAA== +Block: 100 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOEOSk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECp0EHEWS0CwHErSiRPEqioQFcxbBk8MgCJyVS8Xrgh1CsAAAAAA== +Block: 101 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN8PSk0C/AAGL1AyU0gv/////wEA8gUqAQAAACMhAuDXugKxeyPjCOvbF3DocZCvUcibYhIRvwm6c4WnnLOErAAAAAA= +Block: 102 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOgPSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECjWrD9Yi8FDFKE0YTDEAIqat0AqqfwVq+Fc2LFSEwSbKsAAAAAA== +Block: 103 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO4PSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDYorAJhhfbpTZx4n/5cuSwMREKksSS49oEfoujNLXrtqsAAAAAA== +Block: 104 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAQSk0BHgYvUDJTSC//////AQDyBSoBAAAAIyEC3XXrVkgaG+NMvqLawe0bJMcD/ULrIQ+8MBEt9Tc+zBGsAAAAAA== +Block: 105 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFMQSk0BPgYvUDJTSC//////AQDyBSoBAAAAIyEDKziPAFRNIxoclk2zUULokJ6weapTPItw8jlHqKMAKomsAAAAAA== +Block: 106 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIQSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECnap6EmSxNxBja9sb9WKBjEOc+IaVL11ZEfuhicQETSKsAAAAAA== +Block: 107 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPoQSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyEDQbRZLdFqTyYVWs1rOWpWBLenSg+e/GvSst+fkWElJtysAAAAAA== +Block: 108 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM8RSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhAlCVtoPrkh4/BjYdI2SNmZQslxj2Ai6F4L9nsNGOSQ94rAAAAAA= +Block: 109 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHsSSk0CqQAGL1AyU0gv/////wEA8gUqAQAAACMhAkVeiQoVVJnM3cKkTS2KpE6VtNM7Hv5m81yM0OLoeE35rAAAAAA= +Block: 110 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ4SSk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MYoWE+Nakd/ASdja62uaaDg8YBaBlPId6zNo9QvOeCsAAAAAA== +Block: 111 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAETSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEDulAFvCPjIXYYydMeS9Hy9GgxGV1FMXPhjeXT4TAsWwisAAAAAA== +Block: 112 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMETSk0CugAGL1AyU0gv/////wEA8gUqAQAAACMhApYlJaLMQwsCUvCvE2GitF+TAmd3RtY1/OlpcSRgBxWhrAAAAAA= +Block: 113 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAUUSk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDKEdW/gN0khwyVjZKfx9nJcvH4qOOczj8zqJLykLlCwesAAAAAA== +Block: 114 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoUSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyEDL/EK5v6tK6oGqFFqe8//IV0PA4SAAQSL9oBlHCE7+I2sAAAAAA== +Block: 115 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDAUSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDrFOsSWu4ejinHQ0ZyCsYeFn2lmOi0IZCNlCN7jEiEVOsAAAAAA== +Block: 116 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFIUSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECj0sipvPHM6oX2Suk6PK+LqKb1d4d/p1V/1QzP9w28zasAAAAAA== +Block: 117 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsVSk0C5wAGL1AyU0gv/////wEA8gUqAQAAACMhAmeMh63HQmd8cON/IfxgbUeQ7dFT1K21wLz9pxQS4Ry8rAAAAAA= +Block: 118 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHEVSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyECN/Qd2eah2UkEmQg2RIfkcLW0ioNNergQqVMdEfek6resAAAAAA== +Block: 119 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI4WSk0CGwEGL1AyU0gv/////wEA8gUqAQAAACMhAzMl14BRqQarAAF+6UfE6MZ9xSjCdSfs1kvgxHmb655FrAAAAAA= +Block: 120 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIsXSk0C9wAGL1AyU0gv/////wEA8gUqAQAAACMhAl/2wZV0zb65Vo0vpQlAoAGfK6mW/XdHHHGupdwMOK4vrAAAAAA= +Block: 121 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAMYSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDFeUkW4kgurJkKtZppFFONYbuCUqngDiX/Pt9+H0NJHSsAAAAAA== +Block: 122 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAYSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECjMDQibQYuqWWAFTuz6dY6kNMSlqIosrrvIdLsUQmfRusAAAAAA== +Block: 123 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoYSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDxmWiC8T1BP8SGur/FIWgXfxYYcHKeL4npwGuFq67ACKsAAAAAA== +Block: 124 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgZSk0CKwEGL1AyU0gv/////wEA8gUqAQAAACMhAwHf2sC7W2d2IH994GJVVX7tRHe32CbuCtrzo2MLuMYVrAAAAAA= +Block: 125 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFUZSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyED0hDa6WdJtpZ6p98G6m2UjqiixKyIuJ0MFPajGmjssBmsAAAAAA== +Block: 126 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKEZSk0BSwYvUDJTSC//////AQDyBSoBAAAAIyEC6Tum2NedfqmBS8N+FQE+NDwZ9KFXXPVWJyzmRk8JCCqsAAAAAA== +Block: 127 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8ZSk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC7KD44OHRMoAgeSAAC7x0Oj84FPEZi1Xg4SBSggQS4t2sAAAAAA== +Block: 128 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCEaSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyED03efe2zTPZ5E5IEp9ISyf0FMMZEaBTOW03/yCvR2GM+sAAAAAA== +Block: 129 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE4aSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyECwalSu7EuBcSrjEG2inHKaIpIuFyoK1DRQJVYLf+HSjWsAAAAAA== +Block: 130 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGwaSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyEDnJcLkSa7HVF9W8TBdvX3Vc0B5uy2lxV8HzLiYl89CSSsAAAAAA== +Block: 131 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKcbSk0CNgEGL1AyU0gv/////wEA8gUqAQAAACMhAgwI2E8OE8zFqqaK+g+tivMz9gGHpo+bHjh6ezyFdarBrAAAAAA= +Block: 132 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUbSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED3vQjnrHezODS7A3yL6p+uEqBalS+A3ZcnJv1TGYlmdusAAAAAA== +Block: 133 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECPgylKGKmLvlCsYsvfc6etncxnBfkOzyCsUc+2f/5/D+sAAAAAA== +Block: 134 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDkcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDmAG3xKRdjqz1TlXMHkjy8VCwBa7Z0BXDgSFyRhbSsiCsAAAAAA== +Block: 135 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQcSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAql6KbWWtQ3glHcRUGYj3ZoP5FNTn8LrGsWCelXHorCDrAAAAAA= +Block: 136 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOYcSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDI8XxVM4wiDQ8N0moqKA3aYzTf30OHKpT/oNa8gWnr2qsAAAAAA== +Block: 137 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMwdSk0C4QAGL1AyU0gv/////wEA8gUqAQAAACMhAo49WfWmzQi7F5tzwpGkvJ6e8RKR7OYSVJSeKT9IiGhtrAAAAAA= +Block: 138 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNodSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECi017LAVObSf/5Rwfix/FhWBC2jNRTlZ4KfrnUnvfmTOsAAAAAA== +Block: 139 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8dSk0BFAYvUDJTSC//////AQDyBSoBAAAAIyECW2XIUIXSxutXOlHs48KS0x7TKI/XXyPp59+kvgAFu6isAAAAAA== +Block: 140 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPcdSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDpl1cLBpqfSzONTnwQsdqHOFjhHH0fdVVFDXhrKHzcz2sAAAAAA== +Block: 141 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkeSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAo639YmdK+SsumPwiPgosjcIPN4bguWzANGhJONA6npKrAAAAAA= +Block: 142 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP4eSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDh1Y6ou0Q7r88w3LyFO4Ou+VAckXDrbCqK+ieFH3jksCsAAAAAA== +Block: 143 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAcfSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECgYYEfoORKB4/4+fBR2LN2pELTRbhJSpFEos+/kwqOWmsAAAAAA== +Block: 144 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJofSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAlR7Ij1Y612nx2kHSPcKO6sVCct1ePqskDI5nwtrzjHWrAAAAAA= +Block: 145 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsgSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA//fMrrnSOufu49dboDO10CHqbQrMLK8IVpadlmbklNIrAAAAAA= +Block: 146 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH0gSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyEC5OG3sNSMSlP9KpYGnUWZdDg5VNohjMPMsH5fW6AxYNesAAAAAA== +Block: 147 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOggSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeEPHfTsL4Bfb3ccC4idXbDyNqcTkrZKEZVvj17uvpRSsAAAAAA== +Block: 148 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAhSk0BGAYvUDJTSC//////AQDyBSoBAAAAIyED57ygEjbUgyC3aieMvHbX1pcm4LCUC3IOfdl+PP4fbGWsAAAAAA== +Block: 149 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4hSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyED+FCDPTLkqxp0MVfJluKh57I19Dn9Iih7Woi6Tb8afRWsAAAAAA== +Block: 150 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJIiSk0CXgEGL1AyU0gv/////wEA8gUqAQAAACMhA+mAqc9h4nD0t45VfLx2UUUA0/p4kqxabd2ZmYuq6gbkrAAAAAA= +Block: 151 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLQjSk0CHwEGL1AyU0gv/////wEA8gUqAQAAACMhAmPucb2v4yUFUs+fsMFzQHJ1j/9ce58LGgRe6RRh/euHrAAAAAA= +Block: 152 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB0kSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEC9xVG/Fl+Y+KnLa3u61DAymQHmlpTDLAd2TlxbUHp1ICsAAAAAA== +Block: 153 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIckSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECTRtIq6UP01DI9p7iiDVWNa/jito7eNknrlptxob8CMmsAAAAAA== +Block: 154 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUkSk0BOQYvUDJTSC//////AQDyBSoBAAAAIyEDRUuy+NWMnk9ILuZ8DsapFVsOEDCC2KhTZXhMPg/0pLGsAAAAAA== +Block: 155 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCglSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECpWAAkqzDwjMqnXaDKK1kwh8APDmky4ymzsjsiQwAPIysAAAAAA== +Block: 156 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOklSk0CvwAGL1AyU0gv/////wEA8gUqAQAAACMhAyNBmkFIDhmpISxIaAl8BYhRlGkBGV02hWlvr5HUQ8SNrAAAAAA= +Block: 157 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPMlSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECVUwl8GtKXoE/NvfIsnO79lk3xtuTS0whn0U9xaWNfZ2sAAAAAA== +Block: 158 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIEmSk0CiwAGL1AyU0gv/////wEA8gUqAQAAACMhA2eaRhiZvGK0In2a/nKOXB769+5t51fHwe27IRDD8RDWrAAAAAA= +Block: 159 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJUmSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECSnRxC9g7iWyJOp5+YM/FZgmbcbPsmVh5aSkjv/1Fr+KsAAAAAA== +Block: 160 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL8mSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEC5D7rknn6lh1+hyHQtrGTqi5eDm7RQ3kZ9nTgfZeqQO2sAAAAAA== +Block: 161 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIAnSk0CvgAGL1AyU0gv/////wEA8gUqAQAAACMhAky0lADzyWXLORNQEhDBS4Y+ALXvKIBDqAc++PzHoWMfrAAAAAA= +Block: 162 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwnSk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEDZl+fHnBeazj0LWAi5pTzm/sexX+/HOAWCH1HgkKwPJGsAAAAAA== +Block: 163 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMkoSk0CygAGL1AyU0gv/////wEA8gUqAQAAACMhA8WnNOO3JQUBUrPDxen13ndh2yW+n3MxlW+XRd2iTLcCrAAAAAA= +Block: 164 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOooSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEC/lxWWAay2wT4o39Tr2Ns7nwO+lyMF5SZq8rI1U1X/FKsAAAAAA== +Block: 165 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHspSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAk3t/tXOCj9LycCuXAWJ0v8jtOUZvOEgiA/jVcpaDVusrAAAAAA= +Block: 166 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBIqSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhA9xfxtKVRJeu2iyjBtle7aNf4PX9iJp49sOdNZngbhberAAAAAA= +Block: 167 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBUqSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDzt1mHK9GZEgenCDf5gVQ9pkqBW2ynXSIx+R/u1p4+7+sAAAAAA== +Block: 168 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB8qSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECcmG4uffmlftTc8/q0HovvNkqByGT9iSYD1JLoD3T2KGsAAAAAA== +Block: 169 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQqSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECKJDBT07ersXWrdbd1y6AZ2YDmQQ6+Vp4g6NLUMTJ+qysAAAAAA== +Block: 170 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGgqSk0BQgYvUDJTSC//////AQDyBSoBAAAAIyECZWWUoDCWh1c1W9w74ve+UH981Eo1UM5e/1v5cAU6fOSsAAAAAA== +Block: 171 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIYqSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDF2fHjUsx87d2NosEP+141eCTd+K3U51XYtvUrlrtDN6sAAAAAA== +Block: 172 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK4qSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDFRrbmh92qUy24UA0dOBXZkjabZdjzX09/eehBoXur4WsAAAAAA== +Block: 173 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDQsSk0CgwEGL1AyU0gv/////wEA8gUqAQAAACMhA9V0fQUO8S9LLUYyAF/C1pjsS4Nj04HBCWOIMBeJQpIfrAAAAAA= +Block: 174 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIsSk0BWgYvUDJTSC//////AQDyBSoBAAAAIyEDUY2+hN3z/qi3FLQeVdbXeo2qvk+n2HI7YnmL++mj2JqsAAAAAA== +Block: 175 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA0tSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyED2ajBIKQoSY0sQtN9UXzjxN9RdlATZuFxZtE/VNb8TRGsAAAAAA== +Block: 176 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCktSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED0zYlPDsSgALLnDg8eSTEv1O+XSZip7udyNxu6mct6dysAAAAAA== +Block: 177 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD4tSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECnmCVvaEzV5T+87o5aRJ7V+zCO1cDMiN8RQrpstQoIC2sAAAAAA== +Block: 178 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEtSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECw1GLuJsZoO7CcGxZqIj0Fde9iM46b2hCOkkPzYbPpVCsAAAAAA== +Block: 179 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQtSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhA9FiMoAzSvLf//IuTOJ7iIr42iWVGqjSPJgOwD/I11G1rAAAAAA= +Block: 180 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkuSk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhAgzoxgCUp6u2tfbFsyVyNtQa1/eOlPEKsP22ypizmbPArAAAAAA= +Block: 181 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcuSk0BSQYvUDJTSC//////AQDyBSoBAAAAIyED/KDiunzajPWWBt5052FD09r91nJKgwvJUXu9j+zK8qCsAAAAAA== +Block: 182 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOQuSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECAbjIKatNox8k1l5eferyl5W0rT74d1W4ZMHOlBmCypWsAAAAAA== +Block: 183 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDYvSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyECDCHJxkNMLSKT4njHLAKf6Fie9Y6EIKdO1Sh7OpFaHB2sAAAAAA== +Block: 184 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgvSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhAkuwZCiL1dTp6Gkdi29dKmRdOduF1BfZOSTmEeGVX6b0rAAAAAA= +Block: 185 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkvSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECxpIXgk3R2CVVVDs9VbcrPR9+ENIS/+EmgydRuJb02CisAAAAAA== +Block: 186 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJgwSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhAtL4lYkIp7ccSXLAtdvkK4ItTk1+TGDCEzuV5nEyBVErrAAAAAA= +Block: 187 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOwwSk0BUgYvUDJTSC//////AQDyBSoBAAAAIyECPCzw98DWpVH8vkz5wB/gBPPv/PSW9hpJuvuBmUzqyyKsAAAAAA== +Block: 188 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPsxSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhAvngQPVLq7NX+R44ubEpXFXPa54gDs75/TuqqNVfIISqrAAAAAA= +Block: 189 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQySk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECcV6R030jneqDLxRg6R42gRXYymzCOn2pZnlautnjtpmsAAAAAA== +Block: 190 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEIySk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECOsJ4ba9fVJTKq/sBzn8ZyEMY40Xde7mq8IqgxzJsiP2sAAAAAA== +Block: 191 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHwySk0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDYaxjeSGC4vmLLnZSBiOQoVs/N8OQhh1VjbsmvSJWDeOsAAAAAA== +Block: 192 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKcySk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDE6nEK2vcgUcSPaAGG1lcRoVpH9pMgMELnLyWp8PSEtSsAAAAAA== +Block: 193 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkySk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgiabwnuNypax6R76wnwP+WoSo5URuQfZJNXGzMJMDHCsAAAAAA== +Block: 194 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDozSk0BPAYvUDJTSC//////AQDyBSoBAAAAIyECRpq1+j+DYgxIgFHEm9UXzHN17P9kTVK05kSzXTwJbgusAAAAAA== +Block: 195 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUzSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhA255L0d5BkzSHLyHyk1k2g8YQ+rO+KUmbt2wRBdI4IAXrAAAAAA= +Block: 196 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBE0Sk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECAIZcl1++mP3bwjoeLm+zNyIQs+IvDkC1PCV4PTBlmtGsAAAAAA== +Block: 197 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHI0Sk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECjLR7uNNby9GgkoGEDLZJ9E+5jbEpdYjmn+DIaqV7EICsAAAAAA== +Block: 198 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIc0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyED2qBTZEmx5B7uBDjoBvifJC47pnN69ttFkXMLKYbIV/2sAAAAAA== +Block: 199 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN40Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDqq5d+o3hT8+n8SFTXNxKed5P2hHyzqF5aueZsBs8q/isAAAAAA== +Block: 200 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFw1Sk0BegYvUDJTSC//////AQDyBSoBAAAAIyECfYhreF3fEPCFznCYEHUP49yTjI2+QNlrB/Gnq5CcsF+sAAAAAA== +Block: 201 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MnOAprXSvn+yszmi8x3XMbvywAKC4zCs6rK1IULxLCsAAAAAA== +Block: 202 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIQ1Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDGLR8jsPYWgkNOT25W2J35cPx1tEynq0CqOcvIzc+/JesAAAAAA== +Block: 203 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKg1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDpTE0hjwmpiIpprcrlfdySjeIXsPXiHcRsbc1nuzsNeCsAAAAAA== +Block: 204 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM81Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECFv8YWuZ34zrgQrQJtZm7l1uU/+VAiK+MPKNp6LwyK/CsAAAAAA== +Block: 205 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNw1Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDqIiMpDLtIWiJdsenyU/cG+8Dkb1K6fFgIw0+xtrJpH+sAAAAAA== +Block: 206 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDg2Sk0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDkkPygwnlTXCiX1sKhnXsLegIt0Ljcr9xpFA1SAchL5usAAAAAA== +Block: 207 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEY2Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC0cirEKovJKnAWPMlnZASXhXiq5hBtVY9NmHia/SDip6sAAAAAA== +Block: 208 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIs2Sk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDR3mrcSLWZyPk+AEZeqDYbMU369AyilWs62jasGgH/FisAAAAAA== +Block: 209 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPc2Sk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECI1tcjpvtgMvY13MdVfn9cI0Q66cYW5MEW2YTmMF0DGqsAAAAAA== +Block: 210 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKU3Sk0CqwAGL1AyU0gv/////wEA8gUqAQAAACMhA4UT2yCaEBXO8+K1tsUXtXvcF/gUyER4o6Mp88+7U7o4rAAAAAA= +Block: 211 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM43Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDQztds6F7JDGdYV3FwkUj1r7QuyPBfdtwItfxQpwDjPSsAAAAAA== +Block: 212 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNc3Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDkO6NUxYzgjwm87IpiOTuAOggdX4N8eq3yLWExeVjzxWsAAAAAA== +Block: 213 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEM4Sk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECVggb+D65XJ0dUkYoiY6b8dQ2WrI/1Slbqnx1ksHEndSsAAAAAA== +Block: 214 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKo4Sk0BYwYvUDJTSC//////AQDyBSoBAAAAIyECBIkqmiTU8fNIMESRp4yM/BAhwbuwjyf3JgY3lYArr06sAAAAAA== +Block: 215 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI85Sk0C4gAGL1AyU0gv/////wEA8gUqAQAAACMhAkuKR3KQysRLoewC6BecSqjM+t3ka1XFiNlBB86Te8ARrAAAAAA= +Block: 216 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKE6Sk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7jPtN3qUeGA6atc5I6F+797GlFI9rOt/oDjZhAEJ/x6rAAAAAA= +Block: 217 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCE7Sk0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGcFv4b+90LIVuMhMZrmZrBL2HElwCE/ZeIwp2lSkbFOsAAAAAA== +Block: 218 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDI7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECVMM/t4acgW2wl3m7rNrmW2Bcb6o9eysiGc5ZkimmKk2sAAAAAA== +Block: 219 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEU7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyED9fuhtvoIzHBSYAYPUi18+TxpIuT3xLBEo5jugxaqzJKsAAAAAA== +Block: 220 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJg7Sk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEChBswuJJl+LxHr3C8ZIa0nhEHu9dF7CBr9KIg9nc3UWesAAAAAA== +Block: 221 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN07Sk0BQwYvUDJTSC//////AQDyBSoBAAAAIyECTfrdKVALUbJ2oTu3TOt89rmu14vx8AzqVBauraYZGgWsAAAAAA== +Block: 222 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM8Sk0BUQYvUDJTSC//////AQDyBSoBAAAAIyEDEV1Fnz7h+T1mFnKt5rmQfzQyPHUQ1+2t4ggDkaMcc9GsAAAAAA== +Block: 223 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE8Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC2sGJQbO4JHenGo2TZQQJcET2SFD2GiXBolI5/CuAU7ysAAAAAA== +Block: 224 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIk8Sk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECAvjkjnxZZ5iWH+/mxnKPN4D4g5CowExSUXPQpoi3S42sAAAAAA== +Block: 225 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM88Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDEuJepCVFIAzYpkz71pIQRcbXJntufmttiYSx4Je26desAAAAAA== +Block: 226 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNo8Sk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECLZc94YDLPFptsR2czEZhaZ+pcdPoLYYVJB751wF34FesAAAAAA== +Block: 227 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOI8Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECfG5yGKhAyG0ZcdqyJU/qSksw97f/IiRxi+V5VaeyOn6sAAAAAA== +Block: 228 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC89Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEDLtOWt889VoeQivkM0OD5gPvu4EZjsearjW+6aAktEIusAAAAAA== +Block: 229 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM9Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECANaEjBFFTE1JizLMEMoGfQVkfiSwJHqradz50PWbYwqsAAAAAA== +Block: 230 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGo+Sk0CMwEGL1AyU0gv/////wEA8gUqAQAAACMhAiRR64mo80zoSkOCKV95wLrA3gRJbNMCE9T0oxAIvcjYrAAAAAA= +Block: 231 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMQ+Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDcn8cAvoY/POn5kd0YqL63Ub6xgexr8TqR0Tls7wu60msAAAAAA== +Block: 232 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPA+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyECjWiw8RmTXPx4gsMqorvySezHazpv92KB9eZ9PHj04BqsAAAAAA== +Block: 233 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA4/Sk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECNdE1/RytMjMSHbHimpZmjabjB+8EYqZniTebq7N+ghKsAAAAAA== +Block: 234 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFE/Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDmekRYSKx5XfTCkyZVAdiP6Q4DTHxwNivraFaO97GvEKsAAAAAA== +Block: 235 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNY/Sk0CggAGL1AyU0gv/////wEA8gUqAQAAACMhAkHJPaTCsoHXiY2be2mOKtscOGlv2qpYRa79Jz7Vp3UnrAAAAAA= +Block: 236 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEBASk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeDF4XubIYSUDpx4+aosCmjB7gkUp08Nr6gs7QBx18N2sAAAAAA== +Block: 237 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJZASk0BUwYvUDJTSC//////AQDyBSoBAAAAIyEDq6NpbCSWZNlsn+fgnTEBAHEYnACZXZVzAmrrV+4Y4UKsAAAAAA== +Block: 238 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChBSk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAtyS1H1w3anahuWIOZyrKS1kex0IvtxmonHeXFfUWmEDrAAAAAA= +Block: 239 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9BSk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAlNuTA+BQrHA0LOtsgkwKzhzIuzDbyjyHdMgEQOc+ANSrAAAAAA= +Block: 240 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOBBSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDdrS5vHRcn6Akg58B/WI11I9TDq5rwQxpB87c95kCDOusAAAAAA== +Block: 241 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO1BSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC+sHBligYx4TtS+cWEZhv2wbBlXfUEPREeqnI5wWYNgmsAAAAAA== +Block: 242 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPFCSk0C/gAGL1AyU0gv/////wEA8gUqAQAAACMhAz5/DxQyf8ROkF4Pg2gD8MYJED0F/URrV0awvF4FMRKNrAAAAAA= +Block: 243 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ1DSk0CqgAGL1AyU0gv/////wEA8gUqAQAAACMhAvEL6Z0o6OqWZOUYN/3jknjg73MN6uEfYrO8U0szpYcOrAAAAAA= +Block: 244 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMVDSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDgzMUayirzRYw3yrhUGTSSwIKEH7UVviFj4UC72FDRlesAAAAAA== +Block: 245 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBClESk0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDsknmetlzUMelgrf+MTCgNbpc6IsOyW0170PjRJT2dFusAAAAAA== +Block: 246 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLJESk0ChQAGL1AyU0gv/////wEA8gUqAQAAACMhAuNLBd7+swlxHxCEeLiXEOYRW/gFQdlgwnIg1JmHbbFKrAAAAAA= +Block: 247 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAZFSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyED8NnbkMpwQSlCl2bnp7p9Ah38qaf/idUQWm5qElWt89OsAAAAAA== +Block: 248 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNxFSk0C1AAGL1AyU0gv/////wEA8gUqAQAAACMhAt7m1hSRY4iYKgdUxenze6Z4eKAe2wA3KD8ldqOw8IohrAAAAAA= +Block: 249 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPtFSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECoxw6WUVf3l0sGw5/qht59qsliYPKImFMIBrzITNSvbOsAAAAAA== +Block: 250 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB5GSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEDa/5HErDUCl+ilct1eVsU1FR8A3nFJHHBJX3myJtQuSusAAAAAA== +Block: 251 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJtGSk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDOfeN78x5nXPqNHxfujrEVkRbFrgKArtNuKQz4umMDMKsAAAAAA== +Block: 252 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO5GSk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgARqRE+dW6czGMxEd4Qp62s/tOtSOf2yfqTXLQigx/isAAAAAA== +Block: 253 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCFHSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyECGlK3+ujjmC3/bNJUwmrULEeC9wxE6uUTymGByu0Nop2sAAAAAA== +Block: 254 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHJHSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEDr1fLoRViqetDWdhvOnfoTg/YbqmCjZK6n5vUAjOHw1OsAAAAAA== +Block: 255 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJISk0CKgEGL1AyU0gv/////wEA8gUqAQAAACMhAiF850NCmPpCLZg6E1c2vK8Y12mh0SRqj5UHoiwegTE0rAAAAAA= +Block: 256 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN9ISk0BOwYvUDJTSC//////AQDyBSoBAAAAIyEDVsPykwKGvHLHzZXEaKdvUxqXECAP9vU1aEunYXrtTQCsAAAAAA== +Block: 257 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFhJSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDa7ISIXjuDKz+uNL5/TL3KYXhTFXj2qfjr02EURWSut2sAAAAAA== +Block: 258 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDFKSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA/VtPpHLdmU8spftyBYtXH857a+QxbZ/5G3YSxObE+lhrAAAAAA= +Block: 259 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDdKSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEChiMwbDSEP/9mZGdOsFD4JM/8Vhhu8zcqulQnDwtEhQKsAAAAAA== +Block: 260 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhKSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyECKsh+x8WJnVho7hFgccsYTtUwz0slkPW7SKfrY3QC0FysAAAAAA== +Block: 261 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEtKSk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDTn70G2FwjOklF1WM+0/h6OHxm6gEkcgB1gXdJ+wxo0CsAAAAAA== +Block: 262 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHxKSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyEDypCWFxqTkpoIgRo1OgVBTuxOMkz4n0IODvsmMFEG2kSsAAAAAA== +Block: 263 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAJLSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhA7Zo5osQ9NKd6UJNOmEqvjmveXdSUeIUkQHv7qSlQ6HVrAAAAAA= +Block: 264 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDZLSk0BMgYvUDJTSC//////AQDyBSoBAAAAIyEDfIBMO0DZ7ILWnWPjgPsbCXd2iCFmDhdnCL9+17M2bcusAAAAAA== +Block: 265 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKRLSk0BagYvUDJTSC//////AQDyBSoBAAAAIyECAMcAWmPnFWdAjyLXES99MTnr6TbIp9rkinzUOV0b04esAAAAAA== +Block: 266 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ9NSk0C+AEGL1AyU0gv/////wEA8gUqAQAAACMhAtK3cpic/viQVF/p4GRN7ZuuFbmka41cnYUgfhae21zLrAAAAAA= +Block: 267 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOZNSk0BRAYvUDJTSC//////AQDyBSoBAAAAIyECHZsSLy6OzVh6BTL+lnMJdJUFg/y+lNn1gQdFlQIu5iCsAAAAAA== +Block: 268 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPZNSk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECR26G1B7pkR0TbXpUbz0JJ3gA+J4ijsBy72VgfDV/xyysAAAAAA== +Block: 269 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBVOSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECuBY3aJnhxeMerlYihgEGBGF9vCfoypFS7Z1Xjm9P6I6sAAAAAA== +Block: 270 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPdOSk0C3gAGL1AyU0gv/////wEA8gUqAQAAACMhApd8Sk/3u6WL5vWSHaDvg3UUaZ604WHJfqODwT7TyA+QrAAAAAA= +Block: 271 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDNPSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDnBENVP9DDw7ClCIT+HHnwbXsUqh9MJ0TupDZ8rDdBoOsAAAAAA== +Block: 272 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBERQSk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7GPp0LHwkqy4FBy0SgDqXYhTiWEsCWs7GNqKgM1iYRPrAAAAAA= +Block: 273 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFdQSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECt+vOKLtL9wKpEUjVVVWrSsQ99sgx/YqV+8/CkUiY9HqsAAAAAA== +Block: 274 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIlQSk0BLwYvUDJTSC//////AQDyBSoBAAAAIyECs2+OzzEBWMfTShnFaTJnjEVCXava4psybbPWVrovnDqsAAAAAA== +Block: 275 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI1QSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECTZvPfgwKuXVlOrX5UJ54Mpxb4uVzFgSN7HYolgaJbMWsAAAAAA== +Block: 276 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKZQSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDU498ZAACzeVS1BhC1r6RWvBYcBlbiq9lLkteirNrzQisAAAAAA== +Block: 277 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHJRSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/RFf4WMmTOKzPGcvMS3CZmOYRCCC+fZzAFrhrULAvuPrAAAAAA= +Block: 278 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAtSSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAn4j+GKryGb9RE6dVgrP62b6Nq6hK3rEjZ+ZmLvWwOsNrAAAAAA= +Block: 279 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKBSSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhAu76Jj0FzhyaSUZQlcV3LuFbz1pOz1IfyvdlM4Oos8yHrAAAAAA= +Block: 280 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFlTSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhAs1FOotXlgkLRDgWQU/yi/aE0U8U/zQpR6PbM6pu0q4hrAAAAAA= +Block: 281 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLBUSk0CUQEGL1AyU0gv/////wEA8gUqAQAAACMhAkdpln3V9AtTGVHXI7VTPBdGiI9Rnb/wO28AHp//mHFnrAAAAAA= +Block: 282 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM5USk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDRMzrgAFXp9wnzwC8uCQqwgnar1WobSiC9WzGZNzfXVasAAAAAA== +Block: 283 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG9VSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA3j5R+g938N7rDkoun/hCAMimKYCp+86cJn/7z13BjXWrAAAAAA= +Block: 284 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFpWSk0C5gAGL1AyU0gv/////wEA8gUqAQAAACMhAgjV9Yp7qlyyUjp5/dIb2fmwXBp7gClhYOOpnlKCdQHSrAAAAAA= +Block: 285 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLlWSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECcSk5hCxpm5aMlEGVoaA9RywmsnNHrssmAsRGksFNnT2sAAAAAA== +Block: 286 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRWSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECv7BfnETqQMg9qkxrz2QfCbDysKg25BOhNICvsMqjw1ysAAAAAA== +Block: 287 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP5WSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyED4HbHp25RfjeF4/IL8+qUbozO7SV8OKJ4XkJ2OZmx+9usAAAAAA== +Block: 288 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGRYSk0CYgEGL1AyU0gv/////wEA8gUqAQAAACMhAtEEIYRvVcin+cG9/gPyEcuYrmfYMyuHqS3SzgnHr5ddrAAAAAA= +Block: 289 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN5YSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEC05rigcMpbb2gI6UjOmpb/88BwcYraM/jY2DxyM3FJmesAAAAAA== +Block: 290 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPxYSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECYiGYIUzxQ9c4YeyROSxocG03qkh20EfIbzSHcErfvZ2sAAAAAA== +Block: 291 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA9ZSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyECjyOgf/1GIcunyn0Cfe3RSX+sTQvyqAi7qJY2IPQ3bgqsAAAAAA== +Block: 292 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHRZSk0BYgYvUDJTSC//////AQDyBSoBAAAAIyEC0V1OVIMreuaIkQHBRjxouu1+JiPFsRewlyid9DhqlC2sAAAAAA== +Block: 293 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPhaSk0CfgEGL1AyU0gv/////wEA8gUqAQAAACMhAxu9yrpjkeru+WGSNSNnYZsFVyczB75DrMuFS0O1yfCjrAAAAAA= +Block: 294 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1bSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhA0YYJPx+9uCN8vVD4mM5yy4P1OuyBMGfQWXC3hHWShEprAAAAAA= +Block: 295 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9cSk0C/wAGL1AyU0gv/////wEA8gUqAQAAACMhAsPL3L0C3ePoQz3QeR49kSGk172zGa8GOtvgXF3j8AsLrAAAAAA= +Block: 296 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhdSk0BdgYvUDJTSC//////AQDyBSoBAAAAIyECGX/6hW/UpcmWJHDxEiKvpWKpxfMAM0UaWGEZX90iA96sAAAAAA== +Block: 297 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHddSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDDkC6bD0vBFNhdHlq71Fra3jvriynTUE+Tf8VCLYcE4ysAAAAAA== +Block: 298 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMBdSk0BRgYvUDJTSC//////AQDyBSoBAAAAIyECV+oP9slNLFb1OX8bo+r1BWGUuIA1T7cz+9WfbiDfyQCsAAAAAA== +Block: 299 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMtdSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECT/h+SGj1AvaJDPeLhBajxkANRuZel1P/8lBAXGHmxB2sAAAAAA== +Block: 300 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCNeSk0BVwYvUDJTSC//////AQDyBSoBAAAAIyECUDdwpPmbGWv7WSTQzccC+ZGKRZMQMw9ueAQebmL/Fm6sAAAAAA== +Block: 301 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDVeSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDShd/ShSrI5j25YHL6AdMyynwXwPLE7RA3zih+25NfPSsAAAAAA== +Block: 302 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKteSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDm5d0lWNxKRpg4haXTbnqyGGh4TkM6vqhwN5cKO9uET2sAAAAAA== +Block: 303 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ5gSk0C7gEGL1AyU0gv/////wEA8gUqAQAAACMhAxNe3FaWa8OEIOs7vES7Q1oobsGXPC+ZdrkgxtAxIxCGrAAAAAA= +Block: 304 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI5hSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhAiND40HQsVyLEQ9MBsuL2VRt2j781ePe+RlnqwIjCn3HrAAAAAA= +Block: 305 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNlhSk0BRQYvUDJTSC//////AQDyBSoBAAAAIyECskvdq1owUIMtUU0/wCJxztKXIn+SEb9h0o9tmH8Dbk2sAAAAAA== +Block: 306 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBpiSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECiHXTU2Qrp89KYrw5yarUE55ZxOgJK5p4QOC7f3Li5jWsAAAAAA== +Block: 307 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHNjSk0CVgEGL1AyU0gv/////wEA8gUqAQAAACMhA+bmB9+1FT/JHTSR0DXe9L5qTZMUGMkeCyAqvAh9x33GrAAAAAA= +Block: 308 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMZjSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyED04A+WhT5nJIlRChBs3K3PqoDj3GKt6Xs2ib+bI0EQlasAAAAAA== +Block: 309 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDZlSk0CawEGL1AyU0gv/////wEA8gUqAQAAACMhA9sulRR4GAhwIIoWySbA7Dv8JiHu3R25D1UuAZgUdmnBrAAAAAA= +Block: 310 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDtlSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECRAZ0utIh6PixGzYmncAGio8s9Er18UDGf8YOrr9qkC+sAAAAAA== +Block: 311 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMBlSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhAp2lvs7yS4KPZo+Rzl3O5r2U8zxJqx9BAe4RNWejmdmRrAAAAAA= +Block: 312 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChoSk0CYwIGL1AyU0gv/////wEA8gUqAQAAACMhApggy0FpE/aiEX61RBVgGj/jLyb+aEJkkApHWkP8SjlNrAAAAAA= +Block: 313 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDBoSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyEC1RZXAXheb0vne7pyxo0wJ+6gdMp8KrGy1ogtsA90N5GsAAAAAA== +Block: 314 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDloSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDu6E6EXgrPYWgrmSNq2HKl3o8Huo6YETBMtmnEkv4jh+sAAAAAA== +Block: 315 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKJoSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECn0ZcxFfxFSVd1QxxYiQy+4Xr4WgsyIV+bOGMSNJoxLOsAAAAAA== +Block: 316 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK1oSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECDR8TNLIw3DOojCFg18iSDPPyHd5Hr0dY4xZU/AbTpCusAAAAAA== +Block: 317 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBD1pSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAx/cpRd4jHhU40CZ3Tt09V6NV6fRnY6oops5AaK9hFkHrAAAAAA= +Block: 318 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBExpSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDWz3ypJACXosV1QLe/I8ajC08ezpMgRdpPO4RCyt0oP+sAAAAAA== +Block: 319 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRpSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDEQInMLJ9QQ6q+X9sFucLwJ22KlvRzbpgCcd0bRFvMdasAAAAAA== +Block: 320 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPJpSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDzDSFi5e6rt2VKVQUkHqaUJtMy4mH3KJzocE3/EqmW9msAAAAAA== +Block: 321 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLVqSk0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA1wQCXL/jFctyA6qFalYq5kGTXxrnlXw5kCN7BHt1N67rAAAAAA= +Block: 322 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPdqSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECYcgeGzWMxdkmN3wHj3FqGdiqCZ/s1gvDeaiJl6GW/m+sAAAAAA== +Block: 323 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBANsSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhArOwhWKN7fNEsylQYOs9FrELB8SbVvlhYfyWK1AIUYPyrAAAAAA= +Block: 324 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA1sSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyED6SIqWnTyJt0LeaMotEXe1vnDoifwcnOYzQ3GYPtKBbSsAAAAAA== +Block: 325 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBZsSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECW7o6ef/zh8wZx+wqvW+PGW49b2dGgXC3Olhnx8pUaWusAAAAAA== +Block: 326 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHdsSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEC54WZrmPKmTwjRDgZxaPojONpKtkTfLE1MDfDfNR7So+sAAAAAA== +Block: 327 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI5sSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyEDjSNUWZW6G78p6QlDKas3EGrj5TtxwcWmCpdLrLQ78CSsAAAAAA== +Block: 328 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ9sSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyEDzm4l+afXBIHj0t8M3TF9aBPC0y2yb2ShJrweti1oJ8GsAAAAAA== +Block: 329 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCxtSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAq+s961cy+5zZRwWiP64GdvmGWaCNG57f8agT/pQs78OrAAAAAA= +Block: 330 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJNtSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyECeYMamvcTAjuxTSHsVdyGrWsBE+DREQ5pcDlZFwbdJOSsAAAAAA== +Block: 331 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM1tSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyEDd/5YWLMVLlnl0XfU8rV5PwVj48yLh1H0H+xLZX1pTESsAAAAAA== +Block: 332 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOltSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDE9MeitjuD8RJO44P/dQhK8nRfb4w+WbPJQBn3TuQbyesAAAAAA== +Block: 333 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG5uSk0ChAAGL1AyU0gv/////wEA8gUqAQAAACMhA7TFGsk9cOJsjGgjkZUqCZ1InChkARUKbSqHyGXzb8WHrAAAAAA= +Block: 334 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAlvSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAgkQvHJqWPZWjZhL3O8FWochVbyoXZvKo8mRAAlsubADrAAAAAA= +Block: 335 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGtvSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyEDToi/gEVC+9ATssGR+xe8TrEGe7xT087HDfTpEaFQ4JOsAAAAAA== +Block: 336 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL9vSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyEDpcbNO3Den8ygi53GyDQNLhsM0AFsemnf+q5+f1SZ3TGsAAAAAA== +Block: 337 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRvSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDjTbrEyBGn55+QMdhMTW0ALOjMiBxJVdTv7O8vjz0PbKsAAAAAA== +Block: 338 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNxvSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyECv++suofydbTR2BshSi4TFSv9weOt3ziWGZSuXgyzsEesAAAAAA== +Block: 339 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLZwSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA7QLYU686ntrf/wH45PCQjghwcPS0KP7GuUWIrqCcE+lrAAAAAA= +Block: 340 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMFwSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyEDqkfWcPmElLwGnloEQGeiJaKbvS1ttNJcSJsrwc4t9FisAAAAAA== +Block: 341 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEJxSk0BfAYvUDJTSC//////AQDyBSoBAAAAIyECnfOs+lLcdqrdzKNb7tGW6n++dVtSQ/Uz6mTcWZwsHhGsAAAAAA== +Block: 342 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1ySk0ChwEGL1AyU0gv/////wEA8gUqAQAAACMhAj0hDV0TQPXA4+ZuWecJc39kBtnueq0mwtFSnezLLUv+rAAAAAA= +Block: 343 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH5zSk0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhAtgsz0IPBasVvf73ZzDk/OUgRonWeLSaOTCswNvd48zdrAAAAAA= +Block: 344 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAB0Sk0BfQYvUDJTSC//////AQDyBSoBAAAAIyECcEHP7r1zbYuawJrt6no2y8N8tnUk9Mib+I/26ZgMoAmsAAAAAA== +Block: 345 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBR0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECAfxLln08efJ1y0XyGJRaEiNLIUELSr/LQk2DOL63wDCsAAAAAA== +Block: 346 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDl0Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDViUFv+39ptdQjCVo0V3s5b1sna+2UM37QPdSQEGR+KKsAAAAAA== +Block: 347 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNx0Sk0CnwAGL1AyU0gv/////wEA8gUqAQAAACMhA7W6nNXsPLrQGlqXYLjbrH4QA7Yew5XzfwgmmJ3++u0wrAAAAAA= +Block: 348 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOJ0Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDjWYOqswb4F95Qu4QnQD73TpcFfXYuTI5UHMx8qONuY+sAAAAAA== +Block: 349 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJ1Sk0CuwAGL1AyU0gv/////wEA8gUqAQAAACMhAvUBO2CyHCfprywohcYCrObMWDjWh4iGylfRt42/1Ke2rAAAAAA= +Block: 350 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNB1Sk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDY8Id8oMz8KkrFlWs2zYsO5n/HftyDzj3GKHxJ9V9CiisAAAAAA== +Block: 351 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPt1Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyECpw3MG+iKsTO2dOw/kPpg2bYgLtbrx+NRY3tAjb+cTVasAAAAAA== +Block: 352 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP91Sk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDJcoHYbHrsuX1EfRdUswfmhHkLNFPDIkdzadoUN7QPEqsAAAAAA== +Block: 353 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH12Sk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDHumdK3hqs7CZEyXy3oSJJGpqP9twD20FEbHYDPX0zUOsAAAAAA== +Block: 354 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJp2Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDHqOre8xHkf6rEaOlIqsM4UBRkFatZaXfGW/BGLvg9CusAAAAAA== +Block: 355 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCp3Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAoKaYUbtTnM73y3uxNDqKy2EjGcfb32Ucwh9Md77ea1crAAAAAA= +Block: 356 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF93Sk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEDBIr7jOb7aJ0a/iUHTn7M+cx5guxmfURqOuKR91Hfm5OsAAAAAA== +Block: 357 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAR4Sk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAtnHD4P5OuLMEOMkwaIhv/0BZgFPVfwHf+doYzMyMdTbrAAAAAA= +Block: 358 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLl4Sk0CtAAGL1AyU0gv/////wEA8gUqAQAAACMhA0dcBAU1zrAGZtQrALMpjf60ui9Aio1qm+lL9lzAHraVrAAAAAA= +Block: 359 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDR5Sk0BdwYvUDJTSC//////AQDyBSoBAAAAIyECu2AGwvBdGHsRUnGxV3tYL18ftxBRiUhHSPiZ31qmXcWsAAAAAA== +Block: 360 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDh5Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECdJAbBaGTd0AVUcdVxiIt31Liw14t1rADGJpqXUlSbvysAAAAAA== +Block: 361 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGh7Sk0CKwIGL1AyU0gv/////wEA8gUqAQAAACMhA9D5EgGSNwefKx9VG7GdxvuZGSqjQoPzZM2jAI23Yo1YrAAAAAA= +Block: 362 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBN8Sk0CpQAGL1AyU0gv/////wEA8gUqAQAAACMhAxGnoExVuiond8iy2n41H7oZmGcEX6VQWZz+3O0c9cXprAAAAAA= +Block: 363 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKV8Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAky76WsHdHTJbAkvnuv71R2saHBNel6F+sWbfPnJ+TyKrAAAAAA= +Block: 364 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKh8Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECwZ+K9C9cBS1I97OKfXeQJ5tvV2pyVJBYOT928W8+IKesAAAAAA== +Block: 365 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNF8Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDPW+87EPmSI5uMg5P8lfuj1SXRMdSzCHcu3EnOKEaTh2sAAAAAA== +Block: 366 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN98Sk0BCgYvUDJTSC//////AQDyBSoBAAAAIyECmpEQKEnlGICR+RkxXGObpraJYmDOMJRTixqGZnZYADmsAAAAAA== +Block: 367 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPx8Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECLTqckuVJ7uIQT0VfNhCToauL6WpF8Ou/lrtUqn/k1+KsAAAAAA== +Block: 368 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJt9Sk0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAxyoEW56li5Lxiceziox0uHpnsRqAMLMJFxCOLte8oCBrAAAAAA= +Block: 369 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNR9Sk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECsCKD2KHnlrbyu6WUGTT4JIEZZvQMv9PmvEbRwSoD4DCsAAAAAA== +Block: 370 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMp+Sk0C8gAGL1AyU0gv/////wEA8gUqAQAAACMhAoIdJ/fOa8RZvWU7iU/aGUaiOrQCMgKT5ZMJb2Vjk6SbrAAAAAA= +Block: 371 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNJ+Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDMXygp4z7PzMk9L7OEaGTetj4XOyHhWB29UHISJMqUIKsAAAAAA== +Block: 372 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP9+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDVX1IbruQG/FSHMZBck9prAvpQODDfxT75baRcm5iw2KsAAAAAA== +Block: 373 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBB/Sk0BDgYvUDJTSC//////AQDyBSoBAAAAIyED7q6wlz4R1zS4FOXOMyh4RLvVCAQ8AldHstZlA6PlZe+sAAAAAA== +Block: 374 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN5/Sk0CywAGL1AyU0gv/////wEA8gUqAQAAACMhAu5RJpSItwynYmPLEtbLfLzyCaG8cyfnEx8VTm4LOk+brAAAAAA= +Block: 375 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO9/Sk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDH/sHLBmnyAmHAmSlPZLUclfVIzBOl1ZgxCXL6yX14MesAAAAAA== +Block: 376 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG6ASk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEC5GhzlVJNLsDjLR/rP04KbenNO/6fkglYm+N1Wuo4LwisAAAAAA== +Block: 377 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDaBSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/kTeZISeowcv6IKrLBhWHjeB2wqtRN4gvvHh8CmHR+trAAAAAA= +Block: 378 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCuCSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhA9/eKmncdXdW9oiyDggTgYtgoZarW7FmkalS/WmZTHnprAAAAAA= +Block: 379 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMqCSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhA+zqQs/smSu3+uNnC6Wfr3epSEQDCasZgNQ221DSkdYvrAAAAAA= +Block: 380 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNKCSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDlg7ykxqE16PC4P4V7m7mW+KY7t61w2tV1aq/4EyVrdSsAAAAAA== +Block: 381 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGqDSk0BfgYvUDJTSC//////AQDyBSoBAAAAIyED2sP7jeQJZfQvtK+zuqB9MwS8KqKM/CXxK1LxUjaBRR2sAAAAAA== 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 +Block: 382 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJSDSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECyQc/AvZwyrHTCiSHE7OVE3hiXYaMb6HcDqixfIzW5AusAAAAAA== +Block: 383 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNiDSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC76d0dqCFNEIwEJdooWxlngL6mw6wnOzB3G/MzEq8qAmsAAAAAA== +AQAAAAJDTSsPKYh0w/bYRnwH3qaIOmUN4A1IKYzW+0joMi4QWAAAAABIRzBEAiAr8Xh4YIOG+y576Bs5z26mLrlAc/tSCVdA3AoYdZ6eOAIgPmpvra1X7KfblGuLSMBoyHx6m68HXlsomUEWwrMSa6oB/////+c5F21itYhWavpH9fu8DsAao/BYwDbKDujzzRPkIj4BAAAAAElIMEUCIQCiUWkgI7wj6Ls2yBHmgQoCSA/shxmxAnBLCnlimmuvmwIgJpQT7kHtd56+dMGlQKwc0knzs823gDNzP1cirD63EToB/////wJAT8PtAAAAABl2qRSyIFpNvB1YfF0Hdpl3lisXPqtQdoiswJRIZgEAAAAXqRRB+2UE+LyyggZZYYT9QKXtQrzlPYcAAAAA +AQAAAAJsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgAAAABsSTBGAiEAl0A6zPd6BxFwZo+o+MJIyjIeDRBNW3IC3DXAoWh67MACIQC4o5tDaAYqIV7qU/+lm3dRIIEiYwZ3SNPge1XCDegKWQEhApcd1yLs7nu8PNvIxqc2XbdBErbsQTarPVdzS9gNeEHf/////6ru+FspdiLs8xHcXSlmn9TjhjRUxv7qNh7OT1R7pS5qAAAAAEhHMEQCIGQTIa3I+y5klSwSm2zDINek016Q8pokSLGPrELPIZXDAiAeLkfySMQvKc2L0/DtY9eXCYud5hIc57VEkDZfxXNcjgH/////AoBAtigBAAAAGXapFLyfR0jI5kmy0HcomI7spk3zCtfjiKzAyq0qAQAAABepFCkLujKkkxV4mgMLtAsAR/j7kP9mhwAAAAA= +Block: 384 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHGESk0CjgAGL1AyU0gv/////wEA8gUqAQAAACMhAjEGa4bqDL3auhqvd6WOXyPzubyhsKYufOFrPP0fx2yXrAAAAAA= +AQAAAAKONDBXPP3i8+Huzorv5mHdhBvLZl01gyQVurT3UmeFIgAAAABJSDBFAiEAnMqPscSjSYLE6aWf0VhWQEwCCF+SYEPPxmZJJKW5420CIFgR+Fs5XENJIWS4szhn10UhHYx//c0bKI5W9029rtFbAf/////jq/WYGhvWRX7Azcq3bMKhdtwNfhb203ga68aE8TzE/QAAAABIRzBEAiA4e7zumeNw6iEV6sz9jEjrOAZTMDtmxpRuCQP7C7xvhgIgKy7wSFGdRVJUE/ZLcnodhf8s99katGBzCCJLTDDVhGgB/////wJA8fI6AAAAABl2qRQiA8pZ7fZpaXV+bMkjixs29Nw1uIiswPIYGQIAAAAXqRSeshmA3J1BPY6sJzFJOLnakg7lPocAAAAA +AQAAAAJzosVNU2wZ8NCRVu+60Yym+WsenzvISQNClY8k7Y/DLQAAAABJSDBFAiBMhuLgS149dvF38s3XyBcLJctyfM8cmxTOkmK2vGfp0QIhAPp2suH3JfxZ+04h48HWZ40QgcHt04ESfQJjzRuypfBTAf/////oBzpcCoD5jhX8Auz9GV1ioEUEKyc8ZVyLNg9mYOjnIgAAAABrSDBFAiAtloB14eFcqB/nJUQNxjV+AgMBlyXDygW3fL04vMVdBwIhAMZAhqcGKbMHV4U1XYtcVXdyvsnG/JZiNfkwUw0ympNkASECOZ3dTkuqwZZe/E2IJlbySGa+FM9bz2QiIzTx/dWSBIH/////AoDi5XUAAAAAGXapFHzHj+QlGySumyOjmeIWCHnxiDNiiKzAXuOhAQAAABepFONxeCWCpK3bVBNixVVl0s31b2SYhwAAAAA= +AQAAAAKjDj8UKb8qjtFMpuyfM5a4WTuLtqweTTW9Q18FBYCU6gAAAABIRzBEAiATvXKkQqFB1YzKA4QXAM1WETClMNONxQymJ4EMqf6DbQIgZpBxlR1C+pCwJjN1I+H/PKQvojKsHUp3ZpLoXXBjjJYB/////yQ1aPL/a/kDhqTXV20jzZIqgpx9mK0SUdeNnlGk32HyAAAAAGpHMEQCIGom075AfeA/vSILSItlgz4/T7VRZM1a69VJr4UGADTVAiAjOn1iq3gqJGfXl+IHbwQ/lgzkqx9gfCkiuxRlhPyrZQEhAsukzpMrON2dpTZox4fT/D0ks37RFtlrQsWIWFqGWf1W/////wLACT51AAAAABl2qRS0Qdm9GwTXUvkfFNxk7Xx7eu4TT4iswCh+3QEAAAAXqRQJ9wuJYWnDeYHStUs3HfDYGhNqLIcAAAAA +Block: 385 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCOJSk0BYQYvUDJTSC//////AaB4ByoBAAAAIyEDumW4wKCi0CnkzevDkYheRm5ly9+odjj4tkYNDSvo1aKsAAAAAA== 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 +Block: 386 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDKJSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDeTdOC2CP5ahK99R/fs1AWCY1BuzhE4oiDZ/tLY00/x+sAAAAAA== +Block: 387 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHyKSk0BLwYvUDJTSC//////AfA7CCoBAAAAIyEC9BAiK0EeqqMVSmZ6mkClvJ3+6BG153J0iJPKHv1EUl6sAAAAAA== +AQAAAASxJMyn6WhjdTgMhF0P0ALtcErvRHL0zBk/ykqhs0BNpAAAAAC0AEkwRgIhANPJunhkiDI8l1/mFZPfaoBBxUQnNvNhiHq/5clxdccrAiEAymFoj0cvTAHt4F/8UEJtaNs3X3KTe1851ng1sZG2QC8BTGdRQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZIQJ/EMMcsq1+A4jPUYeSTxKUCCul1MaXu8p/2Dpq9h231VKu/////7EkzKfpaGN1OAyEXQ/QAu1wSu9EcvTMGT/KSqGzQE2kAQAAAP0VAQBIMEUCIQCjW3/BlzoKiWLCQKcza1AeFJ7xZ0kQgejfkdx2H06WwgIgBO5NIJg6HQ+5bpvt+G3gO2bXvFBZUpWx+ztf0nQN88kBTMlRQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZQQSVti0edqkV5e02lCmMUBfSgY0irL8qi9n6TPY1GE4VJH3H4aSL64LB/d3DuErFjOwSyPi5yoM0GskCmcaX/JTLQQTjOU8+6kC3q+MvStN2qA9aITKH0TYbVYDj/nDROl2wZm4lkyg7a1q8AdmM//VnnYw2t8rvocTfgbELxFw4Et5fU67/////sSTMp+loY3U4DIRdD9AC7XBK70Ry9MwZP8pKobNATaQCAAAA/V4BAEcwRAIgYG1hh+Ct5pGS9KRHeUzau46ppOcN8JqovGiSQsf/7e0CIEFl7I7fyd4Z2KlOX0h8igMBh64WoR5XWpVfUyqBtjGtAUkwRgIhAPd2R2PRd1f/3to9Zs+qatO491ndyV6Pc4WNuocnYmWKAiEAnpA9UmWV/51tU4NYidgW3kxH14Nx16EyI/R2ArNLxx4BTMlSQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZQQSVti0edqkV5e02lCmMUBfSgY0irL8qi9n6TPY1GE4VJH3H4aSL64LB/d3DuErFjOwSyPi5yoM0GskCmcaX/JTLQQTjOU8+6kC3q+MvStN2qA9aITKH0TYbVYDj/nDROl2wZm4lkyg7a1q8AdmM//VnnYw2t8rvocTfgbELxFw4Et5fU67/////sSTMp+loY3U4DIRdD9AC7XBK70Ry9MwZP8pKobNATaQEAAAAikcwRAIgdcBmbUE/yFzKlOovJK3A/ttho7oPz7JAwaT9JYewO/kCIFJa1Nksa/Y1+Ll8GI6/SRxuNCt2elQy8xjLsCRaf2S+AUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmf////8BoCneXAUAAAAXqRQdnKce+jbYFEJOpsoUN+Zyh66+NIcAAAAA +AQAAAAGUV+Zp3Gs0TACQ0Q6yKgN3AiiY1GB/vfHjzvKjI8E/qQAAAACyAEcwRAIgRA1nOGon1nduECuCzi1YPiPVH4rDu5R0m9EMA85xQQ4CIEG0bF1GsU73KvnZb7gU+olAd9U0pN4SFTY+5o+41PUBAUxnUUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmSECfxDDHLKtfgOIz1GHkk8SlAgrpdTGl7vKf9g6avYdt9VSrv////8CUMMAAAAAAAAZdqkUYWeuruxZg2siRHuK8sXmH7Txt7CIrACj3FwFAAAAF6kUnrIZgNydQT2OrCcxSTi52pIO5T6HAAAAAA== +Block: 388 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKGLSk0CHQEGL1AyU0gv/////wEA8gUqAQAAACMhAwX9IJKSmlcapcG4YDQm05VDWbbhumnE3UuFJurVG6j/rAAAAAA= +AQAAAAFsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgEAAABrSDBFAiEA2eqQkvC+WlQ3MHYZM3373Scyzz8j+Zd/tDW0pbS/RmgCIAw33THNfTjV9LmgDHUekFk1b+8O1OiPUqdbTnx0PzRNASECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhb/////AsDOGB8WAAAAGXapFCOVLLskny8m3VZ8LoNF14XGNUN+iKwA8gUqAQAAABl2qRQyBAF4xc+ByyAKuZrxEx8Yd0W1FYisAAAAAA== +AQAAAAEkNWjy/2v5A4ak11dtI82SKoKcfZitElHXjZ5RpN9h8gEAAABwAEgwRQIhAOmPoLEPUZJMoLIdyy8enTg7ZSzi9RkWyu7x5H0T/2ekAiAmy5/zI82unted3YKaDMG0nJN0wmKT9U2RnLbcX48K4gElUSECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhZRrv////8CwNinAAAAAAAZdqkUSy0ZmkDUiL5v5TBaHUX0kFOvS/6IrADyBSoBAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +Block: 389 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAuMSk0BZQYvUDJTSC//////AVC1BioBAAAAIyEDJGxAijhRNKm/X0EFXtwmUwawz0PM+8WvaeoSnQegJsmsAAAAAA== +AQAAAAJSJqjPEi4VVb4BqQCCGW1UhFTnPFG0i0G7IE7FOPIZ9QEAAACMSTBGAiEAuW4v0gFbs/4iwjxxLDrEqGNtSnjffWabq9ZOq6MUwjYCIQD0AtfjOS0XcM4r4Mgj6rASK7g+4L1l9d5Uof61PkUu7QFBBMS+5ebbtcFlFDfLQ4bBUVx3dsZFNQdyBMbyTwWjfQSjK8eL6yGTtTsQTJlUxEsM4Wi8eO/V8eHH251sIbMBZZn/////cRmMYXCfjZiDFfRfo/kWCnDwUlX72tDY+6yriJwASNcAAAAAa0gwRQIhAJLpb0GF/Bu3S02cJYIZ3F/8ca+0PnPsDni92RuvvjhuAiAZ/Fs9lgIAW2H13HXnvU3eHBmgcAwKeVhQNSgBTTkBkQEhAidOrgHTkbvsMtS2DiTV0k+cwjyo2mcIz2wGI4G/pxAG/////wEA8gUqAQAAABl2qRTb+JUJF2qXXkHQTMCvJM/I3kOUqYisAAAAAA== +Block: 390 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFmMSk0BSgYvUDJTSC//////AVC1BioBAAAAIyEDfDnB8DlD9eTbYyQ10IiEdqtdt+iuGlZQ79UD9qNfIXusAAAAAA== +AQAAAAboBzpcCoD5jhX8Auz9GV1ioEUEKyc8ZVyLNg9mYOjnIgEAAACSAEgwRQIhAJBBmeGlaJDYHZVXilP7vGU7cdJTv3r7amIwhMR/d2oiAiBLCE75DLf+MR9xDlFsEicgKLcHFnZ9oJKTjUE1kaobhwFHUSECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhYhA/SA8bZI0NUWeAStTVhuDnV8wz/eDhM/0DbkXWDS21nhUq7/////cRmMYXCfjZiDFfRfo/kWCnDwUlX72tDY+6yriJwASNcBAAAA/UgBAEgwRQIhAKw06INxKPXAIAp3h4XdxMp4lNsgehkH6l8Hvg+qU3gHAiALmCUQrc2gBtRykbvnIMXsTxqmZl+ussn02o7Kgu2dSAFIMEUCIQC8Uuohl7lOF/B+vPq5rc8Ngog0SbkOG/FKc/VY3dToDgIgUkflx+QlIbxHuyHr83M5oGpBvQF4NK+EpHKPVegLxt0BSTBGAiEApsB3UUPvfleMYVn+Ln/0B1PZYiMLilAq0xqY82mnfLoCIQDgTVrBnqsoV8PEphIESZBCtZ3j01qvPjyNvws2yzvgHQFMaVMhAsoqgQqxckm2AzoDjeVjmDiBtAaScBg/PAq6lFZT5EIWIQP0gPG2SNDVFngErU1Ybg51fMM/3g4TP9A25F1g0ttZ4SEDwYEx2N6Z1F+3KndMqwzMJYzSq9lgVhDaILmiMsiKPLZTrv////+yyBJsy4LbegArWg61VwLSRQwVwpcxOUYPwsu8yK/XEwAAAABrSDBFAiBhi6lNXcCQCSQGyymONwRsC0dtDlKax/X/Z/HXZKJ81gIhAOl6XNOJyFP9l6HLVkpn9ka2xi1Y8H+2/MbxK+ksTOEAASEDEnxLvPb/FM/YU7+SF2lxMIy3shLaKORrKJ1ERMQhXlT/////ssgSbMuC23oAK1oOtVcC0kUMFcKXMTlGD8LLvMiv1xMBAAAAakcwRAIgARPiavSxwFKjCTfQpdu271OiaQMiwWa1c2soASiVUlECICoikRfdzJJoZBcygWBPfIfgoF4iaW5V4gXntkCti64hASECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhb/////UiaozxIuFVW+AakAghltVIRU5zxRtItBuyBOxTjyGfUAAAAAa0gwRQIgB9HtDBH9oIsz6+c+OdWR27B2zo6Z8ZhPxlH60Yzol8cCIQDgtVEqPco7rZ4LEqPzsF487AA6rT0qNti+K4OhzoofWgEhAr/BmwSVNL5aaSq0IHiWiAfDuHu1DKR330rNKW4p5RVz/////7EkzKfpaGN1OAyEXQ/QAu1wSu9EcvTMGT/KSqGzQE2kAwAAAGpHMEQCIEnw8K/fx/3SDZ9lT+ozvSqcdZ3kkVnpgoDVMeXkyxWSAiAc2Vz/wIYiwy8Q3uzcvAbj1Uhjg9BfdDAXmjSJwKBkxAEhA4c2LbJ9I8veyiFmSLo7pRnVO3dqYDHPjucKh5ODqZ1x/////wLQ3QYAAAAAABl2qRR+my2sJ4obHRDml7wpo2A8Cy43pIisgHN9SB4AAAAZdqkU2/iVCRdql15B0EzAryTPyN5DlKmIrAAAAAA= +Block: 391 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI+MSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEC9TSrbZ8/QJobDAd6MZORdK4GdzdThyfnkyXDILNNmn6sAAAAAA== +Block: 392 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFKPSk0BOgYvUDJTSC//////AVC1BioBAAAAIyEDvoTLWezyb45BZ7zEyR3Us3sUS0mYCzmelEbXIY64AUesAAAAAA== +AQAAAAHOQV6rnLo1SuBCwirJ8Gwaadel26ZxNvq++T2C83TdPgAAAABJSDBFAiB3NTA++3Fv5asTpCQePVx2VWuL5ToC8wKbhih4iuS8igIhAMZyNEufv2E8KRo+dfJfmzBLeevpe9ryVLihAw4NKiLiAf////8BAPIFKgEAAAAXqRQpC7oypJMVeJoDC7QLAEf4+5D/ZocAAAAA +AQAAAAGDKMjO0oyVqz+XgfONl6reqgfFgmf9roJ6x8plzhnwKQAAAABrSDBFAiB7cPcRvrTWTdVObIsT4VYcgwJdynx08WdNHm99d1PgwgIhAPJAUfw4vVIT147Ze6bYJCz+d6m+GcuIT81RaeHrRQKJASECZmcCPB/PiNe87QJpmXx7gTbPIOmu3oP/WVFORzQPHvT/////AYAaBgAAAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 393 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIGPSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyEDNpb7mdoBVlmuNermDC62XfiJkUfwG8ur8R0qSulSX4WsAAAAAA== +Block: 394 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM6PSk0BSwYvUDJTSC//////AVC1BioBAAAAIyEDn+iPQp+cSxRdE0IKHAFZmt2djOluPWsZhmm1BjnavT6sAAAAAA== +AQAAAAHkoS/eVsA+6hrLXrG1fTWrHablXVROghLEfOJ3QWsbPgAAAABKSTBGAiEA7es8koOmJhXkaSVtgxuox0Ggavk/t3eKgZp0LwcMRpwCIQDrYPJhNBhf4pz+OvDnT7vMhX+UrcxmFmDdjF2VPlotbwH/////AQDyBSoBAAAAF6kUQftlBPi8soIGWWGE/UCl7UK85T2HAAAAAA== +AQAAAAEARQQA2oX+EPd8W3TQYEMAO8TVxDpZyEeAEdKBR1IaXgAAAAAmJVEhAsoqgQqxckm2AzoDjeVjmDiBtAaScBg/PAq6lFZT5EIWUa7/////AbAuBSoBAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 395 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPmPSk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDOcEdldIyfNcAZe0ChYQJazMtYhbi9QeycTlbwnTERmisAAAAAA== +Block: 396 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA6TSk0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDtvkQ28+OY54ki+oXYvWa0fw11k8vxB/B4cMH7V58twOsAAAAAA== +Block: 397 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPyTSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECx9UHjpCRe3FVOjaiFqNnSgnF3v2HBWMDbbwmwU43LEOsAAAAAA== +Block: 398 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDiUSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyED6NynJo7IyuATbKSg3y1fpVP8O+mZS7AI0jEGsnyk6TusAAAAAA== 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 +Block: 399 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOSUSk0CoQAGL1AyU0gv/////wGADAwqAQAAACMhAwWATENJI4LZrxPmcvXDkIP4oILvDlNtpSIe3aTmbHs5rAAAAAA= +AQAAAAEYemFomu6WB6jgRLcc5wLhLo93JCrQbCIQVqLmKvjenwEAAABvAEcwRAIgMUBB7UkPFcKRwpQ2ppmrQEqAddlVGHWCxYOxDT2CndsCICAzb1oew8QRUfeL0wN/tUn1kcW4SC1a9+QYVf182CmeASVRIQLKKoEKsXJJtgM6A43lY5g4gbQGknAYPzwKupRWU+RCFlGu/////wIO5f8pAQAAABl2qRTA+jRUjiO4R3d2gGNIjjYeVHXAqYisokkFAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +AQAAAAHXS2aZtfwFQBnJTbR6pJBfBqBzDafhLxQWNarOn5uOAwAAAABrSDBFAiAmSZcfqh28snMwDar+myEZCC+zxsGVHLTItnIHif9PVQIhAJulOSfmABxEbf26o8qF8Z+7nXW1hnPL0VHZkYZ7/oFpASED8L+R4mecWZoxcSk/4Umczfiqw9HRCo/BnVT6SSMU+1j/////AsTH9SkBAAAAGXapFGu5nw1ZHDUK4KHbZH4c0eVS6PM7iKz6WQkAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAE2eVAxYywjiTegFBCqu0uBMkHUkuU/F391vqZwfy45SAAAAABqRzBEAiBAQK7Jahx3MIM1iN7ho/onuCnBKBNsgPskeWTDPxkh0wIgPdW3JCIfUO7D4GC3eC8jzbjP+OapMXWvbOlRbgBlxaIBIQNhca5PrHXijaGCrWaMJQg137sA2OwIlnGdCSnTg+4Y4v////8C7DvnKQEAAAAZdqkUY5ELymWFNoy3/g8x9bcPUUBUV4yIrIjIDQAAAAAAF6kUIsNpkEhO6uAL8Qo6dJeAC9DfNMSHAAAAAA== +AQAAAAEpb+k5AA/ztHSWTCHX+6iMYNeKmq6uENXr9V9cgvMOCwAAAABsSTBGAiEAxuEhqXApzED8r6FAL+y4hhHRk/LdnQqIWwzNjVYfD1gCIQCtPqibkMWAlF+AI6/Ae+qnyXwU7Kpe46Ome+hTcq8T2wEhAohuoz5IYQsp5skgDFRa3Txgdvxjsy8AGqml8D3+1sjj/////wI9Pd8pAQAAABl2qRSd1DexqbPGJvIj81jtpvKkjYuEWIisXzsHAAAAAAAXqRSZXr9dnjcFYRO/VrWJO0SvKktBj4cAAAAA +AQAAAAEy8Ytk2HmGug8/K66bkj2s0/qcy0B3UytaQ5hWTXgujwAAAABsSTBGAiEAtAA5AEJBF1I+u36MCpxXhzSgl/cM/CnNyQDaUAgsfR8CIQCcmP1p+dzb+ESjvy5pyRyWTqsswtJpmNweUhREvD5jTgEhAm/CSCKg7nlegfy0qICHE6KBO2nBIpwxZ1zvGQam6a5F/////wKjcdopAQAAABl2qRRsaEfTwgmX1Pcbsc8IBcOR4kIlnoisSggEAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAHeeGceSSZdHU94KZpwntO+yJ9zd0chWXc4TzwOjZNcOwAAAABrSDBFAiEArPj3U43jIhq0aIJFnwARQOl1HTsw71RqncGpl9r1Vg0CIFZ8Wi6teik0a2I8faD2hJEotPlqgefMeW3/KK71owaZASEDnsThhAFyNC7+eYnVNPtgJ78wpnn4FDwAXH3g946IHRv/////Aluq0CkBAAAAGXapFD7J68nMuNbVW8QCYXwGGntwYZX/iKz4AwkAAAAAABepFI1tVcAzzinCd63Lbz8rkcJZN98XhwAAAAA= +AQAAAAFV882a/8lBiW3mSCozGzkl+cFPa4lS1DitnbAk/E+rTwAAAABrSDBFAiAOw09Uj3EPXaEORyENJR8IeGpm5IX5EbPoCoAfz5chHwIhAO5dXG8PSpmsBHMbBJMzA5Xhwu1gF7CAcryk5pCx4K1ZASEDMeou/3Yr6k5eErytbqBuB1NYLuW4DUTIXjR/S2BUUw//////AqaYxSkBAAAAGXapFMj12lDzBNDLmZ4R9WxYoY2hk33UiKxlTgoAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAGftEel6MpHDpkuXZ1kKvi0Qal2B5jJxitUqDjzhhUAPQAAAABsSTBGAiEA+Gdv809SSSXZObCPMpaRd0bp3OulpBhbRa/D1yemHFECIQDv8AsavmQD+cWDbsD8Ak87oaAfuW4ZhCrp2MoDbTPDqwEhA4IY7wETnSynucnsTT6WH2wZSD986SVrb2VB+GHX1Qq1/////wLQEbgpAQAAABl2qRQ7GOxj//1/b8r1mCuCwFQT/+2hkIishsMMAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +Block: 400 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJmUSk0BOwYvUDJTSC//////AVDqEioBAAAAIyECuljqw+MP5l7/ICahRg6XtR3ohrGbc9po0hvur6RV+qesAAAAAA== +AQAAAAGcfq70oM6PdtBY9b+7K38netvpx2AvqDza56yZPhCWQgAAAABrSDBFAiEAjBMT9ZLueGLNFJuj5EsJYZCayziuIoM5yPD2//Pm09ICIEKJ+zbg99nYh4GfmDlYc76TC1WeLmFkG58M15MALiRlASECNct66ILT7FNAH1qtZYLwykxjfJfBMTrCa9PlVTlfuBr/////Atr5rikBAAAAGXapFG+iHhu9dY/X9mng+0Asp0l6YfnOiKymVAgAAAAAABepFMfU8xfvUh6lQcQoxV8SEybHjG2GhwAAAAA= +AQAAAAHQOZAeD1/nNmb8oygfZWOEsUuQtX6I0Ixz+hzDURPmYQAAAABrSDBFAiEA3Qen8yK3lbNGHRALn5IscTtkPM740+7S4r+ikCCnTqcCIGvKaoZXIwiwe3iVRy9Y4qWHgwG1Iww3veA3GwrcQvRoASEDyyKDUpm0oeYLNH/nnSkuTtlD9tHYUEhEceqt5T3ScA3/////ArZjpCkBAAAAGXapFCuZ8YeeD68fBVMn/A0aRFqNH69LiKzU0gkAAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAELnODRd4hSSTO5GK4pzShPQXrH0a1XJx5XUrKCf0UBCAAAAABrSDBFAiEAkRzk11GS3EvvD4Ih0ztnci9cjKLP4zLqkk2rY5ge7aECIFzdFZxNHd/ToHuMpXxYfjPTQhs01DgokCqp5KmpEgf0ASEDgTRcHa28ElD6UnpC+NcnDO9ok1b4M6VR3zjFQ5h2W2T/////AgdllikBAAAAGXapFJL49zjdmO0UNyzogBeB08zpzXyniKxfOw0AAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAGkw++cvZppjEmKxeUD5E7gqmEqUScTyuHKmscuPaf98gAAAABqRzBEAiAvzEy3HoQsJzC/e5W4025fOvEPKJaOjkI5iZemcvamRwIgMqVPVJ6/6KpwUSyBTE1cg6zm2APqzHnHV/PVs4kpYjoBIQOuUy9q/aNabiGg9HinqxGBPJ27U3cmYk+a9qcwns98z/////8CfR6MKQEAAAAZdqkUUeRU0WUEduMMeZU1vyOKUQdHjaWIrDqDCQAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAHQ9ln9ETnhrKSniE9X8yPRv8iYFNeSaGBgPSB5ctX+BgAAAABrSDBFAiEAsOYhpsBDwGcsTeM27u/qi0cc2N0hm45TnLa/Hko69QMCIA/Vkrb9XXM4j0Z1+0mY4ntN/4NXl/oPOc+maMIQO3mQASECsax3f09p7xIZiOeBQ1wb64cf1sDIQaL1hRg0Ecstp1X/////ApVbfikBAAAAGXapFPcNK8fchLSf+Oram/GDf+P5NjSpiKyY/wwAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFRc6cKU4PiyjqZRm+01NY7paVzDo0H+tlo6gsAeVs1yQAAAABrSDBFAiEA/MKednI+FqzD4jckhO/pcgHdOl0Il7EBC4Z5QRe7yFkCIHKm4WsLq8+GeqzcPA82U/VK2IZi60bdXqN4vb416xQ2ASEDGEXNI4MeBT9pNPyKiEBHxmvjDllZRrq29hh4UZOc0Tr/////AjfzeykBAAAAGXapFI2VnT9110MsOiIcl/VIxdtIbHFSiKwOpQEAAAAAABepFCeRXi//MqXnTFLLhNQjZsCI5hfGhwAAAAA= +AQAAAAHtaNLFyEkppn2lcYYwS2TyZp8KkNf+Mf0cUguMKcxFGQAAAABqRzBEAiAtWpVoE336x72BDn0Pmf1DyA/NVvn3nRDJBvo6FiFPFQIgQvXKZLKvgWaiu476kXuysm4v7/UsLnASYnnrzFuOUqQBIQP1abkWxRKczCsuIPfotroExZsuj+H3tVJ7FVCP8CJFPP////8C4YhqKQEAAAAZdqkUf3jmoh/3b/gU4YMLrPuheE+Kog2IrAanEAAAAAAAF6kUQnOMWbvZz5TgNv4PQL7vy6ImiSSHAAAAAA== +AQAAAAHJGYgT4exYOPKuth9MI18d+dWl9P6+EqxE1+/QujdxCwAAAABsSTBGAiEA4XVwfY06cae3KVF77J3dn2g9tPfBEJmPWXfT3ldoElICIQDSbvRzUx7zOgIKtvZDSz8Ov4Vg8CQqRdxtb0OLVejGDgEhAuRh4v4SZ800jBdcIeofvWvSjj2bjFWWv4Wh3HZJfPaX/////wIjq2cpAQAAABl2qRRpp65WuzA68Wv6Rsp9f4As9u2QB4isbhoCAAAAAAAXqRRl9vcVF8n9SFQXBJwt7VJ1U8LRB4cAAAAA +AQAAAAGY1WU2y/ekWi2sEl9os1oQG3jyQqdadeS204sJbXC3ZgAAAABrSDBFAiBOvslv8VEiq9GILx9657JZnQUXRlEpwuYWwIiKBwj1JwIhAIzQE7tBvnd77tP2onvaF5lwcL/XCoLE06+fi7BMCYRpASEDikwXTYhSnor4sOKV9ZgNW8LEeC2WneE2G69bHPJEfHP/////AuIpXykBAAAAGXapFNi3UymimO3HSFDwaWuZLbcxZsV3iKzxvQcAAAAAABepFBxkS5vaRBEfdQmIEg4010oAtZJDhwAAAAA= +AQAAAAFnDdares3SL46wrMe2PT91htYiDS4ZE00pCK4A0dJ/QQAAAABqRzBEAiAagjtYLwL7+RFp/KrbWO1e3fNcgISPe6j231KnK99r7AIgbL0HaEykDmrxAqiTk3W1/htsxgvONrHrilCYp2WlhaoBIQPhXU1lKOL0bLfS27sr2tzBjKVdHyWmb6fdbiDmijrI3P////8C1lhWKQEAAAAZdqkUUchR9w/Z71UaiLraS6TI5A8sCgeIrLwNCAAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +AQAAAAH08hXNlnj+6ovipjHshRvX5gpKNj3KpqnYGOvDM7ij2QAAAABqRzBEAiB/WHI0d/ce/9B0p+Sd19/KIFtdxYZ/+BY6SCpiPj5TpAIgI1gy4CL/x4qhwEVR0VwVI64rJQxnx8uPYhQeg8GOJcABIQPOgyOGDxR+gmzq1/Y/+cUaAznWp0p9b3e5gLHGer84yP////8C6DJKKQEAAAAZdqkUju5+a/ucoOqYvYbfCY6nirZ+KdmIrJ5iCwAAAAAAF6kUH6zk0Dqu1PtsA0Qes6cTeTI41iqHAAAAAA== +AQAAAAG6Rr7l1r92/eo1ELbA4/NmjqlNVb5U16VIcQ7TZwOGBQAAAABrSDBFAiEA5WcWj5pgI8NDrbCkeVTiVq7XZzzoccY1bfRMfxbvmsQCIHzoMAsInHgSTVxW5SeJyym/WXY4iaJ6G+XsLS8KuwuRASECwkdEydb52gO6nEXY+cuzvo6Z829eLvU8H+oySlPMFpr/////AjagQSkBAAAAGXapFBU8md/cdUTiRCzEH0kyLMGyfVwYiKxizwcAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAG3F5DG7Fk7qzG3N9sgnoY1au9o97KOr0mnSywZyBnKQwAAAABrSDBFAiBJssnJ6HVeO+CxnYWy6GDzFfomQ11dR5gaDG7WoEHwBwIhANRYH2KoV8n6fiJ6bDlMX1c35XT/k5As060b6gpbkjt0ASECHNIO+mzSD59nSUAj2mlsEOzJkn8xCTpeadZmTx4FB5r/////AnufMCkBAAAAGXapFJEEBLlBh/oH1DjnLX8/7rsNSFpTiKxrPRAAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAHaRwxA4IAWKTtYKWLDcxvt6XXxHbnjAnxFCtuEuctX8gAAAABsSTBGAiEA2dc5JmZ/U8DzuzUzku6IQoyC/CDWuI+6dTvnUQx7bI8CIQDxNfj2GP/6uik80SY1lUTX1segvr+coJjBdTDkpNM4DwEhA8dElXtq+rd0FN5F42aEsDStwmCrzeBscC0w1Gb3zQLe/////wK3DCkpAQAAABl2qRR12H9QK30a2EP6ExftmVYZQr5PGoisdM8GAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAEXKkTLcK5XS0TVyvr0Rviw4ErMjXr50O8ziTmtkskDsgAAAABsSTBGAiEAlqAWquKcSJN0oBpA3XgZ03SD48Jtq1qCiEudXClxuugCIQDfRsjX6oaNtAV1LeB4NCIbwiYAz6VI86/DviOULlh4JgEhAqW5roZJs44TS6FQCu9g51+xEfMPAS0YIPtZMj6EuZMZ/////wJFoRkpAQAAABl2qRSLcxDV73BYAAyMREolfTDZCbSyioisIqgOAAAAAAAXqRRfVwNJkfSX+zpuZwEfD1GA3sNtX4cAAAAA +AQAAAAEgi+PXNhDF5VeXNRyi33n9UUF4RSqqduI09+u23uKrIAAAAABrSDBFAiB6Ld60n2Yb5Lg54cCI/n0tof2m8Fo9oMwspIeqnBy3NQIhANR4oFie+uPD7wKIu441/pJBZZZpszzLaPMmo/Jl/0JMASED1o76SnVAOVNyXloiI3MFSKeRImww8PX3aMmqG2Qm1pb/////AvrsDikBAAAAGXapFGHkwIyrQu/svBETQKYlOO7v06HoiKz78AkAAAAAABepFGubNVoXj1KNBqCWh+Ro1lIByAJ8hwAAAAA= +AQAAAAFQU/65RIk62BuKpgs8eoFHJLo7hrDcuFeBdKOGZq1qQwAAAABrSDBFAiEA6TD97o9r9XXabUEVHzQ4Uhr4axp/Cv9I16Gr4NOWz0kCIBg96Xwi4M1otXvcm0TYAF1Hv2bukXI/f4LotFsNAJP5ASECod3bwFWudJfD3wvXMeukuFoCvoq6cYFceAANQeQhYE//////ArS2BCkBAAAAGXapFDv6JaXIzhUNtVbaXng5e4UD5FYViKz2cgkAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +Block: 401 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOKWSk0C2wEGL1AyU0gv/////wEgyBkqAQAAACMhAgscTMCFCnGAcQwe8kNEfLUeof18ljKXo1DC9Ht8+dY4rAAAAAA= +AQAAAAGTJtTE5/dTJ1HqrXwreHh/TnkOeaQ42w2evKKZAz6/8QAAAABrSDBFAiA/GIFTy1xkYt8ltNiVQQpiwv0j7RKfDI7ezezdELdWzQIhAKwEpQf2CXL1ldstpoPQVsY/8eW/YGyW89K2w/iH3GC1ASECIgHGOQGMZC/7iol3hwqeVE6R8HbsIQ8qGpQl4/L8PYb/////AhJv9CgBAAAAGXapFH+5bygr2Q4XxV8Nyqx0pVMnlmE0iKxShA8AAAAAABepFEJzjFm72c+U4Db+D0C+78uiJokkhwAAAAA= +AQAAAAGJ1IKldna3d0dFgtrclCS7uUM8Tt0q9OhvQ8yypF8EVQAAAABqRzBEAiBezsnGMeOQzMGL3mDwu4nwyd+cGWDBNWVu/YtkiuazaAIgFzvMFR41VNNpZletWGMRXVbdEjGPGDZSXnz23mROzEkBIQKfhCS60oMt6Wu6LmWMv0MaBNmi2k5Ugbf9fUafzTMzVv////8CjFPwKAEAAAAZdqkUWUvi0usosMNFBm205pkXPYbb2/SIrDZYAwAAAAAAF6kUCe1hclMwX9M0krdDwJ1TiQKgGIuHAAAAAA== +AQAAAAF/mIN+rhZZn6BSRjYjv/KyOif4rC1wSuNhl3uCkkJLEwAAAABqRzBEAiB9Dw4+M/bYz5i6R/53Xt244sQriCkzu1whY5ruI1fcegIgJrj3pTpFWAiQqrRu/HtSNGc39W89K9os3TA7JiDbaYMBIQP4y72Cs8xB87srV1Viy8hG0+KX35joN+TCiGB0Sq+WCP////8CTW7mKAEAAAAZdqkUjgC0d6wIam1kPrvrolO5pWj+Gp+IrO8hCQAAAAAAF6kUlw71MO1BgueZKT/FFDpadG470sqHAAAAAA== +AQAAAAEP1RpR4bObJFZIz9DoHL/4ZKzNGkIjhEn4ipC0+2VMwgAAAABrSDBFAiEAzHfntHhj4iVC8ZXl9LH6dQBacBZP9Nbhc+1xtFh/f2gCIH/8SPOukRlnlnQbq22rwvRjwhbQQ3NNr+T4NubLDGbHASED87Eq43fK2iuBoVsRFFtLOcrDBA7ilM3GDNjEDVTJKlb/////Ag9V4igBAAAAGXapFGmut4FbSRE57fi9f8HR+hsJVjsyiKzuVQMAAAAAABepFA7/Q7VGS+OSC6vcarEp4A2kB1DAhwAAAAA= +AQAAAAHDXmSWOe5A/eUxl8NCBULxcahqcXRvM2cexcCe7ZzJUgAAAABrSDBFAiEA+QLvjkkjf+ubuwWMOJYUdogkIeEpz7BXOqQ2FcIEuBYCIFiclw8gNcQ9vxzRpP19Eviy1i4JNPHrvKJi3BWlDP0EASED4tOhpaLIFAoq4ctAzFCx0UXlgAFg0Fele8fc8TQdpxH/////Av9O0igBAAAAGXapFOVDdRXtuHm9+MMX9frMtuDINOeRiKzAQg8AAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFGTD/8D8FVQmPZYxJhXH/1kcIPXy5NMw7YviC3GT6LVQAAAABsSTBGAiEAqDcLnkqjYZqskUC6nFpufgwXcx5RUaZdX39bKMh81DMCIQCCXn8D8142+EigZxDMw4QcJmSSxIm3FmMuFdONZSCsngEhA90IuwbWyK62SMyxYr1Wf7AiPZ2LJgfaBHJviXpLps/z/////wKgUMMoAQAAABl2qRSy3EZvcFQPF3jgURbCWYQ/kL7hOIisDzsOAAAAAAAZdqkUXH3PqYaN2NL1U7wKytbXj94dkJSIrAAAAAA= +AQAAAAG4gtvL/qOTk+IDKA1HVOEI5IpzPql8sArrC4cWBgdg+AAAAABsSTBGAiEAxgwfEqR/Rqs9CXY+Hkpa7Tbx+08m5bZ6P09y18aKc40CIQDYGoz59r1jDSNK19D8Zs/cVaTbUZYMKYL9yqBmDbTmGgEhA5b+7DYRCeVkWfXnyaAdVDh0Mi/LaHps2ZnKrNRIX1Ab/////wLrKbQoAQAAABl2qRT9zdFmsCWAcHvEWfAeejVy/xQ1pYisZWMOAAAAAAAXqRTyaCRInzdOLebd315gsmYPJUkh8YcAAAAA +AQAAAAGfxFdnaRSnQ2NBpaO8zNWP8/Pby9rI1jyPzy4zz0Y4sgAAAABrSDBFAiAbFpE4mxt/vTh0VtBMPlXKk+Rf/nlavLN7YaZmOXf4+QIhAMY/WLkqBaLkiA4n9DR2bX8d8JiZLXIZ6XhoG+OKc+9AASECWT7bxKI7nasipehR0z1UtikU2B+497gdwCkkHlbkZEf/////Ar7LqygBAAAAGXapFFQXZw+4JOGkAWrf+wk2S/H1SD/OiKzdmgcAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAHn5q/zccyRGGwqR6DV+n0/6qL2YyGrzYHbLPGmh1anlAAAAABrSDBFAiAhef2bZJPNLpu/9S3ZWhSbsbk3W0cL2UVjfFlGf1eygAIhAIPc/zBEu1WY3dNsqosDlthSV8VQJGzR8iTi0CIdsjW/ASECjvN28YrMrFvhPbo5TLofW+IOpT2VkKNR4yQaQ0Kd0fD/////AlZUmigBAAAAGXapFPQFp1NEjb77LpVOna0vL9LrH95oiKwYtBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGlaRcxw9Ku6PJyXQ1dEBR/FutpFbd7n294pO6D3TsvPgAAAABqRzBEAiBxhrQjuCka0mfMjtJXwHodf1hk5UBKvOy14no9uOptQAIgWD0r6gAmWLgDZ/W0e/WnvBTgbWZVXegE59biUXzSfnEBIQJFENnIXlPrbNrtF6L4ts0MjmzqIYjAsh2LpVvmPguJ4v////8CRC2XKAEAAAAZdqkUBXtvvQwdvLVHBQP+VRiDY+pOjmCIrMJjAgAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAFUW75Zjilj3nodFhAL1tsxNSjxbGCtQ9epU26DfZiCUgAAAABrSDBFAiEA8VzDISstpgv1RYQHnejltkv+TgJ03ko2PBLNKNnoltUCIA41pAu22gVt8h9ozZoNGpXL+ZGRI/l/d2v+RdIduZtBASEDG+npsopxUiDqjOJoyCZW/nz3iD9ruenXzUx+mK9rzOH/////AqY4hygBAAAAGXapFPbViWEB2X3wlIs10paFveMtTzl+iKxOMQ8AAAAAABl2qRTmqXsdldMegPwkwXYIDNZZVBjcmYisAAAAAA== +AQAAAAE/W2wpYtexaKQsNdsaWFC7WHOZQD15zOYdUReiYbRbNgAAAABrSDBFAiAToPf0JxGUv30ffu4iQ8fL84QsQta4WCd2RTnTyloFCAIhALtGvkoKqovpEdl/h2WcxMX5g0eq1+uVYgATAAnyZNOYASEDVI7biIh3dBiq9e+gdJ+8B70jXWeJyllwwjMHC7OFzNf/////AkL/gygBAAAAGXapFLoQQGF2DPOYzN5R3x07P0Dnh68UiKwUdgIAAAAAABepFMkl4CwFYNpdnNJjSBNHsCW48Zb0hwAAAAA= +AQAAAAGrz79785zaqrRR0yzC0yBLVWs6otxepIcjruM1KZc0HgAAAABsSTBGAiEArEdY27UgSizfux1Yf+t1TRV8ek88e4Cj3U/ijEWi5n4CIQCj42Ra636dKFK0Y8aQo3eaZ32KF2VUjmmZQMpwwFpl4gEhA7nSyWzM1YNFpZjhhfyYiKWa2yVYuGneOJ3UJn3jZgzX/////wICdnMoAQAAABl2qRSXclVUaZimDNFYusW2c3DW0Ne4G4is8MUPAAAAAAAXqRSNbVXAM84pwnety28/K5HCWTffF4cAAAAA +AQAAAAErq7eZWHeZDIJyzXI5A4JB714AHyQZ/Qi8qJT6QnpFMAAAAABrSDBFAiEAlHQli29XzMjZfdREYP0vjml7jY2mo3c9oyRtAZl9kF4CIEf+N8wv+sEIwhnXZsJPOjagHMmBGxypZ4k9l9A5TZe+ASEDQLE8Jd/4UjKqqv0g9hZbuTRhJhRMSQn/gahLtLjPqS7/////AlfSZigBAAAAGXapFPKz81RBpqWqEK9UKJjwHahRwsmriKxb4AsAAAAAABepFJcO9TDtQYLnmSk/xRQ6WnRuO9LKhwAAAAA= +AQAAAAHwmH1TOE2TfzN6Xq6R4aa+9RxD1z0ghRS4mnlij9Z0gwAAAABrSDBFAiBQWE7vjNlGIHLwVl2DniPjBPIAtgIKMJz35rRMAZZ0wAIhAOEWNXdXyDQOwDs4SkWtUp+SZ8nS9tXdfcH/1X35vEBEASED7BKqjiJ6sghAeZTbZ2Fpg+5ADJnG2glzn6vSssIPLy3/////AlJFXygBAAAAGXapFEyu8h4Nc3KndrO6ubUWoEB5560PiKy1yQYAAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAEa1T/ZH3XDtEeeMdANUXmxg5GcrMuqqJUSp3EbXrk2PwAAAABrSDBFAiEAukPaPaFF7CKUWBdFNp5zw6pHRFgA94Ad/HwCigLhtC0CIEJROvwND0msoDGDijfTBClxr0nMog2/SVCpRe/yQzyrASECVJ17spsT4d98Vh3DloDt6Nw/jHHksdqA0bZmxbNUyoX/////AhH9VSgBAAAAGXapFENuCOpnDWQzYCC474lS0176MPmniKzxhAgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAHyM+TbkiDOY7jmt0tapKJkhZDETfZA5x8ivvRo0jqnTwAAAABrSDBFAiBLYjokv1G7Ohf7J+USrxUb3NsrL28IWl69fKO6hC3oBAIhAMTy6Z6qj93+mChGi3lKlWfwNcEML6e4Xi3EUc9CHH2sASECzCpep5pXoAVFYXVWeeGxTBNiyfZWIwyxJUbSVUGpuTL/////AjtzUSgBAAAAGXapFL+hMkmc6698V2Q/uXWXWEAEpRiOiKyGxgMAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAH15hDOJs4bn6PEC8Nca4fKWa/IiTwEkLEMg7NMgxiYNgAAAABrSDBFAiBjZgJLyjYpymdvSkDZRw31LTKgB3+f5XKtRfXPaR/r4AIhAOFp/gJONgcUv63ifyzFTw5oewTtJpGEw26gwD3/LaTpASED8oB96uKoGrUjFFYId3Nls7y3FyOXvyCD6jGlHtCTgyX/////At3yQCgBAAAAGXapFFn3M4+xxsPG1k8fA+DmzdNLhKxliKwOvQ8AAAAAABepFNnybMqBf6EW3HbhvnoXBn64Q2JQhwAAAAA= +AQAAAAEYk0RR4CUgBmde6mM1deR3ZT2lpQVogpEoQacNkBctnwAAAABrSDBFAiBwj9F8Ex3P1QJ23aLa502SAS1660Y/AeoKl/DFcUl/UwIhAJztXyRQH32OFzqtcbCGgYDQCv6NXkCq57mSEjmBc2cDASEDf7XfIfyf/qYjwpdpYWOvSqNx+Xopvg2H0A8HsZoghj3/////AiCJNigBAAAAGXapFFhu+lUBHmsth8DP6TvJ5RbGKi6viKxtpgkAAAAAABepFCT7x3zcYnAq3nTc+YnBXl0/kkC8hwAAAAA= +AQAAAAEbYxv8LHT7RjGhYBnxrOuv9BsWhvCOaEXYHly09OH9rwAAAABrSDBFAiEA9lV3GlJFQgu2+MBXPN3a+6QtIfZPT9V+1+250KqrGnkCIDyzrzuuERO1nVpVKtY9ka60ai5bjGE9oFv47zhQ8qYBASED7vY+CJBaLpw/77gtjE3Y09GP6q0o4dXjBSGS2KUdRL7/////AnbKKigBAAAAGXapFArTPlMcAcIFm2Xexpsd0DYcJ2m5iKxa+woAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAETKA9uizysSplRc9fkHifDk0YSgZEvO1iiXcNNu98f6AAAAABrSDBFAiBvcxELmknpGz2Apf7kKFkDjPNMd4+8WMreeOzHk0W20wIhAKnQ/3R5dyhvNUg8h9PRnxtIdFyLSTGdACKgIf5i8IqCASEDuhtTipecE8/6s7Yxn8vIRmm4zDVv3+3gGnSlJjrLEVn/////AihFIigBAAAAGXapFMJ+lMWIeBzC11Ol8ZGRa3RzIRUIiKz+wQcAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAFs2gsV/WLsKH9YK8V1oK47erMlUAtv1tOIYDoylKlEwAAAAABrSDBFAiBRkDhmiTx+zwMMpOM+tzIVuPCk5O/Ae2wjOy3t89xJbQIhAKItaPbdlX+lrOQPG8A7ObktERMQqinJbT6J2qT17OQ4ASECbFXDl6iDaHlkke8mdvUVudni08tsdx5ouZec8YAlBsP/////AvGLGCgBAAAAGXapFBdXIWQLJ6I7hBwVICKcw9TAUtNYiKzn9QgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAGd89YKaJVulFS2Gfcm33z45mj3Rre7vDvsCjIAjgJazAAAAABsSTBGAiEAwpwcOO9K2le4Lvz5j8zMYgvrcEC1PW7WtZVjoeAkJasCIQDIkqYCsC3/8pjrw3Blr3AmGmMW1ACLFNol0ADxSRBgxwEhA87KU1b9lLElRBYRF9OtqEcwO1yHmheBWkMjBPT6SP+L/////wIWkAcoAQAAABl2qRTONQIRxEtW9SsyAtIZ7wtOVhezg4isizgQAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAEeBHbpQ11WeGJQjOijIRCT21tlAPNO3yWcPFy4EXx1WAAAAABsSTBGAiEAvkNLJfsodcnty9x8gzPsrpe4FGFLimiTEVqFaspGHpUCIQDeG6hkRa/rV/g/pzGqztG8+hnHlFxYDsW9eHGzBBq1HQEhAwmBHH6c+fovMbL2FNC3A0veM6lzZ3te04LGT1AuUn35/////wJ6agAoAQAAABl2qRT2dVCcapkZ79FoDef7okIm73iB+oisTGIGAAAAAAAXqRQbLY7XmfWfDni4bLjwiwbu9VHC2ocAAAAA +AQAAAAH//s43h7fBBbYVQNi8HUajlFyzCPMrN9EkawYkiCLgZQAAAABrSDBFAiBjxGhLge66PdoA447w9DVJP3rcvMwrrs+9QCTXHKAN3gIhAI1TX/wNyXQvf4fh2w5xKgbqq7Xlvlh4Pik6dwKGEu6tASEDScdRyT9LxSKCWfvpc+jF299FNQ6FuJAHqy6JAsrknPD/////AqeM7ycBAAAAGXapFH2YJpHXnnGKaWdBqlC6jLOohJISiKyDGhAAAAAAABl2qRRrIEQUakQ45uW/vGXxR6/rZNFPu4isAAAAAA== +AQAAAAFh4eXWCRWng3e+5m/qYC/Fa/lj6kkCZ8Obga0CzdpIIAAAAABrSDBFAiEAyZuIJa6TO/fvT1fpQRHpqHxnmLu4HjXF9XZweS7qf+8CIBd4OAipJo0D+EAgsupNlDiJuxymik6ZJd381YysjgUgASECybGhGFtgZlzUxui7d+hMVDTkpnRQPB1SqpTgHefVzOf/////AoV73ycBAAAAGXapFN9LaQDiBlmxSiW4So6GiffhxuGsiKzSTQ8AAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +Block: 402 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNCXSk0CBgEGL1AyU0gv/////wGADAwqAQAAACMhA3+M++h1JdbP1HAHYfJr7Q0RXt7Hq1UJ2G9lPUjcwRetrAAAAAA= +AQAAAAHL5wTCw8rYtFAW1UQV1vHxnyqJlzkHYhwWs0QD4TAObQAAAABqRzBEAiAbP1foWNsXMXm/dECgbg2iQmBCWflA/s4BIK4Nb5fKwAIgNJSlqOAvdXeui4gpPFKlmq/mL+QXYcXabNFtTJzOSWwBIQIUCw64u7ylPDjedBubTz4TlupWqa9k24dLiayq69W0I/////8CNbjPJwEAAAAZdqkUF2tBCrx7zsCVg5uTP0rAIyFARhGIrAAADwAAAAAAF6kUzK3zVW0ntkCGxoNQee2Hyk5VfL2HAAAAAA== +AQAAAAHdrnAJUQWUukcwzjlw5uDxwlIYLRI+pYLmpvJwML7yGgAAAABsSTBGAiEAyS6FQmRV0xJwLBSyg6QlVZCeQ4oKzOfmeBy7RQVwHWwCIQDxt5Xa8kGBmQCILbdkOsgX8omXEaQfMtfesdjD2Ez/PgEhAq/B4eqLNXMhUm4Dw51c6qQmCHnFJson5BwyXsEOhPHs/////wKGjsgnAQAAABl2qRRF575Jki2SG5weA/lQkyv2nzUBCIisX2YGAAAAAAAZdqkUyKWPTVXb8sHXngtGrDnKDcvjBD+IrAAAAAA= +AQAAAAGr3bTX/YRb1upzkcurYDSuGO5T2rE3po7YyEhb+xzzuQAAAABsSTBGAiEA5Ami2xM09VfI9AcIykIzH2IR8uVMR3lxKNLMjl6KmAUCIQCSEXQ6yC0DSJeTg80QSdL35I8GKqY/I5c026+LtEN/iwEhAtrYe07Zs062b7HKEvv5lvZ1BwpGf7Yl+L69XIPZgs2M/////wJ4GcYnAQAAABl2qRQDwpqKGS5nt+EZ4UWwrI6twZjQAYisvrEBAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAGdQ/v3jJ3ViQOXFA2r/rmagZV3G9/ZxWFhelg1tJJevwAAAABrSDBFAiEA/f/kp37kWGEnqM/5o4Y+mbSEpBJh9mwoJpLrQDRJtEUCIE2g04/iAG9xe5OWkmHGXIqmeuVQZCRsx3X5WDAPK/JxASEDHCAjg0rY2O8TQTzB2QAUDtHn9+kk8tNaWQhkuIMR08X/////AiaWtCcBAAAAGXapFGZYMpX8bCN3BwWV+g7Ch1H/P/S2iKwCwBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGWTB+jyYBMXNyiyyvzdFTt7VXyZjRh3xlll1QiLF/wZwAAAABqRzBEAiAkTyx5nyhXEcC1DINjyUwRoDsMKfXd+vTm6n2SHAgTXQIgSeO68BfxAh+Q5FwqXpJdCvOb7VPobMS1IKwY6O8oeE0BIQJKJ/zvbvfzDuXmlLdAUTyDO41K/EEfncCsJXSIcwVxof////8C27OvJwEAAAAZdqkU2CAIs5dATq8UbFcyZ6kWyVG0LueIrPseBAAAAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +AQAAAAGcLMGup2NLfZBgX26g4ZMcEtLkcX+vBhVZQmPjvl6OvwAAAABsSTBGAiEAzAuK2giXg/RlrqYRM8spZWT0xCWin5Sf1pnRXUPjV5oCIQC0+A/btj49aQV1zhv4BZ4+8xySpX1jf0d9FpOPrAS+0wEhAgz0NmeyL5FWp1KH7SYmX+suMfU43lfvKShy8YfJEQNl/////wKk+acnAQAAABl2qRTUeMO5lgM0XhKsk3Ko6tMShLT5b4is5/YGAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAHzo2RLFswQmZ5rlpP6o79E+NHuNXeClenkXgS1W5Fm4QAAAABrSDBFAiEAl7UjSZa56bmA47b5XmKGHoDmiJDPcY81Qley8PdSKKwCIA4pQu8tB0ZHutPM5rRWN/rXPL1wP/6NGm7+bvOqZiZQASEDR9DfFJp6EJSkO88cvm5JgzIjf2H5GPPYWVPcj+z4X9z/////AhADmycBAAAAGXapFB64z7qhyLLt/NNe9hYRrlZUWD/SiKxEMwwAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAFjDa8Em2WFSA+Grs2Ng4nOZP8Q6JJiN7F81VybPhAFigAAAABrSDBFAiEA7EEASmaWCJR3odqA1v3Eckw2ZCveeT/Gx8fiv8J4DUMCIBbvGO5FDsJmQgdwKIlwt407jjMtTns5PKB8B8WxqrxFASEDImQJn+V3lneDFXyhTvjTPQj0jFaSjgbpcCrrYlnLa2D/////Ao7nlycBAAAAGXapFINGWvWHLyZT2B0Tn0WEcR9X8IMmiKwyWAIAAAAAABl2qRR+q9Qqp86HQGQfNbbuAtmb9lwSL4isAAAAAA== +Block: 403 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNeYSk0CigAGL1AyU0gv/////wEA8gUqAQAAACMhAvSAIBforWw9d5r61WUFwLbKiqG7Tp+aErawLUcCCw9BrAAAAAA= +Block: 404 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEuZSk0C5wAGL1AyU0gv/////wGQwgkqAQAAACMhA2M90osFInstoaaOr1OuVZ68aSxOd4R1qmtfVh38juDPrAAAAAA= +AQAAAAHUz5ov//pM08kXm1o2SBNfLeyYmaP9/7v6utrFI8jiZQAAAABqRzBEAiAvPMxWNCWyfhfCGKBsu9BBnfGhj/Z4TOZCOh53+ypBMAIgKQTG1IJA/WaHUP4uWOi6nsRW42jVmqH539sowoy5eTMBIQMtlAKfQyMs9rD7Od6KLeXjL83x0LAqYCg9Jl0P6nO9Y/////8CnoyJJwEAAAAZdqkUhcLH3x399PH5vfZsvUgypPnj1YWIrKCXDQAAAAAAGXapFJI6pCiACahG/QRJoZ57kFlM9aW5iKwAAAAA +AQAAAAETJi/Em9crkuHXMYc4av2HOPRwgR0bl+5K21jgh+/dbgAAAABrSDBFAiEAs5Bs1KcJLYpbPRJXfCLDiPfAoy5Z9mXt+mN3Wh0VK9wCIHEtTY79qYP865OodCc7J9qQde7OPZi+TRLAK+KzVyNPASEDcl0mtwg9OItg6p4NEsMl1rPtf1dkb4dBturQdRnx9rr/////AvIyfCcBAAAAGXapFPjNQHXq/0oRUc1H5trANhjd1Hd+iKxclgwAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAHNH3Yh//0+QlQ4KMVm0wi4AB+4LI7tE+KFvtp9KEWiEwAAAABsSTBGAiEAi09l6CH4tlTGfpJpsLIJoES+MglJXJ0scV3lvYuiDvcCIQDcYqnWS71lO40xjwaDeGlQU1Tfpt4NVo1cKNwDgAC3tAEhAmay0ZebRYarD30nSlO4rKAX/8h63499dbdXXyKNIFM//////wI3YngnAQAAABl2qRSugUfjKIsvTmPoR1eYaPGrIsGx+Yisaw0DAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAFBe12aREF9QTLAfeZARnqRBNgvc8cHVdGU8IfO40uWsQAAAABqRzBEAiB/xOllg6Pqly0rhU3mKT65GThAvBQIhaOBLK+tQr6+NAIgE5cposZIj9e+jGhBxrFoEX/+muYz8NJMwyRg5wPjvSYBIQPdNRiHz07EbettCy4OQRw/v9mo3o8AAG0kDOCT7lO0Zv////8Cz0xzJwEAAAAZdqkU6HnXJoHyQItNzFADHpdOkG6L+8+IrBhSBAAAAAAAF6kUr7+3TumUx9RfZphzi8QibQZSZveHAAAAAA== +AQAAAAGIjBCCsjgls53v4HcZvaWIlbJAn1W6eTiqefPP9NTwDgAAAABqRzBEAiB4evy04bEzyTTB1l1MfmvnFET5FSmUO4uVvOuvAvB3YwIgd8cCiHMcB/kGWp4xpUnZtRL+LLRZVUWQvTpMsZ5JilwBIQNsVirqETKlqd8w7wMTdW3YrscT6ZELH6ts7jJNTei5U/////8CAiltJwEAAAAZdqkUqOjsIat4A4FqxXwrWQ7Ilm42vaiIrH1gBQAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +Block: 405 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBOZSk0BJQYvUDJTSC//////AWCgECoBAAAAIyECkBtqJQm5YwuQc2mtkL4R8wNRLVEvJXO9n25nMQ2cQE6sAAAAAA== +AQAAAAFhldXXUfA8qI5grl07VtrzyM9xBWyH3uHkoD64c273igAAAABrSDBFAiAb0vXSFTGgFvlF8WQIgZIbQwqcGVEU/jgyoUikD9iqmQIhAL6LNwvzkG4uWva0f5GKzDJAFyF+FKxidhvRsGhATS3IASEDovMc0ddyWkwSZcDgsmBX2TfVoYDAoMi2F70I78P5Udb/////AgO8aCcBAAAAGXapFKMK+dh2UxMCPe11K/lyd50ZPd3iiKyvqQMAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAGyOCbJrPrzGpy1nA+0q8Hg6ExxBOSnyQiawMFfrnorwwAAAABrSDBFAiEAxI67mKvZMvUI8UhPSvIXnU2bEP9rK1ykZjwJcNO5TF8CIDysrUX3UpJOgwOs1RKkztAthskd9dZ8sTgvnLE0wtOEASEC+KGUbAvD6InsFfYQ3XwLsV9euPWPMCHMlapNGQXnqFn/////AuJzWicBAAAAGXapFLnytHG3TwFFBgTckCyiEAsG3PrwiKzRhA0AAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAFYU2PU5kuBwcJLBK9XZl96b8st7aYHna/KsujD1e0pBwAAAABrSDBFAiEAjJ2iivel8Maa+jswt0hFdfD+ZUY53zYpT/JFj9I/WQcCIGUoAvaldJHyYFbmLLib9/JvxXmOv6VT7S/zYor4PHUwASECJL4GCi64cZgHLaT/lYmH68Onwk0k9djagcMNzKclZO3/////At3rUCcBAAAAGXapFEqPZHTUFSN4WjmzcB1jd5hhAJPEiKy1xAgAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAEY42X4Ld8uymyn2Rvu/rFBy788uDnkSe0sqwT8PKKymwAAAABrSDBFAiBJ0Vt7RIXCL5sVqG5gm98Bn+RhnVMO4BkMg7+lX/ImlQIhAMEwvj/oiw99qHIqQDn/njRhuLTV6rNt9V6CZTFPn9K6ASEC+gUNEFUuJI+vPj1tPnvZ6lByNdRNV5ydk9EkzV8j71H/////AraxTCcBAAAAGXapFGGEsDebzf4aHma6j5QO0oD6N4jgiKzXdgMAAAAAABl2qRTBI26HmhE8AhJQ3EBHkwW2Lw/25IisAAAAAA== +AQAAAAH/aHqY3wtK2wUG3Elmz+rU/91y+MIOl9dhMHt9hpRTqAAAAABrSDBFAiEAhYkDXYns6LMztX4EFhwiTgrIN8Rdla9nBNLNPj/zV6UCIGO+cYlT4Ma9fTSIT6/fUTUYW3rh/0U66Wue5RHKxNRvASECr2l8hpB7XeO8Ya1SZmCWDNuwzrzOWkPqc/V9P1/c50b/////ArfTQCcBAAAAGXapFByorEBlr6G5gpZ8KMckZB3gA3WniKyvGgsAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAFpH0edqd1pTTin6zPek35NZ/DoLBQB5mcxz5dxVrot1wAAAABrSDBFAiA3zCqnTclkg6NC86G/2CQs2IoMSFdFnZ6u9Yfc+QErGQIhANJqEYChnRdmm8rg4ky4j9d7zp2EzcHu20ifafty/rkmASECD1N6YNQe8g6mG94PF3sGUePQyru32DoF5u6fwRQoHTX/////AgtmPScBAAAAGXapFO4jdIus1KvVWDRApglfvHkIp7jDiKxcqgIAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAEA74iO28JmRYEuR2G6spASybE7T54xqM++fiijlBEAKgAAAABrSDBFAiBA8F+NIrtFjahWEgrSOCzG4ZJD4dSvjHCM4MARNvCTsgIhAJ6nD0PPINdMkLbM1mjw2yIhvpB5t7UF+sUwkZvvAUSoASED6ZFni2vECCgvpbz5A3rN07mAecanEANZwU0Yq3Sw6R7/////Arx+NycBAAAAGXapFMmMKeBgpqVTSivQVOGTDT5mGz8UiKz/IwUAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAGqre8N2pavcDOCNDKK7bo534zFo0XqsJMcsHx7h7+6dgAAAABrSDBFAiEAjdK1aPBwZeNmPJlcozS8dd3/P8eNPDfzPhcaonFS4/MCIFMgbL7umAsxk/rAk8VDdePbJZKQnDSrkyKho+zhDv5nASEDV3CpenYFdHUzjoMG8pDWcj+PIQ5Tw5p8eAuD3Ywavkz/////AibaKicBAAAAGXapFJ6RXMzJ41l2SNk/4pIEZvdwWzHxiKxG4QsAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +AQAAAAGvPOv89gbEZQBrOl7H9y0o7fd6iqWcBJbL8uNOkNhHUQAAAABqRzBEAiBvq4hcoCmU0IaY7boYg8BimonJPzXtECaidXT2WQFqjwIgKkE80nHXsfIFbpFiBVLJFWhA+G6cuM+IQu7ubM+yrTABIQOOzp0qDbIH3L0JBSxKPtvW+B8nZ/rwXKIT+gAgvHzdUv////8C2qUZJwEAAAAZdqkU5RQJh5ecQHkg29azYbgQ+4gQt+OIrPxwEAAAAAAAGXapFDqj7ClcYp+kQzbctKO946eVAoNIiKwAAAAA +AQAAAAGVV22mSgPrcOFgajkgI3/tORHA5ix2lr0V9iCli4Y3hQAAAABsSTBGAiEA8GhExGDxaLXRehAXFJUY/EiObEhVmdKGOKebbiLcTQMCIQDRspQnjFd70dYSi+i2RDohcEzkmqWzEhajS8L4vEDJJAEhAmMHJwCToZWoQgKuc6fCsUrZ7z7C8Vp7A5TUZCfgoh8I/////wJ3/xYnAQAAABl2qRQa822KO9zdQUE6d/j1ODUsL2SRWIisE+MBAAAAAAAZdqkUC0MirAFxkDCnELYLCjOXwHTPnt+IrAAAAAA= +AQAAAAHMsXnTs46zU+YiNiNHtoZaZaQ/xqAaffNMIkH8Hngv5wAAAABsSTBGAiEAtSUn/YrIbUk5CsVyfF9ubs2cC06PYa4N4CjAzPSdo7wCIQC4Oc6fOnjSaAW4/zdJ+sXXHSZHTk0FYl5y2gDSut7+QwEhApqKcAtp9We40KHb+VbXyYLQH6tOvjVZkxof44CGU5YK/////wICLgsnAQAAABl2qRS+7VGnGMMgnqTQ/p1IujJzP0roRIisJQ4LAAAAAAAZdqkU7bHfr24LOUSdqBEnU4bt8utUurqIrAAAAAA= +AQAAAAF752CCpayw4GVGHNONFMyYwKKnmLbswm65+2v+h7UEyAAAAABqRzBEAiBwFzcBFCEBsO+1vMA/gn30WTWN1Gxok7cPtaIi/qsuXAIgde/sbLMwCO3YuMSQS7s7hVelN5FdnbnMor70zA7I3UwBIQOMykXrEU8XLaLD53bGdzelui3cD6gzqCp9Nt5mjSd/Kf////8C8Lf5JgEAAAAZdqkUwoL3jmIARIqGEwLqjHDba9Qm6l6IrMKyEAAAAAAAGXapFOapex2V0x6A/CTBdggM1llUGNyZiKwAAAAA +AQAAAAELkd36RITtsW01m4W4vSwMr0Me3EAYy0CEnvAO9bOthwAAAABqRzBEAiA1LZrTV9j41wTaABvOhUZgz6Kx0eeHs/U8cT4TUtNazgIgGYcLkEA6mkg1WcZ61cQtg2b02SZ0MtBf54tVpKA10uUBIQPN5RghsnVku8Spq0S4mn0Xf+6RbRBS1YLl2MwXuKvg5P////8CYXPpJgEAAAAZdqkU27jKWhJ4hRvi8pId3LEa+wLsU/eIrD+BDwAAAAAAF6kUqLs6uFxWMQTKkMQFGhRlMta38UOHAAAAAA== +AQAAAAEZ5Oce0Ev1SPzT6/xb4SvzWWRiMlL92NsKZhT5L2PkRgAAAABsSTBGAiEApMCzbaxQOhzHvLEcJd1I5c35bFYnzj3RkxOEqXFj26gCIQCoX1b/vBgiBUJmmgrUe3Vmpc0o0UEETSV7vLHwCkKvUgEhA6945mYaZYvjdMNrBidI1NSLbvaSMkzdJLW+7OhKFjhP/////wJtYuUmAQAAABl2qRQApNRHhMQXlIN8aWITZ3aHbwtxqYispE0DAAAAAAAXqRSvv7dO6ZTH1F9mmHOLxCJtBlJm94cAAAAA \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt new file mode 100644 index 00000000..3850b45e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +Transacion 0: A4E5E1B4AA8BF9A32315A8883CB18CF716F86776E3C27CA72B21B7A7DFDE3AB3 +Block: 1 +Transacion 0: 0F13F5CF8307D907DA65742E028453D83D47F5C33E7824328CA0C729AF0B8CAB +Block: 2 +Transacion 0: 0222E29BF085595596621C21BBA50AFDA45BBA3C01E7126A59A0CEB3E253142E +Block: 3 +Transacion 0: 174261297DDA0C89C010E867A40579F4951E56B78AA8B15130EAA235CFA5AB14 +Block: 4 +Transacion 0: D2F156E779F027C4C46D099414258AB32D79DC018EE69D03AD2ADD6775D679C4 +Block: 5 +Transacion 0: 8610BC1457372250463CEC3CD43DA980972EE47AA5C71AABA6B3C8111C6C6C3B +Block: 6 +Transacion 0: 8E541CF5D114C509F18BBA0D04816D6BBABCE03F3A58B5B742DC9A6896207E1D +Block: 7 +Transacion 0: DA362EAC5D49076F8B3800BCF91C84DA1CD14A083928BE397C9144EC95F17D1C +Block: 8 +Transacion 0: 6796EC299FF3A9DF15FFEA42E34070B64E5E80C86F5910AA6BEDE9EDC5334120 +Block: 9 +Transacion 0: 25AEB9B769B7906FA26CFEC93E56CED4FC80AAABD601ED6FD843D51627447916 +Block: 10 +Transacion 0: 45461B3C2F15060F81F3DA864A6038D8D2A10CEA0E950970E2EC9423C6622CE2 +Block: 11 +Transacion 0: 5EE1217BDAF7E1AB3716DA73AF2E048DEA39CEFAF09C1D62A3F85BDFA594BF92 +Block: 12 +Transacion 0: 1831BACF2664CE54943CE4B34683608DB0E8E23A26CC810F8C5757554435D8E7 +Block: 13 +Transacion 0: B69E8C913E734AF35B8327569232EAE99927D9055BEDBA6B8ECA0F3E53EB3FAE +Block: 14 +Transacion 0: FD0025868F865136D4050245D0CE6BF6EC90F7529B49B23FB88DB8AF3443C44D +Block: 15 +Transacion 0: 9E4D7F149C78A036E538B1D03AE8C8D734C25FC2C842AA56A7910E932C85FE0A +Block: 16 +Transacion 0: 0D58283D17F1570D586C8178F40B0D94EA905DCE59CEF6A5DB82F9B44517C245 +Block: 17 +Transacion 0: 71920001780EECEB8A1DD41E56D3C55F69829D47B61CEA567F671FBCFA7FBEDA +Block: 18 +Transacion 0: FC357DCC8DA390A9FCCB13E91EC0E1B3013E4DB26A575B96DF6D6BC98B2DBDE4 +Block: 19 +Transacion 0: 374A89A8FD64B25604FC5A09790814472B89FC4A937FC3A170C2C2F6DBEB757C +Block: 20 +Transacion 0: 4DF5D97A639197E9D9B70DC32C097E8057AEC4AB5DB6B8FF1A1553BFBBD39FAE +Block: 21 +Transacion 0: 17A43D53A865866049E18BF7144FC2A9896AB17AC368370C6B7569A190EAD705 +Block: 22 +Transacion 0: D22CC7D8B4895F2EDE00C9CF61A44C99F0810EC3D4B5177E089F8C7B2B5C1F15 +Block: 23 +Transacion 0: F36ACF2E619EC1D99C6A6217869E8DFB4BEA75EA0C2D560944C2EF6C8E326328 +Block: 24 +Transacion 0: 9FED83E8D0CBA6F70DA131CCA8A7072DA5032DCBE98E792858C47A5A452E9EEF +Block: 25 +Transacion 0: F43C1FC65D59123D5E042E7E2AF1AB855683B347F0529D7AA24488C84F984F09 +Block: 26 +Transacion 0: 2A19795218960268DEF8E2C4D882027ED2A31CDEFF6584BCF66B61089C355D6B +Block: 27 +Transacion 0: 02371302C953F1C670BB9A40ABAEDC9F6095882B51859EEA03999F324DD43F2F +Block: 28 +Transacion 0: F3DAD74E05BD02BF367339E434B3D170233D661DCF8F9F5CB198E8883AEB5C6E +Block: 29 +Transacion 0: 3DBCC2BF111806EDD2AF70D8C999399395F796A88B93F0F31469335A1798E62E +Block: 30 +Transacion 0: A2D96809C737AA708BF5F195662F25E2D21D0FC2D95317A77E8E8ACAF8D6BFC4 +Block: 31 +Transacion 0: B16C8BCA53554A697CF4C3BB66A80BA195647EF11810283D5E9AAD453783B822 +Block: 32 +Transacion 0: 8939616292F1BF479806F15D6E07E26B50F06A73020EE334929E28956B3D04E5 +Block: 33 +Transacion 0: C196190DE8616BF4E140104CA8437B0B693E9AB9B7770B748112116A4CA10B5E +Block: 34 +Transacion 0: F4AA9D561AA29BE53CF4E220E2DF856E45B5F565495565FA795C7C29E1CAC19A +Block: 35 +Transacion 0: 5D503E8FC5B7ECF3C0222D9F1281814F1A3A0A613122833D2050A07F8219F19E +Block: 36 +Transacion 0: E65228ABB7A5968CB8D820718E33D34932CA4B6B8451DE66569547CF55DBAC96 +Block: 37 +Transacion 0: 57379ADBBC73CA97E43ADCB4022DA01F02EAF8F14C17493A1CCE9784AF2904F2 +Block: 38 +Transacion 0: 70195C1C86B83B8BE6B9C59297BF20A1B91E0CA561152BBA72366B36CBDF3ECE +Block: 39 +Transacion 0: E6169C8D9A63269D482903A22C8153374537F6597F4FAF9436F26D3412ABC234 +Block: 40 +Transacion 0: 56815D13D9AA1FF1A596BD66A2D2B04A88B356BBB8521FB5A823FCA752BB3A11 +Block: 41 +Transacion 0: 4C959D16CC06A721FACDA6A802E0481FDAE802122C47F51EE22013DD09AC64EB +Block: 42 +Transacion 0: A9E267F4B01648CE18FF63C5A117889D71DD0580EDDA12F65CB1DDC709435279 +Block: 43 +Transacion 0: 6323464AD31CC13367992E482999DACA95F9229AC152B1648699675AA1F11A78 +Block: 44 +Transacion 0: E1E929712E75314C38EF659CB11ABB8DF7C4EF3E83C190236E94229BAF73189A +Block: 45 +Transacion 0: C3369FDA7A0C7FA6AC29A63239DDB3B6172487AB9DB8B4214C2D3D891175125D +Block: 46 +Transacion 0: E880D69D5CBFD81FBA371A352C353B372B768D602510D1942D0F97958F05C4D2 +Block: 47 +Transacion 0: CD491CE8CD04CDAC46011ADE0EB98D6769111E35FC28251BAA6B35A4C6980B7B +Block: 48 +Transacion 0: 4B188DFB56D2D2A93FFCCAD074CE30C573A74F89BF156416ABA374BA6901E1C1 +Block: 49 +Transacion 0: 782CA94DD3DAF11B870CF1949F2A0E5FE2B4F6EB13617CCB413CF80AD93086F6 +Block: 50 +Transacion 0: 42C2FAC11C4F42A172391E5E70CCD95C272F36D9AFCAE0FCDBAD3AB935122D09 +Block: 51 +Transacion 0: 764FC1684F34CAE7004F49DDB6D52B9E99AA467EA735778290C64EBA233F71D0 +Block: 52 +Transacion 0: 73A4FA7498AE0294544540944B51AF0861AB49FD925EAFC0441384899A13CB7F +Block: 53 +Transacion 0: 8253DF0375A4A60B066C1BB8116ADB52E053D7BF63729DAD48EADDF29046F8F3 +Block: 54 +Transacion 0: EBF19047FB8CE2031DC0032639494C929749114DB29F4AA179FEA5452808FAF6 +Block: 55 +Transacion 0: 27FE886C65EE305D083A9530E0279958D85439EDBCE8E888CCD2E704F837D90A +Block: 56 +Transacion 0: 85312A3737DDFE943B0FFEF9A7D638A04781C968880EA63CD76C6B4375EAB744 +Block: 57 +Transacion 0: 2E2A48C47DF96F22D71BC451973C5FDD9F2AA3CAFA70B88BDA463A946742555B +Block: 58 +Transacion 0: 750AEEBD659E338668035B0EE706A0E540D5E0A8EC6030575BED6ECD524DFE5D +Block: 59 +Transacion 0: 77109E090BF6B6C5AF69876DB8DDDC30AC2EF21B65587F50EACCFDA9B2D41CE5 +Block: 60 +Transacion 0: 2E8E9E02EF089A5F847FD4511A2B36DE7C824641119FBF08DA6E9D7A072A3583 +Block: 61 +Transacion 0: 7F64EE18122B5CE6ADF968E2297FD1D3F5BD58964018D8D3EAE6149C2C7E397D +Block: 62 +Transacion 0: B6E7B6D0E4D21A650F5B5300327B63C21DF5213C8AC376ECDAF428578854DFC3 +Block: 63 +Transacion 0: 72AE85BAEC608215D46636BD4024989D8FCF76067FC416E5C3D1B519F58802AC +Block: 64 +Transacion 0: E469C10131523AC7CDD85870D87D0D302BB2794349759FF70C96A3667DBB4DAD +Block: 65 +Transacion 0: 793780DFDBAD331F77D5ADE2935AFD53EB760B80C606A0C7AF6564DEE6F39DA7 +Block: 66 +Transacion 0: 1CE9C6F3F200A2EFABE5644DCBF0DC2E70853537610A27AC9982C8422CE110D2 +Block: 67 +Transacion 0: EEF95E45637283470BDCACEB0E072B6653278CEA847BD9D46C535D0D2FB01AE8 +Block: 68 +Transacion 0: 42CC2E40E3ECA94551B6924C1C08C4C10D50EC9C79410F8C25065840D1C9B9D5 +Block: 69 +Transacion 0: 21F032E8663935EC5E621C874216AA93FC0F54ED14BD7C7224452E846FE339AB +Block: 70 +Transacion 0: 381D5FD0F83F0BABE7073E2605D7E31E60B5D94513F9320EF595BB97F6A4E79A +Block: 71 +Transacion 0: 11845976ACC2AD8E319F3ED6269EA60727C35423177389BE28DCC83B5748DAB2 +Block: 72 +Transacion 0: B5B337F698A9F4CBC31747616B17B61BA79C8CEE5FF3F28F82DBA2098C25E844 +Block: 73 +Transacion 0: B9F945589F1A2EEE2EA3AF7557D395F59C516F541D42EC4C66C3E35E98705578 +Block: 74 +Transacion 0: 6B2DFA54A31F104C4156AE706290E0B0E824E1FBD840F15A3C7EBB4855C2879C +Block: 75 +Transacion 0: 41C1793B12E76424EB296D61BB88128EE51CCE046C7D51A42A136B08D4B0F88B +Block: 76 +Transacion 0: 8ADCB38D0A4F4B5F59A9D52D3997771E607FA98EDB434F1E07F8737A1DEEFEA2 +Block: 77 +Transacion 0: C933E3D8FF83C1572E442B5084AA1B9487246F3373574D848BB6F2ACBCAB27B5 +Block: 78 +Transacion 0: F2FD55491D4D47650EB4061908525D02C5C0B15570D0BBA65387B75DB9DBFDC0 +Block: 79 +Transacion 0: A53BE0523C9E8C5E30F7CE58BB550AFEABE45209773318A922E997A1693D2A03 +Block: 80 +Transacion 0: 79AB45C7B83B56ABAA1385698CC7B40086621C71B43382AAF8E2E4802BF37B53 +Block: 81 +Transacion 0: 1DE8145EDC1A55C11121C4879C7DF75A0E604BC7A73E2F2417A4028F7C5D0F6F +Block: 82 +Transacion 0: 22C793F05837F6613DF3992FAC656E9D3D52A92526FA3CFCCA8F9F31C043756D +Block: 83 +Transacion 0: 864C4D0E50425D23128C84B739454B8FCD9BE09F5312D78D547C496DE51A4980 +Block: 84 +Transacion 0: BB756A5FF9F3D0FEC49872DCA7D3EBDF26691D5B752856E80FC30B46022FB9FD +Block: 85 +Transacion 0: 0723C7FB8998BD250C8924F52199CDBB59D370C0FB157EECA1203DEB69833377 +Block: 86 +Transacion 0: FFF9F5E1DCC63AB8813C971890CD7E5DC18EE0D135921DBA4F149D469A89C3E5 +Block: 87 +Transacion 0: 4929B967E61B21C313A6067D70CA568672599E87CA7959844CC415D064D917CA +Block: 88 +Transacion 0: BED49855568974D074D6622FBB032A2A57F835C16D942DA543BFAF47E2B821AC +Block: 89 +Transacion 0: 5EA4267AEF9246E30A721EA9C7077C6664B7491F8A6F613C5CB2C323EA5EBEAB +Block: 90 +Transacion 0: 20C5F74B054FC5C921E778D60136E3B9F8AA258B3D5ECDAE28EE68AD15B2B1A4 +Block: 91 +Transacion 0: 39BDFB42528C6BBD24F6F8B6821A70F0B1689310B5BB7F96F413B42DF591B4E5 +Block: 92 +Transacion 0: C7DDABEAC231AFDD3FA7860FBD86E032094B3ADB545BDD96EAEE0ECC0DA31A52 +Block: 93 +Transacion 0: 1CA2A5AC3EFE7D880F88CFAFD662E74D68181AEAD4F274B7AF060C0520476BEB +Block: 94 +Transacion 0: 462F13E5224DE320453FADC2F713BB02CEE41306C13A536AE5E06428F3380B5D +Block: 95 +Transacion 0: BBD413A6AC23D5915F4631137266B8DE22860A905AB9982E577B21E53B614DF4 +Block: 96 +Transacion 0: 9443F91C59B440AF8D136CEE76E5CC3DE5D654BA4BA801F131ADD3A79FB68F61 +Block: 97 +Transacion 0: 0CC41453670377733FDA84FE5E5D90BE8C381E0D84223B2ACEFCA6084A849223 +Block: 98 +Transacion 0: 6DCC0DA064CE086B24F46978169C4C0334C7587260C5D0F76EF380FF04183241 +Block: 99 +Transacion 0: B5A09B3E75769B73FC5557E4CD840B6F39BC64187122282C578707A634DC09D0 +Block: 100 +Transacion 0: 274AF90F85926F3CA180A9C9473194C81B1809FF8C9302E8762AC71C95332A89 +Block: 101 +Transacion 0: 1D24FF86321874A2D276316822CC09A63B37097F56A7D37431E3D420A315F90E +Block: 102 +Transacion 0: 6FEE3ADDF456635330445A533EA7148771B0AB818B174A426D691E694D3D5B55 +Block: 103 +Transacion 0: 95D84FF92436C233ACA0BF8357DD8A3219DA6BACFC1EC56D60A7B7FA8029FA94 +Block: 104 +Transacion 0: 769467A22E021C7050557699CDCEB96B5AA4B788E14B9B1623A333360BD05B81 +Block: 105 +Transacion 0: 5BF2FC3095ABD4EA10EFECD4FB99704F9593F67F55EF3CFA44741A058B6456F8 +Block: 106 +Transacion 0: 4107D20DB19E32342C40AF84C8B0738FF1245008A7CF3395B71F41122B94E8A7 +Block: 107 +Transacion 0: B9845C6516211C96AB876A27700C30294947E14F5BBEED573E0D42EBFBA3B9B8 +Block: 108 +Transacion 0: 82F63509F597F986634B6185C242D8ECD6D34E2145F57DEAE3E2606C3574B5EB +Block: 109 +Transacion 0: 6EE27EAACAA4DEF6C905360A881A830C2FF3A8311C83BCAD467B44A014E14CB8 +Block: 110 +Transacion 0: 8F5CD5C2A31B270EAA3F2AB70DEC42362949D26AA350C4F6C8C52F6EDA19E28E +Block: 111 +Transacion 0: E3DD473F28D39FEBAF63176ABD5A7D96A1C60F9CA22C240EA453ABC9BAE514EC +Block: 112 +Transacion 0: 4600AE9F51506E4F515F5FE34975A5368C6669942D1B381D3FE14141272B33FF +Block: 113 +Transacion 0: 55C4C9F33F9B01148A29F909FE97E92185787F5B4BD7A7D888A8617B00C77719 +Block: 114 +Transacion 0: 810CD8B85D8152783330E9722BA547D58B6A928C77E22A6631C17078F2AD078A +Block: 115 +Transacion 0: F08DA27F8BC70DBC5A1DCE77D509A44DD0751FA2AB3EF3973AD3424DC863D45D +Block: 116 +Transacion 0: D2438452865CB38913FE6725085FF91D153C8FCE908F88766F8BD579D4F0DEEE +Block: 117 +Transacion 0: FDA9353057B3F0871A690DABF5826BC3C353D0407A6C89DB7455D6496592717D +Block: 118 +Transacion 0: B4518A34A3D058AD7A9A07842B9CFA718CF9A2C13458DF883F30B74D69210758 +Block: 119 +Transacion 0: B99BCC672614F4E61E78834B9FB955CA2AD7E7D17584465C8D604D91D5651C7B +Block: 120 +Transacion 0: 9700FF159A785C679924EC104DF962CFC18A229B725B2C1E84A8005A3629A690 +Block: 121 +Transacion 0: 1985DEF8BDCC65373924FE62694B041113B198DDB9732AC3BD674201D7D37E5B +Block: 122 +Transacion 0: 6B417A4E70C86DDE0CC3CC7833349DA8E71D4087081CDD36CF87A2C676804B83 +Block: 123 +Transacion 0: 9F558EBCCE91D5B1E59AE27DEA61235FAE1155B1CF7D3AF0DED0B6508C5734C1 +Block: 124 +Transacion 0: 4B27CA6FE3FADAC37657E04307DB40C59C0065F332A955AFFDB11F20F5896624 +Block: 125 +Transacion 0: A9F3AC66CD6D2E0E314B36045CF0D40808C2AF3E078B997B97DA25304325605C +Block: 126 +Transacion 0: 17588504EFF9F3706D3ECC205BF7486F5B48CD831228FB2759A78C618BC4592D +Block: 127 +Transacion 0: 32456269E0F40C03DC0A5A20A429CE3DBF4D69C2E0EDA2A09240375DCA2417B1 +Block: 128 +Transacion 0: 52BE53C2ACE54B98C9FCAE139E2214D6FFB9AB7E47B96DB9C23F66BB14029496 +Block: 129 +Transacion 0: 30A5899E2FC047CCFB11098C5447BECE0837A9DE522509EF73124ECB0052D5F0 +Block: 130 +Transacion 0: 5ADD490797C2A96DDF1A014D1BC9F9B2B270BE692D9335A0E0E10C1BF2A0CA8C +Block: 131 +Transacion 0: B7F959E0BAA981D1FBA7FEAD3D11C95ACF8C96C679153EE8C22754D4226B7251 +Block: 132 +Transacion 0: FF862E8F129AA42D1972281B3F9690AD2D1AA073840BCC87EB30631A78FD7B96 +Block: 133 +Transacion 0: A643E43EBB13BA2BFF89AD6996C3F0DCFD135384E992C0439B79775E49DAAD58 +Block: 134 +Transacion 0: 26DE07B5373DEAABF450F9ED0DADECCD0091E48EF1174675D0A379E845203600 +Block: 135 +Transacion 0: 7DD993C21FE2B29B85F4C71E7EF53EBD7591143E65828A5C99203F3D235661FF +Block: 136 +Transacion 0: DAAC50396C315BB389AAAA3D0BF7398D589519BAA6C6225184B6D87746EFFB7C +Block: 137 +Transacion 0: F1FF402E25DF797B4AAC64F3FF0263D4E9814A7B9190AEBC09599E6F150C8ADB +Block: 138 +Transacion 0: D2A49B49F0E0D2FDFA3A5DC8A12AD55E93B172104FFD454C6E672FEBE480AAC4 +Block: 139 +Transacion 0: 182497B07A3AFB497AD8B0ED1E675476A134E828801F9C3BBCB2FF5D745CE559 +Block: 140 +Transacion 0: 410A7CE37AA854449C6DF6A0D358FA15722F95FBE0FBBF1EB33486EA6CBB545C +Block: 141 +Transacion 0: B974F15E4BD428D4347F78E3317103BBEB186DA4F3A6077E98C42E40D8453653 +Block: 142 +Transacion 0: CC687462C47BC20D806651C62A464A1D1466C2989941FFA95BEE16FA9473A0F1 +Block: 143 +Transacion 0: 274DCF34CA75A6B4F2F1531E3B012A8DA301213AF6CD8731CE326764592033FC +Block: 144 +Transacion 0: 225876257F4BAB51423853D566BCB148DD166EFEA8ECEE1E3F2EDFC3750343E8 +Block: 145 +Transacion 0: 704E6A2D1F74223161491ABBF6FD90C69E81E68A96E110F40E14F69FCC09E622 +Block: 146 +Transacion 0: D54D07B9630AC02A00CA412E4CF349DB09E9378A92556E28558532837F86DBA0 +Block: 147 +Transacion 0: 95312925CD6AFAAA7F6583B02C3654652878C93992BE93F11015025FD6625E87 +Block: 148 +Transacion 0: F65FDFDE5D6BABC425105B36248BEE7D0C4082BD326C488135CA6AD833F16B2D +Block: 149 +Transacion 0: B142EC4CEC5091FD20A84F1439F461C1F3BD6CBB6F113DF33FE9B0860FC30B1F +Block: 150 +Transacion 0: C50C6A5AA28A141998510D930F40A523A1BF6AF9428142BA2544D2A0F9E66987 +Block: 151 +Transacion 0: 8501E2238E84BF6DC89284D00ED056A3886AED70C7648D6F3C478892F0B2D434 +Block: 152 +Transacion 0: 10040CB5759E5A8280DC82B0BFE7A00DB0C8838C0E220C24E5825237815101B5 +Block: 153 +Transacion 0: DE79DB20034CCFE9356ECA2D088A37BD65930A78FF8547EF086A470CA8986EF1 +Block: 154 +Transacion 0: CC4CCC27B0A3F659F4B6E25E13B86B1BF9B40B76CC7E176D6C7D4692754BC71B +Block: 155 +Transacion 0: D23CF8DE42F8592430948CB3F9E1B69F6AC81DABFE65190D0F91C635D45C2A37 +Block: 156 +Transacion 0: 4AF5A9429D64EFADB1C6E275B19A14CA9051F5D4A6953753689EFC3120C58DF6 +Block: 157 +Transacion 0: B97AF236B791CCCAE09A7FB91B00088096DB3D254646E7CEB9F286CA4AF76569 +Block: 158 +Transacion 0: 1B24142042F0976925620B518F8DD4F6E9A6FB566070F15407DDE707A728A5CE +Block: 159 +Transacion 0: 081275A54425179975884E95FC8C180898F999A7588F2E8C0C5D864DAFD2803E +Block: 160 +Transacion 0: A9124A08448259A61650202556D2B59B56002CD250F15FA089BEBBEF6CEC1AEC +Block: 161 +Transacion 0: C77230FD6B2B7CD4703C5FA4F7B146480DD7D7F703BF2EEF5107EDEBB6902F96 +Block: 162 +Transacion 0: ECC90E655EC6FFE481925BF7DC580CD1897DED8086B2C92E8C223A1A3C15B82B +Block: 163 +Transacion 0: F4F1F722AF674BAABDF6F9039029056E71D4A16E1F9C0D67CF26E4EBE50E1416 +Block: 164 +Transacion 0: CF0D80464703DAC273D32425212096528400C3D0607237605C22AEF50E20B2E4 +Block: 165 +Transacion 0: 2BED756E9291332DA0CC14CA5EEAA6A86DE4F98B483EB1806E8548E7108A89F5 +Block: 166 +Transacion 0: 1380A067B7AF4AF7C6193A4B03C2397C8D8BF11CFD686473B012BEC5909BFC5D +Block: 167 +Transacion 0: 65A1C9B523CBAF222290FF857AA9E0FFBCFF830E7CD8AE046AA284A751E11F57 +Block: 168 +Transacion 0: 34D14A443C5B63788468855A5E74DAFF6EB08B50A7FD1BBA6D8657AA23BB3054 +Block: 169 +Transacion 0: FA95FAA636E0896DD940F57A818305AD3054497B5582AAD4CE821F7DA7D5AE13 +Block: 170 +Transacion 0: 98BE93DF4054D67C601A6627BCDE85C2CDEA7DB1A6A4E2832AC4266BF8592EEB +Block: 171 +Transacion 0: 1E50E1C396BEE2AC32A307206C864D39EE9EC198EE133AC010AF002E34EC0EA1 +Block: 172 +Transacion 0: 5BA5B3BEB03EA33C268EB90D54C37555046348A430B69080D1FBAA9A40879264 +Block: 173 +Transacion 0: 776BAB8BF26A81F3A1387B50152EB2A75542B074F98027FAD943AB5E1D45851D +Block: 174 +Transacion 0: 4840EE9C31A591F83FF72F3F6B503FD4BE863B451C8E6AD0898C1EA9CABB6457 +Block: 175 +Transacion 0: 2F8DB71AD63FFD8D5BC13CE4E9E7B375C6BDBB27340C041278F33E784EE4BAD8 +Block: 176 +Transacion 0: 974F39F6A3DDC1831508C61E5911554B21601E1828697A975A7CB47760737516 +Block: 177 +Transacion 0: 7BB7EF28041E793A0C403E416431BA92CCC5DBD63F28BA5E689DD818EECEBB4B +Block: 178 +Transacion 0: E15FB5A869FB5ACA8AD56C68458CEDB4BF9C724E1B31BD65727E0652ABA18CD7 +Block: 179 +Transacion 0: 3291B6FDDDE92D944AD9A840561781E92A89F6D0FD542A113CBC367A2C442CA5 +Block: 180 +Transacion 0: 2EB377CDC77C8DFF306E0A34311BE354DAE5B9961F22A353D3CDF3DAF24E6E06 +Block: 181 +Transacion 0: BE5D1FA61FE999FEE18004D11ABA8A4D50DE218BE962385009FE4122D2F7632A +Block: 182 +Transacion 0: 9AC3185E4388F10F1ABD1BD0805A0533A66521F98301B09EF13F5C894DE1F4CF +Block: 183 +Transacion 0: 7DF85C829FE00738F2DC6BBF81C1835A33651D5F6AB862DA14EF502671666522 +Block: 184 +Transacion 0: 0A920E24FDB994B503FC591C8C78E698E2D93552D09716CF15B5F9C33F94DC19 +Block: 185 +Transacion 0: 53FE31BCA00D52655EA33035218EB9F4E16AD2F2A1BB63ADEEA64D09AFCEE5CF +Block: 186 +Transacion 0: 4013E6BE12D943854C7AA15FCBA3F5979BA2C2024EC2484808A509F27B17D474 +Block: 187 +Transacion 0: 75DB616F062ED403F6F326C69BC51DB6D70C6196D770475107182FA20EE34CCB +Block: 188 +Transacion 0: F44515939990A0DC688902918CC2A267EE2A544465A80ECA0C15BE23798BC1AC +Block: 189 +Transacion 0: 00038DB28BDAD97D66F49D2ECB410DEAD3C93BD4C25DD685865EFB98A92BF4C2 +Block: 190 +Transacion 0: 1E25E57201E1F145446D5B1984E2A1E6F30D785974E22F60F6FEB28232B19E86 +Block: 191 +Transacion 0: 8513A31BA0E68D6F694E67B9062A7E9F4AE5A828684D89BD32357B7B01B9D23A +Block: 192 +Transacion 0: 84478A66084ABB4935D771A69BE6D6466EF8716325EAFE3AB7311AA56FD4EBFE +Block: 193 +Transacion 0: 3D9DF8495896FADD682451329A4558743743E6BB638D47D773D5DC8D37B7CCE0 +Block: 194 +Transacion 0: B25A526C33669B7E184112E42681A27E7BA4E6ADFAAD8F07568308EF17960C33 +Block: 195 +Transacion 0: 72E9408813BCE244D1B6DA2B04F295129CE5A2D11B0143F4F9C26AB430637848 +Block: 196 +Transacion 0: 046F44EFE24A07E4DD99AE2ECF3E1ADD608C4252D0250FAF0106307140E1E557 +Block: 197 +Transacion 0: DDE670E27B0E29CACA83621C3D6412C881D807875940CF6197E5156A650A39E9 +Block: 198 +Transacion 0: 05E31685EE3F88D6F6DBD9731CBF0E4A471D64E98A149575A68E2C024DF20B96 +Block: 199 +Transacion 0: F7603D45451CE00405E3304B776E359DA698FE741CE054896F33EF6F5B8BF0FC +Block: 200 +Transacion 0: 547104DB4D373CC3A29D12D341318778EDD268281DFA38363244BBA44C214D88 +Block: 201 +Transacion 0: DF4CC31F486CBEA1873D6F61E7D0CD671A2CC67BACDC0CE7546DB1A1895FBA3E +Block: 202 +Transacion 0: B32F74E782D6748C99977B415F130798ED9546FD94A423719C6E8DDDBD0DDB41 +Block: 203 +Transacion 0: 335E2EAC0B5ACCFEFF0AAD66F5B8FDBD78902612B864538CF4FAFE5F64A7AD7E +Block: 204 +Transacion 0: E7E9EC57FEBB95FD3BE82454AF9174346336D62B355806A6ED1C2C13F7A686FD +Block: 205 +Transacion 0: EA0F17D9ADC6C33B9C30D98BB6C3A19AD79A32828B92B1F927E9EC88514731C9 +Block: 206 +Transacion 0: 646E19BB59854C33324257C02137DD229968837178B8F8BE7C784D180ECD5898 +Block: 207 +Transacion 0: 5F38A6A30CFBC62554127E6CE228FC63AAAACFDCA30B736AD4718FA75455DE96 +Block: 208 +Transacion 0: 26C32873E5596D430ED220A8A56FA7E379002CB526183EE7A7DD352D4331FBE5 +Block: 209 +Transacion 0: 2EEB010E97A954ACB04CF95567229A5AC8157F5979E32AA864A1B20BBDC818F3 +Block: 210 +Transacion 0: EC42B7CE0A6A9B2997975941A07444A6730A484EF154EE479BD4A9550ED4A433 +Block: 211 +Transacion 0: BFE7DAA72079393E28C925A3ADFFC3D6AED7CC12798C331527D1F269FA63092D +Block: 212 +Transacion 0: 92BF17129D0C1347508907DD878F2BBC976E0934EA9C8FC3B91972CA46465F4A +Block: 213 +Transacion 0: 5ED0C457ACC8B1E615B51BD74543E8FFA861DE7A959D3C33A21CFED0CED063A8 +Block: 214 +Transacion 0: 29B1E8AD9C4BFB47F97643BE82945CB59C5EF685559504844DDD46A1DCC37BE2 +Block: 215 +Transacion 0: 243260DA2118368CFD808A484B7959012F833A869AEA72141F86FDA89DE4F58F +Block: 216 +Transacion 0: 722B3FAEAFE96569BE678A69C05905E227B746F043D430A13A5C99B19AEF622D +Block: 217 +Transacion 0: B0283F61968394BA35B7F9601FFAC6F1B8A177E16179A0BEC4AF62F47ADC88F3 +Block: 218 +Transacion 0: 7178A912E54E192CF1DB3E2EBD090F735E171E673208A8E3AC533C71110FD7B5 +Block: 219 +Transacion 0: 24FB2B2C07ED381C3EBC1F32C374E609C6E568A4A29D8C04842F0F0DC0242997 +Block: 220 +Transacion 0: AE49085050F534DB53D4E1CA6BB8B3958B6933F9CE6AC41DE8A2FB9241F3E03A +Block: 221 +Transacion 0: 0338BC898080D83A808870F3A59C253C0AB25A249337B63CE26DF34D641B11C3 +Block: 222 +Transacion 0: 93D392D2650FEDD9D2CD4CD67AF8792526BDF7509AD9C4104F766EFCAEB3C71B +Block: 223 +Transacion 0: BF2A8B59866740CD1BD0C1A399FDB1B5801AAA84EB632B9FE70B5A89C54DF42E +Block: 224 +Transacion 0: 4C365AE469930A4CE2C2B52BB6CB0CC25328A3C424F8A948C34F07B4B40F23C8 +Block: 225 +Transacion 0: C5DAF96771C7646ACEEEC484892CD4E8D9778FB9EC7C8579941C298DBD060F95 +Block: 226 +Transacion 0: 17F898824DE670FDDAC71EE77474FE3235F638968995840020CD834AE06C046F +Block: 227 +Transacion 0: 67C3B1FE96340ED2C96069BE1E3829E26275C584D9FE709A9B98AFDA73C3CA95 +Block: 228 +Transacion 0: FD784B0505E776DF56731C579985984CF739864F1B349FBE031827506353E52E +Block: 229 +Transacion 0: 2124DD113F28088226FF292FD05D9AE665C9FD9D0A45028A47F7388BF1FEA351 +Block: 230 +Transacion 0: AB3D904C6C32198304D1ABEE9A3EDEF06DD3173DE598069F18964443B8693812 +Block: 231 +Transacion 0: 2B2F2AF6E7FCD81AB3AF6D453ADDA38E7CAECF2A4AF76D7330CB4B0F8A1E8F7F +Block: 232 +Transacion 0: B5EE6BF7B6A0B0B70CFEE686E58CD51B97F95595F4B4BF0131A4A904A2C9B46E +Block: 233 +Transacion 0: E3B1B614772EC74C2128E445D55E6AD1BA53D75B1BE5BCA1AEE30C65EDF21A4E +Block: 234 +Transacion 0: 35DC0CBE986E28ACC5532DE06D6F067403CAF57CA129B7985FB0DF8C88A53AF0 +Block: 235 +Transacion 0: 0FC94817E1476C418BAF9E387A37CB7BA744FF999977401482D86FB87D99CE3B +Block: 236 +Transacion 0: 550377252E9922FBAAB445B1393944288094831059B54D7148F6DF463C8B52C1 +Block: 237 +Transacion 0: A6E25AB745F4ECE163AEEF6C4543683E4DF96692D5CD113FCE226792B58FEEAA +Block: 238 +Transacion 0: B59FEB8D4DBFF34EE30262E81875DE29ED1B85643D577BA8A222B6368A381DAC +Block: 239 +Transacion 0: CC16AB9F1835608FADF8D91E5020F3EDD0CD9462D9A86CA7F6C3881B94A2D95D +Block: 240 +Transacion 0: 760DB09C3A33EB03DCAC07BC773D0DCB980529751D1C20799C667B42A3B0992A +Block: 241 +Transacion 0: 10E3224E31DC3F8EE0AC630C850F3AA10CE0CBBF5F74AFA665885B26D671937E +Block: 242 +Transacion 0: BF15760DEA728B80335BEC2797EC77FFC1A01F2B4E8C2812217E5DD2CEC2F5AF +Block: 243 +Transacion 0: E146943CD1D6EFD812B1D7059A9455277E71F39CB1A5643A3A81A853E3D58F17 +Block: 244 +Transacion 0: A47E3DE47480ED9CDFBF0158FE838286A5F7D789E6724867E029F9E8A033A046 +Block: 245 +Transacion 0: 64290A6A8911A348C1820C333039F770052AC4981B0199B46AAD556A270F60C8 +Block: 246 +Transacion 0: 11C47D4554BCFA439E844A2137E6F09E62DE50AA741EF9FA90BF187AF1EA3903 +Block: 247 +Transacion 0: C2C27A64DD86B0F2B02E626AF8CF2F945F9805C43B590E0108C0D69CA6290E2F +Block: 248 +Transacion 0: E04FB7918E070C886A4044B7B56BF7EB35F2743685088C58511A3DBDF4DE503C +Block: 249 +Transacion 0: CCB64DA9DB3AC1752806F2C9EF207B55E77D110B9A9320C1BCA749C596CFE804 +Block: 250 +Transacion 0: F09D91F3D8AAEFD8F100E54C5955A0EB05ADBD2C502B9141E595F77ED04D35CF +Block: 251 +Transacion 0: C6F00826031E4E572D3BF8C5E4E89262C0F34B3F2451D1D8B15D49EBE6E156C3 +Block: 252 +Transacion 0: 238AA765770816A8BDE3A8B039E42AA470613CF7E5A915F7C314962EB02E0B29 +Block: 253 +Transacion 0: 15AE5DD71A77AAD7B14B9D62AE93A2C416D5158DC1DC12ABAFB2CBC737ECEECE +Block: 254 +Transacion 0: 904A5F0927AA6AA53DEAB0E4743BF9F8176AC0B5BD99BCEFAA13B876AE3EC218 +Block: 255 +Transacion 0: 3A0E1E9B7A22020A156DAA08F1B1248DA8A64D76344EE5B97E10763AC2612691 +Block: 256 +Transacion 0: 7B64E63E637AC7F9128B792FCC9ACF026AF45A21892C6E21731DEBDCD68187AB +Block: 257 +Transacion 0: 708CDF710539593B56B92626DB7ED741782E1AD739718DDE0F39C6651F097105 +Block: 258 +Transacion 0: 5AE06A6FF0F242FA09997DFC47761E948943F50DE170BB951F4A9B3F8B01A8F5 +Block: 259 +Transacion 0: 952A69E8A179A49B4DA6C55ACDC5CF022678D9813385E7D14BFADEB917C59847 +Block: 260 +Transacion 0: 8358B279FF43030387BA5D95BCDB85A4900E1BD6BFB8AE53390DB20EDD88B6C4 +Block: 261 +Transacion 0: 3A29DF8EB46B59C66AF3F2299994F9163CDE3E759B676D2B2B93AD2E7D47AD41 +Block: 262 +Transacion 0: 36927167905873357B104C399B47C243774CC70283AE55B54BD5C2B443D4FC67 +Block: 263 +Transacion 0: 2A4957FBF6A80F74D6F344A094114EE338E5A5C576A85D5A3278DB4F554A8CD2 +Block: 264 +Transacion 0: EE8167476C693DB55DE1500619C39EC674318193E9B2327C1B8D7A36598FE070 +Block: 265 +Transacion 0: EAA56C2DAC02C8E12A663273D16561C9421209CD5264F84078E764A22BE94FA4 +Block: 266 +Transacion 0: F4DBE6D395C7E93CF0E527C3D6C5FB14F1CAB10088B2FE0B782C4CB04329D437 +Block: 267 +Transacion 0: 3FAD31404D8404988697F3C3221E26C3E5CE81FB4523F368AC5F29F358758257 +Block: 268 +Transacion 0: 0A4FE4E326D3E9FE15FDE6732B39DFB5A1AC26691A6515EDF71F866AB394CD62 +Block: 269 +Transacion 0: 68F723467C0D39CD822314E57CD56554C3C93C19C135536B4A50C3E9E738A35E +Block: 270 +Transacion 0: 975E17E211AFAB0674B881B4FB820360C3A31A2A2CC77B60DBC27C2F531C3080 +Block: 271 +Transacion 0: 418F2343797ACB0990B77634CFF89B8004736186731DA21B69C1170BBD4291DA +Block: 272 +Transacion 0: E8AE5D397F893664281E375F02B9D4ACF7ACB9CF3BB9D86862A064881C8B0155 +Block: 273 +Transacion 0: 87A7327727E0B63577808F62DED3FB460253A34A0AE03176E7CDD965E37F4D45 +Block: 274 +Transacion 0: DF4A6FC4671F456EF277B6719EE69E16244F81ECE8F20DEC7A8AA13A5EB5A6A6 +Block: 275 +Transacion 0: C8E3DF1808DCB932EDD2903EF5DAF5B228A294373F075A4C0FE1A7AF76737081 +Block: 276 +Transacion 0: BCB248F3CA047C720068837652DBD2F6FD18928D328269713F41972E7090A51E +Block: 277 +Transacion 0: 3B224AC24234E0C9699ECBE3C00EF8FA0830BACDA03D039E88FC498C1E88CD6F +Block: 278 +Transacion 0: 884967FF0184272F9CA36C15FE924B6C4F08D061E1F28A951F88CC839E2BC118 +Block: 279 +Transacion 0: 7D6294D1EDD1E8D094BDA5E171C8629932E3B5C7A47AF7F5DDAAC3922F89FFB0 +Block: 280 +Transacion 0: 07927F55432755A5424FBAA5772907614EE972A65BC2EBA6A2DC80D1A7005B77 +Block: 281 +Transacion 0: A286B5736560D59ECF4478C802303B897387BB2EC900AC3038C573CF5D503405 +Block: 282 +Transacion 0: 7F5CA571B6BC1D00A863777A6029F426FA98E4A450E9AF3D959C4F493D9C9761 +Block: 283 +Transacion 0: B760A4BD2C34A782B9B7165B4C404853FAF145B21C73E7E6738DA21E29D6BD52 +Block: 284 +Transacion 0: E3E040D88DA72F2B805D1A73CB86E132BBD2BBA436437AB5B0D24DE3487B0619 +Block: 285 +Transacion 0: E291A329072C2310F6DCA22D6F96F6A98F8E700B98992524094B7E4943A91851 +Block: 286 +Transacion 0: 4DF437A5C7CEB7150BCBA89AE850226E322E591F5FD304B8A958767B4344EF6C +Block: 287 +Transacion 0: 9009265BBE017E7739030E7D75292A37E77017137AE671DCC7385606098F6D21 +Block: 288 +Transacion 0: CBBF961139F9F8B1330A9B2FCA606B9BC12AE77ECF9C1B4CFB6FE33F5754BA54 +Block: 289 +Transacion 0: 880A09AB0ED3D5C360A48DCEF4982A6C92FABD0738C9ADD39ECE4530D04FE272 +Block: 290 +Transacion 0: 6FD4837D07212F04C08278CD4BFB7DF567D1F3DD871ED9FF20E39913BFDB57F1 +Block: 291 +Transacion 0: 1C3CD06143D410F638D51A29CFB3CBB7C74F2C27285B83270B2D45EAC36422A7 +Block: 292 +Transacion 0: ED567767572E73D8C36543265DC07ADDA68D9D77030EDCCEC80F6D1DB2E89937 +Block: 293 +Transacion 0: A0807C71A404637606295AA2C34E64360B0C3FDC3AF5B6BCEADBD1D6B896D840 +Block: 294 +Transacion 0: 6F0284045D2E8CEDB02B8361A907A88676FEB700DE502F10148EC08C1C5F48FE +Block: 295 +Transacion 0: FB9928BC2D57A6E23B3F134BA687B3D7E33B94B111D2C148DA88D4BF0EB7B02D +Block: 296 +Transacion 0: 2B544C2144C96E18865BDC2587608994B3040870C3203EEC4764BB05D901F57F +Block: 297 +Transacion 0: 5349C232586129C7199A903B2AF1BE9D952BD5AD46E5E22315329452876B1DFC +Block: 298 +Transacion 0: 5237D9837A59972316691BA82D8B865F301CCE5FEC64640FBF82A78CBFD2C421 +Block: 299 +Transacion 0: EE408DEF96C7F38E05378E9069B597343499C04694CFD51A64680FC0C158F69C +Block: 300 +Transacion 0: FED86F29C1533394C0EF76A659C00A830C369D816221C40BEE701A8E87CBEE57 +Block: 301 +Transacion 0: 8E27628916CCDCAAD5D7379057C6D79C40AC21250E51A06E79E18751A970C937 +Block: 302 +Transacion 0: 2AF236410966662C0C5257F46DA184C3830272F6D5551966C75C262B2B645B6A +Block: 303 +Transacion 0: 34578F62E43649464CCE0E9AA54763376DC8D7511336C03290F36350121C99AB +Block: 304 +Transacion 0: 70DADADF7728CD087A77EB7E3AB9B8E72A12C0D135AD63BAF78572AA0F00D6FD +Block: 305 +Transacion 0: 40610F7D6525C7EADFE147D8BB4C13239BAE3EAE77B8191AF083020FCC65E016 +Block: 306 +Transacion 0: 73363375BAB4F662B4FD2FBDCE2BEC3A5E0B9DFE83DDBE7D7FAE14C95099FFAF +Block: 307 +Transacion 0: 90E5BE62397951A3BD95AD76AF33B4DC3E7A19B3494E8CE0A18AC54AA485A0EB +Block: 308 +Transacion 0: 18D2236DB947FCC7FA2D81158C747BE4D473143D55394FEE3E32391051FC095C +Block: 309 +Transacion 0: F4D9F729573ABF344386410355B456CF9B8587E4812810A9747C1C04E1731F7A +Block: 310 +Transacion 0: 98D9C4D7A64D0689B5EEF36BE54E98F5497339DAB2D8E3C44A3CA3DB47AC4940 +Block: 311 +Transacion 0: 6639E7E42AE559FCF44A940EDDCEE8E63C39932FC637576F9E3C5D238AE18006 +Block: 312 +Transacion 0: 515EA5F03C185AA49F3E728FC522700028AF4B05CE1F0CD826F39CC07D2B1DF6 +Block: 313 +Transacion 0: F38E4AD932FCEE2878C9FEF03AEAA968FC7CB938FF10EEA71EA5EE458788CC4A +Block: 314 +Transacion 0: BC39041B0E204EAAF5E609C48C634B6B68EAF6B8009AA902D8584F9A0C77185E +Block: 315 +Transacion 0: B2EFF3AC5056EE12E2B5A96AF746F5973818AAB93FCF4738B3F391F27C66B159 +Block: 316 +Transacion 0: 18993059912EC40D6E99D0DA4EEAB6B6C68B9F959B31DC0C2D4D2D30498A62E2 +Block: 317 +Transacion 0: B100A150AEF9B61591B6CA2CFD8692925204627EE2F661B37D151E08885A446A +Block: 318 +Transacion 0: DD3925C652A893370AC0D0D3B5DEC42AF6391A3AAFF91996EE48E71E58DB290F +Block: 319 +Transacion 0: 835FFAFF59E532597D29F974049EC861AB865AD8991DD054EDCFBB4DA5C945BB +Block: 320 +Transacion 0: C026E8D8047E96DA914FB6EBE3BF7ECFBCFAA19D8A1DD6732C2D4B8787C315BC +Block: 321 +Transacion 0: 30F086EEFFEF66AB6314B07C9617FC740DB852B92C2A9D79AE2115038D0E3A16 +Block: 322 +Transacion 0: 6CFDF75F7A699B9856521D5982DA57E5668D02E94AA614F9669763A784C8FDBC +Block: 323 +Transacion 0: 817ED60CCE3E03EA3BA82C06EFCFA7441861E7BD3EE016852596BAFF29EA61FC +Block: 324 +Transacion 0: 6C2B940931F1F4807BA24CB13ACA6B13F26100E84D5C4BA55CBFB679895CEE71 +Block: 325 +Transacion 0: 2B3F28B6368049E01917F44EEAF8EF96844B9D0CC72475C86323BFA4AF8DEF0A +Block: 326 +Transacion 0: 21512B092BDE6528C9840184F1D78E665C78BD1C765C829803B0A482A5D46161 +Block: 327 +Transacion 0: 8B8C325B6B2C154F774CF1DDB46EA98494963793D38EC3E416980CD89D33FB24 +Block: 328 +Transacion 0: 06DE54975CC13CB84CB43B229496ED9D1F004BEE7C2B52601C8031591D60E3B7 +Block: 329 +Transacion 0: 0569C1508BF9FB344A65935BD8AF967F7C72B2DE7D1ED6A3BC9AF082517B3EBE +Block: 330 +Transacion 0: 39AEF4674D4C0B262F46D7737A9A19A9CDB6E567F8585BA57C30489C3DFA0641 +Block: 331 +Transacion 0: 8720B1B397FF28606E4EA4317F9D5E7B01EF8C89617A37516215D8FC443D31AC +Block: 332 +Transacion 0: 5629FA1E2E63C145471455E7FA87A47165572007EA1324B5CF7147C91B143F41 +Block: 333 +Transacion 0: 70B0FE7E9F9A287348DFA35A534BAD004A064403E9B8029DB18B705B7D5CB82A +Block: 334 +Transacion 0: 7CCFECBAE66AF4EAFAF3306F1CDE711ABE277E216DF252A3D74F10B79C76926A +Block: 335 +Transacion 0: 3F9AE2B0505EAD2BD2B701C419DF519538AFF99CC036A174AE2B6C569CA2CABC +Block: 336 +Transacion 0: C098334CCD1B4BB48FC6B460A3F6FF3E1184AB9776181E55A80097E0B690FF3B +Block: 337 +Transacion 0: CB090B2BD2CDB73C3ED8A828AA20FFC3EAFFE72B53A345363E15C0DF188E4447 +Block: 338 +Transacion 0: 3DDEC50405754518AD33CA09D9B35D4AC00439AA88D8A5B5D57D72765135F787 +Block: 339 +Transacion 0: 0D46267788252FCC1C88FEA3C59AC443DC8A058127121AB83A4FA078B94850DF +Block: 340 +Transacion 0: F0AA1AF92FD3E1287043D7B3B9CCD1798454776D87D1985BEEB24F2F6EBFA80E +Block: 341 +Transacion 0: AADC016A5DC27002B6B7D5BC70ADE49F46A3E83A86D48C1BA0F68D003383E6E1 +Block: 342 +Transacion 0: 32BA3D2E00F08F8A89461B76261DDFB73388AA230C1271D5215CF163DBB40F1C +Block: 343 +Transacion 0: BCC5E3AE406243C4DF00290D31DDBE4827575C0B6F929C2C5DB775BF69A84255 +Block: 344 +Transacion 0: 6743246DCA88E466A693633F39A4D68C95404506ECEB214C40855310C2C05C53 +Block: 345 +Transacion 0: F38136E53DA65AB5367A0EC73B6A495A5050D49133B1DDC5C6D90F409710F62C +Block: 346 +Transacion 0: D71CBADDDBD255A7321C73FA552BEA8AD8969A2D3DBCBBA2652DC9BF604BF089 +Block: 347 +Transacion 0: 3D756DF956E48B9A6E376B17C8C6A3A98D85B3CD47903AF1F3FFBFE52648A139 +Block: 348 +Transacion 0: ABB7EE4AAEDE4D65C06245655ACA8F4035284A6947D686AF6D2314351346FD9D +Block: 349 +Transacion 0: E771ADC73320CD15D1374E3B406ACBA471A17894927BC034F8004C2E9EF94C29 +Block: 350 +Transacion 0: B791A0CA3698AF9FD0F9D0D67AFFE631C3A5D3BBC6F65085C00C96E7843BBC93 +Block: 351 +Transacion 0: 39AC112A53A81BD270242242CF853DB983F793268C817AE29383B90D5315721A +Block: 352 +Transacion 0: 4EA1F74C4877C69D3133945CDD07285D34431E0E0697C123BCAB0F4779BBE9AB +Block: 353 +Transacion 0: 10A40D28A379C75B8A5AB4DF9CAA72EC94768CF31DC5F4F97220856827D51E0C +Block: 354 +Transacion 0: 18FF334A67C25F9312F923895F7100BF7D64FA4BC8D84944FBBB4BB7AD2640E3 +Block: 355 +Transacion 0: 3B938EFA4F754E3E457DFD664FDF088EDEBF787220FAB267C44433E0CFE47713 +Block: 356 +Transacion 0: F09ED1E006F39C4B9D49E3CEC362EE052438DFEE57B60D3BB8B31DD1194D3B6B +Block: 357 +Transacion 0: 5EF8635853C98DB3FB1BFBCFB08E1617BC24CBE442CE0AF56AF8F21AA99A2F53 +Block: 358 +Transacion 0: DFC03A58B170B6244A97C2207188601D2C93FFE61483CDF6B95B3D34C4A8EC5A +Block: 359 +Transacion 0: 78FF80396E51F5688468B6F2CE72BFEF36E5B474AEF07772059FE3A1008DE4DD +Block: 360 +Transacion 0: DE2386BEFCE7D2934F53FEEB632A291EB329069816E708784269F382F880D3FB +Block: 361 +Transacion 0: B8F38E7AA14AFF384CEF118EAFE364AEAE6DB1BE7BD57D016C11EB2BA2FA588E +Block: 362 +Transacion 0: 85A87B92A8A4393F2602BA45179FA9296C0C72FE3036AA9AFDD83B1D5330D7E1 +Block: 363 +Transacion 0: 5C10C7F312B6E5D80363D168430CEA4118FAEB3CD5663BFC155ACF006452CA31 +Block: 364 +Transacion 0: C5E412DDE2BE6FC6C4F150EA2F8C92BDE8FE662ADCFADDEFE1264274EF16D326 +Block: 365 +Transacion 0: D778D6BF6A6EBBA3A4C33838214587F24BED311CB2BF3A1E12AAC926065446C7 +Block: 366 +Transacion 0: 438E41EDAD640494590741B6105EDF9E3DA85730A4D89B8FE0C4E541BF7BBD43 +Block: 367 +Transacion 0: 9FFAA000736EB73EFEAC89AA4F2FCD9358EEA8616A271E8F9F4D7E3E79C35DC7 +Block: 368 +Transacion 0: 178FE851AA72D32A9DA1D93D1F77A699BFB0BEF3742A86264E66411E13730B88 +Block: 369 +Transacion 0: F938C68D867385EE6A891E7E2A4F29FE4A6E69344D5B7DDC3D98E5B0E27D3C0B +Block: 370 +Transacion 0: 7769CDA03EA71EA44847C758A4BC073C8F37A3161A06A83B84FDCEF13B2702E5 +Block: 371 +Transacion 0: B77B35FE0F7C5888EF6846E3DBFAFA65AB7C22F6D5BC66BE90945690CE8B8C50 +Block: 372 +Transacion 0: 55D0DB951F6797C7ED0169E7D9D05C3C88816554D3F8C9202A9FE7A9FFC8AA40 +Block: 373 +Transacion 0: BDC4623D731C77710B3A6590E50279E35504BC1C16B2E1F39C22E5E14820BC72 +Block: 374 +Transacion 0: 5C6E48FC0AB0AAB94A3C133799C40E61A05DB1D1731B71DC69D01EC7EDAED98E +Block: 375 +Transacion 0: D50BD0A86C0AB145BE4F8681AB6827C81041CE05843E311416FF0EE01DE3A4C3 +Block: 376 +Transacion 0: 8B011A55762D2C6B44B934FE325F13855540BA6C7AB340DB803BB4158578C8D4 +Block: 377 +Transacion 0: 27C8C2A828A410A45073E44D08CBFCD761C5F34F4B41EC0D82EFD2D60B183DEA +Block: 378 +Transacion 0: D11603AB55FC62A9BFBB41DFEE89C54D4DE3A6A1DC2C62A4624E95F55C3D86C8 +Block: 379 +Transacion 0: BB6EF035598980E62580AF72361758E315249470CF9E439C013857EE93B129B7 +Block: 380 +Transacion 0: 699EA87979D27AFC031F13272C76B9B316320C9A105C9002748C4FD12DFEE4D7 +Block: 381 +Transacion 0: 8E8518921E64EE0BAAA7DB3C95F0C89502CCF54FD2FA502CB3924DEAB515CF22 +Transacion 1: E726E1BE2078A40B938A65F63DF654196EE5AC561383572281245CD36E09D7C6 +Block: 382 +Transacion 0: D62508A97EB750BA19C9BF50C27A4998F2262BE5D76802C09158905C4BAF9699 +Block: 383 +Transacion 0: 2898FBBE9E8F2E7EADCC82B2FB00F43FE5A6CB4B4492680EFFE435E8B9AEDCEA +Transacion 1: 227E8E0666F063B8C556C372B240540A26D591DFCE20CF51E89F08A0C5A3708E +Transacion 2: 2F16FD4A15E9D87D1521DA89D7C928A229DC32D6757D4A68309FB6FF2F865342 +Block: 384 +Transacion 0: AC520F75AD7B0AF214965F51167958484D8B0C3E21A0B7B257F481EC95C76DB2 +Transacion 1: 34DC823C5B563492E82E463E0CE12FDD189872B60D1CFCB6686209817C01EC82 +Transacion 2: AB4001EB2CE2BCA9B526093813B18170ABD28D6EE86116432F67C4EEA73EB15A +Transacion 3: 3C3255FE1993305732405C297ED7297DCB2D1CBCD41DC7A3728F665FEA100EA7 +Block: 385 +Transacion 0: 04E527C66B6925E81CB850A3B81AD55D3050E4DDD392C2979CFCCBF6B9CC0E81 +Transacion 1: 4AD4043B1AA4ACF391CC4F2744FEA407DE200DF0D548C0835736869E7ACC421B +Block: 386 +Transacion 0: 32B636C9DF02C715EE9159BFC45BFC608B6D06305720BAADD2FD13047BF4EB7E +Block: 387 +Transacion 0: FB83034C0C5DA5874753F2C0FE2F926AAC593AF06748F90FA0A79BF2EA4E9EC0 +Transacion 1: 9AF31C323A2FEC3E1FDBF7064D8982207730A22BE01D0900C443B6CD966E7549 +Transacion 2: 7D8400C988BACABF8D0DADBF55250F07A0619F3AF54F513889D8F90716C89117 +Block: 388 +Transacion 0: D4FBA46266A7D8B70FFA3351A1B2FEA755A3CE47064262A69229A52845E99F07 +Transacion 1: 317DFA8CCBBC2CF0649313792C51C0542D20755BE0A5B200A7BD28BCC6218C2B +Transacion 2: 5F912F835CE402BB14B84B15C37E454845D69128009A10EB5551E221FC8A6225 +Block: 389 +Transacion 0: 5E70FCA75E3E1F0F50878A30097A7F6119DD223C7B3CD8EB699826A555662B0E +Transacion 1: B3E5EC565F885DFB33CCE989EF57993129FB79DB775C83AD260EF01FB2947058 +Block: 390 +Transacion 0: 19F1401F10E728631AF6294CE0C5758A06A60F7CD445A55810145EF0F97D735A +Transacion 1: 920F91EC56AC7CA728EADF76285C70AAEDAA79D83F1879F3BA59C82DEC8C8238 +Block: 391 +Transacion 0: C331B8CE4CAADD98E5038EB84BFA0DAFEBDDCF409917259A12F877B2204F4022 +Block: 392 +Transacion 0: 1916C6C9E984615DB98F97D4BF71B1058E81717B4CD186931186B4E285EBDCA2 +Transacion 1: E5A12574182D1108748C95A34C5D4CB30034060D47B5C77F01EF58AD00405400 +Transacion 2: 86A78DCA2B352AB665FC7E84040CD6A2D160BF8766E7F2C57462A24E7B7C22A0 +Block: 393 +Transacion 0: D7F0AE58D2C8407B8F40426A60801AD0429BEC3A038B9ECD25458DDCFECEDA09 +Block: 394 +Transacion 0: 3673D57B4E344E199CB9FC64EC9424D25007F8386B35539C53ED0E0A8655BEFF +Transacion 1: 20082DF2A8AA12B0E98C050976CE5C32FB9706D93887CC6591867548C84FC24E +Transacion 2: 3B1CD9874B59B39674714AD789258FAEC1DCC49FA354ABE2340A9FD7C7BD6255 +Block: 395 +Transacion 0: 3BE24FBE826513125DD8A21EB33EAEC8A0B5A41F74C3FFB10E33930D53004337 +Block: 396 +Transacion 0: 38D507C7E9C2DCE2F2090B1C2BCB97BDF16942EBE355284102697AA0CA6AA190 +Block: 397 +Transacion 0: 2B714EABF8CC8A4DE641032FE78FB6650D6A8A5161AE7A3FA384D65A77212BCE +Block: 398 +Transacion 0: 5590BA3AF5F8F283307E90941BC59ECA29B66D1C865F415F058C57511218F097 +Transacion 1: F9ED8FA26E2A650122C60DA24277F8E21E207EC17B440E8A7069EEA98616A781 +Block: 399 +Transacion 0: 31F20390249989D70E2945981B0A8A97386BCD187F80AAB6D1549A30564F0997 +Transacion 1: 30E8B9F9ECAA536141F21E7AD0370A60F5094AA74BD49C910450CF5B9966B47D +Transacion 2: 8493E2F7076AEB57F771F35E294D142318B4BBAA01410A739832C23613059763 +Transacion 3: B0E03F28C5F55FBE5D01EAEAA9A87D06C88ABF7D12C469474B3FF000939EF692 +Transacion 4: F8E287D4658934A5B2357704BCC9AF3DCAD329B9EAB2F3F0AB68978D46B81F23 +Transacion 5: B3C539D8E0C3F483779512747737F98CEB3DE907A99287F4D1D56294E17687ED +Transacion 6: F4BAF4CF420BD9DA834D2598B6F41C9F5293B133A2846ED698149CFFA9DC3F55 +Transacion 7: D30051683F838A45B26C9C8970679A144B8FA246D9D5E299E074AC8E5A744BF9 +Transacion 8: 246901E399CA7EADC38AF2067C9EBDA772F7B2BBFB5F850D67F8EC0A4FEAE7C9 +Block: 400 +Transacion 0: AB736A9180F675EE3B9751FC9B83AA726C49998DA7E09227CD3D8B486DD50B6C +Transacion 1: 166E31153CC1AF37C80D88E75B09B41B483656F1823ACF66637EF5F0E109930D +Transacion 2: 801054F7282B2575E17275DA1D7CA714F482DC92EA819B33942588771D0EC9B0 +Transacion 3: 2FDF7AD3E27CA9AC1EAC317215A216AA0EE44E305E5CA894C896A9DBC9FE3C4A +Transacion 4: 60EF5D279702D3060686297D41898CFB1D323F75F4887A4ACA1E9311DF956F0D +Transacion 5: 9C53B59700B0AE869DAF70D8E0375A5AB36D4D4BF66499A3AC2E3835A07A3715 +Transacion 6: 9154CC92C8B025C1DF13EF7D09A0F9662F46B40368175AD76A92948C5C2D86DE +Transacion 7: B01773AB0DFE7D44CA21EBEF4F5A5D9FD1F532C4F16BEA2F8385CE1E3188919C +Transacion 8: 667B07D690B83D6B4E57A57A242F87B101A53B86F521CAD2A54A7FBC63565D89 +Transacion 9: 14F72D1D00EA8092D43191E2D0226D6857F3D36B7CCA0BE8F22DDCA7BA6DD076 +Transacion 10: 9D3A8B333CBE818D9A6AACD363A4A06E7DB158CE136A2EB8AEEF8769DC512F4F +Transacion 11: 506830763DE017845A7D45EB55D49AE8663F3E0C6B0153AEDF67FB6D5EEB64AB +Transacion 12: 34AC918C91C2B47A94FAE82B7F86FEA65368E902BD737B13BAB395CE6C09717B +Transacion 13: 2F75BC9B48BDA054C7203E9BD11F579EDEB1373C269285B39261080E04C074AD +Transacion 14: 2B309C29DA939833FE0D9FA7D8CCA40E0B8F644FAFAC5D44B475EA07BC44A271 +Transacion 15: 02BA2EED6BBE7F432E67AAA254871415DF97FD2AC15379755E5C01637D3EB802 +Transacion 16: 34A6DA66683A4718758BCD0B68B3AB427418A7C3B06AA8B18DA398449BEF3505 +Transacion 17: 1FFBE330992ACBE9D0BD834A97E097E4F78787B2C7DAAE1572357F7E4C4D6239 +Block: 401 +Transacion 0: CC3E7A487087173B934A76752009F90F6689C56994A2EB186B08A9973586A788 +Transacion 1: 5540F54A2BCC34F68E4FA2DDE4C3349BBB4249CDAD285474777B67675A284D98 +Transacion 2: 31B4242928B779163EA407D2CA8F72A32B2FFB326364250AF99561EAE73889F7 +Transacion 3: 2CC456BF4B09A88F94483224A1DCCA468FFBC18E0DFC846542B93B1E15A15DF0 +Transacion 4: 259CC9DEE90C5CE17633F64717A68A171F2450243C79135EDF04EE936946E53C +Transacion 5: 55B8E3917B02EB8DE033D4E2F5F02C195FF7C51621369D3624551CF0CFF3C464 +Transacion 6: 8F0670606178B0BEA00BC79AE337A84E801E4574D082302E39393AEFBCBD288B +Transacion 7: 2B8364FC33E2FCF8C36D8CADBCBD3F3FF85DCCCB3A5A1436347A419676754CF9 +Transacion 8: 497A65786A1FC2BD18DCBA12366F2AAEF3D7AF5D0A74A2C68119CC173FFA6E7E +Transacion 9: E3F2B3DD38EE4A87F6F9B77B5196BE61F74101D5D0D5272F8EEA2D3C1371965A +Transacion 10: 252889D738E6359A7D34DA06C61F825313BD6DB00161D1A7ED3692E895EBB545 +Transacion 11: 63B54B162A7115D16ECC97D304993785BB0585A1BD53C24A861B7D2692C6B5F3 +Transacion 12: E1437992533EEA32784AE5CD2AA3B655B4023D2CC23D154BAAADC93FB7FBFCBA +Transacion 13: 0354A724AF498ACB80DF9142F100E5FE1428309327DC2728C0997785997BBAB2 +Transacion 14: 38476DF82697A98B415802D37D34C15FEB6A1E19EAE5A733F739D48335D7890F +Transacion 15: F3639BE5B1177A21598AAABCCAC919381B9715D00D13E9744B3C57F19DF35DA1 +Transacion 16: F47AA32D864FEB22F17E046FD44C0958462A4AA5B47B6E8B36EC0229BD4E332F +Transacion 17: 63898138C43B38C01B0940C3988CFA95AC78B6C53CB04C3AF9B1EC62EC016E5F +Transacion 18: F9D27109D07A1482192886505A5AD356774E575336AEE5766002520E15443981 +Transacion 19: FADF1E4F4BC5E18D5486E80F6861B14FFABECA1F91061A1364BF47C2CFB136B1 +Transacion 20: 8EF1FDBBD43CD52A85B3F219182164393C72E14E7D371599A4CAC3B8E6F08231 +Transacion 21: 0C449A4923A306883D6DF6B005523BA7B3EA0A575CB285F782CE26DF51B0ADC6 +Transacion 22: CCA520E80023A0CEB3CBBB7B647F866E8FC7FD627F916B4549E65986A06D3FD9 +Transacion 23: 8557C7118BC5C3C952FDE43F0056B5BD3901123A8EC805268765D5349E6740E1 +Transacion 24: 560E22884260B6421D73B23F803BC5493A64D1CB8D04516B501C7B7873ECEFFF +Transacion 25: 0284ADDC20DA18B93C762094AE369FB65CF206AEF66EEB77387A51906D5E1E16 +Transacion 26: D6E0031E30443B61C12670937998A2F91F1F6D51445D61054B8DAC3C2C407EBC +Block: 402 +Transacion 0: 57F707DB2C7C4429E5C97AE81C32E923426A2908A3FEBE51FC9B4F4114C735D7 +Transacion 1: A12FEB03072F6A6E285AE321D281252C1F0E6E0793EC0374AB4950159007EADD +Transacion 2: 9B3FC1BFB5848C8DE86A731BAD35EE81EA4306BABC1937AE6DB548DF7D4BDDBA +Transacion 3: FBE5294B5385A716165C9DFDB1775918A99BEFBAD0417930985DD9C87FBF34D9 +Transacion 4: 760FF5C22245795691FD1643662F55DEDE45473FB2BC2ACDC5C4089C3AF1C469 +Transacion 5: FBE8E5EB3E3624955160FAF7174E2D21C1391E0AE6F50609D7B4367AEA1CC2C9 +Transacion 6: 1E6619B55B40E54E9E59287753EE1D8F44FB3AAF3969B6E99901CC61B4463A3F +Transacion 7: A85001E3B9C55DC71B7326298E01FF46EC9838D8DCEA68F0845856B940FAD036 +Transacion 8: 562E8C325CADABAFBBFFDF3A9989CED2F5318463A5B9719C3DC4AFFFF2A9FC4D +Block: 403 +Transacion 0: 6140D0FDFA767DAB82B9EEE930305EF058B9AB4FEEC0C8B78D3884387E37BE5C +Block: 404 +Transacion 0: E01622E1F3B2E1E99140A5738BE1759FB8653F68B9B0F94F6769A4A69BAD1317 +Transacion 1: E6DDFE780E85BDA4EE79B1D118074F8378DFA68378137D1E29B27DB94CF26231 +Transacion 2: 312A5482D7ADEB582E31DEE8C28BF1008B803D665C82834524E3DFFF1267F1DC +Transacion 3: 1B69B43EEC780F491D55707C37F28D4019A764046ED70C2314D71444A9D5B714 +Transacion 4: E00F4D4FFC3F97AA8397AB55F9042B59885ADB91770EFED93B52832B2801C888 +Transacion 5: A87FE6378BE30A4E1EED78C65017FC8C3FAD65B3D5EA06E88AC30F157D5D5916 +Block: 405 +Transacion 0: A7B74FA49643B6503E5D5ABA47A0984A996C47E0BFFF2307911F0B847446AB67 +Transacion 1: 3CB2A7EAF51C0CA9809C7A4E4017C48E0E1CBA4BF0C95BC9A13FAFCA9C62832B +Transacion 2: 7092DE5D3C8E2BACFAD9706ADED2BCF6A7F56675FA40B42C1C18B46E4D363585 +Transacion 3: B92B2AC3CF40BAC2DE944E938BC3FBBC141BEFEEB19D7AC6ACE2FDD28F563E81 +Transacion 4: 8A354968D7B703167D79E02C8F27DDFF4DAEFC6694CD6050BDA4B0FD89A786FF +Transacion 5: 7DD2AB651779FC13766E1041C28E0F76D4E739ED33BE7A83D496DD9AD974F196 +Transacion 6: A20011493A82E7EBFC8A13E9F4B31B9C21092BAB1674E21854662CBDE888FE00 +Transacion 7: 67ABFB78B7C70BC1390BAE543A5CC8FD93ABDEA82343283307FA69ADD0FEDAAA +Transacion 8: 15748D09E43E2FBC6940C95AA8A77FDE82D27F7CE5A3B600564C606FCFBEC3FA +Transacion 9: 587368B85A026F51DB6967C26E0C1193DEF7320293A6061E07BE30A46AD67559 +Transacion 10: 7EF287E1CF1422C43FD7A10A6CF34A56A5686B743263226E353BE83B3D971BCC +Transacion 11: 8C405B78EFB6BF9BE62CCE6B897A2A0C89CC41D83DC164560E0BCA5A28067EB7 +Transacion 12: 78DA3B5FE00FE94804BC8104CDE134FAC0C2DB8B58B953D61BDE4844AFDD19B0 +Transacion 13: 644E36F29F4166A0BD8DDF25232646953FB21EB5CFBE3DCF845FB40DE17E4E91 +Transacion 14: DC6F7949E46EC006FDF46C84F81499C427E567EC4BE05EF5E720CB5EC540C895 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/dah.pb.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/dah.pb.go new file mode 100644 index 00000000..0db9ed1b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/dah.pb.go @@ -0,0 +1,197 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: dah.proto + +/* +Package util is a generated protocol buffer package. + +It is generated from these files: + dah.proto + +It has these top-level messages: + TX +*/ +package util + +import proto "github.com/golang/protobuf/proto" +import fmt "fmt" +import math "math" + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package + +type TX struct { + Version uint32 `protobuf:"varint,1,opt,name=version" json:"version,omitempty"` + LockTime uint32 `protobuf:"varint,2,opt,name=lockTime" json:"lockTime,omitempty"` + Txin []*TX_TXIN `protobuf:"bytes,3,rep,name=txin" json:"txin,omitempty"` + Txout []*TX_TXOUT `protobuf:"bytes,4,rep,name=txout" json:"txout,omitempty"` + Blocks [][]byte `protobuf:"bytes,5,rep,name=blocks,proto3" json:"blocks,omitempty"` + Fee uint64 `protobuf:"varint,6,opt,name=fee" json:"fee,omitempty"` +} + +func (m *TX) Reset() { *m = TX{} } +func (m *TX) String() string { return proto.CompactTextString(m) } +func (*TX) ProtoMessage() {} +func (*TX) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0} } + +func (m *TX) GetVersion() uint32 { + if m != nil { + return m.Version + } + return 0 +} + +func (m *TX) GetLockTime() uint32 { + if m != nil { + return m.LockTime + } + return 0 +} + +func (m *TX) GetTxin() []*TX_TXIN { + if m != nil { + return m.Txin + } + return nil +} + +func (m *TX) GetTxout() []*TX_TXOUT { + if m != nil { + return m.Txout + } + return nil +} + +func (m *TX) GetBlocks() [][]byte { + if m != nil { + return m.Blocks + } + return nil +} + +func (m *TX) GetFee() uint64 { + if m != nil { + return m.Fee + } + return 0 +} + +type TX_TXIN struct { + Ix uint32 `protobuf:"varint,1,opt,name=ix" json:"ix,omitempty"` + SourceHash []byte `protobuf:"bytes,2,opt,name=sourceHash,proto3" json:"sourceHash,omitempty"` + Script []byte `protobuf:"bytes,3,opt,name=script,proto3" json:"script,omitempty"` + Sequence uint32 `protobuf:"varint,4,opt,name=sequence" json:"sequence,omitempty"` +} + +func (m *TX_TXIN) Reset() { *m = TX_TXIN{} } +func (m *TX_TXIN) String() string { return proto.CompactTextString(m) } +func (*TX_TXIN) ProtoMessage() {} +func (*TX_TXIN) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 0} } + +func (m *TX_TXIN) GetIx() uint32 { + if m != nil { + return m.Ix + } + return 0 +} + +func (m *TX_TXIN) GetSourceHash() []byte { + if m != nil { + return m.SourceHash + } + return nil +} + +func (m *TX_TXIN) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXIN) GetSequence() uint32 { + if m != nil { + return m.Sequence + } + return 0 +} + +type TX_TXOUT struct { + Value uint64 `protobuf:"varint,1,opt,name=value" json:"value,omitempty"` + Script []byte `protobuf:"bytes,2,opt,name=script,proto3" json:"script,omitempty"` + Color []byte `protobuf:"bytes,3,opt,name=color,proto3" json:"color,omitempty"` + Quantity uint64 `protobuf:"varint,4,opt,name=quantity" json:"quantity,omitempty"` +} + +func (m *TX_TXOUT) Reset() { *m = TX_TXOUT{} } +func (m *TX_TXOUT) String() string { return proto.CompactTextString(m) } +func (*TX_TXOUT) ProtoMessage() {} +func (*TX_TXOUT) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 1} } + +func (m *TX_TXOUT) GetValue() uint64 { + if m != nil { + return m.Value + } + return 0 +} + +func (m *TX_TXOUT) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXOUT) GetColor() []byte { + if m != nil { + return m.Color + } + return nil +} + +func (m *TX_TXOUT) GetQuantity() uint64 { + if m != nil { + return m.Quantity + } + return 0 +} + +func init() { + proto.RegisterType((*TX)(nil), "util.TX") + proto.RegisterType((*TX_TXIN)(nil), "util.TX.TXIN") + proto.RegisterType((*TX_TXOUT)(nil), "util.TX.TXOUT") +} + +func init() { proto.RegisterFile("dah.proto", fileDescriptor0) } + +var fileDescriptor0 = []byte{ + // 329 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x91, 0xc1, 0x4b, 0xc3, 0x30, + 0x18, 0xc5, 0x59, 0x9b, 0x4e, 0x8d, 0xdb, 0x90, 0x30, 0x24, 0xec, 0x20, 0x55, 0x3c, 0xf4, 0xd4, + 0x82, 0x9e, 0x45, 0xf0, 0xa4, 0x17, 0x85, 0x50, 0x61, 0x78, 0x6b, 0xb3, 0x6f, 0x6d, 0xb4, 0x6b, + 0xba, 0x34, 0x19, 0xdd, 0xd5, 0xbf, 0x5c, 0x92, 0x76, 0x63, 0x5e, 0x42, 0x7e, 0x79, 0x1f, 0xef, + 0xbd, 0x8f, 0xe0, 0x8b, 0x55, 0x56, 0xc6, 0x8d, 0x92, 0x5a, 0x12, 0x64, 0xb4, 0xa8, 0xee, 0x7e, + 0x7d, 0xec, 0xa5, 0x4b, 0x42, 0xf1, 0xd9, 0x0e, 0x54, 0x2b, 0x64, 0x4d, 0x47, 0xe1, 0x28, 0x9a, + 0xb2, 0x03, 0x92, 0x05, 0x3e, 0xaf, 0x24, 0xff, 0x49, 0xc5, 0x06, 0xa8, 0xe7, 0xa4, 0x23, 0x93, + 0x5b, 0x8c, 0x74, 0x27, 0x6a, 0xea, 0x87, 0x7e, 0x74, 0xf9, 0x30, 0x8d, 0xad, 0x63, 0x9c, 0x2e, + 0xe3, 0x74, 0xf9, 0xf6, 0xce, 0x9c, 0x44, 0xee, 0x71, 0xa0, 0x3b, 0x69, 0x34, 0x45, 0x6e, 0x66, + 0x76, 0x32, 0xf3, 0xf1, 0x99, 0xb2, 0x5e, 0x24, 0xd7, 0x78, 0x9c, 0x5b, 0xd7, 0x96, 0x06, 0xa1, + 0x1f, 0x4d, 0xd8, 0x40, 0xe4, 0x0a, 0xfb, 0x6b, 0x00, 0x3a, 0x0e, 0x47, 0x11, 0x62, 0xf6, 0xba, + 0xf8, 0xc6, 0xc8, 0xba, 0x93, 0x19, 0xf6, 0x44, 0x37, 0x74, 0xf5, 0x44, 0x47, 0x6e, 0x30, 0x6e, + 0xa5, 0x51, 0x1c, 0x5e, 0xb3, 0xb6, 0x74, 0x45, 0x27, 0xec, 0xe4, 0xc5, 0x26, 0xb4, 0x5c, 0x89, + 0x46, 0x53, 0xdf, 0x69, 0x03, 0xd9, 0xf5, 0x5a, 0xd8, 0x1a, 0xa8, 0x39, 0x50, 0xd4, 0xaf, 0x77, + 0xe0, 0x45, 0x81, 0x03, 0xd7, 0x92, 0xcc, 0x71, 0xb0, 0xcb, 0x2a, 0x03, 0x2e, 0x0f, 0xb1, 0x1e, + 0x4e, 0x2c, 0xbd, 0x7f, 0x96, 0x73, 0x1c, 0x70, 0x59, 0x49, 0x35, 0x24, 0xf5, 0x60, 0x83, 0xb6, + 0x26, 0xab, 0xb5, 0xd0, 0x7b, 0x17, 0x84, 0xd8, 0x91, 0x5f, 0x9e, 0xbf, 0x9e, 0x0a, 0xa1, 0x4b, + 0x93, 0xc7, 0x5c, 0x6e, 0x92, 0x72, 0xdf, 0x80, 0xaa, 0x60, 0x55, 0x80, 0x4a, 0xd6, 0x59, 0xae, + 0x04, 0x4f, 0xa0, 0xcb, 0x36, 0x4d, 0x05, 0x6d, 0xc2, 0xcb, 0x4c, 0xd4, 0x5c, 0xae, 0x20, 0x29, + 0x64, 0x62, 0x74, 0x67, 0x0f, 0x51, 0xe5, 0x63, 0xf7, 0xa5, 0x8f, 0x7f, 0x01, 0x00, 0x00, 0xff, + 0xff, 0xbb, 0x8b, 0x8c, 0x33, 0xdf, 0x01, 0x00, 0x00, +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/dah.proto b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/dah.proto new file mode 100644 index 00000000..a87236e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/dah.proto @@ -0,0 +1,43 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +syntax = "proto3"; + +option go_package = "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" ; + +package util; + +message TX { + uint32 version = 1; + uint32 lockTime = 2; + message TXIN { + uint32 ix = 1; + bytes sourceHash = 2; + bytes script = 3; + uint32 sequence = 4; + } + repeated TXIN txin = 3; + + message TXOUT { + uint64 value = 1; + bytes script = 2; + bytes color = 3; + uint64 quantity = 4; + } + repeated TXOUT txout = 4; + repeated bytes blocks = 5; + uint64 fee = 6; +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/store.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/store.go new file mode 100644 index 00000000..a4142fab --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/store.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +// Store interface describes the storage used by this chaincode. The interface +// was created so either the state database store can be used or a in memory +// store can be used for unit testing. +type Store interface { + GetState(Key) (*TX_TXOUT, bool, error) + PutState(Key, *TX_TXOUT) error + DelState(Key) error + GetTran(string) ([]byte, bool, error) + PutTran(string, []byte) error +} + +// InMemoryStore used for unit testing +type InMemoryStore struct { + Map map[Key]*TX_TXOUT + TranMap map[string][]byte +} + +// MakeInMemoryStore creates a new in memory store +func MakeInMemoryStore() Store { + ims := &InMemoryStore{} + ims.Map = make(map[Key]*TX_TXOUT) + ims.TranMap = make(map[string][]byte) + return ims +} + +// GetState returns the transaction for the given key +func (ims *InMemoryStore) GetState(key Key) (*TX_TXOUT, bool, error) { + value, ok := ims.Map[key] + return value, ok, nil +} + +// DelState deletes the given key and corresponding transactions +func (ims *InMemoryStore) DelState(key Key) error { + delete(ims.Map, key) + return nil +} + +// PutState saves the key and transaction in memory +func (ims *InMemoryStore) PutState(key Key, value *TX_TXOUT) error { + ims.Map[key] = value + return nil +} + +// GetTran returns the transaction for the given hash +func (ims *InMemoryStore) GetTran(key string) ([]byte, bool, error) { + value, ok := ims.TranMap[key] + return value, ok, nil +} + +// PutTran saves the hash and transaction in memory +func (ims *InMemoryStore) PutTran(key string, value []byte) error { + ims.TranMap[key] = value + return nil +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/util.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/util.go new file mode 100644 index 00000000..d9094c37 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/util.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "bytes" + "encoding/binary" +) + +func decodeInt32(input []byte) (int32, []byte, error) { + var myint32 int32 + buf1 := bytes.NewBuffer(input[0:4]) + binary.Read(buf1, binary.LittleEndian, &myint32) + return myint32, input, nil +} + +// ReadVarInt reads an int that is formatted in the Bitcoin style +// variable int format +func ReadVarInt(buffer *bytes.Buffer) uint64 { + var finalResult uint64 + + var variableLenInt uint8 + binary.Read(buffer, binary.LittleEndian, &variableLenInt) + if variableLenInt < 253 { + finalResult = uint64(variableLenInt) + } else if variableLenInt == 253 { + var result uint16 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 254 { + var result uint32 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 255 { + var result uint64 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = result + } + + return finalResult +} + +// ParseUTXOBytes parses a bitcoin style transaction +func ParseUTXOBytes(txAsUTXOBytes []byte) *TX { + buffer := bytes.NewBuffer(txAsUTXOBytes) + var version int32 + binary.Read(buffer, binary.LittleEndian, &version) + + inputCount := ReadVarInt(buffer) + + newTX := &TX{} + + for i := 0; i < int(inputCount); i++ { + newTXIN := &TX_TXIN{} + + newTXIN.SourceHash = buffer.Next(32) + + binary.Read(buffer, binary.LittleEndian, &newTXIN.Ix) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXIN.Script = buffer.Next(int(scriptLength)) + + // Appears to not be used currently + binary.Read(buffer, binary.LittleEndian, &newTXIN.Sequence) + + newTX.Txin = append(newTX.Txin, newTXIN) + + } + + // Now the outputs + outputCount := ReadVarInt(buffer) + + for i := 0; i < int(outputCount); i++ { + newTXOUT := &TX_TXOUT{} + + binary.Read(buffer, binary.LittleEndian, &newTXOUT.Value) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXOUT.Script = buffer.Next(int(scriptLength)) + + newTX.Txout = append(newTX.Txout, newTXOUT) + + } + + binary.Read(buffer, binary.LittleEndian, &newTX.LockTime) + + return newTX +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/utxo.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/utxo.go new file mode 100644 index 00000000..06e95601 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/utxo.go @@ -0,0 +1,144 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "crypto/sha256" + "encoding/hex" + "fmt" + "math" + + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// UTXO includes the storage for the chaincode API or an in memory +// store for testing +type UTXO struct { + Store Store +} + +// MakeUTXO constructs a new UTXO with the given store +func MakeUTXO(store Store) *UTXO { + utxo := &UTXO{} + utxo.Store = store + return utxo +} + +// Key represents the key for a transaction in storage. It has both a +// hash and index +type Key struct { + TxHashAsHex string + TxIndex uint32 +} + +// GetTransactionHash returns the Bitcoin hash (double sha256) of +// the given transaction +func (u *UTXO) GetTransactionHash(txData []byte) [32]byte { + firstHash := sha256.Sum256(txData) + txHash := sha256.Sum256(firstHash[:]) + return txHash +} + +// IsCoinbase returns true if this is a coinbase transaction, false otherwise +func (u *UTXO) IsCoinbase(index uint32) bool { + return index == math.MaxUint32 +} + +var mandatoryFlags = consensus.Verify_flags_p2sh + +var standardFlags = mandatoryFlags | + consensus.Verify_flags_dersig | + consensus.Verify_flags_strictenc | + consensus.Verify_flags_minimaldata | + consensus.Verify_flags_nulldummy | + consensus.Verify_flags_discourage_upgradable_nops | + consensus.Verify_flags_cleanstack | + consensus.Verify_flags_checklocktimeverify | + consensus.Verify_flags_low_s + +// ExecResult is the result of processing a transaction +type ExecResult struct { + SumCurrentOutputs uint64 + SumPriorOutputs uint64 + IsCoinbase bool +} + +// Execute processes the given transaction and outputs a result +func (u *UTXO) Execute(txData []byte) (*ExecResult, error) { + newTX := ParseUTXOBytes(txData) + txHash := u.GetTransactionHash(txData) + execResult := &ExecResult{} + // Loop through outputs first + for index, output := range newTX.Txout { + currKey := &Key{TxHashAsHex: hex.EncodeToString(txHash[:]), TxIndex: uint32(index)} + _, ok, err := u.Store.GetState(*currKey) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if ok == true { + // COLLISION + return nil, fmt.Errorf("COLLISION detected for key = %v, with output script length = %d", currKey, len(output.Script)) + } + // Store the output in utxo + u.Store.PutState(*currKey, &TX_TXOUT{Script: output.Script, Value: output.Value}) + execResult.SumCurrentOutputs += output.Value + } + // Now loop over inputs, + for index, input := range newTX.Txin { + prevTxHash := input.SourceHash + prevOutputIx := input.Ix + if u.IsCoinbase(prevOutputIx) { + execResult.IsCoinbase = true + //fmt.Println("COINBASE!!") + } else { + //fmt.Println("NOT COINBASE!!") + // NOT coinbase, need to verify + keyToPrevOutput := &Key{TxHashAsHex: hex.EncodeToString(prevTxHash), TxIndex: prevOutputIx} + value, ok, err := u.Store.GetState(*keyToPrevOutput) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if !ok { + // Previous output not fouund, + return nil, fmt.Errorf("Could not find previous transaction output with key = %v", keyToPrevOutput) + } + // Call Verify_script + txInputIndex := uint(index) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(standardFlags)) + if result != consensus.Verify_result_eval_true { + result = consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(mandatoryFlags)) + if result != consensus.Verify_result_eval_true { + return nil, fmt.Errorf("Unexpected result from verify_script, expected %d, got %d, perhaps it is %d", consensus.Verify_result_eval_true, result, consensus.Verify_result_invalid_stack_operation) + } + } + // Verified, now remove prior outputs + u.Store.DelState(*keyToPrevOutput) + execResult.SumPriorOutputs += value.Value + } + + hex := hex.EncodeToString(txHash[:]) + fmt.Printf("PUT TRAN %s", hex) + u.Store.PutTran(hex, txData) + } + return execResult, nil +} + +// Query search the storage for a given transaction hash +func (u *UTXO) Query(txHashHex string) pb.Response { + tx, _, err := u.Store.GetTran(txHashHex) + return tx, err +} diff --git a/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/utxo_test.go b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/utxo_test.go new file mode 100644 index 00000000..ec979c3d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/examples/chaincode/go/utxo/util/utxo_test.go @@ -0,0 +1,206 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "encoding/base64" + "encoding/hex" + "fmt" + "io/ioutil" + "strings" + "sync" + "testing" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// func TestMain(m *testing.M) { +// // viper.Set("ledger.blockchain.deploy-system-chaincode", "false") +// +// os.Exit(m.Run()) +// } + +const txFileHashes = "./Hashes_for_first_500_transactions_on_testnet3.txt" +const txFile = "./First_500_transactions_base64_encoded_on_testnet3.txt" + +const consensusScriptVerifyTx = "01000000017d01943c40b7f3d8a00a2d62fa1d560bf739a2368c180615b0a7937c0e883e7c000000006b4830450221008f66d188c664a8088893ea4ddd9689024ea5593877753ecc1e9051ed58c15168022037109f0d06e6068b7447966f751de8474641ad2b15ec37f4a9d159b02af68174012103e208f5403383c77d5832a268c9f71480f6e7bfbdfa44904becacfad66163ea31ffffffff01c8af0000000000001976a91458b7a60f11a904feef35a639b6048de8dd4d9f1c88ac00000000" +const consensusScriptVerifyPreviousOutputScript = "76a914c564c740c6900b93afc9f1bdaef0a9d466adf6ee88ac" + +type block struct { + transactions []string +} + +func makeBlock() *block { + //return &block{transactions: make([]string, 0)} + return &block{} +} + +func (b *block) addTxAsBase64String(txAsString string) error { + b.transactions = append(b.transactions, txAsString) + return nil +} + +//getTransactionsAsUTXOBytes returns a readonly channel of the transactions within this block as UTXO []byte +func (b *block) getTransactionsAsUTXOBytes() <-chan []byte { + resChannel := make(chan []byte) + go func() { + defer close(resChannel) + for _, txAsText := range b.transactions { + data, err := base64.StdEncoding.DecodeString(txAsText) + if err != nil { + panic(fmt.Errorf("Could not decode transaction (%s) into bytes use base64 decoding: %s\n", txAsText, err)) + } + resChannel <- data + } + }() + return resChannel +} + +var blocksFromFile []*block +var once sync.Once + +// getBlocks returns the blocks parsed from txFile, but only parses once. +func getBlocks() ([]*block, error) { + var err error + once.Do(func() { + contents, err := ioutil.ReadFile(txFile) + if err != nil { + return + } + lines := strings.Split(string(contents), string('\n')) + var currBlock *block + for _, line := range lines { + if strings.HasPrefix(line, "Block") { + currBlock = makeBlock() + blocksFromFile = append(blocksFromFile, currBlock) + } else { + // Trim out the 'Transacion XX:' part + //currBlock.addTxAsBase64String(strings.Split(line, ": ")[1]) + currBlock.addTxAsBase64String(line) + } + } + }) + + return blocksFromFile, err +} + +func TestVerifyScript_InvalidTranscation(t *testing.T) { + arg1 := []byte("arg1") + arg2 := int64(4) + arg3 := []byte("arg2") + arg4 := int64(4) + arg5 := uint(100) + arg6 := uint(1) + //func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) + result := consensus.Verify_script(&arg1[0], arg2, &arg3[0], arg4, arg5, arg6) + t.Log(result) + t.Log(consensus.Verify_result_tx_invalid) + if result != consensus.Verify_result_tx_invalid { + t.Fatalf("Should have failed to verify transaction") + } +} + +func TestParse_GetBlocksFromFile(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + } + t.Logf("Number of blocks = %d from file %s", len(blocks), txFile) +} + +//TestBlocks_GetTransactionsAsUTXOBytes will range over blocks and then transactions in UTXO bytes form. +func TestBlocks_GetTransactionsAsUTXOBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + //t.Logf("Tx as bytes = %v", txAsUTXOBytes) + _ = len(txAsUTXOBytes) + } + } +} + +func TestParse_UTXOTransactionBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + utxo := MakeUTXO(MakeInMemoryStore()) + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + + newTX := ParseUTXOBytes(txAsUTXOBytes) + t.Logf("Block = %d, txInputCount = %d, outputCount=%d", index, len(newTX.Txin), len(newTX.Txout)) + + // Now store the HEX of txHASH + execResult, err := utxo.Execute(txAsUTXOBytes) + if err != nil { + t.Fatalf("Error executing TX: %s", err) + } + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + t.Fatalf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + txHash := utxo.GetTransactionHash(txAsUTXOBytes) + retrievedTx := utxo.Query(hex.EncodeToString(txHash)) + if !proto.Equal(newTX, retrievedTx) { + t.Fatal("Expected TX to be equal. ") + } + } + } + +} + +func TestParse_LibbitconTX(t *testing.T) { + txData, err := hex.DecodeString(consensusScriptVerifyTx) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + prevTxScript, err := hex.DecodeString(consensusScriptVerifyPreviousOutputScript) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + t.Logf("TX data from libbitcoin: %v", txData) + + tx := ParseUTXOBytes(txData) + + // Call Verify_script + txInputIndex := uint(0) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &prevTxScript[0], int64(len(prevTxScript)), txInputIndex, uint(consensus.Verify_flags_p2sh)) + if result != consensus.Verify_result_eval_true { + t.Fatalf("Unexpected result from verify_script, expected %d, got %d", consensus.Verify_result_eval_true, result) + } + t.Log(result) + t.Log(consensus.Verify_result_eval_true) + t.Logf("TX from %v", tx) +} diff --git a/hyperledger_fabric/v1.4.7/explorer-artifacts/config.json b/hyperledger_fabric/v1.4.7/explorer-artifacts/config.json new file mode 100644 index 00000000..1fe07a38 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/explorer-artifacts/config.json @@ -0,0 +1,57 @@ +{ + "network-config": { + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "peer1": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "peer1": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } + }, + "host":"explorer", + "port":"8080", + "channel": "businesschannel", + "GOPATH":"/opt/gopath", + "keyValueStore":"/tmp/fabric-client-kvs", + "eventWaitTime":"30000", + "mysql":{ + "host":"mysql", + "port":"3306", + "database":"fabricexplorer", + "username":"root", + "passwd":"root" + } +} diff --git a/hyperledger_fabric/v1.4.7/explorer-artifacts/fabricexplorer.sql b/hyperledger_fabric/v1.4.7/explorer-artifacts/fabricexplorer.sql new file mode 100644 index 00000000..557abb4c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/explorer-artifacts/fabricexplorer.sql @@ -0,0 +1,115 @@ +/* + Navicat MySQL Data Transfer + + Source Server : 172.16.10.162 + Source Server Type : MySQL + Source Server Version : 50635 + Source Host : 172.16.10.162 + Source Database : fabricexplorer + + Target Server Type : MySQL + Target Server Version : 50635 + File Encoding : utf-8 + + Date: 07/07/2017 10:14:31 AM +*/ + +DROP DATABASE IF EXISTS `fabricexplorer`; + +CREATE DATABASE fabricexplorer; + +use fabricexplorer; +SET NAMES utf8; +SET FOREIGN_KEY_CHECKS = 0; + +-- ---------------------------- +-- Table structure for `blocks` +-- ---------------------------- +DROP TABLE IF EXISTS `blocks`; +CREATE TABLE `blocks` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `blocknum` int(11) DEFAULT NULL, + `datahash` varchar(256) DEFAULT NULL, + `prehash` varchar(256) DEFAULT NULL, + `channelname` varchar(128) DEFAULT NULL, + `txcount` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='blocks'; + +-- ---------------------------- +-- Table structure for `chaincodes` +-- ---------------------------- +DROP TABLE IF EXISTS `chaincodes`; +CREATE TABLE `chaincodes` ( + `id` int(11) NOT NULL AUTO_INCREMENT, + `name` varchar(255) DEFAULT NULL, + `version` varchar(255) DEFAULT NULL, + `path` varchar(255) DEFAULT NULL, + `channelname` varchar(255) DEFAULT NULL, + `txcount` int(11) DEFAULT '0', + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=10 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT; + +-- ---------------------------- +-- Table structure for `channel` +-- ---------------------------- +DROP TABLE IF EXISTS `channel`; +CREATE TABLE `channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `name` varchar(64) DEFAULT NULL, + `blocks` int(11) DEFAULT NULL, + `trans` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=3 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='channel'; + +-- ---------------------------- +-- Table structure for `peer` +-- ---------------------------- +DROP TABLE IF EXISTS `peer`; +CREATE TABLE `peer` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `org` int(11) DEFAULT NULL, + `name` varchar(64) DEFAULT NULL, + `mspid` varchar(64) DEFAULT NULL, + `requests` varchar(64) DEFAULT NULL, + `events` varchar(64) DEFAULT NULL, + `server_hostname` varchar(64) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='peer'; + +-- ---------------------------- +-- Table structure for `peer_ref_channel` +-- ---------------------------- +DROP TABLE IF EXISTS `peer_ref_channel`; +CREATE TABLE `peer_ref_channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `peerid` int(11) DEFAULT NULL, + `channelid` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT=''; + +-- ---------------------------- +-- Table structure for `transaction` +-- ---------------------------- +DROP TABLE IF EXISTS `transaction`; +CREATE TABLE `transaction` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `channelname` varchar(64) DEFAULT NULL, + `blockid` int(11) DEFAULT NULL, + `txhash` varchar(256) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + `chaincodename` varchar(255) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='transtaion'; + +-- ---------------------------- +-- Table structure for `write_lock` +-- ---------------------------- +DROP TABLE IF EXISTS `write_lock`; +CREATE TABLE `write_lock` ( + `write_lock` int(1) NOT NULL AUTO_INCREMENT, + PRIMARY KEY (`write_lock`) +) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8 COLLATE=utf8_bin; + +SET FOREIGN_KEY_CHECKS = 1; diff --git a/hyperledger_fabric/v1.4.7/kafka/README.md b/hyperledger_fabric/v1.4.7/kafka/README.md new file mode 100644 index 00000000..1222cf5a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/kafka/README.md @@ -0,0 +1,8 @@ +## Start a network base on kafka + +### Quick testing + +```bash +$ HLF_MODE=kafka make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.7/kafka/configtx.yaml b/hyperledger_fabric/v1.4.7/kafka/configtx.yaml new file mode 100644 index 00000000..87870f6a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/kafka/configtx.yaml @@ -0,0 +1,764 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: kafka + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 10 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 512 KB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.7/network_config.json b/hyperledger_fabric/v1.4.7/network_config.json new file mode 100644 index 00000000..96769bb4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/network_config.json @@ -0,0 +1,65 @@ +{ + "ordererOrg": { + "name": "OrdererOrg", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "type": "peerOrg", + "peer0": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/orderer.yaml b/hyperledger_fabric/v1.4.7/orderer.yaml new file mode 100644 index 00000000..5d65476c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/orderer.yaml @@ -0,0 +1,36 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric orderer node in solo and kafka modes + +version: '2' # v3 does not support 'extends' yet + +services: + orderer-solo: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + + orderer-kafka: # orderer in kafka mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls diff --git a/hyperledger_fabric/v1.4.7/org3/configtx.yaml b/hyperledger_fabric/v1.4.7/org3/configtx.yaml new file mode 100644 index 00000000..fd92173e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/configtx.yaml @@ -0,0 +1,54 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# Section: Organizations +# +# - This section defines the different organizational identities which will +# be referenced later in the configuration. +# +################################################################################ +Organizations: + - &Org3 + # DefaultOrg defines the organization which is used in the sampleconfig + # of the fabric.git development environment + Name: Org3MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID to load the MSP definition as + ID: Org3MSP + + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + Policies: + Readers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.peer', 'Org3MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + AnchorPeers: + # AnchorPeers defines the location of peers which can be used + # for cross org gossip communication. Note, this value is only + # encoded in the genesis block in the Application section context + - Host: peer0.org3.example.com + Port: 7051 diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config.yaml b/hyperledger_fabric/v1.4.7/org3/crypto-config.yaml new file mode 100644 index 00000000..02409282 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config.yaml @@ -0,0 +1,23 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org3 + # --------------------------------------------------------------------------- + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk new file mode 100644 index 00000000..475f2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZ6kmxJp0ZEgRfZiZ +3vL7cUTXnxHBGPvzQr5Y0ZUELNehRANCAAR8pL1w0Dlv2Qvhn6/unNhWijsdnM87 +zmYd+sAobhDNKE9bD41AYDiCTwb7AnLICNVZlmnP8+gMa1CZDgCaSf2i +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk new file mode 100644 index 00000000..d38d371b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgQNOTmFbR71Dz/EFw +yBsMZNIKTqvhSZy6YjfVbcT0tAyhRANCAAQNKM2jWjFOSihaRIZk2I51o8He51id +UdYh0ExMOdtHvdfTRwg5AJg7VkTJQDmodMY8iedj3FXDlxACDK+Gmw8b +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..1d62087b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQVxW0tEMqJsClUdnHjmIurTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDSjNo1oxTkoo +WkSGZNiOdaPB3udYnVHWIdBMTDnbR73X00cIOQCYO1ZEyUA5qHTGPInnY9xVw5cQ +AgyvhpsPG6NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANy2ytrmVtCxzJumHStEymgmVSrV6wxICjqjtMuBeodvAiBMxA3I +kmS+4fl2DUDy5Ynedi1EFfLFUprMPJ2+iO6vgg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..abbb6442 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg2gAwIBAgIQRjQ96YrYiKq//VIfxWI4IzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEK71x/g2MV0OhHE8L/Y7fOUdNnsSm +fgpUXLV28l4K6TXSz901v0Ef+34psiHPUGFNPWfQ2dojKFAsqHfJai+94KOBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAggiM01mEhKAN5vQrQ6R+YxvWpPZtu +b648WpBR8eLqiqIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMy5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDSAAwRQIhAMIy5szhbPp+6ajmWY1M1gQlxTV5G+Lo +RLHrKvva3CEzAiBPhHWpgKQe0IGIl1wPT4O7mV15ghvjC5mpi6+qzscKGg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..a3d5fc23 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgs1OoP184IQ3sgFeP +9D19HuUnGz7YpKoXXjiedg9zzFGhRANCAAQrvXH+DYxXQ6EcTwv9jt85R02exKZ+ +ClRctXbyXgrpNdLP3TW/QR/7fimyIc9QYU09Z9DZ2iMoUCyod8lqL73g +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk new file mode 100644 index 00000000..91c7dc3e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgY+uANW502vvq6Y/K +eZGnY+87wDnXbWJD6ItGV8hPDR6hRANCAAT1EFG8e7J1gnOrJb6PR9RhdkKudvCz +DIC7a/MBH2ZYuK2XiSmfm77KXnhWbU5fjF7thyFhrTeIFvfNxTE94LI2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..00af6e41 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQaj+S0lJTmPOrotSRR+exSDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE9RBRvHuydYJz +qyW+j0fUYXZCrnbwswyAu2vzAR9mWLitl4kpn5u+yl54Vm1OX4xe7YchYa03iBb3 +zcUxPeCyNqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANbK656AQowBlOr4pK8hF+iSe6LbqXxfzTnlE5jLJAroAiBLfMGC +j4fXFvV5YgxspWg1nX8fF6XGu/oPGkHFX+81dg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..4b62807d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMo5kQAauTlIkdgMVD8xqUYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAQhwl+kSqDroCPbYWTHUeO1huet +dkU46BdEqzOCB7AtNnqZbF614Vrr5yS1SyWsOtEmDQInCnDmbzSxD1kPLAKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2b +bm+uPFqQUfHi6oqiMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDP4pTybfCsQGeIX+D3m2OPtYyr8hEs +JJUEjF0avVQzJwIgag3DyYWNRmXxlsQEFyyJrgSXl8n2FfIRTt+nGLXATRM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..6e849742 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLeRIXFMa/9duYkO6 +3XD6KFu/lYumYJ7dfH72RzKdfJ6hRANCAAQEIcJfpEqg66Aj22Fkx1HjtYbnrXZF +OOgXRKszggewLTZ6mWxeteFa6+cktUslrDrRJg0CJwpw5m80sQ9ZDywC +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk new file mode 100644 index 00000000..0d9d2078 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgw+PlBWl2jW5yoRdf +XBuqvBNd0XhkfEc9AZ59syEvV8KhRANCAARD6FpxBsxLsHL7dimnHG1VglEbQiv2 +d3HVQ7FitUJccCZDmFfg/Jo9LYhLicSQnmET9X6zBDOK4+qRTW1MWFPP +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk new file mode 100644 index 00000000..3cd6c459 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgahPS7k+5zVcEpjQp +U9KYQ9sClfTQqUxIdubrfMxtc3ChRANCAARU4sXSddFmhQH5cXws0Ai14L2qdcFv +n19aIHxWdWP6NycnIAvl4EefmwcTGzPd/DYK9VWKZxMBFjOBBtSG1jqx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..dbd3fdb0 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQChkJXZ77cw2XYcZw7N/ZfDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFTixdJ10WaF +AflxfCzQCLXgvap1wW+fX1ogfFZ1Y/o3JycgC+XgR5+bBxMbM938Ngr1VYpnEwEW +M4EG1IbWOrGjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGtfwyLyNNtneENJhFlrLzi6469Hgk5RcF7Naqa04tNFMAoGCCqGSM49 +BAMCA0gAMEUCIQC4QfvvZmFTTu3tGnYIYMl1gamWueuf6AW9SKkSclQxjgIgWQDu +29pl8iPDqsl42ykAQygJo25MUjJiLpBJV7RYBt8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dfcf853 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQKa5eObvsHxvupA2rahA3RDAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE5q3We3H2vVxe2291bquQfuMAcOBa +wWZjuVutHC9P50CLCdiud28dL+Bl9lX4+TxUAkVWtEx5+2K66+A9/YVMN6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2bbm+u +PFqQUfHi6oqiMAoGCCqGSM49BAMCA0gAMEUCIQCgBPbErcsPfvWS656tesHBcvL8 +2+uPQ6KIAPQ8xgMurAIgegRhEztZz346n80Of44KuE9eJHCxgHSko8BB4PTYDQI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key new file mode 100644 index 00000000..8bfc64af --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkW6Iy52FIAxDhuVU +zRLLrd3pru3ULE0jmc9mSIly6SWhRANCAATmrdZ7cfa9XF7bb3Vuq5B+4wBw4FrB +ZmO5W60cL0/nQIsJ2K53bx0v4GX2Vfj5PFQCRVa0THn7Yrrr4D39hUw3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk new file mode 100644 index 00000000..f755e5cd --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLVaOOXh5IqTIxkCm +IiGOENZlC32XHQqwFyyILNFZBqmhRANCAATMnNMCRrNVbWNS56rA5T9FfDlAAeep +xbDQNHQGtqCE67gwnqlTzUZ02g85xzt4HxBzdb8oN8KUnoO5E3BmVyIe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..a2c2d846 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdGgAwIBAgIRALJ8p65zSztDjce0vxKEVp8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEzJzTAkaz +VW1jUueqwOU/RXw5QAHnqcWw0DR0BraghOu4MJ6pU81GdNoPOcc7eB8Qc3W/KDfC +lJ6DuRNwZlciHqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZI +zj0EAwIDRwAwRAIgRYa/+oW0gyH4HpFXt2/TdKIL6kMx+koYkGvv9A+5Bn8CIH/X +ey0ZDFaRc33uctv2In4dD9HqvsKI0AKdpfZiRA7l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dc7c89e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAMviHBBgGLER1MPyrbPcZtQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLdIYyUvUqO3F2tl5jjOrv0J7IbF +nMtcQuZYKVu9/OpfM0R5WbD3pMuremuj59I8o692CtGvYDL7Klt0F0apNgujbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCCCIzTWYSEoA3m9CtDpH5jG9ak9m25v +rjxakFHx4uqKojAKBggqhkjOPQQDAgNIADBFAiEAsOK+kRpL7Jbw9aDTgDPlsmLu +Elt0xGn9Aj26W0XgbeECIGG654v86gvmny3ttNnpAcSLZt+YfBY6kH0GjNPZAaLM +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..6299df14 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwgmBcva6NSpRyxLm +pBGUdkxZ+2NeYpJ6Xm+FCBblDvihRANCAAS3SGMlL1KjtxdrZeY4zq79CeyGxZzL +XELmWClbvfzqXzNEeVmw96TLq3pro+fSPKOvdgrRr2Ay+ypbdBdGqTYL +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.7/peer.yaml b/hyperledger_fabric/v1.4.7/peer.yaml new file mode 100644 index 00000000..5c6c3dbe --- /dev/null +++ b/hyperledger_fabric/v1.4.7/peer.yaml @@ -0,0 +1,37 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric peer node + +version: '2.0' + +services: + peer-solo: # example peer node in solo mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # grpc + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 # chaincode + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 # gossip + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + + peer-kafka: # example peer node in kafka mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls diff --git a/hyperledger_fabric/v1.4.7/prometheus.yml b/hyperledger_fabric/v1.4.7/prometheus.yml new file mode 100644 index 00000000..2efaca40 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/prometheus.yml @@ -0,0 +1,45 @@ +# my global config +global: + scrape_interval: 15s # Set the scrape interval to every 15 seconds. Default is every 1 minute. + evaluation_interval: 15s # Evaluate rules every 15 seconds. The default is every 1 minute. + # scrape_timeout is set to the global default (10s). + +# Alertmanager configuration +alerting: + alertmanagers: + - static_configs: + - targets: + # - alertmanager:9093 + +# Load rules once and periodically evaluate them according to the global 'evaluation_interval'. +rule_files: + # - "first_rules.yml" + # - "second_rules.yml" + +# A scrape configuration containing exactly one endpoint to scrape: +# Here it's Prometheus itself. +scrape_configs: + # The job name is added as a label `job=` to any timeseries scraped from this config. + #- job_name: 'prometheus' + + # metrics_path defaults to '/metrics' + # scheme defaults to 'http'. + + #static_configs: + #- targets: ['localhost:9090'] + + - job_name: 'orderer0' + static_configs: + - targets: ['orderer0.example.com:8443'] + - job_name: 'peer0_org1' + static_configs: + - targets: ['peer0.org1.example.com:9443'] + - job_name: 'peer1_org1' + static_configs: + - targets: ['peer1.org1.example.com:9443'] + - job_name: 'peer0_org2' + static_configs: + - targets: ['peer0.org2.example.com:9443'] + - job_name: 'peer1_org2' + static_configs: + - targets: ['peer1.org2.example.com:9443'] diff --git a/hyperledger_fabric/v1.4.7/raft/README.md b/hyperledger_fabric/v1.4.7/raft/README.md new file mode 100644 index 00000000..ff229433 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/README.md @@ -0,0 +1,8 @@ +## Start a network base on raft + +### Quick testing + +```bash +$ HLF_MODE=raft make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org1MSP.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org1MSP.json new file mode 100644 index 00000000..99e540df --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org1MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org1MSPanchors.tx new file mode 100644 index 00000000..599d1898 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org1MSPanchors.tx differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org2MSP.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org2MSP.json new file mode 100644 index 00000000..03df0409 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org2MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUpSYlBoRWM5ejFDcE1CbnNwRlQ3MFV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQ3dvSVRVUlhTT2hsN1B0Y0orNmVsY3FGekxVUG1QbmIxUU9TQzdLMTQ1WlNxV2RqandMb3FSeQpmQTZxbDZWYnU0QkcrU2RLMTYweTVwOUgrb3BrMGdDamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdOSzB2SGxDY043ZjFOQ2ZNNEVuaWp5eGFUV0Zwd2pLdWVaT21YdU90VmZJd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdNL3UxOWFqemh1NmsxMzN1SktUL3FDS0U3OS9rQXJmKzVZUEd1bFArNUo4Q0lBRnNNMk00ClNTaXBrUjQ5WmhiRW9WcnQvdm1kamk2UWtEWXUzU1l6MlJrNwotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org2MSPanchors.tx b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org2MSPanchors.tx new file mode 100644 index 00000000..6e5a13ae Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org2MSPanchors.tx differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org3MSP.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org3MSP.json new file mode 100644 index 00000000..a2cf989d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/Org3MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel.tx b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel.tx new file mode 100644 index 00000000..07d01717 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel.tx differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel.tx.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel.tx.json new file mode 100644 index 00000000..01a37527 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel.tx.json @@ -0,0 +1,230 @@ +{ + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:21Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": null + } + }, + "signature": null +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block new file mode 100644 index 00000000..ce65e6b7 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block.json new file mode 100644 index 00000000..04184ffc --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block.json @@ -0,0 +1,1121 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:34Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g" + } + } + }, + "signature": "MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n" + } + } + }, + "signature": "MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw==" + } + ] + }, + "header": { + "data_hash": "Lj3Zlz72/IE4JoP0JrWT1HWDNXuOtfZfzTIElCMyYgY=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block.json-flat.json new file mode 100644 index 00000000..b79e509b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block.json-flat.json @@ -0,0 +1,406 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy\nfA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E\nAwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O\nJMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY\na8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv\nDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK\npEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=1 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:34Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g +.data.data[0].payload.data.last_update.signature=MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n +.data.data[0].signature=MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw== +.header.data_hash=Lj3Zlz72/IE4JoP0JrWT1HWDNXuOtfZfzTIElCMyYgY= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block new file mode 100644 index 00000000..e70e1854 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block.json new file mode 100644 index 00000000..850c04a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block.json @@ -0,0 +1,1001 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU82cUgyaDdWYmovc2hQZGJFTFlLRDB3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRXRodUp6Y1VHYkcwVjVTMFk2eXIzV1hML0VLSHo5NTdlOVBEVGxhWTYrRENodnNmNno4QzFNUAoyMU9ob1h6VG10YytDUS85bE53bkcybHdSbUxKamhpamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0Um9qaE82RWJUVUlGdWxERHljYVNDK09SdzhIWk41bHZKckt6bDBwZlFBd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdjdlRWZ3hVQjB1WVdKWVg0ZGxQQW5sc0lXcnFnYmRqSm5JcFZ1aTlkbVhjQ0lEM1c0ZlJrCjZvcjB3MjNOS0dHSTUvc1pwdlB6Njd1WVhmOWNlK0JQMFM0agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUpSYlBoRWM5ejFDcE1CbnNwRlQ3MFV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQ3dvSVRVUlhTT2hsN1B0Y0orNmVsY3FGekxVUG1QbmIxUU9TQzdLMTQ1WlNxV2RqandMb3FSeQpmQTZxbDZWYnU0QkcrU2RLMTYweTVwOUgrb3BrMGdDamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdOSzB2SGxDY043ZjFOQ2ZNNEVuaWp5eGFUV0Zwd2pLdWVaT21YdU90VmZJd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdNL3UxOWFqemh1NmsxMzN1SktUL3FDS0U3OS9rQXJmKzVZUEd1bFArNUo4Q0lBRnNNMk00ClNTaXBrUjQ5WmhiRW9WcnQvdm1kamk2UWtEWXUzU1l6MlJrNwotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "2" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHoS+dMNZfsHeQXDyWW6AwePndUd5uhsGYXV5o2UiQ7qAiARcixijEHG7JqylXIHg2j5evFC/KSy+jBZwBvJV0IJFw==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "4YzKXQD8Zif9/EOELvQ6JlO+pGu0MxvN" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "hDJ/scu755b54jyq6CIdzZ35KKMCObej" + } + } + }, + "signature": "MEUCIQCY20Q1VueWMSj23Lmsffs5nZQ2Ntr8Ii9kL5t9lTvDlgIgRzSdp9wT05cGGTOEOcr8qwl2jNnuhb8GnxU0PPoBeNY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "p68iU66vG/phSoOh3ydEWjaoBE/cBjSf" + } + } + }, + "signature": "MEUCIQC3SYyd73sQEj/0coVOsJ/6WKhodpIFq0gV95TG4Q+aGAIgH8NgJuPhpJ3+lmqbfpocj4SLvVZPONAzZE0YrR5rKlo=" + } + ] + }, + "header": { + "data_hash": "1RVrIrTIp9UmIyTX8FX/B7EJ+j3jBV/utW15mYybAtI=", + "number": "1", + "previous_hash": "16QXh+kEHyDH0ve9sEhyyL0BfBlF4lRoiIhQF8adhA4=" + }, + "metadata": { + "metadata": [ + "ChEKAggBEgsKCQoDAQIDEAQYBRKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYw3KdN1sbAR6CcXPJYquSGOlxqHlu2t0OEkcwRQIhAIab/MHoKZajjXq7p2k0tWxm75qX8IQif1VtenglxQhLAiAZKJ7ixTsQNVXojurfO85aHv0mwRztfiUocQBArFjpMw==", + "CgIIAQ==", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block.json-flat.json new file mode 100644 index 00000000..a5e95e4b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block.json-flat.json @@ -0,0 +1,371 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=2 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIHoS+dMNZfsHeQXDyWW6AwePndUd5uhsGYXV5o2UiQ7qAiARcixijEHG7JqylXIHg2j5evFC/KSy+jBZwBvJV0IJFw== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=4YzKXQD8Zif9/EOELvQ6JlO+pGu0MxvN +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:41Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=hDJ/scu755b54jyq6CIdzZ35KKMCObej +.data.data[0].payload.data.last_update.signature=MEUCIQCY20Q1VueWMSj23Lmsffs5nZQ2Ntr8Ii9kL5t9lTvDlgIgRzSdp9wT05cGGTOEOcr8qwl2jNnuhb8GnxU0PPoBeNY= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:41Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=p68iU66vG/phSoOh3ydEWjaoBE/cBjSf +.data.data[0].signature=MEUCIQC3SYyd73sQEj/0coVOsJ/6WKhodpIFq0gV95TG4Q+aGAIgH8NgJuPhpJ3+lmqbfpocj4SLvVZPONAzZE0YrR5rKlo= +.header.data_hash=1RVrIrTIp9UmIyTX8FX/B7EJ+j3jBV/utW15mYybAtI= +.header.number=1 +.header.previous_hash=16QXh+kEHyDH0ve9sEhyyL0BfBlF4lRoiIhQF8adhA4= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAQ== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block new file mode 100644 index 00000000..4a6fd3f8 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..6be3462b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,984 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIFd0TScDHZR5gpHAZ/4nj5FVPftWrjn/vLp9G8PctCcjAiBeUIIlMXTTkBY/1J7Fm0U+Ce2VmN+Rkh6fZoMOsbeyMA==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "NSLfx0kXpEXCkwTcglRmEdw3YooXlVBC" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "kFOVz5FZvogl20t72ocyORBGQHni3kix" + } + } + }, + "signature": "MEQCIA/ZMwBgmIUsfySGLeG5s3zs3VxtU7iFu0Y0NbawoyQxAiA48be7S+tq9MuQ8gBkLbwdPbrjLvJUuhwtqwnF2MMKkA==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "Y4eV4sj3eEvWQ0TMEmw9kdPjjBo/47ZZ" + } + } + }, + "signature": "MEQCIGGAhvExkc4F1i3/yTUl7znzC8C5aTcwxU8dFW4F5g2+AiBzNyRImqR2jEery9j9xGTyi1HE9PEKRQn/OKfYPQ+gTg==" + } + ] + }, + "header": { + "data_hash": "bET6ka3hA5S2xsC90CTeOtDTgQyLrPgpL9Ic3owVpnw=", + "number": "2", + "previous_hash": "SKTPAZyDi4Jo6dyTDhz7SvK5a/6v9s4gz4quJNXTrXI=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block.json-flat.json new file mode 100644 index 00000000..92cf061e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block.json-flat.json @@ -0,0 +1,366 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIFd0TScDHZR5gpHAZ/4nj5FVPftWrjn/vLp9G8PctCcjAiBeUIIlMXTTkBY/1J7Fm0U+Ce2VmN+Rkh6fZoMOsbeyMA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=NSLfx0kXpEXCkwTcglRmEdw3YooXlVBC +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:43Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=kFOVz5FZvogl20t72ocyORBGQHni3kix +.data.data[0].payload.data.last_update.signature=MEQCIA/ZMwBgmIUsfySGLeG5s3zs3VxtU7iFu0Y0NbawoyQxAiA48be7S+tq9MuQ8gBkLbwdPbrjLvJUuhwtqwnF2MMKkA== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:43Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=Y4eV4sj3eEvWQ0TMEmw9kdPjjBo/47ZZ +.data.data[0].signature=MEQCIGGAhvExkc4F1i3/yTUl7znzC8C5aTcwxU8dFW4F5g2+AiBzNyRImqR2jEery9j9xGTyi1HE9PEKRQn/OKfYPQ+gTg== +.header.data_hash=bET6ka3hA5S2xsC90CTeOtDTgQyLrPgpL9Ic3owVpnw= +.header.number=2 +.header.previous_hash=SKTPAZyDi4Jo6dyTDhz7SvK5a/6v9s4gz4quJNXTrXI= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block new file mode 100644 index 00000000..a06a9016 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..fc1fd392 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,156 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "CgdPcmcxTVNQEqoGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLRENDQWMrZ0F3SUJBZ0lSQUxqUExIVlNyeEJsOTNYVEFqQ0RhWUF3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCcU1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFTk1Bc0dBMVVFQ3hNRWNHVmxjakVmTUIwR0ExVUVBeE1XY0dWbGNqQXViM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCR2tnTDJ5QUxraDcKYnVEeVRpQ0J6NHhUUmJOQkNBZ1dubmlKOEx3WXFvVlliYU5CZmJUM1pJamhza2kyRUY5ZG55dW5VRGx3VWMvZgpWWFF5MVB6NVY3ZWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwY0FNRVFDSUNzQlJUZExpaWZFVkFVdXVlcTRkUXI3YlExK1h4RnBlV1ZIMzFFY1RuK2tBaUJWYndEeApQZ21LTVNYdjh2MS9sSHV4VjRXUE1jNWZWMG5VUzVZc0lqUzZsQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "signature": "MEQCIECSKbodxLfFev0eyP/wi5ZBBzDyMrTvsQuYBnPIe/e/AiBoSHBcZpU6Ye29nOJgItC2c2yCaxYZ19UTlRb9oyLzeg==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "1.4.5" + }, + "events": null, + "response": { + "message": "", + "payload": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB", + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "MTAw" + }, + { + "is_delete": false, + "key": "b", + "value": "MjAw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "exp02", + "value": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB" + } + ] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "omDe2QkOwbhZ5YH7b9/CkVp00bpR78Rj39viq7yT+nw=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "" + }, + "input": { + "args": [ + "ZGVwbG95", + "YnVzaW5lc3NjaGFubmVs", + "CigIARIMEgVleHAwMhoDMS4wGhYKBGluaXQKAWEKAzEwMAoBYgoDMjAw", + "EgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==", + "ZXNjYw==", + "dnNjYw==" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgYSBGxzY2M=", + "timestamp": "2020-02-21T19:54:51.036078300Z", + "tls_cert_hash": null, + "tx_id": "55ea70e7984ea62b9facd7e1d4bb2256437645c5bcc91f8c3f2f65aae30fd12e", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i" + } + } + }, + "signature": "MEQCIBJD0ahs3c2cXLCLjtQlIt+ihye1g7/xqcPzQsThtPHMAiAqmpXU8Bgbusbmk+tN2h2xVKMFCmSllJqlxox/VxmUIA==" + } + ] + }, + "header": { + "data_hash": "UKkbyKmOFCfH8AupKVsi+0hDL2lZhHnHJ8b36qgnq/Q=", + "number": "3", + "previous_hash": "HlKvqixuKb1OMbQbHhTSZqpwvAZATxvur2mujpVmUfI=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAc=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block.json-flat.json new file mode 100644 index 00000000..ae9caa49 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_3.block.json-flat.json @@ -0,0 +1,59 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEQCIECSKbodxLfFev0eyP/wi5ZBBzDyMrTvsQuYBnPIe/e/AiBoSHBcZpU6Ye29nOJgItC2c2yCaxYZ19UTlRb9oyLzeg== +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.4.5 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'100') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'200') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].value=b64(b'\n\x05exp02\x12\x031.0\x1a\x04escc"\x04vscc*(\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP2D\n \xa1\xd5r\xedIl>\xac\xc8\xcd\x10\xc3\xe2\xeb\xb8!6Y\xd2\xf9\xc7]\xa8\\Ix\xe2\xbc\xda\xaa\xdd7\x12 \xac\xa4\x17x\xa8\xdb\x1a\xbd\xeb\x81\xce]w\xa7\x99\x81\x83\x06f\x005\xb8K\x87\xf4:s\x998\x06,\x1e: \x08\xcag\\9\xa8\xba\xe2c\x18G\xa5!\xfc\x92\xe1)i\xfe\x12+\xd4\xa9\xdf\np|\xf1\x05\x9e\x870B,\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\r\x12\x0b\n\x07Org1MSP\x10\x01\x1a\r\x12\x0b\n\x07Org2MSP\x10\x01') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=omDe2QkOwbhZ5YH7b9/CkVp00bpR78Rj39viq7yT+nw= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'deploy') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'businesschannel') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'\n(\x08\x01\x12\x0c\x12\x05exp02\x1a\x031.0\x1a\x16\n\x04init\n\x01a\n\x03100\n\x01b\n\x03200') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[4]=b64(b'escc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[5]=b64(b'vscc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgYSBGxzY2M= +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:51.036078300Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=55ea70e7984ea62b9facd7e1d4bb2256437645c5bcc91f8c3f2f65aae30fd12e +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i +.data.data[0].signature=MEQCIBJD0ahs3c2cXLCLjtQlIt+ihye1g7/xqcPzQsThtPHMAiAqmpXU8Bgbusbmk+tN2h2xVKMFCmSllJqlxox/VxmUIA== +.header.data_hash=UKkbyKmOFCfH8AupKVsi+0hDL2lZhHnHJ8b36qgnq/Q= +.header.number=3 +.header.previous_hash=HlKvqixuKb1OMbQbHhTSZqpwvAZATxvur2mujpVmUfI= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYBxKVBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYWTbs4WS1LkIQtDZsDVRZ/1kITThFOQ5gEkYwRAIgd2fxHqJVidtWuFDD+8EXZ1L6apsjPYQfvb8gf1/0t1oCIA0gAzokNMmenDfJFf2UDXhwxBbAuyeeRA9l8veh5gpE +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAc= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block new file mode 100644 index 00000000..dc7224a3 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..cbf338b6 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQDBJsrQO7ZCpFPQ7UO2E7B0JxAq9DHpPyXKHf7Y0QFvEQIgdluAbiiCcWbZSjUdKNM2+wyUUU7w1Zp78QJvet8zta8=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "3", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "OTA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjEw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "KDMsROdkTX2U/OOZQHXem8ATULcWO48vukK5kPMon0U=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2020-02-21T19:55:40.211279700Z", + "tls_cert_hash": null, + "tx_id": "e6d22edfea14507f6a97ddb4641ada91413c27a5e9e58318997568a0c330fdfd", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS" + } + } + }, + "signature": "MEQCIFmzHBPnu9zw32wsKxTF264TId4leIxVeJsFLDoe4KKlAiBUtLsjbHfsfhbbw3i5ZvHsXVxXXejVchizE4MJNP0ctQ==" + } + ] + }, + "header": { + "data_hash": "wTbS5mO9fnLsKhQQY54CKjl9bfG5bH5BgE+IbojScf8=", + "number": "4", + "previous_hash": "356c/ZpZsdIIaGq+b3iNtv7BusLcCom0S375wnzpFQA=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAg=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block.json-flat.json new file mode 100644 index 00000000..f5497500 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_4.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQDBJsrQO7ZCpFPQ7UO2E7B0JxAq9DHpPyXKHf7Y0QFvEQIgdluAbiiCcWbZSjUdKNM2+wyUUU7w1Zp78QJvet8zta8= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'90') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'210') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=KDMsROdkTX2U/OOZQHXem8ATULcWO48vukK5kPMon0U= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:55:40.211279700Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=e6d22edfea14507f6a97ddb4641ada91413c27a5e9e58318997568a0c330fdfd +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS +.data.data[0].signature=MEQCIFmzHBPnu9zw32wsKxTF264TId4leIxVeJsFLDoe4KKlAiBUtLsjbHfsfhbbw3i5ZvHsXVxXXejVchizE4MJNP0ctQ== +.header.data_hash=wTbS5mO9fnLsKhQQY54CKjl9bfG5bH5BgE+IbojScf8= +.header.number=4 +.header.previous_hash=356c/ZpZsdIIaGq+b3iNtv7BusLcCom0S375wnzpFQA= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYCBKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYwP+M8/OLtdpPQJU2WDty964KX3BQa4G+EkcwRQIhAJ3uGzG2NUYnYqHCBjx3cA25AYPvmjOoieLbUZhvlKi1AiBSz8Y7YxalUxuJ4QKF+aWaA79f7+IcqBEEsoOLDSTtSg== +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAg= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block new file mode 100644 index 00000000..e50e22e1 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block.json new file mode 100644 index 00000000..65f16ac4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQDFljVJSAxn9HZtoC0cyAjsGivai4h1HB2vXkMiVcjEngIgXRa+WGcmRGG06z4G3BomYTtUsPkupu2ieW2A7rfVqoE=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "4", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "4", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "ODA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjIw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "irgHG8NgyfJ/r5MKgoVH30phS1aAbSztLVS/ES0h8sc=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2020-02-21T19:55:42.815066800Z", + "tls_cert_hash": null, + "tx_id": "12ba5b11582bbcae5b36efb5d34d5be9f12b512c0bfef84eae60c0e7307702ba", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq" + } + } + }, + "signature": "MEUCIQCHaYVfKhYaEYGm6sRwKkwuPLXIibdoLReIwmFPsKPBWQIgaGanhJcOdMiMmdc66VG/pFV0fEdVQOnje/RfO/NGWXQ=" + } + ] + }, + "header": { + "data_hash": "ok8lRWu9kOt3pn21vI75l9dORRvZmxmNP6KuCQ/WIjk=", + "number": "5", + "previous_hash": "XzqZlVjPlE5sRc5Q4WHQXAA3CldQmLCxbH4qgj4DZdE=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAk=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block.json-flat.json new file mode 100644 index 00000000..d8b573eb --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_5.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org2MSP +.data.data[0].payload.data.actions[0].header.nonce=ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQDFljVJSAxn9HZtoC0cyAjsGivai4h1HB2vXkMiVcjEngIgXRa+WGcmRGG06z4G3BomYTtUsPkupu2ieW2A7rfVqoE= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'80') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'220') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=irgHG8NgyfJ/r5MKgoVH30phS1aAbSztLVS/ES0h8sc= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:55:42.815066800Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=12ba5b11582bbcae5b36efb5d34d5be9f12b512c0bfef84eae60c0e7307702ba +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.header.signature_header.nonce=ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq +.data.data[0].signature=MEUCIQCHaYVfKhYaEYGm6sRwKkwuPLXIibdoLReIwmFPsKPBWQIgaGanhJcOdMiMmdc66VG/pFV0fEdVQOnje/RfO/NGWXQ= +.header.data_hash=ok8lRWu9kOt3pn21vI75l9dORRvZmxmNP6KuCQ/WIjk= +.header.number=5 +.header.previous_hash=XzqZlVjPlE5sRc5Q4WHQXAA3CldQmLCxbH4qgj4DZdE= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAk= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block new file mode 100644 index 00000000..fe4876ea Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block.json new file mode 100644 index 00000000..f1fa8bbf --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block.json @@ -0,0 +1,1376 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU82cUgyaDdWYmovc2hQZGJFTFlLRDB3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRXRodUp6Y1VHYkcwVjVTMFk2eXIzV1hML0VLSHo5NTdlOVBEVGxhWTYrRENodnNmNno4QzFNUAoyMU9ob1h6VG10YytDUS85bE53bkcybHdSbUxKamhpamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0Um9qaE82RWJUVUlGdWxERHljYVNDK09SdzhIWk41bHZKckt6bDBwZlFBd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdjdlRWZ3hVQjB1WVdKWVg0ZGxQQW5sc0lXcnFnYmRqSm5JcFZ1aTlkbVhjQ0lEM1c0ZlJrCjZvcjB3MjNOS0dHSTUvc1pwdlB6Njd1WVhmOWNlK0JQMFM0agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "2" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "4" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWakNDQWYyZ0F3SUJBZ0lRZlBEM0s4VmxtSHRrTVdNUHZVZmdHekFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTAKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN6TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN6TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVRK2hhY1FiTVM3QnkrM1lwcHh4dFZZSlJHMElyOW5keDFVT3hZclZDWEhBbVE1aFg0UHlhUFMySQpTNG5Fa0o1aEUvVitzd1F6aXVQcWtVMXRURmhUejZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQ0NJelRXWVNFb0EzbTlDdERwSDVqRzlhazltMjV2cmp4YWtGSHg0dXFLb2pBS0JnZ3Foa2pPUFFRRApBZ05IQURCRUFpQUwzQ2hWNmZWb25vN21sYys1d3hpSW51V1J1ZTk0aTlOWHAzb3lSTll0T1FJZ01nSnRZdndlClRMY29ubS9IWnIzallMQ0ZjTFpKYy9xUXZRMnZqdmh3RTFRPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIGjzBYJQlWYMRiKJuqODIS9WVcqXiQHjBtJYeelF+V47AiADwNFHRXQudKzFBmmJKg1ZrTkMJ0YIb2i6hvjxfdT85Q==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "n8Cz9hIfaKMEY9y+lJ1jZ3cX812PCLHx" + } + }, + { + "signature": "MEUCIQCpHs72hK8etu5NaVzMXtM9vcLxoGUaXvdNUpwx1VbnbQIgE15Ii0RASKrbKzKDWJUJOvKekd1ciMoXqusFpu0qjgY=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "HGSN5ZleGzrZNK7YR5s+WjaNbg8k06k/" + } + }, + { + "signature": "MEQCICUpzly1F0xOHS8d/cP8cGaTOkJURSKfH6CdUsVpOBDsAiAG1f+8sFMhmUsymUNnS5fzuKujQrfTgz0es8+KKSlhuQ==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "6Z8ZYIPPc04ubORCPtpQy2lbCDLTM83S" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:56:00Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "v6E9H1twGNPiLZhUXbI8zQbtkCgFncbI" + } + } + }, + "signature": "MEQCIE7S+4B4d2zlZEa41yDpHMToGNs1xgDsldbIFQsnQ5/6AiATvKEgkGRdOqVVSd1SeVhcY7S3TRy1RsiAhkBul3Iaqg==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:56:00Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "nMuaqhEAmiEQ+Hx1yJ7iJObwc/MN7bJE" + } + } + }, + "signature": "MEQCIEkTd6C2j8KpxITqXsgeNyU0WdcmDXYiVF5F+McGkVzeAiA41/Go8tnTQdxAlnO9kyiGjfKgF+Qatl+rRSdUUF8psQ==" + } + ] + }, + "header": { + "data_hash": "cICNR8uwKgWaW7H3txwefCS5v9I4nWvelzqQev8AQjA=", + "number": "6", + "previous_hash": "SMBuZQTwskzzKa/KY6Omc90UzBQs8ShixafTC7U40bY=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIBg==", + "", + "CgkKAwECAxAEGAo=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block.json-flat.json new file mode 100644 index 00000000..bd0ee4c4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_6.block.json-flat.json @@ -0,0 +1,504 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy\nfA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E\nAwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nfKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV\nWZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr\nX8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF\nAiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.name=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=4 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nfKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV\nWZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr\nX8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF\nAiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nfKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV\nWZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr\nX8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF\nAiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.name=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.type=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=2 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIGjzBYJQlWYMRiKJuqODIS9WVcqXiQHjBtJYeelF+V47AiADwNFHRXQudKzFBmmJKg1ZrTkMJ0YIb2i6hvjxfdT85Q== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=n8Cz9hIfaKMEY9y+lJ1jZ3cX812PCLHx +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature=MEUCIQCpHs72hK8etu5NaVzMXtM9vcLxoGUaXvdNUpwx1VbnbQIgE15Ii0RASKrbKzKDWJUJOvKekd1ciMoXqusFpu0qjgY= +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.nonce=HGSN5ZleGzrZNK7YR5s+WjaNbg8k06k/ +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature=MEQCICUpzly1F0xOHS8d/cP8cGaTOkJURSKfH6CdUsVpOBDsAiAG1f+8sFMhmUsymUNnS5fzuKujQrfTgz0es8+KKSlhuQ== +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.nonce=6Z8ZYIPPc04ubORCPtpQy2lbCDLTM83S +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:56:00Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=v6E9H1twGNPiLZhUXbI8zQbtkCgFncbI +.data.data[0].payload.data.last_update.signature=MEQCIE7S+4B4d2zlZEa41yDpHMToGNs1xgDsldbIFQsnQ5/6AiATvKEgkGRdOqVVSd1SeVhcY7S3TRy1RsiAhkBul3Iaqg== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:56:00Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=nMuaqhEAmiEQ+Hx1yJ7iJObwc/MN7bJE +.data.data[0].signature=MEQCIEkTd6C2j8KpxITqXsgeNyU0WdcmDXYiVF5F+McGkVzeAiA41/Go8tnTQdxAlnO9kyiGjfKgF+Qatl+rRSdUUF8psQ== +.header.data_hash=cICNR8uwKgWaW7H3txwefCS5v9I4nWvelzqQev8AQjA= +.header.number=6 +.header.previous_hash=SMBuZQTwskzzKa/KY6Omc90UzBQs8ShixafTC7U40bY= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIBg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAo= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block new file mode 100644 index 00000000..fe4876ea Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block.json new file mode 100644 index 00000000..9b5aa8a4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block.json @@ -0,0 +1,984 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU82cUgyaDdWYmovc2hQZGJFTFlLRDB3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRXRodUp6Y1VHYkcwVjVTMFk2eXIzV1hML0VLSHo5NTdlOVBEVGxhWTYrRENodnNmNno4QzFNUAoyMU9ob1h6VG10YytDUS85bE53bkcybHdSbUxKamhpamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0Um9qaE82RWJUVUlGdWxERHljYVNDK09SdzhIWk41bHZKckt6bDBwZlFBd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdjdlRWZ3hVQjB1WVdKWVg0ZGxQQW5sc0lXcnFnYmRqSm5JcFZ1aTlkbVhjQ0lEM1c0ZlJrCjZvcjB3MjNOS0dHSTUvc1pwdlB6Njd1WVhmOWNlK0JQMFM0agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQDKs+gjw2BFlMWDtvzBkXT7b0XOXzdXT2MXShO0beQxJAIgMGKeVowKWVvUYDsOEJflSQjOl0KpxfY1mcEO3U72eOo=", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lSQUtQelI2OUd5Ry9DWFZ4VWFHclZKbGN3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCck1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFT01Bd0dBMVVFQ3hNRllXUnRhVzR4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6SXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVFXdDkrTWRXMXIKdU43U2NtT2ZXU0JuV251MnZWNWhyREs0c3Z3c2xpWnYxV0dIdWNkaEdEKzdXY1Z0NU1YVi9BL1lOSWh1bnVSRQp5SUh1VDVYb1dXZUZvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NBcDlwTkhmWEtwSm1pbGp1czk2KzlYZ0xQbENwUzBnNEpBQUJtd3FkRlZQVEFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCRHI1N0VPYyttWTlCeFhKaHBDM1lERUNwbHNvQm9jZmxjMSsyNG1qMy9qQUlnViswZwpEUEg1RmlNbzY3V2RPOVBCSm1mQ1lTYVBzKzI1dDJJQnZQczN4MHM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org2MSP" + }, + "nonce": "Bgq9+1on+EgIrbiSsD21LIzgo7ykzOSI" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-05-20T18:20:05Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "3g3f8VKceByx6GghB4XTcM+WqI27ADsd" + } + } + }, + "signature": "MEQCIA/gV1NAPiYdcuM/XueRzgL+BouNkUwxiUxJcoxF/wMEAiB4qq5Uk0yZvMc2EHisKwXMLK+uTUI+weVePbVnJEzYHQ==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-05-20T18:20:05Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "x8eX7DdwthMuectr0ZC9wYq9HAIotKfl" + } + } + }, + "signature": "MEUCIQDxYMYMXUhrWNNV1lWqkTJZ6ZZmvgu13NdtHs32Dj7rrgIgC4TNPNSjIRRnzI7XZ71dVVkr3kpSD/dfvyPCzBA8S8U=" + } + ] + }, + "header": { + "data_hash": "ECP44VBzIS3VbH+wJl7RyKuBnOMwdmglenuvEHgL4bw=", + "number": "2", + "previous_hash": "pulwY+PomB4U/SpvPdkkKDDaASzAbT/KQ6nIBGt/p4w=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block.json-flat.json new file mode 100644 index 00000000..f72afd2a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block.json-flat.json @@ -0,0 +1,366 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQDKs+gjw2BFlMWDtvzBkXT7b0XOXzdXT2MXShO0beQxJAIgMGKeVowKWVvUYDsOEJflSQjOl0KpxfY1mcEO3U72eOo= +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=Bgq9+1on+EgIrbiSsD21LIzgo7ykzOSI +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-05-20T18:20:05Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=3g3f8VKceByx6GghB4XTcM+WqI27ADsd +.data.data[0].payload.data.last_update.signature=MEQCIA/gV1NAPiYdcuM/XueRzgL+BouNkUwxiUxJcoxF/wMEAiB4qq5Uk0yZvMc2EHisKwXMLK+uTUI+weVePbVnJEzYHQ== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-05-20T18:20:05Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=x8eX7DdwthMuectr0ZC9wYq9HAIotKfl +.data.data[0].signature=MEUCIQDxYMYMXUhrWNNV1lWqkTJZ6ZZmvgu13NdtHs32Dj7rrgIgC4TNPNSjIRRnzI7XZ71dVVkr3kpSD/dfvyPCzBA8S8U= +.header.data_hash=ECP44VBzIS3VbH+wJl7RyKuBnOMwdmglenuvEHgL4bw= +.header.number=2 +.header.previous_hash=pulwY+PomB4U/SpvPdkkKDDaASzAbT/KQ6nIBGt/p4w= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta.json new file mode 100644 index 00000000..853818c6 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta.json @@ -0,0 +1,308 @@ +{ + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWakNDQWYyZ0F3SUJBZ0lRZlBEM0s4VmxtSHRrTVdNUHZVZmdHekFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTAKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN6TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN6TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVRK2hhY1FiTVM3QnkrM1lwcHh4dFZZSlJHMElyOW5keDFVT3hZclZDWEhBbVE1aFg0UHlhUFMySQpTNG5Fa0o1aEUvVitzd1F6aXVQcWtVMXRURmhUejZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQ0NJelRXWVNFb0EzbTlDdERwSDVqRzlhazltMjV2cmp4YWtGSHg0dXFLb2pBS0JnZ3Foa2pPUFFRRApBZ05IQURCRUFpQUwzQ2hWNmZWb25vN21sYys1d3hpSW51V1J1ZTk0aTlOWHAzb3lSTll0T1FJZ01nSnRZdndlClRMY29ubS9IWnIzallMQ0ZjTFpKYy9xUXZRMnZqdmh3RTFRPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta.pb b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta.pb new file mode 100644 index 00000000..7e0f5261 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta.pb differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta_env.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta_env.json new file mode 100644 index 00000000..6cc35977 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta_env.json @@ -0,0 +1,320 @@ +{ + "payload": { + "header": { + "channel_header": { + "channel_id": "businesschannel", + "type": 2 + } + }, + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWakNDQWYyZ0F3SUJBZ0lRZlBEM0s4VmxtSHRrTVdNUHZVZmdHekFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTAKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN6TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN6TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVRK2hhY1FiTVM3QnkrM1lwcHh4dFZZSlJHMElyOW5keDFVT3hZclZDWEhBbVE1aFg0UHlhUFMySQpTNG5Fa0o1aEUvVitzd1F6aXVQcWtVMXRURmhUejZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQ0NJelRXWVNFb0EzbTlDdERwSDVqRzlhazltMjV2cmp4YWtGSHg0dXFLb2pBS0JnZ3Foa2pPUFFRRApBZ05IQURCRUFpQUwzQ2hWNmZWb25vN21sYys1d3hpSW51V1J1ZTk0aTlOWHAzb3lSTll0T1FJZ01nSnRZdndlClRMY29ubS9IWnIzallMQ0ZjTFpKYy9xUXZRMnZqdmh3RTFRPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + } + } + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta_env.pb new file mode 100644 index 00000000..c1dcdc7f Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/config_delta_env.pb differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block new file mode 100644 index 00000000..30ea50df Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block.json new file mode 100644 index 00000000..fd693197 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json new file mode 100644 index 00000000..959f6799 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=100 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.json new file mode 100644 index 00000000..093b45f4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer0.genesis.block_updated.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUpSYlBoRWM5ejFDcE1CbnNwRlQ3MFV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQ3dvSVRVUlhTT2hsN1B0Y0orNmVsY3FGekxVUG1QbmIxUU9TQzdLMTQ1WlNxV2RqandMb3FSeQpmQTZxbDZWYnU0QkcrU2RLMTYweTVwOUgrb3BrMGdDamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdOSzB2SGxDY043ZjFOQ2ZNNEVuaWp5eGFUV0Zwd2pLdWVaT21YdU90VmZJd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdNL3UxOWFqemh1NmsxMzN1SktUL3FDS0U3OS9rQXJmKzVZUEd1bFArNUo4Q0lBRnNNMk00ClNTaXBrUjQ5WmhiRW9WcnQvdm1kamk2UWtEWXUzU1l6MlJrNwotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer1.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy\nfA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E\nAwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O\nJMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY\na8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv\nDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK\npEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/orderer2.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/original_config.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/original_config.json new file mode 100644 index 00000000..fae25ef9 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/original_config.json @@ -0,0 +1,794 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/original_config.pb new file mode 100644 index 00000000..9db4245e Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/original_config.pb differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_0.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O\nJMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY\na8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv\nDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK\npEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block new file mode 100644 index 00000000..def0bbf0 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block.json new file mode 100644 index 00000000..a827afaf --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block.json @@ -0,0 +1,1145 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU82cUgyaDdWYmovc2hQZGJFTFlLRDB3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRXRodUp6Y1VHYkcwVjVTMFk2eXIzV1hML0VLSHo5NTdlOVBEVGxhWTYrRENodnNmNno4QzFNUAoyMU9ob1h6VG10YytDUS85bE53bkcybHdSbUxKamhpamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0Um9qaE82RWJUVUlGdWxERHljYVNDK09SdzhIWk41bHZKckt6bDBwZlFBd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdjdlRWZ3hVQjB1WVdKWVg0ZGxQQW5sc0lXcnFnYmRqSm5JcFZ1aTlkbVhjQ0lEM1c0ZlJrCjZvcjB3MjNOS0dHSTUvc1pwdlB6Njd1WVhmOWNlK0JQMFM0agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:34Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g" + } + } + }, + "signature": "MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n" + } + } + }, + "signature": "MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw==" + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 4, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNIekNDQWNhZ0F3SUJBZ0lSQU1uN3FsZ0ZzbTVGZ2YxbkN3emtObU13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR3N4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJBd0RnWURWUVFMRXdkdmNtUmxjbVZ5TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsCkxtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCTHM5bWQrT1dNK3l5RGZkdEc3ajNZUHQKMlBtZkFxWUdLdi9hV2c5N0xWVXNpdndNMkVmRUJ6bkFZMWl0T1E5c2FGUGEvNmI1RTVzVGRKOGhPV2RHQjZhagpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJRzVSCk1VZzhkL0RTZUkxM0tsZVRVNlZQTXFDekIyK0wwNHduR2NrNTI4YXdNQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUMKSUFMMzlkbUozZmpPY1RiUnAyaGFWRUZZWlRka3VobDkyLzBvOUZ2d3pINUpBaUJZUk1yMGJXRDAwdGhQMGdpTgpXSjNsU0JRL0JVWm54dHFVS1piNWYwODJBUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "PpSPZ2iBOPdeeEzW+8In8aKYLxbAHrdh" + } + } + }, + "signature": "MEQCIFsRSBwhvLb5xfhW6ZAhKueu2QpwxZd+diRd498aXSihAiBDoyM4GOeIaH8uITkw1Us7t52zyY5qWz0WLDjHoKuH1g==" + } + ] + }, + "header": { + "data_hash": "7Hp5W25DEq6DyXo0UO2gl1ZS0MIfDgpwBu2tH/oK68k=", + "number": "1", + "previous_hash": "SFWt72zbImlxzW8cga/Dqp5NciJuDm8Pp8nGZPEEIjY=" + }, + "metadata": { + "metadata": [ + "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", + "", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block.json-flat.json new file mode 100644 index 00000000..254f270e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block.json-flat.json @@ -0,0 +1,418 @@ +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.version=0 +.data.data[0].payload.data.payload.data.config.sequence=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature=MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA== +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.nonce=EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:34Z +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.nonce=otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g +.data.data[0].payload.data.payload.data.last_update.signature=MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY= +.data.data[0].payload.data.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.data.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.header.channel_header.type=1 +.data.data[0].payload.data.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.data.payload.header.signature_header.nonce=sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n +.data.data[0].payload.data.signature=MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw== +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=4 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=PpSPZ2iBOPdeeEzW+8In8aKYLxbAHrdh +.data.data[0].signature=MEQCIFsRSBwhvLb5xfhW6ZAhKueu2QpwxZd+diRd498aXSihAiBDoyM4GOeIaH8uITkw1Us7t52zyY5qWz0WLDjHoKuH1g== +.header.data_hash=7Hp5W25DEq6DyXo0UO2gl1ZS0MIfDgpwBu2tH/oK68k= +.header.number=1 +.header.previous_hash=SFWt72zbImlxzW8cga/Dqp5NciJuDm8Pp8nGZPEEIjY= +.metadata.metadata[0]=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 +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block.json-flat.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_config.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP\n21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E\nAwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy\nfA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E\nAwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O\nJMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY\na8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv\nDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK\npEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/updated_config.json b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/updated_config.json new file mode 100644 index 00000000..885fa650 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/updated_config.json @@ -0,0 +1,964 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWakNDQWYyZ0F3SUJBZ0lRZlBEM0s4VmxtSHRrTVdNUHZVZmdHekFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTAKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN6TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN6TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVRK2hhY1FiTVM3QnkrM1lwcHh4dFZZSlJHMElyOW5keDFVT3hZclZDWEhBbVE1aFg0UHlhUFMySQpTNG5Fa0o1aEUvVitzd1F6aXVQcWtVMXRURmhUejZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQ0NJelRXWVNFb0EzbTlDdERwSDVqRzlhazltMjV2cmp4YWtGSHg0dXFLb2pBS0JnZ3Foa2pPUFFRRApBZ05IQURCRUFpQUwzQ2hWNmZWb25vN21sYys1d3hpSW51V1J1ZTk0aTlOWHAzb3lSTll0T1FJZ01nSnRZdndlClRMY29ubS9IWnIzallMQ0ZjTFpKYy9xUXZRMnZqdmh3RTFRPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/updated_config.pb b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/updated_config.pb new file mode 100644 index 00000000..e88a5609 Binary files /dev/null and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/updated_config.pb differ diff --git a/hyperledger_fabric/v1.4.7/raft/configtx.yaml b/hyperledger_fabric/v1.4.7/raft/configtx.yaml new file mode 100644 index 00000000..f2f5279a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/configtx.yaml @@ -0,0 +1,795 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + + - &Org3 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org3MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org3MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org3Policies + Readers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org3.example.com + Port: 7051 +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V1_4_3: true + V1_4_2: false + V1_3: false + V1_1: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V1_4_2: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V2.0 for Application enables the new non-backwards compatible + # features and fixes of fabric v2.0. + V1_4_2: true + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: etcdraft + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + - orderer2.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7055 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.7/raft/logs/dev_all.log b/hyperledger_fabric/v1.4.7/raft/logs/dev_all.log new file mode 100644 index 00000000..2dc083c8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/logs/dev_all.log @@ -0,0 +1,112587 @@ +Attaching to peer0.org1.example.com, peer1.org2.example.com, peer1.org1.example.com, peer0.org2.example.com, fabric-cli, orderer1.example.com, orderer2.example.com, orderer0.example.com +orderer1.example.com | 2020-05-20 18:19:45.462 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2020-05-20 18:19:45.695 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.ConnectionTimeout = 0s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | General.Authentication.NoExpirationChecks = false +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2020-05-20 18:19:45.799 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer1.example.com | "2020-05-20 18:19:45.823 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer1.example.com | "2020-05-20 18:19:45.866 UTC [orderer.common.server] Start -> INFO 005 Setting up cluster for orderer type etcdraft" +orderer1.example.com | "2020-05-20 18:19:45.952 UTC [orderer.common.server] reuseListener -> INFO 006 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2020-05-20 18:19:45.999 UTC [fsblkstorage] newBlockfileMgr -> INFO 007 Getting block information from block storage" +orderer1.example.com | "2020-05-20 18:19:46.032 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 008 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2020-05-20 18:19:46.032 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 009 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.057 UTC [orderer.commmon.multichannel] Initialize -> INFO 00a Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +orderer1.example.com | "2020-05-20 18:19:46.059 UTC [orderer.consensus.etcdraft] Start -> INFO 00b Starting Raft node" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.063 UTC [orderer.common.cluster] Configure -> INFO 00c Entering, channel: testchainid, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7055, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2020-05-20 18:19:46.063 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel testchainid" +orderer1.example.com | "2020-05-20 18:19:46.064 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer1.example.com | "2020-05-20 18:19:46.070 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2020-05-20 18:19:46.073 UTC [orderer.common.cluster] updateStubInMapping -> INFO 010 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 012 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.common.cluster] Configure -> INFO 013 Exiting" +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.consensus.etcdraft] start -> INFO 014 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 015 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.consensus.etcdraft] newRaft -> INFO 016 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 017 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.common.server] Start -> INFO 018 Starting orderer: +orderer1.example.com | Version: 1.4.7 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.13.11 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2020-05-20 18:19:46.085 UTC [orderer.common.server] Start -> INFO 019 Beginning to serve requests" +orderer1.example.com | "2020-05-20 18:19:46.113 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.113 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.113 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.969 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.973 UTC [orderer.consensus.etcdraft] Step -> INFO 01e 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.973 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01f 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.973 UTC [orderer.consensus.etcdraft] Step -> INFO 020 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.978 UTC [orderer.consensus.etcdraft] run -> INFO 021 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:46.979 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 022 Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:57.878 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 023 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2020-05-20 18:19:57.903 UTC [fsblkstorage] newBlockfileMgr -> INFO 024 Getting block information from block storage" +orderer1.example.com | "2020-05-20 18:19:57.912 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 025 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2020-05-20 18:19:57.912 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 026 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:57.939 UTC [orderer.commmon.multichannel] newChain -> INFO 027 Created and starting new chain businesschannel" +orderer1.example.com | "2020-05-20 18:19:57.939 UTC [orderer.consensus.etcdraft] Start -> INFO 028 Starting Raft node" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:57.939 UTC [orderer.common.cluster] Configure -> INFO 029 Entering, channel: businesschannel, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7055, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2020-05-20 18:19:57.939 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel businesschannel" +orderer1.example.com | "2020-05-20 18:19:57.939 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer1.example.com | "2020-05-20 18:19:57.939 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2020-05-20 18:19:57.939 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02d Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2020-05-20 18:19:57.940 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2020-05-20 18:19:57.940 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02f 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2020-05-20 18:19:57.940 UTC [orderer.common.cluster] Configure -> INFO 030 Exiting" +orderer1.example.com | "2020-05-20 18:19:57.940 UTC [orderer.consensus.etcdraft] start -> INFO 031 Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:57.940 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 032 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:57.940 UTC [orderer.consensus.etcdraft] newRaft -> INFO 033 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:57.940 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 034 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:57.947 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:57.947 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:57.947 UTC [orderer.consensus.etcdraft] apply -> INFO 037 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:58.951 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:58.959 UTC [orderer.consensus.etcdraft] Step -> INFO 039 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:58.959 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 03a 2 became follower at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:58.959 UTC [orderer.consensus.etcdraft] Step -> INFO 03b 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:58.974 UTC [orderer.consensus.etcdraft] run -> INFO 03c raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:19:58.975 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03d Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:20:03.139 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:20:05.436 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:20:11.248 UTC [comm.grpc.server] 1 -> INFO 040 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:59106 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.9999816s +orderer1.example.com | "2020-05-20 18:21:12.970 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:21:16.571 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:21:19.565 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:21:35.197 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 044 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-05-20 18:21:35.198 UTC [cauthdsl] deduplicate -> WARN 045 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer1.example.com | "2020-05-20 18:21:35.200 UTC [cauthdsl] deduplicate -> WARN 046 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer0.example.com | 2020-05-20 18:19:45.327 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for ramledger +orderer0.example.com | 2020-05-20 18:19:45.327 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value is not a string: 1000 +orderer0.example.com | 2020-05-20 18:19:45.327 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for ramledger.HistorySize setting to int 1000 +orderer0.example.com | 2020-05-20 18:19:45.328 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2020-05-20 18:19:45.328 UTC [viperutil] getKeysRecursively -> DEBU 005 Found map[string]interface{} value for kafka.TLS +orderer0.example.com | 2020-05-20 18:19:45.328 UTC [viperutil] unmarshalJSON -> DEBU 006 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-05-20 18:19:45.328 UTC [viperutil] getKeysRecursively -> DEBU 007 Found real value for kafka.TLS.Enabled setting to bool false +orderer0.example.com | 2020-05-20 18:19:45.328 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.328 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for kafka.TLS.PrivateKey setting to +orderer0.example.com | 2020-05-20 18:19:45.328 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.330 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for kafka.TLS.Certificate setting to +orderer0.example.com | 2020-05-20 18:19:45.331 UTC [viperutil] unmarshalJSON -> DEBU 00c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.331 UTC [viperutil] getKeysRecursively -> DEBU 00d Found real value for kafka.TLS.RootCAs setting to +orderer0.example.com | 2020-05-20 18:19:45.331 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.331 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for kafka.TLS.ClientAuthRequired setting to +orderer0.example.com | 2020-05-20 18:19:45.331 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.332 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for kafka.TLS.ClientRootCAs setting to +orderer0.example.com | 2020-05-20 18:19:45.332 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[string]interface{} value for kafka.SASLPlain +orderer0.example.com | 2020-05-20 18:19:45.332 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.332 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for kafka.SASLPlain.User setting to +orderer0.example.com | 2020-05-20 18:19:45.332 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.332 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for kafka.SASLPlain.Password setting to +orderer0.example.com | 2020-05-20 18:19:45.333 UTC [viperutil] unmarshalJSON -> DEBU 017 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-05-20 18:19:45.333 UTC [viperutil] getKeysRecursively -> DEBU 018 Found real value for kafka.SASLPlain.Enabled setting to bool false +orderer0.example.com | 2020-05-20 18:19:45.333 UTC [viperutil] unmarshalJSON -> DEBU 019 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.333 UTC [viperutil] getKeysRecursively -> DEBU 01a Found real value for kafka.Version setting to +orderer0.example.com | 2020-05-20 18:19:45.333 UTC [viperutil] getKeysRecursively -> DEBU 01b Found map[string]interface{} value for kafka.Retry +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 01c Found map[string]interface{} value for kafka.Retry.Consumer +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 01d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 01e Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for kafka.Retry.ShortInterval setting to string 5s +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for kafka.Retry.LongInterval setting to string 5m +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for kafka.Retry.LongTotal setting to string 12h +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 027 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer0.example.com | 2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer0.example.com | 2020-05-20 18:19:45.335 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +orderer0.example.com | 2020-05-20 18:19:45.335 UTC [viperutil] unmarshalJSON -> DEBU 02c Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 02d Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer0.example.com | 2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 02e Found map[string]interface{} value for kafka.Retry.Metadata +orderer0.example.com | 2020-05-20 18:19:45.335 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer0.example.com | 2020-05-20 18:19:45.336 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-05-20 18:19:45.336 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +orderer0.example.com | 2020-05-20 18:19:45.336 UTC [viperutil] getKeysRecursively -> DEBU 033 Found map[string]interface{} value for kafka.Retry.Producer +orderer0.example.com | 2020-05-20 18:19:45.339 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.339 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +orderer0.example.com | 2020-05-20 18:19:45.340 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-05-20 18:19:45.340 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +orderer0.example.com | 2020-05-20 18:19:45.340 UTC [viperutil] getKeysRecursively -> DEBU 038 Found map[string]interface{} value for kafka.Topic +orderer0.example.com | 2020-05-20 18:19:45.341 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-05-20 18:19:45.341 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer0.example.com | 2020-05-20 18:19:45.341 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-05-20 18:19:45.341 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for kafka.Verbose setting to bool false +orderer0.example.com | 2020-05-20 18:19:45.342 UTC [viperutil] getKeysRecursively -> DEBU 03d Found map[interface{}]interface{} value for debug +orderer0.example.com | 2020-05-20 18:19:45.342 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.342 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for debug.BroadcastTraceDir setting to +orderer0.example.com | 2020-05-20 18:19:45.342 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.344 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for debug.DeliverTraceDir setting to +orderer0.example.com | 2020-05-20 18:19:45.344 UTC [viperutil] getKeysRecursively -> DEBU 042 Found map[interface{}]interface{} value for operations +orderer0.example.com | 2020-05-20 18:19:45.345 UTC [viperutil] getKeysRecursively -> DEBU 043 Found map[string]interface{} value for operations.TLS +orderer0.example.com | 2020-05-20 18:19:45.345 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.346 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for operations.TLS.Certificate setting to +orderer0.example.com | 2020-05-20 18:19:45.346 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.347 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for operations.TLS.PrivateKey setting to +orderer0.example.com | 2020-05-20 18:19:45.347 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-05-20 18:19:45.347 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for operations.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2020-05-20 18:19:45.347 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: [] +orderer0.example.com | 2020-05-20 18:19:45.347 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +orderer0.example.com | 2020-05-20 18:19:45.347 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.348 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for operations.TLS.RootCAs setting to +orderer0.example.com | 2020-05-20 18:19:45.348 UTC [viperutil] unmarshalJSON -> DEBU 04e Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-05-20 18:19:45.348 UTC [viperutil] getKeysRecursively -> DEBU 04f Found real value for operations.TLS.Enabled setting to bool false +orderer0.example.com | 2020-05-20 18:19:45.348 UTC [viperutil] unmarshalJSON -> DEBU 050 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.348 UTC [viperutil] getKeysRecursively -> DEBU 051 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +orderer0.example.com | 2020-05-20 18:19:45.348 UTC [viperutil] getKeysRecursively -> DEBU 052 Found map[interface{}]interface{} value for metrics +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for metrics.Provider setting to string prometheus +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 055 Found map[string]interface{} value for metrics.Statsd +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 056 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 057 Found real value for metrics.Statsd.WriteInterval setting to string 30s +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 058 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 059 Found real value for metrics.Statsd.Prefix setting to +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for metrics.Statsd.Network setting to string udp +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 05e Found map[interface{}]interface{} value for consensus +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 063 Found map[interface{}]interface{} value for general +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 064 Found map[string]interface{} value for general.Authentication +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] unmarshalJSON -> DEBU 065 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 066 Found real value for general.Authentication.TimeWindow setting to string 15m +orderer0.example.com | 2020-05-20 18:19:45.350 UTC [viperutil] unmarshalJSON -> DEBU 067 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 068 Found real value for general.Authentication.NoExpirationChecks setting to +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] unmarshalJSON -> DEBU 069 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 06a Found real value for general.SystemChannel setting to +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 06b Found map[string]interface{} value for general.Cluster +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for general.Cluster.ListenPort setting to string 7055 +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for general.Cluster.CertExpirationWarningThreshold setting to +orderer0.example.com | 2020-05-20 18:19:45.351 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.352 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for general.Cluster.TLSHandshakeTimeShift setting to +orderer0.example.com | 2020-05-20 18:19:45.352 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.352 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for general.Cluster.ServerPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-05-20 18:19:45.352 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.352 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for general.Cluster.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2020-05-20 18:19:45.352 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.352 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2020-05-20 18:19:45.352 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.354 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for general.Cluster.RPCTimeout setting to +orderer0.example.com | 2020-05-20 18:19:45.356 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for general.Cluster.ReplicationMaxRetries setting to +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 080 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 081 Found real value for general.Cluster.ServerCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 082 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 083 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 084 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 085 Found real value for general.Cluster.ReplicationRetryTimeout setting to +orderer0.example.com | 2020-05-20 18:19:45.358 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value is not a string: 10 +orderer0.example.com | 2020-05-20 18:19:45.358 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for general.Cluster.SendBufferSize setting to int 10 +orderer0.example.com | 2020-05-20 18:19:45.358 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.358 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for general.Cluster.DialTimeout setting to +orderer0.example.com | 2020-05-20 18:19:45.358 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.358 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for general.Cluster.ReplicationBufferSize setting to +orderer0.example.com | 2020-05-20 18:19:45.358 UTC [viperutil] unmarshalJSON -> DEBU 08c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.359 UTC [viperutil] getKeysRecursively -> DEBU 08d Found real value for general.Cluster.ReplicationPullTimeout setting to +orderer0.example.com | 2020-05-20 18:19:45.359 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2020-05-20 18:19:45.359 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for general.LedgerType setting to string file +orderer0.example.com | 2020-05-20 18:19:45.359 UTC [viperutil] getKeysRecursively -> DEBU 090 Found map[string]interface{} value for general.Keepalive +orderer0.example.com | 2020-05-20 18:19:45.359 UTC [viperutil] unmarshalJSON -> DEBU 091 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.359 UTC [viperutil] getKeysRecursively -> DEBU 092 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer0.example.com | 2020-05-20 18:19:45.360 UTC [viperutil] unmarshalJSON -> DEBU 093 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.361 UTC [viperutil] getKeysRecursively -> DEBU 094 Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer0.example.com | 2020-05-20 18:19:45.361 UTC [viperutil] unmarshalJSON -> DEBU 095 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.362 UTC [viperutil] getKeysRecursively -> DEBU 096 Found real value for general.Keepalive.ServerTimeout setting to string 20s +orderer0.example.com | 2020-05-20 18:19:45.363 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.364 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for general.ConnectionTimeout setting to +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] unmarshalJSON -> DEBU 09d Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 09e Found real value for general.ListenPort setting to string 7050 +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] unmarshalJSON -> DEBU 09f Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 0a0 Found real value for general.LocalMSPID setting to string OrdererMSP +orderer0.example.com | 2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found map[string]interface{} value for general.Profile +orderer0.example.com | 2020-05-20 18:19:45.366 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for general.Profile.Enabled setting to bool false +orderer0.example.com | 2020-05-20 18:19:45.366 UTC [viperutil] unmarshalJSON -> DEBU 0a4 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a5 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +orderer0.example.com | 2020-05-20 18:19:45.366 UTC [viperutil] unmarshalJSON -> DEBU 0a6 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found real value for general.GenesisMethod setting to string file +orderer0.example.com | 2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found map[string]interface{} value for general.BCCSP +orderer0.example.com | 2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found map[string]interface{} value for general.BCCSP.SW +orderer0.example.com | 2020-05-20 18:19:45.367 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.367 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for general.BCCSP.SW.Hash setting to string SHA2 +orderer0.example.com | 2020-05-20 18:19:45.367 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: 256 +orderer0.example.com | 2020-05-20 18:19:45.367 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for general.BCCSP.SW.Security setting to int 256 +orderer0.example.com | 2020-05-20 18:19:45.367 UTC [viperutil] getKeysRecursively -> DEBU 0ae Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +orderer0.example.com | 2020-05-20 18:19:45.367 UTC [viperutil] unmarshalJSON -> DEBU 0af Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.367 UTC [viperutil] getKeysRecursively -> DEBU 0b0 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +orderer0.example.com | 2020-05-20 18:19:45.368 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found map[string]interface{} value for general.BCCSP.PKCS11 +orderer0.example.com | 2020-05-20 18:19:45.368 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.368 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for general.BCCSP.PKCS11.Security setting to +orderer0.example.com | 2020-05-20 18:19:45.368 UTC [viperutil] getKeysRecursively -> DEBU 0b4 Found map[string]interface{} value for general.BCCSP.PKCS11.FileKeyStore +orderer0.example.com | 2020-05-20 18:19:45.368 UTC [viperutil] unmarshalJSON -> DEBU 0b5 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.368 UTC [viperutil] getKeysRecursively -> DEBU 0b6 Found real value for general.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +orderer0.example.com | 2020-05-20 18:19:45.368 UTC [viperutil] unmarshalJSON -> DEBU 0b7 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0b8 Found real value for general.BCCSP.PKCS11.Library setting to +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] unmarshalJSON -> DEBU 0b9 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0ba Found real value for general.BCCSP.PKCS11.Label setting to +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] unmarshalJSON -> DEBU 0bb Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0bc Found real value for general.BCCSP.PKCS11.Pin setting to +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] unmarshalJSON -> DEBU 0bd Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0be Found real value for general.BCCSP.PKCS11.Hash setting to +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] unmarshalJSON -> DEBU 0bf Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found real value for general.BCCSP.Default setting to string SW +orderer0.example.com | 2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0c1 Found map[string]interface{} value for general.TLS +orderer0.example.com | 2020-05-20 18:19:45.370 UTC [viperutil] unmarshalJSON -> DEBU 0c2 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-05-20 18:19:45.370 UTC [viperutil] getKeysRecursively -> DEBU 0c3 Found real value for general.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2020-05-20 18:19:45.370 UTC [viperutil] unmarshalJSON -> DEBU 0c4 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-05-20 18:19:45.370 UTC [viperutil] getKeysRecursively -> DEBU 0c5 Found real value for general.TLS.ClientRootCAs setting to +orderer0.example.com | 2020-05-20 18:19:45.370 UTC [viperutil] unmarshalJSON -> DEBU 0c6 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +orderer0.example.com | 2020-05-20 18:19:45.370 UTC [viperutil] getKeysRecursively -> DEBU 0c7 Found real value for general.TLS.Enabled setting to string true +orderer0.example.com | 2020-05-20 18:19:45.370 UTC [viperutil] unmarshalJSON -> DEBU 0c8 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.372 UTC [viperutil] getKeysRecursively -> DEBU 0c9 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-05-20 18:19:45.372 UTC [viperutil] unmarshalJSON -> DEBU 0ca Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.372 UTC [viperutil] getKeysRecursively -> DEBU 0cb Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-05-20 18:19:45.372 UTC [viperutil] unmarshalJSON -> DEBU 0cc Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.372 UTC [viperutil] getKeysRecursively -> DEBU 0cd Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] unmarshalJSON -> DEBU 0ce Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0cf Found real value for general.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] unmarshalJSON -> DEBU 0d0 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0d1 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0d2 Found map[interface{}]interface{} value for fileledger +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] unmarshalJSON -> DEBU 0d3 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0d4 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] unmarshalJSON -> DEBU 0d5 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0d6 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer0.example.com | 2020-05-20 18:19:45.373 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0d7 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress:0.0.0.0 ListenPort:7055 RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate:/var/hyperledger/orderer/tls/server.crt ServerPrivateKey:/var/hyperledger/orderer/tls/server.key TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +orderer0.example.com | 2020-05-20 18:19:45.388 UTC [localconfig] completeInitialization -> INFO 0d8 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2020-05-20 18:19:45.416 UTC [bccsp_sw] openKeyStore -> DEBU 0d9 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]" +orderer0.example.com | "2020-05-20 18:19:45.416 UTC [bccsp] initBCCSP -> DEBU 0da Initialize BCCSP [SW]" +orderer0.example.com | "2020-05-20 18:19:45.416 UTC [msp] getPemMaterialFromDir -> DEBU 0db Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2020-05-20 18:19:45.425 UTC [msp] getPemMaterialFromDir -> DEBU 0dc Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2020-05-20 18:19:45.432 UTC [msp] getPemMaterialFromDir -> DEBU 0dd Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2020-05-20 18:19:45.509 UTC [msp] getPemMaterialFromDir -> DEBU 0de Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +orderer0.example.com | "2020-05-20 18:19:45.519 UTC [msp] getPemMaterialFromDir -> DEBU 0df Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2020-05-20 18:19:45.538 UTC [msp] getPemMaterialFromDir -> DEBU 0e0 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2020-05-20 18:19:45.540 UTC [msp] getMspConfig -> DEBU 0e1 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2020-05-20 18:19:45.540 UTC [msp] getPemMaterialFromDir -> DEBU 0e2 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2020-05-20 18:19:45.558 UTC [msp] getPemMaterialFromDir -> DEBU 0e3 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2020-05-20 18:19:45.567 UTC [msp] getPemMaterialFromDir -> DEBU 0e4 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2020-05-20 18:19:45.569 UTC [msp] getMspConfig -> DEBU 0e5 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2020-05-20 18:19:45.569 UTC [msp] getPemMaterialFromDir -> DEBU 0e6 Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2020-05-20 18:19:45.570 UTC [msp] getMspConfig -> DEBU 0e7 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2020-05-20 18:19:45.582 UTC [msp] getMspConfig -> DEBU 0e8 Loading NodeOUs" +orderer0.example.com | "2020-05-20 18:19:45.621 UTC [msp] newBccspMsp -> DEBU 0e9 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.621 UTC [msp] New -> DEBU 0ea Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.622 UTC [msp] loadLocaMSP -> DEBU 0eb Created new local MSP" +orderer0.example.com | "2020-05-20 18:19:45.622 UTC [msp] Setup -> DEBU 0ec Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:45.622 UTC [msp.identity] newIdentity -> DEBU 0ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.622 UTC [msp.identity] newIdentity -> DEBU 0ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.658 UTC [bccsp_sw] loadPrivateKey -> DEBU 0ef Loading private key [b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd] at [/var/hyperledger/orderer/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk]..." +orderer0.example.com | "2020-05-20 18:19:45.664 UTC [msp.identity] newIdentity -> DEBU 0f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.665 UTC [msp] setupSigningIdentity -> DEBU 0f1 Signing identity expires at 2030-02-18 18:24:00 +0000 UTC" +orderer0.example.com | "2020-05-20 18:19:45.673 UTC [orderer.common.server] prettyPrintStruct -> INFO 0f2 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "0.0.0.0" +orderer0.example.com | General.Cluster.ListenPort = 7055 +orderer0.example.com | General.Cluster.ServerCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ServerPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.ConnectionTimeout = 0s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | General.Authentication.NoExpirationChecks = false +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = false +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f5 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f6 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f7 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f8 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] NewStandardValues -> DEBU 0f9 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fa Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] NewStandardValues -> DEBU 0fb Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fc Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.684 UTC [common.channelconfig] validateMSP -> DEBU 0fd Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [msp] newBccspMsp -> DEBU 0fe Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [msp] New -> DEBU 0ff Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [msp] Setup -> DEBU 100 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [msp.identity] newIdentity -> DEBU 101 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [common.channelconfig] NewStandardValues -> DEBU 102 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [common.channelconfig] validateMSP -> DEBU 104 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [msp] newBccspMsp -> DEBU 105 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [msp] New -> DEBU 106 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.685 UTC [msp] Setup -> DEBU 107 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.686 UTC [msp.identity] newIdentity -> DEBU 108 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.686 UTC [common.channelconfig] NewStandardValues -> DEBU 109 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10a Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10b Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10d Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10e Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10f Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.687 UTC [common.channelconfig] NewStandardValues -> DEBU 110 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:19:45.687 UTC [common.channelconfig] initializeProtosStruct -> DEBU 111 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:19:45.687 UTC [common.channelconfig] NewStandardValues -> DEBU 112 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.687 UTC [common.channelconfig] initializeProtosStruct -> DEBU 113 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.688 UTC [common.channelconfig] validateMSP -> DEBU 114 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.688 UTC [msp] newBccspMsp -> DEBU 115 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.688 UTC [msp] New -> DEBU 116 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.688 UTC [msp] Setup -> DEBU 117 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:45.690 UTC [msp.identity] newIdentity -> DEBU 118 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.703 UTC [msp] Setup -> DEBU 119 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:19:45.705 UTC [msp] Setup -> DEBU 11a MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:19:45.705 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.705 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.706 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.706 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.706 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.706 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.709 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.713 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.713 UTC [policies] NewManagerImpl -> DEBU 12a Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.714 UTC [policies] GetPolicy -> DEBU 12b Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-05-20 18:19:45.714 UTC [policies] NewManagerImpl -> DEBU 12c Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:19:45.714 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:19:45.714 UTC [policies] GetPolicy -> DEBU 12e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-05-20 18:19:45.714 UTC [policies] NewManagerImpl -> DEBU 12f Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:19:45.714 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 156 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:45.724 UTC [orderer.common.server] createLedgerFactory -> DEBU 157 Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2020-05-20 18:19:45.724 UTC [kvledger.util] CreateDirIfMissing -> DEBU 158 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2020-05-20 18:19:45.724 UTC [kvledger.util] logDirStatus -> DEBU 159 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2020-05-20 18:19:45.724 UTC [kvledger.util] logDirStatus -> DEBU 15a After creating dir - [/var/hyperledger/production/orderer/index/] exists" +orderer0.example.com | "2020-05-20 18:19:45.759 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15b Bootstrapping because no existing channels" +orderer0.example.com | "2020-05-20 18:19:45.759 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15c Selected bootstrap block, because system channel last config block is nil" +orderer0.example.com | "2020-05-20 18:19:45.793 UTC [orderer.common.server] initializeServerConfig -> INFO 15d Starting orderer with TLS enabled" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] NewStandardValues -> DEBU 15e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] NewStandardValues -> DEBU 164 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] NewStandardValues -> DEBU 166 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [common.channelconfig] validateMSP -> DEBU 168 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [msp] newBccspMsp -> DEBU 169 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [msp] New -> DEBU 16a Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [msp] Setup -> DEBU 16b Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.794 UTC [msp.identity] newIdentity -> DEBU 16c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.795 UTC [common.channelconfig] NewStandardValues -> DEBU 16d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.795 UTC [common.channelconfig] validateMSP -> DEBU 16f Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.795 UTC [msp] newBccspMsp -> DEBU 170 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.795 UTC [msp] New -> DEBU 171 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.795 UTC [msp] Setup -> DEBU 172 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.795 UTC [msp.identity] newIdentity -> DEBU 173 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.796 UTC [common.channelconfig] NewStandardValues -> DEBU 174 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175 Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176 Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177 Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 178 Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 179 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.797 UTC [common.channelconfig] NewStandardValues -> DEBU 17b Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:19:45.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17c Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:19:45.797 UTC [common.channelconfig] NewStandardValues -> DEBU 17d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17e Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.797 UTC [common.channelconfig] validateMSP -> DEBU 17f Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.797 UTC [msp] newBccspMsp -> DEBU 180 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.797 UTC [msp] New -> DEBU 181 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.797 UTC [msp] Setup -> DEBU 182 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:45.804 UTC [msp.identity] newIdentity -> DEBU 183 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.806 UTC [msp] Setup -> DEBU 184 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:19:45.806 UTC [msp] Setup -> DEBU 185 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:19:45.807 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 18b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.809 UTC [policies] NewManagerImpl -> DEBU 18e Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-05-20 18:19:45.809 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.810 UTC [policies] NewManagerImpl -> DEBU 190 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.810 UTC [policies] NewManagerImpl -> DEBU 191 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.810 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [policies] GetPolicy -> DEBU 196 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [policies] GetPolicy -> DEBU 199 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:45.812 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:45.812 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:45.812 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] NewStandardValues -> DEBU 1c2 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c3 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c4 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:45.816 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.817 UTC [common.channelconfig] validateMSP -> DEBU 1cc Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.817 UTC [msp] newBccspMsp -> DEBU 1cd Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.817 UTC [msp] New -> DEBU 1ce Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.818 UTC [msp] Setup -> DEBU 1cf Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.818 UTC [msp.identity] newIdentity -> DEBU 1d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.823 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.824 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.824 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.824 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.824 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.825 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.825 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.833 UTC [common.channelconfig] NewStandardValues -> DEBU 1d8 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9 Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dc Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1de Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] NewStandardValues -> DEBU 1e1 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:45.836 UTC [common.channelconfig] validateMSP -> DEBU 1e3 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.836 UTC [msp] newBccspMsp -> DEBU 1e4 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.836 UTC [msp] New -> DEBU 1e5 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:45.838 UTC [msp] Setup -> DEBU 1e6 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:45.840 UTC [msp.identity] newIdentity -> DEBU 1e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:45.843 UTC [msp] Setup -> DEBU 1e8 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:19:45.844 UTC [msp] Setup -> DEBU 1e9 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:19:45.844 UTC [policies] NewManagerImpl -> DEBU 1ea Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.845 UTC [policies] NewManagerImpl -> DEBU 1eb Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.849 UTC [policies] NewManagerImpl -> DEBU 1ec Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1ed Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1ee Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1ef Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1f0 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1f1 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1f2 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-05-20 18:19:45.851 UTC [policies] NewManagerImpl -> DEBU 1f3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f4 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f5 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Writers for Channel/Orderer" +peer1.org1.example.com | [001 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer1.org1.example.com | [002 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org1.example.com | [003 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer1.org1.example.com | [004 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer1.org1.example.com | [005 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org1.example.com | [006 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer1.org1.example.com | [007 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer1.org1.example.com | [008 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer1.org1.example.com | [009 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer1.org1.example.com | [00a 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer1.org1.example.com | [00b 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer1.org1.example.com | [00c 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer1.org1.example.com | [00d 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [00e 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer1.org1.example.com | [00f 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [010 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer1.org1.example.com | [011 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [012 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer1.org1.example.com | [013 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [014 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer1.org1.example.com | [015 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [016 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer1.org1.example.com | [017 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer1.org1.example.com | [018 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [019 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer1.org1.example.com | [01a 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org1.example.com | [01b 05-20 18:19:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer1.org1.example.com | [01c 05-20 18:19:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer1.org1.example.com | [01d 05-20 18:19:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer1.org1.example.com | [01e 05-20 18:19:47.75 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer1.org1.example.com-cert.pem +peer1.org1.example.com | [01f 05-20 18:19:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer1.org1.example.com | [020 05-20 18:19:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +peer1.org1.example.com | [021 05-20 18:19:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer1.org1.example.com | [022 05-20 18:19:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer1.org1.example.com | [023 05-20 18:19:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer1.org1.example.com | [024 05-20 18:19:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer1.org1.example.com | [025 05-20 18:19:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +peer1.org1.example.com | [026 05-20 18:19:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer1.org1.example.com | [027 05-20 18:19:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer1.org1.example.com | [028 05-20 18:19:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer1.org1.example.com | [029 05-20 18:19:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer1.org1.example.com | [02a 05-20 18:19:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer1.org1.example.com | [02b 05-20 18:19:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [02c 05-20 18:19:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [02d 05-20 18:19:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer1.org1.example.com | [02e 05-20 18:19:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [02f 05-20 18:19:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [030 05-20 18:19:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [031 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5] at [/etc/hyperledger/fabric/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk]... +peer1.org1.example.com | [032 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [033 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer1.org1.example.com | [034 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org1.example.com | Version: 1.4.7 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.13.11 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Image Version: 0.4.20 +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger +peer1.org1.example.com | [035 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [036 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org1.example.com | [037 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org1.example.com | [038 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org1.example.com | [039 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org1.example.com | [03a 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer1.org1.example.com | [03b 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer1.org1.example.com | [03c 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer1.org1.example.com | [03d 05-20 18:19:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer1.org1.example.com | [03e 05-20 18:19:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer1.org1.example.com | [03f 05-20 18:19:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer1.org1.example.com | [040 05-20 18:19:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer1.org1.example.com | [041 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer1.org1.example.com | [042 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer1.org1.example.com | [043 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org1.example.com | [044 05-20 18:19:48.01 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org1.example.com | [045 05-20 18:19:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer1.org1.example.com | [046 05-20 18:19:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org1.example.com | [047 05-20 18:19:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer1.org1.example.com | [048 05-20 18:19:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer1.org1.example.com | [049 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer1.org1.example.com | [04a 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer1.org1.example.com | [04b 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer1.org1.example.com | [04c 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer1.org1.example.com | [04d 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org1.example.com | [04e 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] GetPolicy -> DEBU 1fa Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [policies] GetPolicy -> DEBU 1fd Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 1ff Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 200 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 201 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 202 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 203 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 204 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 205 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 206 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 207 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 208 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 209 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:45.856 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:45.856 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:19:45.856 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:45.856 UTC [orderer.common.server] Start -> INFO 226 Setting up cluster for orderer type etcdraft" +orderer0.example.com | "2020-05-20 18:19:45.887 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 227 Booted with a genesis block, replication isn't an option" +orderer0.example.com | "2020-05-20 18:19:45.995 UTC [msp] GetDefaultSigningIdentity -> DEBU 228 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:19:46.010 UTC [fsblkstorage] newBlockfileMgr -> DEBU 229 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +orderer0.example.com | "2020-05-20 18:19:46.010 UTC [kvledger.util] CreateDirIfMissing -> DEBU 22a CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +orderer0.example.com | "2020-05-20 18:19:46.010 UTC [kvledger.util] logDirStatus -> DEBU 22b Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +peer1.org1.example.com | [04f 05-20 18:19:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer1.org1.example.com | [050 05-20 18:19:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer1.org1.example.com | [051 05-20 18:19:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org1.example.com | [052 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer1.org1.example.com | [053 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer1.org1.example.com | [054 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer1.org1.example.com | [055 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org1.example.com | [056 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer1.org1.example.com | [057 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer1.org1.example.com | [058 05-20 18:19:48.14 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org1.example.com | [059 05-20 18:19:48.14 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.8:7051 +peer1.org1.example.com | [05a 05-20 18:19:48.14 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [05b 05-20 18:19:48.14 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.8:7051 +peer1.org1.example.com | [05c 05-20 18:19:48.14 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [05d 05-20 18:19:48.16 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org1.example.com | [05e 05-20 18:19:48.18 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com +peer1.org1.example.com | [05f 05-20 18:19:48.18 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org1.example.com:7052 +peer1.org1.example.com | [060 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.7 +peer1.org1.example.com | [061 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org1.example.com | [062 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.7 +peer1.org1.example.com | [063 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org1.example.com | [064 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.7 +peer1.org1.example.com | [065 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org1.example.com | [066 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer1.org1.example.com | [067 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer1.org1.example.com | [068 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [069 05-20 18:19:48.22 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer1.org1.example.com | [06a 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [06b 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [06c 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer1.org1.example.com | [06d 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer1.org1.example.com | [06e 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org1.example.com | [06f 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer1.org1.example.com | [070 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [071 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer1.org1.example.com | [072 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [073 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer1.org1.example.com | [074 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer1.org1.example.com | [075 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer1.org1.example.com | [076 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [077 05-20 18:19:48.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer1.org1.example.com | [078 05-20 18:19:48.24 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [079 05-20 18:19:48.24 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer1.org1.example.com | [07a 05-20 18:19:48.24 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer1.org1.example.com | [07b 05-20 18:19:48.27 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051] +peer1.org1.example.com | [07c 05-20 18:19:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [07d 05-20 18:19:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [07e 05-20 18:19:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [07f 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [080 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: +peer1.org1.example.com | [081 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [082 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [083 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [084 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A201FF20917D2308491...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [085 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 494B7A1CF7727D9869353DB5DFD3651B92B933B238D66E7CDE50993B20AC8ACA +peer1.org1.example.com | [086 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=�, total items: 1 +peer1.org1.example.com | [087 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org1.example.com:7051 started +peer1.org1.example.com | [088 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer1.org1.example.com | [089 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [08a 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [08b 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [08c 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.7 +peer1.org1.example.com | [08e 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [08f 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.011 UTC [kvledger.util] logDirStatus -> DEBU 22c After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2020-05-20 18:19:46.011 UTC [fsblkstorage] newBlockfileMgr -> INFO 22d Getting block information from block storage" +orderer0.example.com | "2020-05-20 18:19:46.011 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 22e Retrieving checkpoint info from block files" +orderer0.example.com | "2020-05-20 18:19:46.011 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 22f retrieveLastFileSuffix()" +orderer0.example.com | "2020-05-20 18:19:46.011 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 230 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2020-05-20 18:19:46.011 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 231 Last file number found = -1" +orderer0.example.com | "2020-05-20 18:19:46.011 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 232 No block file found" +orderer0.example.com | "2020-05-20 18:19:46.011 UTC [fsblkstorage] newBlockfileMgr -> DEBU 233 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003121c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2020-05-20 18:19:46.013 UTC [fsblkstorage] newBlockIndex -> DEBU 234 newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2020-05-20 18:19:46.015 UTC [fsblkstorage] indexBlock -> DEBU 235 Indexing block [blockNum=0, blockHash=[]byte{0x48, 0x55, 0xad, 0xef, 0x6c, 0xdb, 0x22, 0x69, 0x71, 0xcd, 0x6f, 0x1c, 0x81, 0xaf, 0xc3, 0xaa, 0x9e, 0x4d, 0x72, 0x22, 0x6e, 0xe, 0x6f, 0xf, 0xa7, 0xc9, 0xc6, 0x64, 0xf1, 0x4, 0x22, 0x36} txOffsets= +orderer0.example.com | txId=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 locPointer=offset=39, bytesLength=22885 +orderer0.example.com | ]" +orderer0.example.com | "2020-05-20 18:19:46.017 UTC [fsblkstorage] updateCheckpoint -> DEBU 236 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[22930], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] NewStandardValues -> DEBU 237 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 238 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 239 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23a Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] NewStandardValues -> DEBU 23d Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] NewStandardValues -> DEBU 23f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [common.channelconfig] validateMSP -> DEBU 241 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [msp] newBccspMsp -> DEBU 242 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [msp] New -> DEBU 243 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:46.018 UTC [msp] Setup -> DEBU 244 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:19:46.019 UTC [msp.identity] newIdentity -> DEBU 245 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:46.024 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:46.024 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:46.025 UTC [common.channelconfig] validateMSP -> DEBU 248 Setting up MSP for org Org2MSP" +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [090 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [091 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [092 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +peer1.org1.example.com | [093 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +peer1.org1.example.com | [094 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.7 +peer1.org1.example.com | [095 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +peer1.org1.example.com | [096 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +peer1.org1.example.com | [097 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +peer1.org1.example.com | [098 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +peer1.org1.example.com | [08d 05-20 18:19:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 64A6D0AAE2EBACA68E8D11EEE7428C8C0C21D5ED249C7C4E2E7F433D3DADA3C9 +peer1.org1.example.com | [099 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [09a 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [09b 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [09c 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.7 +peer1.org1.example.com | [09d 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.7 +peer1.org1.example.com | [09e 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [09f 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0a0 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.7 +peer1.org1.example.com | [0a1 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.7" , sending back REGISTERED +peer1.org1.example.com | [0a2 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.7" +peer1.org1.example.com | [0a3 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.7" +peer1.org1.example.com | [0a4 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.7" +peer1.org1.example.com | [0a5 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0a6 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0a7 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU [a22f5d9d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0a9 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU [a22f5d9d] notifying Txid:a22f5d9d-0681-437c-8fa8-f5fa7443637c, channelID: +peer1.org1.example.com | [0a8 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [0aa 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [0ab 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [0ac 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [0ad 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025fe540, CONNECTING +peer1.org1.example.com | [0ae 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0af 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org1.example.com | [0b0 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [0b1 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.7 +peer1.org1.example.com | [0b2 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [0b3 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.7 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [0b4 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +peer1.org1.example.com | [0b5 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +peer1.org1.example.com | [0b6 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.7 +peer1.org1.example.com | [0b7 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +peer1.org1.example.com | [0b8 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +peer1.org1.example.com | [0b9 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +peer1.org1.example.com | [0ba 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +peer1.org1.example.com | [0bb 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.7 +peer1.org1.example.com | [0bc 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.7 +peer1.org1.example.com | [0bd 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0be 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0bf 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.7 +peer1.org1.example.com | [0c0 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.7" , sending back REGISTERED +peer1.org1.example.com | [0c1 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.7" +peer1.org1.example.com | [0c2 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.7" +peer1.org1.example.com | [0c3 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.7" +peer1.org1.example.com | [0c4 05-20 18:19:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0c5 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0c6 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org1.example.com | [0c7 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU [068ae04e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0c8 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU [068ae04e] notifying Txid:068ae04e-1a79-4be1-adc6-587a2a8a9a12, channelID: +peer1.org1.example.com | [0c9 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0ca 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org1.example.com | [0cb 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [0cc 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.7 +peer1.org1.example.com | [0cd 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [0ce 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.7 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [0cf 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +peer1.org1.example.com | [0d0 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +peer1.org1.example.com | [0d1 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.7 +peer1.org1.example.com | [0d2 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +peer1.org1.example.com | [0d3 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +peer1.org1.example.com | [0d4 05-20 18:19:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +peer1.org1.example.com | [0d5 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +peer1.org1.example.com | [0d6 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.7 +peer1.org1.example.com | [0d7 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.7 +peer1.org1.example.com | [0d8 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0d9 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0da 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.7 +peer1.org1.example.com | [0db 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.7" , sending back REGISTERED +peer1.org1.example.com | [0dc 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.7" +peer1.org1.example.com | [0dd 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.7" +peer1.org1.example.com | [0de 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.7" +peer1.org1.example.com | [0df 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0e0 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0e1 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [0e2 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU [0acea3d1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0e3 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU [0acea3d1] notifying Txid:0acea3d1-823d-4de2-9834-1ec465e4242d, channelID: +peer1.org1.example.com | [0e4 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0e5 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [0e6 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org1.example.com | [0e7 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org1.example.com | [0e9 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org1.example.com | [0e8 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU grpc: addrConn.createTransport failed to connect to {peer0.org1.example.com:7051 0 }. Err :connection error: desc = "transport: Error while dialing dial tcp 172.18.0.7:7051: connect: connection refused". Reconnecting... +peer1.org1.example.com | [0ea 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025fe540, TRANSIENT_FAILURE +peer1.org1.example.com | [0eb 05-20 18:19:48.34 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org1.example.com | [0ec 05-20 18:19:48.34 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org1.example.com | [0ed 05-20 18:19:48.34 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +orderer0.example.com | "2020-05-20 18:19:46.025 UTC [msp] newBccspMsp -> DEBU 249 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:46.025 UTC [msp] New -> DEBU 24a Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:46.025 UTC [msp] Setup -> DEBU 24b Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:19:46.025 UTC [msp.identity] newIdentity -> DEBU 24c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:46.047 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:19:46.047 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:19:46.047 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24f Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:19:46.047 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:46.047 UTC [common.channelconfig] initializeProtosStruct -> DEBU 251 Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:19:46.048 UTC [common.channelconfig] initializeProtosStruct -> DEBU 252 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:46.048 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:46.048 UTC [common.channelconfig] NewStandardValues -> DEBU 254 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:19:46.048 UTC [common.channelconfig] initializeProtosStruct -> DEBU 255 Processing field: Endpoints" +peer1.org1.example.com | [0ee 05-20 18:19:48.35 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [0ef 05-20 18:19:48.35 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org1.example.com | [0f0 05-20 18:19:48.35 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org1.example.com | [0f1 05-20 18:19:48.35 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org1.example.com | [0f2 05-20 18:19:48.35 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org1.example.com | [0f3 05-20 18:19:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025fe540, CONNECTING +peer1.org1.example.com | [0f4 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025fe540, READY +peer1.org1.example.com | [0f5 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [0f6 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [0f7 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [0f8 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [0f9 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [0fa 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [0fb 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [0fc 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [0fd 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [0fe 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [0ff 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 fb e5 db 1e d5 67 94 1d 43 d7 |0E.!.......g..C.| +peer1.org1.example.com | 00000010 9b ef 62 fb 52 4c 45 6e 47 57 a0 f7 09 c8 d3 35 |..b.RLEnGW.....5| +peer1.org1.example.com | 00000020 63 87 85 42 65 02 20 1f 51 ac 1c 52 c5 11 47 1e |c..Be. .Q..R..G.| +peer1.org1.example.com | 00000030 fb 60 4a bd 09 5d 03 35 aa 39 39 28 59 e7 e2 38 |.`J..].5.99(Y..8| +peer1.org1.example.com | 00000040 87 aa db 5b 6a 38 a2 |...[j8.| +peer1.org1.example.com | [100 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [101 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [102 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [103 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0E3A7FCC3086010F775225F8E7C059CA0F37132518EC092D76B4643B27031DFE +peer1.org1.example.com | [104 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [105 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [106 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [107 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [108 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12637676837674361505 tag:EMPTY mem_req:R@\300\000\261\223o\"\230~\316M\031\004p\373\020\017\361\367\377\312" secret_envelope: > > , Envelope: 1109 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [109 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:12637676837674361505 tag:EMPTY mem_req:R@\300\000\261\223o\"\230~\316M\031\004p\373\020\017\361\367\377\312" secret_envelope: > > , Envelope: 1109 bytes, Signature: 0 bytes +peer1.org1.example.com | [10a 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [10b 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [10c 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [10d 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [10e 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [10f 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002751510, CONNECTING +peer1.org1.example.com | [110 05-20 18:19:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002751510, READY +orderer0.example.com | "2020-05-20 18:19:46.048 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:46.048 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:46.049 UTC [common.channelconfig] validateMSP -> DEBU 258 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:46.049 UTC [msp] newBccspMsp -> DEBU 259 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:46.049 UTC [msp] New -> DEBU 25a Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:46.049 UTC [msp] Setup -> DEBU 25b Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:46.056 UTC [msp.identity] newIdentity -> DEBU 25c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:46.063 UTC [msp] Setup -> DEBU 25d Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:19:46.063 UTC [msp] Setup -> DEBU 25e MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 25f Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 260 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 261 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 262 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 263 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 264 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 265 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 266 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 267 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:46.065 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:19:46.065 UTC [policies] GetPolicy -> DEBU 270 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-05-20 18:19:46.065 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:19:46.065 UTC [policies] GetPolicy -> DEBU 272 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-05-20 18:19:46.065 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:19:46.065 UTC [common.configtx] addToMap -> DEBU 274 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:46.065 UTC [common.configtx] addToMap -> DEBU 275 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-05-20 18:19:46.069 UTC [common.configtx] addToMap -> DEBU 276 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +peer1.org2.example.com | [001 05-20 18:19:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer1.org2.example.com | [002 05-20 18:19:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer1.org2.example.com | [003 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer1.org2.example.com | [004 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer1.org2.example.com | [005 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer1.org2.example.com | [006 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer1.org2.example.com | [007 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer1.org2.example.com | [008 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org2.example.com | [009 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer1.org2.example.com | [00a 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer1.org2.example.com | [00b 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [00c 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer1.org2.example.com | [00d 05-20 18:19:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [00e 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer1.org2.example.com | [00f 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [010 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer1.org2.example.com | [011 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [012 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer1.org2.example.com | [013 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [014 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer1.org2.example.com | [015 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer1.org2.example.com | [016 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [017 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer1.org2.example.com | [018 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org2.example.com | [019 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer1.org2.example.com | [01a 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org2.example.com | [01b 05-20 18:19:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer1.org2.example.com | [01c 05-20 18:19:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer1.org2.example.com | [01d 05-20 18:19:47.93 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer1.org2.example.com | [01e 05-20 18:19:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer1.org2.example.com-cert.pem +peer1.org2.example.com | [01f 05-20 18:19:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer1.org2.example.com | [020 05-20 18:19:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org2.example.com-cert.pem +peer1.org2.example.com | [021 05-20 18:19:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer1.org2.example.com | [022 05-20 18:19:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer1.org2.example.com | [023 05-20 18:19:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer1.org2.example.com | [024 05-20 18:19:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer1.org2.example.com | [025 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org2.example.com-cert.pem +peer1.org2.example.com | [026 05-20 18:19:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer1.org2.example.com | [027 05-20 18:19:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer1.org2.example.com | [028 05-20 18:19:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer1.org2.example.com | [029 05-20 18:19:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer1.org2.example.com | [02a 05-20 18:19:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer1.org2.example.com | [02b 05-20 18:19:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [02c 05-20 18:19:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [02d 05-20 18:19:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer1.org2.example.com | [02e 05-20 18:19:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [02f 05-20 18:19:48.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [111 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [112 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [113 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [114 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [115 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [116 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [117 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 b5 01 79 d5 6f 3d 0d 63 7f 8c |0E.!....y.o=.c..| +peer1.org1.example.com | 00000010 5d c2 4e 30 1d d8 02 1d 4f 0d ec 60 9a 75 24 92 |].N0....O..`.u$.| +peer1.org1.example.com | 00000020 da 2d ff 6c 3e 02 20 51 1c 6a 24 1b 2b 28 ea 94 |.-.l>. Q.j$.+(..| +peer1.org1.example.com | 00000030 94 07 39 6b 7f bb 20 96 17 c4 1d 23 0d a5 87 f0 |..9k.. ....#....| +peer1.org1.example.com | 00000040 aa 85 0e eb 2f fc 01 |..../..| +peer1.org1.example.com | [118 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [119 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11a 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [11b 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11c 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12637676837674361505, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2203 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 12637676837674361505, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2203 bytes, Signature: 0 bytes +peer1.org1.example.com | [11e 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11f 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12637676837674361505, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2203 bytes, Signature: 0 bytes +peer1.org1.example.com | [120 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 3a 7f cc 30 86 01 0f 77 52 25 f8 e7 c0 59 ca |.:..0...wR%...Y.| +peer1.org1.example.com | 00000010 0f 37 13 25 18 ec 09 2d 76 b4 64 3b 27 03 1d fe |.7.%...-v.d;'...| +peer1.org1.example.com | [121 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 14 2d 20 12 7a d4 11 90 01 f0 45 |0D. ..- .z.....E| +peer1.org1.example.com | 00000010 d0 0b 43 ba 1b 27 0f b9 1f d7 b7 80 7d a3 13 5c |..C..'......}..\| +peer1.org1.example.com | 00000020 72 5e bd 2d 02 20 00 a0 90 17 f2 9a cc 68 cb 3e |r^.-. .......h.>| +peer1.org1.example.com | 00000030 52 40 c0 00 b1 93 6f 22 98 7e ce 4d 19 04 70 fb |R@....o".~.M..p.| +peer1.org1.example.com | 00000040 10 0f f1 f7 ff ca |......| +peer1.org1.example.com | [122 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [123 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab b3 ea ef 20 25 5e a6 cb 7d df |0E.!..... %^..}.| +peer1.org1.example.com | 00000010 ee 89 4a 7d 7f 15 7b 72 1c 9a 8f 98 a6 1d 11 e4 |..J}..{r........| +peer1.org1.example.com | 00000020 aa 75 95 84 69 02 20 3d 22 4c 77 9e cd 65 03 10 |.u..i. ="Lw..e..| +peer1.org1.example.com | 00000030 fe d0 33 c5 06 61 bf 9c 30 f2 d2 ac 43 9d 37 14 |..3..a..0...C.7.| +peer1.org1.example.com | 00000040 fb 92 2e 28 d5 31 b7 |...(.1.| +peer1.org1.example.com | [124 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [125 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [126 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [127 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 61 31 98 87 b2 1d a0 24 08 72 da b0 8d b1 69 |.a1.....$.r....i| +peer1.org1.example.com | 00000010 be 5c 73 71 b8 e0 d2 71 15 5b f8 18 a0 6d 2e eb |.\sq...q.[...m..| +peer1.org1.example.com | [128 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 bd 77 e2 e6 fe cf c5 37 ef 26 |0E.!...w.....7.&| +peer1.org1.example.com | 00000010 67 dd a9 57 f6 05 ab cc e1 0b d6 d8 90 7d 55 12 |g..W.........}U.| +peer1.org1.example.com | 00000020 70 db cc 57 e1 02 20 2b 95 49 54 4a 50 21 3f 94 |p..W.. +.ITJP!?.| +peer1.org1.example.com | 00000030 1b 53 14 32 01 1f 22 4c 4c 8e a5 01 50 9d 59 06 |.S.2.."LL...P.Y.| +peer1.org1.example.com | 00000040 e9 32 a9 d4 69 62 03 |.2..ib.| +peer1.org1.example.com | [129 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [12a 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 d9 f0 ac f6 2d 0d 93 8d a5 11 |0E.!......-.....| +peer1.org1.example.com | 00000010 0e fd 72 50 2a 45 37 da b8 43 c9 3f 93 14 b5 23 |..rP*E7..C.?...#| +peer1.org1.example.com | 00000020 2e 15 9b 01 0d 02 20 3b 7f 99 2e a9 fe c1 eb 8d |...... ;........| +peer1.org1.example.com | 00000030 ae ca 4b 03 f6 0e 21 6b d8 50 d6 a1 6f da 57 58 |..K...!k.P..o.WX| +peer1.org1.example.com | 00000040 2e d6 a9 e4 83 76 4c |.....vL| +peer1.org1.example.com | [12b 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [12c 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer1.org1.example.com | [12d 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [12e 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12f 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [130 05-20 18:19:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [131 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [132 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [133 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer1.org1.example.com | [134 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [135 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [136 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [137 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [138 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [139 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [13a 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [13b 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 69170FF06EDDD4847EC55D112D8D4BB4968ECD9604F884554E6DCF63574338ED +peer1.org1.example.com | [13c 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [13d 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [13e 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +orderer2.example.com | 2020-05-20 18:19:45.448 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer2.example.com | "2020-05-20 18:19:45.707 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer2.example.com | General.LedgerType = "file" +orderer2.example.com | General.ListenAddress = "0.0.0.0" +orderer2.example.com | General.ListenPort = 7050 +orderer2.example.com | General.TLS.Enabled = true +orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.TLS.ClientAuthRequired = false +orderer2.example.com | General.TLS.ClientRootCAs = [] +orderer2.example.com | General.Cluster.ListenAddress = "" +orderer2.example.com | General.Cluster.ListenPort = 0 +orderer2.example.com | General.Cluster.ServerCertificate = "" +orderer2.example.com | General.Cluster.ServerPrivateKey = "" +orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.Cluster.DialTimeout = 5s +orderer2.example.com | General.Cluster.RPCTimeout = 7s +orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer2.example.com | General.Cluster.SendBufferSize = 10 +orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer2.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer2.example.com | General.Keepalive.ServerTimeout = 20s +orderer2.example.com | General.ConnectionTimeout = 0s +orderer2.example.com | General.GenesisMethod = "file" +orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer2.example.com | General.SystemChannel = "test-system-channel-name" +orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer2.example.com | General.Profile.Enabled = false +orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer2.example.com | General.LocalMSPID = "OrdererMSP" +orderer2.example.com | General.BCCSP.ProviderName = "SW" +orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer2.example.com | General.BCCSP.PluginOpts = +orderer2.example.com | General.Authentication.TimeWindow = 15m0s +orderer2.example.com | General.Authentication.NoExpirationChecks = false +orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer2.example.com | RAMLedger.HistorySize = 1000 +orderer2.example.com | Kafka.Retry.ShortInterval = 5s +orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer2.example.com | Kafka.Retry.LongInterval = 5m0s +orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | "2020-05-20 18:19:46.070 UTC [common.configtx] addToMap -> DEBU 277 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:46.070 UTC [common.configtx] addToMap -> DEBU 278 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:46.070 UTC [common.configtx] addToMap -> DEBU 279 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:46.077 UTC [common.configtx] addToMap -> DEBU 27a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:46.077 UTC [common.configtx] addToMap -> DEBU 27b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 27c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | [001 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org1.example.com | [002 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | [003 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer0.org1.example.com | [004 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer0.org1.example.com | [005 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer0.org1.example.com | [006 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer0.org1.example.com | [007 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer0.org1.example.com | [008 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer0.org1.example.com | [009 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer0.org1.example.com | [00a 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | [00b 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer0.org1.example.com | [00c 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer0.org1.example.com | [00d 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [00e 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer0.org1.example.com | [00f 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [010 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer0.org1.example.com | [011 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer0.org1.example.com | [012 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [013 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer0.org1.example.com | [014 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [015 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer0.org1.example.com | [016 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [017 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer0.org1.example.com | [018 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [019 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer0.org1.example.com | [01a 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer0.org1.example.com | [01b 05-20 18:19:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer0.org1.example.com | [01c 05-20 18:19:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer0.org1.example.com | [01d 05-20 18:19:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer0.org1.example.com | [01e 05-20 18:19:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem +peer0.org1.example.com | [01f 05-20 18:19:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer0.org1.example.com | [020 05-20 18:19:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +peer0.org1.example.com | [021 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer0.org1.example.com | [022 05-20 18:19:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer0.org1.example.com | [023 05-20 18:19:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer0.org1.example.com | [024 05-20 18:19:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer0.org1.example.com | [025 05-20 18:19:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +peer0.org1.example.com | [026 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org1.example.com | [027 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org1.example.com | [028 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org1.example.com | [029 05-20 18:19:48.05 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org1.example.com | [02a 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org1.example.com | [02b 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [02c 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [02d 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer1.org1.example.com | [13f 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [140 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [141 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [142 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +peer1.org1.example.com | [143 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +peer1.org1.example.com | [144 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [145 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +peer1.org1.example.com | [146 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 17 0f f0 6e dd d4 84 7e c5 5d 11 2d 8d 4b b4 |i...n...~.].-.K.| +peer1.org1.example.com | 00000010 96 8e cd 96 04 f8 84 55 4e 6d cf 63 57 43 38 ed |.......UNm.cWC8.| +peer1.org1.example.com | [147 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 1b 2e 12 eb 83 f9 10 3d 71 4d ed |0D. ^.......=qM.| +peer1.org1.example.com | 00000010 0d ca 58 33 9a 97 84 66 bb b0 ce ec 3d d1 db 78 |..X3...f....=..x| +peer1.org1.example.com | 00000020 d4 d3 d0 02 02 20 73 f4 40 7c 9b 6a c2 0b 40 18 |..... s.@|.j..@.| +peer1.org1.example.com | 00000030 df ae 7f f5 28 5b 7b b8 85 4c bc a7 58 65 8b 50 |....([{..L..Xe.P| +peer1.org1.example.com | 00000040 eb e3 6f 87 79 34 |..o.y4| +peer1.org1.example.com | [148 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [149 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 a1 17 85 1a 87 cc 0f cc 7f |0E.!............| +peer1.org1.example.com | 00000010 32 a1 b8 08 5b 79 26 af 6e b1 61 dd c0 66 83 c4 |2...[y&.n.a..f..| +peer1.org1.example.com | 00000020 74 dc 1e a1 b2 02 20 59 36 25 ec 57 52 b2 8a ca |t..... Y6%.WR...| +peer1.org1.example.com | 00000030 a1 83 19 e0 99 f0 64 a4 61 88 69 6b 4e dc e4 07 |......d.a.ikN...| +peer1.org1.example.com | 00000040 54 af fe 03 75 91 bd |T...u..| +peer1.org1.example.com | [14a 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [14b 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [14c 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 e4 5f ee 82 e2 34 49 9b e6 21 9c 93 04 7e 96 |9._...4I..!...~.| +peer1.org1.example.com | 00000010 10 ba 21 f1 0e 90 3d 26 36 eb ed ad b5 9b d1 83 |..!...=&6.......| +peer1.org1.example.com | [14e 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b d9 52 02 fb d3 75 2f ae e6 61 d9 |0D. +.R...u/..a.| +orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer2.example.com | Kafka.Verbose = false +orderer2.example.com | Kafka.Version = 0.10.2.0 +orderer2.example.com | Kafka.TLS.Enabled = false +orderer2.example.com | Kafka.TLS.PrivateKey = "" +orderer2.example.com | Kafka.TLS.Certificate = "" +orderer2.example.com | Kafka.TLS.RootCAs = [] +orderer2.example.com | Kafka.TLS.ClientAuthRequired = false +orderer2.example.com | Kafka.TLS.ClientRootCAs = [] +orderer2.example.com | Kafka.SASLPlain.Enabled = false +orderer2.example.com | Kafka.SASLPlain.User = "" +orderer2.example.com | Kafka.SASLPlain.Password = "" +orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer2.example.com | Debug.BroadcastTraceDir = "" +orderer2.example.com | Debug.DeliverTraceDir = "" +orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer2.example.com | Operations.TLS.Enabled = false +orderer2.example.com | Operations.TLS.PrivateKey = "" +orderer2.example.com | Operations.TLS.Certificate = "" +orderer2.example.com | Operations.TLS.RootCAs = [] +orderer2.example.com | Operations.TLS.ClientAuthRequired = false +orderer2.example.com | Operations.TLS.ClientRootCAs = [] +orderer2.example.com | Metrics.Provider = "prometheus" +orderer2.example.com | Metrics.Statsd.Network = "udp" +orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer2.example.com | Metrics.Statsd.WriteInterval = 30s +orderer2.example.com | Metrics.Statsd.Prefix = """ +orderer2.example.com | "2020-05-20 18:19:45.772 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer2.example.com | "2020-05-20 18:19:45.797 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer2.example.com | "2020-05-20 18:19:45.813 UTC [orderer.common.server] Start -> INFO 005 Setting up cluster for orderer type etcdraft" +orderer2.example.com | "2020-05-20 18:19:45.847 UTC [orderer.common.server] reuseListener -> INFO 006 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2020-05-20 18:19:45.869 UTC [fsblkstorage] newBlockfileMgr -> INFO 007 Getting block information from block storage" +orderer2.example.com | "2020-05-20 18:19:45.924 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 008 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2020-05-20 18:19:45.924 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 009 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2020-05-20 18:19:45.948 UTC [orderer.commmon.multichannel] Initialize -> INFO 00a Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +orderer2.example.com | "2020-05-20 18:19:45.948 UTC [orderer.consensus.etcdraft] Start -> INFO 00b Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2020-05-20 18:19:45.949 UTC [orderer.common.cluster] Configure -> INFO 00c Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7055, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [030 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [031 05-20 18:19:48.05 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea] at [/etc/hyperledger/fabric/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk]... +peer1.org2.example.com | [032 05-20 18:19:48.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [033 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer1.org2.example.com | [034 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org2.example.com | Version: 1.4.7 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.13.11 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Image Version: 0.4.20 +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger +peer1.org2.example.com | [035 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [036 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org2.example.com | [037 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org2.example.com | [038 05-20 18:19:48.07 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org2.example.com | [039 05-20 18:19:48.07 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org2.example.com | [03a 05-20 18:19:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer1.org2.example.com | [03b 05-20 18:19:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer1.org2.example.com | [03c 05-20 18:19:48.07 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer0.org1.example.com | [02e 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [02f 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000010 72 39 bd 52 5c 9d 3a 60 9d 56 1d 73 08 a6 90 a2 |r9.R\.:`.V.s....| +peer1.org1.example.com | 00000020 e2 5e da e8 02 20 00 a1 01 44 49 cc 79 0a 16 0c |.^... ...DI.y...| +peer1.org1.example.com | 00000030 33 04 cb 87 c1 92 4a 30 5b de 41 64 b9 3f c6 7a |3.....J0[.Ad.?.z| +peer1.org1.example.com | 00000040 9f fa dd ec 47 51 |....GQ| +peer1.org1.example.com | [14f 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [150 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 9e dc 84 be 2a 97 22 f1 b6 ef 99 |0D. P....*."....| +peer1.org1.example.com | 00000010 e2 65 06 53 8b 6e 41 b2 86 9d 76 0c d2 37 f9 34 |.e.S.nA...v..7.4| +peer1.org1.example.com | 00000020 40 ac 32 3a 02 20 32 ec cb 40 d4 2c 61 64 60 6e |@.2:. 2..@.,ad`n| +peer1.org1.example.com | 00000030 8a 90 ba 54 59 59 27 8a 91 90 93 58 83 95 b0 da |...TYY'....X....| +peer1.org1.example.com | 00000040 47 ac cf cc f3 1b |G.....| +peer1.org1.example.com | [151 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [152 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [153 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [154 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +peer1.org2.example.com | [03d 05-20 18:19:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer1.org2.example.com | [03e 05-20 18:19:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer1.org2.example.com | [03f 05-20 18:19:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer1.org2.example.com | [040 05-20 18:19:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer1.org2.example.com | [041 05-20 18:19:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer1.org2.example.com | [042 05-20 18:19:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer1.org2.example.com | [043 05-20 18:19:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org2.example.com | [044 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org2.example.com | [045 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer1.org2.example.com | [046 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org2.example.com | [047 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer1.org2.example.com | [048 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer1.org2.example.com | [049 05-20 18:19:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer1.org2.example.com | [04a 05-20 18:19:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer1.org2.example.com | [04b 05-20 18:19:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer1.org2.example.com | [04c 05-20 18:19:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer1.org2.example.com | [04d 05-20 18:19:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org2.example.com | [04e 05-20 18:19:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer1.org2.example.com | [04f 05-20 18:19:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer1.org2.example.com | [050 05-20 18:19:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer1.org2.example.com | [051 05-20 18:19:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org2.example.com | [052 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer1.org2.example.com | [053 05-20 18:19:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer1.org2.example.com | [054 05-20 18:19:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer1.org1.example.com | [155 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [156 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [157 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [158 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [159 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [15a 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [15b 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [15c 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [15d 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\350Y\207\202\007r\253\223\270y\254@g\274\013\251\224\354\327X\360\202\252\262\254\027%\317`\332\002 \272\352V\365\324\001\033\227\372r\207\262]\221-\315d\255\267\322\260 > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\350Y\207\202\007r\253\223\270y\254@g\274\013\251\224\354\327X\360\202\252\262\254\027%\317`\332\002 \272\352V\365\324\001\033\227\372r\207\262]\221-\315d\255\267\322\260 > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [160 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [161 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\350Y\207\202\007r\253\223\270y\254@g\274\013\251\224\354\327X\360\202\252\262\254\027%\317`\332\002 \272\352V\365\324\001\033\227\372r\207\262]\221-\315d\255\267\322\260 > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [162 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 19 49 d1 49 58 f4 8d 0b ae 46 5f 9f b2 26 97 |..I.IX....F_..&.| +peer1.org1.example.com | 00000010 20 4d 4f 21 36 5f 9e 92 1b 9f 54 d0 75 be 10 a6 | MO!6_....T.u...| +peer1.org1.example.com | [163 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 3e e8 59 87 82 07 72 ab 93 b8 79 |0D. d>.Y...r...y| +peer1.org1.example.com | 00000010 ac 40 67 bc 0b a9 94 ec d7 58 f0 82 aa b2 ac 17 |.@g......X......| +peer1.org1.example.com | 00000020 25 cf 60 da 02 20 20 ba ea 56 f5 d4 01 1b 97 fa |%.`.. ..V......| +peer1.org1.example.com | 00000030 72 87 b2 5d 91 2d cd 64 ad b7 d2 b0 3c 6d bd 29 |r..].-.d.... DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [165 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 9c 88 91 12 09 51 ae 00 d9 8b |0E.!.......Q....| +peer1.org1.example.com | 00000010 23 12 35 86 0a fd 87 49 fe b1 84 b8 e7 2b 4f 34 |#.5....I.....+O4| +peer1.org1.example.com | 00000020 59 85 30 56 ed 02 20 39 2a e0 f9 2f 2e f0 fb 31 |Y.0V.. 9*../...1| +peer1.org1.example.com | 00000030 9c 52 6e aa a7 fd 71 19 58 dc 0f a5 a1 ca b5 8d |.Rn...q.X.......| +peer1.org1.example.com | 00000040 0c d0 c2 84 cb 1d 02 |.......| +peer1.org1.example.com | [166 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [167 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [168 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [169 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [16a 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [16b 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16c 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16d 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16e 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [16f 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [170 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [171 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B72BEDFD1C18AEA3352A4D08235315E55B7315BD6B1C6A5175D6A96D3DA81F18 +peer1.org1.example.com | [172 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [173 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [174 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [175 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [176 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\350Y\207\202\007r\253\223\270y\254@g\274\013\251\224\354\327X\360\202\252\262\254\027%\317`\332\002 \272\352V\365\324\001\033\227\372r\207\262]\221-\315d\255\267\322\260 > alive:\013\377\310\2647\260\340\277[\267-\274\310X7\002 \005*\366K\272*j\230V\360\320\223_\335\276\215t!\2766\233\177\306R\037\337&=\370\007\316\215" > > +peer1.org1.example.com | [177 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [178 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [179 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [17a 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [17b 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D48B20BA92A08950EB9D4C61DE94CCDBF4F7344D4B05CE0E3121150CADA08760 +peer1.org1.example.com | [17c 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2020-05-20 18:19:45.950 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel testchainid" +orderer2.example.com | "2020-05-20 18:19:45.950 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer2.example.com | "2020-05-20 18:19:45.952 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer2.example.com | "2020-05-20 18:19:45.952 UTC [orderer.common.cluster] updateStubInMapping -> INFO 010 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2020-05-20 18:19:45.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2020-05-20 18:19:45.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 012 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2020-05-20 18:19:45.955 UTC [orderer.common.cluster] Configure -> INFO 013 Exiting" +orderer2.example.com | "2020-05-20 18:19:45.955 UTC [orderer.consensus.etcdraft] start -> INFO 014 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer2.example.com | "2020-05-20 18:19:45.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 015 3 became follower at term 0" channel=testchainid node=3 +orderer2.example.com | "2020-05-20 18:19:45.955 UTC [orderer.consensus.etcdraft] newRaft -> INFO 016 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer2.example.com | "2020-05-20 18:19:45.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 017 3 became follower at term 1" channel=testchainid node=3 +peer1.org2.example.com | [055 05-20 18:19:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer0.org2.example.com | [001 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org1.example.com | [17d 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +orderer2.example.com | "2020-05-20 18:19:45.957 UTC [orderer.common.server] Start -> INFO 018 Starting orderer: +peer1.org2.example.com | [056 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org2.example.com | [002 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [17e 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +orderer2.example.com | Version: 1.4.7 +peer1.org2.example.com | [057 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org2.example.com | [003 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | [17f 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer2.example.com | Commit SHA: development build +peer1.org2.example.com | [058 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org2.example.com | [004 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org1.example.com | [180 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +orderer2.example.com | Go version: go1.13.11 +peer1.org2.example.com | [059 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +peer0.org2.example.com | [005 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer2.example.com | OS/Arch: linux/amd64" +peer1.org1.example.com | [181 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [05a 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer0.org2.example.com | [006 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer2.example.com | "2020-05-20 18:19:45.957 UTC [orderer.common.server] Start -> INFO 019 Beginning to serve requests" +peer1.org1.example.com | [182 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [05b 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +peer0.org2.example.com | [007 05-20 18:19:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer2.example.com | "2020-05-20 18:19:45.959 UTC [orderer.consensus.etcdraft] run -> INFO 01a This node is picked to start campaign" channel=testchainid node=3 +peer1.org1.example.com | [183 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to peer0.org1.example.com:7051 +peer1.org2.example.com | [05c 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer0.org2.example.com | [008 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | "2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer2.example.com | "2020-05-20 18:19:45.967 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +peer1.org1.example.com | [184 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 49 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [05d 05-20 18:19:48.74 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org2.example.com | [009 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer2.example.com | "2020-05-20 18:19:45.967 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +peer1.org1.example.com | [185 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [05e 05-20 18:19:48.76 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com +peer0.org2.example.com | [00a 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer2.example.com | "2020-05-20 18:19:45.967 UTC [orderer.consensus.etcdraft] apply -> INFO 01d Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +peer1.org1.example.com | [186 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [05f 05-20 18:19:48.76 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org2.example.com:7052 +peer0.org2.example.com | [00b 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer2.example.com | "2020-05-20 18:19:46.968 UTC [orderer.consensus.etcdraft] Step -> INFO 01e 3 is starting a new election at term 1" channel=testchainid node=3 +peer1.org1.example.com | [187 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 69903409854605677, Envelope: 959 bytes, Signature: 0 bytes +peer1.org2.example.com | [060 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.7 +peer0.org2.example.com | [00c 05-20 18:19:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer2.example.com | "2020-05-20 18:19:46.968 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01f 3 became pre-candidate at term 1" channel=testchainid node=3 +peer1.org1.example.com | [188 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 69903409854605677, Envelope: 959 bytes, Signature: 0 bytes +peer1.org2.example.com | [061 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org2.example.com | [00d 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer2.example.com | "2020-05-20 18:19:46.968 UTC [orderer.consensus.etcdraft] poll -> INFO 020 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +peer1.org1.example.com | [189 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +peer1.org2.example.com | [062 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.7 +peer0.org2.example.com | [00e 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer2.example.com | "2020-05-20 18:19:46.968 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +peer1.org1.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +peer1.org2.example.com | [063 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org2.example.com | [00f 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [030 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Capabilities" +orderer2.example.com | "2020-05-20 18:19:46.968 UTC [orderer.consensus.etcdraft] campaign -> INFO 022 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org1.example.com | [18a 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 86 fd 14 40 d1 30 9c a5 4f 8e 72 |0D. %...@.0..O.r| +peer1.org2.example.com | [064 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.7 +peer0.org2.example.com | [010 05-20 18:19:47.72 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +orderer2.example.com | "2020-05-20 18:19:46.970 UTC [orderer.consensus.etcdraft] poll -> INFO 023 3 received MsgPreVoteResp from 1 at term 1" channel=testchainid node=3 +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org1.example.com | 00000010 38 76 a4 c0 1d 80 66 e8 9d dd ab 79 2c 7e 4e a5 |8v....f....y,~N.| +peer1.org2.example.com | [065 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org2.example.com | [011 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | "2020-05-20 18:19:46.970 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 024 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Writers" +peer1.org1.example.com | 00000020 d0 3d b0 d4 02 20 06 63 ed 86 f1 5d 89 fc 7a 9d |.=... .c...]..z.| +peer1.org2.example.com | [066 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer0.org2.example.com | [012 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer2.example.com | "2020-05-20 18:19:46.970 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 025 3 became candidate at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-05-20 18:19:46.970 UTC [orderer.consensus.etcdraft] poll -> INFO 026 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +peer1.org1.example.com | 00000030 fe cd a9 b0 ea 02 f1 42 73 e4 ef ad 0b 53 b9 e6 |.......Bs....S..| +peer1.org2.example.com | [067 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer0.org2.example.com | [013 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer2.example.com | "2020-05-20 18:19:46.970 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +peer1.org1.example.com | 00000040 0b 17 6a 86 cc 62 |..j..b| +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Admins" +peer1.org2.example.com | [068 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [014 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer2.example.com | "2020-05-20 18:19:46.971 UTC [orderer.consensus.etcdraft] campaign -> INFO 028 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +peer1.org1.example.com | [18b 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 69903409854605677, Envelope: 959 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Readers" +peer1.org2.example.com | [069 05-20 18:19:48.78 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org2.example.com | [015 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +orderer2.example.com | "2020-05-20 18:19:46.974 UTC [orderer.consensus.etcdraft] poll -> INFO 029 3 received MsgVoteResp from 1 at term 2" channel=testchainid node=3 +peer1.org1.example.com | [18c 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [18d 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 2 +peer1.org2.example.com | [06a 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org2.example.com | [016 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +orderer2.example.com | "2020-05-20 18:19:46.974 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 02a 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +peer1.org1.example.com | [18e 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [06b 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +orderer0.example.com | "2020-05-20 18:19:46.084 UTC [fsblkstorage] Next -> DEBU 29b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org2.example.com | [017 05-20 18:19:47.73 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +orderer2.example.com | "2020-05-20 18:19:46.974 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02b 3 became leader at term 2" channel=testchainid node=3 +peer1.org1.example.com | [18f 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [06c 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +orderer0.example.com | "2020-05-20 18:19:46.084 UTC [fsblkstorage] newBlockfileStream -> DEBU 29c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [018 05-20 18:19:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer2.example.com | "2020-05-20 18:19:46.974 UTC [orderer.consensus.etcdraft] run -> INFO 02c raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +peer1.org1.example.com | [190 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [06d 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +orderer0.example.com | "2020-05-20 18:19:46.084 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29d Remaining bytes=[22930], Going to peek [8] bytes" +peer0.org2.example.com | [019 05-20 18:19:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer2.example.com | "2020-05-20 18:19:46.977 UTC [orderer.consensus.etcdraft] run -> INFO 02d Leader 3 is present, quit campaign" channel=testchainid node=3 +peer1.org1.example.com | [191 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [06e 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org2.example.com | [06f 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29e Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [01a 05-20 18:19:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +orderer2.example.com | "2020-05-20 18:19:46.977 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02e Raft leader changed: 0 -> 3" channel=testchainid node=3 +peer1.org1.example.com | [192 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [070 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29f blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [fsblkstorage] Next -> DEBU 2a0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org2.example.com | [01b 05-20 18:19:47.75 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +orderer2.example.com | "2020-05-20 18:19:46.980 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02f Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +peer1.org1.example.com | [193 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 59 52 bd 2b 0a 0c 5f 90 d4 92 b7 ab 3d df 46 |.YR.+.._.....=.F| +peer1.org2.example.com | [071 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [fsblkstorage] newBlockfileStream -> DEBU 2a1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [01c 05-20 18:19:47.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer0.org1.example.com | -----END CERTIFICATE----- +orderer2.example.com | "2020-05-20 18:19:57.860 UTC [orderer.consensus.etcdraft] propose -> INFO 030 Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +peer1.org1.example.com | 00000010 55 b6 dd 33 e0 8b 99 48 b3 a7 41 8d 45 85 29 8b |U..3...H..A.E.).| +peer1.org2.example.com | [072 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a2 Remaining bytes=[22930], Going to peek [8] bytes" +peer0.org2.example.com | [01d 05-20 18:19:47.75 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer0.org1.example.com | [031 05-20 18:19:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce] at [/etc/hyperledger/fabric/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk]... +orderer2.example.com | "2020-05-20 18:19:57.862 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 031 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +peer1.org1.example.com | [194 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 35 c4 86 89 f3 f1 fa a1 d6 20 |0E.!..5........ | +peer1.org2.example.com | [073 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a3 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [01e 05-20 18:19:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org2.example.com-cert.pem +peer0.org1.example.com | [032 05-20 18:19:48.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer2.example.com | "2020-05-20 18:19:57.872 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 032 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +peer1.org1.example.com | 00000010 a3 65 63 1c 80 bf eb ef a8 29 65 1b 55 b6 19 bd |.ec......)e.U...| +peer1.org2.example.com | [074 05-20 18:19:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a4 blockbytes [22927] read from file [0]" +peer0.org2.example.com | [01f 05-20 18:19:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +orderer2.example.com | "2020-05-20 18:19:57.912 UTC [fsblkstorage] newBlockfileMgr -> INFO 033 Getting block information from block storage" +peer1.org1.example.com | 00000020 fc 1f 70 6f 59 02 20 6d fe 3b 46 b4 cf da cf ff |..poY. m.;F.....| +peer1.org2.example.com | [075 05-20 18:19:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] NewStandardValues -> DEBU 2a5 Initializing protos for *channelconfig.ChannelProtos" +peer0.org2.example.com | [020 05-20 18:19:47.78 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org2.example.com-cert.pem +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | "2020-05-20 18:19:57.944 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 034 EvictionSuspicion not set, defaulting to 10m0s" +peer1.org1.example.com | 00000030 41 93 f8 50 e4 c9 d5 ec c3 b4 21 d1 e1 ad 7c f7 |A..P......!...|.| +peer1.org2.example.com | [076 05-20 18:19:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a6 Processing field: HashingAlgorithm" +peer0.org2.example.com | [021 05-20 18:19:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer2.example.com | "2020-05-20 18:19:57.944 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 035 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +peer1.org1.example.com | 00000040 dc d8 7a bf c9 d6 0c |..z....| +peer1.org2.example.com | [077 05-20 18:19:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a7 Processing field: BlockDataHashingStructure" +peer0.org2.example.com | [022 05-20 18:19:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer2.example.com | "2020-05-20 18:19:57.951 UTC [orderer.commmon.multichannel] newChain -> INFO 036 Created and starting new chain businesschannel" +peer1.org1.example.com | [195 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [078 05-20 18:19:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a8 Processing field: OrdererAddresses" +peer0.org2.example.com | [023 05-20 18:19:47.79 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer2.example.com | "2020-05-20 18:19:57.951 UTC [orderer.consensus.etcdraft] Start -> INFO 037 Starting Raft node" channel=businesschannel node=3 +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [079 05-20 18:19:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a9 Processing field: Consortium" +peer0.org2.example.com | [024 05-20 18:19:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +orderer2.example.com | "2020-05-20 18:19:57.951 UTC [orderer.common.cluster] Configure -> INFO 038 Entering, channel: businesschannel, nodes: [ID: 1, +peer1.org1.example.com | [196 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 9c 90 ca d0 9d 5b f7 9d 64 42 45 |0D. d.....[..dBE| +peer1.org2.example.com | [07a 05-20 18:19:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2aa Processing field: Capabilities" +peer0.org2.example.com | [025 05-20 18:19:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org2.example.com-cert.pem +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +orderer2.example.com | Endpoint: orderer0.example.com:7055, +peer1.org1.example.com | 00000010 05 b1 ae dd 99 45 dd 9b f8 1a a1 79 d1 3b c6 7c |.....E.....y.;.|| +peer1.org2.example.com | [07b 05-20 18:19:48.82 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051] +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] NewStandardValues -> DEBU 2ab Initializing protos for *channelconfig.ConsortiumProtos" +peer0.org2.example.com | [026 05-20 18:19:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000020 fc 0c e9 95 02 20 35 98 6a f5 0f ec 6f 1e cf d2 |..... 5.j...o...| +peer1.org2.example.com | [07c 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ac Processing field: ChannelCreationPolicy" +peer0.org2.example.com | [027 05-20 18:19:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +peer1.org1.example.com | 00000030 01 27 41 0a d4 76 9a 09 42 a4 f5 b8 22 16 d0 b3 |.'A..v..B..."...| +peer1.org2.example.com | [07d 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] NewStandardValues -> DEBU 2ad Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | [028 05-20 18:19:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | 00000040 e6 c4 ee 2a 34 fe |...*4.| +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ae Processing field: MSP" +peer0.org2.example.com | [029 05-20 18:19:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org1.example.com | [197 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [common.channelconfig] validateMSP -> DEBU 2af Setting up MSP for org Org1MSP" +peer0.org2.example.com | [02a 05-20 18:19:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +peer1.org1.example.com | [198 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [msp] newBccspMsp -> DEBU 2b0 Creating BCCSP-based MSP instance" +peer0.org2.example.com | [02b 05-20 18:19:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | -----END CERTIFICATE----- +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org1.example.com | [199 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | "2020-05-20 18:19:46.085 UTC [msp] New -> DEBU 2b1 Creating Cache-MSP instance" +peer0.org2.example.com | [02c 05-20 18:19:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [033 05-20 18:19:48.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org1.example.com | [19a 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-05-20 18:19:46.086 UTC [msp] Setup -> DEBU 2b2 Setting up MSP instance Org1MSP" +peer0.org2.example.com | [02d 05-20 18:19:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer0.org1.example.com | [034 05-20 18:19:48.12 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +peer1.org1.example.com | [19b 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +orderer0.example.com | "2020-05-20 18:19:46.090 UTC [msp.identity] newIdentity -> DEBU 2b3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [02e 05-20 18:19:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | Version: 1.4.7 +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +peer1.org1.example.com | [19c 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [02f 05-20 18:19:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | Commit SHA: development build +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org1.example.com | [19d 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | Go version: go1.13.11 +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer1.org1.example.com | [19e 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | OS/Arch: linux/amd64 +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +peer1.org1.example.com | [19f 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | Chaincode: +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +peer1.org1.example.com | [1a0 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a1 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | Base Image Version: 0.4.20 +peer0.org1.example.com | Base Docker Namespace: hyperledger +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +peer1.org1.example.com | [1a2 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | [1a3 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [07e 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | Docker Namespace: hyperledger +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +peer1.org1.example.com | [1a4 05-20 18:19:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [07f 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [035 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [1a5 05-20 18:19:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [080 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | [036 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org1.example.com | [1a6 05-20 18:19:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a7 05-20 18:19:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [081 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [037 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +peer1.org1.example.com | [1a8 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a9 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org2.example.com | [082 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | [038 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org1.example.com | [1aa 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org2.example.com | [083 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | [039 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org1.example.com | [1ab 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [084 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01D7060A204EE140FBD31CE482...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [03a 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +peer1.org1.example.com | [1ac 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [085 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5EA79637F04881983BECB2D7729DA6771A358871CBA8BBE44C8A4394738CB9B +peer0.org2.example.com | [030 05-20 18:19:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [03b 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer0.org1.example.com | [03c 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer0.org1.example.com | [03d 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +peer1.org1.example.com | [1ad 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | [03e 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org1.example.com | [1ae 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ACED57D123CE9E346091EF9FF8EA2CDEAD16A44A116B51C3A742CC68FA13D321 +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [086 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt�, total items: 1 +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [03f 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer1.org1.example.com | [1af 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b0 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1b1 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [087 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org2.example.com:7051 started +peer0.org1.example.com | [040 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +peer1.org1.example.com | [1b2 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\022/$\025*\177O\013\022\277(\222\307z\343\310\311u\203\327c\254\201\337\224\244)\357\224\025\002 Y7\276\272,`\030\0054\177s$\270\246\3370\364\t\004\344\342\262\263>\261 > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [088 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer0.org1.example.com | [041 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +peer1.org2.example.com | [089 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b3 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\022/$\025*\177O\013\022\277(\222\307z\343\310\311u\203\327c\254\201\337\224\244)\357\224\025\002 Y7\276\272,`\030\0054\177s$\270\246\3370\364\t\004\344\342\262\263>\261 > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [042 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +peer1.org2.example.com | [08a 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [1b4 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [043 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +orderer2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [08b 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A5832FC8D0DB2B8B2325ECE6BA90A55C022E089A02A31ADF75EF058D0AE1E112 +peer1.org1.example.com | [1b5 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [044 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +orderer2.example.com | ID: 2, +peer1.org2.example.com | [08c 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b6 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [045 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +orderer2.example.com | Endpoint: orderer1.example.com:7050, +peer1.org2.example.com | [08d 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1b7 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [046 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [08e 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [1b8 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [047 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +orderer0.example.com | "2020-05-20 18:19:46.091 UTC [common.channelconfig] NewStandardValues -> DEBU 2b4 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +peer1.org2.example.com | [08f 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [1b9 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac ed 57 d1 23 ce 9e 34 60 91 ef 9f f8 ea 2c de |..W.#..4`.....,.| +peer0.org1.example.com | [048 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +orderer0.example.com | "2020-05-20 18:19:46.091 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b5 Processing field: MSP" +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [090 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.7 +peer1.org1.example.com | 00000010 ad 16 a4 4a 11 6b 51 c3 a7 42 cc 68 fa 13 d3 21 |...J.kQ..B.h...!| +peer0.org1.example.com | [049 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +orderer0.example.com | "2020-05-20 18:19:46.091 UTC [common.channelconfig] validateMSP -> DEBU 2b6 Setting up MSP for org Org2MSP" +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer1.org2.example.com | [091 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org1.example.com | [1ba 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 3e 12 2f 24 15 2a 7f 4f 0b 12 bf |0D. .>./$.*.O...| +peer0.org1.example.com | [04a 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +orderer0.example.com | "2020-05-20 18:19:46.092 UTC [msp] newBccspMsp -> DEBU 2b7 Creating BCCSP-based MSP instance" +peer0.org2.example.com | -----END CERTIFICATE----- +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer1.org2.example.com | [092 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | 00000010 28 92 c7 7a e3 c8 c9 75 83 d7 63 ac 81 df 94 a4 |(..z...u..c.....| +peer0.org1.example.com | [04b 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +orderer0.example.com | "2020-05-20 18:19:46.092 UTC [msp] New -> DEBU 2b8 Creating Cache-MSP instance" +peer0.org2.example.com | [031 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336] at [/etc/hyperledger/fabric/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk]... +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | 00000020 29 ef 94 15 02 20 59 37 be ba 2c 60 18 05 34 7f |).... Y7..,`..4.| +peer0.org1.example.com | [04c 05-20 18:19:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +orderer0.example.com | "2020-05-20 18:19:46.092 UTC [msp] Setup -> DEBU 2b9 Setting up MSP instance Org2MSP" +peer0.org2.example.com | [032 05-20 18:19:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | 00000030 73 24 b8 a6 df 30 f4 09 04 e4 e2 b2 b3 3e b1 3c |s$...0.......>.<| +peer0.org1.example.com | [04d 05-20 18:19:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +orderer0.example.com | "2020-05-20 18:19:46.094 UTC [msp.identity] newIdentity -> DEBU 2ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | 00000040 66 2c f3 13 83 80 |f,....| +peer0.org1.example.com | [04e 05-20 18:19:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.7 +peer1.org1.example.com | [1bb 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | [04f 05-20 18:19:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer0.org1.example.com | [050 05-20 18:19:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [051 05-20 18:19:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | [1bc 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 a7 fa dc ac 17 0a 15 f5 0b 65 |0E.!...........e| +peer0.org1.example.com | [052 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | 00000010 62 ef be 76 36 63 ac 33 d8 bd 50 f7 0e 1a 61 91 |b..v6c.3..P...a.| +peer0.org1.example.com | [053 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | 00000020 e6 ae 5f 13 46 02 20 15 1a 8f 0c df 81 51 b4 90 |.._.F. ......Q..| +peer0.org1.example.com | [054 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +peer1.org2.example.com | [094 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +peer1.org1.example.com | 00000030 0d f4 e5 ac 9c 47 27 27 17 87 c3 8f e9 0d be 2e |.....G''........| +peer0.org1.example.com | [055 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [095 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +peer1.org1.example.com | 00000040 dc 95 3f 93 f5 41 1c |..?..A.| +peer0.org1.example.com | [056 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [096 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.7 +peer1.org1.example.com | [1bd 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [057 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +peer1.org2.example.com | [097 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +peer1.org1.example.com | [1be 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [058 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [09a 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +peer1.org1.example.com | [1bf 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [059 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +peer0.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer1.org2.example.com | [09b 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +peer1.org1.example.com | [1c0 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [05a 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org2.example.com | [033 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer1.org2.example.com | [093 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer1.org1.example.com | [1c1 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [05b 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +peer0.org2.example.com | [034 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org2.example.com | Version: 1.4.7 +peer0.org2.example.com | Commit SHA: development build +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | [098 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.7 +peer1.org1.example.com | [1c2 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [05c 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org2.example.com | Go version: go1.13.11 +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org2.example.com | [099 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.7 +peer1.org1.example.com | [1c3 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [05d 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org2.example.com | OS/Arch: linux/amd64 +orderer0.example.com | -----END CERTIFICATE-----" +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org2.example.com | [09c 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +peer1.org1.example.com | [1c4 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [05e 05-20 18:19:48.71 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +peer0.org2.example.com | Chaincode: +orderer0.example.com | "2020-05-20 18:19:46.105 UTC [common.channelconfig] NewStandardValues -> DEBU 2bb Initializing protos for *channelconfig.OrdererProtos" +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +peer1.org2.example.com | [09d 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [1c5 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [05f 05-20 18:19:48.71 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +peer0.org2.example.com | Base Image Version: 0.4.20 +orderer0.example.com | "2020-05-20 18:19:46.112 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2bc Processing field: ConsensusType" +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +peer1.org2.example.com | [09e 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [1c6 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\333\233\313\253\362\270|\3622\244\233\274\365'" > > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [060 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.7 +peer0.org2.example.com | Base Docker Namespace: hyperledger +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2bd Processing field: BatchSize" +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org2.example.com | [09f 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.7 +peer1.org1.example.com | [1c7 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\333\233\313\253\362\270|\3622\244\233\274\365'" > > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [061 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +peer1.org2.example.com | [0a0 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.7" , sending back REGISTERED +peer1.org1.example.com | [1c8 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [062 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.7 +peer0.org2.example.com | Docker Namespace: hyperledger +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +peer1.org2.example.com | [0a1 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.7" +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2be Processing field: BatchTimeout" +peer1.org1.example.com | [1c9 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\333\233\313\253\362\270|\3622\244\233\274\365'" > > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [063 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org2.example.com | [035 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +peer1.org2.example.com | [0a2 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.7" +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2bf Processing field: KafkaBrokers" +peer1.org1.example.com | [1ca 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 2b 72 71 d8 de 86 8e cd ea c6 99 55 6b 0e 4c |.+rq........Uk.L| +peer0.org1.example.com | [064 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.7 +peer0.org2.example.com | [036 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +peer1.org2.example.com | [0a3 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.7" +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c0 Processing field: ChannelRestrictions" +peer1.org1.example.com | 00000010 6d 6a f9 4c 06 83 be 7b c4 8e f8 21 a1 08 df e7 |mj.L...{...!....| +peer0.org1.example.com | [065 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org2.example.com | [037 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +orderer2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [0a4 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c1 Processing field: Capabilities" +peer1.org1.example.com | [1cb 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 a8 3f 06 fb e9 0a 21 a2 65 41 ba |0D. %.?....!.eA.| +peer0.org1.example.com | [066 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer0.org2.example.com | [038 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +orderer2.example.com | ]" +peer1.org2.example.com | [0a5 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0a6 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU [b6838440] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | 00000010 e0 60 9d 93 8e 99 4c a7 9a f2 64 2e dd 26 d7 f4 |.`....L...d..&..| +peer0.org1.example.com | [067 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer0.org2.example.com | [039 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +orderer2.example.com | "2020-05-20 18:19:57.951 UTC [orderer.common.cluster] updateStubInMapping -> INFO 039 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel businesschannel" +peer1.org2.example.com | [0a7 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU [b6838440] notifying Txid:b6838440-d819-4fd7-beb8-d1dd5a158270, channelID: +peer1.org1.example.com | 00000020 89 dc cf 95 02 20 04 fe 65 20 e9 fc 46 e4 71 2d |..... ..e ..F.q-| +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] NewStandardValues -> DEBU 2c2 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | [068 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [03a 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +orderer2.example.com | "2020-05-20 18:19:57.951 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7055 due to TLS certificate change" +peer1.org2.example.com | [0a8 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | 00000030 1c 2f 71 bb 9a 87 95 2b c7 52 34 86 11 1b 5d 96 |./q....+.R4...].| +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c3 Processing field: Endpoints" +peer0.org1.example.com | [069 05-20 18:19:48.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org2.example.com | [03b 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +orderer2.example.com | "2020-05-20 18:19:57.952 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +peer1.org2.example.com | [0a9 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org1.example.com | 00000040 07 55 ae c3 52 e1 |.U..R.| +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] NewStandardValues -> DEBU 2c4 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [06a 05-20 18:19:48.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer0.org2.example.com | [03c 05-20 18:19:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +orderer2.example.com | "2020-05-20 18:19:57.952 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03c Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +peer1.org2.example.com | [0aa 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [1cc 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c5 Processing field: MSP" +peer0.org1.example.com | [06b 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer0.org2.example.com | [03d 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +orderer2.example.com | "2020-05-20 18:19:57.952 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +peer1.org2.example.com | [0ab 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.7 +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [common.channelconfig] validateMSP -> DEBU 2c6 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | [06c 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [03e 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +orderer2.example.com | "2020-05-20 18:19:57.953 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03e 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +peer1.org2.example.com | [0ac 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org1.example.com | [1cd 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a d4 28 f5 7a 34 c5 05 64 98 fd |0E.!...(.z4..d..| +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [msp] newBccspMsp -> DEBU 2c7 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [06d 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer0.org2.example.com | [03f 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +orderer2.example.com | "2020-05-20 18:19:57.953 UTC [orderer.common.cluster] Configure -> INFO 03f Exiting" +peer1.org2.example.com | [0ad 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | 00000010 8d 5a c1 c1 fe da 5f e8 5c 12 5e 20 8d 84 cc e4 |.Z...._.\.^ ....| +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [msp] New -> DEBU 2c8 Creating Cache-MSP instance" +peer0.org1.example.com | [06e 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [040 05-20 18:19:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +orderer2.example.com | "2020-05-20 18:19:57.953 UTC [orderer.consensus.etcdraft] start -> INFO 040 Starting raft node as part of a new channel" channel=businesschannel node=3 +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | 00000020 fb 52 70 b4 1b 02 20 13 82 ba be 77 e9 39 bc c9 |.Rp... ....w.9..| +peer0.org1.example.com | [06f 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer0.org2.example.com | [041 05-20 18:19:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +orderer2.example.com | "2020-05-20 18:19:57.953 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 041 3 became follower at term 0" channel=businesschannel node=3 +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | 00000030 55 f8 a9 53 f2 93 16 68 3e db 9b cb ab f2 b8 7c |U..S...h>......|| +peer0.org1.example.com | [070 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer0.org2.example.com | [042 05-20 18:19:48.09 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [msp] Setup -> DEBU 2c9 Setting up MSP instance OrdererMSP" +orderer2.example.com | "2020-05-20 18:19:57.953 UTC [orderer.consensus.etcdraft] newRaft -> INFO 042 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | 00000040 f2 32 a4 9b bc f5 27 |.2....'| +peer0.org1.example.com | [071 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer0.org2.example.com | [043 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +orderer0.example.com | "2020-05-20 18:19:46.114 UTC [msp.identity] newIdentity -> DEBU 2ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.7 +orderer2.example.com | "2020-05-20 18:19:57.953 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 043 3 became follower at term 1" channel=businesschannel node=3 +peer1.org1.example.com | [1ce 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [072 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [044 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +orderer2.example.com | "2020-05-20 18:19:57.956 UTC [orderer.consensus.etcdraft] apply -> INFO 044 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +peer0.org1.example.com | [073 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer1.org1.example.com | [1cf 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [045 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer0.org2.example.com | [046 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +orderer2.example.com | "2020-05-20 18:19:57.956 UTC [orderer.consensus.etcdraft] apply -> INFO 045 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2020-05-20 18:19:57.956 UTC [orderer.consensus.etcdraft] apply -> INFO 046 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +peer0.org1.example.com | [074 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [1d0 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer0.org2.example.com | [047 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [0ae 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +orderer2.example.com | "2020-05-20 18:19:58.952 UTC [orderer.consensus.etcdraft] Step -> INFO 047 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +peer0.org1.example.com | [075 05-20 18:19:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer1.org1.example.com | [1d1 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer0.org2.example.com | [048 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer1.org2.example.com | [0af 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +orderer2.example.com | "2020-05-20 18:19:58.966 UTC [orderer.consensus.etcdraft] Step -> INFO 048 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer2.example.com | "2020-05-20 18:19:58.967 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 049 3 became follower at term 2" channel=businesschannel node=3 +peer0.org1.example.com | [076 05-20 18:19:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [1d2 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [049 05-20 18:19:48.34 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer0.org2.example.com | [04a 05-20 18:19:48.35 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer1.org2.example.com | [0b0 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.7 +orderer2.example.com | "2020-05-20 18:19:58.967 UTC [orderer.consensus.etcdraft] Step -> INFO 04a 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +peer0.org1.example.com | [077 05-20 18:19:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [1d3 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [04b 05-20 18:19:48.35 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer1.org2.example.com | [0b1 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +peer1.org2.example.com | [0b4 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +orderer2.example.com | "2020-05-20 18:19:58.973 UTC [orderer.consensus.etcdraft] run -> INFO 04b raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +peer0.org1.example.com | [078 05-20 18:19:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [1d4 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [04c 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer1.org2.example.com | [0b5 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +orderer2.example.com | "2020-05-20 18:19:58.974 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04c Raft leader changed: 0 -> 1" channel=businesschannel node=3 +orderer2.example.com | "2020-05-20 18:20:03.138 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +peer0.org1.example.com | [079 05-20 18:19:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer0.org1.example.com | [07a 05-20 18:19:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer1.org1.example.com | [1d5 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [04d 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org2.example.com | [0b6 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +orderer2.example.com | "2020-05-20 18:20:05.431 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +peer0.org1.example.com | [07b 05-20 18:19:48.80 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +peer0.org1.example.com | [07c 05-20 18:19:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d6 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | [04e 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer1.org2.example.com | [0b2 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.7 +orderer2.example.com | "2020-05-20 18:21:12.972 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +peer0.org1.example.com | [07d 05-20 18:19:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [1d7 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\333\233\313\253\362\270|\3622\244\233\274\365'" > > alive:m[\234\356\267U0\366K\216-\363\204\231\262\3454\220\220\364:\333E\312\031\360\370>" secret_envelope:6E\210\"1\016\\`\270\332\272\220\267\352\371\r\310\364\0132\311\010T\002 \0224\272\202pcJ\251<\\\265.\235G\274\242>\300\374S\200p\225\230\233\253\234\265\236\351\350/" > > +peer1.org1.example.com | [1d8 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d9 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [04f 05-20 18:19:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +orderer2.example.com | "2020-05-20 18:21:16.573 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +peer1.org2.example.com | [0b3 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.7 +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | [1da 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [050 05-20 18:19:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer0.org2.example.com | [051 05-20 18:19:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer0.org2.example.com | [052 05-20 18:19:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +orderer2.example.com | "2020-05-20 18:21:19.565 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +peer1.org2.example.com | [0b7 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [1db 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [053 05-20 18:19:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +orderer2.example.com | "2020-05-20 18:21:35.199 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 052 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-05-20 18:21:35.200 UTC [cauthdsl] deduplicate -> WARN 053 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer1.org2.example.com | [0b8 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | [1dc 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161008 +peer0.org2.example.com | [054 05-20 18:19:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +orderer2.example.com | "2020-05-20 18:21:35.201 UTC [cauthdsl] deduplicate -> WARN 054 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer1.org2.example.com | [0b9 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.7 +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | [1dd 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A3457B4B120DC8D708F2BE72C9FBF4C9D82AEF8133D018A9D4E800598FD52B4D +peer0.org2.example.com | [055 05-20 18:19:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org2.example.com | [0ba 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.7" , sending back REGISTERED +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [1de 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [056 05-20 18:19:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer1.org2.example.com | [0bb 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.7" +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | [1df 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [057 05-20 18:19:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer1.org2.example.com | [0bc 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.7" +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [1e0 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1e1 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [058 05-20 18:19:48.46 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org2.example.com | [0bd 05-20 18:19:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.7" +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | [1e2 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1e3 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [059 05-20 18:19:48.46 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 +peer1.org2.example.com | [0be 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [0bf 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | [1e4 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [05a 05-20 18:19:48.46 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [05b 05-20 18:19:48.46 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 +peer1.org2.example.com | [0c0 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [1e5 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [05c 05-20 18:19:48.46 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer1.org2.example.com | [0c1 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU [2627a4a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0c2 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU [2627a4a2] notifying Txid:2627a4a2-52e1-41eb-828a-97e657a69e81, channelID: +peer0.org1.example.com | [07e 05-20 18:19:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [1e6 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | [05d 05-20 18:19:48.51 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org2.example.com | [0c3 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [07f 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [1e7 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e8 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1e9 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [05e 05-20 18:19:48.53 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com +peer1.org2.example.com | [0c4 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [080 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1ea 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 50 bb 7d bc d4 23 f5 39 97 b6 59 57 2f be 85 |.P.}..#.9..YW/..| +peer0.org2.example.com | [05f 05-20 18:19:48.53 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org2.example.com:7052 +peer0.org2.example.com | [060 05-20 18:19:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.7 +peer0.org2.example.com | [061 05-20 18:19:48.57 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org2.example.com | [0c5 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [081 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | 00000010 7b ae 27 a3 d5 f6 a5 f4 4d 92 f1 9c f8 de c5 3f |{.'.....M......?| +peer0.org2.example.com | [062 05-20 18:19:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.7 +peer1.org2.example.com | [0c6 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.7 +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | [082 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer1.org1.example.com | [1eb 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 5a 20 50 9e 81 3b 27 3c 71 47 |0E.!..Z P..;' INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org2.example.com | [0c7 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer0.org1.example.com | [083 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 5d 17 01 fc 35 aa c4 ce f8 e0 4f aa fe 01 41 d6 |]...5.....O...A.| +peer0.org2.example.com | [064 05-20 18:19:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.7 +peer1.org2.example.com | [0c8 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | [084 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A209901CDE7C48A747A...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | 00000020 27 6b c8 88 5d 02 20 6b a8 08 f0 0e 5d 65 17 73 |'k..]. k....]e.s| +peer0.org2.example.com | [065 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [085 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF186C4BF240BED45F0BBCF7135C6BDC1830908603084DC2B567543C23E28B78 +peer1.org1.example.com | 00000030 bc c9 91 d0 54 95 aa 2f 45 7b 02 a2 45 6a ad 4e |....T../E{..Ej.N| +peer0.org2.example.com | [066 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | [086 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-<, total items: 1 +peer1.org1.example.com | 00000040 b3 ab dd b9 54 5b bf |....T[.| +peer0.org2.example.com | [067 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | [087 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +peer1.org1.example.com | [1ec 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [068 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.7 +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | [088 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [069 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +orderer0.example.com | nw== +peer0.org1.example.com | [089 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1ed 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 60 34 38 34 3e d0 80 de f5 3a |0E.!..`484>....:| +peer0.org2.example.com | [06a 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [08a 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | 00000010 a7 e8 05 1f 06 e5 63 b7 26 1c 2e 11 6a cf 00 b3 |......c.&...j...| +peer0.org2.example.com | [06b 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +orderer0.example.com | "2020-05-20 18:19:46.125 UTC [msp] Setup -> DEBU 2cb Setting up the MSP manager (3 msps)" +peer0.org1.example.com | [08b 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C2237C5BA1BE11CE29EDC845034AC234A64B0FB9839D6F631A0DE83EBC647D8 +peer1.org1.example.com | 00000020 a8 8e 52 bf 97 02 20 5c 28 69 f5 a6 68 79 06 cb |..R... \(i..hy..| +peer0.org2.example.com | [06c 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +orderer0.example.com | "2020-05-20 18:19:46.125 UTC [msp] Setup -> DEBU 2cc MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | [08c 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000030 23 24 96 10 ad 3e 2b cc 5f aa 99 43 b4 38 33 db |#$...>+._..C.83.| +peer0.org2.example.com | [06d 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer1.org2.example.com | [0c9 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2cd Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | [08d 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | 00000040 8d f1 bb 05 62 16 da |....b..| +peer0.org2.example.com | [06e 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org2.example.com | [0ca 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2ce Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | [08e 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [1ee 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [06f 05-20 18:19:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer1.org2.example.com | [0cb 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2cf Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | [08f 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer1.org1.example.com | [1ef 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [070 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org2.example.com | [0cc 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +orderer0.example.com | "2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d0 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | [090 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [1f0 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [071 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer1.org2.example.com | [0cf 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d1 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org1.example.com | [091 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.7 +peer1.org1.example.com | [1f1 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [072 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [0d0 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d2 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org1.example.com | [092 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +orderer0.example.com | "2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d3 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer1.org1.example.com | [1f2 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [073 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer1.org2.example.com | [0cd 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.7 +peer0.org1.example.com | [093 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +orderer0.example.com | "2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d4 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +peer1.org1.example.com | [1f3 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [074 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer1.org2.example.com | [0ce 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.7 +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d5 Proposed new policy Admins for Channel/Consortiums" +peer1.org1.example.com | [1f4 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [075 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer0.org2.example.com | [076 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org2.example.com | [0d1 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d6 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [1f5 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [077 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer1.org2.example.com | [0d2 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [1f6 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47652 +peer0.org2.example.com | [078 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [0d3 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d8 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [1f7 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002909a40 +peer0.org2.example.com | [079 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer1.org2.example.com | [0d4 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.7 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d9 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org1.example.com | [1f8 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [07a 05-20 18:19:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer1.org2.example.com | [0d5 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.7" , sending back REGISTERED +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2da Proposed new policy Readers for Channel/Orderer" +peer1.org1.example.com | [1f9 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [07b 05-20 18:19:48.61 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2db Proposed new policy Writers for Channel/Orderer" +peer1.org1.example.com | [1fa 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [07c 05-20 18:19:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [0d6 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.7" +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2dc Proposed new policy Admins for Channel/Orderer" +peer1.org1.example.com | [1fb 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [07d 05-20 18:19:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [0d7 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.7" +peer0.org1.example.com | [094 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] GetPolicy -> DEBU 2dd Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +peer1.org2.example.com | [0d8 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.7" +peer0.org1.example.com | [095 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2de Proposed new policy Writers for Channel" +peer1.org2.example.com | [0d9 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org1.example.com | [096 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.7 +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2df Proposed new policy Admins for Channel" +peer1.org2.example.com | [0da 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [097 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] GetPolicy -> DEBU 2e0 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2e1 Proposed new policy Readers for Channel" +peer1.org2.example.com | [0db 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [09a 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [common.configtx] addToMap -> DEBU 2e2 Adding to config map: [Group] /Channel" +peer1.org2.example.com | [0dc 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU [13696b41] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [09b 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +orderer0.example.com | "2020-05-20 18:19:46.127 UTC [common.configtx] addToMap -> DEBU 2e3 Adding to config map: [Group] /Channel/Consortiums" +peer1.org2.example.com | [0dd 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU [13696b41] notifying Txid:13696b41-85fc-4a0e-b0e9-70c7cd6e5f86, channelID: +peer0.org1.example.com | [098 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.7 +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +orderer0.example.com | "2020-05-20 18:19:46.129 UTC [common.configtx] addToMap -> DEBU 2e4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +peer1.org2.example.com | [0de 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [099 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.7 +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +orderer0.example.com | "2020-05-20 18:19:46.129 UTC [common.configtx] addToMap -> DEBU 2e5 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [0df 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [09c 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | "2020-05-20 18:19:46.129 UTC [common.configtx] addToMap -> DEBU 2e6 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +peer1.org2.example.com | [0e0 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org1.example.com | [09d 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +orderer0.example.com | "2020-05-20 18:19:46.130 UTC [common.configtx] addToMap -> DEBU 2e7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +peer1.org2.example.com | [0e1 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer0.org1.example.com | [09e 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.7 +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | [0e2 05-20 18:19:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org1.example.com | [09f 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.7" , sending back REGISTERED +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2020-05-20 18:19:46.131 UTC [common.configtx] addToMap -> DEBU 2e8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +peer0.org1.example.com | [0a0 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.7" +peer1.org2.example.com | [0e3 05-20 18:19:48.89 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org1.example.com | [1fc 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [07e 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +orderer0.example.com | "2020-05-20 18:19:46.131 UTC [common.configtx] addToMap -> DEBU 2e9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +peer0.org1.example.com | [0a1 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.7" +peer1.org2.example.com | [0e4 05-20 18:19:48.89 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org1.example.com | [1fd 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [07f 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +orderer0.example.com | "2020-05-20 18:19:46.131 UTC [common.configtx] addToMap -> DEBU 2ea Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +peer0.org1.example.com | [0a2 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.7" +peer1.org2.example.com | [0e5 05-20 18:19:48.89 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org1.example.com | [1fe 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [080 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | "2020-05-20 18:19:46.132 UTC [common.configtx] addToMap -> DEBU 2eb Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org1.example.com | [0a3 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [0e6 05-20 18:19:48.89 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org1.example.com | [1ff 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [081 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +orderer0.example.com | "2020-05-20 18:19:46.132 UTC [common.configtx] addToMap -> DEBU 2ec Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +peer0.org1.example.com | [0a4 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0e7 05-20 18:19:48.89 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org1.example.com | [200 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 4d dd e4 f7 61 a0 62 2a 4a d9 44 48 3c 44 ed |ZM...a.b*J.DH INFO Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: +orderer0.example.com | "2020-05-20 18:19:46.132 UTC [common.configtx] addToMap -> DEBU 2ed Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +peer0.org1.example.com | [0a5 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [8e8f8ec3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0e8 05-20 18:19:48.89 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org1.example.com | 00000010 a3 26 91 c9 a5 33 ae c6 96 9f ca c9 56 f4 e2 46 |.&...3......V..F| +peer0.org2.example.com | [083 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:19:46.132 UTC [common.configtx] addToMap -> DEBU 2ee Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:46.134 UTC [common.configtx] addToMap -> DEBU 2ef Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +peer0.org1.example.com | [0a6 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [8e8f8ec3] notifying Txid:8e8f8ec3-335e-4dfa-8a0e-11e150ae5eb6, channelID: +peer1.org2.example.com | [0e9 05-20 18:19:48.89 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org1.example.com | [201 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f ac e7 50 b6 ff 41 de e4 fe a6 f6 |0D. _..P..A.....| +peer0.org2.example.com | [084 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A20A583F8EF0329C5FD...455254494649434154452D2D2D2D2D0A +orderer0.example.com | "2020-05-20 18:19:46.134 UTC [common.configtx] addToMap -> DEBU 2f0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +peer0.org1.example.com | [0a7 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0ea 05-20 18:19:48.89 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org1.example.com | 00000010 c6 61 5d 4e 41 58 d2 dc c5 2e 68 f9 a3 3a 59 8e |.a]NAX....h..:Y.| +peer0.org2.example.com | [085 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F325F6221CD3E4FD286DF6B04B3535B6B757789167E7FE5ACF4C444E25371023 +peer0.org1.example.com | [0a8 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [0eb 05-20 18:19:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000020 f0 ce 30 85 02 20 0a 44 8e 8a 0a fd 06 14 b2 f9 |..0.. .D........| +peer0.org2.example.com | [086 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���(, total items: 1 +orderer0.example.com | "2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f1 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +peer0.org1.example.com | [0a9 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | [0ec 05-20 18:19:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | 00000030 7a ee cb eb ef 15 a7 d9 a9 d5 36 dc 77 cd 08 27 |z.........6.w..'| +peer0.org2.example.com | [087 05-20 18:19:48.64 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org2.example.com:7051 started +peer0.org2.example.com | [088 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer0.org1.example.com | [0aa 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.7 +peer1.org2.example.com | [0ed 05-20 18:19:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B36A80E5D053B2023BD5FB522CA88A673FC1F5E65B3FA7D6663EE22EA4F6867E +peer1.org1.example.com | 00000040 f3 4b 21 86 0c 77 |.K!..w| +peer0.org2.example.com | [08a 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer0.org1.example.com | [0ab 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +orderer0.example.com | "2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f2 Adding to config map: [Policy] /Channel/Consortiums/Admins" +peer1.org2.example.com | [0ee 05-20 18:19:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [202 05-20 18:19:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [0ac 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | [089 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +orderer0.example.com | "2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f3 Adding to config map: [Group] /Channel/Orderer" +peer1.org2.example.com | [0ef 05-20 18:19:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [203 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00035afc0, header 0xc0029d0370 +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | [08b 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.7 +peer1.org2.example.com | [0f0 05-20 18:19:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [204 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | [08c 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer1.org2.example.com | [0f1 05-20 18:19:53.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [205 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU [][f70ecd1e] processing txid: f70ecd1e0f247fb88b759b2534bb1777d1e35c9f884ecfb8ebe33e504558ae6e +peer1.org1.example.com | [206 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU [][f70ecd1e] Entry chaincode: name:"cscc" +orderer0.example.com | "2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | [08d 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | [0f2 05-20 18:19:53.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [207 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> INFO [][f70ecd1e] Entry chaincode: name:"cscc" +orderer0.example.com | "2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:19:46.138 UTC [common.configtx] addToMap -> DEBU 2f6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.7 +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | [0f3 05-20 18:19:53.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4BDD56D2DBA35796232FBFA0CE733F4A30E10F08D501FEFF6336C3A43DF0A2F6 +peer1.org1.example.com | [208 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | "2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2f7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | [0f4 05-20 18:19:53.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [209 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer1.org1.example.com | [20a 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | [0f5 05-20 18:19:53.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [20b 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +orderer0.example.com | "2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2f8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.7 +peer1.org2.example.com | [0f6 05-20 18:19:53.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [20c 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +orderer0.example.com | "2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2f9 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | [0f7 05-20 18:19:53.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [0f8 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [20d 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [0ad 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fa Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | [0f9 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [20e 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [20f 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [0ae 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fb Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | [0fa 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CA34B00172DB85BC4CE0F0BF27FAB16C87DC1210D050BB511CC9461A2CD4C8C0 +peer1.org1.example.com | [210 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 4d dd e4 f7 61 a0 62 2a 4a d9 44 48 3c 44 ed |ZM...a.b*J.DH DEBU chaincode instance created for cscc-1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fc Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [0fb 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 a3 26 91 c9 a5 33 ae c6 96 9f ca c9 56 f4 e2 46 |.&...3......V..F| +peer0.org1.example.com | [0b0 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +orderer0.example.com | "2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fd Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org2.example.com | [08e 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0fc 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [211 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f ac e7 50 b6 ff 41 de e4 fe a6 f6 |0D. _..P..A.....| +peer0.org1.example.com | [0b1 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fe Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org2.example.com | [08f 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [0fd 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | 00000010 c6 61 5d 4e 41 58 d2 dc c5 2e 68 f9 a3 3a 59 8e |.a]NAX....h..:Y.| +peer0.org1.example.com | [0b2 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 2ff Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org2.example.com | [091 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 48753213B08DE82954B87F24A30901C06B6F34F6DBC04680F3E7C24D13C0FF5F +peer0.org2.example.com | [090 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +peer1.org2.example.com | [0fe 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000020 f0 ce 30 85 02 20 0a 44 8e 8a 0a fd 06 14 b2 f9 |..0.. .D........| +peer0.org1.example.com | [0b3 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 300 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org2.example.com | [092 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +peer1.org2.example.com | [0ff 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161006 +peer1.org2.example.com | [100 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 08BAFBDEB82123E55A20FBFA32626A07D4995634A1563EAF05D36A4712C02C44 +peer1.org1.example.com | 00000030 7a ee cb eb ef 15 a7 d9 a9 d5 36 dc 77 cd 08 27 |z.........6.w..'| +peer0.org1.example.com | [0b4 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 301 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org2.example.com | [093 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.7 +peer1.org2.example.com | [101 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000040 f3 4b 21 86 0c 77 |.K!..w| +peer0.org1.example.com | [0b5 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 302 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org2.example.com | [094 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +peer1.org2.example.com | [102 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [212 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [0b6 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 303 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org2.example.com | [095 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +peer1.org2.example.com | [103 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [213 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org1.example.com | [0b7 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 304 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org2.example.com | [096 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +peer1.org2.example.com | [104 05-20 18:19:58.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [214 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org1.example.com | [0b8 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.7 +peer0.org1.example.com | [0b9 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.7" , sending back REGISTERED +peer0.org2.example.com | [097 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +peer0.org2.example.com | [098 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.7 +peer1.org2.example.com | [105 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:33256 +peer1.org1.example.com | [215 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer0.org1.example.com | [0ba 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.7" +peer0.org2.example.com | [099 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.7 +peer0.org2.example.com | [09a 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [106 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00261ed20 +peer1.org1.example.com | [216 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer0.org1.example.com | [0bb 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.7" +peer0.org2.example.com | [09b 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [107 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 305 Adding to config map: [Value] /Channel/Capabilities" +peer1.org1.example.com | [217 05-20 18:19:59.84 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org1.example.com | [0bc 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.7" +peer0.org2.example.com | [09c 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.7 +peer1.org2.example.com | [108 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [109 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [218 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org1.example.com | [0bd 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org1.example.com | [0be 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [09d 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.7" , sending back REGISTERED +peer1.org2.example.com | [10a 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [219 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer1.org1.example.com | [21a 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org1.example.com | [0bf 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [09e 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.7" +peer0.org2.example.com | [09f 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.7" +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | [21b 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org1.example.com | [0c0 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [44e4eb7f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [0c1 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU [44e4eb7f] notifying Txid:44e4eb7f-95a6-4334-a654-b296410a7886, channelID: +peer0.org2.example.com | [0a0 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.7" +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | [21c 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org1.example.com | [0c2 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0a1 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0a2 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | [21d 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002a5c400)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer1.org1.example.com | [21e 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org1.example.com | [0c3 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [0a3 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU [4f9d75a5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org1.example.com | [21f 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org1.example.com | [0c4 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [0a4 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org1.example.com | [220 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 306 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | [0c5 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.7 +peer0.org2.example.com | [0a5 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU [4f9d75a5] notifying Txid:4f9d75a5-fc14-444e-a5a9-749111b38cf5, channelID: +peer0.org2.example.com | [0a6 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org1.example.com | [221 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 307 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | [0c6 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org2.example.com | [0a7 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org1.example.com | [222 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer0.org1.example.com | [0c7 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | [0a8 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 308 Adding to config map: [Policy] /Channel/Writers" +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org1.example.com | [223 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer1.org1.example.com | [224 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | [0aa 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 309 As expected, current configuration has policy '/Channel/Readers'" +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org1.example.com | [225 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | [0a9 05-20 18:19:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 30a As expected, current configuration has policy '/Channel/Writers'" +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [226 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | [0ab 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30b Manager Channel looking up path [Application]" +peer1.org2.example.com | [10b 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org1.example.com | [227 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.7 +peer0.org2.example.com | [0ac 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer1.org2.example.com | [10c 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [228 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | [0ad 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | [10d 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [10e 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [10f 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 44 d1 17 f8 6e a1 27 65 4c 76 20 a8 36 37 6d |.D...n.'eLv .67m| +peer1.org1.example.com | [229 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | 00000010 79 07 41 6a 34 df 16 78 f7 fa 06 f4 ea c7 11 a4 |y.Aj4..x........| +peer1.org1.example.com | [22a 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30c Manager Channel has managers Consortiums" +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30d Manager Channel has managers Orderer" +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | [110 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 bc 24 37 aa 71 05 6f cc 1b 5c 08 |0D. ..$7.q.o..\.| +peer1.org1.example.com | [22b 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org1.example.com | [22c 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [0c8 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | 00000010 9f e1 a0 f9 72 a5 c4 49 b2 a0 11 a6 42 c7 6e f4 |....r..I....B.n.| +peer1.org1.example.com | [22d 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org1.example.com | [0c9 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +peer0.org1.example.com | [0ca 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.7 +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.7 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | 00000020 2e fa b1 bb 02 20 1b 17 15 12 9f 36 bf 43 0d 62 |..... .....6.C.b| +peer1.org1.example.com | [22e 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org1.example.com | [0cb 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | 00000030 04 eb 47 c3 c4 ab 39 ae 04 6a b9 f5 fd d2 f1 09 |..G...9..j......| +peer1.org1.example.com | [22f 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org1.example.com | [0cc 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30e Manager Channel looking up path [Orderer]" +peer1.org2.example.com | 00000040 0f 1d a9 39 b8 7b |...9.{| +peer1.org1.example.com | [230 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org1.example.com | [0cd 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +peer0.org2.example.com | [0ae 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30f Manager Channel has managers Consortiums" +peer1.org2.example.com | [111 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [231 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [0ce 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +peer1.org2.example.com | [112 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001312d0, header 0xc00261f630 +peer1.org1.example.com | [232 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [0cf 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.7 +peer0.org2.example.com | [0af 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 310 Manager Channel has managers Orderer" +peer1.org2.example.com | [113 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [233 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [0d0 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.7 +peer0.org2.example.com | [0b0 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 311 Manager Channel/Orderer looking up path []" +peer1.org2.example.com | [114 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][c7e88445] processing txid: c7e884455ac2ab8b3b92844e15d737f6e571811f2b14c54b713e5af75f5d0070 +peer1.org1.example.com | [234 05-20 18:19:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer0.org1.example.com | [0d1 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [0b1 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 312 Manager Channel/Orderer has managers OrdererOrg" +peer1.org2.example.com | [115 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][c7e88445] Entry chaincode: name:"cscc" +peer1.org1.example.com | [235 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [0d2 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [0b2 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 313 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer1.org2.example.com | [116 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> INFO [][c7e88445] Entry chaincode: name:"cscc" +peer1.org1.example.com | [236 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [0d3 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.7 +peer0.org2.example.com | [0b5 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 314 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer1.org2.example.com | [117 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [237 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [0d4 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.7" , sending back REGISTERED +peer0.org2.example.com | [0b3 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 315 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer1.org2.example.com | [118 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer1.org1.example.com | [238 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [0d5 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.7" +peer0.org2.example.com | [0b6 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +orderer0.example.com | "2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 316 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer1.org2.example.com | [119 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [239 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [0d6 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.7" +peer0.org2.example.com | [0b4 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.7 +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [common.capabilities] Supported -> DEBU 317 Orderer capability V1_4_2 is supported and is enabled" +peer1.org2.example.com | [11a 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [23a 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [0d7 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.7" +peer0.org2.example.com | [0b7 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [common.capabilities] Supported -> DEBU 318 Channel capability V1_4_3 is supported and is enabled" +peer1.org2.example.com | [11b 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [23b 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [0d8 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0b8 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [orderer.common.server] func1 -> DEBU 319 Executing callback to update root CAs" +peer1.org2.example.com | [11c 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [0d9 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0b9 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.7 +peer1.org1.example.com | [23c 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31a updating root CAs for channel [testchainid]" +peer1.org2.example.com | [11d 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | [0da 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [23d 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31b adding orderer root CAs for MSP [OrdererMSP]" +peer0.org2.example.com | [0ba 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.7" , sending back REGISTERED +peer1.org2.example.com | [11e 05-20 18:20:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [0db 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU [74847802] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [23e 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31c adding app root CAs for MSP [Org1MSP]" +peer0.org2.example.com | [0bb 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.7" +peer1.org2.example.com | [11f 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 44 d1 17 f8 6e a1 27 65 4c 76 20 a8 36 37 6d |.D...n.'eLv .67m| +peer0.org1.example.com | [0dc 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU [74847802] notifying Txid:74847802-de82-4628-be5a-8f13b7a6a6bd, channelID: +peer1.org1.example.com | [23f 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31d adding app root CAs for MSP [Org2MSP]" +peer0.org2.example.com | [0bc 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.7" +peer1.org2.example.com | 00000010 79 07 41 6a 34 df 16 78 f7 fa 06 f4 ea c7 11 a4 |y.Aj4..x........| +peer0.org1.example.com | [0dd 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [240 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002ace980)} +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [fsblkstorage] Next -> DEBU 31e Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org2.example.com | [0bd 05-20 18:19:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.7" +peer1.org2.example.com | [120 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 bc 24 37 aa 71 05 6f cc 1b 5c 08 |0D. ..$7.q.o..\.| +peer0.org1.example.com | [0de 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [241 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [fsblkstorage] newBlockfileStream -> DEBU 31f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [0be 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | 00000010 9f e1 a0 f9 72 a5 c4 49 b2 a0 11 a6 42 c7 6e f4 |....r..I....B.n.| +peer0.org1.example.com | [0df 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org1.example.com | [242 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [243 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [0bf 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0c0 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | 00000020 2e fa b1 bb 02 20 1b 17 15 12 9f 36 bf 43 0d 62 |..... .....6.C.b| +peer0.org1.example.com | [0e0 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org1.example.com | [244 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer0.org2.example.com | [0c1 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU [c8379dc1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 320 Remaining bytes=[22930], Going to peek [8] bytes" +peer1.org2.example.com | 00000030 04 eb 47 c3 c4 ab 39 ae 04 6a b9 f5 fd d2 f1 09 |..G...9..j......| +peer0.org1.example.com | [0e1 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org1.example.com | [245 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer0.org2.example.com | [0c2 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU [c8379dc1] notifying Txid:c8379dc1-8167-4fa6-814b-7d03f3fdedb3, channelID: +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 321 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer1.org2.example.com | 00000040 0f 1d a9 39 b8 7b |...9.{| +peer0.org1.example.com | [0e2 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +peer1.org1.example.com | [246 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer0.org2.example.com | [0c3 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 322 blockbytes [22927] read from file [0]" +peer1.org2.example.com | [121 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [0e3 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org1.example.com | [247 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer0.org2.example.com | [0c4 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 323 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +peer1.org2.example.com | [122 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org1.example.com | [0e4 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org1.example.com | [248 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xfa, 0x23, 0xe2, 0xb8, 0x2a, 0x9a, 0x88, 0xab, 0xe1, 0x10, 0x81, 0xae, 0xa5, 0x6, 0xf5, 0xf1, 0x22, 0x82, 0x0, 0xe, 0x6e, 0x5c, 0x2d, 0x5e, 0xf7, 0xc1, 0x60, 0xa4, 0x8c, 0xf3, 0x4, 0xc7} txOffsets= +peer0.org2.example.com | [0c5 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +orderer0.example.com | "2020-05-20 18:19:46.141 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 324 EvictionSuspicion not set, defaulting to 10m0s" +peer1.org2.example.com | [123 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org1.example.com | [0e5 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer1.org1.example.com | txId=bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5 locPointer=offset=39, bytesLength=28429 +peer1.org1.example.com | ] +peer1.org1.example.com | [249 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to txid-index +peer0.org2.example.com | [0c6 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.7 +peer0.org1.example.com | [0e6 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer1.org1.example.com | [24a 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to blockNumTranNum index +peer0.org2.example.com | [0c7 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer1.org2.example.com | [124 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +orderer0.example.com | "2020-05-20 18:19:46.142 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 325 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +peer0.org1.example.com | [0e7 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org1.example.com | [24b 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +peer0.org2.example.com | [0c8 05-20 18:19:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | [125 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +orderer0.example.com | "2020-05-20 18:19:46.142 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 326 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +peer0.org1.example.com | [0e8 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org1.example.com | [24c 05-20 18:19:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | [126 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer1.org2.example.com | [127 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer1.org2.example.com | [128 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer1.org1.example.com | [24d 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | [129 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org1.example.com | [0e9 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org1.example.com | [24e 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +orderer0.example.com | "2020-05-20 18:19:46.162 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 327 Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | [12a 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org1.example.com | [0ea 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org1.example.com | [24f 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 328 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.7 +peer1.org2.example.com | [12b 05-20 18:20:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org1.example.com | [0eb 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:19:51.331Z grpc.peer_address=172.18.0.8:57896 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=180µs +peer1.org1.example.com | [250 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 329 Appending 0 entries to memory storage" channel=testchainid node=1 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | [12c 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0026af880)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer0.org1.example.com | [0ec 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [253 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] Next -> DEBU 32a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | [12d 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org1.example.com | [0ed 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer1.org1.example.com | [254 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer1.org1.example.com | [251 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | [12e 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org1.example.com | [0ee 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org1.example.com | [255 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [0c9 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +peer1.org2.example.com | [12f 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer0.org1.example.com | [0ef 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:57896 +peer0.org1.example.com | [0f0 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57896 +peer1.org1.example.com | [256 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [0ca 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +peer1.org2.example.com | [130 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] newBlockfileStream -> DEBU 32b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org1.example.com | [0f1 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [257 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer1.org1.example.com | [252 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [0cb 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.7 +peer1.org2.example.com | [131 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer1.org2.example.com | [132 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer0.org1.example.com | [0f2 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [258 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [0cc 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +peer0.org2.example.com | [0cd 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +peer1.org2.example.com | [133 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [259 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [0d0 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +peer1.org2.example.com | [134 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [25a 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32c Remaining bytes=[22930], Going to peek [8] bytes" +peer0.org2.example.com | [0ce 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.7 +peer1.org2.example.com | [135 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [25b 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32d Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [0cf 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.7 +peer1.org2.example.com | [136 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [25c 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32e blockbytes [22927] read from file [0]" +peer0.org2.example.com | [0d1 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [137 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | [25d 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 32f [channel: testchainid] Done creating channel support resources" +peer0.org2.example.com | [0d2 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +peer1.org2.example.com | [138 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | [25e 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 330 Creating system channel msg processor for channel testchainid" +peer0.org2.example.com | [0d3 05-20 18:19:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [139 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | [25f 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] Next -> DEBU 331 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer0.org2.example.com | [0d4 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.7 +peer1.org2.example.com | [13a 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | [260 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] newBlockfileStream -> DEBU 332 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [0d5 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.7" , sending back REGISTERED +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | [261 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 333 Remaining bytes=[22930], Going to peek [8] bytes" +peer0.org2.example.com | [0d6 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.7" +peer1.org2.example.com | [13b 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | [262 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 334 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [0d7 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.7" +peer1.org2.example.com | [13c 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | [263 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +orderer0.example.com | "2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 335 blockbytes [22927] read from file [0]" +peer0.org2.example.com | [0d8 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.7" +peer1.org2.example.com | [13d 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [264 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 19ms (state_validation=5ms block_and_pvtdata_commit=7ms state_commit=4ms) commitHash=[] +peer1.org1.example.com | [265 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +orderer0.example.com | "2020-05-20 18:19:46.164 UTC [orderer.commmon.multichannel] Initialize -> INFO 336 Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +peer0.org2.example.com | [0d9 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [13e 05-20 18:20:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org1.example.com | [0f3 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [266 05-20 18:19:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7443a22c-f714-495d-a612-699168826de5] +orderer0.example.com | "2020-05-20 18:19:46.164 UTC [orderer.consensus.etcdraft] Start -> INFO 337 Starting Raft node" channel=testchainid node=1 +peer0.org2.example.com | [0da 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [13f 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org1.example.com | [0f4 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [267 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +orderer0.example.com | "2020-05-20 18:19:46.164 UTC [orderer.common.cluster] Configure -> INFO 338 Entering, channel: testchainid, nodes: [ID: 2, +peer0.org2.example.com | [0db 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [140 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [141 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [0f5 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer1.org1.example.com | [268 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7443a22c-f714-495d-a612-699168826de5] +orderer0.example.com | Endpoint: orderer1.example.com:7050, +peer0.org2.example.com | [0dc 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU [4766399e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [142 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer1.org1.example.com | [269 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer0.org2.example.com | [0dd 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU [4766399e] notifying Txid:4766399e-0e2c-4006-8f30-7ec9b6729c39, channelID: +peer1.org2.example.com | [143 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer0.org1.example.com | [0f6 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 08 09 e9 92 07 8e 41 64 ee 84 |0E.!........Ad..| +peer1.org1.example.com | [26a 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +peer0.org2.example.com | [0de 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [144 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | 00000010 10 c0 16 ca a4 28 1c 70 75 2c 6c 8e 87 1a f7 4f |.....(.pu,l....O| +peer1.org1.example.com | [26b 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [0df 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [145 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | 00000020 e5 c3 72 9c 37 02 20 67 68 84 9c bb 09 e9 e0 aa |..r.7. gh.......| +peer1.org1.example.com | [26c 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [26d 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [0e0 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [0e1 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org2.example.com | [146 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | 00000030 69 81 3f 1b a6 ff 3f be d7 1d 53 b3 30 65 92 3d |i.?...?...S.0e.=| +peer1.org1.example.com | [26e 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [0e2 05-20 18:19:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org2.example.com | [0e3 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org2.example.com | [147 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [148 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | 00000040 86 b9 b5 a9 e3 0b 44 |......D| +peer1.org1.example.com | [26f 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [0e4 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org2.example.com | [149 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [14a 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [0f7 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57896 +peer1.org1.example.com | [270 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [0e5 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +peer0.org1.example.com | [0f8 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57896 +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer1.org1.example.com | [271 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [0e6 05-20 18:19:48.72 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +peer1.org2.example.com | [14b 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [0f9 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer1.org1.example.com | [272 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [0e7 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org2.example.com | [14c 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [0fa 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org1.example.com | [273 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [0e8 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org2.example.com | [14d 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [0fb 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:57896 disconnected +peer1.org1.example.com | [274 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [0e9 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org2.example.com | [14e 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [0fc 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [275 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [276 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [277 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [0ea 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org2.example.com | [14f 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00281cd00)} +peer0.org1.example.com | [0fd 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:19:59.335Z grpc.peer_address=172.18.0.8:57896 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6161ms +peer1.org1.example.com | [278 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [0eb 05-20 18:19:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org2.example.com | [150 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [0fe 05-20 18:19:49.35 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:19:51.357Z grpc.peer_address=172.18.0.8:57898 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=905.3µs +peer1.org1.example.com | [279 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [0ec 05-20 18:19:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +peer1.org2.example.com | [151 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [0ff 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [27a 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [0ed 05-20 18:19:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 561E47166EB5CFE4CCF98DD074AC5867C77A6BBBFA8BCB1BD1FDE6121FC71B54 +peer0.org2.example.com | [0ee 05-20 18:19:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [0ef 05-20 18:19:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [152 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [100 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer1.org1.example.com | [27b 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [0f0 05-20 18:19:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [153 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +peer0.org1.example.com | [101 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [154 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer0.org2.example.com | [0f1 05-20 18:19:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer0.org1.example.com | [102 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:57898 +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [155 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer0.org2.example.com | [0f2 05-20 18:19:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [103 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57898 +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [156 05-20 18:20:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer0.org2.example.com | [0f3 05-20 18:19:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8336689BC12B8EB65A5A3CEBAFE004759621E1289BA2C78EF5522F082C26A226 +peer0.org2.example.com | [0f4 05-20 18:19:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [0f5 05-20 18:19:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [104 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [157 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xfa, 0x23, 0xe2, 0xb8, 0x2a, 0x9a, 0x88, 0xab, 0xe1, 0x10, 0x81, 0xae, 0xa5, 0x6, 0xf5, 0xf1, 0x22, 0x82, 0x0, 0xe, 0x6e, 0x5c, 0x2d, 0x5e, 0xf7, 0xc1, 0x60, 0xa4, 0x8c, 0xf3, 0x4, 0xc7} txOffsets= +peer0.org2.example.com | [0f6 05-20 18:19:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | txId=bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5 locPointer=offset=39, bytesLength=28429 +peer0.org2.example.com | [0f7 05-20 18:19:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [105 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 36 63 79 cf 1e 7c 56 f1 08 c6 80 |0D. .6cy..|V....| +peer0.org1.example.com | 00000010 6a 6e b3 67 3a 6f 2a 9c a9 45 56 a2 d9 20 af cb |jn.g:o*..EV.. ..| +peer0.org1.example.com | 00000020 d9 f7 64 15 02 20 10 a4 59 b5 61 df 99 ae 6a c8 |..d.. ..Y.a...j.| +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ] +peer0.org2.example.com | [0f8 05-20 18:19:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000030 83 8c f9 b7 fe 8e ba db 02 ef 99 a7 2b c3 09 54 |............+..T| +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [158 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to txid-index +peer0.org2.example.com | [0f9 05-20 18:19:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | 00000040 ae 9a 94 47 b1 74 |...G.t| +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | [159 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to blockNumTranNum index +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +peer0.org2.example.com | [0fa 05-20 18:19:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5A513A38096A4F43949EE95BB61DCF331EEB9D8B09A5A8AA7FB7C5C2032648C7 +peer0.org1.example.com | [106 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57898 +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [15a 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +peer1.org2.example.com | [15b 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org2.example.com | [15c 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org2.example.com | [0fb 05-20 18:19:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [107 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57898 +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | [15d 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer0.org2.example.com | [0fc 05-20 18:19:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [108 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:12637676837674361505 tag:EMPTY mem_req:R@\300\000\261\223o\"\230~\316M\031\004p\373\020\017\361\367\377\312" secret_envelope: > > , Envelope: 1109 bytes, Signature: 0 bytes +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | [15e 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [0fd 05-20 18:19:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [109 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [15f 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer0.org2.example.com | [0fe 05-20 18:19:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [10a 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12637676837674361505 tag:EMPTY mem_req:R@\300\000\261\223o\"\230~\316M\031\004p\373\020\017\361\367\377\312" secret_envelope: > > , Envelope: 1109 bytes, Signature: 0 bytes +peer0.org1.example.com | [10b 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 3a 7f cc 30 86 01 0f 77 52 25 f8 e7 c0 59 ca |.:..0...wR%...Y.| +peer0.org1.example.com | 00000010 0f 37 13 25 18 ec 09 2d 76 b4 64 3b 27 03 1d fe |.7.%...-v.d;'...| +peer0.org1.example.com | [10c 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 14 2d 20 12 7a d4 11 90 01 f0 45 |0D. ..- .z.....E| +peer1.org1.example.com | [27c 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [0ff 05-20 18:19:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161006 +peer0.org1.example.com | 00000010 d0 0b 43 ba 1b 27 0f b9 1f d7 b7 80 7d a3 13 5c |..C..'......}..\| +peer1.org1.example.com | [27d 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [160 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [100 05-20 18:19:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4F127AE8106F48E061748D221039372EDBB9CD4C58F8C5E9070C78F71192A671 +peer0.org1.example.com | 00000020 72 5e bd 2d 02 20 00 a0 90 17 f2 9a cc 68 cb 3e |r^.-. .......h.>| +peer1.org1.example.com | [27e 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [161 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org2.example.com | [101 05-20 18:19:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [102 05-20 18:19:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [103 05-20 18:19:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | 00000030 52 40 c0 00 b1 93 6f 22 98 7e ce 4d 19 04 70 fb |R@....o".~.M..p.| +peer1.org1.example.com | [27f 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [162 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org2.example.com | [104 05-20 18:19:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | 00000040 10 0f f1 f7 ff ca |......| +peer0.org1.example.com | [10d 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [280 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer1.org2.example.com | [163 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [105 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37332 +peer0.org1.example.com | [10e 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab b3 ea ef 20 25 5e a6 cb 7d df |0E.!..... %^..}.| +peer1.org1.example.com | [281 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +peer1.org2.example.com | [164 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org2.example.com | [106 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0026a25f0 +peer0.org1.example.com | 00000010 ee 89 4a 7d 7f 15 7b 72 1c 9a 8f 98 a6 1d 11 e4 |..J}..{r........| +peer1.org1.example.com | [282 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [165 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer0.org2.example.com | [107 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | 00000020 aa 75 95 84 69 02 20 3d 22 4c 77 9e cd 65 03 10 |.u..i. ="Lw..e..| +peer1.org1.example.com | [283 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [166 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [108 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | 00000030 fe d0 33 c5 06 61 bf 9c 30 f2 d2 ac 43 9d 37 14 |..3..a..0...C.7.| +peer1.org1.example.com | [284 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +peer1.org2.example.com | [167 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [109 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 fb 92 2e 28 d5 31 b7 |...(.1.| +peer1.org1.example.com | [285 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [10a 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [168 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [10f 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | [169 05-20 18:20:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [110 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [16a 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [111 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | [16b 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer0.org1.example.com | [112 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org2.example.com | [16c 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer0.org1.example.com | [113 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org2.example.com | [16e 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org1.example.com | [114 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +peer1.org2.example.com | [16d 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [115 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +peer1.org2.example.com | [16f 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer0.org1.example.com | [116 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org2.example.com | [170 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer0.org1.example.com | [117 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +peer1.org2.example.com | [171 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [118 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BC61319887B21DA0240872DAB08DB169BE5C7371B8E0D271155BF818A06D2EEB +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +peer1.org2.example.com | [172 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer0.org1.example.com | [119 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +peer1.org2.example.com | [173 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 25ms (state_validation=1ms block_and_pvtdata_commit=13ms state_commit=5ms) commitHash=[] +peer0.org1.example.com | [11a 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +peer1.org2.example.com | [174 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org1.example.com | [11b 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [286 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [175 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [21464993-fdde-4043-ae46-2410de42903f] +peer0.org1.example.com | [11c 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12637676837674361505, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2203 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [287 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [10b 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +orderer0.example.com | ID: 3, +peer1.org2.example.com | [176 05-20 18:20:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer1.org1.example.com | [288 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [11d 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:R@\300\000\261\223o\"\230~\316M\031\004p\373\020\017\361\367\377\312" secret_envelope: > alive: > +peer0.org2.example.com | [10c 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +orderer0.example.com | Endpoint: orderer2.example.com:7050, +peer1.org2.example.com | [177 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [21464993-fdde-4043-ae46-2410de42903f] +peer1.org1.example.com | [289 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [11e 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12637676837674361505, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2203 bytes, Signature: 0 bytes +peer0.org2.example.com | [10d 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [178 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [28a 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [11f 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +peer1.org2.example.com | [179 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [28b 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [120 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer0.org2.example.com | [10f 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 c1 e5 31 f4 2e 0d a4 04 a4 4e fe 21 17 3a 5b |...1......N.!.:[| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [17a 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [28c 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [121 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 f8 0c 7f dc b4 76 e1 a9 c2 8a 45 b0 46 b8 7a 9b |.....v....E.F.z.| +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org2.example.com | [17b 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [28d 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [122 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [110 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b ad 9a 30 df a0 db 8a f4 94 1d |0E.!....0.......| +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +peer1.org2.example.com | [17c 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [28e 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [123 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 c7 c4 10 81 0e a7 a4 b6 90 a1 04 72 2d 3e a3 01 |...........r->..| +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org2.example.com | [17d 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [28f 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [124 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 4e 84 f6 dc 08 02 20 3c 28 7b aa bb bb 26 bd 2e |N..... <({...&..| +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org2.example.com | [17e 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [290 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [125 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 46 08 49 f2 af 7c 17 56 4c 08 b1 d0 96 c4 fd 07 |F.I..|.VL.......| +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +peer1.org2.example.com | [17f 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [291 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [126 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 b5 6e 20 53 16 61 88 |.n S.a.| +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +peer1.org2.example.com | [180 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [292 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [127 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 17 0f f0 6e dd d4 84 7e c5 5d 11 2d 8d 4b b4 |i...n...~.].-.K.| +peer0.org2.example.com | [111 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org2.example.com | [181 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [293 05-20 18:19:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | 00000010 96 8e cd 96 04 f8 84 55 4e 6d cf 63 57 43 38 ed |.......UNm.cWC8.| +peer0.org2.example.com | [112 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000138c40, header 0xc0026a2f00 +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer1.org2.example.com | [182 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [294 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [128 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 1b 2e 12 eb 83 f9 10 3d 71 4d ed |0D. ^.......=qM.| +peer0.org2.example.com | [113 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +peer1.org2.example.com | [183 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [295 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | 00000010 0d ca 58 33 9a 97 84 66 bb b0 ce ec 3d d1 db 78 |..X3...f....=..x| +peer0.org2.example.com | [114 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [][5c0baed9] processing txid: 5c0baed97132408e98549f7213e5c7256d0dfb0de0476445a9c1acb27b3659bc +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +peer1.org2.example.com | [184 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | 00000020 d4 d3 d0 02 02 20 73 f4 40 7c 9b 6a c2 0b 40 18 |..... s.@|.j..@.| +peer0.org2.example.com | [115 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [][5c0baed9] Entry chaincode: name:"cscc" +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +peer1.org2.example.com | [185 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | 00000030 df ae 7f f5 28 5b 7b b8 85 4c bc a7 58 65 8b 50 |....([{..L..Xe.P| +peer0.org2.example.com | [116 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> INFO [][5c0baed9] Entry chaincode: name:"cscc" +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [186 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | 00000040 eb e3 6f 87 79 34 |..o.y4| +peer0.org2.example.com | [117 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [187 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | [129 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [118 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +peer1.org2.example.com | [188 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [119 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [189 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | [11a 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [12a 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 a1 17 85 1a 87 cc 0f cc 7f |0E.!............| +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer1.org2.example.com | [18a 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | [11b 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | 00000010 32 a1 b8 08 5b 79 26 af 6e b1 61 dd c0 66 83 c4 |2...[y&.n.a..f..| +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | [11c 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | 00000020 74 dc 1e a1 b2 02 20 59 36 25 ec 57 52 b2 8a ca |t..... Y6%.WR...| +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | [11d 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | 00000030 a1 83 19 e0 99 f0 64 a4 61 88 69 6b 4e dc e4 07 |......d.a.ikN...| +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | [11e 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | 00000040 54 af fe 03 75 91 bd |T...u..| +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | [11f 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 c1 e5 31 f4 2e 0d a4 04 a4 4e fe 21 17 3a 5b |...1......N.!.:[| +peer0.org1.example.com | [12b 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | 00000010 f8 0c 7f dc b4 76 e1 a9 c2 8a 45 b0 46 b8 7a 9b |.....v....E.F.z.| +peer0.org1.example.com | [12c 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | nw== +peer0.org2.example.com | [120 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b ad 9a 30 df a0 db 8a f4 94 1d |0E.!....0.......| +peer0.org1.example.com | [12d 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | 00000010 c7 c4 10 81 0e a7 a4 b6 90 a1 04 72 2d 3e a3 01 |...........r->..| +peer0.org1.example.com | [12e 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | [296 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | 00000020 4e 84 f6 dc 08 02 20 3c 28 7b aa bb bb 26 bd 2e |N..... <({...&..| +peer0.org1.example.com | [12f 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [297 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | 00000030 46 08 49 f2 af 7c 17 56 4c 08 b1 d0 96 c4 fd 07 |F.I..|.VL.......| +peer0.org1.example.com | [130 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | [298 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | 00000040 b5 6e 20 53 16 61 88 |.n S.a.| +peer0.org1.example.com | [131 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | [299 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [132 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [121 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +orderer0.example.com | ]" +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | [133 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | [29a 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [122 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +orderer0.example.com | "2020-05-20 18:19:46.164 UTC [orderer.common.cluster] updateStubInMapping -> INFO 339 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | [134 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [29b 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [123 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +orderer0.example.com | "2020-05-20 18:19:46.165 UTC [orderer.common.cluster] updateStubInMapping -> INFO 33a Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [135 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [29c 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [124 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +orderer0.example.com | "2020-05-20 18:19:46.166 UTC [orderer.common.cluster] func1 -> DEBU 33b Connecting to ID: 2, +peer1.org2.example.com | [18b 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [136 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 39E45FEE82E234499BE6219C93047E9610BA21F10E903D2636EBEDADB59BD183 +peer1.org1.example.com | [29d 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [125 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +orderer0.example.com | Endpoint: orderer1.example.com:7050, +peer1.org2.example.com | [18c 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [137 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [29e 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [126 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer1.org2.example.com | [18d 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [138 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [29f 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | [127 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +peer1.org2.example.com | [18e 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [139 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [2a0 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [128 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [18f 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer0.org1.example.com | [13a 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2a1 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [129 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer1.org2.example.com | [190 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [13b 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer1.org1.example.com | [2a2 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [12a 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer1.org2.example.com | [191 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [13c 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a3 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [12b 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org2.example.com | [192 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [13d 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a4 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org2.example.com | [12c 05-20 18:20:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002745760)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org2.example.com | [193 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [13e 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [2a5 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [12d 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +peer1.org2.example.com | [194 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [140 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2a6 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [12e 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [13f 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2a7 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [12f 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [141 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a8 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [130 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [142 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a9 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [131 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [143 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [2aa 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [132 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [144 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC1949D14958F48D0BAE465F9FB22697204D4F21365F9E921B9F54D075BE10A6 +peer1.org1.example.com | [2ab 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [133 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [145 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2ac 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [2ad 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [134 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [146 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2ae 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [135 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | [147 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [2af 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [136 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [2b0 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [137 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2b1 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [138 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | [148 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\350Y\207\202\007r\253\223\270y\254@g\274\013\251\224\354\327X\360\202\252\262\254\027%\317`\332\002 \272\352V\365\324\001\033\227\372r\207\262]\221-\315d\255\267\322\260 > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | [2b2 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [139 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | [149 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\350Y\207\202\007r\253\223\270y\254@g\274\013\251\224\354\327X\360\202\252\262\254\027%\317`\332\002 \272\352V\365\324\001\033\227\372r\207\262]\221-\315d\255\267\322\260 > > , Envelope: 1098 bytes, Signature: 0 bytes +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +peer1.org1.example.com | [2b3 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [13a 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | [14a 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [2b4 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [14b 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer1.org1.example.com | [2b5 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [13b 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [14c 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [195 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer1.org1.example.com | [2b6 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [13c 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org1.example.com | [14d 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [196 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org1.example.com | [2b7 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [13d 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org1.example.com | [14e 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org2.example.com | [197 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [2b8 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer0.org2.example.com | [13e 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org1.example.com | [14f 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [198 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [2b9 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +peer0.org2.example.com | [13f 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org1.example.com | [150 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org2.example.com | [199 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [2ba 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +peer0.org2.example.com | [140 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [151 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 19 49 d1 49 58 f4 8d 0b ae 46 5f 9f b2 26 97 |..I.IX....F_..&.| +peer1.org2.example.com | [19a 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [2bb 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer0.org2.example.com | [141 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | 00000010 20 4d 4f 21 36 5f 9e 92 1b 9f 54 d0 75 be 10 a6 | MO!6_....T.u...| +peer1.org2.example.com | [19b 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [19c 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [2bc 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [142 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [152 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 3e e8 59 87 82 07 72 ab 93 b8 79 |0D. d>.Y...r...y| +peer1.org2.example.com | [19d 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [2bd 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +peer0.org2.example.com | [143 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer1.org2.example.com | [19e 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +peer0.org2.example.com | [144 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [145 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | 00000010 ac 40 67 bc 0b a9 94 ec d7 58 f0 82 aa b2 ac 17 |.@g......X......| +peer1.org1.example.com | [2be 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +peer0.org2.example.com | [146 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | 00000020 25 cf 60 da 02 20 20 ba ea 56 f5 d4 01 1b 97 fa |%.`.. ..V......| +peer1.org2.example.com | [19f 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [147 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [148 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [149 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [14a 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | 00000030 72 87 b2 5d 91 2d cd 64 ad b7 d2 b0 3c 6d bd 29 |r..].-.d.... DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [154 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 9c 88 91 12 09 51 ae 00 d9 8b |0E.!.......Q....| +peer0.org1.example.com | 00000010 23 12 35 86 0a fd 87 49 fe b1 84 b8 e7 2b 4f 34 |#.5....I.....+O4| +peer0.org1.example.com | 00000020 59 85 30 56 ed 02 20 39 2a e0 f9 2f 2e f0 fb 31 |Y.0V.. 9*../...1| +peer0.org1.example.com | 00000030 9c 52 6e aa a7 fd 71 19 58 dc 0f a5 a1 ca b5 8d |.Rn...q.X.......| +peer0.org1.example.com | 00000040 0c d0 c2 84 cb 1d 02 |.......| +peer0.org1.example.com | [155 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [156 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [157 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [158 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 2b ed fd 1c 18 ae a3 35 2a 4d 08 23 53 15 e5 |.+......5*M.#S..| +peer0.org1.example.com | 00000010 5b 73 15 bd 6b 1c 6a 51 75 d6 a9 6d 3d a8 1f 18 |[s..k.jQu..m=...| +peer0.org1.example.com | [159 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 01 79 29 6a b8 c8 ae a5 dc 1f b1 |0D. X.y)j.......| +peer0.org1.example.com | 00000010 43 d3 df 68 00 99 38 fe bc f9 0f 90 a7 67 e7 07 |C..h..8......g..| +peer0.org1.example.com | 00000020 21 83 17 64 02 20 18 b3 2c 27 da 5e 69 95 c9 1b |!..d. ..,'.^i...| +peer0.org1.example.com | 00000030 e9 2f 14 ab 28 0b 9b 94 62 9e 5b ce 15 cb e4 95 |./..(...b.[.....| +peer0.org1.example.com | 00000040 c1 2f 6f 92 e7 6a |./o..j| +peer0.org1.example.com | [15a 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [15b 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 a8 da e0 6b f3 77 4d 66 b0 8e |0E.!.....k.wMf..| +peer0.org1.example.com | 00000010 1d 10 89 8c d3 3e 0b ff c8 b4 37 b0 e0 bf 5b b7 |.....>....7...[.| +peer0.org1.example.com | 00000020 2d bc c8 58 37 02 20 05 2a f6 4b ba 2a 6a 98 56 |-..X7. .*.K.*j.V| +peer0.org1.example.com | 00000030 f0 d0 93 5f dd be 8d 74 21 be 36 9b 7f c6 52 1f |..._...t!.6...R.| +peer0.org1.example.com | 00000040 df 26 3d f8 07 ce 8d |.&=....| +peer1.org1.example.com | [2bf 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [2c0 05-20 18:19:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [2c1 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [2c2 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [2c3 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c4 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [2c5 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [2c6 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [2c7 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [2c8 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2c9 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [2ca 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [2cb 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [2cc 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [2cd 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [2ce 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [2cf 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [2d0 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [2d1 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [2d2 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [2d3 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [2d4 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [2d5 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2020-05-20 18:19:46.169 UTC [grpc] DialContext -> DEBU 33c parsed scheme: """ +orderer0.example.com | "2020-05-20 18:19:46.170 UTC [grpc] DialContext -> DEBU 33d scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2020-05-20 18:19:46.171 UTC [grpc] watcher -> DEBU 33e ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +orderer0.example.com | "2020-05-20 18:19:46.172 UTC [grpc] switchBalancer -> DEBU 33f ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2020-05-20 18:19:46.172 UTC [grpc] HandleSubConnStateChange -> DEBU 340 pickfirstBalancer: HandleSubConnStateChange: 0xc000282220, CONNECTING" +orderer0.example.com | "2020-05-20 18:19:46.173 UTC [orderer.common.cluster] updateStubInMapping -> INFO 341 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer0.example.com | "2020-05-20 18:19:46.173 UTC [orderer.common.cluster] updateStubInMapping -> INFO 342 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-05-20 18:19:46.174 UTC [orderer.common.cluster] func1 -> DEBU 343 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2020-05-20 18:19:46.174 UTC [grpc] DialContext -> DEBU 344 parsed scheme: """ +orderer0.example.com | "2020-05-20 18:19:46.174 UTC [grpc] DialContext -> DEBU 345 scheme "" not registered, fallback to default scheme" +peer1.org2.example.com | [1a0 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [1a1 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [1a2 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [1a3 05-20 18:20:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [1a4 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [1a5 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [1a6 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [1a7 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1a8 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1a9 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1aa 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [1ab 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [1ac 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [1ad 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [1ae 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [1af 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [1b0 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org2.example.com | [1b1 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [1b2 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [1b3 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [1b4 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [1b5 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer1.org2.example.com | [1b6 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [1b7 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [1b8 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [1b9 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [1ba 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [1bb 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [1bc 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [1bd 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [1be 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [1bf 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [1c0 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1c1 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [15c 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [15d 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [15e 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [15f 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [160 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [161 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [162 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [163 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [164 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [165 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:19:46.175 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 346 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2020-05-20 18:19:46.175 UTC [grpc] watcher -> DEBU 347 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +orderer0.example.com | "2020-05-20 18:19:46.175 UTC [grpc] switchBalancer -> DEBU 348 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2020-05-20 18:19:46.175 UTC [grpc] HandleSubConnStateChange -> DEBU 349 pickfirstBalancer: HandleSubConnStateChange: 0xc000282720, CONNECTING" +orderer0.example.com | "2020-05-20 18:19:46.175 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 34a 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2020-05-20 18:19:46.176 UTC [orderer.common.cluster] Configure -> INFO 34b Exiting" +orderer0.example.com | "2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] start -> DEBU 34c Starting raft node: #peers: 3" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] start -> INFO 34d Starting raft node as part of a new channel" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 34e 1 became follower at term 0" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] newRaft -> INFO 34f newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 350 1 became follower at term 1" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.177 UTC [orderer.common.server] Start -> INFO 351 Starting orderer: +orderer0.example.com | Version: 1.4.7 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.13.11 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2020-05-20 18:19:46.177 UTC [orderer.common.server] Start -> INFO 352 Starting cluster listener on [::]:7055" +orderer0.example.com | "2020-05-20 18:19:46.177 UTC [orderer.common.server] Start -> INFO 353 Beginning to serve requests" +orderer0.example.com | "2020-05-20 18:19:46.178 UTC [orderer.consensus.etcdraft] apply -> INFO 354 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.178 UTC [orderer.consensus.etcdraft] apply -> INFO 355 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.178 UTC [orderer.consensus.etcdraft] apply -> INFO 356 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.199 UTC [grpc] HandleSubConnStateChange -> DEBU 357 pickfirstBalancer: HandleSubConnStateChange: 0xc000282720, READY" +orderer0.example.com | "2020-05-20 18:19:46.199 UTC [grpc] HandleSubConnStateChange -> DEBU 358 pickfirstBalancer: HandleSubConnStateChange: 0xc000282220, READY" +orderer0.example.com | "2020-05-20 18:19:46.969 UTC [orderer.common.cluster] Step -> DEBU 359 Connection from orderer2.example.com(172.18.0.3:44052)" +orderer0.example.com | "2020-05-20 18:19:46.969 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:46.969 UTC [orderer.consensus.etcdraft] Step -> INFO 35b 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +peer1.org1.example.com | [2d6 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [2d7 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [2d8 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [2d9 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [2da 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [2db 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [2dc 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [2dd 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [2de 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [2df 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [2e0 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [2e1 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2e2 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [2e3 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [2e4 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [2e5 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [2e6 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [2e7 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [2e8 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [2e9 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2ea 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [2eb 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [2ec 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [2ed 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [2ee 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [2ef 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [2f0 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [2f1 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [2f2 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [2f3 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org1.example.com | [2f4 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer1.org1.example.com | [2f5 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [2f6 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [2f7 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [2f8 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org1.example.com | [2f9 05-20 18:19:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [2fa 05-20 18:19:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [2fb 05-20 18:19:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [2fc 05-20 18:19:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [2fd 05-20 18:19:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [2fe 05-20 18:19:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer1.org1.example.com | [2ff 05-20 18:19:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer1.org1.example.com | [300 05-20 18:19:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer1.org1.example.com | [301 05-20 18:19:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [302 05-20 18:19:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [303 05-20 18:19:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org1.example.com | [304 05-20 18:19:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org1.example.com | [305 05-20 18:19:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer1.org1.example.com | [306 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer1.org1.example.com | [307 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer1.org1.example.com | [308 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [309 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408D09590EEBFEFB38816...387B0008A61A99B98BA4E6D12A020801 +peer1.org1.example.com | [30a 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6BEFF690117491A14958264975515751BE7B80EC5269F63BF19EC33E533D630E +peer1.org1.example.com | [30b 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer1.org1.example.com | [30c 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer1.org1.example.com | [30d 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer1.org1.example.com | [30e 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [30f 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [455b7dcf-0a02-4a00-8d04-24950501d35e] +peer1.org1.example.com | [310 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [311 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [455b7dcf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [166 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [167 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 8b 20 ba 92 a0 89 50 eb 9d 4c 61 de 94 cc db |.. ....P..La....| +peer0.org1.example.com | 00000010 f4 f7 34 4d 4b 05 ce 0e 31 21 15 0c ad a0 87 60 |..4MK...1!.....`| +peer0.org1.example.com | [168 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d fc 6b ec 21 a7 d2 ef 11 3b f5 a4 |0D. ..k.!....;..| +peer0.org1.example.com | 00000010 85 67 b0 3b 68 b7 ac 6e ea 2c 71 fa 3d 45 2c 52 |.g.;h..n.,q.=E,R| +peer0.org1.example.com | 00000020 ce ec 44 1a 02 20 26 81 03 3e 6d 5b 9c ee b7 55 |..D.. &..>m[...U| +peer0.org1.example.com | 00000030 30 f6 4b 8e 2d f3 84 99 b2 e5 34 90 90 f4 3a db |0.K.-.....4...:.| +peer0.org1.example.com | 00000040 45 ca 19 f0 f8 3e |E....>| +peer0.org1.example.com | [169 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [16a 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 22 df ba 48 3f 6f c0 3e 36 45 |0E.!.."..H?o.>6E| +peer0.org1.example.com | 00000010 88 22 31 0e 5c 60 b8 da ba 90 b7 ea f9 0d c8 f4 |."1.\`..........| +peer0.org1.example.com | 00000020 0b 32 c9 08 54 02 20 12 34 ba 82 70 63 4a a9 3c |.2..T. .4..pcJ.<| +peer0.org1.example.com | 00000030 5c b5 2e 9d 47 bc a2 3e c0 fc 53 80 70 95 98 9b |\...G..>..S.p...| +peer0.org1.example.com | 00000040 ab 9c b5 9e e9 e8 2f |....../| +peer0.org1.example.com | [16b 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [16c 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [16d 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [16f 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [170 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [171 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [172 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [173 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [174 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [175 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [176 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [177 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [178 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [179 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A95952BD2B0A0C5F90D492B7AB3DDF4655B6DD33E08B9948B3A7418D4585298B +peer0.org1.example.com | [17a 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [17b 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [17c 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [17d 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [17e 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [17f 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [180 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [181 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer1.org1.example.com:7051 +peer0.org1.example.com | [182 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [183 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [184 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [185 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17945473675397379181, Envelope: 962 bytes, Signature: 0 bytes +peer0.org1.example.com | [186 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +peer0.org1.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +peer0.org1.example.com | [187 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 ae f9 7a e5 d1 ac 53 38 2b b1 |0E.!....z...S8+.| +peer0.org1.example.com | 00000010 a4 cb 80 08 b7 ab 83 46 ae 06 e5 b5 80 70 49 aa |.......F.....pI.| +peer0.org1.example.com | 00000020 ea 8e 39 c1 94 02 20 0a e7 4c 7c 7c a9 d9 3d 86 |..9... ..L||..=.| +peer0.org1.example.com | 00000030 ac 68 b3 6b bb 47 20 35 e4 b9 cd c4 8a b8 3d cb |.h.k.G 5......=.| +orderer0.example.com | "2020-05-20 18:19:46.970 UTC [orderer.common.cluster] NewStream -> DEBU 35c Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-05-20 18:19:46.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35d Sending msg of 28 bytes to 3 on channel testchainid took 68.4µs" +orderer0.example.com | "2020-05-20 18:19:46.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80µs " +orderer0.example.com | "2020-05-20 18:19:46.972 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:46.972 UTC [orderer.consensus.etcdraft] Step -> INFO 360 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.972 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 361 1 became follower at term 2" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.972 UTC [orderer.consensus.etcdraft] Step -> INFO 362 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.973 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 363 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2020-05-20 18:19:46.973 UTC [orderer.common.cluster.step] sendMessage -> DEBU 364 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.2µs " +orderer0.example.com | "2020-05-20 18:19:46.977 UTC [orderer.common.cluster.step] handleMessage -> DEBU 365 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 36" +orderer0.example.com | "2020-05-20 18:19:46.977 UTC [orderer.consensus.etcdraft] run -> INFO 366 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 367 Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" +orderer0.example.com | "2020-05-20 18:19:46.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU 368 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.3µs " +orderer0.example.com | "2020-05-20 18:19:46.978 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 369 Raft leader changed: 0 -> 3" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:46.981 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:46.982 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36b Sending msg of 28 bytes to 3 on channel testchainid took 75.6µs" +orderer0.example.com | "2020-05-20 18:19:46.982 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.2µs " +orderer0.example.com | "2020-05-20 18:19:47.466 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:47.466 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36e Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2020-05-20 18:19:47.467 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.3µs " +orderer0.example.com | "2020-05-20 18:19:47.965 UTC [orderer.common.cluster.step] handleMessage -> DEBU 370 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:47.965 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 371 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +orderer0.example.com | "2020-05-20 18:19:47.966 UTC [orderer.common.cluster.step] sendMessage -> DEBU 372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +orderer0.example.com | "2020-05-20 18:19:48.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU 373 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:48.465 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 374 Sending msg of 28 bytes to 3 on channel testchainid took 573µs" +orderer0.example.com | "2020-05-20 18:19:48.466 UTC [orderer.common.cluster.step] sendMessage -> DEBU 375 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.4µs " +orderer0.example.com | "2020-05-20 18:19:48.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 376 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:48.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 377 Sending msg of 28 bytes to 3 on channel testchainid took 50.7µs" +orderer0.example.com | "2020-05-20 18:19:48.961 UTC [orderer.common.cluster.step] sendMessage -> DEBU 378 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.1µs " +orderer0.example.com | "2020-05-20 18:19:49.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU 379 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:49.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37a Sending msg of 28 bytes to 3 on channel testchainid took 11.8µs" +orderer0.example.com | "2020-05-20 18:19:49.461 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.5µs " +orderer0.example.com | "2020-05-20 18:19:49.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:49.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37d Sending msg of 28 bytes to 3 on channel testchainid took 100.8µs" +orderer0.example.com | "2020-05-20 18:19:49.961 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +orderer0.example.com | "2020-05-20 18:19:50.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:50.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 380 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +orderer0.example.com | "2020-05-20 18:19:50.461 UTC [orderer.common.cluster.step] sendMessage -> DEBU 381 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.2µs " +peer1.org2.example.com | [1c2 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [1c3 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [1c4 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [1c5 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [1c6 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [1c7 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [1c8 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [1c9 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [1ca 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [1cb 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [1cc 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [1cd 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [1ce 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [1cf 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [1d0 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [1d1 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [1d2 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [1d3 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d4 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [1d5 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [1d6 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [1d7 05-20 18:20:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d8 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [1d9 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [1da 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [1db 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [1dc 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [1dd 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [1de 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [1df 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [1e0 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [1e1 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [1e2 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [1e3 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [1e4 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [1e5 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [1e6 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [1e7 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [1e8 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [1e9 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [1ea 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [1eb 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [1ec 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [1ed 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [1ee 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [1ef 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [1f0 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [1f1 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [1f2 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [1f3 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [1f4 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [1f5 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [1f6 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [1f7 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [1f8 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [1f9 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [1fa 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [1fb 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [1fc 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | 00000040 ba 34 00 cf cd be 1f |.4.....| +peer0.org1.example.com | [188 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17945473675397379181, Envelope: 962 bytes, Signature: 0 bytes +peer0.org1.example.com | [189 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [18a 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 2 +peer0.org1.example.com | [18b 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18c 05-20 18:19:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [18d 05-20 18:19:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [18f 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [190 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\022/$\025*\177O\013\022\277(\222\307z\343\310\311u\203\327c\254\201\337\224\244)\357\224\025\002 Y7\276\272,`\030\0054\177s$\270\246\3370\364\t\004\344\342\262\263>\261 > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [191 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [192 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\022/$\025*\177O\013\022\277(\222\307z\343\310\311u\203\327c\254\201\337\224\244)\357\224\025\002 Y7\276\272,`\030\0054\177s$\270\246\3370\364\t\004\344\342\262\263>\261 > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [193 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac ed 57 d1 23 ce 9e 34 60 91 ef 9f f8 ea 2c de |..W.#..4`.....,.| +peer0.org1.example.com | 00000010 ad 16 a4 4a 11 6b 51 c3 a7 42 cc 68 fa 13 d3 21 |...J.kQ..B.h...!| +peer0.org1.example.com | [194 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 3e 12 2f 24 15 2a 7f 4f 0b 12 bf |0D. .>./$.*.O...| +peer0.org1.example.com | 00000010 28 92 c7 7a e3 c8 c9 75 83 d7 63 ac 81 df 94 a4 |(..z...u..c.....| +peer0.org1.example.com | 00000020 29 ef 94 15 02 20 59 37 be ba 2c 60 18 05 34 7f |).... Y7..,`..4.| +peer0.org1.example.com | 00000030 73 24 b8 a6 df 30 f4 09 04 e4 e2 b2 b3 3e b1 3c |s$...0.......>.<| +peer0.org1.example.com | 00000040 66 2c f3 13 83 80 |f,....| +peer0.org1.example.com | [195 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [196 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 a7 fa dc ac 17 0a 15 f5 0b 65 |0E.!...........e| +peer0.org1.example.com | 00000010 62 ef be 76 36 63 ac 33 d8 bd 50 f7 0e 1a 61 91 |b..v6c.3..P...a.| +peer0.org1.example.com | 00000020 e6 ae 5f 13 46 02 20 15 1a 8f 0c df 81 51 b4 90 |.._.F. ......Q..| +peer0.org1.example.com | 00000030 0d f4 e5 ac 9c 47 27 27 17 87 c3 8f e9 0d be 2e |.....G''........| +peer0.org1.example.com | 00000040 dc 95 3f 93 f5 41 1c |..?..A.| +peer0.org1.example.com | [197 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [198 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [199 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [19a 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [19b 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [19c 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19e 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19f 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1a0 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:19:50.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 382 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:50.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 383 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2020-05-20 18:19:50.962 UTC [orderer.common.cluster.step] sendMessage -> DEBU 384 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.7µs " +orderer0.example.com | "2020-05-20 18:19:51.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 385 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:51.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 386 Sending msg of 28 bytes to 3 on channel testchainid took 934.4µs" +orderer0.example.com | "2020-05-20 18:19:51.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU 387 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 885.3µs " +orderer0.example.com | "2020-05-20 18:19:51.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 388 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:51.964 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 389 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2020-05-20 18:19:51.965 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2511ms " +orderer0.example.com | "2020-05-20 18:19:52.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:52.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38c Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +orderer0.example.com | "2020-05-20 18:19:52.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 342.9µs " +orderer0.example.com | "2020-05-20 18:19:52.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:52.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38f Sending msg of 28 bytes to 3 on channel testchainid took 35.5µs" +orderer0.example.com | "2020-05-20 18:19:52.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 390 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.5µs " +orderer0.example.com | "2020-05-20 18:19:53.468 UTC [orderer.common.cluster.step] handleMessage -> DEBU 391 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:53.468 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 392 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2020-05-20 18:19:53.469 UTC [orderer.common.cluster.step] sendMessage -> DEBU 393 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.2µs " +orderer0.example.com | "2020-05-20 18:19:53.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 394 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:53.964 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 395 Sending msg of 28 bytes to 3 on channel testchainid took 94.7µs" +orderer0.example.com | "2020-05-20 18:19:53.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 396 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 665.6µs " +orderer0.example.com | "2020-05-20 18:19:54.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU 397 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:54.462 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 398 Sending msg of 28 bytes to 3 on channel testchainid took 592.4µs" +orderer0.example.com | "2020-05-20 18:19:54.463 UTC [orderer.common.cluster.step] sendMessage -> DEBU 399 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171.8µs " +orderer0.example.com | "2020-05-20 18:19:54.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:54.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39b Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +orderer0.example.com | "2020-05-20 18:19:54.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.9µs " +orderer0.example.com | "2020-05-20 18:19:55.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:55.465 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39e Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +orderer0.example.com | "2020-05-20 18:19:55.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 225.2µs " +orderer0.example.com | "2020-05-20 18:19:55.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:55.962 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a1 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +orderer0.example.com | "2020-05-20 18:19:55.963 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 739.4µs " +orderer0.example.com | "2020-05-20 18:19:56.082 UTC [orderer.common.server] replicateDisabledChains -> DEBU 3a3 No inactive chains to try to replicate" +orderer0.example.com | "2020-05-20 18:19:56.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:56.463 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a5 Sending msg of 28 bytes to 3 on channel testchainid took 99.2µs" +peer1.org1.example.com | [312 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [455b7dcf] notifying Txid:455b7dcf-0a02-4a00-8d04-24950501d35e, channelID:businesschannel +peer1.org1.example.com | [313 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [314 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org1.example.com | [316 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [455b7dcf-0a02-4a00-8d04-24950501d35e] +peer1.org1.example.com | [317 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [318 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [7ed0f069-dcca-4f9c-a26f-e6d56a905fea] +peer1.org1.example.com | [319 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [31a 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org1.example.com | [315 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [31c 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [31b 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [7ed0f069] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [31d 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [7ed0f069] notifying Txid:7ed0f069-dcca-4f9c-a26f-e6d56a905fea, channelID:businesschannel +peer1.org1.example.com | [31e 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [31f 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org1.example.com | [320 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7ed0f069-dcca-4f9c-a26f-e6d56a905fea] +peer1.org1.example.com | [321 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [322 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [0cb41995-916c-40f2-8fae-4434f5869c8c] +peer1.org1.example.com | [323 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [324 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [325 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [0cb41995] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [326 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [0cb41995] notifying Txid:0cb41995-916c-40f2-8fae-4434f5869c8c, channelID:businesschannel +peer1.org1.example.com | [327 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [328 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [329 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0cb41995-916c-40f2-8fae-4434f5869c8c] +peer1.org1.example.com | [32a 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org1.example.com | [32b 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f589e0a7-ed88-4fb5-9396-4c557e0e0d56] +peer1.org1.example.com | [32c 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org1.example.com | [32d 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f589e0a7-ed88-4fb5-9396-4c557e0e0d56] +peer1.org1.example.com | [32e 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [32f 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408D09590EEBFEFB38816...387B0008A61A99B98BA4E6D12A020801 +peer1.org1.example.com | [330 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5F973D69E23E155B0415963585712F636224A80319A6774074975D3A2AFF502 +peer1.org1.example.com | [331 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org1.example.com | [332 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [f70ecd1e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [333 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [f70ecd1e] notifying Txid:f70ecd1e0f247fb88b759b2534bb1777d1e35c9f884ecfb8ebe33e504558ae6e, channelID: +peer1.org1.example.com | [334 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [335 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO [][f70ecd1e] Exit chaincode: name:"cscc" (93ms) +peer1.org1.example.com | [336 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU [][f70ecd1e] Exit +peer1.org1.example.com | [337 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47652 +peer1.org1.example.com | [338 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47652 grpc.code=OK grpc.call_duration=99.4098ms +peer1.org1.example.com | [339 05-20 18:19:59.93 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [33a 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [33b 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [33c 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [33d 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33e 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [33f 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [340 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [341 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [342 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [343 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161009 +peer1.org1.example.com | [344 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 59414186AA6508610469FEFB6F7CFEEB5D1198DE46CC8D302B4BB73463193665 +peer1.org1.example.com | [345 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1a1 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\022/$\025*\177O\013\022\277(\222\307z\343\310\311u\203\327c\254\201\337\224\244)\357\224\025\002 Y7\276\272,`\030\0054\177s$\270\246\3370\364\t\004\344\342\262\263>\261 > alive: > +peer0.org1.example.com | [1a2 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a3 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a4 05-20 18:19:56.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1a5 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a6 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a7 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a8 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1a9 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [1aa 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F82B7271D8DE868ECDEAC699556B0E4C6D6AF94C0683BE7BC48EF821A108DFE7 +peer0.org1.example.com | [1ab 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1ac 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1ad 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1ae 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\333\233\313\253\362\270|\3622\244\233\274\365'" > > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1af 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\333\233\313\253\362\270|\3622\244\233\274\365'" > > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b0 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:19:56.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 542.2µs " +orderer0.example.com | "2020-05-20 18:19:56.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:56.962 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a8 Sending msg of 28 bytes to 3 on channel testchainid took 35.4µs" +orderer0.example.com | "2020-05-20 18:19:56.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.527ms " +orderer0.example.com | "2020-05-20 18:19:57.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3aa Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:57.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 401.6µs " +orderer0.example.com | "2020-05-20 18:19:57.463 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3ac Sending msg of 28 bytes to 3 on channel testchainid took 136.5µs" +orderer0.example.com | "2020-05-20 18:19:57.710 UTC [orderer.common.server] Deliver -> DEBU 3ad Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:19:57.710 UTC [common.deliver] Handle -> DEBU 3ae Starting new deliver loop for 172.18.0.9:53410" +orderer0.example.com | "2020-05-20 18:19:57.710 UTC [common.deliver] Handle -> DEBU 3af Attempting to read seek info message from 172.18.0.9:53410" +orderer0.example.com | "2020-05-20 18:19:57.738 UTC [orderer.common.server] Broadcast -> DEBU 3b0 Starting new Broadcast handler" +orderer0.example.com | "2020-05-20 18:19:57.738 UTC [orderer.common.broadcast] Handle -> DEBU 3b1 Starting new broadcast loop for 172.18.0.9:53412" +orderer0.example.com | "2020-05-20 18:19:57.744 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 3b2 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:53412" +orderer0.example.com | "2020-05-20 18:19:57.744 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3b3 Processing config update tx with system channel message processor for channel ID businesschannel" +orderer0.example.com | "2020-05-20 18:19:57.744 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3b4 Processing channel create tx for channel businesschannel on system channel testchainid" +orderer0.example.com | "2020-05-20 18:19:57.745 UTC [common.channelconfig] NewStandardValues -> DEBU 3b5 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:19:57.745 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b6 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:57.745 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b7 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:57.745 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b8 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:57.746 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b9 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:19:57.746 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ba Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.747 UTC [common.channelconfig] NewStandardValues -> DEBU 3bb Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:19:57.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bc Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:19:57.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bd Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:19:57.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3be Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:57.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bf Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:19:57.748 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c0 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:57.748 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c1 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.749 UTC [common.channelconfig] NewStandardValues -> DEBU 3c2 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.749 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c3 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:19:57.749 UTC [common.channelconfig] NewStandardValues -> DEBU 3c4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.749 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c5 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.750 UTC [common.channelconfig] validateMSP -> DEBU 3c6 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.750 UTC [msp] newBccspMsp -> DEBU 3c7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.750 UTC [msp] New -> DEBU 3c8 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.751 UTC [msp] Setup -> DEBU 3c9 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:57.751 UTC [msp.identity] newIdentity -> DEBU 3ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.752 UTC [common.channelconfig] NewStandardValues -> DEBU 3cb Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:19:57.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cc Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:19:57.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cd Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.753 UTC [common.channelconfig] NewStandardValues -> DEBU 3ce Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cf Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:19:57.753 UTC [common.channelconfig] NewStandardValues -> DEBU 3d0 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d1 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.753 UTC [common.channelconfig] Validate -> DEBU 3d2 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-05-20 18:19:57.754 UTC [common.channelconfig] validateMSP -> DEBU 3d3 Setting up MSP for org Org2MSP" +peer1.org2.example.com | [1fd 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [1fe 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [1ff 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [200 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [201 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [202 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org2.example.com | [203 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer1.org2.example.com | [204 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [205 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [206 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [207 05-20 18:20:00.47 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org2.example.com | [208 05-20 18:20:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [209 05-20 18:20:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [20a 05-20 18:20:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [20b 05-20 18:20:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [20c 05-20 18:20:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [20d 05-20 18:20:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer1.org2.example.com | [20e 05-20 18:20:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer1.org2.example.com | [20f 05-20 18:20:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer1.org2.example.com | [210 05-20 18:20:00.51 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [211 05-20 18:20:00.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [212 05-20 18:20:00.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org2.example.com | [213 05-20 18:20:00.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org2.example.com | [214 05-20 18:20:00.51 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer1.org2.example.com | [215 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer1.org2.example.com | [216 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer1.org2.example.com | [217 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [218 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F8B6E8FEC1EFB38816...A55D1049CA35F5343DC503CE2A020801 +peer1.org2.example.com | [219 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 27EF0D1B1A20A23B3EB685A535E2CA88B70BBB79F3939304C8B14FE3BDB218CE +peer1.org2.example.com | [21a 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer1.org2.example.com | [21b 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer1.org2.example.com | [21c 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer1.org2.example.com | [21d 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [21e 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [21f 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [220 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5d1fa6be-7201-49f4-ab75-81257941febd] +peer1.org2.example.com | [221 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [222 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1fa6be] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [223 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [5d1fa6be] notifying Txid:5d1fa6be-7201-49f4-ab75-81257941febd, channelID:businesschannel +peer1.org2.example.com | [224 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [225 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [226 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5d1fa6be-7201-49f4-ab75-81257941febd] +peer1.org2.example.com | [227 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [228 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [897ac420-07d9-4f88-9f78-d0c6e32f8ea7] +peer1.org2.example.com | [229 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [22a 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | [22b 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [897ac420] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [22c 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [897ac420] notifying Txid:897ac420-07d9-4f88-9f78-d0c6e32f8ea7, channelID:businesschannel +peer1.org2.example.com | [22d 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [22e 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org2.example.com | [22f 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [897ac420-07d9-4f88-9f78-d0c6e32f8ea7] +peer1.org2.example.com | [230 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [231 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [63f93402-d83f-4691-9500-61b12326f016] +peer1.org2.example.com | [232 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [233 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [234 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [63f93402] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [235 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [63f93402] notifying Txid:63f93402-d83f-4691-9500-61b12326f016, channelID:businesschannel +peer1.org2.example.com | [236 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [237 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [238 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [63f93402-d83f-4691-9500-61b12326f016] +orderer0.example.com | "2020-05-20 18:19:57.754 UTC [msp] newBccspMsp -> DEBU 3d4 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.754 UTC [msp] New -> DEBU 3d5 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.754 UTC [msp] Setup -> DEBU 3d6 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.755 UTC [msp.identity] newIdentity -> DEBU 3d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.755 UTC [common.channelconfig] NewStandardValues -> DEBU 3d8 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.755 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d9 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:19:57.756 UTC [common.channelconfig] NewStandardValues -> DEBU 3da Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.756 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3db Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.756 UTC [common.channelconfig] Validate -> DEBU 3dc Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-05-20 18:19:57.756 UTC [common.channelconfig] validateMSP -> DEBU 3dd Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.756 UTC [msp] newBccspMsp -> DEBU 3de Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.757 UTC [msp] New -> DEBU 3df Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.757 UTC [msp] Setup -> DEBU 3e0 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.757 UTC [msp.identity] newIdentity -> DEBU 3e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.759 UTC [msp] Setup -> DEBU 3e2 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:19:57.759 UTC [msp] Setup -> DEBU 3e3 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:19:57.759 UTC [policies] NewManagerImpl -> DEBU 3e4 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.760 UTC [policies] NewManagerImpl -> DEBU 3e5 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.760 UTC [policies] NewManagerImpl -> DEBU 3e6 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.760 UTC [policies] NewManagerImpl -> DEBU 3e7 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3e8 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3e9 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3ea Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3eb Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3ec Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3ed Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3ee Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3ef Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f0 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f1 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f2 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f3 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.762 UTC [policies] GetPolicy -> DEBU 3f4 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f5 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:19:57.763 UTC [policies] GetPolicy -> DEBU 3f6 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:19:57.763 UTC [policies] NewManagerImpl -> DEBU 3f7 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:19:57.763 UTC [policies] GetPolicy -> DEBU 3f8 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:57.764 UTC [policies] NewManagerImpl -> DEBU 3f9 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:19:57.764 UTC [common.configtx] addToMap -> DEBU 3fa Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:57.764 UTC [common.configtx] addToMap -> DEBU 3fb Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.765 UTC [common.configtx] addToMap -> DEBU 3fc Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.765 UTC [common.configtx] addToMap -> DEBU 3fd Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:19:57.765 UTC [common.configtx] addToMap -> DEBU 3fe Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:57.765 UTC [common.configtx] addToMap -> DEBU 3ff Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 400 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 401 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 402 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 403 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 404 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 405 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 406 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 407 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 408 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 409 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 40a Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 40b Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 40c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 40d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 40e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 40f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 410 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 411 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 412 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 413 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 414 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:57.769 UTC [common.configtx] addToMap -> DEBU 415 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.769 UTC [common.configtx] addToMap -> DEBU 416 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer1.org1.example.com | [346 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [347 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [348 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [349 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [34a 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34b 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes +peer1.org1.example.com | [34c 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes +peer1.org1.example.com | [34d 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34e 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes +peer1.org1.example.com | [34f 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [350 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 41 41 86 aa 65 08 61 04 69 fe fb 6f 7c fe eb |YAA..e.a.i..o|..| +peer1.org1.example.com | 00000010 5d 11 98 de 46 cc 8d 30 2b 4b b7 34 63 19 36 65 |]...F..0+K.4c.6e| +peer1.org1.example.com | [351 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 5b 25 b4 2f 11 46 97 d5 a2 e9 |0E.!..[%./.F....| +peer1.org1.example.com | 00000010 cc 84 7c f7 7b c8 4f 6d 80 2c 19 21 72 71 02 1e |..|.{.Om.,.!rq..| +peer1.org1.example.com | 00000020 64 76 43 a6 a0 02 20 61 c2 7e 36 e7 8d 91 c6 07 |dvC... a.~6.....| +peer1.org1.example.com | 00000030 73 af 67 ca 01 46 2a d9 86 e5 cb 68 c2 1d 6a c8 |s.g..F*....h..j.| +peer1.org1.example.com | 00000040 f2 a3 fa bd 94 34 1d |.....4.| +peer1.org1.example.com | [352 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [353 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 58 67 31 2a 17 9a 9e 54 af 00 |0E.!..Xg1*...T..| +peer1.org1.example.com | 00000010 10 9b e2 4f 30 58 b0 a4 17 b0 54 4e cf 9b e8 d5 |...O0X....TN....| +peer1.org1.example.com | 00000020 be df 31 ff d2 02 20 5c ed 38 53 26 4f 27 d3 82 |..1... \.8S&O'..| +peer1.org1.example.com | 00000030 54 b7 cc 52 39 7f 43 f0 0d e2 1d b5 3d 52 ce d7 |T..R9.C.....=R..| +peer1.org1.example.com | 00000040 2f f5 3a b9 98 10 b7 |/.:....| +peer1.org1.example.com | [354 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [355 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [356 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [357 05-20 18:20:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [358 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [359 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [35a 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [35b 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [35c 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35d 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\320\333\256\304>m\016\321~\334\035\301\363L\230M\316\201\0043a\346\206\002 v2\372\007\177H\214\305^\244\002L\312\227\300qq\304\234\220\005\315\345\361\252\365\264\325\327\275u\201" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [239 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org2.example.com | [23a 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [78302201-56e7-4822-b62d-aea08ec5de94] +peer1.org2.example.com | [23b 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org2.example.com | [23c 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [78302201-56e7-4822-b62d-aea08ec5de94] +peer1.org2.example.com | [23d 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [23e 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F8B6E8FEC1EFB38816...A55D1049CA35F5343DC503CE2A020801 +peer1.org2.example.com | [23f 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8E8EFBE7F5B6980D51EEA9CC85E223B5DFEEB6320A3CB19C7D383D3207E11F3F +peer1.org2.example.com | [240 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org2.example.com | [241 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [c7e88445] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [242 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [c7e88445] notifying Txid:c7e884455ac2ab8b3b92844e15d737f6e571811f2b14c54b713e5af75f5d0070, channelID: +peer1.org2.example.com | [243 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [244 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO [][c7e88445] Exit chaincode: name:"cscc" (131ms) +peer1.org2.example.com | [245 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU [][c7e88445] Exit +peer1.org2.example.com | [246 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:33256 +peer1.org2.example.com | [247 05-20 18:20:00.52 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33256 grpc.code=OK grpc.call_duration=136.3789ms +peer1.org2.example.com | [248 05-20 18:20:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [249 05-20 18:20:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24a 05-20 18:20:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161007 +peer1.org2.example.com | [24b 05-20 18:20:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 783D4EB510CCB3EDABFC24E9FF47DE18AFCA58384164B744C321910384B8B2AD +peer1.org2.example.com | [24c 05-20 18:20:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24d 05-20 18:20:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [24e 05-20 18:20:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [24f 05-20 18:20:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting, peers found 0 +peer1.org2.example.com | [250 05-20 18:20:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [251 05-20 18:20:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [252 05-20 18:20:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [253 05-20 18:20:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [254 05-20 18:20:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...7482120C08C4828393C2EFB388161001 +peer1.org2.example.com | [255 05-20 18:20:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F74D56C58203835C81CE47C1FEF50395BB712E15F3ECEA3631B4A505942DC97C +peer1.org2.example.com | [256 05-20 18:20:01.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [257 05-20 18:20:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:33264 +peer1.org2.example.com | [258 05-20 18:20:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00284ee60 +peer1.org2.example.com | [259 05-20 18:20:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [25a 05-20 18:20:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [25b 05-20 18:20:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [25c 05-20 18:20:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [25d 05-20 18:20:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a f5 e0 b0 4f a2 43 77 3a d9 f5 23 d4 10 76 da |....O.Cw:..#..v.| +peer1.org2.example.com | 00000010 f7 ec 87 55 45 1c 76 de 92 01 65 3c e8 e6 1b 49 |...UE.v...e<...I| +peer1.org2.example.com | [25e 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 97 9c fd f7 a2 ad 0d cc 6f 2f 61 |0D. h........o/a| +peer1.org2.example.com | 00000010 fb 15 ee 44 a6 68 42 e5 45 60 1f 64 cc e6 3e c3 |...D.hB.E`.d..>.| +peer1.org2.example.com | 00000020 d2 1a 0a a8 02 20 26 d6 10 77 ec 57 93 1d e7 00 |..... &..w.W....| +peer1.org2.example.com | 00000030 b9 7a 3e 45 2d dd b2 77 b5 2d 4f a8 36 4e f1 76 |.z>E-..w.-O.6N.v| +peer1.org2.example.com | 00000040 25 2d ff b1 fd 98 |%-....| +peer1.org2.example.com | [25f 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [260 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001144d0, header 0xc00284f270 +peer1.org2.example.com | [261 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [262 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU [][8229f2de] processing txid: 8229f2def4f94dd38a1f79f5370ac85f3ff6234910979fd85395cbdcbc74c34c +peer1.org2.example.com | [263 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU [][8229f2de] Entry chaincode: name:"cscc" +peer1.org2.example.com | [264 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> INFO [][8229f2de] Entry chaincode: name:"cscc" +peer1.org2.example.com | [265 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [266 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [267 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [268 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [1b1 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b2 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b3 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b4 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b5 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b6 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b7 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 2b 72 71 d8 de 86 8e cd ea c6 99 55 6b 0e 4c |.+rq........Uk.L| +peer0.org1.example.com | 00000010 6d 6a f9 4c 06 83 be 7b c4 8e f8 21 a1 08 df e7 |mj.L...{...!....| +peer0.org1.example.com | [1b8 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 a8 3f 06 fb e9 0a 21 a2 65 41 ba |0D. %.?....!.eA.| +peer0.org1.example.com | 00000010 e0 60 9d 93 8e 99 4c a7 9a f2 64 2e dd 26 d7 f4 |.`....L...d..&..| +peer0.org1.example.com | 00000020 89 dc cf 95 02 20 04 fe 65 20 e9 fc 46 e4 71 2d |..... ..e ..F.q-| +peer0.org1.example.com | 00000030 1c 2f 71 bb 9a 87 95 2b c7 52 34 86 11 1b 5d 96 |./q....+.R4...].| +peer0.org1.example.com | 00000040 07 55 ae c3 52 e1 |.U..R.| +peer0.org1.example.com | [1b9 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1ba 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a d4 28 f5 7a 34 c5 05 64 98 fd |0E.!...(.z4..d..| +peer0.org1.example.com | 00000010 8d 5a c1 c1 fe da 5f e8 5c 12 5e 20 8d 84 cc e4 |.Z...._.\.^ ....| +peer0.org1.example.com | 00000020 fb 52 70 b4 1b 02 20 13 82 ba be 77 e9 39 bc c9 |.Rp... ....w.9..| +peer0.org1.example.com | 00000030 55 f8 a9 53 f2 93 16 68 3e db 9b cb ab f2 b8 7c |U..S...h>......|| +peer0.org1.example.com | 00000040 f2 32 a4 9b bc f5 27 |.2....'| +peer0.org1.example.com | [1bb 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1bc 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1bd 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1c0 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c1 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1c2 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1c3 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 45 7b 4b 12 0d c8 d7 08 f2 be 72 c9 fb f4 c9 |.E{K.......r....| +peer0.org1.example.com | 00000010 d8 2a ef 81 33 d0 18 a9 d4 e8 00 59 8f d5 2b 4d |.*..3......Y..+M| +peer0.org1.example.com | [1c4 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d a7 fb f6 33 22 d3 9d 10 22 50 6b |0D. ]...3"..."Pk| +peer0.org1.example.com | 00000010 d6 49 52 9d d4 37 e6 a3 f8 3d 70 68 7b db 89 05 |.IR..7...=ph{...| +peer0.org1.example.com | 00000020 5f 00 d5 fa 02 20 6a 33 ca 3b b5 85 e6 5d 46 d4 |_.... j3.;...]F.| +peer0.org1.example.com | 00000030 ae 16 c4 8d ee a5 87 b0 24 b9 dd b5 f3 a9 44 54 |........$.....DT| +peer0.org1.example.com | 00000040 b7 93 be c8 d5 3b |.....;| +peer0.org1.example.com | [1c5 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [14b 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [14c 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [14d 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [14e 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [14f 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0028489c0)} +peer0.org2.example.com | [150 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [151 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [152 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [153 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer0.org2.example.com | [154 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer0.org2.example.com | [155 05-20 18:20:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer0.org2.example.com | [156 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer0.org2.example.com | [157 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xfa, 0x23, 0xe2, 0xb8, 0x2a, 0x9a, 0x88, 0xab, 0xe1, 0x10, 0x81, 0xae, 0xa5, 0x6, 0xf5, 0xf1, 0x22, 0x82, 0x0, 0xe, 0x6e, 0x5c, 0x2d, 0x5e, 0xf7, 0xc1, 0x60, 0xa4, 0x8c, 0xf3, 0x4, 0xc7} txOffsets= +peer0.org2.example.com | txId=bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5 locPointer=offset=39, bytesLength=28429 +peer0.org2.example.com | ] +peer0.org2.example.com | [158 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to txid-index +peer0.org2.example.com | [159 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to blockNumTranNum index +peer0.org2.example.com | [15a 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +peer0.org2.example.com | [15b 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer0.org2.example.com | [15c 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org2.example.com | [15d 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer0.org2.example.com | [15e 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [15f 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer0.org2.example.com | [160 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org2.example.com | [161 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [162 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org2.example.com | [163 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [164 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer0.org2.example.com | [165 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [166 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org2.example.com | [167 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [168 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [169 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [16a 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [16b 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer0.org2.example.com | [16c 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer0.org2.example.com | [16d 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org2.example.com | [16e 05-20 18:20:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [16f 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer0.org2.example.com | [170 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer0.org2.example.com | [171 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [172 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer0.org2.example.com | [173 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=3ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[] +peer0.org2.example.com | [174 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org2.example.com | [175 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [503da026-d77b-4539-84ca-4917cafe6245] +peer0.org2.example.com | [176 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer0.org2.example.com | [177 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [503da026-d77b-4539-84ca-4917cafe6245] +peer0.org2.example.com | [178 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [179 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [17a 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [17b 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [17c 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [17d 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [17e 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [17f 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [180 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [181 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [182 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [183 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [184 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [185 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [186 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [187 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [188 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [189 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [18a 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [18b 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [18c 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [18d 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [18e 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [18f 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [190 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [191 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [192 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [193 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [194 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [195 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org2.example.com | [196 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [197 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [198 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [199 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [19a 05-20 18:20:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [269 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [26a 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a f5 e0 b0 4f a2 43 77 3a d9 f5 23 d4 10 76 da |....O.Cw:..#..v.| +peer1.org2.example.com | 00000010 f7 ec 87 55 45 1c 76 de 92 01 65 3c e8 e6 1b 49 |...UE.v...e<...I| +peer1.org2.example.com | [26b 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 97 9c fd f7 a2 ad 0d cc 6f 2f 61 |0D. h........o/a| +peer1.org2.example.com | 00000010 fb 15 ee 44 a6 68 42 e5 45 60 1f 64 cc e6 3e c3 |...D.hB.E`.d..>.| +peer1.org2.example.com | 00000020 d2 1a 0a a8 02 20 26 d6 10 77 ec 57 93 1d e7 00 |..... &..w.W....| +peer1.org2.example.com | 00000030 b9 7a 3e 45 2d dd b2 77 b5 2d 4f a8 36 4e f1 76 |.z>E-..w.-O.6N.v| +peer1.org2.example.com | 00000040 25 2d ff b1 fd 98 |%-....| +peer1.org2.example.com | [26c 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU [8229f2de] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [26d 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU [8229f2de] notifying Txid:8229f2def4f94dd38a1f79f5370ac85f3ff6234910979fd85395cbdcbc74c34c, channelID: +peer1.org2.example.com | [26e 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [26f 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> INFO [][8229f2de] Exit chaincode: name:"cscc" (2ms) +peer1.org2.example.com | [270 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU [][8229f2de] Exit +peer1.org2.example.com | [271 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:33264 +peer1.org2.example.com | [272 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33264 grpc.code=OK grpc.call_duration=8.884ms +peer1.org2.example.com | [273 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:33264: read: connection reset by peer +peer1.org2.example.com | [274 05-20 18:20:01.57 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [275 05-20 18:20:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:33272 +peer1.org2.example.com | [276 05-20 18:20:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00284fe50 +peer1.org2.example.com | [277 05-20 18:20:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [278 05-20 18:20:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [279 05-20 18:20:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [27a 05-20 18:20:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [27b 05-20 18:20:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 c0 75 03 bb 69 22 cb 62 b6 15 bc 2f 50 43 17 |..u..i".b.../PC.| +peer1.org2.example.com | 00000010 83 83 43 75 2e c9 54 16 06 2c 32 09 cc 74 8e 74 |..Cu..T..,2..t.t| +peer1.org2.example.com | [27c 05-20 18:20:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 ab 3a 99 43 b9 8e a2 ed a7 31 ca |0D. q.:.C.....1.| +peer1.org2.example.com | 00000010 04 f4 fc a3 05 78 ca 72 d2 cc 8a bc e4 67 f7 f3 |.....x.r.....g..| +peer1.org2.example.com | 00000020 73 5a c9 c1 02 20 46 db 3c 5b d6 70 5f c9 e1 7c |sZ... F.<[.p_..|| +peer1.org2.example.com | 00000030 3f 1e 73 23 01 dd fa 57 3c 53 09 d9 20 41 46 8f |?.s#...W DEBU exits successfully +peer1.org2.example.com | [27e 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000114a80, header 0xc002fc0280 +peer1.org2.example.com | [27f 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org2.example.com | [280 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU [][50eb8231] processing txid: 50eb8231c16573ac4ef41fa240280cf49d751bede63ca2878048f2690c258efb +peer1.org2.example.com | [281 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU [][50eb8231] Entry chaincode: name:"qscc" +peer1.org2.example.com | [282 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> INFO [][50eb8231] Entry chaincode: name:"qscc" +peer1.org2.example.com | [283 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [284 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org2.example.com | [285 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org2.example.com | [286 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [287 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [288 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [289 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [28a 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28b 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [28c 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f974c0 gate 1589998802672049800 evaluation starts +peer1.org2.example.com | [28d 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f974c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28e 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f974c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [28f 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [290 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [291 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [292 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f974c0 principal matched by identity 0 +peer1.org2.example.com | [293 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 c0 75 03 bb 69 22 cb 62 b6 15 bc 2f 50 43 17 |..u..i".b.../PC.| +peer1.org2.example.com | 00000010 83 83 43 75 2e c9 54 16 06 2c 32 09 cc 74 8e 74 |..Cu..T..,2..t.t| +peer1.org2.example.com | [294 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 ab 3a 99 43 b9 8e a2 ed a7 31 ca |0D. q.:.C.....1.| +peer1.org2.example.com | 00000010 04 f4 fc a3 05 78 ca 72 d2 cc 8a bc e4 67 f7 f3 |.....x.r.....g..| +peer1.org2.example.com | 00000020 73 5a c9 c1 02 20 46 db 3c 5b d6 70 5f c9 e1 7c |sZ... F.<[.p_..|| +peer1.org2.example.com | 00000030 3f 1e 73 23 01 dd fa 57 3c 53 09 d9 20 41 46 8f |?.s#...W DEBU 0xc002f974c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [296 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f974c0 gate 1589998802672049800 evaluation succeeds +peer1.org2.example.com | [297 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [298 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [299 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29a 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [29b 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU [50eb8231] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [29c 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU [50eb8231] notifying Txid:50eb8231c16573ac4ef41fa240280cf49d751bede63ca2878048f2690c258efb, channelID: +peer1.org2.example.com | [29d 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [29e 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> INFO [][50eb8231] Exit chaincode: name:"qscc" (4ms) +peer1.org2.example.com | [29f 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU [][50eb8231] Exit +peer1.org2.example.com | [2a0 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:33272 +peer1.org2.example.com | [2a1 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33272 grpc.code=OK grpc.call_duration=5.4017ms +peer1.org2.example.com | [2a2 05-20 18:20:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2a3 05-20 18:20:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2a4 05-20 18:20:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161008 +peer1.org2.example.com | [2a5 05-20 18:20:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BFA555E6AEC452333401D8196D85406B3EF90D6E5314145174CC83F18F78B789 +peer1.org2.example.com | [2a6 05-20 18:20:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2a7 05-20 18:20:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2a8 05-20 18:20:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2a9 05-20 18:20:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2aa 05-20 18:20:04.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2ab 05-20 18:20:04.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161009 +peer1.org2.example.com | [2ac 05-20 18:20:04.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B65C2A8DD46BA8099381F22B28550784F9678EA5F0E0AB8849DB600CF6A3145 +peer1.org2.example.com | [2ad 05-20 18:20:04.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2ae 05-20 18:20:04.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2af 05-20 18:20:04.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2b0 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2b1 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> INFO 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Becoming a leader +peer1.org2.example.com | [2b2 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer1.org2.example.com | [2b3 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer1.org2.example.com | [2b4 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2b5 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [2b6 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2b8 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610021801 +peer1.org2.example.com | [2b9 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E0FF9A7ABEE72F5E948E9FBB8DF3F0114171BF4BE3FD81B1E3B2E6A68AEEF4A2 +peer1.org2.example.com | [2b7 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer1.org2.example.com | [2ba 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2bb 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [2bc 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [2bd 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }] +peer1.org2.example.com | [2be 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [2bf 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003011e40, CONNECTING +peer1.org2.example.com | [2c0 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003011e40, READY +peer1.org2.example.com | [2c1 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer2.example.com:7050 [OrdererMSP]} +peer1.org2.example.com | [2c2 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer2.example.com:7050 +peer1.org2.example.com | [2c3 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer2.example.com:7050 ... +peer1.org2.example.com | [2c4 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer1.org2.example.com | [2c5 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +orderer0.example.com | "2020-05-20 18:19:57.769 UTC [common.configtx] addToMap -> DEBU 417 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:57.770 UTC [common.configtx] addToMap -> DEBU 418 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.771 UTC [common.configtx] addToMap -> DEBU 419 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:57.771 UTC [common.configtx] addToMap -> DEBU 41a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:57.772 UTC [common.configtx] addToMap -> DEBU 41b Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:19:57.775 UTC [common.configtx] addToMap -> DEBU 41c Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:57.775 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:57.775 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:19:57.775 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:57.777 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.777 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.777 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.777 UTC [common.configtx] addToMap -> DEBU 429 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42a Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42b Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42c Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42e Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.779 UTC [common.configtx] addToMap -> DEBU 42f Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:57.779 UTC [common.configtx] addToMap -> DEBU 430 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:19:57.780 UTC [common.configtx] verifyDeltaSet -> DEBU 431 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.780 UTC [common.configtx] policyForItem -> DEBU 432 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:57.780 UTC [policies] Manager -> DEBU 433 Manager Channel looking up path []" +orderer0.example.com | "2020-05-20 18:19:57.780 UTC [policies] Manager -> DEBU 434 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:19:57.780 UTC [policies] Manager -> DEBU 435 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 436 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 437 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 438 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 439 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 43a Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 43b Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Evaluate -> DEBU 43c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Evaluate -> DEBU 43d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [policies] Evaluate -> DEBU 43e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:19:57.781 UTC [msp] DeserializeIdentity -> DEBU 43f Obtaining identity" +orderer0.example.com | "2020-05-20 18:19:57.782 UTC [msp.identity] newIdentity -> DEBU 440 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.782 UTC [cauthdsl] func1 -> DEBU 441 0xc000570a50 gate 1589998797782655600 evaluation starts" +orderer0.example.com | "2020-05-20 18:19:57.782 UTC [cauthdsl] func2 -> DEBU 442 0xc000570a50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:19:57.782 UTC [cauthdsl] func2 -> DEBU 443 0xc000570a50 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:19:57.782 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 444 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.782 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 445 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.782 UTC [msp] Validate -> DEBU 446 MSP Org1MSP validating identity" +orderer0.example.com | "2020-05-20 18:19:57.783 UTC [msp] getCertificationChain -> DEBU 447 MSP Org1MSP getting certification chain" +peer1.org1.example.com | [35e 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\302\320\333\256\304>m\016\321~\334\035\301\363L\230M\316\201\0043a\346\206\002 v2\372\007\177H\214\305^\244\002L\312\227\300qq\304\234\220\005\315\345\361\252\365\264\325\327\275u\201" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [35f 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [360 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\320\333\256\304>m\016\321~\334\035\301\363L\230M\316\201\0043a\346\206\002 v2\372\007\177H\214\305^\244\002L\312\227\300qq\304\234\220\005\315\345\361\252\365\264\325\327\275u\201" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [361 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [362 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 b9 cb c8 e4 47 35 2f 66 27 d7 de 1f 52 f9 0c |.....G5/f'...R..| +peer1.org1.example.com | 00000010 5d fb 4c a3 ba 38 8c 83 82 1a 5f 55 91 66 8c c8 |].L..8...._U.f..| +peer1.org1.example.com | [363 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 b2 bc d5 c1 6e 15 d6 68 c5 b5 |0E.!......n..h..| +peer1.org1.example.com | 00000010 ff 52 6a 09 8c b3 3c 2c b8 14 46 78 91 7a 77 0d |.Rj...<,..Fx.zw.| +peer1.org1.example.com | 00000020 b6 3d 92 f8 29 02 20 56 99 7b 5c 5a 2c 57 85 e4 |.=..). V.{\Z,W..| +peer1.org1.example.com | 00000030 6d ee 3d 99 c6 b4 81 b0 a0 c4 17 8d 8e f0 17 37 |m.=............7| +peer1.org1.example.com | 00000040 3f 93 15 2e 08 53 5b |?....S[| +peer1.org1.example.com | [364 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [365 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 4e 48 9d a2 b1 47 3e c2 d0 db ae |0D. .NH...G>....| +peer1.org1.example.com | 00000010 c4 3e 6d 0e d1 7e dc 1d c1 f3 4c 98 4d ce 81 04 |.>m..~....L.M...| +peer1.org1.example.com | 00000020 33 61 e6 86 02 20 76 32 fa 07 7f 48 8c c5 5e a4 |3a... v2...H..^.| +peer1.org1.example.com | 00000030 02 4c ca 97 c0 71 71 c4 9c 90 05 cd e5 f1 aa f5 |.L...qq.........| +peer1.org1.example.com | 00000040 b4 d5 d7 bd 75 81 |....u.| +peer1.org1.example.com | [366 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [367 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [368 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [369 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [36a 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [36b 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36c 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36d 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36e 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [36f 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [370 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\302\320\333\256\304>m\016\321~\334\035\301\363L\230M\316\201\0043a\346\206\002 v2\372\007\177H\214\305^\244\002L\312\227\300qq\304\234\220\005\315\345\361\252\365\264\325\327\275u\201" > > alive: > +peer1.org1.example.com | [371 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org1.example.com | [372 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [373 05-20 18:20:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting, peers found 0 +peer1.org1.example.com | [374 05-20 18:20:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [19b 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [19c 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [19d 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [19e 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [19f 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer0.org2.example.com | [1a0 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [1a1 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [1a2 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [1a3 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [1a4 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [1a5 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [1a6 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [1a7 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1a8 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1a9 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1aa 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [1ab 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [1ac 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [1ad 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [1ae 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [1af 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | [1b0 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [1b1 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [1b2 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [1b3 05-20 18:20:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [1b4 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org2.example.com | [1b5 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [1b6 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [1b7 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [1b8 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [1b9 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [1ba 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [1bb 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [1bc 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [1bd 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [1be 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [1bf 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [1c0 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [1c1 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [1c6 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 e8 cd 64 e3 ff 8c bd 91 c6 b7 81 |0D. 1..d........| +peer0.org1.example.com | 00000010 0f 19 9c d7 00 f1 1c 64 b0 14 f4 d7 11 e8 0b 83 |.......d........| +peer0.org1.example.com | 00000020 7b 9d 20 ac 02 20 7a f2 84 d4 09 64 f1 2b 3c 32 |{. .. z....d.+<2| +peer0.org1.example.com | 00000030 77 c2 49 1e 15 d8 24 27 57 77 4c 58 8e 75 a6 02 |w.I...$'WwLX.u..| +peer0.org1.example.com | 00000040 46 52 b9 7a 5c 40 |FR.z\@| +peer0.org1.example.com | [1c7 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1c8 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1c9 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ca 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1cb 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1cc 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cd 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ce 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cf 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1d0 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161008 +peer0.org1.example.com | [1d1 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1250BB7DBCD423F53997B659572FBE857BAE27A3D5F6A5F44D92F19CF8DEC53F +peer0.org1.example.com | [1d2 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1d3 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1d4 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1d5 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1d6 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1d7 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1d8 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d9 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37006 +peer0.org1.example.com | [1da 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002838410 +peer0.org1.example.com | [1db 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [1dc 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [1dd 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1de 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [1df 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [1e0 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [1e1 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1e2 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [1e3 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 19 96 0f 8f f8 9e 9f ec b0 55 2e 7e b6 a1 bb |..........U.~...| +peer0.org1.example.com | 00000010 dd 96 47 b1 46 c6 a3 72 db bf 98 56 e7 fe 51 03 |..G.F..r...V..Q.| +peer0.org1.example.com | [1e4 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 dd c0 e2 a6 db 26 91 70 63 35 |0E.!.......&.pc5| +peer0.org1.example.com | 00000010 bb c3 69 ea c8 d2 ce 50 1b f8 f4 f6 23 9b 36 d8 |..i....P....#.6.| +peer0.org1.example.com | 00000020 e5 c8 ee 99 04 02 20 56 b7 55 1a 3c 46 ad 43 16 |...... V.U. DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [376 05-20 18:20:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [377 05-20 18:20:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [378 05-20 18:20:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...3D9B120C08ACC9B5F9BFEFB388161001 +peer1.org1.example.com | [379 05-20 18:20:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 303A8B2A334725E1AF943BFB94340BC77072AD6D28190B2DE5E73CE6F6482BF4 +peer1.org1.example.com | [37a 05-20 18:20:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [37b 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47660 +peer1.org1.example.com | [37c 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003200cd0 +peer1.org1.example.com | [37d 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [37e 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [37f 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [380 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [381 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 9d 37 db 5e ab 75 28 74 fc 45 49 d9 d3 84 e0 |..7.^.u(t.EI....| +peer1.org1.example.com | 00000010 aa 41 47 2d 20 db af 55 0d a0 7e b2 7a 89 19 1e |.AG- ..U..~.z...| +peer1.org1.example.com | [382 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 b7 71 6f b6 ba e3 7a 4a 8c 3a |0E.!...qo...zJ.:| +peer1.org1.example.com | 00000010 31 8f 9b 29 4d 3d e1 1b 6a 89 a8 79 f8 d4 4f 94 |1..)M=..j..y..O.| +peer1.org1.example.com | 00000020 d4 0d c6 fc b0 02 20 14 ed 0c 11 26 75 27 f4 a7 |...... ....&u'..| +peer1.org1.example.com | 00000030 6c 43 eb 5d bd 42 00 81 e0 1f 88 c8 9e 06 e7 6c |lC.].B.........l| +peer1.org1.example.com | 00000040 58 42 6e 53 0a 9a b1 |XBnS...| +peer1.org1.example.com | [383 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [384 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00324e0e0, header 0xc0032010e0 +peer1.org1.example.com | [385 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [386 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU [][19889f07] processing txid: 19889f07eb36a87539ec478100b3d10f788779b89a03505e9b8a7702bfa24c87 +peer1.org1.example.com | [387 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU [][19889f07] Entry chaincode: name:"cscc" +peer1.org1.example.com | [388 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> INFO [][19889f07] Entry chaincode: name:"cscc" +peer1.org1.example.com | [389 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [38a 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org1.example.com | [38b 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [38c 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [38d 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [38e 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 9d 37 db 5e ab 75 28 74 fc 45 49 d9 d3 84 e0 |..7.^.u(t.EI....| +peer1.org1.example.com | 00000010 aa 41 47 2d 20 db af 55 0d a0 7e b2 7a 89 19 1e |.AG- ..U..~.z...| +peer1.org1.example.com | [38f 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 b7 71 6f b6 ba e3 7a 4a 8c 3a |0E.!...qo...zJ.:| +peer1.org1.example.com | 00000010 31 8f 9b 29 4d 3d e1 1b 6a 89 a8 79 f8 d4 4f 94 |1..)M=..j..y..O.| +peer1.org1.example.com | 00000020 d4 0d c6 fc b0 02 20 14 ed 0c 11 26 75 27 f4 a7 |...... ....&u'..| +peer1.org1.example.com | 00000030 6c 43 eb 5d bd 42 00 81 e0 1f 88 c8 9e 06 e7 6c |lC.].B.........l| +peer1.org1.example.com | 00000040 58 42 6e 53 0a 9a b1 |XBnS...| +peer1.org1.example.com | [390 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU [19889f07] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [391 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU [19889f07] notifying Txid:19889f07eb36a87539ec478100b3d10f788779b89a03505e9b8a7702bfa24c87, channelID: +peer1.org1.example.com | [392 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [393 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> INFO [][19889f07] Exit chaincode: name:"cscc" (3ms) +peer1.org1.example.com | [394 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU [][19889f07] Exit +peer1.org1.example.com | [395 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47660 +peer1.org1.example.com | [396 05-20 18:20:01.20 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47660 grpc.code=OK grpc.call_duration=7.4054ms +peer1.org1.example.com | [397 05-20 18:20:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [398 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47668 +peer1.org1.example.com | [399 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002caab40 +peer1.org1.example.com | [39a 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [39b 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [39c 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [39d 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [39e 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 c6 ce 13 cc b2 90 f3 c6 65 54 86 e2 67 40 29 |(........eT..g@)| +peer1.org1.example.com | 00000010 80 78 87 b2 05 8e db 45 e7 23 b7 fb 9c 6a 34 13 |.x.....E.#...j4.| +peer1.org1.example.com | [39f 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 bc 48 44 2d dd d3 64 bb fc cd |0E.!...HD-..d...| +peer1.org1.example.com | 00000010 af fb ef 62 b9 71 8c e3 28 dc d8 02 26 b7 6f ac |...b.q..(...&.o.| +peer1.org1.example.com | 00000020 86 be 11 60 13 02 20 0d b5 ec 7b 4e b5 e2 c3 2c |...`.. ...{N...,| +peer1.org1.example.com | 00000030 01 20 09 5e 2a 33 16 fb 17 bf 9b ce 68 1a 45 29 |. .^*3......h.E)| +peer1.org1.example.com | 00000040 83 f3 22 0e 29 a1 dc |..".)..| +peer1.org1.example.com | [3a0 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3a1 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002b604d0, header 0xc002caaf50 +peer1.org2.example.com | [2c6 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c7 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c8 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A91070A3D08051A0608D6E995F60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer1.org2.example.com | [2c9 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D2C6F4D016F5A84514137A9BF668F05F75E453460759F1FE3C1DDBE47C92BC04 +peer1.org2.example.com | [2ca 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cb 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cc 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cd 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +orderer0.example.com | "2020-05-20 18:19:57.783 UTC [msp] hasOURole -> DEBU 448 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-05-20 18:19:57.783 UTC [msp] getCertificationChain -> DEBU 449 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:19:57.784 UTC [cauthdsl] func2 -> DEBU 44a 0xc000570a50 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:19:57.784 UTC [msp.identity] Verify -> DEBU 44b Verify: digest = 00000000 a9 37 8b cd a3 3d 52 8a 05 e3 c2 73 6a be cb ae |.7...=R....sj...| +orderer0.example.com | 00000010 37 24 4f dc a7 54 65 45 5a 6f 5f 5d 12 d6 03 ec |7$O..TeEZo_]....|" +orderer0.example.com | "2020-05-20 18:19:57.784 UTC [msp.identity] Verify -> DEBU 44c Verify: sig = 00000000 30 45 02 21 00 89 08 e9 47 23 b2 b1 53 9a 62 df |0E.!....G#..S.b.| +orderer0.example.com | 00000010 cd 53 5a bc 46 67 c4 e8 d7 18 d5 4f 96 60 53 b3 |.SZ.Fg.....O.`S.| +orderer0.example.com | 00000020 5b 33 1a 2b e3 02 20 72 7d d7 cf 99 12 b6 1e 2f |[3.+.. r}....../| +orderer0.example.com | 00000030 85 95 3e e9 5e cd d0 36 f2 03 e8 1c f1 e6 10 46 |..>.^..6.......F| +orderer0.example.com | 00000040 a3 43 27 63 8a 09 48 |.C'c..H|" +orderer0.example.com | "2020-05-20 18:19:57.785 UTC [cauthdsl] func2 -> DEBU 44d 0xc000570a50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:19:57.785 UTC [cauthdsl] func1 -> DEBU 44e 0xc000570a50 gate 1589998797782655600 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:19:57.785 UTC [policies] Evaluate -> DEBU 44f Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.785 UTC [policies] Evaluate -> DEBU 450 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.785 UTC [policies] Evaluate -> DEBU 451 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:57.786 UTC [policies] Evaluate -> DEBU 452 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 453 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 454 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 455 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 456 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 457 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 458 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 459 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:19:57.787 UTC [common.configtx] recurseConfigMap -> DEBU 45a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.788 UTC [common.configtx] recurseConfigMap -> DEBU 45b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.788 UTC [common.configtx] recurseConfigMap -> DEBU 45c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 45d Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 45e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 464 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 465 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | 00000030 3e bd c8 33 70 a9 d6 79 5f cc f0 81 42 4a 46 1e |>..3p..y_...BJF.| +peer0.org1.example.com | 00000040 bc 7b 4c f2 72 e5 a0 |.{L.r..| +peer0.org1.example.com | [1e5 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [1e6 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000267570, header 0xc002838d20 +peer0.org1.example.com | [1e7 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [1e8 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU [][a90fb794] processing txid: a90fb7940e66ef0e4f0ddcc4afb11d94de4e06dcc6118772434b3ca1e9d9a130 +peer0.org1.example.com | [1e9 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU [][a90fb794] Entry chaincode: name:"cscc" +peer0.org1.example.com | [1ea 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> INFO [][a90fb794] Entry chaincode: name:"cscc" +peer0.org1.example.com | [1eb 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [1ec 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer0.org1.example.com | [1ed 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [1ee 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [1ef 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [1f0 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1f1 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [1f2 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1f3 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 19 96 0f 8f f8 9e 9f ec b0 55 2e 7e b6 a1 bb |..........U.~...| +peer0.org1.example.com | 00000010 dd 96 47 b1 46 c6 a3 72 db bf 98 56 e7 fe 51 03 |..G.F..r...V..Q.| +peer0.org1.example.com | [1f4 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 dd c0 e2 a6 db 26 91 70 63 35 |0E.!.......&.pc5| +peer0.org1.example.com | 00000010 bb c3 69 ea c8 d2 ce 50 1b f8 f4 f6 23 9b 36 d8 |..i....P....#.6.| +peer0.org1.example.com | 00000020 e5 c8 ee 99 04 02 20 56 b7 55 1a 3c 46 ad 43 16 |...... V.U...3p..y_...BJF.| +peer0.org1.example.com | 00000040 bc 7b 4c f2 72 e5 a0 |.{L.r..| +peer0.org1.example.com | [1f5 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [1f6 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org1.example.com | [1f7 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org1.example.com | [1f8 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer0.org1.example.com | [1f9 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer0.org1.example.com | [1fa 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org1.example.com | [1fb 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org1.example.com | [1fc 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer0.org1.example.com | [1fd 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org1.example.com | [1fe 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org1.example.com | [1ff 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org1.example.com | [200 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0028a5660)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer0.org1.example.com | [201 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org1.example.com | [202 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer0.org1.example.com | [203 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer0.org1.example.com | [204 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer0.org1.example.com | [205 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer0.org1.example.com | [206 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org1.example.com | [207 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer0.org1.example.com | [208 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer0.org1.example.com | [209 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer0.org1.example.com | [20a 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer0.org1.example.com | [20b 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer0.org1.example.com | [20c 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer0.org1.example.com | [20d 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer0.org1.example.com | [20e 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer0.org1.example.com | [20f 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [210 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org1.example.com | [211 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org1.example.com | [212 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org1.example.com | [213 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org2.example.com | [1c2 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [2ce 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2cf 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2d0 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d1 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer1.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer1.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer1.org2.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer1.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer1.org2.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer1.org2.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [2d2 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cbe0 gate 1589998806562227500 evaluation starts +peer1.org2.example.com | [2d3 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cbe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d4 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cbe0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d5 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org2.example.com | [2d6 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [2d7 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [2d8 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cbe0 principal matched by identity 0 +peer1.org2.example.com | [2d9 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 ae 1e 93 ef 16 d3 72 49 19 6b 54 2f e7 67 ae |.......rI.kT/.g.| +peer1.org2.example.com | 00000010 76 03 6f 1e 50 5e 5f e2 01 92 44 1d 09 fa cc 1e |v.o.P^_...D.....| +peer1.org2.example.com | [2da 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 02 46 89 6e 97 c7 75 13 33 1e |0E.!...F.n..u.3.| +peer1.org2.example.com | 00000010 68 38 d3 b3 23 63 c2 d8 9d 35 62 e2 6c a1 f2 02 |h8..#c...5b.l...| +peer1.org2.example.com | 00000020 56 ee aa df 2a 02 20 6e 96 d4 a5 5f 14 02 95 75 |V...*. n..._...u| +peer1.org2.example.com | 00000030 e5 72 89 6e 58 73 a9 02 10 de c2 6d 7a 54 e9 1f |.r.nXs.....mzT..| +peer1.org2.example.com | 00000040 9d 16 cd cf a2 88 f6 |.......| +peer1.org2.example.com | [2db 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cbe0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2dc 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cbe0 gate 1589998806562227500 evaluation succeeds +peer1.org2.example.com | [2dd 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2de 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2df 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2e0 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2e1 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org2.example.com | [2e2 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org2.example.com | [2e3 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2e5 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [0] +peer1.org2.example.com | [2e6 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [2e7 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer1.org2.example.com | [2e8 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e4 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer1.org2.example.com | [2e9 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2eb 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [2ec 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ed 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2ee 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030de770 gate 1589998806570416900 evaluation starts +peer1.org2.example.com | [2ea 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2ef 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030de770 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f1 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030de770 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2f0 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer1.org2.example.com | [2f2 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030de770 principal matched by identity 0 +peer1.org2.example.com | [2f3 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 a4 1e f0 21 bc 6d 6f dd 04 f4 ee 97 a0 5b e2 |....!.mo......[.| +peer1.org2.example.com | 00000010 8d e4 d8 70 1c 40 6f dd d0 21 0f 26 bb 5b b4 87 |...p.@o..!.&.[..| +peer1.org2.example.com | [2f5 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 d6 4d c8 5c 8c 2f 50 b5 60 98 |0E.!...M.\./P.`.| +peer1.org2.example.com | 00000010 60 31 c4 3f 7b 2a fa f4 cf 19 bf 22 cd 96 db 2a |`1.?{*....."...*| +peer1.org2.example.com | 00000020 02 5e fb 02 b2 02 20 4c f9 d7 8f 34 1a 07 5a 22 |.^.... L...4..Z"| +peer1.org2.example.com | 00000030 bc 54 70 3d a2 f4 c9 07 28 fb aa 82 3f 42 71 05 |.Tp=....(...?Bq.| +peer1.org2.example.com | 00000040 dc e8 c0 83 d2 f1 3f |......?| +peer1.org2.example.com | [2f6 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030de770 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f7 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030de770 gate 1589998806570416900 evaluation succeeds +peer1.org2.example.com | [2f8 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2f9 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2f4 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer1.org2.example.com | [2fa 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2fb 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer1.org2.example.com | [2fc 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2fd 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [2fe 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org2.example.com | [2ff 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002f55740 env 0xc0030ceb40 txn 0 +peer1.org2.example.com | [301 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0030ceb40 +peer1.org2.example.com | [302 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +peer1.org2.example.com | [303 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [304 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [300 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org2.example.com | [305 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [307 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [306 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [308 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [0] +peer1.org2.example.com | [309 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [3a2 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org1.example.com | [3a3 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][145329e6] processing txid: 145329e687ff34dbda23deb0b7401210f0152441b34b256596fa00d485707e29 +peer1.org1.example.com | [3a4 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][145329e6] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3a5 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> INFO [][145329e6] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3a6 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | "2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 466 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 467 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 468 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 469 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 46a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46b Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 470 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.792 UTC [msp] GetDefaultSigningIdentity -> DEBU 471 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:19:57.793 UTC [msp] GetDefaultSigningIdentity -> DEBU 472 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:19:57.793 UTC [msp.identity] Sign -> DEBU 473 Sign: plaintext: 0AEA060A1B08011A0608CDE995F60522...D6653D24DB1C5D65D2EE19D93B8A0BAC " +orderer0.example.com | "2020-05-20 18:19:57.793 UTC [msp.identity] Sign -> DEBU 474 Sign: digest: 0B78DF95544E2920B9159E55D4CC8F0029582A8F7ACC9B47EB1D7483493DBB87 " +orderer0.example.com | "2020-05-20 18:19:57.794 UTC [msp] GetDefaultSigningIdentity -> DEBU 475 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:19:57.794 UTC [msp] GetDefaultSigningIdentity -> DEBU 476 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:19:57.795 UTC [msp.identity] Sign -> DEBU 477 Sign: plaintext: 0AE6060A1708041A0608CDE995F60522...3ACC9B789F0D8B0ACD226ADD58A684DF " +orderer0.example.com | "2020-05-20 18:19:57.795 UTC [msp.identity] Sign -> DEBU 478 Sign: digest: B5A5A75BB4D562F255D95B59050CEA3B0CB3AF1E6CF4780D0A742421194E37AB " +orderer0.example.com | "2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 479 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 47a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 47b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 47c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 47d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-05-20 18:19:57.796 UTC [msp] DeserializeIdentity -> DEBU 47e Obtaining identity" +orderer0.example.com | "2020-05-20 18:19:57.797 UTC [msp.identity] newIdentity -> DEBU 47f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.798 UTC [cauthdsl] func1 -> DEBU 480 0xc000cbaa50 gate 1589998797798145800 evaluation starts" +orderer0.example.com | "2020-05-20 18:19:57.798 UTC [cauthdsl] func2 -> DEBU 481 0xc000cbaa50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:19:57.798 UTC [cauthdsl] func2 -> DEBU 482 0xc000cbaa50 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:19:57.798 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 483 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:57.798 UTC [msp] Validate -> DEBU 484 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-05-20 18:19:57.799 UTC [msp] getCertificationChain -> DEBU 485 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-05-20 18:19:57.799 UTC [cauthdsl] func2 -> DEBU 486 0xc000cbaa50 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:19:57.799 UTC [msp.identity] Verify -> DEBU 487 Verify: digest = 00000000 b5 a5 a7 5b b4 d5 62 f2 55 d9 5b 59 05 0c ea 3b |...[..b.U.[Y...;| +orderer0.example.com | 00000010 0c b3 af 1e 6c f4 78 0d 0a 74 24 21 19 4e 37 ab |....l.x..t$!.N7.|" +orderer0.example.com | "2020-05-20 18:19:57.799 UTC [msp.identity] Verify -> DEBU 488 Verify: sig = 00000000 30 45 02 21 00 fe 49 cf a6 97 2c a9 ea d7 02 a7 |0E.!..I...,.....| +orderer0.example.com | 00000010 68 22 da 91 db 47 c0 57 bb bb 0c 00 2d b0 10 eb |h"...G.W....-...| +orderer0.example.com | 00000020 e5 8a c3 ed 0e 02 20 5d b7 28 d1 38 0e 85 c8 4b |...... ].(.8...K| +orderer0.example.com | 00000030 b9 84 08 2b 0d 17 fb 22 0b a8 81 95 52 06 3c d8 |...+..."....R.<.| +orderer0.example.com | 00000040 99 bd d5 69 55 54 bc |...iUT.|" +orderer0.example.com | "2020-05-20 18:19:57.800 UTC [cauthdsl] func2 -> DEBU 489 0xc000cbaa50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:19:57.800 UTC [cauthdsl] func1 -> DEBU 48a 0xc000cbaa50 gate 1589998797798145800 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:19:57.800 UTC [policies] Evaluate -> DEBU 48b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:57.800 UTC [policies] Evaluate -> DEBU 48c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:57.800 UTC [policies] Evaluate -> DEBU 48d Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:57.800 UTC [policies] Evaluate -> DEBU 48e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:57.801 UTC [policies] Evaluate -> DEBU 48f Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:57.801 UTC [policies] Evaluate -> DEBU 490 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:57.801 UTC [common.channelconfig] NewStandardValues -> DEBU 491 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 492 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 493 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 494 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 495 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 496 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] NewStandardValues -> DEBU 497 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 498 Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 499 Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49a Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49b Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:19:57.803 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49c Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:57.803 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49d Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.804 UTC [common.channelconfig] NewStandardValues -> DEBU 49e Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49f Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:19:57.804 UTC [common.channelconfig] NewStandardValues -> DEBU 4a0 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a1 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.804 UTC [common.channelconfig] validateMSP -> DEBU 4a2 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.804 UTC [msp] newBccspMsp -> DEBU 4a3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.804 UTC [msp] New -> DEBU 4a4 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.805 UTC [msp] Setup -> DEBU 4a5 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:57.805 UTC [msp.identity] newIdentity -> DEBU 4a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.806 UTC [common.channelconfig] NewStandardValues -> DEBU 4a7 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:19:57.806 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a8 Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:19:57.806 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a9 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [common.channelconfig] NewStandardValues -> DEBU 4aa Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org2.example.com | [1c3 05-20 18:20:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c4 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [1c5 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [1c6 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [1c7 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [1c8 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c9 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [1ca 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [1cb 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [1cc 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [1cd 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [1ce 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [1cf 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [1d0 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [1d1 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [1d2 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [1d3 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [1d4 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1d5 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [1d6 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [1d7 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [1d8 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [1d9 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [1da 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [1db 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [1dc 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [1dd 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [1de 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [1df 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [1e0 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [1e1 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [1e2 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [1e3 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [1e4 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [1e5 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [1e6 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [1e7 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [1e8 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [1e9 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [1ea 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [1eb 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [1ec 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [1ed 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [1ee 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [1ef 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [1f0 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [1f1 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [1f2 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [1f3 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [1f4 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [1f5 05-20 18:20:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [1f6 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [1f7 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [1f8 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [1f9 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [1fa 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [1fb 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [1fc 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [1fd 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [1fe 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ab Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [common.channelconfig] NewStandardValues -> DEBU 4ac Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ad Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [common.channelconfig] Validate -> DEBU 4ae Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [common.channelconfig] validateMSP -> DEBU 4af Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [msp] newBccspMsp -> DEBU 4b0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [msp] New -> DEBU 4b1 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.807 UTC [msp] Setup -> DEBU 4b2 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.808 UTC [msp.identity] newIdentity -> DEBU 4b3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.809 UTC [common.channelconfig] NewStandardValues -> DEBU 4b4 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b5 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:19:57.809 UTC [common.channelconfig] NewStandardValues -> DEBU 4b6 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b7 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.809 UTC [common.channelconfig] Validate -> DEBU 4b8 Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-05-20 18:19:57.809 UTC [common.channelconfig] validateMSP -> DEBU 4b9 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.810 UTC [msp] newBccspMsp -> DEBU 4ba Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.810 UTC [msp] New -> DEBU 4bb Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.810 UTC [msp] Setup -> DEBU 4bc Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.811 UTC [msp.identity] newIdentity -> DEBU 4bd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.811 UTC [msp] Setup -> DEBU 4be Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:19:57.811 UTC [msp] Setup -> DEBU 4bf MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:19:57.811 UTC [policies] NewManagerImpl -> DEBU 4c0 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c1 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c3 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c4 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c5 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c6 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4c7 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4c8 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4c9 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4ca Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4cb Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4cc Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4cd Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4ce Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4cf Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] GetPolicy -> DEBU 4d0 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4d1 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:19:57.813 UTC [policies] GetPolicy -> DEBU 4d2 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:57.814 UTC [policies] NewManagerImpl -> DEBU 4d3 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:19:57.814 UTC [policies] GetPolicy -> DEBU 4d4 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:19:57.814 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4d6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4d7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4d8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [30b 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer1.org2.example.com | [30a 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [30c 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org2.example.com | [30d 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [30e 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [30f 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [310 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 b8 81 45 57 b3 76 22 8f e3 1a 03 c3 91 2f 86 |...EW.v"....../.| +peer1.org2.example.com | 00000010 7e 72 d9 f3 aa 71 79 97 65 bc 30 9d 33 cc e6 12 |~r...qy.e.0.3...| +peer1.org2.example.com | [311 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 a0 2b cc a7 6e 38 18 f4 da de |0E.!...+..n8....| +peer1.org2.example.com | 00000010 55 a1 da 90 8d 69 4c 45 cd 0b c0 36 18 d5 5a 21 |U....iLE...6..Z!| +peer1.org2.example.com | 00000020 fa 5f 93 bc 1f 02 20 5b 9e 95 84 5c e6 2b cc d1 |._.... [...\.+..| +peer1.org2.example.com | 00000030 f5 6c a3 3f bd 2e 63 05 ad db bb 57 a1 1c cd 2d |.l.?..c....W...-| +peer1.org2.example.com | 00000040 85 68 ef ee ee 6d 09 |.h...m.| +peer1.org2.example.com | [312 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [313 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003138a80, header channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +peer1.org2.example.com | [314 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [315 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [316 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [317 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [318 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [319 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31a 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [31b 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [31c 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [31d 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [1ff 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [200 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [201 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [202 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [203 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org2.example.com | [204 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [205 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [206 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [207 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org2.example.com | [208 05-20 18:20:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [209 05-20 18:20:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [20a 05-20 18:20:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [20b 05-20 18:20:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [20c 05-20 18:20:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [20d 05-20 18:20:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org2.example.com | [20e 05-20 18:20:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org2.example.com | [20f 05-20 18:20:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org2.example.com | [210 05-20 18:20:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [211 05-20 18:20:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [212 05-20 18:20:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org2.example.com | [213 05-20 18:20:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org2.example.com | [214 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org2.example.com | [215 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org2.example.com | [216 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org2.example.com | [217 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [218 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408CC93F4F0C0EFB38816...9C09DCBB6042B0C019B601802A020801 +peer0.org2.example.com | [219 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D1FE59353AEDDA1BE498D7C598574B3796BCBE298A756CD39A73840FCC40C6A6 +peer0.org2.example.com | [21a 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org2.example.com | [21b 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org2.example.com | [21e 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org2.example.com | [21c 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [21d 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [21f 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [220 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [8fd4751b-77a6-4e93-b08c-a4a136ebccfc] +peer0.org2.example.com | [221 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [222 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd4751b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [223 05-20 18:20:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8fd4751b] notifying Txid:8fd4751b-77a6-4e93-b08c-a4a136ebccfc, channelID:businesschannel +peer0.org2.example.com | [224 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [225 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [226 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8fd4751b-77a6-4e93-b08c-a4a136ebccfc] +peer0.org2.example.com | [227 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [228 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [897d6beb-d505-4b64-92ff-be2842c6674c] +peer0.org2.example.com | [229 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [22a 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [22b 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU [897d6beb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [22c 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU [897d6beb] notifying Txid:897d6beb-d505-4b64-92ff-be2842c6674c, channelID:businesschannel +peer0.org2.example.com | [22d 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [22e 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [22f 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [897d6beb-d505-4b64-92ff-be2842c6674c] +peer0.org2.example.com | [230 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [231 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c269cf5d-cda8-44a3-8915-68284d0a6458] +peer0.org2.example.com | [232 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [233 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [234 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU [c269cf5d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [235 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU [c269cf5d] notifying Txid:c269cf5d-cda8-44a3-8915-68284d0a6458, channelID:businesschannel +peer0.org2.example.com | [236 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [237 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [238 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c269cf5d-cda8-44a3-8915-68284d0a6458] +peer0.org2.example.com | [239 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [23a 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2e84e598-666b-457f-a708-ef2dca565603] +peer0.org2.example.com | [23b 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org2.example.com | [23c 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2e84e598-666b-457f-a708-ef2dca565603] +peer0.org2.example.com | [23d 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [23e 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408CC93F4F0C0EFB38816...9C09DCBB6042B0C019B601802A020801 +peer0.org2.example.com | [23f 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 00D83F2A992775A2946405CC7D94716F247288BD780410C4D35747D613FC8380 +peer0.org2.example.com | [240 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org2.example.com | [241 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU [5c0baed9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [242 05-20 18:20:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU [5c0baed9] notifying Txid:5c0baed97132408e98549f7213e5c7256d0dfb0de0476445a9c1acb27b3659bc, channelID: +peer0.org2.example.com | [243 05-20 18:20:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [244 05-20 18:20:00.23 UTC] [%{longpkg}] %{callpath} -> INFO [][5c0baed9] Exit chaincode: name:"cscc" (116ms) +peer0.org2.example.com | [245 05-20 18:20:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][5c0baed9] Exit +peer0.org2.example.com | [246 05-20 18:20:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37332 +peer0.org2.example.com | [247 05-20 18:20:00.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37332 grpc.code=OK grpc.call_duration=120.4913ms +peer0.org2.example.com | [248 05-20 18:20:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:37332: read: connection reset by peer +peer0.org2.example.com | [249 05-20 18:20:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [24a 05-20 18:20:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [24b 05-20 18:20:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161007 +peer0.org2.example.com | [24c 05-20 18:20:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CF34641099DBF2AFA7286CD8A5267AFEF2B1BD3C760F0DBC7EA843A0AD9AA95 +peer0.org2.example.com | [24d 05-20 18:20:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [24e 05-20 18:20:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [24f 05-20 18:20:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [250 05-20 18:20:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting, peers found 0 +peer0.org2.example.com | [251 05-20 18:20:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [252 05-20 18:20:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [253 05-20 18:20:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [254 05-20 18:20:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [255 05-20 18:20:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...9B28120C08B4D68C81C1EFB388161001 +peer0.org2.example.com | [256 05-20 18:20:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A8A9ADC3506BC21980B5A0CF6414B0AF1C16164A835BFCDBFC19494C21ACAB0B +peer0.org2.example.com | [257 05-20 18:20:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [258 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37340 +peer0.org2.example.com | [259 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0028c6910 +peer0.org2.example.com | [25a 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [25b 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [25c 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [25d 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [25e 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 b9 97 11 22 b8 0b 57 16 87 ea 06 37 02 9f ca |)..."..W....7...| +peer0.org2.example.com | 00000010 d1 d1 22 8e 4d 18 a1 69 b9 54 2d 73 00 45 ab 16 |..".M..i.T-s.E..| +peer0.org2.example.com | [25f 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 54 dd bf 20 6e 93 e0 0d 3d 0e 13 |0D. /T.. n...=..| +peer0.org2.example.com | 00000010 74 3a 3c 35 2f 21 9f ac 3c 62 d2 a3 7b 9d 40 a2 |t:<5/!..... .c.y&....u| +peer0.org2.example.com | 00000030 fe 09 ec c9 75 64 31 13 0d 32 b2 48 f8 d1 34 ad |....ud1..2.H..4.| +peer0.org2.example.com | 00000040 21 df 4d e6 07 3d |!.M..=| +peer0.org2.example.com | [260 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [261 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000139c00, header 0xc0028c6d20 +peer0.org2.example.com | [262 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [263 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][170e04ef] processing txid: 170e04ef8e79dccf22c7eca8abe45fc6940f54652d573582c0c7d7dd6e74df2c +peer0.org2.example.com | [264 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][170e04ef] Entry chaincode: name:"cscc" +peer0.org2.example.com | [265 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> INFO [][170e04ef] Entry chaincode: name:"cscc" +peer0.org2.example.com | [266 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [267 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org2.example.com | [268 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [269 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [26a 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [26b 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 b9 97 11 22 b8 0b 57 16 87 ea 06 37 02 9f ca |)..."..W....7...| +peer0.org2.example.com | 00000010 d1 d1 22 8e 4d 18 a1 69 b9 54 2d 73 00 45 ab 16 |..".M..i.T-s.E..| +peer0.org2.example.com | [26c 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 54 dd bf 20 6e 93 e0 0d 3d 0e 13 |0D. /T.. n...=..| +peer0.org2.example.com | 00000010 74 3a 3c 35 2f 21 9f ac 3c 62 d2 a3 7b 9d 40 a2 |t:<5/!..... .c.y&....u| +peer0.org2.example.com | 00000030 fe 09 ec c9 75 64 31 13 0d 32 b2 48 f8 d1 34 ad |....ud1..2.H..4.| +peer0.org2.example.com | 00000040 21 df 4d e6 07 3d |!.M..=| +peer0.org2.example.com | [26d 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU [170e04ef] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [26e 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU [170e04ef] notifying Txid:170e04ef8e79dccf22c7eca8abe45fc6940f54652d573582c0c7d7dd6e74df2c, channelID: +peer0.org2.example.com | [26f 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [270 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> INFO [][170e04ef] Exit chaincode: name:"cscc" (1ms) +peer0.org2.example.com | [271 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][170e04ef] Exit +peer0.org2.example.com | [272 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37340 +peer0.org2.example.com | [273 05-20 18:20:01.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37340 grpc.code=OK grpc.call_duration=3.0243ms +peer0.org1.example.com | [214 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [215 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [216 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [217 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer1.org2.example.com | [31e 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [31f 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [320 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [321 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [322 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [323 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [324 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [325 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer1.org2.example.com | [326 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [327 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [328 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [329 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [32a 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [32b 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [32c 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer1.org2.example.com | [32d 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [32e 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [32f 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer1.org2.example.com | [330 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org2.example.com | [331 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [332 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [333 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167a80 gate 1589998806588460400 evaluation starts +peer1.org2.example.com | [334 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167a80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [335 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167a80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [336 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org2.example.com | [337 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org2.example.com | [338 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [339 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [33a 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org2.example.com | [33b 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [33c 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167a80 principal matched by identity 0 +peer1.org2.example.com | [33d 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +peer1.org2.example.com | 00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.| +peer1.org2.example.com | [33e 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +peer1.org2.example.com | 00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +peer1.org2.example.com | 00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +peer1.org2.example.com | 00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +peer1.org2.example.com | 00000040 b6 a1 df 24 f2 fb af |...$...| +peer1.org2.example.com | [33f 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167a80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [340 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003167a80 gate 1589998806588460400 evaluation succeeds +peer1.org2.example.com | [341 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [342 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [343 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [344 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [345 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [346 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [347 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [348 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [349 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [34a 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [34b 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | "2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4d9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4da Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4db Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4dc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4dd Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4de Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4df Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4e0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4e1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4e2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e3 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e4 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e5 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e7 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ea Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:19:57.820 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:19:57.820 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.820 UTC [common.configtx] addToMap -> DEBU 50b Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:57.820 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:19:57.820 UTC [common.configtx] verifyDeltaSet -> DEBU 50d Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.821 UTC [common.configtx] policyForItem -> DEBU 50e Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:57.821 UTC [policies] Manager -> DEBU 50f Manager Channel looking up path []" +orderer0.example.com | "2020-05-20 18:19:57.821 UTC [policies] Manager -> DEBU 510 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:19:57.821 UTC [policies] Manager -> DEBU 511 Manager Channel has managers Application" +peer1.org2.example.com | [34c 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [34d 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [34e 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [34f 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [350 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [351 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [352 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [353 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [354 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [355 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [356 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [357 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [358 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [359 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [35a 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [35b 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [35c 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [35d 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [35e 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [35f 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [360 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [361 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [362 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [363 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [364 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [365 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [366 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [367 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | [368 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [369 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [36a 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [36b 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [36c 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [36d 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [36e 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [36f 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [370 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [371 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [372 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [373 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [374 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [375 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [376 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [377 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [378 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [379 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [37a 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [37b 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [37c 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [37d 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [37e 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [37f 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [380 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [381 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [382 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [383 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [384 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [385 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [386 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [387 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [388 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [389 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [38a 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [38b 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [38c 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [38d 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [38e 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [38f 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org2.example.com | [390 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [391 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [392 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [393 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [274 05-20 18:20:01.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [275 05-20 18:20:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37348 +peer0.org2.example.com | [276 05-20 18:20:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0028c7a40 +peer0.org2.example.com | [277 05-20 18:20:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [278 05-20 18:20:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [279 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [27a 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [27b 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 82 1b 23 a3 bd 6d 37 a1 57 55 02 1a 46 00 38 |f..#..m7.WU..F.8| +peer0.org2.example.com | 00000010 cd f1 b1 b6 52 aa 01 16 98 05 f8 88 83 c1 fd 53 |....R..........S| +peer0.org2.example.com | [27c 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 26 85 20 72 53 13 f6 4d 88 9a c2 |0D. .&. rS..M...| +peer0.org2.example.com | 00000010 e5 8b 0d 30 19 ea 7b ed 8e 97 ea 2b 00 1d 34 08 |...0..{....+..4.| +peer0.org2.example.com | 00000020 35 cf 8b b0 02 20 27 a1 b0 b2 a3 5b e9 58 d7 ef |5.... '....[.X..| +peer0.org2.example.com | 00000030 d8 28 e2 93 d8 da 7a 30 c3 70 d2 6d 24 5b 41 dd |.(....z0.p.m$[A.| +peer0.org2.example.com | 00000040 7d 01 ca c1 be e7 |}.....| +peer0.org2.example.com | [27d 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [27e 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002f88230, header 0xc0028c7e50 +peer0.org2.example.com | [27f 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | [280 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [][4aaeccb4] processing txid: 4aaeccb490f0eb7f82c4a871bf41e15d6c954c598c99cd0baed116c6d3ebe203 +peer0.org2.example.com | [281 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [][4aaeccb4] Entry chaincode: name:"qscc" +peer0.org2.example.com | [282 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> INFO [][4aaeccb4] Entry chaincode: name:"qscc" +peer0.org2.example.com | [283 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [284 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org2.example.com | [285 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org2.example.com | [286 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [287 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [288 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [289 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [28a 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28b 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [28c 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8f4e0 gate 1589998802485755600 evaluation starts +peer0.org2.example.com | [28d 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8f4e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28e 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8f4e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [28f 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [290 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [291 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [292 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8f4e0 principal matched by identity 0 +peer0.org2.example.com | [293 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 82 1b 23 a3 bd 6d 37 a1 57 55 02 1a 46 00 38 |f..#..m7.WU..F.8| +peer0.org2.example.com | 00000010 cd f1 b1 b6 52 aa 01 16 98 05 f8 88 83 c1 fd 53 |....R..........S| +peer0.org2.example.com | [294 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 26 85 20 72 53 13 f6 4d 88 9a c2 |0D. .&. rS..M...| +peer0.org2.example.com | 00000010 e5 8b 0d 30 19 ea 7b ed 8e 97 ea 2b 00 1d 34 08 |...0..{....+..4.| +peer0.org2.example.com | 00000020 35 cf 8b b0 02 20 27 a1 b0 b2 a3 5b e9 58 d7 ef |5.... '....[.X..| +peer0.org2.example.com | 00000030 d8 28 e2 93 d8 da 7a 30 c3 70 d2 6d 24 5b 41 dd |.(....z0.p.m$[A.| +peer0.org2.example.com | 00000040 7d 01 ca c1 be e7 |}.....| +peer0.org2.example.com | [295 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8f4e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [296 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f8f4e0 gate 1589998802485755600 evaluation succeeds +peer0.org2.example.com | [297 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [298 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [299 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29a 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29b 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [4aaeccb4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [29c 05-20 18:20:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [4aaeccb4] notifying Txid:4aaeccb490f0eb7f82c4a871bf41e15d6c954c598c99cd0baed116c6d3ebe203, channelID: +peer0.org2.example.com | [29d 05-20 18:20:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [29e 05-20 18:20:02.49 UTC] [%{longpkg}] %{callpath} -> INFO [][4aaeccb4] Exit chaincode: name:"qscc" (6ms) +peer0.org2.example.com | [29f 05-20 18:20:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU [][4aaeccb4] Exit +peer0.org2.example.com | [2a0 05-20 18:20:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37348 +peer0.org2.example.com | [2a1 05-20 18:20:02.49 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37348 grpc.code=OK grpc.call_duration=16.9118ms +peer0.org2.example.com | [2a2 05-20 18:20:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2a3 05-20 18:20:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2a4 05-20 18:20:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161008 +peer0.org2.example.com | [2a5 05-20 18:20:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EC2357956BD78BE34512EEEF024D59C0219C88F769252EF6478B5B3EA450A745 +peer0.org2.example.com | [2a6 05-20 18:20:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2a7 05-20 18:20:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [218 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [219 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [21a 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [21b 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [21c 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [21d 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [21e 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [21f 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [220 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [221 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [222 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [223 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002921a80)} +peer0.org1.example.com | [224 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [225 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [226 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [227 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer0.org1.example.com | [228 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer0.org1.example.com | [229 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer0.org1.example.com | [22a 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer0.org1.example.com | [22b 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xfa, 0x23, 0xe2, 0xb8, 0x2a, 0x9a, 0x88, 0xab, 0xe1, 0x10, 0x81, 0xae, 0xa5, 0x6, 0xf5, 0xf1, 0x22, 0x82, 0x0, 0xe, 0x6e, 0x5c, 0x2d, 0x5e, 0xf7, 0xc1, 0x60, 0xa4, 0x8c, 0xf3, 0x4, 0xc7} txOffsets= +peer0.org1.example.com | txId=bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5 locPointer=offset=39, bytesLength=28429 +peer0.org1.example.com | ] +peer0.org1.example.com | [22c 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to txid-index +peer0.org1.example.com | [22d 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to blockNumTranNum index +peer0.org1.example.com | [22e 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +peer0.org1.example.com | [22f 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer0.org1.example.com | [230 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org1.example.com | [231 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer0.org1.example.com | [233 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [232 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org1.example.com | [234 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org1.example.com | [235 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org1.example.com | [236 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer0.org1.example.com | [237 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [238 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer0.org1.example.com | [239 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org1.example.com | [23a 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org1.example.com | [23b 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +orderer0.example.com | "2020-05-20 18:19:57.821 UTC [policies] Manager -> DEBU 512 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 513 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 514 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 515 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 516 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 517 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [policies] Evaluate -> DEBU 518 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [policies] Evaluate -> DEBU 519 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [policies] Evaluate -> DEBU 51a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [msp] DeserializeIdentity -> DEBU 51b Obtaining identity" +orderer0.example.com | "2020-05-20 18:19:57.822 UTC [msp.identity] newIdentity -> DEBU 51c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.823 UTC [cauthdsl] func1 -> DEBU 51d 0xc000daeca0 gate 1589998797823512000 evaluation starts" +orderer0.example.com | "2020-05-20 18:19:57.823 UTC [cauthdsl] func2 -> DEBU 51e 0xc000daeca0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:19:57.823 UTC [cauthdsl] func2 -> DEBU 51f 0xc000daeca0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:19:57.823 UTC [cauthdsl] func2 -> DEBU 520 0xc000daeca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-05-20 18:19:57.823 UTC [cauthdsl] func2 -> DEBU 521 0xc000daeca0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:19:57.823 UTC [cauthdsl] func1 -> DEBU 522 0xc000daeca0 gate 1589998797823512000 evaluation fails" +orderer0.example.com | "2020-05-20 18:19:57.823 UTC [policies] Evaluate -> DEBU 523 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.823 UTC [policies] Evaluate -> DEBU 524 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 525 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [cauthdsl] func1 -> DEBU 526 0xc0005bebb0 gate 1589998797824029600 evaluation starts" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [cauthdsl] func2 -> DEBU 527 0xc0005bebb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [cauthdsl] func2 -> DEBU 528 0xc0005bebb0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 529 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 52a Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [msp] Validate -> DEBU 52b MSP Org1MSP validating identity" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [msp] getCertificationChain -> DEBU 52c MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [msp] hasOURole -> DEBU 52d MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [msp] getCertificationChain -> DEBU 52e MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [cauthdsl] func2 -> DEBU 52f 0xc0005bebb0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [msp.identity] Verify -> DEBU 530 Verify: digest = 00000000 a9 37 8b cd a3 3d 52 8a 05 e3 c2 73 6a be cb ae |.7...=R....sj...| +orderer0.example.com | 00000010 37 24 4f dc a7 54 65 45 5a 6f 5f 5d 12 d6 03 ec |7$O..TeEZo_]....|" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [msp.identity] Verify -> DEBU 531 Verify: sig = 00000000 30 45 02 21 00 89 08 e9 47 23 b2 b1 53 9a 62 df |0E.!....G#..S.b.| +orderer0.example.com | 00000010 cd 53 5a bc 46 67 c4 e8 d7 18 d5 4f 96 60 53 b3 |.SZ.Fg.....O.`S.| +orderer0.example.com | 00000020 5b 33 1a 2b e3 02 20 72 7d d7 cf 99 12 b6 1e 2f |[3.+.. r}....../| +orderer0.example.com | 00000030 85 95 3e e9 5e cd d0 36 f2 03 e8 1c f1 e6 10 46 |..>.^..6.......F| +orderer0.example.com | 00000040 a3 43 27 63 8a 09 48 |.C'c..H|" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [cauthdsl] func2 -> DEBU 532 0xc0005bebb0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [cauthdsl] func1 -> DEBU 533 0xc0005bebb0 gate 1589998797824029600 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 534 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 535 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 536 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 537 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-05-20 18:19:57.824 UTC [common.configtx] verifyDeltaSet -> DEBU 538 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 539 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53a Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53b Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53c Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53d Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53e Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 53f Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [23c 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [23d 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [23e 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [23f 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer0.org1.example.com | [240 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [241 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer0.org1.example.com | [242 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer0.org1.example.com | [243 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [244 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer0.org1.example.com | [245 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer0.org1.example.com | [246 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=5ms block_and_pvtdata_commit=6ms state_commit=3ms) commitHash=[] +peer0.org1.example.com | [247 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org1.example.com | [248 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org1.example.com | [249 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [37199412-645b-49ef-a2cd-57dda620760d] +peer0.org1.example.com | [24a 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer0.org1.example.com | [24b 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [37199412-645b-49ef-a2cd-57dda620760d] +peer0.org1.example.com | [24c 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [24d 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [24e 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [24f 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [250 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [251 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [252 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [253 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [254 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [255 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [256 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [257 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [258 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [259 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org1.example.com | [25a 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [25b 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [25c 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [25d 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [25e 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [25f 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [260 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [261 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [262 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [263 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer0.org1.example.com | [264 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [265 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [266 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [267 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [268 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 540 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 541 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 542 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 543 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 544 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.826 UTC [common.configtx] recurseConfigMap -> DEBU 545 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.827 UTC [common.configtx] recurseConfigMap -> DEBU 546 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.827 UTC [common.configtx] recurseConfigMap -> DEBU 547 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.827 UTC [common.configtx] recurseConfigMap -> DEBU 548 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.828 UTC [common.configtx] recurseConfigMap -> DEBU 549 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.829 UTC [common.configtx] recurseConfigMap -> DEBU 54a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.829 UTC [common.configtx] recurseConfigMap -> DEBU 54b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.830 UTC [common.configtx] recurseConfigMap -> DEBU 54c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.830 UTC [common.configtx] recurseConfigMap -> DEBU 54d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.831 UTC [common.configtx] recurseConfigMap -> DEBU 54e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.831 UTC [common.configtx] recurseConfigMap -> DEBU 54f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.831 UTC [common.configtx] recurseConfigMap -> DEBU 550 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.832 UTC [common.configtx] recurseConfigMap -> DEBU 551 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.832 UTC [common.configtx] recurseConfigMap -> DEBU 552 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.833 UTC [common.configtx] recurseConfigMap -> DEBU 553 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.833 UTC [common.configtx] recurseConfigMap -> DEBU 554 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.834 UTC [common.configtx] recurseConfigMap -> DEBU 555 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:19:57.835 UTC [common.channelconfig] NewStandardValues -> DEBU 556 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:19:57.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 557 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:57.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 558 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:57.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 559 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:57.836 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55a Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:19:57.836 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55b Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.836 UTC [common.channelconfig] NewStandardValues -> DEBU 55c Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:19:57.837 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55d Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:19:57.837 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55e Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:19:57.837 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55f Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:57.837 UTC [common.channelconfig] initializeProtosStruct -> DEBU 560 Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:19:57.838 UTC [common.channelconfig] initializeProtosStruct -> DEBU 561 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:57.838 UTC [common.channelconfig] initializeProtosStruct -> DEBU 562 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.839 UTC [common.channelconfig] NewStandardValues -> DEBU 563 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.839 UTC [common.channelconfig] initializeProtosStruct -> DEBU 564 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:19:57.839 UTC [common.channelconfig] NewStandardValues -> DEBU 565 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.839 UTC [common.channelconfig] initializeProtosStruct -> DEBU 566 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.839 UTC [common.channelconfig] validateMSP -> DEBU 567 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.839 UTC [msp] newBccspMsp -> DEBU 568 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.840 UTC [msp] New -> DEBU 569 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.840 UTC [msp] Setup -> DEBU 56a Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:57.840 UTC [msp.identity] newIdentity -> DEBU 56b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | [3a7 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org1.example.com | [3a8 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org1.example.com | [3a9 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [3aa 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ab 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ac 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ad 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ae 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3af 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f9a10 gate 1589998802239364700 evaluation starts +peer1.org1.example.com | [3b0 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f9a10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b1 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f9a10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3b2 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f9a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3b3 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f9a10 principal evaluation fails +peer1.org1.example.com | [3b4 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f9a10 gate 1589998802239364700 evaluation fails +peer1.org1.example.com | [3b5 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b6 05-20 18:20:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b7 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b8 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2860 gate 1589998802240767900 evaluation starts +peer1.org1.example.com | [3b9 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ba 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2860 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3bb 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [3bc 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3bd 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3be 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2860 principal matched by identity 0 +peer1.org1.example.com | [3bf 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 c6 ce 13 cc b2 90 f3 c6 65 54 86 e2 67 40 29 |(........eT..g@)| +peer1.org1.example.com | 00000010 80 78 87 b2 05 8e db 45 e7 23 b7 fb 9c 6a 34 13 |.x.....E.#...j4.| +peer1.org1.example.com | [3c0 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 bc 48 44 2d dd d3 64 bb fc cd |0E.!...HD-..d...| +peer1.org1.example.com | 00000010 af fb ef 62 b9 71 8c e3 28 dc d8 02 26 b7 6f ac |...b.q..(...&.o.| +peer1.org1.example.com | 00000020 86 be 11 60 13 02 20 0d b5 ec 7b 4e b5 e2 c3 2c |...`.. ...{N...,| +peer1.org1.example.com | 00000030 01 20 09 5e 2a 33 16 fb 17 bf 9b ce 68 1a 45 29 |. .^*3......h.E)| +peer1.org1.example.com | 00000040 83 f3 22 0e 29 a1 dc |..".)..| +peer1.org1.example.com | [3c1 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2860 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c2 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2860 gate 1589998802240767900 evaluation succeeds +peer1.org1.example.com | [3c3 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c4 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c5 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c6 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c7 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU [145329e6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [3c8 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU [145329e6] notifying Txid:145329e687ff34dbda23deb0b7401210f0152441b34b256596fa00d485707e29, channelID: +peer1.org1.example.com | [3c9 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3ca 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> INFO [][145329e6] Exit chaincode: name:"qscc" (6ms) +peer1.org1.example.com | [3cb 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU [][145329e6] Exit +peer1.org1.example.com | [3cc 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47668 +peer1.org1.example.com | [3cd 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47668 grpc.code=OK grpc.call_duration=9.3153ms +peer1.org1.example.com | [3ce 05-20 18:20:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3cf 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3d0 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816100A +peer1.org2.example.com | [394 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [395 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [396 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [397 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [398 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [399 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [39a 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [39b 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [39c 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [39d 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [39e 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [39f 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [3a0 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [3a1 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [3a2 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [3a3 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [269 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [26a 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [26b 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [26c 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [26d 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [26e 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [26f 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [270 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [271 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [272 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [273 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [274 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [275 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [276 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [277 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [278 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [279 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [27a 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [27b 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [27c 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [27d 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [27e 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [27f 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [280 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [281 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [282 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [283 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org1.example.com | [284 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [285 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [286 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [287 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org1.example.com | [288 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [289 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [28a 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [28b 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [28c 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [28d 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [28e 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [28f 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [290 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [291 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [292 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [293 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [294 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [295 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [296 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [297 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [298 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [299 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [29a 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [29b 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [29c 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [29d 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [29e 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [29f 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2a0 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.841 UTC [common.channelconfig] NewStandardValues -> DEBU 56c Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:19:57.841 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56d Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:19:57.841 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56e Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.842 UTC [common.channelconfig] NewStandardValues -> DEBU 56f Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.842 UTC [common.channelconfig] initializeProtosStruct -> DEBU 570 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:19:57.842 UTC [common.channelconfig] NewStandardValues -> DEBU 571 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.842 UTC [common.channelconfig] initializeProtosStruct -> DEBU 572 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.842 UTC [common.channelconfig] Validate -> DEBU 573 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-05-20 18:19:57.842 UTC [common.channelconfig] validateMSP -> DEBU 574 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.843 UTC [msp] newBccspMsp -> DEBU 575 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.843 UTC [msp] New -> DEBU 576 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.843 UTC [msp] Setup -> DEBU 577 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.844 UTC [msp.identity] newIdentity -> DEBU 578 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.846 UTC [common.channelconfig] NewStandardValues -> DEBU 579 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.846 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:19:57.846 UTC [common.channelconfig] NewStandardValues -> DEBU 57b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.846 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57c Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.846 UTC [common.channelconfig] Validate -> DEBU 57d Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-05-20 18:19:57.846 UTC [common.channelconfig] validateMSP -> DEBU 57e Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.846 UTC [msp] newBccspMsp -> DEBU 57f Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.847 UTC [msp] New -> DEBU 580 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.847 UTC [msp] Setup -> DEBU 581 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.847 UTC [msp.identity] newIdentity -> DEBU 582 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.847 UTC [msp] Setup -> DEBU 583 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:19:57.848 UTC [msp] Setup -> DEBU 584 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:19:57.848 UTC [policies] NewManagerImpl -> DEBU 585 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.848 UTC [policies] NewManagerImpl -> DEBU 586 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.848 UTC [policies] NewManagerImpl -> DEBU 587 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 588 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 59c Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 59d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 59e Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 59f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org2.example.com | [2a8 05-20 18:20:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2a9 05-20 18:20:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2aa 05-20 18:20:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2ab 05-20 18:20:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161009 +peer0.org2.example.com | [2ac 05-20 18:20:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 714B0DC775C0378A814EE2E7361559F2F9D07802A3CA934FADB86BB5846C9D40 +peer0.org2.example.com | [2ad 05-20 18:20:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2ae 05-20 18:20:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2af 05-20 18:20:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2b0 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:07.848Z grpc.peer_address=172.18.0.7:34556 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=135.9µs +peer0.org2.example.com | [2b1 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2b2 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [2b3 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [2b4 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [2b7 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b8 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2b9 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2ba 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2bb 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2bc 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bd 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2be 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bf 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a1 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [2a2 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [2a3 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [2a4 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [2a5 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [2a6 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a7 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2a8 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [2a9 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [2aa 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [2ab 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ac 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2ad 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [2ae 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [2af 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [2b0 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [2b1 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [2b2 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [2b3 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [2b4 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [2b5 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [2b6 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [2b7 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [2b8 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [2b9 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [2ba 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [2bb 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [2bc 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [2bd 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [2be 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [2bf 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [2c0 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [2c1 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [2c2 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [2c3 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [2c4 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [2c5 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [2c6 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [2c7 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [2c8 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [2c9 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [2ca 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [2cb 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [2cc 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [2cd 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [2ce 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [2cf 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [2d0 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [2d1 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [2d2 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [2d3 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [2d4 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [2d5 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [2d6 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org1.example.com | [2d7 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org1.example.com | [2d8 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [2d9 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [2da 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [2db 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org1.example.com | [2dc 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [3d1 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 863D4505C4E337E719CA0D5514A1C9F87D90B8C7D0E5850831F5786345C8566E +peer1.org1.example.com | [3d2 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3d3 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3d4 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3d5 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3d6 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3d7 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3d8 05-20 18:20:03.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d9 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3da 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3db 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dc 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [3dd 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [3de 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3e 5c 4a 11 e1 a3 69 d4 28 30 4d f7 e2 3d 3f |/>\J...i.(0M..=?| +peer1.org1.example.com | 00000010 b5 1c 6f 96 b3 ef b9 a2 dc d4 aa 30 25 70 c7 29 |..o........0%p.)| +peer1.org1.example.com | [3df 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 86 23 6c 12 fe e6 23 43 2b a1 |0E.!...#l...#C+.| +peer1.org1.example.com | 00000010 35 62 8d ab 15 e5 77 95 57 d4 f5 4c 02 79 bd 58 |5b....w.W..L.y.X| +peer1.org1.example.com | 00000020 84 96 b6 36 97 02 20 30 a1 f7 0f 63 f5 dd 55 6d |...6.. 0...c..Um| +peer1.org1.example.com | 00000030 9d bf b7 42 24 ef 9a 3e cb 01 23 53 09 7e 68 09 |...B$..>..#S.~h.| +peer1.org1.example.com | 00000040 4b 61 c8 f9 67 09 9a |Ka..g..| +peer1.org1.example.com | [3e0 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e1 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e2 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3e3 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3e4 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3e5 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e6 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3e7 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2620 gate 1589998803658226000 evaluation starts +peer1.org1.example.com | [3e8 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2620 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e9 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2620 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3ea 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3eb 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2620 principal evaluation fails +peer1.org1.example.com | [3ec 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2620 gate 1589998803658226000 evaluation fails +peer1.org1.example.com | [3ed 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ee 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ef 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f0 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d3470 gate 1589998803659243400 evaluation starts +peer1.org1.example.com | [3f1 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d3470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f2 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d3470 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3f3 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [3f4 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3f5 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3f6 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d3470 principal matched by identity 0 +peer1.org1.example.com | [3f7 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3e 5c 4a 11 e1 a3 69 d4 28 30 4d f7 e2 3d 3f |/>\J...i.(0M..=?| +peer1.org1.example.com | 00000010 b5 1c 6f 96 b3 ef b9 a2 dc d4 aa 30 25 70 c7 29 |..o........0%p.)| +peer1.org1.example.com | [3f8 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 86 23 6c 12 fe e6 23 43 2b a1 |0E.!...#l...#C+.| +peer1.org1.example.com | 00000010 35 62 8d ab 15 e5 77 95 57 d4 f5 4c 02 79 bd 58 |5b....w.W..L.y.X| +peer1.org1.example.com | 00000020 84 96 b6 36 97 02 20 30 a1 f7 0f 63 f5 dd 55 6d |...6.. 0...c..Um| +peer1.org1.example.com | 00000030 9d bf b7 42 24 ef 9a 3e cb 01 23 53 09 7e 68 09 |...B$..>..#S.~h.| +peer1.org1.example.com | 00000040 4b 61 c8 f9 67 09 9a |Ka..g..| +peer1.org1.example.com | [3f9 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d3470 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3fa 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d3470 gate 1589998803659243400 evaluation succeeds +peer1.org1.example.com | [3fb 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fc 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fd 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3fe 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ff 05-20 18:20:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [400 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [401 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [402 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [403 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [404 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [405 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 96 0a 79 5e 9a 97 aa c8 0b c7 c0 eb 62 62 e6 |...y^........bb.| +peer1.org1.example.com | 00000010 5f 5b 36 d8 60 ce f8 bf da fb 8b d3 d7 38 56 39 |_[6.`........8V9| +peer1.org1.example.com | [406 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f fd cb c4 f3 66 62 f9 fc c5 9f a6 |0D. o....fb.....| +peer1.org1.example.com | 00000010 7d 96 f4 ba 5a 6c 62 4a 40 6b 6e d9 f3 7c 3b 14 |}...ZlbJ@kn..|;.| +peer1.org1.example.com | 00000020 90 4e 80 e3 02 20 64 61 59 fc 95 37 23 36 d9 a5 |.N... daY..7#6..| +peer1.org1.example.com | 00000030 93 c1 a2 f5 97 8a 30 ec 5b 82 3c e3 9a a1 2d c5 |......0.[.<...-.| +peer1.org1.example.com | 00000040 9e fd 2b 8f f3 66 |..+..f| +peer1.org1.example.com | [407 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [408 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 ed e0 12 39 de 5f f6 53 84 0e 14 |0D. (...9._.S...| +peer1.org1.example.com | 00000010 62 29 04 47 69 30 47 e1 a3 1c 8c 0a 44 6e b9 e6 |b).Gi0G.....Dn..| +peer1.org1.example.com | 00000020 f2 a9 0b 6e 02 20 33 c2 0c 30 0c 1b c8 44 5d 75 |...n. 3..0...D]u| +peer1.org1.example.com | 00000030 29 9e 49 90 08 86 ce ad 61 f9 a4 d1 10 8c e9 ae |).I.....a.......| +peer1.org1.example.com | 00000040 20 44 12 c1 55 07 | D..U.| +peer1.org1.example.com | [409 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [40a 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [40b 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [40c 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [40d 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [40e 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40f 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [410 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [411 05-20 18:20:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [412 05-20 18:20:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.capabilities] Supported -> DEBU 5c8 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:19:57.857 UTC [common.capabilities] Supported -> DEBU 5c9 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:19:57.858 UTC [orderer.common.cluster] NewStream -> DEBU 5ca Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +orderer0.example.com | "2020-05-20 18:19:57.858 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 5cb Sending msg of 29303 bytes to 3 on channel testchainid took 91.6µs" +orderer0.example.com | "2020-05-20 18:19:57.858 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 5cc [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:53412" +orderer0.example.com | "2020-05-20 18:19:57.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5cd Send of SubmitRequest for channel testchainid with payload of size 29303 to orderer2.example.com(orderer2.example.com:7050) took 132µs " +orderer0.example.com | "2020-05-20 18:19:57.864 UTC [common.deliver] deliverBlocks -> DEBU 5ce Rejecting deliver for 172.18.0.9:53410 because channel businesschannel not found" +orderer0.example.com | "2020-05-20 18:19:57.864 UTC [orderer.common.server] func1 -> DEBU 5cf Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:19:57.865 UTC [comm.grpc.server] 1 -> INFO 5d0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53410 grpc.code=OK grpc.call_duration=154.9308ms +orderer0.example.com | "2020-05-20 18:19:57.866 UTC [orderer.common.broadcast] Handle -> DEBU 5d1 Received EOF from 172.18.0.9:53412, hangup" +orderer0.example.com | "2020-05-20 18:19:57.875 UTC [orderer.common.server] func1 -> DEBU 5d3 Closing Broadcast stream" +orderer0.example.com | "2020-05-20 18:19:57.877 UTC [comm.grpc.server] 1 -> INFO 5d4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53412 grpc.code=OK grpc.call_duration=138.9457ms +orderer0.example.com | "2020-05-20 18:19:57.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 29514" +orderer0.example.com | "2020-05-20 18:19:57.897 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d5 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2020-05-20 18:19:57.898 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5d6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.6µs " +orderer0.example.com | "2020-05-20 18:19:57.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:57.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d8 Sending msg of 28 bytes to 3 on channel testchainid took 1.8974ms" +orderer0.example.com | "2020-05-20 18:19:57.903 UTC [orderer.common.server] Deliver -> DEBU 5d9 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:19:57.905 UTC [common.deliver] Handle -> DEBU 5dc Starting new deliver loop for 172.18.0.9:53414" +orderer0.example.com | "2020-05-20 18:19:57.904 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5da Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +orderer0.example.com | "2020-05-20 18:19:57.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5db Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.3µs " +orderer0.example.com | "2020-05-20 18:19:57.907 UTC [common.channelconfig] NewStandardValues -> DEBU 5dd Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:19:57.907 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5de Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:57.908 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5df Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e0 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e1 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e2 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.909 UTC [common.channelconfig] NewStandardValues -> DEBU 5e3 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e4 Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e5 Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e6 Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e7 Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:19:57.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e8 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:57.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e9 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.911 UTC [common.channelconfig] NewStandardValues -> DEBU 5ea Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.911 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5eb Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:19:57.911 UTC [common.channelconfig] NewStandardValues -> DEBU 5ec Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.911 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ed Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.911 UTC [common.channelconfig] validateMSP -> DEBU 5ee Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.913 UTC [msp] newBccspMsp -> DEBU 5ef Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.913 UTC [msp] New -> DEBU 5f0 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.913 UTC [msp] Setup -> DEBU 5f1 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:19:57.914 UTC [msp.identity] newIdentity -> DEBU 5f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.915 UTC [common.channelconfig] NewStandardValues -> DEBU 5f4 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:19:57.906 UTC [common.deliver] Handle -> DEBU 5f3 Attempting to read seek info message from 172.18.0.9:53414" +orderer0.example.com | "2020-05-20 18:19:57.915 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f5 Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f6 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [common.channelconfig] NewStandardValues -> DEBU 5f7 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f8 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [common.channelconfig] NewStandardValues -> DEBU 5f9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fa Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [common.channelconfig] Validate -> DEBU 5fb Anchor peers for org Org2MSP are " +peer1.org2.example.com | [3a4 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [3a5 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [3a6 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [3a7 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [3a8 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a9 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [3aa 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [3ab 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [3ac 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ad 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [3ae 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [3af 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [3b0 05-20 18:20:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [3b1 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [3b2 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [3b3 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [3b4 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [3b5 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [3b6 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [3b7 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3b8 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [3b9 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [3ba 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [3bb 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [3bc 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [3bd 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [3be 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [3bf 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [3c0 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [3c1 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [3c2 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [3c3 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [3c4 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [3c5 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [3c6 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [3c7 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [3c8 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [3c9 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [3ca 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [3cb 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [3cc 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [3cd 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [3ce 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [3cf 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [3d0 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3d1 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3d2 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [3d3 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [3d4 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [3d5 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [3d6 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [3d7 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [3d8 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [3d9 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3da 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3db 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [3dc 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [3dd 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [3de 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [common.channelconfig] validateMSP -> DEBU 5fc Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [msp] newBccspMsp -> DEBU 5fd Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.916 UTC [msp] New -> DEBU 5fe Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.917 UTC [msp] Setup -> DEBU 5ff Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.919 UTC [msp.identity] newIdentity -> DEBU 600 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.921 UTC [common.channelconfig] NewStandardValues -> DEBU 601 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:19:57.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 602 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:19:57.921 UTC [common.channelconfig] NewStandardValues -> DEBU 603 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:19:57.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 604 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:19:57.922 UTC [common.channelconfig] Validate -> DEBU 605 Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-05-20 18:19:57.923 UTC [common.channelconfig] validateMSP -> DEBU 606 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.923 UTC [msp] newBccspMsp -> DEBU 607 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.923 UTC [msp] New -> DEBU 608 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:19:57.923 UTC [msp] Setup -> DEBU 609 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.924 UTC [msp.identity] newIdentity -> DEBU 60a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:57.927 UTC [msp] Setup -> DEBU 60b Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:19:57.927 UTC [msp] Setup -> DEBU 60c MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 60d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 60e Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 60f Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 610 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 611 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 612 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 613 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 614 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 615 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 616 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 617 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 618 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 619 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 61a Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 61b Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 61c Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 61d Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 61e Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 61f Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 620 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 621 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 622 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 623 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [common.configtx] addToMap -> DEBU 624 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [common.configtx] addToMap -> DEBU 625 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [common.configtx] addToMap -> DEBU 626 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.930 UTC [common.configtx] addToMap -> DEBU 627 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 628 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 629 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62b Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62e Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62f Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 630 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 631 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 632 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 633 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 634 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 635 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 636 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:57.933 UTC [common.configtx] addToMap -> DEBU 637 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:57.933 UTC [common.configtx] addToMap -> DEBU 638 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:57.933 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.933 UTC [common.configtx] addToMap -> DEBU 63a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63b Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63d Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 640 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 641 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 643 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 644 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 645 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 646 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 647 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64e Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64f Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [common.channelconfig] LogSanityChecks -> DEBU 650 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [common.channelconfig] LogSanityChecks -> DEBU 651 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [policies] Manager -> DEBU 652 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:19:57.936 UTC [policies] Manager -> DEBU 653 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 654 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 655 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 656 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 657 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [common.channelconfig] LogSanityChecks -> DEBU 658 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [common.channelconfig] LogSanityChecks -> DEBU 659 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [common.channelconfig] LogSanityChecks -> DEBU 65a As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 65b Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 65c Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:19:57.938 UTC [policies] Manager -> DEBU 65d Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:19:57.938 UTC [policies] Manager -> DEBU 65e Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-05-20 18:19:57.938 UTC [policies] Manager -> DEBU 65f Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-05-20 18:19:57.945 UTC [common.channelconfig] LogSanityChecks -> DEBU 660 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-05-20 18:19:57.945 UTC [common.channelconfig] LogSanityChecks -> DEBU 661 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-05-20 18:19:57.945 UTC [common.channelconfig] LogSanityChecks -> DEBU 662 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-05-20 18:19:57.945 UTC [common.channelconfig] LogSanityChecks -> DEBU 663 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-05-20 18:19:57.945 UTC [common.capabilities] Supported -> DEBU 664 Orderer capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | [2dd 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [2de 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [2df 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [2e0 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [2e1 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org1.example.com | [2e2 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org1.example.com | [2e3 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org1.example.com | [2e4 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [2e5 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2e6 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org1.example.com | [2e7 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org1.example.com | [2e8 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org1.example.com | [2e9 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org1.example.com | [2ea 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org1.example.com | [2eb 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2ec 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8EB97EEBEEFB38816...096D8DADEA4206176416CB532A020801 +peer0.org1.example.com | [2ed 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D63F0F08BF65DB766A2A7590DC74DAD29420359A7BEBA8666718ACAD657ACDE0 +peer0.org1.example.com | [2ee 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org1.example.com | [2ef 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org1.example.com | [2f0 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org1.example.com | [2f1 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2f2 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [34e0b9ba-4c8f-4f56-84d6-dec84f247c40] +peer0.org1.example.com | [2f3 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2f4 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [2f5 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [2f6 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [34e0b9ba] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2f7 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [34e0b9ba] notifying Txid:34e0b9ba-4c8f-4f56-84d6-dec84f247c40, channelID:businesschannel +peer0.org1.example.com | [2f8 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2f9 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [2fa 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [34e0b9ba-4c8f-4f56-84d6-dec84f247c40] +peer0.org1.example.com | [2fb 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2fc 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b79cb1bd-408f-4bb9-9020-0c3720046c49] +peer0.org1.example.com | [2fd 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2fe 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | [2ff 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [b79cb1bd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [300 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [b79cb1bd] notifying Txid:b79cb1bd-408f-4bb9-9020-0c3720046c49, channelID:businesschannel +peer0.org1.example.com | [301 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [302 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [303 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b79cb1bd-408f-4bb9-9020-0c3720046c49] +peer0.org1.example.com | [304 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [305 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [663d5f9e-363e-429c-b9ca-ce3518cdba03] +peer0.org1.example.com | [306 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [307 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [308 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [663d5f9e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [309 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [663d5f9e] notifying Txid:663d5f9e-363e-429c-b9ca-ce3518cdba03, channelID:businesschannel +peer0.org1.example.com | [30a 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [30b 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [30c 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [663d5f9e-363e-429c-b9ca-ce3518cdba03] +peer0.org1.example.com | [30d 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org1.example.com | [30e 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f9d4ee41-f9b6-43da-ab52-f3c2282470e0] +peer0.org1.example.com | [30f 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org1.example.com | [310 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f9d4ee41-f9b6-43da-ab52-f3c2282470e0] +peer0.org1.example.com | [311 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [312 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8EB97EEBEEFB38816...096D8DADEA4206176416CB532A020801 +peer0.org2.example.com | [2c0 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c1 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c2 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c3 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c4 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c5 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c6 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048520 gate 1589998805856471800 evaluation starts +peer0.org2.example.com | [2c7 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048520 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c8 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048520 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c9 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ca 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048520 principal evaluation fails +peer0.org2.example.com | [2cb 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048520 gate 1589998805856471800 evaluation fails +peer0.org2.example.com | [2cc 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cd 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ce 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2cf 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048ab0 gate 1589998805856844100 evaluation starts +peer0.org2.example.com | [2d0 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048ab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d1 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048ab0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2d2 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [2d3 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2d4 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2d5 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048ab0 principal matched by identity 0 +peer0.org2.example.com | [2d6 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [2d7 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 24 2f 12 3b 13 42 2f b3 86 1d |0E.!..$/.;.B/...| +peer0.org2.example.com | 00000010 43 8d 69 1f 8a 02 60 e8 fa 8e 0c 97 ad f3 d2 2e |C.i...`.........| +peer0.org2.example.com | 00000020 b5 83 7c 39 4d 02 20 19 f3 af 18 0c 17 57 86 76 |..|9M. ......W.v| +peer0.org2.example.com | 00000030 4c 0c 20 5a c1 02 78 04 71 65 dd 57 73 df 67 c9 |L. Z..x.qe.Ws.g.| +peer0.org2.example.com | 00000040 ec 00 c8 82 0e ed c3 |.......| +peer0.org2.example.com | [2d8 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048ab0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d9 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048ab0 gate 1589998805856844100 evaluation succeeds +peer0.org2.example.com | [2da 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2db 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2dc 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2dd 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2de 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34556 +peer0.org2.example.com | [2df 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34556 +peer0.org2.example.com | [2e0 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2e1 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [2e2 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:34556 disconnected +peer0.org2.example.com | [2e3 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:15.852Z grpc.peer_address=172.18.0.7:34556 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=53.4764ms +peer0.org2.example.com | [2e4 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [2e5 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:07.941Z grpc.peer_address=172.18.0.7:34558 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=112.6µs +peer0.org2.example.com | [2e6 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2e7 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [2e8 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [2e9 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [2ec 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ed 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ee 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ef 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f0 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f1 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f2 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f3 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f4 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f5 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f6 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085860 gate 1589998805945339400 evaluation starts +peer0.org2.example.com | [2f7 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f8 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085860 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2f9 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2fa 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085860 principal evaluation fails +peer0.org2.example.com | [2fb 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085860 gate 1589998805945339400 evaluation fails +peer0.org2.example.com | [2fc 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fd 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fe 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ff 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085dd0 gate 1589998805945668900 evaluation starts +peer0.org2.example.com | [300 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085dd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [301 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085dd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [302 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085dd0 principal matched by identity 0 +peer0.org2.example.com | [303 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [304 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 4d 59 b4 02 ba 61 82 8a 25 ce |0E.!..MY...a..%.| +peer0.org2.example.com | 00000010 54 a4 a4 55 84 40 75 df b9 69 63 0a 7c 37 5c e2 |T..U.@u..ic.|7\.| +peer0.org2.example.com | 00000020 a4 04 28 27 0d 02 20 5b 95 5e 30 0e df c3 c0 e4 |..('.. [.^0.....| +peer0.org2.example.com | 00000030 6f 7a bf c5 c1 37 3a d5 6c d5 6d 15 e7 43 2d 59 |oz...7:.l.m..C-Y| +peer0.org2.example.com | 00000040 ff 18 a4 ae 33 fa d0 |....3..| +orderer0.example.com | "2020-05-20 18:19:57.946 UTC [common.capabilities] Supported -> DEBU 665 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:19:57.946 UTC [fsblkstorage] newBlockfileMgr -> DEBU 666 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +orderer0.example.com | "2020-05-20 18:19:57.946 UTC [kvledger.util] CreateDirIfMissing -> DEBU 667 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +orderer0.example.com | "2020-05-20 18:19:57.946 UTC [kvledger.util] logDirStatus -> DEBU 668 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +orderer0.example.com | "2020-05-20 18:19:57.949 UTC [kvledger.util] logDirStatus -> DEBU 669 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +orderer0.example.com | "2020-05-20 18:19:57.949 UTC [fsblkstorage] newBlockfileMgr -> INFO 66a Getting block information from block storage" +orderer0.example.com | "2020-05-20 18:19:57.950 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66b Retrieving checkpoint info from block files" +orderer0.example.com | "2020-05-20 18:19:57.950 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 66c retrieveLastFileSuffix()" +orderer0.example.com | "2020-05-20 18:19:57.950 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 66d retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2020-05-20 18:19:57.950 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66e Last file number found = -1" +orderer0.example.com | "2020-05-20 18:19:57.951 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66f No block file found" +orderer0.example.com | "2020-05-20 18:19:57.951 UTC [fsblkstorage] newBlockfileMgr -> DEBU 670 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0000ccce0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2020-05-20 18:19:57.958 UTC [fsblkstorage] newBlockIndex -> DEBU 671 newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2020-05-20 18:19:57.960 UTC [orderer.common.server] func1 -> DEBU 672 Executing callback to update root CAs" +orderer0.example.com | "2020-05-20 18:19:57.961 UTC [orderer.common.server] updateTrustedRoots -> DEBU 674 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-05-20 18:19:57.961 UTC [orderer.common.server] updateTrustedRoots -> DEBU 675 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-05-20 18:19:57.961 UTC [orderer.common.server] updateTrustedRoots -> DEBU 676 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-05-20 18:19:57.961 UTC [orderer.common.server] updateTrustedRoots -> DEBU 677 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-05-20 18:19:57.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 673 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:57.964 UTC [fsblkstorage] indexBlock -> DEBU 678 Indexing block [blockNum=0, blockHash=[]byte{0xfa, 0x23, 0xe2, 0xb8, 0x2a, 0x9a, 0x88, 0xab, 0xe1, 0x10, 0x81, 0xae, 0xa5, 0x6, 0xf5, 0xf1, 0x22, 0x82, 0x0, 0xe, 0x6e, 0x5c, 0x2d, 0x5e, 0xf7, 0xc1, 0x60, 0xa4, 0x8c, 0xf3, 0x4, 0xc7} txOffsets= +orderer0.example.com | txId=bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5 locPointer=offset=39, bytesLength=28429 +orderer0.example.com | ]" +orderer0.example.com | "2020-05-20 18:19:57.966 UTC [fsblkstorage] updateCheckpoint -> DEBU 679 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28474], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2020-05-20 18:19:57.966 UTC [fsblkstorage] Next -> DEBU 67a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-05-20 18:19:57.966 UTC [fsblkstorage] newBlockfileStream -> DEBU 67b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-05-20 18:19:57.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67c Remaining bytes=[28474], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:19:57.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67d Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-05-20 18:19:57.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67e blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-05-20 18:19:57.967 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 67f [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +orderer0.example.com | "2020-05-20 18:19:57.968 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 680 EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2020-05-20 18:19:57.968 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 681 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.968 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 682 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.971 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 683 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.972 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 684 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.972 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 685 Appending 0 entries to memory storage" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.972 UTC [fsblkstorage] Next -> DEBU 686 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-05-20 18:19:57.972 UTC [fsblkstorage] newBlockfileStream -> DEBU 687 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-05-20 18:19:57.972 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 688 Remaining bytes=[28474], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:19:57.973 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 689 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-05-20 18:19:57.973 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68a blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-05-20 18:19:57.973 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 68b [channel: businesschannel] Done creating channel support resources" +orderer0.example.com | "2020-05-20 18:19:57.973 UTC [orderer.commmon.multichannel] newChain -> INFO 68c Created and starting new chain businesschannel" +orderer0.example.com | "2020-05-20 18:19:57.973 UTC [orderer.consensus.etcdraft] Start -> INFO 68d Starting Raft node" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.973 UTC [orderer.common.cluster] Configure -> INFO 68e Entering, channel: businesschannel, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2020-05-20 18:19:57.975 UTC [orderer.common.cluster] updateStubInMapping -> INFO 68f Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer0.example.com | "2020-05-20 18:19:57.975 UTC [orderer.common.cluster] updateStubInMapping -> INFO 690 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-05-20 18:19:57.976 UTC [orderer.common.cluster] func1 -> DEBU 691 Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer1.org2.example.com | [3df 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [3e0 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [3e1 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [3e2 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [3e3 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [3e4 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [3e5 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org2.example.com | [3e6 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [3e7 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [3e8 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [3e9 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [3ea 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [3eb 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ec 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [3ed 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [3ee 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [3ef 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [3f0 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [3f1 05-20 18:20:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [3f2 05-20 18:20:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [3f3 05-20 18:20:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0032a0600, CONNECTING +peer1.org2.example.com | [3f4 05-20 18:20:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0032a0600, READY +peer1.org2.example.com | [3f5 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3f6 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [3f7 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [3f8 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [3f9 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org2.example.com | [3fa 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fb 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fc 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3fd 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [3fe 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [313 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2F3E5C4A11E1A369D428304DF7E23D3FB51C6F96B3EFB9A2DCD4AA302570C729 +peer0.org1.example.com | [314 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [315 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [a90fb794] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [316 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [a90fb794] notifying Txid:a90fb7940e66ef0e4f0ddcc4afb11d94de4e06dcc6118772434b3ca1e9d9a130, channelID: +peer0.org1.example.com | [317 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [318 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> INFO [][a90fb794] Exit chaincode: name:"cscc" (86ms) +peer0.org1.example.com | [319 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [][a90fb794] Exit +peer0.org1.example.com | [31a 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37006 +peer0.org1.example.com | [31b 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37006 grpc.code=OK grpc.call_duration=89.8091ms +peer0.org1.example.com | [31c 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37006: read: connection reset by peer +peer0.org1.example.com | [31d 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [31e 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [31f 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [320 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [321 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [322 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [323 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [324 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [325 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 41 41 86 aa 65 08 61 04 69 fe fb 6f 7c fe eb |YAA..e.a.i..o|..| +peer0.org1.example.com | 00000010 5d 11 98 de 46 cc 8d 30 2b 4b b7 34 63 19 36 65 |]...F..0+K.4c.6e| +peer0.org1.example.com | [326 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 5b 25 b4 2f 11 46 97 d5 a2 e9 |0E.!..[%./.F....| +peer0.org1.example.com | 00000010 cc 84 7c f7 7b c8 4f 6d 80 2c 19 21 72 71 02 1e |..|.{.Om.,.!rq..| +peer0.org1.example.com | 00000020 64 76 43 a6 a0 02 20 61 c2 7e 36 e7 8d 91 c6 07 |dvC... a.~6.....| +peer0.org1.example.com | 00000030 73 af 67 ca 01 46 2a d9 86 e5 cb 68 c2 1d 6a c8 |s.g..F*....h..j.| +peer0.org1.example.com | 00000040 f2 a3 fa bd 94 34 1d |.....4.| +peer0.org1.example.com | [327 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [328 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 58 67 31 2a 17 9a 9e 54 af 00 |0E.!..Xg1*...T..| +peer0.org1.example.com | 00000010 10 9b e2 4f 30 58 b0 a4 17 b0 54 4e cf 9b e8 d5 |...O0X....TN....| +peer0.org1.example.com | 00000020 be df 31 ff d2 02 20 5c ed 38 53 26 4f 27 d3 82 |..1... \.8S&O'..| +peer0.org1.example.com | 00000030 54 b7 cc 52 39 7f 43 f0 0d e2 1d b5 3d 52 ce d7 |T..R9.C.....=R..| +peer0.org1.example.com | 00000040 2f f5 3a b9 98 10 b7 |/.:....| +peer0.org1.example.com | [329 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [32a 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [32b 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [32c 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [32d 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [32e 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32f 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [330 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [331 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [332 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [333 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\320\200\336\365:\247\350\005\037\006\345c\267&\034.\021j\317\000\263\250\216R\277\227\002 \\(i\365\246hy\006\313#$\226\020\255>+\314_\252\231C\26483\333\215\361\273\005b\026\332" > > +peer0.org1.example.com | [334 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes +peer0.org1.example.com | [335 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [336 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [337 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting, peers found 0 +peer0.org1.example.com | [338 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [339 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [33a 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [33b 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [33c 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...2D3C120C0884D2B080BFEFB388161001 +peer0.org1.example.com | [33d 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FEBBF7FABC056C7D56C1D6BAA7E5837DD487C2465D7B065F3259115AF0F539A4 +peer0.org1.example.com | [33e 05-20 18:20:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [33f 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [340 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [341 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [342 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [343 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [344 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [345 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [346 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [347 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161009 +peer0.org1.example.com | [348 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C8B9CBC8E447352F6627D7DE1F52F90C5DFB4CA3BA388C83821A5F5591668CC8 +peer0.org1.example.com | [349 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [34a 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [34b 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [34c 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\302\320\333\256\304>m\016\321~\334\035\301\363L\230M\316\201\0043a\346\206\002 v2\372\007\177H\214\305^\244\002L\312\227\300qq\304\234\220\005\315\345\361\252\365\264\325\327\275u\201" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34d 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\302\320\333\256\304>m\016\321~\334\035\301\363L\230M\316\201\0043a\346\206\002 v2\372\007\177H\214\305^\244\002L\312\227\300qq\304\234\220\005\315\345\361\252\365\264\325\327\275u\201" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [34e 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34f 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org1.example.com | [350 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [351 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org1.example.com | [352 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [353 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 b9 cb c8 e4 47 35 2f 66 27 d7 de 1f 52 f9 0c |.....G5/f'...R..| +peer0.org1.example.com | 00000010 5d fb 4c a3 ba 38 8c 83 82 1a 5f 55 91 66 8c c8 |].L..8...._U.f..| +peer0.org1.example.com | [354 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 b2 bc d5 c1 6e 15 d6 68 c5 b5 |0E.!......n..h..| +peer0.org1.example.com | 00000010 ff 52 6a 09 8c b3 3c 2c b8 14 46 78 91 7a 77 0d |.Rj...<,..Fx.zw.| +peer0.org1.example.com | 00000020 b6 3d 92 f8 29 02 20 56 99 7b 5c 5a 2c 57 85 e4 |.=..). V.{\Z,W..| +peer0.org1.example.com | 00000030 6d ee 3d 99 c6 b4 81 b0 a0 c4 17 8d 8e f0 17 37 |m.=............7| +peer0.org1.example.com | 00000040 3f 93 15 2e 08 53 5b |?....S[| +peer0.org1.example.com | [355 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [356 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 4e 48 9d a2 b1 47 3e c2 d0 db ae |0D. .NH...G>....| +peer0.org1.example.com | 00000010 c4 3e 6d 0e d1 7e dc 1d c1 f3 4c 98 4d ce 81 04 |.>m..~....L.M...| +peer0.org1.example.com | 00000020 33 61 e6 86 02 20 76 32 fa 07 7f 48 8c c5 5e a4 |3a... v2...H..^.| +peer0.org1.example.com | 00000030 02 4c ca 97 c0 71 71 c4 9c 90 05 cd e5 f1 aa f5 |.L...qq.........| +peer0.org1.example.com | 00000040 b4 d5 d7 bd 75 81 |....u.| +peer0.org1.example.com | [357 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [358 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [359 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35a 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35b 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37014 +peer0.org1.example.com | [35c 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0030a6b40 +peer0.org1.example.com | [35d 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [35e 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [35f 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [360 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [361 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 35 03 67 9d 68 c3 9a 34 6c 74 42 67 37 58 03 |;5.g.h..4ltBg7X.| +peer0.org1.example.com | 00000010 96 61 1d 93 1f a0 c3 4b bb d1 a2 e6 21 48 e9 93 |.a.....K....!H..| +peer0.org1.example.com | [362 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 b3 e9 b2 0b cc f4 1f 7f ee 8f |0E.!............| +peer0.org1.example.com | 00000010 64 09 01 60 3c 70 cd 14 ad fd db cd 3e 61 a1 78 |d..`a.x| +peer0.org1.example.com | 00000020 26 40 42 6a c4 02 20 5e 6f 9c 4a 4f 85 60 bf 0d |&@Bj.. ^o.JO.`..| +peer0.org1.example.com | 00000030 02 6a f7 18 e8 41 c1 90 6d ed 49 1f 7e 29 45 88 |.j...A..m.I.~)E.| +peer0.org1.example.com | 00000040 e7 a7 ef fe ad a5 3f |......?| +peer0.org1.example.com | [363 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [364 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002b46f50, header 0xc0030a6f50 +peer0.org1.example.com | [365 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [366 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU [][098005f9] processing txid: 098005f9a4c9063aa8e2392b8225912443a9be27b57494d9463a4a0e21b9c17e +peer0.org1.example.com | [367 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU [][098005f9] Entry chaincode: name:"cscc" +peer0.org1.example.com | [368 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> INFO [][098005f9] Entry chaincode: name:"cscc" +peer0.org1.example.com | [369 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [36a 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [36b 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [36c 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [36d 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [36e 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 35 03 67 9d 68 c3 9a 34 6c 74 42 67 37 58 03 |;5.g.h..4ltBg7X.| +peer0.org1.example.com | 00000010 96 61 1d 93 1f a0 c3 4b bb d1 a2 e6 21 48 e9 93 |.a.....K....!H..| +peer0.org1.example.com | [36f 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 b3 e9 b2 0b cc f4 1f 7f ee 8f |0E.!............| +peer0.org1.example.com | 00000010 64 09 01 60 3c 70 cd 14 ad fd db cd 3e 61 a1 78 |d..`a.x| +peer0.org1.example.com | 00000020 26 40 42 6a c4 02 20 5e 6f 9c 4a 4f 85 60 bf 0d |&@Bj.. ^o.JO.`..| +peer0.org1.example.com | 00000030 02 6a f7 18 e8 41 c1 90 6d ed 49 1f 7e 29 45 88 |.j...A..m.I.~)E.| +peer0.org1.example.com | 00000040 e7 a7 ef fe ad a5 3f |......?| +peer0.org1.example.com | [370 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU [098005f9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [371 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU [098005f9] notifying Txid:098005f9a4c9063aa8e2392b8225912443a9be27b57494d9463a4a0e21b9c17e, channelID: +peer0.org1.example.com | [372 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [373 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> INFO [][098005f9] Exit chaincode: name:"cscc" (5ms) +peer0.org1.example.com | [374 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][098005f9] Exit +peer0.org1.example.com | [375 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37014 +peer0.org1.example.com | [376 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37014 grpc.code=OK grpc.call_duration=9.9988ms +peer0.org1.example.com | [377 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [378 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37022 +peer0.org1.example.com | [379 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002b534a0 +peer0.org1.example.com | [37a 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [37b 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [37c 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [37d 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [37e 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 84 e3 82 58 a8 c2 00 03 b3 2d 2a 7d 1a eb bd |....X.....-*}...| +peer0.org1.example.com | 00000010 f7 46 19 4c 30 5e 7a e3 96 11 cf 8f 7a 87 7c 05 |.F.L0^z.....z.|.| +peer0.org1.example.com | [37f 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df b0 6a f0 17 75 7a e8 8b 50 3a |0E.!...j..uz..P:| +peer0.org1.example.com | 00000010 06 d8 3b fb aa 91 64 4c 28 e6 17 e9 e8 76 65 0c |..;...dL(....ve.| +peer0.org1.example.com | 00000020 54 ad 96 b2 00 02 20 54 4a 55 8b d9 8c 53 8f c9 |T..... TJU...S..| +peer0.org1.example.com | 00000030 c7 c6 bd 91 9a 96 32 c6 5f ec 2e 64 36 db b6 1d |......2._..d6...| +peer0.org1.example.com | 00000040 23 fe 89 56 fc 01 9d |#..V...| +peer0.org1.example.com | [380 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [381 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002a268c0, header 0xc002b538b0 +peer0.org1.example.com | [382 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [383 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU [][fbf4ab07] processing txid: fbf4ab07628a4581a4fdf127813900858f84bcc6985588794072b1c6a9aaa029 +peer0.org1.example.com | [384 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU [][fbf4ab07] Entry chaincode: name:"qscc" +peer0.org1.example.com | [385 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> INFO [][fbf4ab07] Entry chaincode: name:"qscc" +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer1.org1.example.com | [413 05-20 18:20:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ff 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [400 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [305 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085dd0 principal evaluation succeeds for identity 0 +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org1.example.com | [414 05-20 18:20:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +peer1.org1.example.com | [415 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [401 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [306 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003085dd0 gate 1589998805945668900 evaluation succeeds +peer0.org1.example.com | [386 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [387 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org1.example.com | [416 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [417 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [402 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [388 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org1.example.com | [418 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 375 bytes, Signature: 0 bytes +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +peer1.org2.example.com | [403 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [307 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [389 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +peer1.org1.example.com | [41a 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 375 bytes, Signature: 0 bytes +peer1.org2.example.com | [404 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [308 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [38a 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38b 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [309 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [419 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [30a 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [405 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +peer1.org1.example.com | [41b 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3e 5c 4a 11 e1 a3 69 d4 28 30 4d f7 e2 3d 3f |/>\J...i.(0M..=?| +peer0.org1.example.com | [38c 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [30b 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34558 +peer1.org2.example.com | [406 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +peer1.org1.example.com | 00000010 b5 1c 6f 96 b3 ef b9 a2 dc d4 aa 30 25 70 c7 29 |..o........0%p.)| +peer0.org1.example.com | [38d 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30c 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34558 +peer1.org2.example.com | [408 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +peer1.org1.example.com | [41c 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 86 23 6c 12 fe e6 23 43 2b a1 |0E.!...#l...#C+.| +peer0.org1.example.com | [38e 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [30d 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:07.965Z grpc.peer_address=172.18.0.8:52570 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=113.5µs +peer1.org2.example.com | [409 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +peer1.org1.example.com | 00000010 35 62 8d ab 15 e5 77 95 57 d4 f5 4c 02 79 bd 58 |5b....w.W..L.y.X| +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [30e 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [40a 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | 00000020 84 96 b6 36 97 02 20 30 a1 f7 0f 63 f5 dd 55 6d |...6.. 0...c..Um| +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [30f 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | 00000030 9d bf b7 42 24 ef 9a 3e cb 01 23 53 09 7e 68 09 |...B$..>..#S.~h.| +peer0.org2.example.com | [310 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000040 4b 61 c8 f9 67 09 9a |Ka..g..| +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [311 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +peer0.org2.example.com | [312 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52570 +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer0.org2.example.com | [313 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer0.org2.example.com | [314 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer0.org2.example.com | [315 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | 00000040 1f 39 c2 0b 9a b3 5c |.9....\| +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [420 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41e 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [421 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [422 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [423 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [424 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [425 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [426 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [427 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [428 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [429 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42a 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [42b 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816100B +peer1.org1.example.com | [42c 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 637B2DC1C8C7EE496052B07DB4AF599DBEEA2441127DD2D2D677C3CFC2A1A557 +peer1.org1.example.com | [42d 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [42e 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [42f 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [430 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [431 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [432 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [433 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer1.org1.example.com | [434 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer1.org1.example.com | [435 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [436 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer1.org1.example.com | [437 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [438 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 7b 2d c1 c8 c7 ee 49 60 52 b0 7d b4 af 59 9d |c{-....I`R.}..Y.| +peer1.org1.example.com | 00000010 be ea 24 41 12 7d d2 d2 d6 77 c3 cf c2 a1 a5 57 |..$A.}...w.....W| +peer1.org1.example.com | [439 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 45 4a 9a 6b 52 01 68 dd af 50 3c |0D. YEJ.kR.h..P<| +peer1.org1.example.com | 00000010 e5 58 98 39 4e ea c1 06 0b de 04 57 67 c9 7e 60 |.X.9N......Wg.~`| +peer1.org1.example.com | 00000020 ac 5c 8e a5 02 20 52 be 0a 1f 21 4d 7c 01 ad 6c |.\... R...!M|..l| +peer1.org1.example.com | 00000030 28 ed 0a 3c ba e9 1a 1b 46 c1 7b 59 ac f4 c7 1c |(..<....F.{Y....| +peer1.org1.example.com | 00000040 38 e4 e2 20 67 37 |8.. g7| +peer1.org1.example.com | [43a 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [43b 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 54 4e 7f 6c 77 a2 13 7c 26 31 c0 |0D. dTN.lw..|&1.| +peer1.org1.example.com | 00000010 ba 8a 41 35 bf 2c b0 f6 a4 b9 ce 11 0a 6c 1b c6 |..A5.,.......l..| +peer1.org1.example.com | 00000020 a9 05 f4 42 02 20 37 46 0a 7e dd 0d e1 16 2e 08 |...B. 7F.~......| +peer1.org1.example.com | 00000030 9d 73 c8 8e d6 0d f7 b1 1d 97 13 cf d8 e3 36 5c |.s............6\| +peer1.org1.example.com | 00000040 46 32 23 fd a6 41 |F2#..A| +peer1.org1.example.com | [43c 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [43d 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [43e 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43f 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [440 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [441 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [442 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [443 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [444 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [445 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [446 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [447 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [448 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [449 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [44a 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d0 19 78 fb 98 0e b6 08 93 d9 2c 7b 3a 6f 90 |...x.......,{:o.| +peer1.org1.example.com | 00000010 f5 ca f8 5c ab b4 0b 1a b9 60 c1 4a 0e 18 0d 04 |...\.....`.J....| +peer1.org1.example.com | [44b 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 c1 e4 ec e2 ef 33 30 a4 a0 64 |0E.!.......30..d| +peer1.org1.example.com | 00000010 d3 f0 e6 58 fa e0 9b 5e ee ac a5 88 2c f7 5e af |...X...^....,.^.| +peer1.org1.example.com | 00000020 83 eb 87 fb d2 02 20 71 39 a5 46 d8 c5 5f 25 9d |...... q9.F.._%.| +peer1.org1.example.com | 00000030 9d 97 7f de 30 cf 8f 3f 98 51 9e 61 d0 9d e1 69 |....0..?.Q.a...i| +peer1.org1.example.com | 00000040 22 33 b7 54 1c e0 e3 |"3.T...| +peer1.org1.example.com | [44c 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [38f 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 gate 1589998802032327000 evaluation starts +peer0.org1.example.com | [390 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [391 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [392 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [393 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 principal evaluation fails +peer0.org1.example.com | [394 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 gate 1589998802032327000 evaluation fails +peer0.org1.example.com | [395 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [396 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [397 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [398 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 gate 1589998802032975000 evaluation starts +peer0.org1.example.com | [399 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39a 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [39b 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [39c 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [39d 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [39e 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 principal matched by identity 0 +peer0.org1.example.com | [39f 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 84 e3 82 58 a8 c2 00 03 b3 2d 2a 7d 1a eb bd |....X.....-*}...| +peer0.org1.example.com | 00000010 f7 46 19 4c 30 5e 7a e3 96 11 cf 8f 7a 87 7c 05 |.F.L0^z.....z.|.| +peer0.org1.example.com | [3a0 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df b0 6a f0 17 75 7a e8 8b 50 3a |0E.!...j..uz..P:| +peer0.org1.example.com | 00000010 06 d8 3b fb aa 91 64 4c 28 e6 17 e9 e8 76 65 0c |..;...dL(....ve.| +peer0.org1.example.com | 00000020 54 ad 96 b2 00 02 20 54 4a 55 8b d9 8c 53 8f c9 |T..... TJU...S..| +peer0.org1.example.com | 00000030 c7 c6 bd 91 9a 96 32 c6 5f ec 2e 64 36 db b6 1d |......2._..d6...| +peer0.org1.example.com | 00000040 23 fe 89 56 fc 01 9d |#..V...| +peer0.org1.example.com | [3a1 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a2 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 gate 1589998802032975000 evaluation succeeds +peer0.org1.example.com | [3a3 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a4 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [316 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [317 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [318 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [319 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2020-05-20 18:19:57.977 UTC [orderer.common.cluster] updateStubInMapping -> INFO 692 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2020-05-20 18:19:57.977 UTC [orderer.common.cluster] updateStubInMapping -> INFO 693 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-05-20 18:19:57.977 UTC [orderer.common.cluster] func1 -> DEBU 694 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [40c 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40d 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [40e 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [40f 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [40b 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [410 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [411 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [412 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [413 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [414 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [415 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334ca00 gate 1589998806657644500 evaluation starts +peer1.org2.example.com | [416 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334ca00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [417 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334ca00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [418 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [419 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [41b 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [41c 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334ca00 principal matched by identity 0 +peer1.org2.example.com | [41d 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [41e 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 de fb 23 5e 64 38 9f 8f b0 85 |0E.!....#^d8....| +peer1.org2.example.com | 00000010 28 3a 4a ea 3c 9b ad ef 39 c9 4d 30 ed 77 91 c4 |(:J.<...9.M0.w..| +peer1.org2.example.com | 00000020 ec 9f 27 e2 f4 02 20 70 60 ed 0f 1f 59 f5 da a5 |..'... p`...Y...| +peer1.org2.example.com | 00000030 96 24 5f f7 47 1d 22 ec 70 10 c3 2e 24 17 09 9a |.$_.G.".p...$...| +peer1.org2.example.com | 00000040 f7 c3 5d 10 75 ef cc |..].u..| +peer1.org2.example.com | [41f 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334ca00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [420 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334ca00 gate 1589998806657644500 evaluation succeeds +peer1.org2.example.com | [421 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [422 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [423 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [424 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [425 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [41a 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 82ms +peer1.org2.example.com | [426 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [427 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [428 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [42a 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [42b 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer1.org2.example.com | [42c 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [42d 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [407 05-20 18:20:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002f55740 env 0xc0030ceb40 txn 0 +peer1.org2.example.com | [429 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [42f 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816100D +peer1.org2.example.com | [430 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E74B2228290930189667D99CCE66E9A865FBBE6F81563C02385C359229FF9C7C +peer1.org2.example.com | [42e 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [431 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [432 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer1.org2.example.com | [433 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [434 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [435 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [436 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [437 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [438 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [439 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [43a 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [43b 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [43c 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [43d 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [44d 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 01 cb 78 66 24 77 3b c8 ab |0E.!..`..xf$w;..| +peer1.org1.example.com | 00000010 f6 68 7e cb 79 f3 7e 74 58 4c cc e4 2e 26 f0 65 |.h~.y.~tXL...&.e| +peer1.org1.example.com | 00000020 22 03 02 8f 77 02 20 02 d9 e5 17 00 4b 0f 1b 5a |"...w. .....K..Z| +peer1.org1.example.com | 00000030 b5 2b 6c 6a c6 bd 0f 86 98 5d b9 06 8e 4b 74 9b |.+lj.....]...Kt.| +peer1.org1.example.com | 00000040 b3 00 fa ac 39 47 ed |....9G.| +peer1.org1.example.com | [44e 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [44f 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [450 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [451 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [452 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [453 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [454 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [455 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [456 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [457 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [458 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:t\010\232\031\376\257\271\252p\367\373\207\005\365V\233\232&\021\247\250~\375\250\237\032\002 \006\305\220\000)\277\200\217\033t\365UXOB#\360\216\354\210)v\212v\014\2665Z9\035\333\242" secret_envelope: > +peer1.org1.example.com | [459 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [45a 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45b 05-20 18:20:04.90 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]] +peer1.org1.example.com | [45c 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [45d 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [45e 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 53 a3 1d d1 a6 88 61 a0 ea d6 57 e7 8e 3c 10 |.S.....a...W..<.| +peer1.org1.example.com | 00000010 4e d9 89 c6 85 d5 ca fd aa 5d a6 06 0c 14 39 cf |N........]....9.| +peer1.org1.example.com | [45f 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 84 b9 c6 0f 88 c2 d6 35 38 1b |0E.!.........58.| +peer1.org1.example.com | 00000010 c2 f1 9c 4d 90 81 42 d7 03 6a c3 e7 58 9a a3 74 |...M..B..j..X..t| +peer1.org1.example.com | 00000020 ec bb af 52 7e 02 20 42 d7 f8 8a b8 81 3d e7 ea |...R~. B.....=..| +peer1.org1.example.com | 00000030 04 cb 21 20 1f b7 56 7e 07 3a dd 80 e2 ec c9 40 |..! ..V~.:.....@| +peer1.org1.example.com | 00000040 12 31 1a 08 f7 03 1a |.1.....| +peer1.org1.example.com | [460 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [461 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [462 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [463 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> INFO 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Some peer is already a leader +peer1.org1.example.com | [464 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [465 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [466 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [467 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes +peer1.org1.example.com | [468 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes +peer1.org1.example.com | [469 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [46a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [46b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [46c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [46d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [46e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer1.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer1.org1.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer1.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer1.org1.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer1.org1.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [470 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4500 gate 1589998805742912400 evaluation starts +peer1.org1.example.com | [471 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4500 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [472 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4500 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [473 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org1.example.com | [474 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [475 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [476 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4500 principal matched by identity 0 +peer1.org1.example.com | [477 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 a4 1e f0 21 bc 6d 6f dd 04 f4 ee 97 a0 5b e2 |....!.mo......[.| +peer1.org1.example.com | 00000010 8d e4 d8 70 1c 40 6f dd d0 21 0f 26 bb 5b b4 87 |...p.@o..!.&.[..| +peer1.org1.example.com | [478 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 d6 4d c8 5c 8c 2f 50 b5 60 98 |0E.!...M.\./P.`.| +peer1.org1.example.com | 00000010 60 31 c4 3f 7b 2a fa f4 cf 19 bf 22 cd 96 db 2a |`1.?{*....."...*| +peer1.org1.example.com | 00000020 02 5e fb 02 b2 02 20 4c f9 d7 8f 34 1a 07 5a 22 |.^.... L...4..Z"| +peer1.org1.example.com | 00000030 bc 54 70 3d a2 f4 c9 07 28 fb aa 82 3f 42 71 05 |.Tp=....(...?Bq.| +peer1.org1.example.com | 00000040 dc e8 c0 83 d2 f1 3f |......?| +peer1.org1.example.com | [479 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4500 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [47a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4500 gate 1589998805742912400 evaluation succeeds +peer1.org1.example.com | [47b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 695 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 696 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.common.cluster] Configure -> INFO 697 Exiting" +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] start -> DEBU 698 Starting raft node: #peers: 3" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] start -> INFO 699 Starting raft node as part of a new channel" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 69a 1 became follower at term 0" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] newRaft -> INFO 69b newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 69c 1 became follower at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 69d [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +orderer0.example.com | "2020-05-20 18:19:57.978 UTC [msp] GetDefaultSigningIdentity -> DEBU 69e Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:19:57.979 UTC [orderer.consensus.etcdraft] run -> INFO 69f This node is picked to start campaign" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.979 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a1 Sending msg of 28 bytes to 3 on channel testchainid took 11.1µs" +orderer0.example.com | "2020-05-20 18:19:57.979 UTC [msp] GetDefaultSigningIdentity -> DEBU 6a0 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:19:57.979 UTC [msp.identity] Sign -> DEBU 6a2 Sign: plaintext: 0A00120B0A090A03010203100418050A...E99618AA3F4069367EA14281C69EA059 " +orderer0.example.com | "2020-05-20 18:19:57.980 UTC [msp.identity] Sign -> DEBU 6a4 Sign: digest: 1EA9D252FF8A0857FC3B5EE7874543122E08CD85EFA4522731A3A54DCCF0BCA6 " +orderer0.example.com | "2020-05-20 18:19:57.979 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.1µs " +orderer0.example.com | "2020-05-20 18:19:57.982 UTC [fsblkstorage] indexBlock -> DEBU 6a5 Indexing block [blockNum=1, blockHash=[]byte{0x7b, 0x37, 0x2f, 0x1d, 0x14, 0x72, 0x4b, 0x8c, 0x85, 0x15, 0x3f, 0x43, 0x59, 0x2c, 0x33, 0x8b, 0x34, 0x8a, 0x25, 0xc3, 0x72, 0x12, 0xff, 0xb1, 0x65, 0x7f, 0xf7, 0x24, 0x42, 0x12, 0x7d, 0xe6} txOffsets= +orderer0.example.com | txId=f1880cdda7ebf9df4008926918c731463ae90ae6c247cc9aac8b96dbea8d26f7 locPointer=offset=71, bytesLength=29383 +orderer0.example.com | ]" +orderer0.example.com | "2020-05-20 18:19:57.983 UTC [orderer.consensus.etcdraft] apply -> INFO 6a6 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.983 UTC [orderer.consensus.etcdraft] apply -> INFO 6a7 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.983 UTC [orderer.consensus.etcdraft] apply -> INFO 6a8 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:57.983 UTC [fsblkstorage] updateCheckpoint -> DEBU 6a9 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[53339], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2020-05-20 18:19:57.984 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 6aa [channel: testchainid] Wrote block [1]" +orderer0.example.com | "2020-05-20 18:19:58.105 UTC [common.deliver] deliverBlocks -> WARN 6ab [channel: businesschannel] Rejecting deliver request for 172.18.0.9:53414 because of consenter error" +orderer0.example.com | "2020-05-20 18:19:58.106 UTC [orderer.common.server] func1 -> DEBU 6ac Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:19:58.106 UTC [comm.grpc.server] 1 -> INFO 6ad streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53414 grpc.code=OK grpc.call_duration=203.568ms +orderer0.example.com | "2020-05-20 18:19:58.131 UTC [orderer.common.server] Deliver -> DEBU 6ae Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:19:58.132 UTC [common.deliver] Handle -> DEBU 6af Starting new deliver loop for 172.18.0.9:53416" +orderer0.example.com | "2020-05-20 18:19:58.133 UTC [common.deliver] Handle -> DEBU 6b0 Attempting to read seek info message from 172.18.0.9:53416" +orderer0.example.com | "2020-05-20 18:19:58.298 UTC [common.deliver] deliverBlocks -> WARN 6b1 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:53416 because of consenter error" +orderer0.example.com | "2020-05-20 18:19:58.299 UTC [orderer.common.server] func1 -> DEBU 6b2 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:19:58.299 UTC [comm.grpc.server] 1 -> INFO 6b3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53416 grpc.code=OK grpc.call_duration=202.2578ms +orderer0.example.com | "2020-05-20 18:19:58.324 UTC [orderer.common.server] Deliver -> DEBU 6b4 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:19:58.324 UTC [common.deliver] Handle -> DEBU 6b5 Starting new deliver loop for 172.18.0.9:53418" +orderer0.example.com | "2020-05-20 18:19:58.325 UTC [common.deliver] Handle -> DEBU 6b6 Attempting to read seek info message from 172.18.0.9:53418" +orderer0.example.com | "2020-05-20 18:19:58.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b8 Sending msg of 28 bytes to 3 on channel testchainid took 106.1µs" +orderer0.example.com | "2020-05-20 18:19:58.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.9µs " +orderer0.example.com | "2020-05-20 18:19:58.525 UTC [common.deliver] deliverBlocks -> WARN 6ba [channel: businesschannel] Rejecting deliver request for 172.18.0.9:53418 because of consenter error" +orderer0.example.com | "2020-05-20 18:19:58.526 UTC [orderer.common.server] func1 -> DEBU 6bb Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:19:58.526 UTC [comm.grpc.server] 1 -> INFO 6bc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53418 grpc.code=OK grpc.call_duration=202.7233ms +orderer0.example.com | "2020-05-20 18:19:58.545 UTC [orderer.common.server] Deliver -> DEBU 6bd Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:19:58.546 UTC [common.deliver] Handle -> DEBU 6be Starting new deliver loop for 172.18.0.9:53420" +orderer0.example.com | "2020-05-20 18:19:58.546 UTC [common.deliver] Handle -> DEBU 6bf Attempting to read seek info message from 172.18.0.9:53420" +orderer0.example.com | "2020-05-20 18:19:58.750 UTC [common.deliver] deliverBlocks -> WARN 6c0 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:53420 because of consenter error" +peer1.org1.example.com | [47c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [47d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [47e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [47f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [480 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 1 +peer1.org1.example.com | [481 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [482 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [483 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org1.example.com | [484 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [485 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes +peer1.org1.example.com | [486 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes +peer1.org1.example.com | [487 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [488 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [489 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [48a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [48b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [48c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a1a0 gate 1589998805744871700 evaluation starts +peer1.org1.example.com | [48d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a1a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [48e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a1a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [48f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a1a0 principal matched by identity 0 +peer1.org1.example.com | [490 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 ae 1e 93 ef 16 d3 72 49 19 6b 54 2f e7 67 ae |.......rI.kT/.g.| +peer1.org1.example.com | 00000010 76 03 6f 1e 50 5e 5f e2 01 92 44 1d 09 fa cc 1e |v.o.P^_...D.....| +peer1.org1.example.com | [491 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 02 46 89 6e 97 c7 75 13 33 1e |0E.!...F.n..u.3.| +peer1.org1.example.com | 00000010 68 38 d3 b3 23 63 c2 d8 9d 35 62 e2 6c a1 f2 02 |h8..#c...5b.l...| +peer1.org1.example.com | 00000020 56 ee aa df 2a 02 20 6e 96 d4 a5 5f 14 02 95 75 |V...*. n..._...u| +peer1.org1.example.com | 00000030 e5 72 89 6e 58 73 a9 02 10 de c2 6d 7a 54 e9 1f |.r.nXs.....mzT..| +peer1.org1.example.com | 00000040 9d 16 cd cf a2 88 f6 |.......| +peer1.org1.example.com | [492 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a1a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [493 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342a1a0 gate 1589998805744871700 evaluation succeeds +peer1.org1.example.com | [494 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [495 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [496 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [497 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [498 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [499 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 2 +peer1.org1.example.com | [49a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [49b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [49c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org1.example.com | [49d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 2 blocks +peer1.org1.example.com | [49e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer1.org1.example.com | [49f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer1.org1.example.com | [4a0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer1.org1.example.com | [4a1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer1.org1.example.com | [4a2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer1.org1.example.com | [4a3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [4a4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003412080 env 0xc0033d2780 txn 0 +peer1.org1.example.com | [4a5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0033d2780 +peer1.org1.example.com | [4a6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +peer1.org1.example.com | [4a7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [4a8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [4a9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [4aa 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ab 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [4ac 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [31a 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31b 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31c 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31d 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31e 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31f 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [320 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [321 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [322 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [323 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f7230 gate 1589998805977342200 evaluation starts +peer0.org2.example.com | [324 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f7230 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [325 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f7230 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [326 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f7230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [327 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f7230 principal evaluation fails +peer0.org2.example.com | [328 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f7230 gate 1589998805977342200 evaluation fails +peer0.org2.example.com | [329 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32a 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32b 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [32c 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f77c0 gate 1589998805980331700 evaluation starts +peer0.org2.example.com | [32d 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f77c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32e 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f77c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [32f 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [330 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [331 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [332 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f77c0 principal matched by identity 0 +peer0.org2.example.com | [333 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [334 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 3d dd 23 1b 4d c9 ce c1 0d 53 14 |0D. <=.#.M....S.| +peer0.org2.example.com | 00000010 d9 57 68 fb 8c 22 5a 63 8b bb fa ea 6f 80 17 d9 |.Wh.."Zc....o...| +peer0.org2.example.com | 00000020 87 44 21 52 02 20 34 c9 b6 08 8e 87 a8 47 87 f9 |.D!R. 4......G..| +peer0.org2.example.com | 00000030 67 13 b8 c2 9e 61 e6 c8 a5 f5 06 83 8a 0b bd 53 |g....a.........S| +peer0.org2.example.com | 00000040 16 31 23 93 a6 6e |.1#..n| +peer0.org2.example.com | [335 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34558 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: nonce:8401356067006766998 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [337 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [336 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f77c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [338 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f77c0 gate 1589998805980331700 evaluation succeeds +peer0.org2.example.com | [339 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [43e 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:9761545360067544221 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [43f 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:9761545360067544221 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | [440 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | "2020-05-20 18:19:58.751 UTC [orderer.common.server] func1 -> DEBU 6c1 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:19:58.751 UTC [comm.grpc.server] 1 -> INFO 6c2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53420 grpc.code=OK grpc.call_duration=206.4333ms +orderer0.example.com | "2020-05-20 18:19:58.776 UTC [orderer.common.server] Deliver -> DEBU 6c3 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:19:58.776 UTC [common.deliver] Handle -> DEBU 6c4 Starting new deliver loop for 172.18.0.9:53422" +orderer0.example.com | "2020-05-20 18:19:58.776 UTC [common.deliver] Handle -> DEBU 6c5 Attempting to read seek info message from 172.18.0.9:53422" +orderer0.example.com | "2020-05-20 18:19:58.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.928 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c7 Sending msg of 28 bytes to 3 on channel testchainid took 186.3µs" +orderer0.example.com | "2020-05-20 18:19:58.929 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.164ms " +orderer0.example.com | "2020-05-20 18:19:58.947 UTC [orderer.consensus.etcdraft] Step -> INFO 6c9 1 is starting a new election at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.947 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6ca 1 became pre-candidate at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.947 UTC [orderer.consensus.etcdraft] poll -> INFO 6cb 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.947 UTC [orderer.consensus.etcdraft] campaign -> INFO 6cc 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.948 UTC [orderer.consensus.etcdraft] campaign -> INFO 6cd 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.948 UTC [orderer.common.cluster] NewStream -> DEBU 6ce Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-05-20 18:19:58.949 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 2 on channel businesschannel took 467.1µs" +orderer0.example.com | "2020-05-20 18:19:58.949 UTC [orderer.common.cluster] NewStream -> DEBU 6d0 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-05-20 18:19:58.949 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d1 Sending msg of 28 bytes to 3 on channel businesschannel took 341.5µs" +orderer0.example.com | "2020-05-20 18:19:58.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.1µs " +orderer0.example.com | "2020-05-20 18:19:58.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.6µs " +orderer0.example.com | "2020-05-20 18:19:58.952 UTC [orderer.common.cluster] Step -> DEBU 6d4 Connection from orderer1.example.com(172.18.0.4:45494)" +orderer0.example.com | "2020-05-20 18:19:58.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.954 UTC [orderer.consensus.etcdraft] poll -> INFO 6d6 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.954 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6d7 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.956 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6d8 1 became candidate at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.956 UTC [orderer.consensus.etcdraft] poll -> INFO 6d9 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.956 UTC [orderer.consensus.etcdraft] campaign -> INFO 6da 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.956 UTC [orderer.consensus.etcdraft] campaign -> INFO 6db 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.955 UTC [orderer.common.cluster] Step -> DEBU 6dc Connection from orderer2.example.com(172.18.0.3:44052)" +orderer0.example.com | "2020-05-20 18:19:58.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6dd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6de Sending msg of 28 bytes to 2 on channel businesschannel took 114.8µs" +orderer0.example.com | "2020-05-20 18:19:58.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.5µs " +orderer0.example.com | "2020-05-20 18:19:58.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e0 Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +orderer0.example.com | "2020-05-20 18:19:58.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.962 UTC [orderer.consensus.etcdraft] poll -> INFO 6e2 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.962 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6e3 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +peer0.org2.example.com | [33a 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:8401356067006766998 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [33b 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33c 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33d 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33e 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [33f 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [340 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [341 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [342 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [343 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52570 +peer0.org2.example.com | [345 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52570 +peer0.org2.example.com | [344 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [346 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [347 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [348 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120b10 gate 1589998805998275600 evaluation starts +peer0.org2.example.com | [349 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120b10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34a 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120b10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [34b 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [34c 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120b10 principal evaluation fails +peer0.org2.example.com | [34d 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120b10 gate 1589998805998275600 evaluation fails +peer0.org2.example.com | [34e 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34f 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [350 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [351 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121080 gate 1589998806007807000 evaluation starts +peer0.org2.example.com | [352 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121080 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [353 05-20 18:20:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121080 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [354 05-20 18:20:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121080 principal matched by identity 0 +peer0.org2.example.com | [355 05-20 18:20:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e e1 3c 74 a6 8b 07 1d 38 c5 35 da 0d db 11 9c |>. DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ad b4 b4 8a c4 89 d7 65 8f e3 |0E.!.........e..| +peer0.org2.example.com | 00000010 14 ac 36 09 8b e1 3a 52 3b a7 7a 17 f7 03 b6 7c |..6...:R;.z....|| +peer0.org2.example.com | 00000020 14 4a c3 48 fe 02 20 10 fd 31 39 00 32 79 56 d0 |.J.H.. ..19.2yV.| +peer0.org2.example.com | 00000030 c7 71 61 8b 4a ef 34 f7 20 66 f1 ae 3f 73 0f a4 |.qa.J.4. f..?s..| +peer0.org2.example.com | 00000040 83 ee 02 33 57 83 98 |...3W..| +peer0.org2.example.com | [357 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121080 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [358 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121080 gate 1589998806007807000 evaluation succeeds +peer0.org2.example.com | [359 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35a 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35b 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a5 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a6 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a7 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU [fbf4ab07] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3a8 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU [fbf4ab07] notifying Txid:fbf4ab07628a4581a4fdf127813900858f84bcc6985588794072b1c6a9aaa029, channelID: +peer0.org1.example.com | [3a9 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3aa 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> INFO [][fbf4ab07] Exit chaincode: name:"qscc" (5ms) +peer0.org1.example.com | [3ab 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU [][fbf4ab07] Exit +peer0.org1.example.com | [3ac 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37022 +peer0.org1.example.com | [3ad 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37022 grpc.code=OK grpc.call_duration=7.5735ms +peer0.org1.example.com | [3ae 05-20 18:20:02.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37022: read: connection reset by peer +peer0.org1.example.com | [3af 05-20 18:20:02.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3b0 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3b1 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b2 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3b3 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3b4 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 3d 45 05 c4 e3 37 e7 19 ca 0d 55 14 a1 c9 f8 |.=E...7....U....| +peer0.org1.example.com | 00000010 7d 90 b8 c7 d0 e5 85 08 31 f5 78 63 45 c8 56 6e |}.......1.xcE.Vn| +peer0.org1.example.com | [3b5 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 40 f5 7f 31 3e 74 08 9a 19 fe |0E.!..@..1>t....| +peer0.org1.example.com | 00000010 af b9 aa 70 f7 fb 87 05 f5 56 9b 9a 26 11 a7 a8 |...p.....V..&...| +peer0.org1.example.com | 00000020 7e fd a8 9f 1a 02 20 06 c5 90 00 29 bf 80 8f 1b |~..... ....)....| +peer0.org1.example.com | 00000030 74 f5 55 58 4f 42 23 f0 8e ec 88 29 76 8a 76 0c |t.UXOB#....)v.v.| +peer0.org1.example.com | 00000040 b6 35 5a 39 1d db a2 |.5Z9...| +peer0.org1.example.com | [3b6 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3b7 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 33 62 6a 54 4f 52 bc a9 84 7a ad |0D. e3bjTOR...z.| +peer0.org1.example.com | 00000010 78 9f c7 f2 ae 6e cb ca 57 20 a2 8e 3d df 88 1e |x....n..W ..=...| +peer0.org1.example.com | 00000020 a1 95 c8 f4 02 20 7d 54 e9 e4 4a 6f 9c 90 9a 58 |..... }T..Jo...X| +peer0.org1.example.com | 00000030 72 04 ab 63 9a 2a 2c af 64 0f fc 8b c4 c2 ee 90 |r..c.*,.d.......| +peer0.org1.example.com | 00000040 a2 33 1d 2b 74 7f |.3.+t.| +peer0.org1.example.com | [3b8 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3b9 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3ba 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3bb 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3bc 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3bd 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3be 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bf 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c0 05-20 18:20:03.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3c1 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c2 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c3 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c4 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +peer0.org1.example.com | 00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +peer0.org1.example.com | [3c5 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +peer0.org1.example.com | 00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +peer0.org1.example.com | 00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +peer0.org1.example.com | 00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +peer0.org1.example.com | 00000040 1f 39 c2 0b 9a b3 5c |.9....\| +peer0.org1.example.com | [3c6 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c7 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c8 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c9 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ca 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3cb 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cc 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3cd 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 gate 1589998803647489100 evaluation starts +peer0.org1.example.com | [3ce 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3cf 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3d0 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3d1 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 principal evaluation fails +peer0.org1.example.com | [3d2 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 gate 1589998803647489100 evaluation fails +peer0.org1.example.com | [3d3 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d4 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d5 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3d6 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 gate 1589998803649932800 evaluation starts +peer0.org1.example.com | [3d7 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d8 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3d9 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [3da 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [3db 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [3dc 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 principal matched by identity 0 +peer0.org1.example.com | [3dd 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +peer0.org1.example.com | 00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +peer0.org1.example.com | [3de 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +peer0.org1.example.com | 00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +peer0.org1.example.com | 00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +peer0.org1.example.com | 00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +peer0.org1.example.com | 00000040 1f 39 c2 0b 9a b3 5c |.9....\| +peer0.org1.example.com | [3df 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e0 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 gate 1589998803649932800 evaluation succeeds +peer0.org1.example.com | [3e1 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e2 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e3 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e4 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e5 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35c 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35d 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [35e 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org2.example.com | [35f 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [360 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [361 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [362 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [363 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [364 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [365 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [366 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 8401356067006766998, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [367 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:<\351n\002 ~xy|\336J\002\325\005\217)\357\255i\330@\032\\F\275\226\217\361\351DC\357\255\247t\014\310" > +peer0.org2.example.com | [368 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8401356067006766998, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org2.example.com | [369 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36a 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [36b 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [36c 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52570 disconnected +peer0.org2.example.com | [36d 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:15.967Z grpc.peer_address=172.18.0.8:52570 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=106.0144ms +peer0.org2.example.com | [36e 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [36f 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.086Z grpc.peer_address=172.18.0.8:52574 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=366.4µs +peer0.org2.example.com | [370 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [371 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [372 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [373 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [376 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [377 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [378 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [379 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:19:58.963 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6e4 1 became leader at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.963 UTC [orderer.consensus.etcdraft] run -> INFO 6e5 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.961 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +orderer0.example.com | "2020-05-20 18:19:58.965 UTC [orderer.consensus.etcdraft] run -> INFO 6e7 Leader 1 is present, quit campaign" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.966 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6e8 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.966 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6e9 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.965 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ea Sending msg of 36 bytes to 2 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-05-20 18:19:58.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6eb Sending msg of 36 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2020-05-20 18:19:58.972 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ec Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ed Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 206.9µs " +orderer0.example.com | "2020-05-20 18:19:58.973 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ee Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 3.6627ms " +orderer0.example.com | "2020-05-20 18:19:58.977 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.978 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f1 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +orderer0.example.com | "2020-05-20 18:19:58.978 UTC [policies] Evaluate -> DEBU 6f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:19:58.979 UTC [policies] Evaluate -> DEBU 6f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:19:58.979 UTC [policies] Evaluate -> DEBU 6f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:19:58.979 UTC [policies] Evaluate -> DEBU 6f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:19:58.979 UTC [policies] Evaluate -> DEBU 6f6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:19:58.979 UTC [msp] DeserializeIdentity -> DEBU 6f7 Obtaining identity" +orderer0.example.com | "2020-05-20 18:19:58.979 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 762.2µs " +orderer0.example.com | "2020-05-20 18:19:58.980 UTC [msp.identity] newIdentity -> DEBU 6f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:19:58.980 UTC [cauthdsl] func1 -> DEBU 6fa 0xc000daeb00 gate 1589998798980437200 evaluation starts" +orderer0.example.com | "2020-05-20 18:19:58.980 UTC [cauthdsl] func2 -> DEBU 6fb 0xc000daeb00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:19:58.980 UTC [cauthdsl] func2 -> DEBU 6fc 0xc000daeb00 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:19:58.980 UTC [cauthdsl] func2 -> DEBU 6fd 0xc000daeb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-05-20 18:19:58.980 UTC [cauthdsl] func2 -> DEBU 6fe 0xc000daeb00 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:19:58.980 UTC [cauthdsl] func1 -> DEBU 6ff 0xc000daeb00 gate 1589998798980437200 evaluation fails" +orderer0.example.com | "2020-05-20 18:19:58.981 UTC [policies] Evaluate -> DEBU 700 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:58.981 UTC [policies] Evaluate -> DEBU 701 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:19:58.981 UTC [policies] func1 -> DEBU 702 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 703 Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 704 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 705 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 706 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 707 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [cauthdsl] func1 -> DEBU 708 0xc0005be190 gate 1589998798982601000 evaluation starts" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [cauthdsl] func2 -> DEBU 709 0xc0005be190 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [cauthdsl] func2 -> DEBU 70a 0xc0005be190 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 70b Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2020-05-20 18:19:58.983 UTC [msp] Validate -> DEBU 70c MSP Org1MSP validating identity" +orderer0.example.com | "2020-05-20 18:19:58.983 UTC [msp] getCertificationChain -> DEBU 70d MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:19:58.982 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 70e Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:19:58.983 UTC [cauthdsl] func2 -> DEBU 70f 0xc0005be190 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:19:58.983 UTC [msp.identity] Verify -> DEBU 710 Verify: digest = 00000000 3b 5e 91 4c c8 92 6f 64 00 32 6e be fa 11 03 32 |;^.L..od.2n....2| +orderer0.example.com | 00000010 e9 97 0b b7 3d 10 a6 7d 32 90 58 6d 92 70 06 71 |....=..}2.Xm.p.q|" +orderer0.example.com | "2020-05-20 18:19:58.984 UTC [msp.identity] Verify -> DEBU 711 Verify: sig = 00000000 30 44 02 20 38 f1 ae f1 cf 45 63 57 26 c5 0f 34 |0D. 8....EcW&..4| +orderer0.example.com | 00000010 60 84 09 a7 07 f0 70 72 6b 46 30 b8 64 92 b3 45 |`.....prkF0.d..E| +orderer0.example.com | 00000020 bd aa 7f 75 02 20 21 86 1c ae bf bc 6b 35 64 d0 |...u. !.....k5d.| +orderer0.example.com | 00000030 4d 8e 89 0f 5f cd 53 07 23 f9 38 da 61 9f 07 41 |M..._.S.#.8.a..A| +orderer0.example.com | 00000040 5c 06 4e 1a 1d 83 |\.N...|" +orderer0.example.com | "2020-05-20 18:19:58.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 712 Sending msg of 28 bytes to 3 on channel businesschannel took 152.3µs" +orderer0.example.com | "2020-05-20 18:19:58.984 UTC [cauthdsl] func2 -> DEBU 713 0xc0005be190 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [3e6 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3e7 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [3e8 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e9 05-20 18:20:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3ea 05-20 18:20:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816100A +peer0.org1.example.com | [3eb 05-20 18:20:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AC960A795E9A97AAC80BC7C0EB6262E65F5B36D860CEF8BFDAFB8BD3D7385639 +peer0.org1.example.com | [3ec 05-20 18:20:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3ed 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3ee 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3ef 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3f0 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3f1 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3f2 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f3 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f4 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f5 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f6 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f7 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f9 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +peer0.org1.example.com | 00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +peer0.org1.example.com | [3fa 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +peer0.org1.example.com | 00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +peer0.org1.example.com | 00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +peer0.org1.example.com | 00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +peer0.org1.example.com | 00000040 1f 39 c2 0b 9a b3 5c |.9....\| +peer0.org1.example.com | [3fb 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fc 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fd 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fe 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3ff 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [400 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [401 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ad 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [4ae 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [4af 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [4b0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 b8 81 45 57 b3 76 22 8f e3 1a 03 c3 91 2f 86 |...EW.v"....../.| +peer1.org1.example.com | 00000010 7e 72 d9 f3 aa 71 79 97 65 bc 30 9d 33 cc e6 12 |~r...qy.e.0.3...| +peer1.org1.example.com | [4b1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 a0 2b cc a7 6e 38 18 f4 da de |0E.!...+..n8....| +peer1.org1.example.com | 00000010 55 a1 da 90 8d 69 4c 45 cd 0b c0 36 18 d5 5a 21 |U....iLE...6..Z!| +peer1.org1.example.com | 00000020 fa 5f 93 bc 1f 02 20 5b 9e 95 84 5c e6 2b cc d1 |._.... [...\.+..| +peer1.org1.example.com | 00000030 f5 6c a3 3f bd 2e 63 05 ad db bb 57 a1 1c cd 2d |.l.?..c....W...-| +peer1.org1.example.com | 00000040 85 68 ef ee ee 6d 09 |.h...m.| +peer1.org1.example.com | [4b2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [4b3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00343ca80, header channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +peer1.org1.example.com | [4b4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [4b5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [4b6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [4b7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [4b8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [4b9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4ba 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [4bb 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4bc 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [4bd 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [4be 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [4bf 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [4c0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [4c1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4c2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [4c3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4c4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [4c5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [4c6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer1.org1.example.com | [4c7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [4c8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [4c9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [4ca 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [4cb 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [4cc 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [4cd 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer1.org1.example.com | [4ce 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [4cf 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [4d0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer1.org1.example.com | [4d1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org1.example.com | [4d2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455ba0 gate 1589998805748066800 evaluation starts +peer1.org1.example.com | [4d3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4d4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455ba0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4d5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [4d6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [4d7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [4d8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [4d9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [4da 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [4db 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455ba0 principal matched by identity 0 +peer1.org1.example.com | [4dc 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +peer1.org1.example.com | 00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.| +peer1.org1.example.com | [4dd 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +peer1.org1.example.com | 00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +peer1.org1.example.com | 00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +peer1.org1.example.com | 00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +peer1.org1.example.com | 00000040 b6 a1 df 24 f2 fb af |...$...| +peer1.org1.example.com | [4de 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455ba0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4df 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455ba0 gate 1589998805748066800 evaluation succeeds +peer1.org1.example.com | [4e0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4e1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4e2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [4e7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [4e8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [4e9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ea 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4eb 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ec 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ed 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ee 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ef 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [37a 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [37b 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37c 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37d 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [37e 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [37f 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [380 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e9c0 gate 1589998806101043900 evaluation starts +peer0.org2.example.com | [381 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e9c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [382 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e9c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [383 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [384 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e9c0 principal evaluation fails +peer0.org2.example.com | [385 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e9c0 gate 1589998806101043900 evaluation fails +peer0.org2.example.com | [386 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [387 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [388 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [389 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318ef30 gate 1589998806106002900 evaluation starts +peer0.org2.example.com | [38a 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318ef30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38b 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318ef30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [38c 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318ef30 principal matched by identity 0 +peer0.org2.example.com | [38d 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [38e 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 99 ed a3 e5 da b6 a4 60 3f b5 |0E.!.........`?.| +peer0.org2.example.com | 00000010 ad 60 c1 44 a2 04 d3 1a d8 d8 08 cd 85 87 b2 16 |.`.D............| +peer0.org2.example.com | 00000020 35 9a 1e 5a 4d 02 20 27 4d 41 88 08 87 cd 82 41 |5..ZM. 'MA.....A| +peer0.org2.example.com | 00000030 ba 68 ef f6 4b 5c 63 e0 62 eb a1 a8 a2 93 ec b6 |.h..K\c.b.......| +peer0.org2.example.com | 00000040 da 0e 61 98 c8 32 6a |..a..2j| +peer0.org2.example.com | [38f 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318ef30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [390 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318ef30 gate 1589998806106002900 evaluation succeeds +peer0.org2.example.com | [391 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [392 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [393 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [394 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [395 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52574 +peer0.org2.example.com | [396 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52574 +peer0.org2.example.com | [397 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:8060432034469243681 tag:EMPTY mem_req:\335\2176\220\262\300\367L:`A\347\201\007\006\314\230\220\250" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [398 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [399 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:8060432034469243681 tag:EMPTY mem_req:\335\2176\220\262\300\367L:`A\347\201\007\006\314\230\220\250" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [39a 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [39b 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:19:58.984 UTC [cauthdsl] func1 -> DEBU 714 0xc0005be190 gate 1589998798982601000 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:19:58.985 UTC [policies] Evaluate -> DEBU 715 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:58.985 UTC [policies] Evaluate -> DEBU 716 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:19:58.985 UTC [policies] Evaluate -> DEBU 717 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:58.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 718 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 719 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.5µs " +orderer0.example.com | "2020-05-20 18:19:58.986 UTC [policies] Evaluate -> DEBU 71a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:19:58.986 UTC [policies] Evaluate -> DEBU 71b Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:58.986 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:19:58.987 UTC [common.deliver] deliverBlocks -> DEBU 71d [channel: businesschannel] Received seekInfo (0xc0003d2bc0) start: > stop: > from 172.18.0.9:53422" +orderer0.example.com | "2020-05-20 18:19:58.987 UTC [fsblkstorage] Next -> DEBU 71e Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-05-20 18:19:58.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:58.987 UTC [fsblkstorage] newBlockfileStream -> DEBU 720 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-05-20 18:19:58.988 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 721 Remaining bytes=[28474], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:19:58.988 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 722 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-05-20 18:19:58.988 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 723 blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-05-20 18:19:58.989 UTC [common.deliver] deliverBlocks -> DEBU 724 [channel: businesschannel] Delivering block [0] for (0xc0003d2bc0) for 172.18.0.9:53422" +orderer0.example.com | "2020-05-20 18:19:58.989 UTC [common.deliver] deliverBlocks -> DEBU 725 [channel: businesschannel] Done delivering to 172.18.0.9:53422 for (0xc0003d2bc0)" +orderer0.example.com | "2020-05-20 18:19:58.989 UTC [common.deliver] Handle -> DEBU 726 Waiting for new SeekInfo from 172.18.0.9:53422" +orderer0.example.com | "2020-05-20 18:19:58.989 UTC [common.deliver] Handle -> DEBU 727 Attempting to read seek info message from 172.18.0.9:53422" +orderer0.example.com | "2020-05-20 18:19:58.995 UTC [grpc] warningf -> DEBU 728 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:53422: read: connection reset by peer" +orderer0.example.com | "2020-05-20 18:19:58.995 UTC [grpc] infof -> DEBU 729 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:19:58.996 UTC [common.deliver] Handle -> WARN 72a Error reading from 172.18.0.9:53422: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:19:58.997 UTC [orderer.common.server] func1 -> DEBU 72b Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:19:58.997 UTC [comm.grpc.server] 1 -> INFO 72c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53422 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=221.9648ms +orderer0.example.com | "2020-05-20 18:19:58.997 UTC [grpc] infof -> DEBU 72d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:19:58.998 UTC [grpc] infof -> DEBU 72f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:19:58.998 UTC [grpc] infof -> DEBU 730 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:19:58.998 UTC [grpc] infof -> DEBU 72e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:19:58.999 UTC [grpc] infof -> DEBU 732 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:19:58.999 UTC [grpc] infof -> DEBU 731 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:19:59.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU 733 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:59.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 734 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer1.org2.example.com | [441 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [442 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [443 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [444 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [445 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [446 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [447 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003041bc0)} +peer1.org2.example.com | [448 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [449 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [44a 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [44b 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00340f2b0, CONNECTING +peer1.org2.example.com | [44c 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [44d 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [44e 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org2.example.com | [44f 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org2.example.com | [450 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org2.example.com | [451 05-20 18:20:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org2.example.com | [452 05-20 18:20:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xa6, 0xe9, 0x70, 0x63, 0xe3, 0xe8, 0x98, 0x1e, 0x14, 0xfd, 0x2a, 0x6f, 0x3d, 0xd9, 0x24, 0x28, 0x30, 0xda, 0x1, 0x2c, 0xc0, 0x6d, 0x3f, 0xca, 0x43, 0xa9, 0xc8, 0x4, 0x6b, 0x7f, 0xa7, 0x8c} txOffsets= +peer1.org2.example.com | txId=5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d locPointer=offset=71, bytesLength=27137 +peer1.org2.example.com | ] +peer1.org2.example.com | [453 05-20 18:20:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to txid-index +peer1.org2.example.com | [454 05-20 18:20:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx number:[0] ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to blockNumTranNum index +peer1.org2.example.com | [455 05-20 18:20:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00340f2b0, READY +peer1.org2.example.com | [456 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56676], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org1.example.com | [4f8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [4f9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [4fa 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [4fb 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [4fc 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [4fd 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [4fe 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [4ff 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [500 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [501 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [502 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [503 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [504 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [505 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [506 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [507 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [508 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [509 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [50a 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [50b 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [50c 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [50d 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [50e 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [50f 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [510 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [511 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [512 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [513 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [514 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [515 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [516 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [517 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [518 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [519 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [51a 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [51b 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [51c 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [51d 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [51e 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [51f 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [520 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [521 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [522 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [523 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [524 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [525 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [526 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [527 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org1.example.com | [528 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [529 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [52a 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [52b 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [52c 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [52d 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [52e 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [52f 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [530 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [531 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [532 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [533 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [534 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [535 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [536 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [537 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [538 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [539 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [53a 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [53b 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [53c 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [53d 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [53e 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [53f 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [540 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [541 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [542 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [543 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [544 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [545 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [546 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [547 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [548 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [549 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [54a 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +orderer0.example.com | "2020-05-20 18:19:59.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU 735 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +orderer0.example.com | "2020-05-20 18:19:59.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 736 Sending msg of 28 bytes to 2 on channel businesschannel took 16.6µs" +orderer0.example.com | "2020-05-20 18:19:59.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 737 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +orderer0.example.com | "2020-05-20 18:19:59.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 738 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +orderer0.example.com | "2020-05-20 18:19:59.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 739 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +orderer0.example.com | "2020-05-20 18:19:59.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:59.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:59.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:59.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73d Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2020-05-20 18:19:59.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.7µs " +orderer0.example.com | "2020-05-20 18:19:59.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +orderer0.example.com | "2020-05-20 18:19:59.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 740 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2020-05-20 18:19:59.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 741 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.9µs " +orderer0.example.com | "2020-05-20 18:19:59.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 742 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.7µs " +orderer0.example.com | "2020-05-20 18:19:59.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU 743 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:19:59.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU 744 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:00.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU 745 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:00.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 746 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +orderer0.example.com | "2020-05-20 18:20:00.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU 747 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.1µs " +orderer0.example.com | "2020-05-20 18:20:00.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 748 Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +orderer0.example.com | "2020-05-20 18:20:00.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 749 Sending msg of 28 bytes to 3 on channel businesschannel took 9.1µs" +orderer0.example.com | "2020-05-20 18:20:00.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 287.6µs " +orderer0.example.com | "2020-05-20 18:20:00.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:00.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:00.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 833.7µs " +orderer0.example.com | "2020-05-20 18:20:00.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:00.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74f Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +orderer0.example.com | "2020-05-20 18:20:00.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU 750 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.2µs " +orderer0.example.com | "2020-05-20 18:20:00.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 751 Sending msg of 28 bytes to 2 on channel businesschannel took 30.8µs" +orderer0.example.com | "2020-05-20 18:20:00.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 752 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" +orderer0.example.com | "2020-05-20 18:20:00.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU 753 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160µs " +orderer0.example.com | "2020-05-20 18:20:00.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU 754 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4427ms " +orderer0.example.com | "2020-05-20 18:20:00.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU 755 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:00.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU 756 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:01.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU 757 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:01.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 758 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +orderer0.example.com | "2020-05-20 18:20:01.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU 759 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +orderer0.example.com | "2020-05-20 18:20:01.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75a Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +peer0.org1.example.com | [402 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [403 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [404 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 7b 2d c1 c8 c7 ee 49 60 52 b0 7d b4 af 59 9d |c{-....I`R.}..Y.| +peer0.org1.example.com | 00000010 be ea 24 41 12 7d d2 d2 d6 77 c3 cf c2 a1 a5 57 |..$A.}...w.....W| +peer0.org1.example.com | [405 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 45 4a 9a 6b 52 01 68 dd af 50 3c |0D. YEJ.kR.h..P<| +peer0.org1.example.com | 00000010 e5 58 98 39 4e ea c1 06 0b de 04 57 67 c9 7e 60 |.X.9N......Wg.~`| +peer0.org1.example.com | 00000020 ac 5c 8e a5 02 20 52 be 0a 1f 21 4d 7c 01 ad 6c |.\... R...!M|..l| +peer0.org1.example.com | 00000030 28 ed 0a 3c ba e9 1a 1b 46 c1 7b 59 ac f4 c7 1c |(..<....F.{Y....| +peer0.org1.example.com | 00000040 38 e4 e2 20 67 37 |8.. g7| +peer0.org1.example.com | [406 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [407 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 54 4e 7f 6c 77 a2 13 7c 26 31 c0 |0D. dTN.lw..|&1.| +peer0.org1.example.com | 00000010 ba 8a 41 35 bf 2c b0 f6 a4 b9 ce 11 0a 6c 1b c6 |..A5.,.......l..| +peer0.org1.example.com | 00000020 a9 05 f4 42 02 20 37 46 0a 7e dd 0d e1 16 2e 08 |...B. 7F.~......| +peer0.org1.example.com | 00000030 9d 73 c8 8e d6 0d f7 b1 1d 97 13 cf d8 e3 36 5c |.s............6\| +peer0.org1.example.com | 00000040 46 32 23 fd a6 41 |F2#..A| +peer0.org1.example.com | [408 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [409 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [40a 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [40b 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [40c 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [40d 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40f 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [410 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [411 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [412 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer0.org1.example.com | [413 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39d 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39e 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39f 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a0 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a1 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3a2 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148fc0 gate 1589998806123367500 evaluation starts +peer0.org2.example.com | [3a3 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148fc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a4 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148fc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a5 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3a6 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148fc0 principal evaluation fails +peer0.org2.example.com | [3a7 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148fc0 gate 1589998806123367500 evaluation fails +peer0.org2.example.com | [3a8 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a9 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3aa 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ab 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149530 gate 1589998806124752300 evaluation starts +peer0.org2.example.com | [3ac 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ad 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149530 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3ae 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149530 principal matched by identity 0 +peer0.org2.example.com | [3af 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b f5 53 4b 2b 5c a3 ce 51 42 40 3d 86 8f b8 08 |..SK+\..QB@=....| +peer0.org2.example.com | 00000010 59 0d bd 85 cc 10 dc 8b 39 34 4b 54 9e e7 db 57 |Y.......94KT...W| +peer0.org2.example.com | [3b0 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 ae 13 b3 e6 bb 41 99 e4 66 2c |0E.!.......A..f,| +peer0.org2.example.com | 00000010 95 b1 9c 9c f6 6e 4a f6 e8 be 8e 8e 07 e1 3f 03 |.....nJ.......?.| +peer0.org2.example.com | 00000020 07 06 03 63 84 02 20 66 04 d0 d7 92 64 9a 95 5f |...c.. f....d.._| +peer0.org2.example.com | 00000030 15 58 4f 3e dd 8f 36 90 b2 c0 f7 4c 3a 60 41 e7 |.XO>..6....L:`A.| +peer0.org2.example.com | 00000040 81 07 06 cc 98 90 a8 |.......| +peer0.org2.example.com | [3b1 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b2 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149530 gate 1589998806124752300 evaluation succeeds +peer0.org2.example.com | [3b3 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b4 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b5 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b6 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b7 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b8 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org2.example.com | [3b9 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ba 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bb 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bc 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bd 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3be 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bf 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c0 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c1 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 8060432034469243681, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c2 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8060432034469243681, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c3 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c4 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\335\2176\220\262\300\367L:`A\347\201\007\006\314\230\220\250" > alive:<\351n\002 ~xy|\336J\002\325\005\217)\357\255i\330@\032\\F\275\226\217\361\351DC\357\255\247t\014\310" > +peer0.org2.example.com | [3c5 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [3c6 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> INFO a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Becoming a leader +peer0.org2.example.com | [3c7 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer0.org2.example.com | [3c8 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer0.org2.example.com | [3c9 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [3ca 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +peer0.org2.example.com | [3cb 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3cc 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B4D68C81C1EFB3881610021801 +peer0.org2.example.com | [3cd 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 58E944C2277ACA7900B3AA8DFA0AE1C7ED5D248E7E020406411D5BFD8C4A8C62 +peer0.org2.example.com | [3cf 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [3ce 05-20 18:20:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer0.org2.example.com | [3d0 05-20 18:20:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3d1 05-20 18:20:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3d2 05-20 18:20:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }] +peer0.org2.example.com | [3d3 05-20 18:20:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3d4 05-20 18:20:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d5 05-20 18:20:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d6 05-20 18:20:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00320ae50, CONNECTING +peer0.org2.example.com | [3d7 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00320ae50, READY +peer0.org2.example.com | [3d8 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer1.example.com:7050 [OrdererMSP]} +peer0.org2.example.com | [3d9 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer1.example.com:7050 +peer0.org2.example.com | [3da 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer1.example.com:7050 ... +peer0.org2.example.com | [3db 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [3dc 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer0.org2.example.com | [3dd 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3de 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3df 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608D6E995F60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer0.org2.example.com | [3e0 05-20 18:20:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C5065FE15DFE32A8B87BFFB03B0F50096E204AC5EA9184CDCF39A103DD8AFF8A +peer0.org2.example.com | [3e1 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e2 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e3 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e4 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [3e5 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e6 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [3e7 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e8 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer0.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer0.org2.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer0.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer0.org2.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer0.org2.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3e9 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1e50 gate 1589998806256933500 evaluation starts +peer0.org2.example.com | [3ea 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1e50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3eb 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1e50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [457 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org2.example.com | [458 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [459 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [45a 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [45c 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [45d 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org2.example.com | [45e 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org2.example.com | [45f 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org2.example.com | [460 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [461 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [462 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [463 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [464 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [465 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [466 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [54b 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [54c 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [54d 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [54e 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [54f 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [550 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [551 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [552 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [553 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [554 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [555 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [556 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [557 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [558 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [559 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [55a 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [55b 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [55c 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [55d 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [55e 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [55f 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [560 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [561 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [562 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [563 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [564 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [565 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [566 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [567 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [568 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [569 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [56a 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [56b 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [56c 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [56d 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [56e 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [56f 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [570 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [571 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [572 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [3ec 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org2.example.com | [3ed 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [3ee 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [3ef 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1e50 principal matched by identity 0 +peer0.org2.example.com | [3f0 05-20 18:20:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 f1 18 cf 8e 87 dd fa a7 00 67 08 3b 9d 69 ab |v.........g.;.i.| +peer0.org2.example.com | 00000010 83 2e fa ff 9a 2a de ef 6d 37 d2 d4 6f 0c 9b 9e |.....*..m7..o...| +peer0.org2.example.com | [3f1 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 71 95 3a c8 53 9d 20 4a 69 ad |0E.!..q.:.S. Ji.| +peer0.org2.example.com | 00000010 c3 97 4c 61 4a d2 4b 32 c1 0a 2d 12 bd a8 7f 27 |..LaJ.K2..-....'| +peer0.org2.example.com | 00000020 c9 69 f4 93 b8 02 20 6b 2e ab 6a 1e de 96 43 ff |.i.... k..j...C.| +peer0.org2.example.com | 00000030 79 92 96 3e 54 1d 9b 02 71 c4 10 e8 f0 f0 42 0b |y..>T...q.....B.| +peer0.org2.example.com | 00000040 2a 30 71 8c 71 75 84 |*0q.qu.| +peer0.org2.example.com | [3f2 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1e50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f3 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1e50 gate 1589998806256933500 evaluation succeeds +peer0.org2.example.com | [3f4 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3f5 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3f6 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3f7 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3f8 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org2.example.com | [3f9 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org2.example.com | [3fa 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [3fc 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [0] +peer0.org2.example.com | [3fb 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer0.org2.example.com | [3fd 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer0.org2.example.com | [3fe 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org2.example.com | [3ff 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer0.org2.example.com | [400 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer0.org2.example.com | [401 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [402 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003087780 env 0xc0031df220 txn 0 +peer0.org2.example.com | [403 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0031df220 +peer0.org2.example.com | [404 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +peer0.org2.example.com | [405 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [406 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [407 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [408 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [409 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [40a 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [40b 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [40c 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [40d 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [40e 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 b8 81 45 57 b3 76 22 8f e3 1a 03 c3 91 2f 86 |...EW.v"....../.| +peer0.org2.example.com | 00000010 7e 72 d9 f3 aa 71 79 97 65 bc 30 9d 33 cc e6 12 |~r...qy.e.0.3...| +peer0.org2.example.com | [40f 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 a0 2b cc a7 6e 38 18 f4 da de |0E.!...+..n8....| +peer0.org2.example.com | 00000010 55 a1 da 90 8d 69 4c 45 cd 0b c0 36 18 d5 5a 21 |U....iLE...6..Z!| +peer0.org2.example.com | 00000020 fa 5f 93 bc 1f 02 20 5b 9e 95 84 5c e6 2b cc d1 |._.... [...\.+..| +peer0.org2.example.com | 00000030 f5 6c a3 3f bd 2e 63 05 ad db bb 57 a1 1c cd 2d |.l.?..c....W...-| +peer0.org2.example.com | 00000040 85 68 ef ee ee 6d 09 |.h...m.| +peer0.org2.example.com | [410 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [411 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0032cd500, header channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +peer0.org2.example.com | [412 05-20 18:20:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [413 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [414 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [415 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [416 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [417 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [418 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [419 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41a 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [41b 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [41c 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [41d 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [41e 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [41f 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [420 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [421 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [422 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [423 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org2.example.com | [424 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [425 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [426 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [427 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [428 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [429 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [42a 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org2.example.com | [42b 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [42c 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [42d 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org2.example.com | [42e 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org2.example.com | [42f 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [430 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | [414 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer0.org1.example.com | [415 05-20 18:20:04.63 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] +peer0.org1.example.com | [416 05-20 18:20:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [417 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [418 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [419 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41a 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [41b 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [41c 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [41e 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816100B +peer0.org1.example.com | [41f 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 13D01978FB980EB60893D92C7B3A6F90F5CAF85CABB40B1AB960C14A0E180D04 +peer0.org1.example.com | [420 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [421 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [422 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [423 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [424 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [425 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [426 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer0.org1.example.com | [427 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [428 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer0.org1.example.com | [429 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [42a 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d0 19 78 fb 98 0e b6 08 93 d9 2c 7b 3a 6f 90 |...x.......,{:o.| +peer0.org1.example.com | 00000010 f5 ca f8 5c ab b4 0b 1a b9 60 c1 4a 0e 18 0d 04 |...\.....`.J....| +peer0.org1.example.com | [42b 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 c1 e4 ec e2 ef 33 30 a4 a0 64 |0E.!.......30..d| +peer0.org1.example.com | 00000010 d3 f0 e6 58 fa e0 9b 5e ee ac a5 88 2c f7 5e af |...X...^....,.^.| +peer0.org1.example.com | 00000020 83 eb 87 fb d2 02 20 71 39 a5 46 d8 c5 5f 25 9d |...... q9.F.._%.| +peer0.org1.example.com | 00000030 9d 97 7f de 30 cf 8f 3f 98 51 9e 61 d0 9d e1 69 |....0..?.Q.a...i| +peer0.org1.example.com | 00000040 22 33 b7 54 1c e0 e3 |"3.T...| +peer0.org1.example.com | [42c 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [42d 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 01 cb 78 66 24 77 3b c8 ab |0E.!..`..xf$w;..| +peer0.org1.example.com | 00000010 f6 68 7e cb 79 f3 7e 74 58 4c cc e4 2e 26 f0 65 |.h~.y.~tXL...&.e| +peer0.org1.example.com | 00000020 22 03 02 8f 77 02 20 02 d9 e5 17 00 4b 0f 1b 5a |"...w. .....K..Z| +peer0.org1.example.com | 00000030 b5 2b 6c 6a c6 bd 0f 86 98 5d b9 06 8e 4b 74 9b |.+lj.....]...Kt.| +peer0.org1.example.com | 00000040 b3 00 fa ac 39 47 ed |....9G.| +peer0.org1.example.com | [42e 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [467 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [468 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [469 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [46a 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46b 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46c 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [46d 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [46e 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [46f 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9e70 gate 1589998806701424700 evaluation starts +peer1.org2.example.com | [470 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9e70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [471 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9e70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [472 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9e70 principal matched by identity 0 +peer1.org2.example.com | [473 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [474 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac f9 dc 72 e6 72 cb 05 15 10 10 |0E.!....r.r.....| +peer1.org2.example.com | 00000010 6f 82 93 af e4 7f c8 ad 9e 2c 9c c5 37 f4 5e 43 |o........,..7.^C| +peer1.org2.example.com | 00000020 de 7d 6b 45 54 02 20 59 68 28 2f 47 1b fd c7 55 |.}kET. Yh(/G...U| +peer1.org2.example.com | 00000030 94 02 b3 4a 91 d5 e7 46 35 80 7d d9 44 49 69 8e |...J...F5.}.DIi.| +peer1.org2.example.com | 00000040 9a 98 99 30 65 2f ad |...0e/.| +peer1.org2.example.com | [475 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9e70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [476 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9e70 gate 1589998806701424700 evaluation succeeds +peer1.org2.example.com | [477 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [478 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [479 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [47a 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [47b 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [47c 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47d 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [47e 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47f 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [480 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org2.example.com | [481 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org1.example.com | [573 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [574 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [575 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [576 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [577 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [578 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [579 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [57a 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [57b 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [57c 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [57d 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [57e 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [57f 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [580 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [581 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [582 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [583 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org1.example.com | [584 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [585 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [586 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [587 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [588 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [589 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [58a 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [58b 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035620e0 gate 1589998805778805300 evaluation starts +peer1.org1.example.com | [58c 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035620e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [58d 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035620e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [58e 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035620e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [58f 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035620e0 principal evaluation fails +peer1.org1.example.com | [590 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035620e0 gate 1589998805778805300 evaluation fails +peer1.org1.example.com | [591 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [592 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [593 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [594 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562650 gate 1589998805779079800 evaluation starts +peer1.org1.example.com | [595 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562650 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [596 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562650 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [597 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562650 principal matched by identity 0 +peer1.org1.example.com | [598 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3e 5c 4a 11 e1 a3 69 d4 28 30 4d f7 e2 3d 3f |/>\J...i.(0M..=?| +peer1.org1.example.com | 00000010 b5 1c 6f 96 b3 ef b9 a2 dc d4 aa 30 25 70 c7 29 |..o........0%p.)| +peer1.org1.example.com | [599 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 86 23 6c 12 fe e6 23 43 2b a1 |0E.!...#l...#C+.| +peer1.org1.example.com | 00000010 35 62 8d ab 15 e5 77 95 57 d4 f5 4c 02 79 bd 58 |5b....w.W..L.y.X| +peer1.org1.example.com | 00000020 84 96 b6 36 97 02 20 30 a1 f7 0f 63 f5 dd 55 6d |...6.. 0...c..Um| +peer1.org1.example.com | 00000030 9d bf b7 42 24 ef 9a 3e cb 01 23 53 09 7e 68 09 |...B$..>..#S.~h.| +peer1.org1.example.com | 00000040 4b 61 c8 f9 67 09 9a |Ka..g..| +peer1.org1.example.com | [59a 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562650 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [59b 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562650 gate 1589998805779079800 evaluation succeeds +peer1.org1.example.com | [59c 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [59d 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [59e 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [59f 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [5a0 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [5a1 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [5a2 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [5a3 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [5a4 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [5a5 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [5a6 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [5a7 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [5a8 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [5a9 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [5aa 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [5ab 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [5ac 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003594af0, CONNECTING +peer1.org1.example.com | [5ad 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003594af0, READY +peer1.org1.example.com | [5ae 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5af 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [5b0 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [5b1 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [5b2 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [5b3 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [5b4 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 77 b5 e7 f9 e3 33 16 f8 f1 c4 f6 |0D. Fw....3.....| +peer1.org1.example.com | 00000010 3b ab f7 b6 41 9a 4c e2 f5 53 5d 09 76 e2 9c ce |;...A.L..S].v...| +peer1.org1.example.com | 00000020 49 0d f4 f8 02 20 5d e3 b2 c1 f1 53 59 b7 80 fc |I.... ]....SY...| +peer1.org1.example.com | 00000030 cb 98 97 e3 b4 bd 74 fb 99 87 ed aa da 1b b7 98 |......t.........| +peer1.org1.example.com | 00000040 c2 62 7f 7c f4 e3 |.b.|..| +peer1.org1.example.com | [5b5 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [5b6 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5b7 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816100E +peer1.org1.example.com | [5b8 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F5473E645CE576EBC08E79A50ABB2D3679CE451682D3C5C372DDB31F62653056 +peer1.org1.example.com | [5b9 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5ba 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [5bb 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [5bc 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [431 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1d40 gate 1589998806278369300 evaluation starts +peer0.org2.example.com | [432 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1d40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [434 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1d40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [435 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | [433 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 1}, Envelope: 28216 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [436 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org2.example.com | [437 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [438 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [439 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [43a 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [43b 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [43c 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab940 gate 1589998806281576000 evaluation starts +peer0.org2.example.com | [43d 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab940 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [43e 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab940 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [43f 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab940 principal matched by identity 0 +peer0.org2.example.com | [440 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c 3b 9f aa f1 6a c1 ba 39 74 40 b1 f0 92 c4 eb |.;...j..9t@.....| +peer0.org2.example.com | 00000010 d0 dc 91 72 6c 62 4d 43 e4 92 83 9b 79 bf 31 e8 |...rlbMC....y.1.| +peer0.org2.example.com | [441 05-20 18:20:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org2.example.com | [442 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [443 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [444 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 04 12 4a 8d 49 f5 60 25 78 95 fe |0D. ...J.I.`%x..| +peer0.org2.example.com | 00000010 88 a5 82 b0 26 e5 3e 09 b6 e1 20 fa 08 fc 12 16 |....&.>... .....| +peer0.org2.example.com | 00000020 29 10 14 d2 02 20 73 28 bf f0 37 f8 fd a4 db 92 |).... s(..7.....| +peer0.org2.example.com | 00000030 47 2f 38 9f 01 8d 36 b6 9e 1d 43 5f 18 17 32 29 |G/8...6...C_..2)| +peer0.org2.example.com | 00000040 06 9f 72 3d e2 c5 |..r=..| +peer0.org2.example.com | [445 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org2.example.com | [446 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [447 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab940 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [448 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab940 gate 1589998806281576000 evaluation succeeds +peer0.org2.example.com | [449 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1d40 principal matched by identity 0 +peer0.org2.example.com | [44a 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [44b 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +peer0.org2.example.com | 00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.| +peer0.org2.example.com | [44c 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [44d 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +peer0.org2.example.com | 00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +peer0.org2.example.com | 00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +peer0.org2.example.com | 00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +peer0.org2.example.com | 00000040 b6 a1 df 24 f2 fb af |...$...| +peer0.org2.example.com | [44e 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [44f 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [450 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1d40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [451 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org2.example.com | [452 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1d40 gate 1589998806278369300 evaluation succeeds +peer0.org2.example.com | [453 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org2.example.com | [454 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [455 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [456 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [457 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [458 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [0] +peer0.org2.example.com | [459 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28186 bytes, seq: 2}, Envelope: 28219 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [45a 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer0.org2.example.com | [45b 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [45c 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [45d 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [45e 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [45f 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [460 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [461 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [462 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [463 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [464 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [465 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [466 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [467 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [468 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [469 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [46a 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [46b 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [46c 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [46d 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +orderer0.example.com | "2020-05-20 18:20:01.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75b Sending msg of 28 bytes to 3 on channel businesschannel took 8.2µs" +orderer0.example.com | "2020-05-20 18:20:01.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240µs " +peer0.org2.example.com | [46e 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [5bd 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes +peer0.org2.example.com | [46f 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [482 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org2.example.com | [483 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [5be 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [484 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer0.org1.example.com | [42f 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [5bf 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | "2020-05-20 18:20:01.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [470 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [485 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer0.org1.example.com | [430 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [471 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [486 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [487 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9761545360067544221, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [488 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 9761545360067544221, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [472 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +orderer0.example.com | "2020-05-20 18:20:01.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3707ms " +orderer0.example.com | "2020-05-20 18:20:01.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:01.931 UTC [orderer.common.cluster.step] handleMessage -> DEBU 760 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:01.932 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 761 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2020-05-20 18:20:01.932 UTC [orderer.common.cluster.step] sendMessage -> DEBU 762 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.6µs " +orderer0.example.com | "2020-05-20 18:20:01.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 763 Sending msg of 28 bytes to 2 on channel businesschannel took 42.3µs" +peer1.org1.example.com | [5c0 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +orderer0.example.com | "2020-05-20 18:20:01.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 764 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +peer1.org1.example.com | [5c1 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [473 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [5c2 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [431 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [489 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:01.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 765 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 281.1µs " +orderer0.example.com | "2020-05-20 18:20:01.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU 766 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 283µs " +orderer0.example.com | "2020-05-20 18:20:01.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 767 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:01.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 768 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [48a 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9761545360067544221, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:02.429 UTC [orderer.common.cluster.step] handleMessage -> DEBU 769 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [5c3 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [474 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [475 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [476 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +orderer0.example.com | "2020-05-20 18:20:02.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76a Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +peer1.org1.example.com | [5c4 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [477 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [48b 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +orderer0.example.com | "2020-05-20 18:20:02.430 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 534.1µs " +peer1.org1.example.com | [5c5 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [478 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [432 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | [48c 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +orderer0.example.com | "2020-05-20 18:20:02.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76c Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +peer0.org2.example.com | [479 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [5c6 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003412080 env 0xc0033d2780 txn 0 +peer0.org1.example.com | [433 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> INFO 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Becoming a leader +orderer0.example.com | "2020-05-20 18:20:02.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76d Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +peer0.org2.example.com | [47a 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [5c7 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [434 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer1.org2.example.com | [48d 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 49ms (state_validation=10ms block_and_pvtdata_commit=24ms state_commit=11ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +orderer0.example.com | "2020-05-20 18:20:02.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.5µs " +peer0.org2.example.com | [47b 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [5c8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 85ms +peer0.org1.example.com | [435 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer1.org2.example.com | [48e 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:20:02.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.2µs " +peer0.org2.example.com | [47c 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [5c9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [436 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | [48f 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F8B6E8FEC1EFB38816...A55D1049CA35F5343DC503CE2A020802 +orderer0.example.com | "2020-05-20 18:20:02.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU 770 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [47d 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [5ca 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [437 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org2.example.com | [490 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 27C75DC4812344267BE90723BB8DFD19C785E442806BA1FD6F906EB18CECE11E +orderer0.example.com | "2020-05-20 18:20:02.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU 771 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [47e 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [5cb 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [438 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [491 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +orderer0.example.com | "2020-05-20 18:20:02.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 772 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [47f 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [5cc 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer0.org1.example.com | [439 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610021801 +peer1.org2.example.com | [492 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-05-20 18:20:02.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 773 Sending msg of 28 bytes to 3 on channel testchainid took 8µs" +peer0.org2.example.com | [480 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [5cd 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [43a 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FF53A31DD1A68861A0EAD657E78E3C104ED989C685D5CAFDAA5DA6060C1439CF +peer1.org2.example.com | [493 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +orderer0.example.com | "2020-05-20 18:20:02.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU 774 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs " +peer0.org2.example.com | [481 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [5ce 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [43b 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org2.example.com | [494 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +orderer0.example.com | "2020-05-20 18:20:02.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 775 Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +peer0.org2.example.com | [482 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [5cf 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [43c 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer1.org2.example.com | [495 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +orderer0.example.com | "2020-05-20 18:20:02.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 776 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +peer0.org2.example.com | [483 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [5d0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org1.example.com | [43d 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [496 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +orderer0.example.com | "2020-05-20 18:20:02.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 777 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.3µs " +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [5d1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [43e 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [497 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +orderer0.example.com | "2020-05-20 18:20:02.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 778 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [5d2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [43f 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }] +peer1.org2.example.com | [498 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 4b 22 28 29 09 30 18 96 67 d9 9c ce 66 e9 a8 |.K"().0..g...f..| +orderer0.example.com | "2020-05-20 18:20:02.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU 779 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [5d3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [5d4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | 00000010 65 fb be 6f 81 56 3c 02 38 5c 35 92 29 ff 9c 7c |e..o.V<.8\5.)..|| +orderer0.example.com | "2020-05-20 18:20:02.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [5d5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [499 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 1e b1 55 6c d3 c1 84 27 a5 d3 |0E.!....Ul...'..| +peer0.org1.example.com | [440 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +orderer0.example.com | "2020-05-20 18:20:03.042 UTC [orderer.common.server] Deliver -> DEBU 77b Starting new Deliver handler" +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [5d6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | 00000010 99 c5 ed 5b f0 54 c0 ff ad ae 9d b2 10 98 fd 5b |...[.T.........[| +peer0.org1.example.com | [441 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003250780, CONNECTING +orderer0.example.com | "2020-05-20 18:20:03.042 UTC [common.deliver] Handle -> DEBU 77c Starting new deliver loop for 172.18.0.9:53448" +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [5d7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | 00000020 86 6f fa b3 2e 02 20 4f 97 63 7d 65 c4 81 4f 4e |.o.... O.c}e..ON| +peer0.org1.example.com | [442 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:03.042 UTC [common.deliver] Handle -> DEBU 77d Attempting to read seek info message from 172.18.0.9:53448" +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | 00000030 ea e8 a5 57 6d eb 43 6d 5a d1 c8 38 2a f9 4b 0d |...Wm.CmZ..8*.K.| +peer1.org1.example.com | [5d8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [443 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:20:03.067 UTC [orderer.common.server] Broadcast -> DEBU 77e Starting new Broadcast handler" +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | 00000040 5a 18 37 a9 4a 2d 7b |Z.7.J-{| +peer1.org1.example.com | [5d9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [444 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:03.067 UTC [orderer.common.broadcast] Handle -> DEBU 77f Starting new broadcast loop for 172.18.0.9:53450" +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | [49a 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +orderer0.example.com | "2020-05-20 18:20:03.068 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 780 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:53450" +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [49b 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc000097fc0 env 0xc002f994f0 txn 0 +peer1.org1.example.com | [5da 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [445 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003250780, READY +orderer0.example.com | "2020-05-20 18:20:03.068 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 781 Processing config update message for exisitng channel businesschannel" +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | [49c 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002f994f0 +peer0.org1.example.com | [446 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer2.example.com:7050 [OrdererMSP]} +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [49d 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [5db 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [447 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer2.example.com:7050 +orderer0.example.com | "2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 782 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer0.org2.example.com | [484 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49e 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [5dc 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00333da80)} +peer0.org1.example.com | [448 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer2.example.com:7050 ... +orderer0.example.com | "2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 783 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [485 05-20 18:20:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49f 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +peer1.org1.example.com | [5dd 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [449 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [486 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [487 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [4a0 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [5de 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [44a 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer0.org2.example.com | [488 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +orderer0.example.com | "2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 784 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer1.org2.example.com | [4a1 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [5df 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [44b 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [44c 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [44d 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608D5E995F60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer1.org1.example.com | [5e0 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org1.example.com | [5e1 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org1.example.com | [5e2 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org1.example.com | [5e3 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org1.example.com | [5e4 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xa6, 0xe9, 0x70, 0x63, 0xe3, 0xe8, 0x98, 0x1e, 0x14, 0xfd, 0x2a, 0x6f, 0x3d, 0xd9, 0x24, 0x28, 0x30, 0xda, 0x1, 0x2c, 0xc0, 0x6d, 0x3f, 0xca, 0x43, 0xa9, 0xc8, 0x4, 0x6b, 0x7f, 0xa7, 0x8c} txOffsets= +peer1.org1.example.com | txId=5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d locPointer=offset=71, bytesLength=27137 +peer1.org1.example.com | ] +peer1.org1.example.com | [5e5 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to txid-index +peer1.org1.example.com | [5e6 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx number:[0] ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to blockNumTranNum index +peer1.org1.example.com | [5e7 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56676], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org1.example.com | [5e8 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org1.example.com | [5e9 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org1.example.com | [5ea 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org1.example.com | [5eb 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [5ec 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [5ed 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [5ee 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [5ef 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [5f0 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [5f2 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [5f3 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org1.example.com | [5f4 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org1.example.com | [5f5 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [5f1 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org1.example.com | [5f6 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org1.example.com | [5f7 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org1.example.com | [5f8 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org1.example.com | [5f9 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 52ms (state_validation=9ms block_and_pvtdata_commit=28ms state_commit=8ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org1.example.com | [5fa 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5fb 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408D09590EEBFEFB38816...387B0008A61A99B98BA4E6D12A020802 +peer1.org1.example.com | [5fc 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DC886C74CD2955A27F86988EB8AD061A52DD03AEF9EA3C7E3BC20DD153950E93 +peer1.org1.example.com | [5fd 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org1.example.com | [5fe 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer1.org1.example.com | [5ff 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org1.example.com | [600 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer1.org1.example.com | [601 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer1.org1.example.com | [602 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00333dd40 env 0xc0035ead20 txn 0 +peer1.org1.example.com | [603 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0035ead20 +peer1.org1.example.com | [604 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +peer1.org1.example.com | [605 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [606 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [607 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [608 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [609 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [489 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [48a 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [48b 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [48c 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [48d 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [48e 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [48f 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [490 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [491 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [492 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [493 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [494 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [495 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [496 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [497 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [498 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [499 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [49a 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [49b 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [49c 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [49d 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [49e 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [49f 05-20 18:20:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [4a0 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [4a1 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [4a2 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | [4a3 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [4a4 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [4a5 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [4a6 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [4a7 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [4a8 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [4a9 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [4aa 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [4ab 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [4ac 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [4ad 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [4ae 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [4af 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [4b0 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [4b1 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [4b2 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [4b3 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [4b4 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [4b5 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [4b6 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [4b7 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [4b8 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [4b9 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [4ba 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [4bb 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [4bc 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [60a 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org1.example.com | [60b 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [60c 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [60d 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [60e 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [60f 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 37 bb 71 60 be 2a 5d cc c1 22 4e 4f 27 d1 58 |<7.q`.*].."NO'.X| +peer1.org1.example.com | 00000010 61 69 d0 5c 2e e4 d9 b0 e3 9c e2 21 7e 90 49 40 |ai.\.......!~.I@| +peer1.org1.example.com | [610 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 60 c6 0c 5d 48 6b 58 d3 55 d6 |0E.!..`..]HkX.U.| +peer1.org1.example.com | 00000010 55 aa 91 32 59 e9 96 66 be 0b b5 dc d7 6d 1e cd |U..2Y..f.....m..| +peer1.org1.example.com | 00000020 f6 0e 3e eb ae 02 20 0b 84 cd 3c d4 a3 21 14 67 |..>... ...<..!.g| +peer1.org1.example.com | 00000030 cc 8e d7 67 bd 5d 55 59 2b de 4a 52 0f f7 5f bf |...g.]UY+.JR.._.| +peer1.org1.example.com | 00000040 23 c2 cc 10 3c 4b c5 |#... DEBU exits successfully +peer1.org1.example.com | [612 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003740000, header channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +peer1.org1.example.com | [613 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [614 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [615 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [616 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [617 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [618 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [619 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [61a 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [61b 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [61c 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [61d 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [61e 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [61f 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [620 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [621 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [622 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [623 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [624 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org1.example.com | [625 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [626 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [627 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [628 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [629 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [62a 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [62b 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org1.example.com | [62c 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [62d 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [62e 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org1.example.com | [62f 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | [630 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [631 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [632 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778ea0 gate 1589998805902458300 evaluation starts +peer1.org1.example.com | [633 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [634 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778ea0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [635 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [636 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [637 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [638 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [639 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [63a 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [63b 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778ea0 principal matched by identity 0 +peer1.org1.example.com | [63c 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +peer1.org1.example.com | 00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D| +peer1.org1.example.com | [63d 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +peer1.org1.example.com | 00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +peer1.org1.example.com | 00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +peer1.org1.example.com | 00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +peer1.org1.example.com | 00000040 c1 0e dd 4e f6 78 ea |...N.x.| +peer1.org1.example.com | [63e 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778ea0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [63f 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778ea0 gate 1589998805902458300 evaluation succeeds +peer1.org1.example.com | [640 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [641 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [642 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [643 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [644 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [645 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [646 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [647 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [648 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [649 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [64a 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [64b 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [64c 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [64d 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [64e 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [64f 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [650 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [651 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [652 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [653 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [654 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [655 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [656 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [657 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [658 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [659 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [65a 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [65b 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [65c 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [65d 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [65e 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [65f 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [660 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [661 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [44e 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92289707CDADB33A24D38FA666F190B40BB8DC44C10DEE6A89E5567D9A72A623 +peer0.org1.example.com | [44f 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [450 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [451 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [452 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [453 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [454 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [455 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [456 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer0.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer0.org1.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer0.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer0.org1.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer0.org1.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [457 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 gate 1589998805709132800 evaluation starts +peer0.org1.example.com | [458 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [459 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [45a 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [45b 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [45c 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [45d 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 principal matched by identity 0 +peer0.org1.example.com | [45e 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 ae 1e 93 ef 16 d3 72 49 19 6b 54 2f e7 67 ae |.......rI.kT/.g.| +peer0.org1.example.com | 00000010 76 03 6f 1e 50 5e 5f e2 01 92 44 1d 09 fa cc 1e |v.o.P^_...D.....| +peer1.org2.example.com | [4a2 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [4a3 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a4 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a5 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4a6 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4a7 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a8 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org2.example.com | [4a9 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4aa 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ab 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ac 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [4ad 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4ae 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4af 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [4b0 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4b1 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [4b2 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034ef30 gate 1589998806724042000 evaluation starts +peer1.org2.example.com | [4b3 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034ef30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4b4 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034ef30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4b5 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034ef30 principal matched by identity 0 +peer1.org2.example.com | [4b6 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 37 bb 71 60 be 2a 5d cc c1 22 4e 4f 27 d1 58 |<7.q`.*].."NO'.X| +peer1.org2.example.com | 00000010 61 69 d0 5c 2e e4 d9 b0 e3 9c e2 21 7e 90 49 40 |ai.\.......!~.I@| +peer1.org2.example.com | [4b7 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 96 0a 79 5e 9a 97 aa c8 0b c7 c0 eb 62 62 e6 |...y^........bb.| +peer1.org2.example.com | 00000010 5f 5b 36 d8 60 ce f8 bf da fb 8b d3 d7 38 56 39 |_[6.`........8V9| +peer1.org2.example.com | [4b9 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f fd cb c4 f3 66 62 f9 fc c5 9f a6 |0D. o....fb.....| +peer1.org2.example.com | 00000010 7d 96 f4 ba 5a 6c 62 4a 40 6b 6e d9 f3 7c 3b 14 |}...ZlbJ@kn..|;.| +peer1.org2.example.com | 00000020 90 4e 80 e3 02 20 64 61 59 fc 95 37 23 36 d9 a5 |.N... daY..7#6..| +peer1.org2.example.com | 00000030 93 c1 a2 f5 97 8a 30 ec 5b 82 3c e3 9a a1 2d c5 |......0.[.<...-.| +peer1.org2.example.com | 00000040 9e fd 2b 8f f3 66 |..+..f| +peer1.org2.example.com | [4ba 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034ef30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4bb 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034ef30 gate 1589998806724042000 evaluation succeeds +peer1.org2.example.com | [4bc 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4b8 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 60 c6 0c 5d 48 6b 58 d3 55 d6 |0E.!..`..]HkX.U.| +peer1.org2.example.com | 00000010 55 aa 91 32 59 e9 96 66 be 0b b5 dc d7 6d 1e cd |U..2Y..f.....m..| +peer1.org2.example.com | 00000020 f6 0e 3e eb ae 02 20 0b 84 cd 3c d4 a3 21 14 67 |..>... ...<..!.g| +peer1.org2.example.com | 00000030 cc 8e d7 67 bd 5d 55 59 2b de 4a 52 0f f7 5f bf |...g.]UY+.JR.._.| +peer1.org2.example.com | 00000040 23 c2 cc 10 3c 4b c5 |#... DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4be 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4bf 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4c0 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4c1 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org2.example.com | [4c2 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4c3 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4c4 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4c5 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [4c6 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4c7 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc000495500, header channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +peer1.org2.example.com | [4c8 05-20 18:20:06.72 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [4c9 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [4ca 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [4cb 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [4cc 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [4cd 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4ce 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [4cf 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4d0 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [4d1 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [4d2 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [4d3 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [4d4 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [4d5 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4bd 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +orderer0.example.com | "2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 785 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [662 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [45f 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 02 46 89 6e 97 c7 75 13 33 1e |0E.!...F.n..u.3.| +peer1.org2.example.com | [4d6 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [4be 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 786 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer1.org1.example.com | [663 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | 00000010 68 38 d3 b3 23 63 c2 d8 9d 35 62 e2 6c a1 f2 02 |h8..#c...5b.l...| +peer0.org1.example.com | 00000020 56 ee aa df 2a 02 20 6e 96 d4 a5 5f 14 02 95 75 |V...*. n..._...u| +peer0.org1.example.com | 00000030 e5 72 89 6e 58 73 a9 02 10 de c2 6d 7a 54 e9 1f |.r.nXs.....mzT..| +peer0.org1.example.com | 00000040 9d 16 cd cf a2 88 f6 |.......| +peer0.org1.example.com | [460 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [461 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 gate 1589998805709132800 evaluation succeeds +peer0.org1.example.com | [462 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [463 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [464 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [465 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [466 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [467 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [468 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer0.org1.example.com | [469 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer0.org1.example.com | [46a 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org1.example.com | [46b 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer0.org1.example.com | [46c 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer0.org1.example.com | [46d 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [46e 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0030cdac0 env 0xc0032632c0 txn 0 +peer0.org1.example.com | [46f 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0032632c0 +peer0.org1.example.com | [470 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +peer0.org1.example.com | [471 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [472 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [473 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [474 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [475 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [476 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [477 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [478 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [479 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [47a 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 b8 81 45 57 b3 76 22 8f e3 1a 03 c3 91 2f 86 |...EW.v"....../.| +peer0.org1.example.com | 00000010 7e 72 d9 f3 aa 71 79 97 65 bc 30 9d 33 cc e6 12 |~r...qy.e.0.3...| +peer0.org1.example.com | [47b 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 a0 2b cc a7 6e 38 18 f4 da de |0E.!...+..n8....| +peer0.org1.example.com | 00000010 55 a1 da 90 8d 69 4c 45 cd 0b c0 36 18 d5 5a 21 |U....iLE...6..Z!| +peer0.org1.example.com | 00000020 fa 5f 93 bc 1f 02 20 5b 9e 95 84 5c e6 2b cc d1 |._.... [...\.+..| +peer0.org1.example.com | 00000030 f5 6c a3 3f bd 2e 63 05 ad db bb 57 a1 1c cd 2d |.l.?..c....W...-| +peer0.org1.example.com | 00000040 85 68 ef ee ee 6d 09 |.h...m.| +peer0.org1.example.com | [47c 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [47d 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00333b500, header channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +peer0.org1.example.com | [47e 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [47f 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [4d7 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4d8 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [4d9 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org2.example.com | [4da 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [4db 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [4dc 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [4dd 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [4de 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [4df 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [4e0 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org2.example.com | [4e1 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [4e2 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [4e3 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org2.example.com | [4e4 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org2.example.com | [4e5 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e6 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4e7 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004311c0 gate 1589998806736459500 evaluation starts +peer1.org2.example.com | [4e8 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004311c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4e9 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004311c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4ea 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [4eb 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [4ec 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [4ed 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4ee 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [664 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [665 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [666 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [667 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [668 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [669 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [66a 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [66b 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [66c 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [66d 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [66e 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [66f 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | [670 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [671 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [672 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [673 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [674 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [675 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [676 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [677 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [678 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [679 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [67a 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [67b 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [67c 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [67d 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [67e 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [67f 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [680 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [681 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [682 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [683 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [684 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [685 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [686 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [687 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [688 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [689 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [68a 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [68b 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [68c 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [4ef 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4f0 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004311c0 principal matched by identity 0 +peer1.org2.example.com | [4f1 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +peer1.org2.example.com | 00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D| +peer1.org2.example.com | [4f2 05-20 18:20:06.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +peer1.org2.example.com | 00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +peer1.org2.example.com | 00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +peer1.org2.example.com | 00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +peer1.org2.example.com | 00000040 c1 0e dd 4e f6 78 ea |...N.x.| +peer1.org2.example.com | [4f3 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004311c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4f4 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004311c0 gate 1589998806736459500 evaluation succeeds +peer1.org2.example.com | [4f5 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4f6 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4f7 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [4f8 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [4f9 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [4fa 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [4fb 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4fc 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4fd 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4fe 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ff 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [500 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [501 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [502 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [503 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [504 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [505 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [506 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [507 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [508 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [509 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [50a 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [50b 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [50c 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [50d 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [50e 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [50f 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [510 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [511 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [512 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [513 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [514 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [515 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [516 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [517 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [518 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [519 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [51a 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org2.example.com | [51b 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [51c 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [51d 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [51e 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [51f 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [480 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [481 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [482 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [483 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [484 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [485 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [486 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [487 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [488 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [489 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [48a 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [48b 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [48c 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [48d 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [48e 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [48f 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org1.example.com | [490 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [491 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [492 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [493 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [494 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [495 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [496 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org1.example.com | [497 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [498 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [499 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org1.example.com | [49a 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [49b 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 gate 1589998805727402400 evaluation starts +peer0.org1.example.com | [49c 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49d 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [49e 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [49f 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [4a0 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [4a1 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4a2 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [4a3 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [1] +peer0.org1.example.com | [4a4 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [4a5 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org1.example.com | [4a6 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a7 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a8 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [4a9 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4aa 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [4ab 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 gate 1589998805731809100 evaluation starts +peer0.org1.example.com | [4ac 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ad 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4ae 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 principal matched by identity 0 +peer0.org1.example.com | [4b0 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 a4 1e f0 21 bc 6d 6f dd 04 f4 ee 97 a0 5b e2 |....!.mo......[.| +peer0.org1.example.com | 00000010 8d e4 d8 70 1c 40 6f dd d0 21 0f 26 bb 5b b4 87 |...p.@o..!.&.[..| +peer0.org1.example.com | [4b1 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 d6 4d c8 5c 8c 2f 50 b5 60 98 |0E.!...M.\./P.`.| +peer0.org1.example.com | 00000010 60 31 c4 3f 7b 2a fa f4 cf 19 bf 22 cd 96 db 2a |`1.?{*....."...*| +peer0.org1.example.com | 00000020 02 5e fb 02 b2 02 20 4c f9 d7 8f 34 1a 07 5a 22 |.^.... L...4..Z"| +peer0.org1.example.com | 00000030 bc 54 70 3d a2 f4 c9 07 28 fb aa 82 3f 42 71 05 |.Tp=....(...?Bq.| +peer0.org1.example.com | 00000040 dc e8 c0 83 d2 f1 3f |......?| +peer0.org1.example.com | [4af 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [4b2 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4b3 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 principal matched by identity 0 +peer0.org1.example.com | [4b4 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +peer0.org1.example.com | 00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.| +peer0.org1.example.com | [4b5 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b6 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 gate 1589998805731809100 evaluation succeeds +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [520 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [521 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [522 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [523 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [524 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [525 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [526 05-20 18:20:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [527 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [528 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [529 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [52a 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [52b 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [52c 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [52d 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [52e 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [52f 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [530 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [531 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [532 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [533 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [534 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [535 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [536 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [537 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [538 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [539 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [53a 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [53b 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [53c 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [53d 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [53e 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [53f 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [540 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [541 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [542 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [543 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [544 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [545 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [546 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [547 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [548 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [549 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [54a 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [54b 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [68d 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [68e 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [68f 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [690 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [691 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [692 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [693 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [694 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [695 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [696 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [697 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [698 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [699 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [69a 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [69b 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [69c 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [69d 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [69e 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [69f 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [6a0 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [6a1 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [6a2 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [6a3 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [6a4 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [6a5 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [6a6 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6a7 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [6a8 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [6a9 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [6aa 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [6ab 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [6ac 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [6ad 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [6ae 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [6af 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [6b0 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [6b1 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [6b2 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [6b3 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [6b4 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [6b5 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [6b6 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [6b7 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [6b8 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [6b9 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [6ba 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [6bb 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [6bc 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [6bd 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [6be 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [6bf 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [6c0 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [6c1 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [6c2 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [6c3 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [6c4 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [6c5 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [6c6 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [6c7 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [6c8 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [6c9 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [6ca 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [6cb 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [6cc 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [6cd 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [6ce 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [6cf 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [6d0 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [6d1 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [6d2 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [6d3 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [6d4 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [6d5 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [6d6 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [6d7 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [6d8 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [6d9 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [6da 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [6db 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [6dc 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [6dd 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [6de 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [6df 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [6e0 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [6e1 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [6e2 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [6e3 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [6e4 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [6e5 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [6e6 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [6e7 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [6e8 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [6e9 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [6ea 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [6eb 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [6ec 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [6ed 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [6ee 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385dde0 gate 1589998805938279500 evaluation starts +peer1.org1.example.com | [6ef 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385dde0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [6f0 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385dde0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [6f1 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385dde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [6f2 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385dde0 principal evaluation fails +peer1.org1.example.com | [6f3 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385dde0 gate 1589998805938279500 evaluation fails +peer1.org1.example.com | [6f4 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6f5 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6f6 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [6f7 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003870c30 gate 1589998805938772500 evaluation starts +peer1.org1.example.com | [6f8 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003870c30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [6f9 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003870c30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [6fa 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [6fb 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [6fc 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [4bf 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [4c0 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [4c1 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [4c2 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [4c3 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [4c4 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [4c5 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [4c6 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4c7 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [4c8 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [4c9 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [4ca 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [4cb 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [4cc 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [4cd 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [4ce 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [4cf 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [4d0 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [4d1 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [4d2 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [4d3 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [4d4 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [4d5 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [4d6 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [4d7 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [4d8 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [4d9 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [4da 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [4db 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [4dc 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [4dd 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [4de 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [4df 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [4e0 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [4e1 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [4e2 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [4e3 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [4e4 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [4e5 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [4e6 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [4e7 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [4e8 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [4e9 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4ea 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4eb 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [4ec 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [4ed 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [4ee 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [4ef 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [4f0 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [4f1 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [4f2 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4f3 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4f4 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [4f5 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [4f6 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [4f7 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [4f8 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [4f9 05-20 18:20:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [4fa 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [4fb 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [4fc 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [4fd 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [4fe 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [4ff 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [500 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [501 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [502 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [503 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [504 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [505 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [506 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [507 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [508 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [509 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [50a 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [50b 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [50c 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [50d 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [50e 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [50f 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [510 05-20 18:20:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0004adc90, CONNECTING +peer0.org2.example.com | [511 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [512 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [513 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [514 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [515 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [516 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003087780 env 0xc0031df220 txn 0 +peer0.org2.example.com | [517 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [518 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 70ms +peer0.org2.example.com | [519 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [51a 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [51b 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [51c 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer0.org2.example.com | [51d 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [4b7 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [4b8 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +peer0.org1.example.com | 00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +peer0.org1.example.com | 00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +peer0.org1.example.com | 00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +peer0.org1.example.com | 00000040 b6 a1 df 24 f2 fb af |...$...| +peer0.org1.example.com | [4b9 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [4ba 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [4bb 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [4bc 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [4bd 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4be 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 gate 1589998805727402400 evaluation succeeds +peer0.org1.example.com | [4bf 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [4c0 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [4c1 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [4c2 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [4c3 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [4c4 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [1] +peer0.org1.example.com | [4c5 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [4c6 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer0.org1.example.com | [4c7 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c8 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c9 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4ca 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4cb 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4cc 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4cd 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ce 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cf 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4d0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [4d1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4d2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes +peer0.org1.example.com | [4d4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4d5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4d6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4d7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4d8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [4d9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [4da 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [4db 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4dc 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4dd 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4de 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4df 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4e0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4e1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4e2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4e3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [4e4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [4e5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [4e6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [4e7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [4e8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4e9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [4ea 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [4eb 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4ec 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4ed 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4ee 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4ef 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4f0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org1.example.com | [4f1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [4f2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4f3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4f4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [4f5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4f6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4f7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4f8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4f9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4fa 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [4fb 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [4fc 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4fd 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4fe 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [4ff 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [500 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [501 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [502 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [503 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [504 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [505 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [506 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [507 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [508 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [509 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [50a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [50b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [50c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [50d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [50e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [50f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | "2020-05-20 18:20:03.070 UTC [cauthdsl] func1 -> DEBU 787 0xc000d0f170 gate 1589998803070050500 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:03.070 UTC [cauthdsl] func2 -> DEBU 788 0xc000d0f170 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:03.070 UTC [cauthdsl] func2 -> DEBU 789 0xc000d0f170 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:03.070 UTC [cauthdsl] func2 -> DEBU 78a 0xc000d0f170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-05-20 18:20:03.070 UTC [cauthdsl] func2 -> DEBU 78b 0xc000d0f170 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:20:03.070 UTC [cauthdsl] func1 -> DEBU 78c 0xc000d0f170 gate 1589998803070050500 evaluation fails" +orderer0.example.com | "2020-05-20 18:20:03.071 UTC [policies] Evaluate -> DEBU 78d Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:03.071 UTC [policies] Evaluate -> DEBU 78e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:03.071 UTC [policies] func1 -> DEBU 78f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-05-20 18:20:03.071 UTC [policies] Evaluate -> DEBU 790 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:03.072 UTC [policies] Evaluate -> DEBU 791 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:03.072 UTC [policies] Evaluate -> DEBU 792 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-05-20 18:20:03.072 UTC [policies] Evaluate -> DEBU 793 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:20:03.072 UTC [policies] Evaluate -> DEBU 794 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-05-20 18:20:03.072 UTC [cauthdsl] func1 -> DEBU 795 0xc000d0fe80 gate 1589998803072652100 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:03.072 UTC [cauthdsl] func2 -> DEBU 796 0xc000d0fe80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:03.072 UTC [cauthdsl] func2 -> DEBU 797 0xc000d0fe80 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:03.072 UTC [cauthdsl] func2 -> DEBU 798 0xc000d0fe80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-05-20 18:20:03.073 UTC [cauthdsl] func2 -> DEBU 799 0xc000d0fe80 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:20:03.073 UTC [cauthdsl] func1 -> DEBU 79a 0xc000d0fe80 gate 1589998803072652100 evaluation fails" +orderer0.example.com | "2020-05-20 18:20:03.073 UTC [policies] Evaluate -> DEBU 79b Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.073 UTC [policies] Evaluate -> DEBU 79c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.073 UTC [policies] Evaluate -> DEBU 79d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-05-20 18:20:03.073 UTC [cauthdsl] func1 -> DEBU 79e 0xc000cd86f0 gate 1589998803073767200 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:03.074 UTC [cauthdsl] func2 -> DEBU 79f 0xc000cd86f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:03.074 UTC [cauthdsl] func2 -> DEBU 7a0 0xc000cd86f0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:03.074 UTC [cauthdsl] func2 -> DEBU 7a1 0xc000cd86f0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:20:03.074 UTC [msp.identity] Verify -> DEBU 7a2 Verify: digest = 00000000 7d 95 e5 11 92 be 0c 04 5e fb e1 a5 d6 88 b5 b5 |}.......^.......| +orderer0.example.com | 00000010 21 99 14 5e 20 97 f4 2e 1b bd d6 d3 2f b7 8e 07 |!..^ ......./...|" +orderer0.example.com | "2020-05-20 18:20:03.074 UTC [msp.identity] Verify -> DEBU 7a3 Verify: sig = 00000000 30 44 02 20 27 89 73 eb 94 69 f2 be d0 d1 36 e2 |0D. '.s..i....6.| +orderer0.example.com | 00000010 be 32 9a bb 52 95 80 b1 32 3f 99 d7 71 83 35 cf |.2..R...2?..q.5.| +orderer0.example.com | 00000020 db d9 21 a8 02 20 2d 07 3a 07 2c 62 95 dc ae b7 |..!.. -.:.,b....| +orderer0.example.com | 00000030 be 82 95 28 c4 a3 c6 6e 73 35 54 21 83 09 dc 4a |...(...ns5T!...J| +orderer0.example.com | 00000040 cb 75 7d 7c 06 7c |.u}|.||" +orderer0.example.com | "2020-05-20 18:20:03.075 UTC [cauthdsl] func2 -> DEBU 7a4 0xc000cd86f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:20:03.075 UTC [cauthdsl] func1 -> DEBU 7a5 0xc000cd86f0 gate 1589998803073767200 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7a6 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7a8 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7aa Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:03.076 UTC [policies] Evaluate -> DEBU 7ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:03.076 UTC [common.configtx] addToMap -> DEBU 7ac Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:03.076 UTC [common.configtx] addToMap -> DEBU 7ad Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.076 UTC [common.configtx] addToMap -> DEBU 7ae Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.076 UTC [common.configtx] addToMap -> DEBU 7af Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b3 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.078 UTC [common.configtx] addToMap -> DEBU 7b5 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.078 UTC [common.configtx] addToMap -> DEBU 7b6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.078 UTC [common.configtx] addToMap -> DEBU 7b7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer1.org1.example.com | [6fd 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003870c30 principal matched by identity 0 +peer1.org1.example.com | [6fe 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3e 5c 4a 11 e1 a3 69 d4 28 30 4d f7 e2 3d 3f |/>\J...i.(0M..=?| +peer1.org1.example.com | 00000010 b5 1c 6f 96 b3 ef b9 a2 dc d4 aa 30 25 70 c7 29 |..o........0%p.)| +peer1.org1.example.com | [6ff 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 86 23 6c 12 fe e6 23 43 2b a1 |0E.!...#l...#C+.| +peer1.org1.example.com | 00000010 35 62 8d ab 15 e5 77 95 57 d4 f5 4c 02 79 bd 58 |5b....w.W..L.y.X| +peer1.org1.example.com | 00000020 84 96 b6 36 97 02 20 30 a1 f7 0f 63 f5 dd 55 6d |...6.. 0...c..Um| +peer1.org1.example.com | 00000030 9d bf b7 42 24 ef 9a 3e cb 01 23 53 09 7e 68 09 |...B$..>..#S.~h.| +peer1.org1.example.com | 00000040 4b 61 c8 f9 67 09 9a |Ka..g..| +peer1.org1.example.com | [700 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003870c30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [701 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003870c30 gate 1589998805938772500 evaluation succeeds +peer1.org1.example.com | [702 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [703 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [704 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [705 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [706 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [707 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [708 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [709 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [70a 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [70b 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [70c 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [70d 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [70e 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [70f 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [710 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [711 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [712 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [713 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [714 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0038c4e80, CONNECTING +peer1.org1.example.com | [715 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [716 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [717 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [718 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [719 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0038a5f00, CONNECTING +peer1.org1.example.com | [71a 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0038a5f00, READY +peer1.org1.example.com | [71b 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [71c 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [71d 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [71e 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [71f 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer1.org1.example.com | [720 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [721 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [722 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [723 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [724 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0038c4e80, READY +peer1.org1.example.com | [725 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [726 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [727 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [728 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [729 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [72a 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [72b 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [72c 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [72d 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [72e 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [72f 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [730 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [731 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [732 05-20 18:20:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [733 05-20 18:20:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [734 05-20 18:20:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [736 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 dd 59 25 c8 3a 89 88 3d 27 21 8e |0D. H.Y%.:..='!.| +peer1.org1.example.com | 00000010 ed 3b 39 79 50 ba 5e 1a af 16 93 7a f3 f0 41 b4 |.;9yP.^....z..A.| +peer1.org1.example.com | 00000020 85 8a 69 2a 02 20 68 7f 8d 5c d6 61 fa 84 ed 63 |..i*. h..\.a...c| +peer1.org1.example.com | 00000030 a4 5b ae 75 ce cd cc 22 5e a5 01 3c 76 a9 19 69 |.[.u..."^.. DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [737 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [738 05-20 18:20:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [739 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [73a 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [73c 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161014 +peer1.org1.example.com | [73d 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9D1B2B064317A1521681A2DD43998F9DC8339F16B13261C897B9582680B14A87 +peer1.org1.example.com | [73e 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [73f 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [740 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [741 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [54c 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [54d 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [54e 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [54f 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [550 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [551 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [552 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [553 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [554 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [555 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [556 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [557 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [558 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [559 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [55a 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [55b 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [55c 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [55d 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [55e 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [55f 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [560 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [561 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [562 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [563 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [564 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [565 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [566 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [567 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [568 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [569 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [56a 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [56b 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [56c 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [56d 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [56e 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [56f 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [570 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [571 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [572 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [573 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [574 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [575 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [576 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [577 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [578 05-20 18:20:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [579 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [57a 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [57b 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [57c 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [57d 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [57e 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [57f 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [580 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [581 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [582 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [583 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [584 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [585 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [586 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [587 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [742 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [743 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [744 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [746 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c6100 gate 1589998806049927000 evaluation starts +peer1.org1.example.com | [747 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c6100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [748 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c6100 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [749 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [74a 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [74b 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [74c 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c6100 principal matched by identity 0 +peer1.org1.example.com | [74d 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [74e 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 8c c9 cd 4d 6f bb b5 68 79 b2 |0E.!.....Mo..hy.| +peer1.org1.example.com | 00000010 d0 9e 4f 3a a7 9a e1 8b 75 d8 53 d3 41 98 f3 f7 |..O:....u.S.A...| +peer1.org1.example.com | 00000020 24 f8 7a b9 21 02 20 0b 07 58 d9 ab f5 43 d1 ac |$.z.!. ..X...C..| +peer1.org1.example.com | 00000030 bc 2e 44 85 e9 d2 3e 30 a9 2e c2 a6 60 02 e7 c7 |..D...>0....`...| +peer1.org1.example.com | 00000040 b0 96 89 08 72 be 0d |....r..| +peer1.org1.example.com | [74f 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c6100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [750 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c6100 gate 1589998806049927000 evaluation succeeds +peer1.org1.example.com | [751 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [752 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [753 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [754 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [755 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [756 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [757 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [758 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161015 +peer1.org1.example.com | [759 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8BF5534B2B5CA3CE5142403D868FB808590DBD85CC10DC8B39344B549EE7DB57 +peer1.org1.example.com | [75a 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [75b 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [75c 05-20 18:20:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [73b 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [75d 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [75e 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [75f 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00333dd40 env 0xc0035ead20 txn 0 +peer1.org1.example.com | [761 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [762 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [763 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [764 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:8060432034469243681 tag:EMPTY mem_req:\335\2176\220\262\300\367L:`A\347\201\007\006\314\230\220\250" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [765 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:8060432034469243681 tag:EMPTY mem_req:\335\2176\220\262\300\367L:`A\347\201\007\006\314\230\220\250" > > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org1.example.com | [766 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [760 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [767 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 180ms +peer1.org1.example.com | [768 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [769 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [76a 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [76b 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer1.org1.example.com | [76c 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [76d 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [76e 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [76f 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer1.org1.example.com | [770 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [771 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [772 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [773 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [774 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [775 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [776 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [510 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [588 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [589 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [58a 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [58b 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [58c 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [58d 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [58e 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [58f 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [590 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [591 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [592 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [593 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [594 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [595 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [596 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [597 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [598 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [599 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [59a 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [59b 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [59c 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [59d 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [59e 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [59f 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5a0 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [5a1 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [5a2 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5a3 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [5a4 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5a5 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5a6 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [5a7 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [5a8 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [5a9 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [5aa 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [5ab 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002599450, CONNECTING +peer1.org2.example.com | [5ac 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [5ad 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [5ae 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [5af 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [5b0 05-20 18:20:06.76 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002613200, CONNECTING +orderer0.example.com | "2020-05-20 18:20:03.079 UTC [common.configtx] addToMap -> DEBU 7b8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.079 UTC [common.configtx] addToMap -> DEBU 7b9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.079 UTC [common.configtx] addToMap -> DEBU 7ba Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:03.079 UTC [common.configtx] verifyDeltaSet -> DEBU 7bb Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.079 UTC [common.configtx] policyForItem -> DEBU 7bc Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2020-05-20 18:20:03.080 UTC [policies] Manager -> DEBU 7bd Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:20:03.080 UTC [policies] Manager -> DEBU 7be Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7bf Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7c0 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7c1 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7c2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7c3 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2020-05-20 18:20:03.082 UTC [policies] Manager -> DEBU 7c4 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.082 UTC [policies] Manager -> DEBU 7c5 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.082 UTC [policies] Manager -> DEBU 7c6 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2020-05-20 18:20:03.083 UTC [policies] Evaluate -> DEBU 7c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:20:03.083 UTC [cauthdsl] func1 -> DEBU 7c8 0xc000cbb480 gate 1589998803083388700 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:03.083 UTC [cauthdsl] func2 -> DEBU 7c9 0xc000cbb480 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:03.083 UTC [cauthdsl] func2 -> DEBU 7ca 0xc000cbb480 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:03.083 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7cb Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.084 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7cc Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.084 UTC [msp] Validate -> DEBU 7cd MSP Org1MSP validating identity" +orderer0.example.com | "2020-05-20 18:20:03.085 UTC [msp] getCertificationChain -> DEBU 7ce MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:20:03.086 UTC [msp] hasOURole -> DEBU 7cf MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-05-20 18:20:03.086 UTC [msp] getCertificationChain -> DEBU 7d0 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:20:03.086 UTC [cauthdsl] func2 -> DEBU 7d1 0xc000cbb480 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:20:03.086 UTC [msp.identity] Verify -> DEBU 7d2 Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +orderer0.example.com | 00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.|" +orderer0.example.com | "2020-05-20 18:20:03.087 UTC [msp.identity] Verify -> DEBU 7d3 Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +orderer0.example.com | 00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +orderer0.example.com | 00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +orderer0.example.com | 00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +orderer0.example.com | 00000040 b6 a1 df 24 f2 fb af |...$...|" +orderer0.example.com | "2020-05-20 18:20:03.087 UTC [cauthdsl] func2 -> DEBU 7d4 0xc000cbb480 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:20:03.087 UTC [cauthdsl] func1 -> DEBU 7d5 0xc000cbb480 gate 1589998803083388700 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:20:03.087 UTC [policies] Evaluate -> DEBU 7d6 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.087 UTC [policies] Evaluate -> DEBU 7d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.088 UTC [common.configtx] verifyDeltaSet -> DEBU 7d8 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.088 UTC [common.configtx] recurseConfigMap -> DEBU 7d9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.088 UTC [common.configtx] recurseConfigMap -> DEBU 7da Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.089 UTC [common.configtx] recurseConfigMap -> DEBU 7db Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.089 UTC [common.configtx] recurseConfigMap -> DEBU 7dc Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.089 UTC [common.configtx] recurseConfigMap -> DEBU 7dd Setting policy for key Admins to " +orderer0.example.com | "2020-05-20 18:20:03.089 UTC [common.configtx] recurseConfigMap -> DEBU 7de Setting policy for key Readers to " +orderer0.example.com | "2020-05-20 18:20:03.090 UTC [common.configtx] recurseConfigMap -> DEBU 7df Setting policy for key Writers to " +orderer0.example.com | "2020-05-20 18:20:03.090 UTC [common.configtx] recurseConfigMap -> DEBU 7e0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.091 UTC [common.configtx] recurseConfigMap -> DEBU 7e1 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.091 UTC [common.configtx] recurseConfigMap -> DEBU 7e2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.091 UTC [common.configtx] recurseConfigMap -> DEBU 7e3 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e4 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e6 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e7 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org2.example.com | [5b1 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002599450, READY +peer1.org2.example.com | [5b2 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5b3 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [5b4 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [5b5 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer1.org2.example.com | [5b6 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002613200, READY +peer1.org2.example.com | [5b7 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5b8 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [5b9 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [5ba 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [5bb 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer1.org2.example.com | [5bc 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5bd 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [5be 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [5bf 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [5c0 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org2.example.com | [5c2 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5c3 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [5c4 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [5c5 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [5c6 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [5c7 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [5c8 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc000097fc0 env 0xc002f994f0 txn 0 +peer1.org2.example.com | [5c9 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [5ca 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 84ms +peer1.org2.example.com | [5cb 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [5cc 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [5cd 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [5ce 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer1.org2.example.com | [5cf 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [5d0 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [5d1 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [5d2 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer1.org2.example.com | [5d3 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [5d4 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [5d5 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [5d6 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [5d7 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [5d8 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [5d9 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [511 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [512 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [513 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [514 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [515 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org1.example.com | [516 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [517 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [518 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [519 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [51a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [51b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [51c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [51d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [51e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [51f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [520 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [521 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [522 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [523 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [524 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [525 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [526 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [527 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [528 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [529 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [52a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [52b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [52c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [52d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [52e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [52f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [530 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [531 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [532 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [533 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [534 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [535 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [536 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [537 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [538 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [539 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [53a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [53b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [53c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [53d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [53e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [53f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [540 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [541 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [542 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [543 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [544 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [545 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [546 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [547 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [548 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [549 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [54a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [54b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [54c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [54d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [54e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [54f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [550 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [551 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [552 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [553 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [554 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [555 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [556 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [557 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [558 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [559 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [55a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [55b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [55c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [55d 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [55e 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [55f 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [560 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [561 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [562 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [563 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [564 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [565 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [566 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [567 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [568 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [569 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [56a 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [56b 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [56c 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [56d 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [56e 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org1.example.com | [56f 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [570 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [571 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [572 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [573 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [574 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [575 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [576 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 gate 1589998805757367100 evaluation starts +peer0.org1.example.com | [577 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [578 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [579 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [57a 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 principal evaluation fails +peer0.org1.example.com | [57b 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 gate 1589998805757367100 evaluation fails +peer0.org1.example.com | [57c 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [57d 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [57e 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [57f 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 gate 1589998805758241100 evaluation starts +peer0.org1.example.com | [580 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [581 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [582 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 principal matched by identity 0 +peer0.org1.example.com | [583 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +peer0.org1.example.com | 00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +peer0.org1.example.com | [584 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +peer0.org1.example.com | 00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +peer0.org1.example.com | 00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +orderer0.example.com | "2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e8 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7e9 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7ea Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7eb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7ec Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7ed Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7ee Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.094 UTC [common.channelconfig] NewStandardValues -> DEBU 7ef Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:20:03.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f0 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:03.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f1 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:03.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f2 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:03.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f3 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:20:03.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f4 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.095 UTC [common.channelconfig] NewStandardValues -> DEBU 7f5 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:20:03.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f6 Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:20:03.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f7 Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:20:03.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f8 Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:03.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f9 Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:20:03.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fa Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:03.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fb Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.098 UTC [common.channelconfig] NewStandardValues -> DEBU 7fc Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:20:03.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fd Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:20:03.099 UTC [common.channelconfig] NewStandardValues -> DEBU 7fe Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:03.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ff Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:03.100 UTC [common.channelconfig] validateMSP -> DEBU 800 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.100 UTC [msp] newBccspMsp -> DEBU 801 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.100 UTC [msp] New -> DEBU 802 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.100 UTC [msp] Setup -> DEBU 803 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:20:03.101 UTC [msp.identity] newIdentity -> DEBU 804 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] NewStandardValues -> DEBU 805 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 806 Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 807 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] NewStandardValues -> DEBU 808 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 809 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] NewStandardValues -> DEBU 80a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80b Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] Validate -> DEBU 80c Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [common.channelconfig] validateMSP -> DEBU 80d Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [msp] newBccspMsp -> DEBU 80e Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [msp] New -> DEBU 80f Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [msp] Setup -> DEBU 810 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.103 UTC [msp.identity] newIdentity -> DEBU 811 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [common.channelconfig] NewStandardValues -> DEBU 812 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | 00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +peer0.org1.example.com | 00000040 1f 39 c2 0b 9a b3 5c |.9....\| +peer0.org1.example.com | [585 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [586 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 gate 1589998805758241100 evaluation succeeds +peer0.org1.example.com | [587 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [588 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [589 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [58a 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [58b 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [58c 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [58d 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [58e 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org1.example.com | [58f 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [590 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [591 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [592 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [593 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [594 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [595 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [596 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [597 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 61ms +peer0.org1.example.com | [598 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [599 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [59a 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [59b 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer0.org1.example.com | [59c 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [59d 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [59e 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [59f 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org1.example.com | [5a0 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [5a1 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [5a2 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [5a3 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [5a4 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [5a5 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [5a6 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [51e 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [51f 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [520 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org2.example.com | [521 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [522 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [523 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [524 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [525 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [526 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [527 05-20 18:20:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [528 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0004adc90, READY +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 813 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [common.channelconfig] NewStandardValues -> DEBU 814 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 815 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [common.channelconfig] Validate -> DEBU 816 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [common.channelconfig] validateMSP -> DEBU 817 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [msp] newBccspMsp -> DEBU 818 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [msp] New -> DEBU 819 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.105 UTC [msp] Setup -> DEBU 81a Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.106 UTC [msp.identity] newIdentity -> DEBU 81b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [msp] Setup -> DEBU 81c Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [msp] Setup -> DEBU 81d MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 81e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 81f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 820 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 821 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 822 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 823 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 824 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 825 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 826 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 827 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 828 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 829 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82a Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82b Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] GetPolicy -> DEBU 82c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82d Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82e Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82f Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 830 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [policies] GetPolicy -> DEBU 831 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 832 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 833 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 834 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 835 Proposed new policy Readers for Channel" +peer1.org1.example.com | [777 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [5da 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 836 Adding to config map: [Group] /Channel" +peer0.org2.example.com | [529 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [5a7 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [778 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [779 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [77a 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [77b 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0038dbe40)} +peer1.org2.example.com | [5c1 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | [5a8 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [52b 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [52a 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [52c 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer1.org1.example.com | [77c 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [5a9 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [77d 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [5aa 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [52d 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 837 Adding to config map: [Group] /Channel/Orderer" +peer1.org1.example.com | [77e 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [5db 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org1.example.com | [5ab 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003353780)} +peer0.org2.example.com | [52f 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [530 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002849080)} +peer1.org1.example.com | [77f 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer1.org2.example.com | [5dc 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [5ac 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [531 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [780 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 838 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [5df 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [5ad 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [532 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [781 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 839 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org2.example.com | [5e0 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [5ae 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [533 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [782 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [5e1 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002977000)} +peer0.org1.example.com | [5af 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer0.org2.example.com | [52e 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer1.org1.example.com | [783 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org2.example.com | [5e2 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [5b0 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer0.org2.example.com | [534 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org1.example.com | [784 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org2.example.com | [5e3 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [5b1 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer0.org2.example.com | [536 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org1.example.com | [785 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83d Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org2.example.com | [5e4 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [5b2 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0030cdac0 env 0xc0032632c0 txn 0 +peer0.org2.example.com | [537 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org1.example.com | [786 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org2.example.com | [5e5 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org1.example.com | [5b3 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer0.org2.example.com | [535 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU 83f Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 840 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org2.example.com | [5e6 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org2.example.com | [538 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org1.example.com | [745 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 841 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org2.example.com | [5e7 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org1.example.com | [5b4 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xa6, 0xe9, 0x70, 0x63, 0xe3, 0xe8, 0x98, 0x1e, 0x14, 0xfd, 0x2a, 0x6f, 0x3d, 0xd9, 0x24, 0x28, 0x30, 0xda, 0x1, 0x2c, 0xc0, 0x6d, 0x3f, 0xca, 0x43, 0xa9, 0xc8, 0x4, 0x6b, 0x7f, 0xa7, 0x8c} txOffsets= +peer0.org2.example.com | [539 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xa6, 0xe9, 0x70, 0x63, 0xe3, 0xe8, 0x98, 0x1e, 0x14, 0xfd, 0x2a, 0x6f, 0x3d, 0xd9, 0x24, 0x28, 0x30, 0xda, 0x1, 0x2c, 0xc0, 0x6d, 0x3f, 0xca, 0x43, 0xa9, 0xc8, 0x4, 0x6b, 0x7f, 0xa7, 0x8c} txOffsets= +peer1.org1.example.com | [788 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 842 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org2.example.com | [5dd 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | txId=5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d locPointer=offset=71, bytesLength=27137 +peer1.org1.example.com | [789 05-20 18:20:06.06 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer0.org2.example.com | txId=5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d locPointer=offset=71, bytesLength=27137 +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 843 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | ] +peer1.org1.example.com | [78a 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer0.org2.example.com | ] +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 844 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | [5b5 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to txid-index +peer1.org2.example.com | [5de 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 8e 1a ba e3 75 68 f5 ea f3 10 fd |0D. .....uh.....| +peer1.org1.example.com | [78b 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer0.org2.example.com | [53a 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to txid-index +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 845 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | [5b6 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx number:[0] ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to blockNumTranNum index +peer1.org2.example.com | 00000010 45 b1 d2 bc 08 ca 1f 55 52 e5 ca dc c5 b2 1d ca |E......UR.......| +peer1.org1.example.com | [78c 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [53b 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx number:[0] ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to blockNumTranNum index +peer1.org2.example.com | 00000020 04 0c db 8a 02 20 0e 24 b6 83 31 9c cb 50 64 e2 |..... .$..1..Pd.| +peer0.org1.example.com | [5b7 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56676], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org1.example.com | [78d 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org2.example.com | [53d 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [5b8 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer0.org1.example.com | [5b9 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer0.org2.example.com | [53e 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:34558 disconnected +peer0.org1.example.com | [5ba 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer0.org2.example.com | [53f 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:34558 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=412.2966ms +peer1.org1.example.com | [78e 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | 00000030 25 5b 44 ba 71 6a 4a 5b 3a 67 78 6e b9 ed 64 8a |%[D.qjJ[:gxn..d.| +peer0.org1.example.com | [5bb 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +orderer0.example.com | "2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 846 Adding to config map: [Group] /Channel/Application" +peer0.org2.example.com | [53c 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [78f 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xf5, 0x87, 0x9d, 0xf3, 0xcd, 0xbf, 0xbf, 0x43, 0x96, 0xe2, 0xb0, 0xb9, 0x62, 0xaf, 0x50, 0x91, 0xe3, 0xeb, 0x80, 0x22, 0x57, 0x52, 0xd1, 0xfd, 0x79, 0x4c, 0xe4, 0xfe, 0xe5, 0xa7, 0x26, 0x2a} txOffsets= +peer1.org1.example.com | txId=11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0 locPointer=offset=71, bytesLength=27141 +peer0.org1.example.com | [5bc 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [540 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | ] +orderer0.example.com | "2020-05-20 18:20:03.110 UTC [common.configtx] addToMap -> DEBU 847 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | [5bd 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | 00000040 2c 9d 99 c9 91 3f |,....?| +peer0.org2.example.com | [541 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [790 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56747, bytesLength=27141] for tx ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to txid-index +peer0.org1.example.com | [5be 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [5e8 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [542 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [791 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56747, bytesLength=27141] for tx number:[0] ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to blockNumTranNum index +peer0.org1.example.com | [5bf 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +orderer0.example.com | "2020-05-20 18:20:03.110 UTC [common.configtx] addToMap -> DEBU 848 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org2.example.com | [5e9 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | [792 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84881], isChainEmpty=[false], lastBlockNumber=[2] +peer0.org1.example.com | [5c0 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [5c1 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [793 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer0.org1.example.com | [5c2 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | "2020-05-20 18:20:03.110 UTC [common.configtx] addToMap -> DEBU 849 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | [5ea 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161013 +peer1.org1.example.com | [794 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003abe300, READY +peer0.org1.example.com | [5c3 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | [795 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer0.org1.example.com | [5c4 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | [796 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer1.org1.example.com | [797 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [798 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [5c5 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | [799 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [5ed 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5815C23487EADFE5EBC73FC1EFED853D08981FF54D0F16DCCAE45E69D8C1F64A +peer0.org1.example.com | [5c6 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +orderer0.example.com | "2020-05-20 18:20:03.110 UTC [common.configtx] addToMap -> DEBU 84a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | [79a 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [5eb 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [5c7 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [79b 05-20 18:20:06.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [5ec 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org1.example.com | [5c8 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | [79c 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [79d 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org1.example.com | [5c9 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 29ms (state_validation=1ms block_and_pvtdata_commit=21ms state_commit=4ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [79e 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org1.example.com | [5ca 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [5cb 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8EB97EEBEEFB38816...096D8DADEA4206176416CB532A020802 +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84d Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org1.example.com | [7a0 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org1.example.com | [5cc 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 86347A966D89593B6686FD01C5C368E5FE69B8666FBB32AE8F4943EC7943B307 +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [543 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [544 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [79f 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [5cd 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer0.org2.example.com | [545 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [7a1 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org2.example.com | [5ee 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | [5ce 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer0.org2.example.com | [546 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7a2 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [7a3 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer0.org2.example.com | [547 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [7a4 05-20 18:20:06.09 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [7a5 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer0.org1.example.com | [5cf 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer0.org2.example.com | [548 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5f0 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [7a6 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer0.org1.example.com | [5d0 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org2.example.com | [549 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5f1 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [7a7 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [5d1 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 850 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [54a 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5ef 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7a8 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer0.org1.example.com | [5d2 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 851 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [54b 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5f2 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xf5, 0x87, 0x9d, 0xf3, 0xcd, 0xbf, 0xbf, 0x43, 0x96, 0xe2, 0xb0, 0xb9, 0x62, 0xaf, 0x50, 0x91, 0xe3, 0xeb, 0x80, 0x22, 0x57, 0x52, 0xd1, 0xfd, 0x79, 0x4c, 0xe4, 0xfe, 0xe5, 0xa7, 0x26, 0x2a} txOffsets= +peer1.org1.example.com | [7a9 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5d3 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003353a40 env 0xc0035cc190 txn 0 +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 852 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [54c 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | txId=11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0 locPointer=offset=71, bytesLength=27141 +peer1.org1.example.com | [7aa 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org1.example.com | [5d4 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0035cc190 +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 853 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | [54d 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | ] +peer1.org1.example.com | [7ab 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 38ms (state_validation=2ms block_and_pvtdata_commit=16ms state_commit=15ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org1.example.com | [5d5 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 854 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org2.example.com | [54e 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [5f4 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56747, bytesLength=27141] for tx ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to txid-index +peer1.org1.example.com | [7ac 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [5d6 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 855 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | [54f 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef990 gate 1589998806361299100 evaluation starts +peer1.org2.example.com | [5f5 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56747, bytesLength=27141] for tx number:[0] ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to blockNumTranNum index +peer1.org1.example.com | [7ad 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408D09590EEBFEFB38816...387B0008A61A99B98BA4E6D12A020803 +peer0.org1.example.com | [5d7 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU begin +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 856 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org2.example.com | [550 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef990 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5f3 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7ae 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6B90D9CAAECBC37D3E0203708529D47A853F6019045C5CEB922350B66FADB521 +peer0.org1.example.com | [5d8 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org2.example.com | [551 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef990 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [5f6 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [5d9 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7af 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org2.example.com | [552 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [5da 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [7b0 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org2.example.com | [553 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef990 principal evaluation fails +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org2.example.com | [557 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef990 gate 1589998806361299100 evaluation fails +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [7b1 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | "2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Value] /Channel/Capabilities" +peer0.org2.example.com | [558 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | [7b2 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org2.example.com | [559 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | [7b3 05-20 18:20:06.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org2.example.com | [55a 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | [7b4 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Value] /Channel/Consortium" +peer0.org2.example.com | [55b 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025860c0 gate 1589998806364406300 evaluation starts +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | [7b5 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Policy] /Channel/Writers" +peer0.org2.example.com | [55c 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025860c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | [7b6 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Policy] /Channel/Admins" +peer0.org2.example.com | [55d 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025860c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | [7b7 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Policy] /Channel/Readers" +peer0.org2.example.com | [55e 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [7b8 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | [55f 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [7b9 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org2.example.com | [560 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [561 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025860c0 principal matched by identity 0 +peer0.org2.example.com | [562 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | [563 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 41 f6 57 b6 47 e6 17 c5 17 ad |0E.!..A.W.G.....| +peer1.org1.example.com | [7ba 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | 00000010 09 52 fe 51 88 57 36 f6 b8 93 bb c5 43 d7 79 59 |.R.Q.W6.....C.yY| +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [common.channelconfig] LogSanityChecks -> DEBU 862 As expected, current configuration has policy '/Channel/Readers'" +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | [7bb 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5db 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | 00000020 11 a9 42 db 06 02 20 79 02 2a b6 11 c0 4e 59 6d |..B... y.*...NYm| +peer1.org1.example.com | [7bc 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b53100 gate 1589998806113413400 evaluation starts +peer0.org1.example.com | [5dc 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | 00000030 2d fd b4 19 4b 12 56 15 3f 21 ca a6 9c 1e af 98 |-...K.V.?!......| +peer1.org1.example.com | [7bd 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b53100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5dd 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [common.channelconfig] LogSanityChecks -> DEBU 863 As expected, current configuration has policy '/Channel/Writers'" +peer0.org2.example.com | 00000040 42 a3 82 26 d6 90 89 |B..&...| +peer1.org1.example.com | [7be 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b53100 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5de 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 864 Manager Channel looking up path [Application]" +peer0.org2.example.com | [564 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025860c0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 865 Manager Channel has managers Orderer" +peer0.org1.example.com | [5df 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 37 bb 71 60 be 2a 5d cc c1 22 4e 4f 27 d1 58 |<7.q`.*].."NO'.X| +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [565 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025860c0 gate 1589998806364406300 evaluation succeeds +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 866 Manager Channel has managers Application" +peer1.org1.example.com | [7bf 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | 00000010 61 69 d0 5c 2e e4 d9 b0 e3 9c e2 21 7e 90 49 40 |ai.\.......!~.I@| +peer0.org2.example.com | [566 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [5f8 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:10169697798246393482 tag:EMPTY mem_req:]\013\031\307TX\207\2713\002 qS|\016c\247gu\237\316\234-\257|[\251\232\274\014;z2}\316\355`\033U\322\300v\323" > > > , Envelope: 283 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 867 Manager Channel/Application looking up path []" +peer1.org1.example.com | [7c0 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [5e0 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 60 c6 0c 5d 48 6b 58 d3 55 d6 |0E.!..`..]HkX.U.| +peer0.org2.example.com | [567 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [5f9 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +orderer0.example.com | "2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 868 Manager Channel/Application has managers Org2MSP" +peer1.org1.example.com | [7c1 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | 00000010 55 aa 91 32 59 e9 96 66 be 0b b5 dc d7 6d 1e cd |U..2Y..f.....m..| +peer0.org2.example.com | [568 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [5fa 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [7c2 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b53100 principal matched by identity 0 +peer0.org1.example.com | 00000020 f6 0e 3e eb ae 02 20 0b 84 cd 3c d4 a3 21 14 67 |..>... ...<..!.g| +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 869 Manager Channel/Application has managers Org1MSP" +peer0.org2.example.com | [569 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [7c3 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000030 cc 8e d7 67 bd 5d 55 59 2b de 4a 52 0f f7 5f bf |...g.]UY+.JR.._.| +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [common.channelconfig] LogSanityChecks -> DEBU 86a As expected, current configuration has policy '/Channel/Application/Readers'" +peer1.org2.example.com | [5fb 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:10169697798246393482 tag:EMPTY mem_req:]\013\031\307TX\207\2713\002 qS|\016c\247gu\237\316\234-\257|[\251\232\274\014;z2}\316\355`\033U\322\300v\323" > > > , Envelope: 283 bytes, Signature: 0 bytes +peer0.org2.example.com | [56a 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | 00000040 23 c2 cc 10 3c 4b c5 |#... DEBU 86b As expected, current configuration has policy '/Channel/Application/Writers'" +peer1.org2.example.com | [5fd 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [56b 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7c4 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1e 0c 06 b5 9f df 09 62 f0 8f 43 |0D. r.......b..C| +peer0.org1.example.com | [5e1 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [common.channelconfig] LogSanityChecks -> DEBU 86c As expected, current configuration has policy '/Channel/Application/Admins'" +peer1.org2.example.com | [5fc 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [56c 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 73 98 c9 b5 3d e2 a0 63 eb 41 49 47 46 1d 65 2d |s...=..c.AIGF.e-| +peer0.org1.example.com | [5e2 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00362c000, header channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 86d Manager Channel looking up path [Orderer]" +peer1.org2.example.com | [5fe 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [56d 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816100D +peer1.org1.example.com | 00000020 3b d8 a0 50 02 20 05 13 67 53 1e 41 0d ee 3d a1 |;..P. ..gS.A..=.| +peer0.org1.example.com | [5e3 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 86e Manager Channel has managers Orderer" +peer1.org2.example.com | [5ff 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [56e 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 195DE0D31DFD9FE7473A1060815A101E57BC60162815434364B5B276FCA9946F +peer1.org1.example.com | 00000030 ed 0d 9b 17 2e 59 b5 a9 03 b5 5b d7 dc 1a d7 b7 |.....Y....[.....| +peer0.org1.example.com | [5e4 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 86f Manager Channel has managers Application" +peer1.org2.example.com | [600 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [56f 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000040 71 d4 5c 6c 5a bf |q.\lZ.| +peer0.org1.example.com | [5e5 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 870 Manager Channel/Orderer looking up path []" +peer1.org2.example.com | [601 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [570 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [7c5 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b53100 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5e6 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 871 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.113 UTC [common.channelconfig] LogSanityChecks -> DEBU 872 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org2.example.com | [571 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [7c6 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b53100 gate 1589998806113413400 evaluation succeeds +peer0.org1.example.com | [5e7 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [common.channelconfig] LogSanityChecks -> DEBU 873 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org2.example.com | [572 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7c7 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7c8 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7c9 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [7ca 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [7cb 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [7cc 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7cd 05-20 18:20:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [7ce 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7cf 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8060432034469243681, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer1.org1.example.com | [7d0 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 8060432034469243681, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org1.example.com | [5e8 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [5e9 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [5ea 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7d1 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5eb 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [5ec 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [5ed 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [5ee 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [5ef 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [5f0 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5f1 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [5f2 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [5f3 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [5f4 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer0.org2.example.com | [573 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [7d2 05-20 18:20:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8060432034469243681, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer1.org1.example.com | [7d3 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [5f5 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [602 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [574 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:3336462012843755474 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [common.channelconfig] LogSanityChecks -> DEBU 874 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer1.org1.example.com | [7d4 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e e1 3c 74 a6 8b 07 1d 38 c5 35 da 0d db 11 9c |>. DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [603 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [575 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:3336462012843755474 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [common.channelconfig] LogSanityChecks -> DEBU 875 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer1.org1.example.com | 00000010 f9 95 57 94 1c 0d f8 ba cf 87 8e a7 d3 e8 90 1b |..W.............| +peer0.org1.example.com | [5f7 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [604 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [576 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [common.capabilities] Supported -> DEBU 876 Orderer capability V1_4_2 is supported and is enabled" +peer1.org1.example.com | [7d5 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ad b4 b4 8a c4 89 d7 65 8f e3 |0E.!.........e..| +peer0.org1.example.com | [5f8 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [605 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ba90 gate 1589998806818230400 evaluation starts +peer0.org2.example.com | [554 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [common.capabilities] Supported -> DEBU 877 Channel capability V1_4_3 is supported and is enabled" +peer1.org1.example.com | 00000010 14 ac 36 09 8b e1 3a 52 3b a7 7a 17 f7 03 b6 7c |..6...:R;.z....|| +peer0.org1.example.com | [5f9 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [606 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ba90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [555 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [msp] GetDefaultSigningIdentity -> DEBU 878 Obtaining default signing identity" +peer1.org1.example.com | 00000020 14 4a c3 48 fe 02 20 10 fd 31 39 00 32 79 56 d0 |.J.H.. ..19.2yV.| +peer0.org1.example.com | [5fa 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [607 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ba90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [556 05-20 18:20:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56680], isChainEmpty=[false], lastBlockNumber=[1] +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [msp] GetDefaultSigningIdentity -> DEBU 879 Obtaining default signing identity" +peer1.org1.example.com | 00000030 c7 71 61 8b 4a ef 34 f7 20 66 f1 ae 3f 73 0f a4 |.qa.J.4. f..?s..| +peer0.org1.example.com | [5fb 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org2.example.com | [608 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ba90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [577 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [msp.identity] Sign -> DEBU 87a Sign: plaintext: 0AEA060A1B08011A0608D3E995F60522...C66E733554218309DC4ACB757D7C067C " +peer1.org1.example.com | 00000040 83 ee 02 33 57 83 98 |...3W..| +peer0.org1.example.com | [5fc 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [578 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [609 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ba90 principal evaluation fails +orderer0.example.com | "2020-05-20 18:20:03.114 UTC [msp.identity] Sign -> DEBU 87b Sign: digest: 11B8814557B376228FE31A03C3912F867E72D9F3AA71799765BC309D33CCE612 " +peer1.org1.example.com | [7d6 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [5fd 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [57a 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [60a 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ba90 gate 1589998806818230400 evaluation fails +orderer0.example.com | "2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 87c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer1.org1.example.com | [7d7 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1589998788834158300 17 {} [] 0} +peer0.org1.example.com | [5fe 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer0.org2.example.com | [57b 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [60b 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 87d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [7d8 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [57c 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [5ff 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org1.example.com | [600 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [601 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [7d9 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [57d 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025caf90, CONNECTING +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | [7da 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 87e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer0.org2.example.com | [579 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [7db 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b f5 53 4b 2b 5c a3 ce 51 42 40 3d 86 8f b8 08 |..SK+\..QB@=....| +peer1.org1.example.com | 00000010 59 0d bd 85 cc 10 dc 8b 39 34 4b 54 9e e7 db 57 |Y.......94KT...W| +peer0.org2.example.com | [57e 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +orderer0.example.com | "2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 87f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | [7dc 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 ae 13 b3 e6 bb 41 99 e4 66 2c |0E.!.......A..f,| +peer0.org2.example.com | [57f 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [60c 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 880 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | 00000010 95 b1 9c 9c f6 6e 4a f6 e8 be 8e 8e 07 e1 3f 03 |.....nJ.......?.| +peer0.org2.example.com | [580 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | 00000020 07 06 03 63 84 02 20 66 04 d0 d7 92 64 9a 95 5f |...c.. f....d.._| +peer0.org2.example.com | [581 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org1.example.com | 00000030 15 58 4f 3e dd 8f 36 90 b2 c0 f7 4c 3a 60 41 e7 |.XO>..6....L:`A.| +peer0.org2.example.com | [582 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | [60d 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:20:03.115 UTC [msp] DeserializeIdentity -> DEBU 881 Obtaining identity" +peer1.org1.example.com | 00000040 81 07 06 cc 98 90 a8 |.......| +peer0.org2.example.com | [583 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | [60e 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002846020 gate 1589998806818550100 evaluation starts +orderer0.example.com | "2020-05-20 18:20:03.115 UTC [msp.identity] newIdentity -> DEBU 882 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [7dd 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [584 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | [60f 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002846020 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [585 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org1.example.com | [7de 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | [610 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002846020 processing identity 0 with bytes of 115a110 +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [586 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org1.example.com | [7df 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [611 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [7e0 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [602 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 gate 1589998805811037200 evaluation starts +peer1.org2.example.com | [612 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org2.example.com | [587 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org1.example.com | [7e1 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [603 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [613 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [588 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [7e2 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [604 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [614 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002846020 principal matched by identity 0 +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org2.example.com | [589 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org1.example.com | [7e3 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [605 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [615 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org2.example.com | [58a 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org1.example.com | [7e4 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [606 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org2.example.com | [58b 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [7e5 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [607 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [616 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 07 43 e6 c9 9a a7 cb 6a 1a 57 |0E.!...C.....j.W| +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org2.example.com | [58c 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org1.example.com | [7e6 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [608 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | 00000010 d9 06 f0 26 ff 5b d9 bf ac d2 15 33 bf 66 55 5c |...&.[.....3.fU\| +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | [58d 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 48ms (state_validation=13ms block_and_pvtdata_commit=28ms state_commit=4ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org1.example.com | [7e7 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [609 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | 00000020 35 05 5b 39 ae 02 20 2a 8f c2 73 2e 35 fa 62 5c |5.[9.. *..s.5.b\| +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | [7e8 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003299e30 gate 1589998806133987400 evaluation starts +peer0.org1.example.com | [60a 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | 00000030 d8 39 0d 98 fa 1b 14 dc 33 f5 56 47 57 5d 56 a4 |.9......3.VGW]V.| +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | [58e 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [60b 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 principal matched by identity 0 +peer1.org2.example.com | 00000040 bd fc ce a4 0c 75 dd |.....u.| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [7e9 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003299e30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [58f 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408CC93F4F0C0EFB38816...9C09DCBB6042B0C019B601802A020802 +peer0.org1.example.com | [60c 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +peer1.org2.example.com | [617 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002846020 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [cauthdsl] func1 -> DEBU 883 0xc0009d8b20 gate 1589998803115929500 evaluation starts" +peer1.org1.example.com | [7ea 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003299e30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [590 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC401C282369CE8245995FF3B614B35870061C21FA2DD5D7E522A3A614890BB1 +peer0.org1.example.com | 00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D| +peer1.org2.example.com | [618 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002846020 gate 1589998806818550100 evaluation succeeds +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [cauthdsl] func2 -> DEBU 884 0xc0009d8b20 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [7eb 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003299e30 principal matched by identity 0 +peer0.org2.example.com | [591 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer0.org1.example.com | [60d 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +peer1.org2.example.com | [619 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [cauthdsl] func2 -> DEBU 885 0xc0009d8b20 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [7ec 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 23 57 95 6b d7 8b e3 45 12 ee ef 02 4d 59 c0 |.#W.k...E....MY.| +peer0.org2.example.com | [592 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer0.org1.example.com | 00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +peer1.org2.example.com | [61a 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 886 Checking if identity satisfies MEMBER role for OrdererMSP" +peer1.org1.example.com | 00000010 21 9c 88 f7 69 25 2e f6 47 8b 5b 3e a4 50 a7 45 |!...i%..G.[>.P.E| +peer0.org2.example.com | [593 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer0.org1.example.com | 00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +peer1.org2.example.com | [61b 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [msp] Validate -> DEBU 887 MSP OrdererMSP validating identity" +peer1.org1.example.com | [7ed 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 8c ee 60 61 00 08 aa 89 78 a3 b4 |0D. ...`a....x..| +peer0.org1.example.com | 00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +peer1.org2.example.com | [61c 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [594 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [msp] getCertificationChain -> DEBU 888 MSP OrdererMSP getting certification chain" +peer1.org1.example.com | 00000010 eb 15 c2 43 72 5e c6 1d d3 d9 a6 89 1a 3f b9 d5 |...Cr^.......?..| +peer0.org1.example.com | 00000040 c1 0e dd 4e f6 78 ea |...N.x.| +peer0.org1.example.com | [60e 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [595 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [cauthdsl] func2 -> DEBU 889 0xc0009d8b20 principal matched by identity 0" +peer1.org1.example.com | 00000020 3e 3c e9 6e 02 20 7e 78 79 7c de 4a 02 d5 05 8f |><.n. ~xy|.J....| +peer0.org1.example.com | [60f 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 gate 1589998805811037200 evaluation succeeds +peer0.org2.example.com | [596 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [61d 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [msp.identity] Verify -> DEBU 88a Verify: digest = 00000000 11 b8 81 45 57 b3 76 22 8f e3 1a 03 c3 91 2f 86 |...EW.v"....../.| +peer1.org1.example.com | 00000030 29 ef ad 69 d8 40 1a 5c 46 bd 96 8f f1 e9 44 43 |)..i.@.\F.....DC| +peer0.org1.example.com | [610 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [597 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002849ec0 env 0xc0024e4cd0 txn 0 +peer1.org2.example.com | [61e 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 7e 72 d9 f3 aa 71 79 97 65 bc 30 9d 33 cc e6 12 |~r...qy.e.0.3...|" +peer1.org1.example.com | 00000040 ef ad a7 74 0c c8 |...t..| +peer0.org1.example.com | [611 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [598 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0024e4cd0 +peer1.org2.example.com | [61f 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:20:03.116 UTC [msp.identity] Verify -> DEBU 88b Verify: sig = 00000000 30 45 02 21 00 a2 a0 2b cc a7 6e 38 18 f4 da de |0E.!...+..n8....| +peer1.org1.example.com | [7ee 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003299e30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [612 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [599 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +peer1.org2.example.com | [620 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161014 +peer1.org1.example.com | [7ef 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003299e30 gate 1589998806133987400 evaluation succeeds +peer0.org1.example.com | [613 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [59a 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [621 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C542F3D76455FCB2585A09384BDBCE02C437A5C15B662ED6B9149D36D8D1E33C +peer1.org1.example.com | [7f0 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000010 55 a1 da 90 8d 69 4c 45 cd 0b c0 36 18 d5 5a 21 |U....iLE...6..Z!| +peer0.org1.example.com | [614 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [59b 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [622 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [7f1 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000020 fa 5f 93 bc 1f 02 20 5b 9e 95 84 5c e6 2b cc d1 |._.... [...\.+..| +peer0.org1.example.com | [615 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [59c 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [623 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [7f2 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | 00000030 f5 6c a3 3f bd 2e 63 05 ad db bb 57 a1 1c cd 2d |.l.?..c....W...-| +peer0.org1.example.com | [616 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:07.813Z grpc.peer_address=172.18.0.8:57948 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=596µs +peer0.org2.example.com | [59d 05-20 18:20:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7f3 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [7f4 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7f5 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer0.org1.example.com | [617 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [7f6 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [618 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org2.example.com | [59e 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [624 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer0.example.com | 00000040 85 68 ef ee ee 6d 09 |.h...m.|" +peer1.org1.example.com | [7f7 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [619 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [625 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [cauthdsl] func2 -> DEBU 88c 0xc0009d8b20 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [7f8 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [61a 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:57948 +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [626 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [cauthdsl] func1 -> DEBU 88d 0xc0009d8b20 gate 1589998803115929500 evaluation succeeds" +peer1.org1.example.com | [7f9 05-20 18:20:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [61b 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [627 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 88e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | [7fa 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:09.662Z grpc.peer_address=172.18.0.7:33352 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=107.1µs +peer0.org1.example.com | [61c 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | [628 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 88f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | [61d 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57948 +peer1.org1.example.com | [7fb 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [629 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 890 Signature set satisfies policy /Channel/Orderer/Writers" +peer1.org1.example.com | [7fc 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | [5f7 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84881], isChainEmpty=[false], lastBlockNumber=[2] +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 891 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer0.org1.example.com | [61e 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer1.org1.example.com | [7fd 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org2.example.com | [62a 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 892 Signature set satisfies policy /Channel/Writers" +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [61f 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 99 a5 6e 71 1d 23 52 88 60 98 67 |0D. j..nq.#R.`.g| +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 893 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org1.example.com | 00000010 0d 0a e6 7c 1c 62 ff 2d 7d 7c d3 e6 86 12 9e 51 |...|.b.-}|.....Q| +peer1.org1.example.com | [7fe 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:33352 +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | [62b 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [orderer.common.msgprocessor] Apply -> DEBU 894 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +peer0.org1.example.com | 00000020 77 4f b9 9f 02 20 37 61 d0 a9 d5 bd 40 89 8c d1 |wO... 7a....@...| +peer1.org1.example.com | [7ff 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:33352 +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | [62c 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +orderer0.example.com | "2020-05-20 18:20:03.117 UTC [common.channelconfig] NewStandardValues -> DEBU 895 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | 00000030 ac 1f 2b 7e 96 7f ca fd 54 92 8e b7 9a b7 39 7b |..+~....T.....9{| +peer1.org1.example.com | [800 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | [62d 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 896 Processing field: HashingAlgorithm" +peer0.org1.example.com | 00000040 e3 59 b7 2d 63 e5 |.Y.-c.| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | [630 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 897 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | [620 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57948 +peer1.org1.example.com | [801 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 77 30 fa 39 0d 7b 0a 0f 84 06 31 |0D. .w0.9.{....1| +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | [631 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 898 Processing field: OrdererAddresses" +peer0.org1.example.com | [621 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57948 +peer1.org1.example.com | 00000010 16 41 a4 ad e3 1f 69 3c ae 2d 2c 2b 31 63 c4 ee |.A....i<.-,+1c..| +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [62e 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer1.org2.example.com | [632 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer0.org1.example.com | [622 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | 00000020 26 ff 67 55 02 20 5b 5b af 00 1f b5 f0 b4 a5 28 |&.gU. [[.......(| +peer0.org2.example.com | [59f 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [623 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:57898 disconnected +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 899 Processing field: Consortium" +peer1.org1.example.com | 00000030 51 f0 28 93 05 34 5f dd ea 44 cb 74 ed 4b da 8f |Q.(..4_..D.t.K..| +peer0.org2.example.com | [5a0 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [633 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [624 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:57898 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=16.4915915s +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89a Processing field: Capabilities" +peer1.org1.example.com | 00000040 4a 09 27 a7 3f ab |J.'.?.| +peer0.org2.example.com | [5a1 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [635 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [625 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] NewStandardValues -> DEBU 89b Initializing protos for *channelconfig.ApplicationProtos" +peer1.org1.example.com | [802 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:33352 +peer0.org2.example.com | [5a2 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [636 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [626 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:57948 disconnected +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: ACLs" +peer1.org1.example.com | [803 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:33352 +peer0.org2.example.com | [5a3 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 37 bb 71 60 be 2a 5d cc c1 22 4e 4f 27 d1 58 |<7.q`.*].."NO'.X| +peer1.org2.example.com | [637 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [627 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:15.816Z grpc.peer_address=172.18.0.8:57948 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.1346ms +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: Capabilities" +peer1.org1.example.com | [804 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 61 69 d0 5c 2e e4 d9 b0 e3 9c e2 21 7e 90 49 40 |ai.\.......!~.I@| +peer1.org2.example.com | [634 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [628 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] NewStandardValues -> DEBU 89e Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org1.example.com | [805 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5a4 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 60 c6 0c 5d 48 6b 58 d3 55 d6 |0E.!..`..]HkX.U.| +peer0.org1.example.com | [629 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [638 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89f Processing field: AnchorPeers" +peer1.org1.example.com | [806 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 55 aa 91 32 59 e9 96 66 be 0b b5 dc d7 6d 1e cd |U..2Y..f.....m..| +peer0.org1.example.com | [62a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [639 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +orderer0.example.com | "2020-05-20 18:20:03.118 UTC [common.channelconfig] NewStandardValues -> DEBU 8a0 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [807 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 f6 0e 3e eb ae 02 20 0b 84 cd 3c d4 a3 21 14 67 |..>... ...<..!.g| +peer0.org1.example.com | [62b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [63b 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +orderer0.example.com | "2020-05-20 18:20:03.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a1 Processing field: MSP" +peer1.org1.example.com | [808 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | 00000030 cc 8e d7 67 bd 5d 55 59 2b de 4a 52 0f f7 5f bf |...g.]UY+.JR.._.| +peer0.org1.example.com | [62c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [63c 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +orderer0.example.com | "2020-05-20 18:20:03.119 UTC [common.channelconfig] Validate -> DEBU 8a2 Anchor peers for org Org2MSP are " +peer1.org1.example.com | [809 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 23 c2 cc 10 3c 4b c5 |#... DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [62f 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | "2020-05-20 18:20:03.119 UTC [common.channelconfig] validateMSP -> DEBU 8a3 Setting up MSP for org Org2MSP" +peer1.org1.example.com | [80a 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [5a5 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [62e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [63a 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002847ce0, CONNECTING +orderer0.example.com | "2020-05-20 18:20:03.119 UTC [msp] newBccspMsp -> DEBU 8a4 Creating BCCSP-based MSP instance" +peer1.org1.example.com | [80b 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [5a6 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025caf90, READY +peer0.org1.example.com | [62f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [63d 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [63e 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [5a7 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0026d2a80, header channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +peer0.org1.example.com | [630 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [63f 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer1.org1.example.com | [80c 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:20:03.119 UTC [msp] New -> DEBU 8a5 Creating Cache-MSP instance" +peer0.org2.example.com | [5a8 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [631 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [640 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:20:03.119 UTC [msp] Setup -> DEBU 8a6 Setting up MSP instance Org2MSP" +peer0.org2.example.com | [5a9 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [632 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [641 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:20:03.119 UTC [msp.identity] newIdentity -> DEBU 8a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [5aa 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [633 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [642 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [5ab 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org1.example.com | [634 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [643 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002847ce0, READY +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [5ac 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org1.example.com | [635 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [644 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer1.org1.example.com | [80d 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [5ad 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [636 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [645 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [80e 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | [5af 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [637 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [646 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer1.org1.example.com | [80f 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [5b0 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [638 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [639 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [810 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [5b1 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [63a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [811 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [647 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 34ms (state_validation=4ms block_and_pvtdata_commit=18ms state_commit=6ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [63b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [5ae 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | [63d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [63e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [63f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [5b3 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [640 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [64b 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | [64c 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer0.org2.example.com | [5b4 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [641 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | [64a 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [64d 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F8B6E8FEC1EFB38816...A55D1049CA35F5343DC503CE2A020803 +peer0.org2.example.com | [5b6 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [642 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | [64e 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A7E07F3680B3E7901D7E683BF8A7BE8DA00AC4F42AF4A0FDEF807C4143BE670E +peer0.org2.example.com | [5b5 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | [643 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | [64f 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer0.org2.example.com | [5b7 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [644 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | [5b8 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | [645 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | [5b9 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [650 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [646 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | [5ba 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [647 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | [5bb 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [648 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [5bc 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [649 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [814 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0de0 gate 1589998807703790400 evaluation starts +peer1.org2.example.com | [651 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | [5bd 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [64a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [815 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0de0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | [5be 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [64b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [816 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0de0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5bf 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [64c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [817 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [5c0 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663280 gate 1589998806410499800 evaluation starts +peer1.org2.example.com | [652 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 9a 47 f6 a7 53 61 80 74 6a bf |0E.!...G..Sa.tj.| +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [818 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0de0 principal evaluation fails +peer0.org2.example.com | [5c1 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 2b ee ba 8b cc 27 45 0c 73 81 59 a6 67 04 0c ea |+....'E.s.Y.g...| +orderer0.example.com | "2020-05-20 18:20:03.119 UTC [common.channelconfig] NewStandardValues -> DEBU 8a8 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [819 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d0de0 gate 1589998807703790400 evaluation fails +peer0.org2.example.com | [5c2 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [5c3 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663280 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [81a 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [81b 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [5c4 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | 00000020 ac 09 ba 6c 24 02 20 7b e7 58 52 70 73 6b dc 3d |...l$. {.XRpsk.=| +peer1.org1.example.com | [81c 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5c5 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663280 principal evaluation fails +peer0.org2.example.com | [5c6 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a9 Processing field: AnchorPeers" +peer1.org1.example.com | [81d 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1cb0 gate 1589998807704633500 evaluation starts +peer1.org1.example.com | [81e 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5c8 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [common.channelconfig] NewStandardValues -> DEBU 8aa Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | 00000030 84 60 23 63 1d 8b 69 35 9c c1 63 2d 5d 05 47 41 |.`#c..i5..c-].GA| +peer1.org1.example.com | [81f 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1cb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5c9 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ab Processing field: MSP" +peer1.org2.example.com | 00000040 36 42 81 a1 cf f6 95 |6B.....| +peer1.org1.example.com | [820 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [5ca 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [common.channelconfig] Validate -> DEBU 8ac Anchor peers for org Org1MSP are anchor_peers: " +peer1.org2.example.com | [653 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [821 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [5cb 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [common.channelconfig] validateMSP -> DEBU 8ad Setting up MSP for org Org1MSP" +peer1.org2.example.com | [654 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [822 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [5c7 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663280 gate 1589998806410499800 evaluation fails +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [5cc 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | [823 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1cb0 principal matched by identity 0 +peer1.org1.example.com | [824 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [5ce 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [5cd 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [5d0 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [655 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [825 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | [5d1 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [msp] newBccspMsp -> DEBU 8ae Creating BCCSP-based MSP instance" +peer1.org2.example.com | [656 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | [5d2 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002637dd0 gate 1589998806414727600 evaluation starts +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [msp] New -> DEBU 8af Creating Cache-MSP instance" +peer1.org2.example.com | [657 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 10169697798246393482, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 549 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | [5d3 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002637dd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5d4 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002637dd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5d5 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002637dd0 principal matched by identity 0 +peer0.org2.example.com | [5d6 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [5d7 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 98 32 ad e8 79 32 20 65 d5 0d |0E.!...2..y2 e..| +peer0.org2.example.com | 00000010 9c b7 eb c4 12 11 ac ba a5 4b 7a 99 4e 3a 05 fe |.........Kz.N:..| +peer0.org2.example.com | 00000020 59 25 c4 f7 9f 02 20 02 2a 18 15 85 ab d8 72 a6 |Y%.... .*.....r.| +peer0.org2.example.com | 00000030 5b 29 c9 d5 87 e8 98 b9 10 8c 9f a3 c4 40 d7 ac |[)...........@..| +peer0.org2.example.com | 00000040 0c fd 4f 66 87 cc 49 |..Of..I| +peer0.org2.example.com | [5cf 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [5d8 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002637dd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5da 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002637dd0 gate 1589998806414727600 evaluation succeeds +peer0.org2.example.com | [5db 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5dc 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5dd 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5de 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5df 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [5e0 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5d9 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer0.org2.example.com | [5e1 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [5e3 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5e2 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [64d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [64e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [64f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [650 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | [5e4 05-20 18:20:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [5e5 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [msp] Setup -> DEBU 8b0 Setting up MSP instance Org1MSP" +peer0.org1.example.com | [651 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [826 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1cb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [658 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 10169697798246393482, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 549 bytes, Signature: 0 bytes +peer0.org2.example.com | [5e6 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +orderer0.example.com | "2020-05-20 18:20:03.120 UTC [msp.identity] newIdentity -> DEBU 8b1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [652 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [653 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [654 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [655 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [656 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [827 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1cb0 gate 1589998807704633500 evaluation succeeds +peer1.org1.example.com | [828 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [829 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [82a 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [82b 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [82c 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [82d 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [82e 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [82f 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [830 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [831 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [832 05-20 18:20:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [833 05-20 18:20:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org1.example.com | [834 05-20 18:20:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [835 05-20 18:20:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [836 05-20 18:20:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [837 05-20 18:20:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [838 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [839 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [83a 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [83b 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [83c 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [83d 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [83e 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | [5e7 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [659 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [840 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5e8 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [65a 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 10169697798246393482, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 549 bytes, Signature: 0 bytes +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8b2 Initializing protos for *channelconfig.OrdererProtos" +peer1.org1.example.com | [83f 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5e9 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 3336462012843755474, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes +peer1.org2.example.com | [65b 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: ConsensusType" +peer1.org1.example.com | [841 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org2.example.com | [5ea 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org2.example.com | [65c 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 15 c2 34 87 ea df e5 eb c7 3f c1 ef ed 85 3d |X..4......?....=| +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: BatchSize" +peer1.org1.example.com | [843 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org2.example.com | [5eb 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | 00000010 08 98 1f f5 4d 0f 16 dc ca e4 5e 69 d8 c1 f6 4a |....M.....^i...J| +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b5 Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b6 Processing field: KafkaBrokers" +peer0.org2.example.com | [5ec 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [65d 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 49 32 fc cd 8b 16 3a cc 79 f9 |0E.!..I2....:.y.| +peer1.org2.example.com | 00000010 36 93 7e e3 b8 98 26 d6 a3 31 24 72 de 50 07 ad |6.~...&..1$r.P..| +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [657 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [658 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [659 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [65a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [65b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [65c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [65d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [65e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [65f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [660 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [661 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [662 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [663 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [664 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [665 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [666 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [667 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [668 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [669 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [66a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [66b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [66c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [66d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [66e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [66f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [670 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [671 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [672 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [673 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [674 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [675 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [676 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [677 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [678 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [679 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [67a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [67b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [67c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [67d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [67e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [67f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [680 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [681 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [682 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [683 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [684 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [685 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [686 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [687 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b7 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b8 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8b9 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ba Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8bb Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bc Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [common.channelconfig] validateMSP -> DEBU 8bd Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [msp] newBccspMsp -> DEBU 8be Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.121 UTC [msp] New -> DEBU 8bf Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.122 UTC [msp] Setup -> DEBU 8c0 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:20:03.122 UTC [msp.identity] newIdentity -> DEBU 8c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:03.122 UTC [msp] Setup -> DEBU 8c2 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:20:03.122 UTC [msp] Setup -> DEBU 8c3 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:20:03.122 UTC [policies] NewManagerImpl -> DEBU 8c4 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.122 UTC [policies] NewManagerImpl -> DEBU 8c5 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8c6 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8c7 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8c8 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org2.example.com | [5ee 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer0.org2.example.com | [5ef 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org2.example.com | [5f0 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5ed 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 3336462012843755474, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes +peer0.org2.example.com | [5f2 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5f3 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 3336462012843755474, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes +peer0.org2.example.com | [5f4 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [5f5 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 5d e0 d3 1d fd 9f e7 47 3a 10 60 81 5a 10 1e |.]......G:.`.Z..| +peer0.org2.example.com | 00000010 57 bc 60 16 28 15 43 43 64 b5 b2 76 fc a9 94 6f |W.`.(.CCd..v...o| +peer0.org2.example.com | [5f6 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f df b9 40 2a ca b1 23 ed 7d d2 07 |0D. ?..@*..#.}..| +peer0.org2.example.com | 00000010 50 7f c9 ed b1 cd 43 06 f3 9d 5b c2 c4 07 ac 2a |P.....C...[....*| +peer0.org2.example.com | 00000020 a3 29 62 32 02 20 28 82 16 04 72 df ae 90 8c 23 |.)b2. (...r....#| +peer0.org2.example.com | 00000030 b2 b3 12 bc 9c bd ac 66 db 9c 5a 57 71 8e c7 23 |.......f..ZWq..#| +peer0.org2.example.com | 00000040 f9 11 d0 b5 1b 23 |.....#| +peer0.org2.example.com | [5f7 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5f8 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5f9 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5fa 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [5fb 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5fc 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5fd 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [5fe 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [5ff 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [600 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [601 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5f1 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [602 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [603 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [604 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [605 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [606 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663e00 gate 1589998806441990400 evaluation starts +peer0.org2.example.com | [608 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663e00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [609 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663e00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [607 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a840 gate 1589998806442658600 evaluation starts +peer0.org2.example.com | [60a 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a840 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [60b 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a840 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [60c 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org2.example.com | [60e 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org2.example.com | [60f 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [60d 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [610 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a840 principal evaluation fails +peer0.org2.example.com | [611 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a840 gate 1589998806442658600 evaluation fails +peer0.org2.example.com | [612 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [613 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [614 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [615 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b020 gate 1589998806444668600 evaluation starts +peer0.org2.example.com | [616 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [617 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b020 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [618 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [619 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [61a 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [61b 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [61c 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b020 principal matched by identity 0 +peer0.org2.example.com | [61d 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 7b 2d c1 c8 c7 ee 49 60 52 b0 7d b4 af 59 9d |c{-....I`R.}..Y.| +peer0.org2.example.com | 00000010 be ea 24 41 12 7d d2 d2 d6 77 c3 cf c2 a1 a5 57 |..$A.}...w.....W| +peer0.org2.example.com | [61e 05-20 18:20:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 45 4a 9a 6b 52 01 68 dd af 50 3c |0D. YEJ.kR.h..P<| +peer0.org2.example.com | 00000010 e5 58 98 39 4e ea c1 06 0b de 04 57 67 c9 7e 60 |.X.9N......Wg.~`| +peer0.org2.example.com | 00000020 ac 5c 8e a5 02 20 52 be 0a 1f 21 4d 7c 01 ad 6c |.\... R...!M|..l| +peer0.org2.example.com | 00000030 28 ed 0a 3c ba e9 1a 1b 46 c1 7b 59 ac f4 c7 1c |(..<....F.{Y....| +peer0.org2.example.com | 00000040 38 e4 e2 20 67 37 |8.. g7| +peer0.org2.example.com | [61f 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org2.example.com | [620 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [621 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b020 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [622 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b020 gate 1589998806444668600 evaluation succeeds +peer0.org2.example.com | [623 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [624 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [625 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [626 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [627 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663e00 principal matched by identity 0 +peer0.org2.example.com | [628 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [62a 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1589998788301091000, 21 but got ts: inc_num:1589998788301091000 seq_num:11 +peer0.org2.example.com | [629 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +peer0.org2.example.com | 00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D| +peer0.org2.example.com | [62c 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +peer0.org2.example.com | 00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +peer0.org2.example.com | 00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +peer0.org2.example.com | 00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +peer1.org1.example.com | [844 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [845 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [846 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [847 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [848 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [849 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [84a 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [84b 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [84c 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [84d 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000304a10 gate 1589998807920258400 evaluation starts +peer1.org1.example.com | [84e 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000304a10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [84f 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000304a10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [850 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000304a10 principal matched by identity 0 +peer1.org1.example.com | [851 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [852 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc000304a10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [854 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000304a10 gate 1589998807920258400 evaluation succeeds +peer1.org1.example.com | [855 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [842 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [856 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [857 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [858 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [859 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [85a 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [85b 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [85c 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [85d 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [85e 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [85f 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 d0 ee cc c1 14 02 20 79 24 01 46 1b b9 64 09 bc |...... y$.F..d..| +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8c9 Proposed new policy Admins for Channel/Application/Org1MSP" +peer1.org1.example.com | [860 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003478b0 gate 1589998807938592100 evaluation starts +peer1.org1.example.com | [861 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003478b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [862 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003478b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [863 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003478b0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8ca Proposed new policy Readers for Channel/Application/Org1MSP" +peer1.org1.example.com | [864 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000040 c1 0e dd 4e f6 78 ea |...N.x.| +peer0.org1.example.com | [688 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [62b 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] GetPolicy -> DEBU 8cb Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org2.example.com | 00000030 59 7c 04 5c 67 fe 16 c8 9d 7e 68 70 41 12 69 23 |Y|.\g....~hpA.i#| +peer0.org1.example.com | [689 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [62d 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [62e 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [62f 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [631 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [632 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [633 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [634 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [635 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [630 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663e00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [637 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663e00 gate 1589998806441990400 evaluation succeeds +peer0.org2.example.com | [638 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [636 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fd6c0 gate 1589998806454083300 evaluation starts +peer0.org2.example.com | [639 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fd6c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [63a 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fd6c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [63b 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fd6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [63c 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fd6c0 principal evaluation fails +peer0.org2.example.com | [63d 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fd6c0 gate 1589998806454083300 evaluation fails +peer0.org2.example.com | [63e 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [63f 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [640 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [641 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fdc30 gate 1589998806455860600 evaluation starts +peer0.org2.example.com | [643 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [644 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [645 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [646 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [642 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fdc30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [647 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fdc30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [648 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fdc30 principal matched by identity 0 +peer0.org2.example.com | [649 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 96 0a 79 5e 9a 97 aa c8 0b c7 c0 eb 62 62 e6 |...y^........bb.| +peer0.org2.example.com | 00000010 5f 5b 36 d8 60 ce f8 bf da fb 8b d3 d7 38 56 39 |_[6.`........8V9| +peer0.org2.example.com | [64a 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [64c 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f fd cb c4 f3 66 62 f9 fc c5 9f a6 |0D. o....fb.....| +peer0.org2.example.com | 00000010 7d 96 f4 ba 5a 6c 62 4a 40 6b 6e d9 f3 7c 3b 14 |}...ZlbJ@kn..|;.| +peer0.org2.example.com | 00000020 90 4e 80 e3 02 20 64 61 59 fc 95 37 23 36 d9 a5 |.N... daY..7#6..| +peer0.org2.example.com | 00000030 93 c1 a2 f5 97 8a 30 ec 5b 82 3c e3 9a a1 2d c5 |......0.[.<...-.| +peer0.org2.example.com | 00000040 9e fd 2b 8f f3 66 |..+..f| +peer0.org2.example.com | [64b 05-20 18:20:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [64e 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [64f 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [650 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [651 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [64d 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fdc30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [652 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [654 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [655 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [656 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [653 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026fdc30 gate 1589998806455860600 evaluation succeeds +peer0.org2.example.com | [657 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [659 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [65a 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [65b 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [658 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [65c 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [65d 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [65f 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [660 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [661 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [65e 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [662 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1589998788834158300, 17 but got ts: inc_num:1589998788834158300 seq_num:10 +peer0.org2.example.com | [663 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [665 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [666 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [667 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [664 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [668 05-20 18:20:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [66a 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [66b 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [66c 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [66d 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [669 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [66e 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [66f 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [670 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [671 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [672 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [673 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [674 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [675 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org2.example.com | [676 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [677 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [678 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [679 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [67a 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [67b 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [67c 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8cc Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] GetPolicy -> DEBU 8cd Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8ce Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8cf Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d0 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d1 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d5 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8d6 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8d7 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8d8 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8d9 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8da Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8db Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8dc Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8dd Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8de Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8df Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e4 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f0 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f1 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8f7 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8f8 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8f9 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fa Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fb Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fc Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org2.example.com | 00000040 f1 2e c5 51 90 de 3f |...Q..?| +peer1.org2.example.com | [65e 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [65f 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 97 7c a8 f3 cf 3f 68 77 fa bd |0E.!...|...?hw..| +peer1.org2.example.com | 00000010 3b 50 33 08 8a 7b 5c 6b 94 fd ad 3e 5d 0b 19 c7 |;P3..{\k...>]...| +peer1.org2.example.com | 00000020 54 58 87 b9 33 02 20 71 53 7c 0e 63 a7 67 75 9f |TX..3. qS|.c.gu.| +peer1.org2.example.com | 00000030 ce 9c 2d af 7c 5b a9 9a bc 0c 3b 7a 32 7d ce ed |..-.|[....;z2}..| +peer1.org2.example.com | 00000040 60 1b 55 d2 c0 76 d3 |`.U..v.| +peer1.org2.example.com | [660 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [661 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [662 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [663 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [664 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 23 57 95 6b d7 8b e3 45 12 ee ef 02 4d 59 c0 |.#W.k...E....MY.| +peer1.org2.example.com | 00000010 21 9c 88 f7 69 25 2e f6 47 8b 5b 3e a4 50 a7 45 |!...i%..G.[>.P.E| +peer1.org2.example.com | [665 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 8c ee 60 61 00 08 aa 89 78 a3 b4 |0D. ...`a....x..| +peer1.org2.example.com | 00000010 eb 15 c2 43 72 5e c6 1d d3 d9 a6 89 1a 3f b9 d5 |...Cr^.......?..| +peer1.org2.example.com | 00000020 3e 3c e9 6e 02 20 7e 78 79 7c de 4a 02 d5 05 8f |><.n. ~xy|.J....| +peer1.org2.example.com | 00000030 29 ef ad 69 d8 40 1a 5c 46 bd 96 8f f1 e9 44 43 |)..i.@.\F.....DC| +peer1.org2.example.com | 00000040 ef ad a7 74 0c c8 |...t..| +peer1.org2.example.com | [666 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [667 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 e9 f6 4d 24 c6 1f 89 e4 b2 d5 |0E.!....M$......| +peer1.org2.example.com | 00000010 20 ac 20 93 10 18 80 2a db f3 cb 03 ee c6 9f a8 | . ....*........| +peer1.org2.example.com | 00000020 29 51 10 2c 7b 02 20 20 94 f2 9d 56 72 ff ff 57 |)Q.,{. ...Vr..W| +peer1.org2.example.com | 00000030 8d 3a 98 78 06 54 de ee ca 55 09 26 ab 29 0e 9f |.:.x.T...U.&.)..| +peer1.org2.example.com | 00000040 a9 21 80 87 0d 7f 28 |.!....(| +peer1.org2.example.com | [668 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [669 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer1.org2.example.com | [66a 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [66b 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [66c 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [66d 05-20 18:20:06.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [66e 05-20 18:20:07.65 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:09.658Z grpc.peer_address=172.18.0.7:46046 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=119.3µs +peer1.org2.example.com | [66f 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [670 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [671 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer0.org2.example.com | [67d 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [67e 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [67f 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [680 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [681 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [682 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [683 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [684 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [685 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [686 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [687 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [688 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [689 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [68a 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [68b 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [68c 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [68d 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [68e 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [68f 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [690 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [691 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [692 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [693 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [694 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [695 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [696 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [697 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [698 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [699 05-20 18:20:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [69a 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [69b 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [69c 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [69d 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [69e 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [69f 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [6a0 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [6a1 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [6a2 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [6a3 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [6a4 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [6a5 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [6a6 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [6a7 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [6a8 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [6a9 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [6aa 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [6ab 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [6ac 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [6ad 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fd Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fe Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:03.127 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:20:03.127 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:03.127 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:20:03.127 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 908 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:53450" +orderer0.example.com | "2020-05-20 18:20:03.127 UTC [orderer.consensus.etcdraft] propose -> INFO 909 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:20:03.127 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 90a Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:20:03.128 UTC [orderer.consensus.etcdraft] 2 -> DEBU 90b Proposed block [1] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [grpc] warningf -> DEBU 90c transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:53450: read: connection reset by peer" +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 90d Sending msg of 27268 bytes to 2 on channel businesschannel took 22.6µs" +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [orderer.common.broadcast] Handle -> WARN 90e Error reading from 172.18.0.9:53450: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [orderer.common.server] func1 -> DEBU 90f Closing Broadcast stream" +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 910 Sending msg of 27268 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [comm.grpc.server] 1 -> INFO 911 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53450 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.8212ms +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [grpc] infof -> DEBU 912 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 913 Send of ConsensusRequest for channel businesschannel with payload of size 27268 to orderer2.example.com(orderer2.example.com:7050) took 296.2µs " +orderer0.example.com | "2020-05-20 18:20:03.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 914 Send of ConsensusRequest for channel businesschannel with payload of size 27268 to orderer1.example.com(orderer1.example.com:7050) took 138.8µs " +orderer0.example.com | "2020-05-20 18:20:03.136 UTC [orderer.common.cluster.step] handleMessage -> DEBU 915 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 916 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2020-05-20 18:20:03.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 917 Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +orderer0.example.com | "2020-05-20 18:20:03.137 UTC [orderer.common.cluster.step] sendMessage -> DEBU 918 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 285.3µs " +orderer0.example.com | "2020-05-20 18:20:03.137 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 919 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:20:03.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU 91a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU 91b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.7µs " +orderer0.example.com | "2020-05-20 18:20:03.142 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [6ae 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [6af 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [6b0 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [6b1 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [6b2 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [6b3 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [6b4 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [6b5 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [6b6 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [6b7 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [6b8 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [6b9 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [6ba 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [6bb 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [6bc 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [6bd 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [6be 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [6bf 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [6c0 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [6c1 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [6c2 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [6c3 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [6c4 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [6c5 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [6c6 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [6c7 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [6c8 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [6c9 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [6ca 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [6cb 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [6cc 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [6cd 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [6ce 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [6cf 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [6d0 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [6d1 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [6d2 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [6d3 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [6d4 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [6d5 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [6d6 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [6d7 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [6d8 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [6d9 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [6da 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [6db 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [6dc 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [6dd 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [6de 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [6df 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [6e0 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [6e1 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [6e2 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [6e3 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [6e4 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [6e5 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [6e6 05-20 18:20:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [6e7 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [6e8 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [6e9 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [672 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:46046 +peer1.org2.example.com | [673 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:46046 +peer1.org2.example.com | [674 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [675 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [676 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [677 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [678 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [679 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [67a 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [67b 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [67c 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [67d 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [67e 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [67f 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f190e0 gate 1589998807667381800 evaluation starts +peer1.org2.example.com | [680 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f190e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [681 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f190e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [682 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f190e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [683 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f190e0 principal evaluation fails +peer1.org2.example.com | [684 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f190e0 gate 1589998807667381800 evaluation fails +peer1.org2.example.com | [685 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [686 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [687 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [688 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19650 gate 1589998807675111700 evaluation starts +peer1.org2.example.com | [689 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [68a 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19650 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [68b 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19650 principal matched by identity 0 +peer1.org2.example.com | [68c 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [68d 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f f1 0f e8 97 42 1a 3e 5e f7 0e 4d |0D. .....B.>^..M| +peer1.org2.example.com | 00000010 fe e3 f1 27 ef aa a8 83 ac 13 18 90 2e 61 c2 55 |...'.........a.U| +peer1.org2.example.com | 00000020 b3 12 25 e7 02 20 15 5e 3e 2a af ea eb 40 48 2b |..%.. .^>*...@H+| +peer1.org2.example.com | 00000030 ed 2e 71 5b 94 3c 5a 7e 08 cb 22 64 40 75 cb d6 |..q[. DEBU 0xc002f19650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [68f 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19650 gate 1589998807675111700 evaluation succeeds +peer1.org2.example.com | [690 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [691 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [692 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [693 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [694 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:46046 +peer1.org2.example.com | [695 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:46046 +peer1.org2.example.com | [696 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [697 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [698 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [6ea 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [6eb 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [6ec 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [6ed 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [6ee 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [6ef 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [6f0 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [6f1 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [6f2 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [6f3 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [6f4 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [6f5 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org2.example.com | [6f6 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [6f7 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [6f8 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [6f9 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [6fa 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [6fb 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [6fc 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org2.example.com | [6fd 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [6fe 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6ff 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [700 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [701 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [702 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [703 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [704 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [705 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [706 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [707 05-20 18:20:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002a1bb20, CONNECTING +peer0.org2.example.com | [708 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002a1bb20, READY +peer0.org2.example.com | [709 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [70a 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [70c 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [70d 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [70e 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [70b 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [70f 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [710 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [711 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [714 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [715 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [718 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [719 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [716 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002849ec0 env 0xc0024e4cd0 txn 0 +peer0.org2.example.com | [717 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [71a 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [71b 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [71c 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [71d 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [71e 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [71f 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [720 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [721 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [722 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [723 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [724 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [725 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f267f0 gate 1589998806529123200 evaluation starts +peer0.org2.example.com | [726 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f267f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [727 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f267f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [728 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f267f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [729 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f267f0 principal evaluation fails +peer0.org2.example.com | [72a 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f267f0 gate 1589998806529123200 evaluation fails +peer0.org1.example.com | [68a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [68b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [68c 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [68d 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [68e 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [68f 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [690 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [691 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [692 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [693 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [694 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [695 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [696 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [697 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [698 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [699 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [69a 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [69b 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [69c 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [69d 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [69e 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [69f 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [6a0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [6a1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [6a2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [6a3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [6a4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [6a5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [6a6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [6a7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [6a8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [6a9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [6aa 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [6ab 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [6ac 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [6ad 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [6ae 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [6af 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [6b0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [6b1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [6b2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [6b3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [6b4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [6b5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [6b6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [72b 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [72c 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [72d 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [72e 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26d80 gate 1589998806529522500 evaluation starts +peer0.org2.example.com | [72f 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26d80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [730 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26d80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [731 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [732 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [733 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [734 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26d80 principal matched by identity 0 +peer0.org2.example.com | [735 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [736 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 8d ae de ef 4c 82 5f d8 dd 5f |0E.!......L._.._| +peer0.org2.example.com | 00000010 05 24 68 84 63 eb f4 41 53 97 99 fd e9 02 7e 24 |.$h.c..AS.....~$| +peer0.org2.example.com | 00000020 0a 61 06 d3 9e 02 20 4e 68 5f 07 bf 7a ab 54 3b |.a.... Nh_..z.T;| +peer0.org2.example.com | 00000030 11 84 9f 16 b1 e9 71 b4 47 22 a5 a4 d6 ed 75 2a |......q.G"....u*| +peer0.org2.example.com | 00000040 60 17 48 f4 0e a8 87 |`.H....| +peer0.org2.example.com | [737 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26d80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [738 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26d80 gate 1589998806529522500 evaluation succeeds +peer0.org2.example.com | [739 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [73a 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [73b 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [73c 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [73d 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [73e 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [73f 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [740 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161012 +peer0.org2.example.com | [741 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 830E2BB572273E052403116F63155FDA7E4ED06626B9E048866867D764F51B6D +peer0.org2.example.com | [742 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [743 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [744 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [745 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [746 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [747 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [748 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [749 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer0.org2.example.com | [74a 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 140ms +peer0.org2.example.com | [74b 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [74c 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [74d 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [74e 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [74f 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer0.org2.example.com | [751 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer0.org2.example.com | [752 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [753 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org2.example.com | [750 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [754 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org2.example.com | [755 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [756 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [757 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [758 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org2.example.com | [759 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [75a 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [75b 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [75c 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [75d 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [75e 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [75f 05-20 18:20:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [6b7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [6b8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [6b9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [6ba 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [6bb 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [6bc 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [6bd 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [6be 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [6bf 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [6c0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [6c1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [6c2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [6c3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [6c4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [6c5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [6c6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org1.example.com | [6c7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [6c8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [6c9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6ca 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6cb 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [6cc 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [6cd 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [6ce 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6cf 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [6d0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 gate 1589998805832978600 evaluation starts +peer0.org1.example.com | [6d1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [6d2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [6d3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [6d4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 principal evaluation fails +peer0.org1.example.com | [6d5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 gate 1589998805832978600 evaluation fails +peer0.org1.example.com | [6d6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [6d7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [6d8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [6d9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 gate 1589998805833450600 evaluation starts +peer0.org1.example.com | [6da 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [6db 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [6dc 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [6dd 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [6de 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [6df 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 principal matched by identity 0 +peer0.org1.example.com | [6e0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +peer0.org1.example.com | 00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +peer0.org1.example.com | [6e1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +peer0.org1.example.com | 00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +peer0.org1.example.com | 00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +peer0.org1.example.com | 00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +peer0.org1.example.com | 00000040 1f 39 c2 0b 9a b3 5c |.9....\| +peer0.org1.example.com | [6e2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [6e3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 gate 1589998805833450600 evaluation succeeds +peer0.org1.example.com | [6e4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [6e5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [6e6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [6e7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [6e8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [6e9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [6ea 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [6ec 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [6ed 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [6ee 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [6ef 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [6f0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037a9b00, CONNECTING +peer0.org1.example.com | [6eb 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [6f1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [6f2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org1.example.com | [6f3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [6f4 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [6f5 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037a9b00, READY +peer0.org1.example.com | [6f6 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [6f7 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [6f8 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [6f9 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer0.org1.example.com | [6fa 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer0.org1.example.com | [6fb 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6fc 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6fd 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +orderer0.example.com | "2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [common.configtx] verifyDeltaSet -> DEBU 92b Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [common.configtx] policyForItem -> DEBU 92c Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 92d Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 92e Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 92f Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 930 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 931 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 932 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 933 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 934 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 935 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 936 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [policies] Evaluate -> DEBU 937 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:20:03.144 UTC [cauthdsl] func1 -> DEBU 938 0xc000d2c250 gate 1589998803144945600 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:03.145 UTC [cauthdsl] func2 -> DEBU 939 0xc000d2c250 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:03.145 UTC [cauthdsl] func2 -> DEBU 93a 0xc000d2c250 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:03.145 UTC [cauthdsl] func2 -> DEBU 93b 0xc000d2c250 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:20:03.145 UTC [msp.identity] Verify -> DEBU 93c Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +orderer0.example.com | 00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.|" +orderer0.example.com | "2020-05-20 18:20:03.145 UTC [msp.identity] Verify -> DEBU 93d Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +orderer0.example.com | 00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +orderer0.example.com | 00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +orderer0.example.com | 00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +orderer0.example.com | 00000040 b6 a1 df 24 f2 fb af |...$...|" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [cauthdsl] func2 -> DEBU 93e 0xc000d2c250 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [cauthdsl] func1 -> DEBU 93f 0xc000d2c250 gate 1589998803144945600 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [policies] Evaluate -> DEBU 940 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [policies] Evaluate -> DEBU 941 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 942 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] verifyDeltaSet -> DEBU 943 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 944 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 945 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 946 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 947 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 948 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 949 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94b Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 950 Setting policy for key Readers to " +orderer0.example.com | "2020-05-20 18:20:03.147 UTC [common.deliver] Handle -> WARN 951 Error reading from 172.18.0.9:53448: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:20:03.147 UTC [orderer.common.server] func1 -> DEBU 952 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:20:03.147 UTC [comm.grpc.server] 1 -> INFO 953 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53448 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=105.1563ms +orderer0.example.com | "2020-05-20 18:20:03.147 UTC [grpc] infof -> DEBU 954 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 955 Setting policy for key Writers to " +orderer0.example.com | "2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 956 Setting policy for key Admins to " +orderer0.example.com | "2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 957 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [699 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [69a 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [69b 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [69c 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [69d 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [69e 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [69f 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [6a0 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [6a1 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2ecb0 gate 1589998807717630400 evaluation starts +peer1.org2.example.com | [6a2 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2ecb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6a3 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2ecb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [6a4 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2ecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [6a5 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2ecb0 principal evaluation fails +peer1.org2.example.com | [6a6 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2ecb0 gate 1589998807717630400 evaluation fails +peer1.org2.example.com | [6a7 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6a8 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6a9 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [6aa 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f220 gate 1589998807718125100 evaluation starts +peer1.org2.example.com | [6ab 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6ac 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f220 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [6ad 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f220 principal matched by identity 0 +peer1.org2.example.com | [6ae 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [6af 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [6b0 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f220 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [6b1 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f220 gate 1589998807718125100 evaluation succeeds +peer1.org2.example.com | [6b2 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6b3 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6b4 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [6b5 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [6b6 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6b7 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6b8 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6b9 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6ba 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [6bb 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [6bc 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [6bd 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2fe30 gate 1589998807719120500 evaluation starts +peer1.org2.example.com | [6be 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2fe30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6bf 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2fe30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [6c0 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2fe30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [6c1 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2fe30 principal evaluation fails +peer1.org2.example.com | [6c2 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2fe30 gate 1589998807719120500 evaluation fails +peer1.org2.example.com | [6c3 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6c4 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6c5 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [6c6 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c3c0 gate 1589998807720281300 evaluation starts +peer1.org2.example.com | [6c7 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c3c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6c8 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c3c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [6c9 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c3c0 principal matched by identity 0 +peer1.org2.example.com | [6ca 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [6cb 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [6cc 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c3c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [6cd 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4c3c0 gate 1589998807720281300 evaluation succeeds +peer1.org2.example.com | [6ce 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6cf 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6d0 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [6d1 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [6d2 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6d3 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [6d4 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [6d5 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6d6 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [6d7 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [6d8 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6d9 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [6da 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6db 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6dc 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [6dd 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [6de 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [6df 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e658f0 gate 1589998807744263400 evaluation starts +peer1.org2.example.com | [6e0 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e658f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6e1 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e658f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [6e2 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e658f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [6e3 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e658f0 principal evaluation fails +peer1.org2.example.com | [6e4 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e658f0 gate 1589998807744263400 evaluation fails +peer1.org2.example.com | [6e5 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6e6 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6e7 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [6e8 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e65e60 gate 1589998807746088200 evaluation starts +peer1.org2.example.com | [6e9 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e65e60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6ea 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e65e60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [6eb 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e65e60 principal matched by identity 0 +peer1.org2.example.com | [6ec 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [6ed 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [6ee 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e65e60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [6ef 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e65e60 gate 1589998807746088200 evaluation succeeds +peer1.org2.example.com | [6f0 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6f1 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [760 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [761 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [762 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [763 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [764 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00300db80)} +peer0.org2.example.com | [765 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [766 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [767 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [768 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org2.example.com | [769 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org2.example.com | [76a 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org2.example.com | [76b 05-20 18:20:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org2.example.com | [76c 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xf5, 0x87, 0x9d, 0xf3, 0xcd, 0xbf, 0xbf, 0x43, 0x96, 0xe2, 0xb0, 0xb9, 0x62, 0xaf, 0x50, 0x91, 0xe3, 0xeb, 0x80, 0x22, 0x57, 0x52, 0xd1, 0xfd, 0x79, 0x4c, 0xe4, 0xfe, 0xe5, 0xa7, 0x26, 0x2a} txOffsets= +peer0.org2.example.com | txId=11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0 locPointer=offset=71, bytesLength=27141 +peer0.org2.example.com | ] +peer0.org2.example.com | [76d 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56751, bytesLength=27141] for tx ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to txid-index +peer0.org2.example.com | [76e 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56751, bytesLength=27141] for tx number:[0] ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to blockNumTranNum index +peer0.org2.example.com | [76f 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84888], isChainEmpty=[false], lastBlockNumber=[2] +peer0.org2.example.com | [770 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer0.org2.example.com | [771 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer0.org2.example.com | [772 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer0.org2.example.com | [773 05-20 18:20:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [774 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [775 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [776 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [777 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [778 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [6fe 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [6ff 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [865 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0003478b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [867 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003478b0 gate 1589998807938592100 evaluation succeeds +peer1.org1.example.com | [868 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [869 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [86a 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [86b 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [86c 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [86d 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [86e 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [86f 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [870 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [871 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [872 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [873 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [874 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org1.example.com | [875 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [876 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [877 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [878 05-20 18:20:07.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [879 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [87a 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [87b 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [87c 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [87d 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [87e 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [87f 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [880 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [881 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [882 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [883 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [884 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [885 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [886 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [887 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cfbd0 gate 1589998808192136000 evaluation starts +peer1.org1.example.com | [888 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cfbd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [889 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cfbd0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [88a 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cfbd0 principal matched by identity 0 +peer1.org1.example.com | [88b 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [88c 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0003cfbd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [88e 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cfbd0 gate 1589998808192136000 evaluation succeeds +peer1.org1.example.com | [88f 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [890 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [891 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [892 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [893 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [894 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [895 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [896 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [897 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [898 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [899 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [89a 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161016 +peer1.org1.example.com | [89b 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CB2CBE09B90B47600A3AA4CF3A6B853531F23183C2F9B08F4BBCE65C8FFABA24 +peer1.org1.example.com | [89c 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [89d 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [89e 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [89f 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [8a0 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a1 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a2 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [8a3 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [8a4 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a5 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8a6 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8a7 05-20 18:20:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a8 05-20 18:20:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a9 05-20 18:20:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [8aa 05-20 18:20:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8ab 05-20 18:20:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8ac 05-20 18:20:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [8ad 05-20 18:20:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8ae 05-20 18:20:08.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [8af 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8b0 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8b1 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [8b2 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161017 +peer1.org1.example.com | [8b3 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0931174C37D21639EE1D34CBA7EC6D0B93D649DC35CAF732C4AD4C9A6FA625DC +peer1.org1.example.com | [8b4 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [8b5 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [8b6 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [8b7 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8b8 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [8b9 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [8ba 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [8bb 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8bc 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8bd 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8be 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [8bf 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8c0 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer1.org1.example.com | [8c1 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8c2 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer1.org1.example.com | [8c3 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [8c4 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 31 17 4c 37 d2 16 39 ee 1d 34 cb a7 ec 6d 0b |.1.L7..9..4...m.| +peer1.org1.example.com | 00000010 93 d6 49 dc 35 ca f7 32 c4 ad 4c 9a 6f a6 25 dc |..I.5..2..L.o.%.| +peer1.org1.example.com | [8c5 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 e7 d9 63 91 ab 58 49 8d d8 c1 1b |0D. ..c..XI....| +peer1.org1.example.com | 00000010 36 d1 52 33 88 f9 5b b7 26 f9 34 f3 da bf 18 96 |6.R3..[.&.4.....| +peer1.org1.example.com | 00000020 a1 81 9b 85 02 20 3a d3 0c f2 31 e3 af 14 c2 42 |..... :...1....B| +peer1.org1.example.com | 00000030 7a 1c fe 58 a4 37 7b f8 29 5f 9d f8 8b 8d 94 9c |z..X.7{.)_......| +peer1.org1.example.com | 00000040 fa 29 4f 83 25 35 |.)O.%5| +peer1.org1.example.com | [8c6 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [8c7 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 0f 93 c1 dc 13 ac 64 ee b1 75 76 |0D. s......d..uv| +peer1.org2.example.com | [6f2 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [6f3 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [6f4 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6f5 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [6f6 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [6f7 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> WARN StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found +peer1.org2.example.com | [6f8 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> WARN Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes isn't valid +peer1.org2.example.com | [6f9 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6fa 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [6fb 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [6fc 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6fd 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6fe 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [6ff 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [700 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [701 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [703 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [704 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [705 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [706 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [707 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [708 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [709 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011310 gate 1589998808198728000 evaluation starts +peer1.org2.example.com | [70a 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011310 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [70b 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011310 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [70c 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [70d 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [70e 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [70f 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011310 principal matched by identity 0 +peer1.org2.example.com | [710 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [711 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003011310 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [713 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003011310 gate 1589998808198728000 evaluation succeeds +peer1.org2.example.com | [714 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [715 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [716 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [717 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [718 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [719 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [71a 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [71b 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [71c 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [71d 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [71e 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [71f 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [720 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 958 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 959 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 95a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 95b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 95c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 95d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.configtx] recurseConfigMap -> DEBU 95e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] NewStandardValues -> DEBU 95f Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 960 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 961 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 962 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 963 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 964 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] NewStandardValues -> DEBU 965 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 966 Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 967 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] NewStandardValues -> DEBU 968 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 969 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] NewStandardValues -> DEBU 96a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96b Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] Validate -> DEBU 96c Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [common.channelconfig] validateMSP -> DEBU 96d Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [msp] newBccspMsp -> DEBU 96e Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [msp] New -> DEBU 96f Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.149 UTC [msp] Setup -> DEBU 970 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.150 UTC [msp.identity] newIdentity -> DEBU 971 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:03.150 UTC [common.channelconfig] NewStandardValues -> DEBU 972 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:03.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 973 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.154 UTC [common.channelconfig] NewStandardValues -> DEBU 974 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:03.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 975 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:03.154 UTC [common.channelconfig] Validate -> DEBU 976 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:20:03.154 UTC [common.channelconfig] validateMSP -> DEBU 977 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.154 UTC [msp] newBccspMsp -> DEBU 978 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.154 UTC [msp] New -> DEBU 979 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.154 UTC [msp] Setup -> DEBU 97a Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.155 UTC [msp.identity] newIdentity -> DEBU 97b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:03.155 UTC [common.channelconfig] NewStandardValues -> DEBU 97c Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:20:03.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97d Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97e Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97f Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 980 Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 981 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 982 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.157 UTC [common.channelconfig] NewStandardValues -> DEBU 983 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:20:03.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 984 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:20:03.157 UTC [common.channelconfig] NewStandardValues -> DEBU 985 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:03.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 986 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:03.157 UTC [common.channelconfig] validateMSP -> DEBU 987 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.157 UTC [msp] newBccspMsp -> DEBU 988 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.157 UTC [msp] New -> DEBU 989 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:03.158 UTC [msp] Setup -> DEBU 98a Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:20:03.159 UTC [msp.identity] newIdentity -> DEBU 98b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | 00000010 46 8d 13 75 3e 65 69 99 ff df 16 2e 88 9e b8 15 |F..u>ei.........| +peer1.org1.example.com | 00000020 7e 93 5a 3c 02 20 3c c2 ce 79 b6 5d cf 51 49 b3 |~.Z<. <..y.].QI.| +peer1.org1.example.com | 00000030 c7 ef c1 56 9b a3 a0 93 93 df 32 4f 98 9b 92 b9 |...V......2O....| +peer1.org1.example.com | 00000040 b7 a1 63 f6 db 01 |..c...| +peer1.org1.example.com | [8c8 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [8c9 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [8ca 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8cb 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8cc 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [8cd 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [8ce 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8cf 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [8d0 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [8d1 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [8d2 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 31 17 4c 37 d2 16 39 ee 1d 34 cb a7 ec 6d 0b |.1.L7..9..4...m.| +peer1.org1.example.com | 00000010 93 d6 49 dc 35 ca f7 32 c4 ad 4c 9a 6f a6 25 dc |..I.5..2..L.o.%.| +peer1.org1.example.com | [8d3 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 e7 d9 63 91 ab 58 49 8d d8 c1 1b |0D. ..c..XI....| +peer1.org1.example.com | 00000010 36 d1 52 33 88 f9 5b b7 26 f9 34 f3 da bf 18 96 |6.R3..[.&.4.....| +peer1.org1.example.com | 00000020 a1 81 9b 85 02 20 3a d3 0c f2 31 e3 af 14 c2 42 |..... :...1....B| +peer1.org1.example.com | 00000030 7a 1c fe 58 a4 37 7b f8 29 5f 9d f8 8b 8d 94 9c |z..X.7{.)_......| +peer1.org1.example.com | 00000040 fa 29 4f 83 25 35 |.)O.%5| +peer1.org1.example.com | [8d4 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [8d5 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [8d6 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8d7 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [8d8 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8d9 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8da 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8db 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8dc 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8dd 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [8de 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [8df 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003250e0 gate 1589998808375798500 evaluation starts +peer1.org1.example.com | [8e0 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003250e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [8e1 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003250e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [8e2 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003250e0 principal matched by identity 0 +peer1.org1.example.com | [8e3 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 23 57 95 6b d7 8b e3 45 12 ee ef 02 4d 59 c0 |.#W.k...E....MY.| +peer1.org1.example.com | 00000010 21 9c 88 f7 69 25 2e f6 47 8b 5b 3e a4 50 a7 45 |!...i%..G.[>.P.E| +peer1.org1.example.com | [8e4 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 8c ee 60 61 00 08 aa 89 78 a3 b4 |0D. ...`a....x..| +peer1.org1.example.com | 00000010 eb 15 c2 43 72 5e c6 1d d3 d9 a6 89 1a 3f b9 d5 |...Cr^.......?..| +peer1.org1.example.com | 00000020 3e 3c e9 6e 02 20 7e 78 79 7c de 4a 02 d5 05 8f |><.n. ~xy|.J....| +peer1.org1.example.com | 00000030 29 ef ad 69 d8 40 1a 5c 46 bd 96 8f f1 e9 44 43 |)..i.@.\F.....DC| +peer1.org1.example.com | 00000040 ef ad a7 74 0c c8 |...t..| +peer1.org1.example.com | [8e5 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003250e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [8e6 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003250e0 gate 1589998808375798500 evaluation succeeds +peer1.org1.example.com | [8e7 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8e8 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8e9 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [8ea 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [8eb 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [8ec 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8ed 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [8ee 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e e1 3c 74 a6 8b 07 1d 38 c5 35 da 0d db 11 9c |>. DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org2.example.com | [77a 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org2.example.com | [77b 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [77c 05-20 18:20:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org2.example.com | [77d 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer0.org2.example.com | [77e 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer0.org2.example.com | [77f 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [780 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org2.example.com | [781 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 49ms (state_validation=18ms block_and_pvtdata_commit=15ms state_commit=10ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org2.example.com | [782 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [783 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408CC93F4F0C0EFB38816...9C09DCBB6042B0C019B601802A020803 +peer0.org2.example.com | [784 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CCA781E9177077C385F6E9EB6C31B4281A63F76C2DC1F94538B9429950DD544F +peer0.org2.example.com | [785 05-20 18:20:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer0.org2.example.com | [786 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.783Z grpc.peer_address=172.18.0.6:43230 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147.4µs +peer0.org2.example.com | [787 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [788 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [789 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [78a 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [78d 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [78e 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [78f 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [790 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [791 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 f0 52 66 9e f6 d4 e6 cd 37 4d f4 |0D. H.Rf.....7M.| +peer0.org2.example.com | 00000010 2c 98 59 3c 9e e7 8f 7c e3 ec 53 a0 dc 16 ca 6d |,.Y<...|..S....m| +peer0.org2.example.com | 00000020 69 03 5a 36 02 20 21 37 5e c0 5a df f0 55 d4 13 |i.Z6. !7^.Z..U..| +peer0.org2.example.com | 00000030 49 ce c7 cb 76 4f 8f b6 03 c8 ee 69 80 77 45 3e |I...vO.....i.wE>| +peer0.org2.example.com | 00000040 21 b2 83 42 94 d4 |!..B..| +peer0.org2.example.com | [792 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:43230 +peer0.org2.example.com | [793 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:43230 +peer0.org2.example.com | [794 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [795 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [700 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [701 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [702 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [703 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [704 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [705 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [706 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [707 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [708 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [709 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [70a 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [70b 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [70c 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [70d 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [796 05-20 18:20:06.80 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:43230 disconnected +peer0.org2.example.com | [797 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.787Z grpc.peer_address=172.18.0.6:43230 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.2569ms +peer0.org2.example.com | [798 05-20 18:20:06.81 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [799 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.833Z grpc.peer_address=172.18.0.6:43234 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=519.5µs +peer0.org2.example.com | [79a 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [79b 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [79c 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [79d 05-20 18:20:06.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [7a0 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc da 89 57 5b a5 2f 03 09 49 b6 |0E.!....W[./..I.| +peer0.org2.example.com | 00000010 bf 64 38 51 4c e1 58 5e ff b1 07 29 66 d0 68 75 |.d8QL.X^...)f.hu| +peer0.org2.example.com | 00000020 96 a1 c1 07 f3 02 20 34 2d 75 22 07 2b 25 0a 12 |...... 4-u".+%..| +peer0.org2.example.com | 00000030 e4 e6 89 93 33 8c ab 21 90 12 1e 28 ab 22 ba ec |....3..!...(."..| +peer0.org2.example.com | 00000040 47 9a 64 21 77 af db |G.d!w..| +peer0.org2.example.com | [7a1 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:43234 +peer0.org2.example.com | [7a2 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:43234 +peer0.org2.example.com | [7a3 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:10169697798246393482 tag:EMPTY mem_req:]\013\031\307TX\207\2713\002 qS|\016c\247gu\237\316\234-\257|[\251\232\274\014;z2}\316\355`\033U\322\300v\323" > > > , Envelope: 283 bytes, Signature: 0 bytes +peer0.org2.example.com | [7a4 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7a5 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:10169697798246393482 tag:EMPTY mem_req:]\013\031\307TX\207\2713\002 qS|\016c\247gu\237\316\234-\257|[\251\232\274\014;z2}\316\355`\033U\322\300v\323" > > > , Envelope: 283 bytes, Signature: 0 bytes +peer0.org2.example.com | [7a6 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [7a7 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 15 c2 34 87 ea df e5 eb c7 3f c1 ef ed 85 3d |X..4......?....=| +peer0.org2.example.com | 00000010 08 98 1f f5 4d 0f 16 dc ca e4 5e 69 d8 c1 f6 4a |....M.....^i...J| +peer0.org2.example.com | [7a8 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 49 32 fc cd 8b 16 3a cc 79 f9 |0E.!..I2....:.y.| +peer0.org2.example.com | 00000010 36 93 7e e3 b8 98 26 d6 a3 31 24 72 de 50 07 ad |6.~...&..1$r.P..| +peer0.org2.example.com | 00000020 d0 ee cc c1 14 02 20 79 24 01 46 1b b9 64 09 bc |...... y$.F..d..| +peer0.org2.example.com | 00000030 59 7c 04 5c 67 fe 16 c8 9d 7e 68 70 41 12 69 23 |Y|.\g....~hpA.i#| +peer0.org2.example.com | 00000040 f1 2e c5 51 90 de 3f |...Q..?| +peer0.org2.example.com | [7a9 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [7aa 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 97 7c a8 f3 cf 3f 68 77 fa bd |0E.!...|...?hw..| +peer0.org2.example.com | 00000010 3b 50 33 08 8a 7b 5c 6b 94 fd ad 3e 5d 0b 19 c7 |;P3..{\k...>]...| +peer0.org2.example.com | 00000020 54 58 87 b9 33 02 20 71 53 7c 0e 63 a7 67 75 9f |TX..3. qS|.c.gu.| +peer0.org2.example.com | 00000030 ce 9c 2d af 7c 5b a9 9a bc 0c 3b 7a 32 7d ce ed |..-.|[....;z2}..| +peer0.org2.example.com | 00000040 60 1b 55 d2 c0 76 d3 |`.U..v.| +peer0.org2.example.com | [7ab 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [7ac 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer0.org2.example.com | [7ad 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [7ae 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7af 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7b0 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7b1 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [7b2 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7b3 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7b4 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7b5 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [7b6 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 10169697798246393482, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 549 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [7b7 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 10169697798246393482, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 549 bytes, Signature: 0 bytes +peer0.org2.example.com | [7b8 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7b9 05-20 18:20:06.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:]\013\031\307TX\207\2713\002 qS|\016c\247gu\237\316\234-\257|[\251\232\274\014;z2}\316\355`\033U\322\300v\323" > > alive:<\351n\002 ~xy|\336J\002\325\005\217)\357\255i\330@\032\\F\275\226\217\361\351DC\357\255\247t\014\310" secret_envelope: > +peer0.org2.example.com | [7ba 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:09.681Z grpc.peer_address=172.18.0.7:34588 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=641µs +peer0.org2.example.com | [7bb 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [7bc 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [7bd 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [7be 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU 98c Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:20:03.160 UTC [msp] Setup -> DEBU 98d MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 98f Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 990 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 991 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 992 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 993 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 994 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] GetPolicy -> DEBU 995 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 996 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] GetPolicy -> DEBU 99a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99c Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99d Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99f Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a0 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a1 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a2 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a3 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a4 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [policies] NewManagerImpl -> DEBU 9a5 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9cc Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9cd Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9ce Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9cf Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9d0 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [common.configtx] addToMap -> DEBU 9d1 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d2 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d3 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d4 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d5 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d6 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d7 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d8 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d9 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9da As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9db As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9dc As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9dd Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9de Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9df Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9e0 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9e1 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e2 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e3 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e4 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e5 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.capabilities] Supported -> DEBU 9e6 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:20:03.167 UTC [common.capabilities] Supported -> DEBU 9e7 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:20:03.168 UTC [orderer.common.server] func1 -> DEBU 9e8 Executing callback to update root CAs" +orderer0.example.com | "2020-05-20 18:20:03.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e9 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-05-20 18:20:03.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9ea adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-05-20 18:20:03.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9eb adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-05-20 18:20:03.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9ec adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-05-20 18:20:03.170 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9ed [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +peer0.org2.example.com | [7bf 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:34588 +peer0.org2.example.com | [7c0 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7c1 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7c2 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7c3 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7c4 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7c5 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7c6 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7c7 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7c8 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [7c9 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [7ca 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [7cb 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd9f0 gate 1589998807703085900 evaluation starts +peer0.org2.example.com | [7cc 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd9f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7cd 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd9f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [7ce 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd9f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [7cf 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd9f0 principal evaluation fails +peer0.org2.example.com | [7d0 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd9f0 gate 1589998807703085900 evaluation fails +peer0.org2.example.com | [7d1 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7d2 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7d3 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [7d4 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdf60 gate 1589998807706060500 evaluation starts +peer0.org2.example.com | [7d5 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdf60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7d6 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdf60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [7d7 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdf60 principal matched by identity 0 +peer0.org2.example.com | [7d8 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [7d9 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 e4 4c 8c 61 7d 88 9e 6c 0c 0d |0E.!...L.a}..l..| +peer0.org2.example.com | 00000010 6f 38 04 d0 9d cf e7 66 f1 27 0d ba b9 3f 59 c9 |o8.....f.'...?Y.| +peer0.org2.example.com | 00000020 13 be e5 0c bd 02 20 03 94 14 84 ac 2c d9 2d 2a |...... .....,.-*| +peer0.org2.example.com | 00000030 85 f0 2e a0 b1 65 57 fe 6f 7f f5 cc 77 1b 4d f3 |.....eW.o...w.M.| +peer0.org2.example.com | 00000040 4a ab b6 ef 17 e0 5b |J.....[| +peer0.org2.example.com | [7da 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdf60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [7db 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcdf60 gate 1589998807706060500 evaluation succeeds +peer0.org2.example.com | [7dc 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [7dd 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [7de 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [7df 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [7e0 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34588 +peer0.org2.example.com | [7e1 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34588 +peer0.org2.example.com | [7e2 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [7e3 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [721 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [722 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [723 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [724 05-20 18:20:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [725 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [726 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [727 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [728 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [729 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [72a 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [72b 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [72d 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [72e 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [72f 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [730 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [732 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [733 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [734 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [731 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:03.170 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9ee [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2020-05-20 18:20:03.170 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ef Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:20:03.170 UTC [msp] GetDefaultSigningIdentity -> DEBU 9f0 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:20:03.170 UTC [msp.identity] Sign -> DEBU 9f1 Sign: plaintext: 0A020801120B0A090A03010203100418...E9BAC567312B232F0AD2484897D67734 " +orderer0.example.com | "2020-05-20 18:20:03.170 UTC [msp.identity] Sign -> DEBU 9f2 Sign: digest: 5D0AE9896F8618D0833712F9E1CE041529D25B8DAB149077BC8331FD4D2E13D9 " +orderer0.example.com | "2020-05-20 18:20:03.172 UTC [fsblkstorage] indexBlock -> DEBU 9f3 Indexing block [blockNum=1, blockHash=[]byte{0xa6, 0xe9, 0x70, 0x63, 0xe3, 0xe8, 0x98, 0x1e, 0x14, 0xfd, 0x2a, 0x6f, 0x3d, 0xd9, 0x24, 0x28, 0x30, 0xda, 0x1, 0x2c, 0xc0, 0x6d, 0x3f, 0xca, 0x43, 0xa9, 0xc8, 0x4, 0x6b, 0x7f, 0xa7, 0x8c} txOffsets= +orderer0.example.com | txId=5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d locPointer=offset=71, bytesLength=27137 +orderer0.example.com | ]" +orderer0.example.com | "2020-05-20 18:20:03.175 UTC [fsblkstorage] updateCheckpoint -> DEBU 9f4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56644], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2020-05-20 18:20:03.175 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9f5 [channel: businesschannel] Wrote block [1]" +orderer0.example.com | "2020-05-20 18:20:03.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f7 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +orderer0.example.com | "2020-05-20 18:20:03.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 309.2µs " +orderer0.example.com | "2020-05-20 18:20:03.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f9 Sending msg of 28 bytes to 2 on channel businesschannel took 187.2µs" +orderer0.example.com | "2020-05-20 18:20:03.447 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fa Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +orderer0.example.com | "2020-05-20 18:20:03.447 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 537.2µs " +orderer0.example.com | "2020-05-20 18:20:03.447 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 202.1µs " +orderer0.example.com | "2020-05-20 18:20:03.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.450 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fe Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9ff Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a00 Sending msg of 28 bytes to 3 on channel testchainid took 16.2µs" +orderer0.example.com | "2020-05-20 18:20:03.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU a01 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +orderer0.example.com | "2020-05-20 18:20:03.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a02 Sending msg of 28 bytes to 2 on channel businesschannel took 90.2µs" +orderer0.example.com | "2020-05-20 18:20:03.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a03 Sending msg of 28 bytes to 3 on channel businesschannel took 34.9µs" +orderer0.example.com | "2020-05-20 18:20:03.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU a04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 765.1µs " +orderer0.example.com | "2020-05-20 18:20:03.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU a05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 992.6µs " +orderer0.example.com | "2020-05-20 18:20:03.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU a06 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:03.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU a07 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:04.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU a08 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:04.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU a09 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.3µs " +orderer0.example.com | "2020-05-20 18:20:04.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0a Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2020-05-20 18:20:04.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0b Sending msg of 28 bytes to 3 on channel businesschannel took 29.5µs" +orderer0.example.com | "2020-05-20 18:20:04.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0c Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +orderer0.example.com | "2020-05-20 18:20:04.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 607.3µs " +orderer0.example.com | "2020-05-20 18:20:04.447 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 899.9µs " +orderer0.example.com | "2020-05-20 18:20:04.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:04.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU a10 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:04.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU a11 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:04.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +orderer0.example.com | "2020-05-20 18:20:04.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU a13 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 331µs " +orderer0.example.com | "2020-05-20 18:20:04.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a14 Sending msg of 28 bytes to 2 on channel businesschannel took 269.9µs" +orderer0.example.com | "2020-05-20 18:20:04.947 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a15 Sending msg of 28 bytes to 3 on channel businesschannel took 27.8µs" +orderer0.example.com | "2020-05-20 18:20:04.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU a16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 418.4µs " +orderer0.example.com | "2020-05-20 18:20:04.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU a17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 273.3µs " +orderer0.example.com | "2020-05-20 18:20:04.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU a18 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:04.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU a19 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.319 UTC [orderer.common.server] Deliver -> DEBU a1a Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:20:05.320 UTC [common.deliver] Handle -> DEBU a1b Starting new deliver loop for 172.18.0.9:53452" +orderer0.example.com | "2020-05-20 18:20:05.320 UTC [common.deliver] Handle -> DEBU a1c Attempting to read seek info message from 172.18.0.9:53452" +orderer0.example.com | "2020-05-20 18:20:05.337 UTC [orderer.common.server] Broadcast -> DEBU a1d Starting new Broadcast handler" +orderer0.example.com | "2020-05-20 18:20:05.337 UTC [orderer.common.broadcast] Handle -> DEBU a1e Starting new broadcast loop for 172.18.0.9:53454" +orderer0.example.com | "2020-05-20 18:20:05.338 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a1f [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:53454" +orderer0.example.com | "2020-05-20 18:20:05.338 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a20 Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2020-05-20 18:20:05.338 UTC [policies] Evaluate -> DEBU a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.339 UTC [policies] Evaluate -> DEBU a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:20:05.339 UTC [policies] Evaluate -> DEBU a23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.339 UTC [policies] Evaluate -> DEBU a24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:20:05.339 UTC [policies] Evaluate -> DEBU a25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.340 UTC [msp] DeserializeIdentity -> DEBU a26 Obtaining identity" +orderer0.example.com | "2020-05-20 18:20:05.340 UTC [msp.identity] newIdentity -> DEBU a27 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +orderer0.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +orderer0.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +orderer0.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.341 UTC [cauthdsl] func1 -> DEBU a28 0xc0011063f0 gate 1589998805341621200 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:05.342 UTC [cauthdsl] func2 -> DEBU a29 0xc0011063f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:05.342 UTC [cauthdsl] func2 -> DEBU a2a 0xc0011063f0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:05.342 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a2b Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.342 UTC [msp] Validate -> DEBU a2c MSP Org2MSP validating identity" +orderer0.example.com | "2020-05-20 18:20:05.343 UTC [msp] getCertificationChain -> DEBU a2d MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:20:05.343 UTC [cauthdsl] func2 -> DEBU a2e 0xc0011063f0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:20:05.344 UTC [msp.identity] Verify -> DEBU a2f Verify: digest = 00000000 b4 40 df 75 2f af c4 27 dc ed 4d 87 b6 ce 86 a8 |.@.u/..'..M.....| +orderer0.example.com | 00000010 7d b7 3d 86 04 5f b9 e5 32 a5 c9 da 35 06 6c f5 |}.=.._..2...5.l.|" +orderer0.example.com | "2020-05-20 18:20:05.344 UTC [msp.identity] Verify -> DEBU a30 Verify: sig = 00000000 30 44 02 20 0f e0 57 53 40 3e 26 1d 72 e3 3f 5e |0D. ..WS@>&.r.?^| +orderer0.example.com | 00000010 e7 91 ce 02 fe 06 8b 8d 91 4c 31 89 4c 49 72 8c |.........L1.LIr.| +orderer0.example.com | 00000020 45 ff 03 04 02 20 78 aa ae 54 93 4c 99 bc c7 36 |E.... x..T.L...6| +orderer0.example.com | 00000030 10 78 ac 2b 05 cc 2c af ae 4d 42 3e c1 e5 5e 3d |.x.+..,..MB>..^=| +orderer0.example.com | 00000040 b5 67 24 4c d8 1d |.g$L..|" +orderer0.example.com | "2020-05-20 18:20:05.345 UTC [cauthdsl] func2 -> DEBU a31 0xc0011063f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:20:05.345 UTC [cauthdsl] func1 -> DEBU a32 0xc0011063f0 gate 1589998805341621200 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:20:05.345 UTC [policies] Evaluate -> DEBU a33 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.345 UTC [policies] Evaluate -> DEBU a34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.346 UTC [policies] Evaluate -> DEBU a35 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:05.346 UTC [policies] Evaluate -> DEBU a36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:05.347 UTC [policies] Evaluate -> DEBU a37 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:05.347 UTC [policies] Evaluate -> DEBU a38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:05.348 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:05.348 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.348 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.349 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.349 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.349 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.349 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.350 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:05.350 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.350 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.350 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.351 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.351 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.351 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.352 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.352 UTC [common.configtx] verifyDeltaSet -> DEBU a48 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.352 UTC [common.configtx] verifyDeltaSet -> DEBU a49 Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.352 UTC [common.configtx] policyForItem -> DEBU a4a Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4b Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4c Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4d Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4e Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4f Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a50 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.354 UTC [policies] Manager -> DEBU a51 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2020-05-20 18:20:05.354 UTC [policies] Manager -> DEBU a52 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.354 UTC [policies] Manager -> DEBU a53 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.354 UTC [policies] Manager -> DEBU a54 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2020-05-20 18:20:05.355 UTC [policies] Evaluate -> DEBU a55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:20:05.355 UTC [cauthdsl] func1 -> DEBU a56 0xc001123bc0 gate 1589998805355281900 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:05.355 UTC [cauthdsl] func2 -> DEBU a57 0xc001123bc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:05.355 UTC [cauthdsl] func2 -> DEBU a58 0xc001123bc0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:05.356 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a59 Checking if identity has been named explicitly as an admin for Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.356 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a5a Checking if identity carries the admin ou for Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.356 UTC [msp] Validate -> DEBU a5b MSP Org2MSP validating identity" +orderer0.example.com | "2020-05-20 18:20:05.357 UTC [msp] getCertificationChain -> DEBU a5c MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:20:05.357 UTC [msp] hasOURole -> DEBU a5d MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2020-05-20 18:20:05.357 UTC [msp] getCertificationChain -> DEBU a5e MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:20:05.358 UTC [cauthdsl] func2 -> DEBU a5f 0xc001123bc0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:20:05.358 UTC [msp.identity] Verify -> DEBU a60 Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +orderer0.example.com | 00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D|" +orderer0.example.com | "2020-05-20 18:20:05.358 UTC [msp.identity] Verify -> DEBU a61 Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +orderer0.example.com | 00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +orderer0.example.com | 00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +orderer0.example.com | 00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +orderer0.example.com | 00000040 c1 0e dd 4e f6 78 ea |...N.x.|" +orderer0.example.com | "2020-05-20 18:20:05.359 UTC [cauthdsl] func2 -> DEBU a62 0xc001123bc0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:20:05.359 UTC [cauthdsl] func1 -> DEBU a63 0xc001123bc0 gate 1589998805355281900 evaluation succeeds" +peer1.org1.example.com | [8ef 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ad b4 b4 8a c4 89 d7 65 8f e3 |0E.!.........e..| +peer1.org1.example.com | 00000010 14 ac 36 09 8b e1 3a 52 3b a7 7a 17 f7 03 b6 7c |..6...:R;.z....|| +peer1.org1.example.com | 00000020 14 4a c3 48 fe 02 20 10 fd 31 39 00 32 79 56 d0 |.J.H.. ..19.2yV.| +peer1.org1.example.com | 00000030 c7 71 61 8b 4a ef 34 f7 20 66 f1 ae 3f 73 0f a4 |.qa.J.4. f..?s..| +peer1.org1.example.com | 00000040 83 ee 02 33 57 83 98 |...3W..| +peer1.org1.example.com | [8f0 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[]}, deadMembers={[]} +peer1.org1.example.com | [8f1 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8f2 05-20 18:20:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8f3 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [8f4 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [8f5 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [8f6 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8f7 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8f8 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [8f9 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8fa 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8fb 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8fc 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8fd 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [8fe 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8ff 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [900 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [901 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [902 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [903 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [904 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [905 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032ef30 gate 1589998808640832300 evaluation starts +peer1.org1.example.com | [906 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032ef30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [907 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032ef30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [908 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032ef30 principal matched by identity 0 +peer1.org1.example.com | [909 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 8f 94 b2 f5 5e f5 1d 04 e9 db 06 83 16 6e f7 |.....^........n.| +peer1.org1.example.com | 00000010 a7 84 9c 47 f1 77 4e af 36 5d 13 80 8b 6a ae d2 |...G.wN.6]...j..| +peer1.org1.example.com | [90a 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 3e 18 0a 80 68 5a f7 bd 3a 71 |0E.!..>...hZ..:q| +peer1.org1.example.com | 00000010 bd fa 2b 39 06 97 ae f9 4b f8 9a 8a 76 6d 2e 26 |..+9....K...vm.&| +peer1.org1.example.com | 00000020 29 93 a7 dc dc 02 20 6a 8d 11 c7 7e 6f d4 2b 65 |)..... j...~o.+e| +peer1.org1.example.com | 00000030 6a 5a d7 ca 9d 26 ac e0 7a 2a fb 5d b5 4c e8 0f |jZ...&..z*.].L..| +peer1.org1.example.com | 00000040 b7 1d 24 9c b8 1a 71 |..$...q| +peer1.org1.example.com | [90b 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032ef30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [90c 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032ef30 gate 1589998808640832300 evaluation succeeds +peer1.org1.example.com | [90d 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [90e 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [90f 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [910 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [911 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [912 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [913 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [914 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [915 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [916 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [917 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [918 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [919 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [91a 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [91b 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [91c 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [91d 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [91e 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [91f 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [920 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [921 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [922 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [923 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [924 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [925 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [926 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [927 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [928 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [929 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [92a 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [92b 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [92c 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [92d 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370330 gate 1589998808668406500 evaluation starts +peer1.org1.example.com | [92e 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370330 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [735 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [736 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [737 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [738 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [739 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [73a 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [73b 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c760 gate 1589998808491036200 evaluation starts +peer1.org2.example.com | [73c 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c760 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [73d 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c760 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [73e 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [73f 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c760 principal evaluation fails +peer1.org2.example.com | [740 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c760 gate 1589998808491036200 evaluation fails +peer1.org2.example.com | [741 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [742 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [743 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [744 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cd30 gate 1589998808492759500 evaluation starts +peer1.org2.example.com | [745 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cd30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [746 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cd30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [747 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cd30 principal matched by identity 0 +peer1.org2.example.com | [748 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [749 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [74a 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cd30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [74b 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cd30 gate 1589998808492759500 evaluation succeeds +peer1.org2.example.com | [74c 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [74d 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [74e 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [74f 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [750 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ����)�����H�5���K��q���2���( +peer1.org2.example.com | [751 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [752 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [753 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [754 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [755 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [756 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [757 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [758 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [759 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [75a 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [75b 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [75c 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [75d 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [75e 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [75f 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 8f 94 b2 f5 5e f5 1d 04 e9 db 06 83 16 6e f7 |.....^........n.| +peer1.org2.example.com | 00000010 a7 84 9c 47 f1 77 4e af 36 5d 13 80 8b 6a ae d2 |...G.wN.6]...j..| +peer1.org2.example.com | [760 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 3e 18 0a 80 68 5a f7 bd 3a 71 |0E.!..>...hZ..:q| +peer1.org2.example.com | 00000010 bd fa 2b 39 06 97 ae f9 4b f8 9a 8a 76 6d 2e 26 |..+9....K...vm.&| +peer1.org2.example.com | 00000020 29 93 a7 dc dc 02 20 6a 8d 11 c7 7e 6f d4 2b 65 |)..... j...~o.+e| +peer1.org2.example.com | 00000030 6a 5a d7 ca 9d 26 ac e0 7a 2a fb 5d b5 4c e8 0f |jZ...&..z*.].L..| +peer1.org2.example.com | 00000040 b7 1d 24 9c b8 1a 71 |..$...q| +peer1.org2.example.com | [761 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [762 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [763 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [764 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [765 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [766 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [767 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [768 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [769 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [76a 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [76b 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [76c 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [76d 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [76e 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd d2 00 d0 d0 5e f9 4d 5a 09 b2 18 18 25 61 eb |.....^.MZ....%a.| +peer1.org2.example.com | 00000010 66 4c 30 42 ad 18 21 9e 82 50 3b 9e 85 29 9f 32 |fL0B..!..P;..).2| +peer1.org2.example.com | [76f 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 45 8d 27 72 c7 ff 0b 7e ea 47 6d |0D. vE.'r...~.Gm| +peer1.org2.example.com | 00000010 58 28 0e 09 6e dc bc c2 9c 75 3e 7e 96 fa 08 a0 |X(..n....u>~....| +peer1.org2.example.com | 00000020 09 44 2b a9 02 20 06 32 d3 88 1f a7 de 51 c2 db |.D+.. .2.....Q..| +peer1.org2.example.com | 00000030 7a c1 d9 d1 a3 69 d0 fa bb c3 4b ab d6 c1 b2 2b |z....i....K....+| +peer1.org2.example.com | 00000040 15 d2 f7 7c b7 2c |...|.,| +peer1.org2.example.com | [770 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [771 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 84 fe ff ad 76 fc 5d b3 fb 80 13 |0D. S....v.]....| +peer1.org2.example.com | 00000010 a9 69 27 8a e7 97 8b 05 66 5e 2a 9b 9a cd 50 33 |.i'.....f^*...P3| +peer1.org2.example.com | 00000020 ad 40 3d d6 02 20 08 53 6d ea 4f 3f e7 41 1c b0 |.@=.. .Sm.O?.A..| +peer1.org2.example.com | 00000030 ae a5 c2 cc 4c 15 2e 5e 2f 62 c2 7b af 61 20 a4 |....L..^/b.{.a .| +peer1.org2.example.com | 00000040 62 ee ab 59 9d 32 |b..Y.2| +peer1.org2.example.com | [772 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [774 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [775 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [773 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [776 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [777 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [778 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [779 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [77a 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [77c 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [77d 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [77b 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [77e 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [77f 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," secret_envelope: > alive:18q\263\207\"?h\321\331\017\262\357\237u\201\222C" secret_envelope: > +peer1.org2.example.com | [780 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org2.example.com | [781 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [782 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [783 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [784 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [785 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [786 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [787 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [788 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [789 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161015 +peer1.org2.example.com | [78a 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 567A041BE55A1F7E57AB8308B9EFFA205E70EE1FBF26774C9FBC498C2A9C67FD +peer1.org2.example.com | [78b 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [78c 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [78d 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [78e 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [78f 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [790 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [791 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [792 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [793 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [92f 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370330 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [930 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370330 principal matched by identity 0 +peer1.org1.example.com | [931 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd d2 00 d0 d0 5e f9 4d 5a 09 b2 18 18 25 61 eb |.....^.MZ....%a.| +peer1.org1.example.com | 00000010 66 4c 30 42 ad 18 21 9e 82 50 3b 9e 85 29 9f 32 |fL0B..!..P;..).2| +peer1.org1.example.com | [932 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 45 8d 27 72 c7 ff 0b 7e ea 47 6d |0D. vE.'r...~.Gm| +peer1.org1.example.com | 00000010 58 28 0e 09 6e dc bc c2 9c 75 3e 7e 96 fa 08 a0 |X(..n....u>~....| +peer1.org1.example.com | 00000020 09 44 2b a9 02 20 06 32 d3 88 1f a7 de 51 c2 db |.D+.. .2.....Q..| +peer1.org1.example.com | 00000030 7a c1 d9 d1 a3 69 d0 fa bb c3 4b ab d6 c1 b2 2b |z....i....K....+| +peer1.org1.example.com | 00000040 15 d2 f7 7c b7 2c |...|.,| +peer1.org1.example.com | [933 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370330 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [934 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370330 gate 1589998808668406500 evaluation succeeds +peer1.org1.example.com | [935 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [936 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [937 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [938 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [939 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [93a 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [93b 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [93c 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [93d 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [93e 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [93f 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [940 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [941 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [942 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [943 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [944 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [945 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > alive: +peer1.org1.example.com | [946 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org1.example.com | [947 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [948 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [949 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [94a 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [94b 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [94c 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [70e 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [70f 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [710 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [711 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [712 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 gate 1589998805877283000 evaluation starts +peer0.org1.example.com | [713 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003353a40 env 0xc0035cc190 txn 0 +peer0.org1.example.com | [714 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [715 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 70ms +peer0.org1.example.com | [716 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [717 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [718 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [719 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [71b 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [71a 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org1.example.com | [71c 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [71d 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [71e 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [71f 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org1.example.com | [720 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [721 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [722 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [723 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [724 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [725 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [726 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [794 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [795 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [796 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [797 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [798 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [799 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [79a 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [79b 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [79c 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [79d 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [79e 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [79f 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031df4b0 gate 1589998808830369200 evaluation starts +peer1.org2.example.com | [7a0 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031df4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7a1 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031df4b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [7a2 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031df4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [7a3 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031df4b0 principal evaluation fails +peer1.org2.example.com | [7a4 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031df4b0 gate 1589998808830369200 evaluation fails +peer1.org2.example.com | [7a5 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7a7 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [7a8 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [7a9 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [7a6 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7aa 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7ab 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [7ac 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dfa20 gate 1589998808836126300 evaluation starts +peer1.org2.example.com | [7ad 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dfa20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7ae 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [7e4 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7e5 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7e6 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7e7 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [7e8 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [7e9 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [7ea 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031234e0 gate 1589998807723900700 evaluation starts +peer0.org2.example.com | [7eb 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031234e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7ec 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031234e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [7ed 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031234e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [7ee 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031234e0 principal evaluation fails +peer0.org2.example.com | [7ef 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031234e0 gate 1589998807723900700 evaluation fails +peer0.org2.example.com | [7f0 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7f1 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7f2 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [7f3 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123a50 gate 1589998807724732100 evaluation starts +peer0.org2.example.com | [7f4 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123a50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7f5 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123a50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [7f6 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123a50 principal matched by identity 0 +peer0.org2.example.com | [7f7 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [7f8 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [7f9 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123a50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [7fa 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123a50 gate 1589998807724732100 evaluation succeeds +peer0.org2.example.com | [7fb 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [7fc 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [7fd 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [7fe 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [7ff 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [800 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [801 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [802 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [803 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [804 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [805 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [806 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148670 gate 1589998807728292300 evaluation starts +peer0.org2.example.com | [807 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148670 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [808 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148670 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [809 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [80a 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148670 principal evaluation fails +peer0.org2.example.com | [80b 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148670 gate 1589998807728292300 evaluation fails +peer0.org2.example.com | [80c 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [80d 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [80e 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [80f 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148be0 gate 1589998807730110900 evaluation starts +peer0.org2.example.com | [810 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148be0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [811 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148be0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [812 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148be0 principal matched by identity 0 +peer0.org2.example.com | [813 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [814 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [815 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148be0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [816 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003148be0 gate 1589998807730110900 evaluation succeeds +peer0.org2.example.com | [817 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [818 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [819 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [81a 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [81b 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [81c 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [81d 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [81e 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [81f 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [820 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [727 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [7af 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [7b0 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7b1 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dfa20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [7b2 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dfa20 principal matched by identity 0 +peer1.org2.example.com | [7b3 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +peer1.org2.example.com | 00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +peer1.org2.example.com | [7b4 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +peer1.org2.example.com | 00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +peer1.org2.example.com | 00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +peer1.org2.example.com | 00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +peer1.org2.example.com | 00000040 5c de b0 54 71 0f |\..Tq.| +peer1.org2.example.com | [7b5 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dfa20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [7b6 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dfa20 gate 1589998808836126300 evaluation succeeds +peer1.org2.example.com | [7b7 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7b8 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7b9 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [7ba 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [7bb 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [7bc 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1589998788834158300 19 {} [] 0} +peer1.org2.example.com | [7bd 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7be 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7bf 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7c0 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [7c1 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7c2 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7c3 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [7c4 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > alive: alive: +peer1.org2.example.com | [7c5 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +peer1.org2.example.com | [7c6 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [7c7 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161016 +peer1.org2.example.com | [7c8 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2D088F14761570525725C4D38911FACC42B7CDC131B55699697ADDB08D5CB434 +peer1.org2.example.com | [7c9 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [7ca 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [7cb 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [7cc 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [7ce 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7cf 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [7d0 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [7d1 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7d2 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [7d3 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7cd 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7d4 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [7d5 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7d6 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [7d7 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [7d8 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7d9 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [7da 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7db 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7dc 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [7dd 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [7de 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:20:05.359 UTC [policies] Evaluate -> DEBU a64 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.359 UTC [policies] Evaluate -> DEBU a65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.360 UTC [common.configtx] recurseConfigMap -> DEBU a66 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.360 UTC [common.configtx] recurseConfigMap -> DEBU a67 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [728 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [729 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [72a 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [72b 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00380de40)} +peer0.org1.example.com | [72c 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [72d 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [72e 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [72f 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org1.example.com | [730 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org1.example.com | [731 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org1.example.com | [732 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [733 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [734 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [735 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org1.example.com | [736 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 principal matched by identity 0 +peer0.org1.example.com | [737 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [738 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 8e fd 78 8c 51 b2 e9 7f a4 15 a2 |0D. y..x.Q......| +peer0.org1.example.com | 00000010 a3 5e ae bd c9 b9 f6 5a b9 c4 32 df 87 0b f6 fc |.^.....Z..2.....| +peer0.org1.example.com | 00000020 7b 05 e8 0c 02 20 2b b2 9b 06 5a a7 0f 7c 6e 1e |{.... +...Z..|n.| +peer0.org1.example.com | 00000030 3e f2 a9 0c ad 99 73 15 33 17 9f 6b ff 0e b6 5c |>.....s.3..k...\| +peer0.org1.example.com | 00000040 ab 32 01 69 fa e7 |.2.i..| +peer0.org1.example.com | [739 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [73a 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 gate 1589998805877283000 evaluation succeeds +peer0.org1.example.com | [73b 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [73c 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [73d 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [73e 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xf5, 0x87, 0x9d, 0xf3, 0xcd, 0xbf, 0xbf, 0x43, 0x96, 0xe2, 0xb0, 0xb9, 0x62, 0xaf, 0x50, 0x91, 0xe3, 0xeb, 0x80, 0x22, 0x57, 0x52, 0xd1, 0xfd, 0x79, 0x4c, 0xe4, 0xfe, 0xe5, 0xa7, 0x26, 0x2a} txOffsets= +peer0.org1.example.com | txId=11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0 locPointer=offset=71, bytesLength=27141 +peer0.org1.example.com | ] +peer0.org1.example.com | [73f 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56747, bytesLength=27141] for tx ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to txid-index +peer0.org1.example.com | [740 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56747, bytesLength=27141] for tx number:[0] ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to blockNumTranNum index +peer0.org1.example.com | [741 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [742 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org1.example.com | [743 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [744 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [745 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [746 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161011 +peer0.org1.example.com | [747 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84881], isChainEmpty=[false], lastBlockNumber=[2] +peer0.org1.example.com | [748 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer0.org1.example.com | [749 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3EE13C74A68B071D38C535DA0DDB119CF99557941C0DF8BACF878EA7D3E8901B +peer0.org1.example.com | [74a 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [74b 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [74c 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [74d 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [74e 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:8401356067006766998 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [74f 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:8401356067006766998 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [750 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [751 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer0.org1.example.com | [752 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer0.org1.example.com | [753 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [94d 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [94e 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [94f 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [950 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +peer1.org1.example.com | 00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +peer1.org1.example.com | [951 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +peer1.org1.example.com | 00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +peer1.org1.example.com | 00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +peer1.org1.example.com | 00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +peer1.org1.example.com | 00000040 5c de b0 54 71 0f |\..Tq.| +peer1.org1.example.com | [952 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [953 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 83 cb 98 a2 23 01 d4 81 0a 7a 5f |0D. b....#....z_| +peer1.org1.example.com | 00000010 d7 67 ba 78 1d 46 b6 81 cc 40 93 22 53 49 79 21 |.g.x.F...@."SIy!| +peer1.org1.example.com | 00000020 df ae ad 64 02 20 7e a9 50 8b 93 50 a1 16 c2 80 |...d. ~.P..P....| +peer1.org1.example.com | 00000030 a9 df 0e c0 2f ad 9c c5 2a 0a 6e 5f ca 41 fc b3 |..../...*.n_.A..| +peer1.org1.example.com | 00000040 eb 4c 99 27 bd 2a |.L.'.*| +peer1.org1.example.com | [954 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [955 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [956 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [957 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [958 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [959 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [95a 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [95b 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [95c 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [95d 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [95e 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [95f 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [960 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [961 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [962 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [963 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [964 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [965 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [7df 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321a690 gate 1589998808855973600 evaluation starts +peer1.org2.example.com | [7e0 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321a690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7e1 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321a690 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [7e2 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321a690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [7e3 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321a690 principal evaluation fails +peer1.org2.example.com | [7e4 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321a690 gate 1589998808855973600 evaluation fails +peer1.org2.example.com | [7e5 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7e6 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7e7 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [7e8 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321ac00 gate 1589998808857787300 evaluation starts +peer1.org2.example.com | [7e9 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321ac00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7ea 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321ac00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [7eb 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321ac00 principal matched by identity 0 +peer1.org2.example.com | [7ec 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 be 99 bd 20 9f 3b 24 9a c0 65 15 08 36 7b b4 |.... .;$..e..6{.| +peer1.org2.example.com | 00000010 16 31 2a 4a 62 c4 d4 8e eb da d0 d3 e9 14 6e 22 |.1*Jb.........n"| +peer1.org2.example.com | [7ed 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 4d 53 f8 c1 81 af 7e bc 00 ac e6 |0D. 1MS....~....| +peer1.org2.example.com | 00000010 97 04 4e 16 7f e8 d5 77 99 84 9b 43 4d d5 7a ac |..N....w...CM.z.| +peer1.org2.example.com | 00000020 cb 6a e4 c7 02 20 60 82 26 4a 8e 1f 07 92 97 39 |.j... `.&J.....9| +peer1.org2.example.com | 00000030 a1 36 e6 ad 35 6b b4 aa 5d f9 99 fb 0d fc 4e 8a |.6..5k..].....N.| +peer1.org2.example.com | 00000040 60 b3 a8 9a 5b 33 |`...[3| +peer1.org2.example.com | [7ee 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321ac00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [7ef 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321ac00 gate 1589998808857787300 evaluation succeeds +peer1.org2.example.com | [7f0 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7f1 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7f2 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [7f3 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [7f4 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [7f5 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1589998788834158300, 19 but got ts: inc_num:1589998788834158300 seq_num:18 +peer1.org2.example.com | [7f6 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7f7 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7f8 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7f9 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7fa 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7fb 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7fc 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [7fd 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [7fe 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7ff 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [800 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [801 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [802 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [803 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [804 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 08 8f 14 76 15 70 52 57 25 c4 d3 89 11 fa cc |-...v.pRW%......| +peer1.org2.example.com | 00000010 42 b7 cd c1 31 b5 56 99 69 7a dd b0 8d 5c b4 34 |B...1.V.iz...\.4| +peer1.org2.example.com | [805 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 2d 6b 9d a2 9f cf cf 60 bb 56 |0E.!..-k.....`.V| +peer1.org2.example.com | 00000010 f3 70 27 ff 85 ff 42 a6 92 a1 b0 e3 7b 7e 50 f6 |.p'...B.....{~P.| +peer1.org2.example.com | 00000020 e3 ac f3 a1 85 02 20 60 e4 64 0a 0e 8e 68 87 da |...... `.d...h..| +peer1.org2.example.com | 00000030 8b 46 51 54 06 3f 96 59 52 00 02 3c 4d fa 27 51 |.FQT.?.YR..| +peer1.org2.example.com | [806 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [807 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 f0 73 5b 8f 6a 72 7b 08 ef a9 a4 |0D. e.s[.jr{....| +peer1.org2.example.com | 00000010 8b 75 c5 18 33 2a 68 87 f6 87 12 42 ea bd 27 23 |.u..3*h....B..'#| +peer1.org2.example.com | 00000020 92 a4 f9 0a 02 20 7d ab cd 68 35 9b 34 71 15 4e |..... }..h5.4q.N| +peer1.org2.example.com | 00000030 ca 7e 51 cb 84 96 b0 e3 af db 91 36 18 50 21 da |.~Q........6.P!.| +peer1.org2.example.com | 00000040 89 f2 e6 9d 1a cd |......| +peer1.org2.example.com | [808 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [809 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [80a 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [80b 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [80c 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [966 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 be 99 bd 20 9f 3b 24 9a c0 65 15 08 36 7b b4 |.... .;$..e..6{.| +peer1.org1.example.com | 00000010 16 31 2a 4a 62 c4 d4 8e eb da d0 d3 e9 14 6e 22 |.1*Jb.........n"| +peer1.org1.example.com | [967 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 4d 53 f8 c1 81 af 7e bc 00 ac e6 |0D. 1MS....~....| +peer1.org1.example.com | 00000010 97 04 4e 16 7f e8 d5 77 99 84 9b 43 4d d5 7a ac |..N....w...CM.z.| +peer1.org1.example.com | 00000020 cb 6a e4 c7 02 20 60 82 26 4a 8e 1f 07 92 97 39 |.j... `.&J.....9| +peer1.org1.example.com | 00000030 a1 36 e6 ad 35 6b b4 aa 5d f9 99 fb 0d fc 4e 8a |.6..5k..].....N.| +peer1.org1.example.com | 00000040 60 b3 a8 9a 5b 33 |`...[3| +peer1.org1.example.com | [968 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [969 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1589998788834158300, 19 but got ts: inc_num:1589998788834158300 seq_num:18 +peer1.org1.example.com | [96a 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [96b 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [96c 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [96d 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [96e 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [96f 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [970 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [971 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [972 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [973 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [974 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [975 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [976 05-20 18:20:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [977 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [978 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [979 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [97a 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [97b 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [97c 05-20 18:20:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer1.org1.example.com | [97d 05-20 18:20:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [97e 05-20 18:20:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [97f 05-20 18:20:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [980 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13029578643355854470, Envelope: 962 bytes, Signature: 0 bytes +peer1.org1.example.com | [981 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13029578643355854470, Envelope: 962 bytes, Signature: 0 bytes +peer1.org1.example.com | [982 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [821 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [822 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [823 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [824 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ed0 gate 1589998807734261100 evaluation starts +peer0.org2.example.com | [825 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [826 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [827 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [828 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [829 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [82a 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [82b 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ed0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [82c 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [82d 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ed0 principal evaluation fails +peer0.org2.example.com | [82e 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ed0 gate 1589998807734261100 evaluation fails +peer0.org2.example.com | [82f 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [830 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [831 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [832 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e5b0 gate 1589998807750346300 evaluation starts +peer0.org2.example.com | [833 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e5b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [834 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e5b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [835 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e5b0 principal matched by identity 0 +peer0.org2.example.com | [836 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [837 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [838 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e5b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [839 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e5b0 gate 1589998807750346300 evaluation succeeds +peer0.org2.example.com | [83a 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [83b 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [83c 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [83d 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [83e 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [83f 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [840 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [841 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [842 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [843 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [844 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [845 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [846 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [847 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [848 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [849 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [84a 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [84b 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318fb80 gate 1589998807766285500 evaluation starts +peer0.org2.example.com | [84c 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318fb80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [84d 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318fb80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [84e 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318fb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [84f 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318fb80 principal evaluation fails +peer0.org2.example.com | [850 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318fb80 gate 1589998807766285500 evaluation fails +peer0.org2.example.com | [851 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [852 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [853 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [854 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c00f0 gate 1589998807768601000 evaluation starts +peer0.org2.example.com | [855 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c00f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [856 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c00f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [857 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c00f0 principal matched by identity 0 +peer1.org2.example.com | [80d 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [80e 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [80f 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [810 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [811 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [812 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [813 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [814 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [815 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [816 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd d2 00 d0 d0 5e f9 4d 5a 09 b2 18 18 25 61 eb |.....^.MZ....%a.| +peer1.org2.example.com | 00000010 66 4c 30 42 ad 18 21 9e 82 50 3b 9e 85 29 9f 32 |fL0B..!..P;..).2| +peer1.org2.example.com | [817 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 45 8d 27 72 c7 ff 0b 7e ea 47 6d |0D. vE.'r...~.Gm| +peer1.org2.example.com | 00000010 58 28 0e 09 6e dc bc c2 9c 75 3e 7e 96 fa 08 a0 |X(..n....u>~....| +peer1.org2.example.com | 00000020 09 44 2b a9 02 20 06 32 d3 88 1f a7 de 51 c2 db |.D+.. .2.....Q..| +peer1.org2.example.com | 00000030 7a c1 d9 d1 a3 69 d0 fa bb c3 4b ab d6 c1 b2 2b |z....i....K....+| +peer1.org2.example.com | 00000040 15 d2 f7 7c b7 2c |...|.,| +peer1.org2.example.com | [818 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [819 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [81a 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [81b 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 08 8f 14 76 15 70 52 57 25 c4 d3 89 11 fa cc |-...v.pRW%......| +peer1.org2.example.com | 00000010 42 b7 cd c1 31 b5 56 99 69 7a dd b0 8d 5c b4 34 |B...1.V.iz...\.4| +peer1.org2.example.com | [81c 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 2d 6b 9d a2 9f cf cf 60 bb 56 |0E.!..-k.....`.V| +peer1.org2.example.com | 00000010 f3 70 27 ff 85 ff 42 a6 92 a1 b0 e3 7b 7e 50 f6 |.p'...B.....{~P.| +peer1.org2.example.com | 00000020 e3 ac f3 a1 85 02 20 60 e4 64 0a 0e 8e 68 87 da |...... `.d...h..| +peer1.org2.example.com | 00000030 8b 46 51 54 06 3f 96 59 52 00 02 3c 4d fa 27 51 |.FQT.?.YR..| +peer1.org2.example.com | [81d 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [81e 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [81f 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [820 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [821 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [822 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [823 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [824 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [825 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [826 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [827 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [828 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [829 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [82a 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [82b 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer1.org2.example.com | [82c 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [82d 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [82e 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [82f 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7065533172220683528, Envelope: 961 bytes, Signature: 0 bytes +peer1.org2.example.com | [830 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7065533172220683528, Envelope: 961 bytes, Signature: 0 bytes +peer1.org2.example.com | [831 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer1.org2.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer1.org2.example.com | [832 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 99 79 7b 92 b7 58 27 f8 68 51 |0E.!...y{..X'.hQ| +peer1.org2.example.com | 00000010 e9 4d 29 a0 c1 f2 8e 3e b0 be a3 54 d3 c2 c6 e7 |.M)....>...T....| +peer1.org2.example.com | 00000020 7e e2 56 cc c6 02 20 22 29 78 c2 5a a5 a5 88 c2 |~.V... ")x.Z....| +peer1.org2.example.com | 00000030 f8 57 2f 1f 8f 8e 08 26 d1 18 29 5c 37 fa 22 bf |.W/....&..)\7.".| +peer1.org2.example.com | 00000040 fe 29 d3 32 f6 2c c2 |.).2.,.| +peer1.org2.example.com | [833 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7065533172220683528, Envelope: 961 bytes, Signature: 0 bytes +peer1.org2.example.com | [834 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org2.example.com | [835 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 2 +peer1.org2.example.com | [836 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [837 05-20 18:20:10.47 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] +peer1.org2.example.com | [838 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [839 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [83a 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 71 26 e9 cd 14 e6 aa 29 48 b0 ae cf 59 5e 80 |.q&.....)H...Y^.| +peer1.org2.example.com | 00000010 a5 73 16 34 86 9a 1b 92 6e ac 94 e2 f5 03 10 4e |.s.4....n......N| +peer1.org2.example.com | [83b 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 7b 7e 2d e6 b9 93 53 e1 90 18 |0E.!..{~-...S...| +peer1.org2.example.com | 00000010 9f c0 1b 07 39 4d e1 50 0c 96 6b 99 d5 3c fa b6 |....9M.P..k..<..| +peer1.org2.example.com | 00000020 65 12 ff e8 65 02 20 36 4d a0 0b 90 fd bf 28 ec |e...e. 6M.....(.| +peer1.org2.example.com | 00000030 45 22 f1 08 2d 4e f5 b9 34 81 06 10 de 73 88 b0 |E"..-N..4....s..| +peer1.org2.example.com | 00000040 b0 7c 00 56 ec c4 69 |.|.V..i| +peer1.org2.example.com | [83c 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [83d 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [83e 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us declaration +peer1.org2.example.com | [83f 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [840 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [841 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [842 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610031801 +peer1.org2.example.com | [843 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 45EE0BF4E930E37A33AA8216F3A617565EC389BAD6B48F20C6A509C0E5F3E3C0 +peer0.org2.example.com | [858 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [859 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [85a 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c00f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [85b 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c00f0 gate 1589998807768601000 evaluation succeeds +peer0.org2.example.com | [85c 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [85d 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [85e 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [85f 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [860 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [861 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [862 05-20 18:20:07.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [863 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [864 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [865 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [866 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [867 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [868 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [869 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [86a 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [86b 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [86c 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [86d 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [86e 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [86f 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [870 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0d10 gate 1589998807922155500 evaluation starts +peer0.org2.example.com | [871 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0d10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [872 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0d10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [873 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [874 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0d10 principal evaluation fails +peer0.org2.example.com | [875 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0d10 gate 1589998807922155500 evaluation fails +peer0.org2.example.com | [876 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [877 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [878 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [983 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [984 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [985 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [986 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [987 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [988 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [989 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e39c0 gate 1589998809294146200 evaluation starts +peer1.org1.example.com | [98a 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e39c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [98b 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e39c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [98c 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e39c0 principal matched by identity 0 +peer1.org1.example.com | [98d 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer1.org1.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer1.org1.example.com | [98e 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 99 79 7b 92 b7 58 27 f8 68 51 |0E.!...y{..X'.hQ| +peer1.org1.example.com | 00000010 e9 4d 29 a0 c1 f2 8e 3e b0 be a3 54 d3 c2 c6 e7 |.M)....>...T....| +peer1.org1.example.com | 00000020 7e e2 56 cc c6 02 20 22 29 78 c2 5a a5 a5 88 c2 |~.V... ")x.Z....| +peer1.org1.example.com | 00000030 f8 57 2f 1f 8f 8e 08 26 d1 18 29 5c 37 fa 22 bf |.W/....&..)\7.".| +peer1.org1.example.com | 00000040 fe 29 d3 32 f6 2c c2 |.).2.,.| +peer1.org1.example.com | [98f 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e39c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [990 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e39c0 gate 1589998809294146200 evaluation succeeds +peer1.org1.example.com | [991 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [992 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [993 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [994 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [995 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [996 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [997 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13029578643355854470, Envelope: 962 bytes, Signature: 0 bytes +peer1.org1.example.com | [998 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:05.361 UTC [common.configtx] recurseConfigMap -> DEBU a68 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.361 UTC [common.configtx] recurseConfigMap -> DEBU a69 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.361 UTC [common.configtx] recurseConfigMap -> DEBU a6a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.361 UTC [common.configtx] recurseConfigMap -> DEBU a6b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.362 UTC [common.configtx] recurseConfigMap -> DEBU a6c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.362 UTC [common.configtx] recurseConfigMap -> DEBU a6d Setting policy for key Readers to " +orderer0.example.com | "2020-05-20 18:20:05.362 UTC [common.configtx] recurseConfigMap -> DEBU a6e Setting policy for key Writers to " +orderer0.example.com | "2020-05-20 18:20:05.363 UTC [common.configtx] recurseConfigMap -> DEBU a6f Setting policy for key Admins to " +orderer0.example.com | "2020-05-20 18:20:05.363 UTC [common.configtx] recurseConfigMap -> DEBU a70 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.363 UTC [common.configtx] recurseConfigMap -> DEBU a71 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.363 UTC [common.configtx] recurseConfigMap -> DEBU a72 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.364 UTC [common.configtx] recurseConfigMap -> DEBU a73 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.364 UTC [common.configtx] recurseConfigMap -> DEBU a74 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.364 UTC [common.configtx] recurseConfigMap -> DEBU a75 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.364 UTC [common.configtx] recurseConfigMap -> DEBU a76 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.365 UTC [common.configtx] recurseConfigMap -> DEBU a77 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.365 UTC [common.configtx] recurseConfigMap -> DEBU a78 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.365 UTC [common.configtx] recurseConfigMap -> DEBU a79 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.365 UTC [common.configtx] recurseConfigMap -> DEBU a7a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.366 UTC [common.channelconfig] NewStandardValues -> DEBU a7b Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:20:05.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7c Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:05.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7d Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:05.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7e Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:05.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7f Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a80 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] NewStandardValues -> DEBU a81 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a82 Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a83 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] NewStandardValues -> DEBU a84 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a85 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] NewStandardValues -> DEBU a86 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a87 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] Validate -> DEBU a88 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [common.channelconfig] validateMSP -> DEBU a89 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [msp] newBccspMsp -> DEBU a8a Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [msp] New -> DEBU a8b Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.367 UTC [msp] Setup -> DEBU a8c Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [msp.identity] newIdentity -> DEBU a8d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [common.channelconfig] NewStandardValues -> DEBU a8e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8f Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [common.channelconfig] NewStandardValues -> DEBU a90 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [common.channelconfig] initializeProtosStruct -> DEBU a91 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [common.channelconfig] Validate -> DEBU a92 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [common.channelconfig] validateMSP -> DEBU a93 Setting up MSP for org Org1MSP" +peer1.org1.example.com | [999 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [99a 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [99b 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [99c 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [99d 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 3 +peer1.org1.example.com | [99e 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [754 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [755 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [756 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [757 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [758 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [759 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [75a 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [75b 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [75c 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [75d 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org1.example.com | [75e 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org1.example.com | [75f 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org1.example.com | [760 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [761 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer0.org1.example.com | [762 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer0.org1.example.com | [763 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [764 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003947d50, CONNECTING +peer0.org1.example.com | [765 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org1.example.com | [766 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 50ms (state_validation=11ms block_and_pvtdata_commit=25ms state_commit=6ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org1.example.com | [767 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [768 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8EB97EEBEEFB38816...096D8DADEA4206176416CB532A020803 +peer0.org1.example.com | [769 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8E7EE9C5538D1B6243BF2378D59AED6607558C5C9BB46A06AC3166B0B70AC3DE +peer0.org1.example.com | [76a 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer0.org1.example.com | [76b 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003947d50, READY +peer0.org1.example.com | [76c 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [76d 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [76e 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [76f 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer0.org1.example.com | [770 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer0.org1.example.com | [771 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [772 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [773 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [774 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [775 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [776 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [777 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [778 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [779 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [77a 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [77b 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [77c 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [77d 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [77e 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 gate 1589998805962140700 evaluation starts +peer0.org1.example.com | [77f 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [780 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [781 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 principal matched by identity 0 +peer0.org1.example.com | [782 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [783 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 03 40 1d 4a 00 9d db bd f3 |0E.!....@.J.....| +peer0.org1.example.com | 00000010 35 c4 6e 2f 81 83 34 a3 fd 64 55 ad 6d 79 c4 bc |5.n/..4..dU.my..| +peer0.org1.example.com | 00000020 f2 92 0b 2b e2 02 20 67 e5 ea 88 8c 0b d0 80 a3 |...+.. g........| +peer0.org1.example.com | 00000030 62 e4 af d5 8b 12 15 23 07 85 42 66 bc 90 ba c2 |b......#..Bf....| +peer0.org1.example.com | 00000040 7d c3 da 0e 3d e6 ea |}...=..| +peer0.org1.example.com | [784 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [785 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 gate 1589998805962140700 evaluation succeeds +peer0.org1.example.com | [786 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [787 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [788 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [789 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [78a 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org1.example.com | [78b 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [78c 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [78d 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [78e 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:07.992Z grpc.peer_address=172.18.0.8:57956 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=249.1µs +peer0.org1.example.com | [78f 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [790 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [791 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [792 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:57956 +peer0.org1.example.com | [793 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57956 +peer0.org1.example.com | [794 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [795 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e1 90 a0 43 ca 0e 11 20 b5 57 84 |0D. ^...C... .W.| +peer0.org1.example.com | 00000010 d5 b7 8a dc 55 3a 28 02 ce 94 4b ed b5 84 2c 56 |....U:(...K...,V| +peer0.org1.example.com | 00000020 76 a7 02 22 02 20 11 6c 30 50 f2 a7 2c 26 b2 1f |v..". .l0P..,&..| +peer0.org1.example.com | 00000030 e4 41 20 68 e5 2c 82 9d e5 bc 59 c7 c8 67 41 80 |.A h.,....Y..gA.| +peer0.org1.example.com | 00000040 20 56 df ba 68 67 | V..hg| +peer0.org1.example.com | [796 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57956 +peer0.org1.example.com | [797 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57956 +peer0.org1.example.com | [798 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8401356067006766998, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org1.example.com | [799 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 8401356067006766998, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer1.org1.example.com | [99f 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [9a0 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [9a1 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [9a2 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a3 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a4 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9a5 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [9a6 05-20 18:20:09.90 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]] +peer1.org1.example.com | [9a7 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47726 +peer1.org1.example.com | [9a8 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00038df40 +peer1.org1.example.com | [9a9 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [9aa 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [9ab 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [9ac 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [9ad 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 fa 8c c2 a4 1b ee b3 21 a1 3b 52 65 21 3d 9a |........!.;Re!=.| +peer1.org1.example.com | 00000010 37 d0 45 e1 e8 76 4a e8 05 16 cf 40 c5 78 f7 27 |7.E..vJ....@.x.'| +peer1.org1.example.com | [9ae 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 4b b2 49 75 67 32 4a 0d 3b 2f 97 |0D. NK.Iug2J.;/.| +peer1.org1.example.com | 00000010 f4 60 1f 5f 9e 02 97 d7 00 9f 19 a6 b4 98 d6 7c |.`._...........|| +peer1.org1.example.com | 00000020 da 35 a9 50 02 20 3b ef b1 30 3e 55 46 59 2c fa |.5.P. ;..0>UFY,.| +peer1.org1.example.com | 00000030 c7 7f 92 ed ff 56 a7 a0 2a 35 35 c1 64 f5 f1 2c |.....V..*55.d..,| +peer1.org1.example.com | 00000040 27 ff cb 11 52 29 |'...R)| +peer1.org1.example.com | [9af 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [9b0 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001bcf50, header 0xc000520370 +peer1.org1.example.com | [9b1 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [9b2 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU [][35dffae1] processing txid: 35dffae16335f2a43b56e28b6ff82dfeeb1e450bd0634a01ceabbe3f25079392 +peer1.org1.example.com | [9b3 05-20 18:20:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU [][35dffae1] Entry chaincode: name:"lscc" +peer1.org1.example.com | [9b4 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> INFO [][35dffae1] Entry chaincode: name:"lscc" +peer1.org1.example.com | [9b5 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [9b6 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 fa 8c c2 a4 1b ee b3 21 a1 3b 52 65 21 3d 9a |........!.;Re!=.| +peer1.org1.example.com | 00000010 37 d0 45 e1 e8 76 4a e8 05 16 cf 40 c5 78 f7 27 |7.E..vJ....@.x.'| +peer1.org1.example.com | [9b7 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 4b b2 49 75 67 32 4a 0d 3b 2f 97 |0D. NK.Iug2J.;/.| +peer1.org1.example.com | 00000010 f4 60 1f 5f 9e 02 97 d7 00 9f 19 a6 b4 98 d6 7c |.`._...........|| +peer1.org1.example.com | 00000020 da 35 a9 50 02 20 3b ef b1 30 3e 55 46 59 2c fa |.5.P. ;..0>UFY,.| +peer1.org1.example.com | 00000030 c7 7f 92 ed ff 56 a7 a0 2a 35 35 c1 64 f5 f1 2c |.....V..*55.d..,| +peer1.org1.example.com | 00000040 27 ff cb 11 52 29 |'...R)| +peer1.org1.example.com | [9b8 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | [9b9 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer1.org1.example.com | [9ba 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org1.example.com | [9bb 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [82696b3d-1eed-40b5-a4d4-d258aeb50b5d] +peer1.org1.example.com | [9bc 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [9bd 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [82696b3d-1eed-40b5-a4d4-d258aeb50b5d] +peer1.org1.example.com | [9be 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer1.org1.example.com | [9bf 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [msp] newBccspMsp -> DEBU a94 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [msp] New -> DEBU a95 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.368 UTC [msp] Setup -> DEBU a96 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [msp.identity] newIdentity -> DEBU a97 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] NewStandardValues -> DEBU a98 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a99 Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9a Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9b Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9c Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9d Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9e Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] NewStandardValues -> DEBU a9f Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU aa0 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:20:05.369 UTC [common.channelconfig] NewStandardValues -> DEBU aa1 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU aa2 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.371 UTC [common.channelconfig] validateMSP -> DEBU aa3 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.372 UTC [msp] newBccspMsp -> DEBU aa4 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.372 UTC [msp] New -> DEBU aa5 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.373 UTC [msp] Setup -> DEBU aa6 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:20:05.373 UTC [msp.identity] newIdentity -> DEBU aa7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.375 UTC [msp] Setup -> DEBU aa8 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:20:05.375 UTC [msp] Setup -> DEBU aa9 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:20:05.376 UTC [policies] NewManagerImpl -> DEBU aaa Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.376 UTC [policies] NewManagerImpl -> DEBU aab Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.376 UTC [policies] NewManagerImpl -> DEBU aac Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.377 UTC [policies] NewManagerImpl -> DEBU aad Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.377 UTC [policies] NewManagerImpl -> DEBU aae Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.377 UTC [policies] NewManagerImpl -> DEBU aaf Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.378 UTC [policies] GetPolicy -> DEBU ab0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.378 UTC [policies] GetPolicy -> DEBU ab1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.378 UTC [policies] NewManagerImpl -> DEBU ab2 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.379 UTC [policies] NewManagerImpl -> DEBU ab3 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.379 UTC [policies] NewManagerImpl -> DEBU ab4 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.380 UTC [policies] NewManagerImpl -> DEBU ab5 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.380 UTC [policies] GetPolicy -> DEBU ab6 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.380 UTC [policies] GetPolicy -> DEBU ab7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.380 UTC [policies] NewManagerImpl -> DEBU ab8 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.381 UTC [policies] NewManagerImpl -> DEBU ab9 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.381 UTC [policies] NewManagerImpl -> DEBU aba Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.381 UTC [policies] NewManagerImpl -> DEBU abb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.382 UTC [policies] NewManagerImpl -> DEBU abc Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.382 UTC [policies] NewManagerImpl -> DEBU abd Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.382 UTC [policies] NewManagerImpl -> DEBU abe Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.382 UTC [policies] NewManagerImpl -> DEBU abf Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.383 UTC [policies] NewManagerImpl -> DEBU ac0 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:20:05.383 UTC [policies] NewManagerImpl -> DEBU ac1 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:20:05.383 UTC [policies] NewManagerImpl -> DEBU ac2 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac3 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac5 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | [79a 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [79b 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8401356067006766998, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org1.example.com | [79c 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [79d 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e e1 3c 74 a6 8b 07 1d 38 c5 35 da 0d db 11 9c |>. DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ad b4 b4 8a c4 89 d7 65 8f e3 |0E.!.........e..| +peer0.org1.example.com | 00000010 14 ac 36 09 8b e1 3a 52 3b a7 7a 17 f7 03 b6 7c |..6...:R;.z....|| +peer0.org1.example.com | 00000020 14 4a c3 48 fe 02 20 10 fd 31 39 00 32 79 56 d0 |.J.H.. ..19.2yV.| +peer0.org1.example.com | 00000030 c7 71 61 8b 4a ef 34 f7 20 66 f1 ae 3f 73 0f a4 |.qa.J.4. f..?s..| +peer0.org1.example.com | 00000040 83 ee 02 33 57 83 98 |...3W..| +peer0.org1.example.com | [79f 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [7a0 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [7a1 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7a2 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [7a3 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7a4 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7a5 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7a6 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7a7 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [7a8 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:57956 disconnected +peer0.org1.example.com | [7a9 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:15.998Z grpc.peer_address=172.18.0.8:57956 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.5076ms +peer0.org1.example.com | [7aa 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7ab 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [7ac 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [7ad 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 gate 1589998806043740000 evaluation starts +peer0.org1.example.com | [7ae 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [7af 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [7b0 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 principal matched by identity 0 +peer0.org1.example.com | [7b1 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 23 57 95 6b d7 8b e3 45 12 ee ef 02 4d 59 c0 |.#W.k...E....MY.| +peer0.org1.example.com | 00000010 21 9c 88 f7 69 25 2e f6 47 8b 5b 3e a4 50 a7 45 |!...i%..G.[>.P.E| +peer0.org1.example.com | [7b2 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 8c ee 60 61 00 08 aa 89 78 a3 b4 |0D. ...`a....x..| +peer0.org1.example.com | 00000010 eb 15 c2 43 72 5e c6 1d d3 d9 a6 89 1a 3f b9 d5 |...Cr^.......?..| +peer0.org1.example.com | 00000020 3e 3c e9 6e 02 20 7e 78 79 7c de 4a 02 d5 05 8f |><.n. ~xy|.J....| +peer0.org1.example.com | 00000030 29 ef ad 69 d8 40 1a 5c 46 bd 96 8f f1 e9 44 43 |)..i.@.\F.....DC| +peer0.org1.example.com | 00000040 ef ad a7 74 0c c8 |...t..| +peer0.org1.example.com | [7b3 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [7b4 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 gate 1589998806043740000 evaluation succeeds +peer0.org1.example.com | [7b5 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7b6 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7b7 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [7b8 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [7b9 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [844 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [845 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [846 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [847 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [848 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [84a 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [849 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [84b 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [84c 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [84d 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [84e 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [84f 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:33334 +peer1.org2.example.com | [850 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0031d72c0 +peer1.org2.example.com | [851 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [852 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [853 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [854 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [855 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e f7 01 1f f4 d6 85 a6 cd 64 c3 9c d4 8a 7d 71 |.........d....}q| +peer1.org2.example.com | 00000010 f6 33 a8 82 c4 22 db 59 01 4d 0b 15 37 8d 64 24 |.3...".Y.M..7.d$| +peer1.org2.example.com | [856 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 64 65 9e a7 19 52 30 8e 3d 71 |0E.!..de...R0.=q| +peer1.org2.example.com | 00000010 31 25 ff 15 79 f5 0f e5 38 8e 0c 4b 42 91 c0 18 |1%..y...8..KB...| +peer1.org2.example.com | 00000020 f6 a7 5a 22 7f 02 20 46 9d 41 23 df 89 d4 af b9 |..Z".. F.A#.....| +peer1.org2.example.com | 00000030 77 50 9f 9d 4a ea 82 43 f6 27 bb dc 58 85 b7 41 |wP..J..C.'..X..A| +peer1.org2.example.com | 00000040 06 47 0a fc b8 d0 2b |.G....+| +peer1.org2.example.com | [857 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [858 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00293e310, header 0xc0031d76d0 +peer1.org2.example.com | [859 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org2.example.com | [85a 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU [][9ed3f240] processing txid: 9ed3f2403b7afa8a384006b8354330eb74027103c5f41a51e1cf91398f432289 +peer1.org2.example.com | [85b 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU [][9ed3f240] Entry chaincode: name:"lscc" +peer1.org2.example.com | [85c 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> INFO [][9ed3f240] Entry chaincode: name:"lscc" +peer1.org2.example.com | [85d 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [85e 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e f7 01 1f f4 d6 85 a6 cd 64 c3 9c d4 8a 7d 71 |.........d....}q| +peer1.org2.example.com | 00000010 f6 33 a8 82 c4 22 db 59 01 4d 0b 15 37 8d 64 24 |.3...".Y.M..7.d$| +peer1.org2.example.com | [85f 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 64 65 9e a7 19 52 30 8e 3d 71 |0E.!..de...R0.=q| +peer1.org2.example.com | 00000010 31 25 ff 15 79 f5 0f e5 38 8e 0c 4b 42 91 c0 18 |1%..y...8..KB...| +peer1.org2.example.com | 00000020 f6 a7 5a 22 7f 02 20 46 9d 41 23 df 89 d4 af b9 |..Z".. F.A#.....| +peer1.org2.example.com | 00000030 77 50 9f 9d 4a ea 82 43 f6 27 bb dc 58 85 b7 41 |wP..J..C.'..X..A| +peer1.org2.example.com | 00000040 06 47 0a fc b8 d0 2b |.G....+| +peer1.org2.example.com | [860 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org2.example.com | [861 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer1.org2.example.com | [862 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org2.example.com | [863 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [37859fca-a319-426d-8076-b441085f2e7f] +peer1.org2.example.com | [864 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [865 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [37859fca-a319-426d-8076-b441085f2e7f] +peer1.org2.example.com | [866 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer1.org2.example.com | [867 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org2.example.com | [868 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [9ed3f240] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [869 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [9ed3f240] notifying Txid:9ed3f2403b7afa8a384006b8354330eb74027103c5f41a51e1cf91398f432289, channelID: +peer1.org2.example.com | [86a 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [86b 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> INFO [][9ed3f240] Exit chaincode: name:"lscc" (4ms) +peer1.org2.example.com | [86c 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [][9ed3f240] Exit +peer1.org2.example.com | [86d 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:33334 +peer1.org2.example.com | [86e 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33334 grpc.code=OK grpc.call_duration=9.2559ms +peer0.org1.example.com | [7ba 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer0.org1.example.com | [7bb 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [7bc 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7bd 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7be 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7bf 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7c0 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7c1 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7c2 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.341Z grpc.peer_address=172.18.0.5:34180 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=235.9µs +peer0.org1.example.com | [7c3 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [7c4 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [7c5 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [7c6 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:34180 +peer0.org1.example.com | [7c7 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34180 +peer0.org1.example.com | [7c8 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7c9 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7ca 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9c0 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU [35dffae1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [9c1 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU [35dffae1] notifying Txid:35dffae16335f2a43b56e28b6ff82dfeeb1e450bd0634a01ceabbe3f25079392, channelID: +peer1.org1.example.com | [9c2 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [9c3 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> INFO [][35dffae1] Exit chaincode: name:"lscc" (4ms) +peer1.org1.example.com | [9c4 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][35dffae1] Exit +peer1.org1.example.com | [9c5 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47726 +peer1.org1.example.com | [9c6 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47726 grpc.code=OK grpc.call_duration=7.9806ms +peer1.org1.example.com | [9c7 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [9c8 05-20 18:20:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [9c9 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [9ca 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d ef 86 03 3a 83 22 3c 56 91 6e a0 cc 90 93 88 |....:." DEBU Verify: sig = 00000000 30 44 02 20 1a 1e 5d 98 8c 4b d8 dc 88 f6 a7 41 |0D. ..]..K.....A| +peer1.org1.example.com | 00000010 93 5c 72 7a 9b 10 3d 2b 83 3f af 37 be b0 97 7e |.\rz..=+.?.7...~| +peer1.org1.example.com | 00000020 6f 9c 5d 12 02 20 5a d5 68 13 ea 6b 33 7a 41 e5 |o.].. Z.h..k3zA.| +peer1.org1.example.com | 00000030 14 ed 3c fb f1 26 31 61 ef 12 5c 8a 5a e0 f6 cf |..<..&1a..\.Z...| +peer1.org1.example.com | 00000040 95 b6 f1 82 18 27 |.....'| +peer1.org1.example.com | [9cc 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9cd 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9ce 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [9cf 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [9d0 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9d1 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9d2 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [9d3 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [9d4 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [9d5 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9d6 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9d7 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org1.example.com | [9d8 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [9d9 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9da 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [9db 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9dc 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [9dd 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [9de 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [9df 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9e0 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [9e1 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [9e2 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [9e3 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org1.example.com | [9e4 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9e5 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [9e6 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [9e7 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9e8 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9e9 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9ea 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9eb 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9ec 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9ed 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [9ee 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [9ef 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [9f0 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025aef50 gate 1589998811921842200 evaluation starts +peer1.org1.example.com | [9f1 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025aef50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9f2 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025aef50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [9f4 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9f3 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025aef50 principal matched by identity 0 +peer1.org1.example.com | [9f6 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [9f5 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [9f7 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [9f9 05-20 18:20:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9fa 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025aef50 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ac8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ac9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU aca Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU acb Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU acc Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU acd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ace Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU acf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad1 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad2 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad3 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad4 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad5 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad6 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad7 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad8 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ada Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU adb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU adc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:05.386 UTC [common.configtx] addToMap -> DEBU add Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:20:05.386 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:05.386 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:05.386 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:20:05.389 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:05.389 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Policy] /Channel/Admins" +peer0.org2.example.com | [879 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e12a0 gate 1589998807922597000 evaluation starts +peer0.org2.example.com | [87a 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e12a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [87b 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e12a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [87c 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [87d 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [87e 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [87f 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e12a0 principal matched by identity 0 +peer0.org2.example.com | [880 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [881 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [882 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e12a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [883 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e12a0 gate 1589998807922597000 evaluation succeeds +peer0.org2.example.com | [884 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [885 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [886 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [887 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [888 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [889 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [88a 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [88b 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [88c 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [88d 05-20 18:20:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [88e 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [88f 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200120 gate 1589998807931409300 evaluation starts +peer0.org2.example.com | [890 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [891 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200120 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [892 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [893 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200120 principal evaluation fails +peer0.org2.example.com | [894 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200120 gate 1589998807931409300 evaluation fails +peer0.org2.example.com | [895 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [896 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [897 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [898 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200690 gate 1589998807939372500 evaluation starts +peer0.org2.example.com | [899 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200690 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [89a 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200690 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [89b 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200690 principal matched by identity 0 +peer0.org2.example.com | [89c 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [89d 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [89e 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200690 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [89f 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003200690 gate 1589998807939372500 evaluation succeeds +peer0.org2.example.com | [8a0 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [7cb 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7cc 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7cd 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7ce 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7cf 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7d0 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7d1 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [7d2 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [7d3 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 gate 1589998806350999100 evaluation starts +peer0.org1.example.com | [7d4 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [7d5 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [7d6 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 principal matched by identity 0 +peer0.org1.example.com | [7d7 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [7d8 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d fb 1f 30 08 62 04 b5 c7 6f 0f |0E.!....0.b...o.| +peer0.org1.example.com | 00000010 ed 89 8b 39 3b 08 23 03 11 60 08 0a 2d e1 9d 96 |...9;.#..`..-...| +peer0.org1.example.com | 00000020 fb 3c ec 78 8b 02 20 0a af ce a7 67 d3 06 ab b4 |.<.x.. ....g....| +peer0.org1.example.com | 00000030 47 53 24 6d 2f 1c 99 1d 9a 17 f9 78 07 8c 9a 06 |GS$m/......x....| +peer0.org1.example.com | 00000040 d8 c8 c5 0e 57 62 88 |....Wb.| +peer0.org1.example.com | [7d9 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [7da 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 gate 1589998806350999100 evaluation succeeds +peer0.org1.example.com | [7db 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7dc 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7dd 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [7de 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [7df 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34180 +peer0.org1.example.com | [7e0 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34180 +peer0.org1.example.com | [7e1 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7e2 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer0.org1.example.com | [7e3 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7e4 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7e5 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [7e6 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34180 disconnected +peer0.org1.example.com | [7e7 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.344Z grpc.peer_address=172.18.0.5:34180 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1689ms +peer0.org1.example.com | [7e8 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7e9 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.395Z grpc.peer_address=172.18.0.5:34182 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.1µs +peer0.org1.example.com | [7ea 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [7eb 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [7ec 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [7ed 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:34182 +peer0.org1.example.com | [7ee 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34182 +peer0.org1.example.com | [7ef 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7f0 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7f1 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7f2 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7f3 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7f4 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7f5 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7f6 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7f7 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7f8 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [7f9 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [7fa 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 gate 1589998806406296500 evaluation starts +peer0.org1.example.com | [7fb 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [7fc 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [7fd 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 principal matched by identity 0 +peer0.org1.example.com | [7fe 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [7ff 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c3 86 12 b3 a4 8a fd 21 e7 e8 4e |0D. *.......!..N| +peer0.org1.example.com | 00000010 63 e1 72 4a 70 9d 40 1b 22 ae e1 4a 6d d2 ae 34 |c.rJp.@."..Jm..4| +peer0.org1.example.com | 00000020 93 2a 83 d3 02 20 7a cf e5 36 d6 d7 8b dd 3e df |.*... z..6....>.| +peer0.org1.example.com | 00000030 3b 15 49 9e f6 ff 6e 39 b3 b5 3a c7 ff 45 62 3d |;.I...n9..:..Eb=| +peer0.org1.example.com | 00000040 bd 8b de 1c 4c 88 |....L.| +peer0.org1.example.com | [800 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [801 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 gate 1589998806406296500 evaluation succeeds +peer0.org1.example.com | [802 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [803 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [804 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [805 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [806 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34182 +peer0.org1.example.com | [807 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34182 +peer0.org1.example.com | [808 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:34182 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:3336462012843755474 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [809 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [80a 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:3336462012843755474 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [80b 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [80c 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [80d 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [80e 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [80f 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [810 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [811 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [812 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [813 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 gate 1589998806422241200 evaluation starts +peer0.org1.example.com | [814 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [815 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [816 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 principal matched by identity 0 +peer0.org1.example.com | [817 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 5d e0 d3 1d fd 9f e7 47 3a 10 60 81 5a 10 1e |.]......G:.`.Z..| +peer0.org1.example.com | 00000010 57 bc 60 16 28 15 43 43 64 b5 b2 76 fc a9 94 6f |W.`.(.CCd..v...o| +peer0.org1.example.com | [818 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f df b9 40 2a ca b1 23 ed 7d d2 07 |0D. ?..@*..#.}..| +peer0.org1.example.com | 00000010 50 7f c9 ed b1 cd 43 06 f3 9d 5b c2 c4 07 ac 2a |P.....C...[....*| +peer0.org1.example.com | 00000020 a3 29 62 32 02 20 28 82 16 04 72 df ae 90 8c 23 |.)b2. (...r....#| +peer0.org1.example.com | 00000030 b2 b3 12 bc 9c bd ac 66 db 9c 5a 57 71 8e c7 23 |.......f..ZWq..#| +peer0.org1.example.com | 00000040 f9 11 d0 b5 1b 23 |.....#| +peer0.org1.example.com | [819 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [81a 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 gate 1589998806422241200 evaluation succeeds +peer0.org1.example.com | [81b 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [81c 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [81d 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [81e 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [81f 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [820 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [821 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [822 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [823 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [824 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [825 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [826 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [827 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [828 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [829 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 3336462012843755474, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [82a 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer0.org1.example.com | [82b 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3336462012843755474, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes +peer0.org1.example.com | [82c 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [82d 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [82e 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.511Z grpc.peer_address=172.18.0.5:34184 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=803.8µs +peer0.org1.example.com | [82f 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [830 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [831 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [832 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:34184 +peer0.org1.example.com | [833 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34184 +peer0.org1.example.com | [834 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [835 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [836 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [837 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [838 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [839 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [83a 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [83b 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [83c 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [83d 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [83e 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [83f 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 gate 1589998806522247100 evaluation starts +peer0.org1.example.com | [840 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [841 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [842 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 principal matched by identity 0 +peer0.org1.example.com | [843 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [844 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 e1 33 69 3c af c3 b4 e7 84 24 |0D. V7.3i<.....$| +peer0.org1.example.com | 00000010 fe fe 30 7d bc 5f 62 53 88 3f 79 af 36 ea 78 cd |..0}._bS.?y.6.x.| +peer0.org1.example.com | 00000020 bf 76 31 30 02 20 73 4d 74 a3 05 33 e1 58 89 75 |.v10. sMt..3.X.u| +peer0.org1.example.com | 00000030 c0 ce 2a 45 f8 b0 b4 41 91 47 d7 bc 4b 6f 8b 67 |..*E...A.G..Ko.g| +peer1.org2.example.com | [86f 05-20 18:20:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [870 05-20 18:20:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [9fb 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025aef50 gate 1589998811921842200 evaluation succeeds +peer1.org2.example.com | [871 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 75 46 ed c9 9f fd |uF....| +peer0.org1.example.com | [845 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [846 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 gate 1589998806522247100 evaluation succeeds +peer0.org1.example.com | [847 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [872 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [848 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8a1 05-20 18:20:07.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8a2 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8a3 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8a4 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8a5 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [8a6 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8a7 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [8a8 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [849 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [84a 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [84b 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34184 +peer0.org1.example.com | [84c 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34184 +peer0.org1.example.com | [84d 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34182 disconnected +peer0.org1.example.com | [84e 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:34182 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=124.93ms +peer0.org1.example.com | [84f 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [850 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34184 disconnected +peer0.org1.example.com | [851 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.514Z grpc.peer_address=172.18.0.5:34184 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.9263ms +peer0.org1.example.com | [852 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer0.org1.example.com | [853 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [854 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [855 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [856 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.631Z grpc.peer_address=172.18.0.6:33988 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=288.6µs +peer0.org1.example.com | [857 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [858 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [859 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [85a 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:33988 +peer0.org1.example.com | [85b 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:33988 +peer0.org1.example.com | [85c 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [85d 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [85e 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [85f 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [860 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [861 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [862 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [863 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [864 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [865 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [866 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [867 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [868 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [869 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [86a 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [86b 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [86c 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 gate 1589998806643637000 evaluation starts +peer0.org1.example.com | [86d 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [86e 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [86f 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [870 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [871 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [872 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 principal matched by identity 0 +peer0.org1.example.com | [873 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [874 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 22 05 66 a4 d6 c8 d1 b2 90 db |0E.!..".f.......| +peer0.org1.example.com | 00000010 a5 4f df f5 59 eb 99 d7 1a 3d a1 7e 09 ae 91 46 |.O..Y....=.~...F| +peer0.org1.example.com | 00000020 24 03 b2 f3 38 02 20 09 4f b3 7f c2 e6 d0 ba 3e |$...8. .O......>| +peer0.org1.example.com | 00000030 34 3c b2 b3 c6 8a 64 3d ae db 61 f5 ec 39 68 3d |4<....d=..a..9h=| +peer0.org1.example.com | 00000040 5a 28 c7 0a 7c c2 e5 |Z(..|..| +peer0.org1.example.com | [875 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [876 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 gate 1589998806643637000 evaluation succeeds +peer0.org1.example.com | [877 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [878 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [879 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [87a 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [87b 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:33988 +peer0.org1.example.com | [87c 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:33988 +peer0.org1.example.com | [87d 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [87e 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:33988 disconnected +peer0.org1.example.com | [87f 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.635Z grpc.peer_address=172.18.0.6:33988 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.7896ms +peer0.org1.example.com | [880 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [881 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [882 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.69Z grpc.peer_address=172.18.0.6:33990 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=124.9µs +peer0.org1.example.com | [883 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [884 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [885 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [886 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:33990 +peer0.org1.example.com | [887 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:33990 +peer0.org1.example.com | [888 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [873 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [874 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [875 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [876 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [877 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [878 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [879 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [87a 05-20 18:20:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [87b 05-20 18:20:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org2.example.com | [87c 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [87d 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [87e 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [87f 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [880 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [881 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [882 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [883 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [884 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [885 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [886 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [887 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [888 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [889 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [88a 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0f60 gate 1589998812485297200 evaluation starts +peer1.org2.example.com | [88b 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0f60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [88c 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0f60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [88d 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [88e 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0f60 principal evaluation fails +peer1.org2.example.com | [88f 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0f60 gate 1589998812485297200 evaluation fails +peer1.org2.example.com | [890 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [891 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [892 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [893 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a14e0 gate 1589998812486914200 evaluation starts +peer1.org2.example.com | [894 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a14e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [895 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a14e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [896 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a14e0 principal matched by identity 0 +peer1.org2.example.com | [897 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [898 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [899 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [89a 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a14e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [89b 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a14e0 gate 1589998812486914200 evaluation succeeds +peer1.org2.example.com | [89c 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [89d 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [89e 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [89f 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [8a0 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org2.example.com | [8a1 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8a2 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8a3 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [8a5 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8a6 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8a4 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [8a7 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [8a9 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8a8 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [8aa 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [8ac 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8ad 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [8af 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [8b0 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [8b1 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [8b2 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [8b3 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [8b4 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327330 gate 1589998812498197600 evaluation starts +peer1.org2.example.com | [8b5 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327330 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [8b6 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327330 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [8b7 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [8b8 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327330 principal evaluation fails +peer1.org2.example.com | [8ae 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [8b9 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327330 gate 1589998812498197600 evaluation fails +peer1.org2.example.com | [8ba 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [8bb 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [8bc 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [8bd 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033279d0 gate 1589998812503173100 evaluation starts +peer1.org2.example.com | [8be 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033279d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [8bf 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033279d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [8c0 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033279d0 principal matched by identity 0 +peer1.org2.example.com | [8c1 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [8c2 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [8c3 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033279d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [8c4 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033279d0 gate 1589998812503173100 evaluation succeeds +peer1.org2.example.com | [8c5 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [8c6 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [8c7 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [8c8 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [8c9 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ����)�����H�5���K��q���2���( +peer1.org2.example.com | [8ca 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8cb 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [8cc 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [8cd 05-20 18:20:12.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ce 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8cf 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d0 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d1 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [8d2 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8d3 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [889 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [88a 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [88b 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [88c 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [88d 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [88e 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [88f 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [890 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [891 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [892 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [893 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 gate 1589998806697693100 evaluation starts +peer0.org1.example.com | [894 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [895 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [896 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 principal matched by identity 0 +peer0.org1.example.com | [897 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [898 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 75 fa 71 a1 b6 fa 45 d2 73 ad f7 |0D. .u.q...E.s..| +peer0.org1.example.com | 00000010 0e 87 1b 0b 35 bb 01 ad 77 b5 53 bd 22 fa a3 93 |....5...w.S."...| +peer0.org1.example.com | 00000020 7e de 93 40 02 20 56 92 5c 69 fc 3e a1 b3 d4 a7 |~..@. V.\i.>....| +peer0.org1.example.com | 00000030 9a 19 9f 36 f0 38 d8 1c 37 b2 a8 64 df 55 0b 92 |...6.8..7..d.U..| +peer0.org1.example.com | 00000040 69 2b 25 7e 1d 37 |i+%~.7| +peer0.org1.example.com | [899 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [89a 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 gate 1589998806697693100 evaluation succeeds +peer0.org1.example.com | [89b 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [89c 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [89d 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [89e 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [89f 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:33990 +peer0.org1.example.com | [8a0 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:33990 +peer0.org1.example.com | [8a1 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:33990 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:9761545360067544221 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [8a2 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8a3 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9761545360067544221 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [8a4 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [8a5 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8a6 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8a7 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8a8 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8a9 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [8aa 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [8ab 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [8ac 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 gate 1589998806704526100 evaluation starts +peer0.org1.example.com | [8ad 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [8ae 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [8af 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 principal matched by identity 0 +peer0.org1.example.com | [8b0 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 4b 22 28 29 09 30 18 96 67 d9 9c ce 66 e9 a8 |.K"().0..g...f..| +peer0.org1.example.com | 00000010 65 fb be 6f 81 56 3c 02 38 5c 35 92 29 ff 9c 7c |e..o.V<.8\5.)..|| +peer0.org1.example.com | [8b1 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 1e b1 55 6c d3 c1 84 27 a5 d3 |0E.!....Ul...'..| +peer0.org1.example.com | 00000010 99 c5 ed 5b f0 54 c0 ff ad ae 9d b2 10 98 fd 5b |...[.T.........[| +peer0.org1.example.com | 00000020 86 6f fa b3 2e 02 20 4f 97 63 7d 65 c4 81 4f 4e |.o.... O.c}e..ON| +peer0.org1.example.com | 00000030 ea e8 a5 57 6d eb 43 6d 5a d1 c8 38 2a f9 4b 0d |...Wm.CmZ..8*.K.| +peer0.org1.example.com | 00000040 5a 18 37 a9 4a 2d 7b |Z.7.J-{| +peer0.org1.example.com | [8b2 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [8b3 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 gate 1589998806704526100 evaluation succeeds +peer0.org1.example.com | [8b4 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8b5 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8b6 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [8b7 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [8b8 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [8b9 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org1.example.com | [8ba 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [8bb 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8bc 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8bd 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [8be 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8bf 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8c0 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8c1 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 9761545360067544221, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [8c2 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [8c3 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9761545360067544221, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [8c4 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8c5 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8c6 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.786Z grpc.peer_address=172.18.0.6:33994 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=109.7µs +peer0.org1.example.com | [8c7 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [8c8 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [8c9 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [8ca 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:33994 +peer0.org1.example.com | [8cb 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:33994 +peer0.org2.example.com | [8a9 05-20 18:20:07.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8aa 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8ab 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer0.org2.example.com | [8ac 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [8ad 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ae 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [8af 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8b0 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8b1 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [8b2 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8b3 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [8b4 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8b5 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [8b6 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8b7 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org2.example.com | [8b8 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [8b9 05-20 18:20:08.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [8ba 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8bb 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8bc 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8bd 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8be 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [8bf 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8c0 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2020-05-20 18:20:05.389 UTC [common.channelconfig] LogSanityChecks -> DEBU aef As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-05-20 18:20:05.389 UTC [common.channelconfig] LogSanityChecks -> DEBU af0 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-05-20 18:20:05.389 UTC [policies] Manager -> DEBU af1 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:20:05.389 UTC [policies] Manager -> DEBU af2 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:05.389 UTC [policies] Manager -> DEBU af3 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:05.390 UTC [policies] Manager -> DEBU af4 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:20:05.390 UTC [policies] Manager -> DEBU af5 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.390 UTC [policies] Manager -> DEBU af6 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.390 UTC [common.channelconfig] LogSanityChecks -> DEBU af7 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-05-20 18:20:05.390 UTC [common.channelconfig] LogSanityChecks -> DEBU af8 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-05-20 18:20:05.390 UTC [common.channelconfig] LogSanityChecks -> DEBU af9 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-05-20 18:20:05.390 UTC [policies] Manager -> DEBU afa Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-05-20 18:20:05.391 UTC [policies] Manager -> DEBU afb Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:05.391 UTC [policies] Manager -> DEBU afc Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:05.391 UTC [policies] Manager -> DEBU afd Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-05-20 18:20:05.391 UTC [policies] Manager -> DEBU afe Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.391 UTC [common.channelconfig] LogSanityChecks -> DEBU aff As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-05-20 18:20:05.391 UTC [common.channelconfig] LogSanityChecks -> DEBU b00 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-05-20 18:20:05.391 UTC [common.channelconfig] LogSanityChecks -> DEBU b01 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-05-20 18:20:05.391 UTC [common.channelconfig] LogSanityChecks -> DEBU b02 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-05-20 18:20:05.392 UTC [common.capabilities] Supported -> DEBU b03 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:20:05.392 UTC [common.capabilities] Supported -> DEBU b04 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:20:05.392 UTC [msp] GetDefaultSigningIdentity -> DEBU b05 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:20:05.392 UTC [msp] GetDefaultSigningIdentity -> DEBU b06 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:20:05.392 UTC [msp.identity] Sign -> DEBU b07 Sign: plaintext: 0AEA060A1B08011A0608D5E995F60522...2CAFAE4D423EC1E55E3DB567244CD81D " +orderer0.example.com | "2020-05-20 18:20:05.392 UTC [msp.identity] Sign -> DEBU b08 Sign: digest: 3C37BB7160BE2A5DCCC1224E4F27D1586169D05C2EE4D9B0E39CE2217E904940 " +orderer0.example.com | "2020-05-20 18:20:05.393 UTC [policies] Evaluate -> DEBU b09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.393 UTC [policies] Evaluate -> DEBU b0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:20:05.393 UTC [policies] Evaluate -> DEBU b0b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.393 UTC [policies] Evaluate -> DEBU b0c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:20:05.394 UTC [policies] Evaluate -> DEBU b0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.394 UTC [msp] DeserializeIdentity -> DEBU b0e Obtaining identity" +orderer0.example.com | "2020-05-20 18:20:05.394 UTC [msp.identity] newIdentity -> DEBU b0f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.394 UTC [cauthdsl] func1 -> DEBU b10 0xc0012325e0 gate 1589998805394781000 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:05.394 UTC [cauthdsl] func2 -> DEBU b11 0xc0012325e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:05.394 UTC [cauthdsl] func2 -> DEBU b12 0xc0012325e0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b13 0xc0012325e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b14 0xc0012325e0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [cauthdsl] func1 -> DEBU b15 0xc0012325e0 gate 1589998805394781000 evaluation fails" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [policies] Evaluate -> DEBU b16 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [policies] Evaluate -> DEBU b17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [policies] Evaluate -> DEBU b18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [cauthdsl] func1 -> DEBU b19 0xc0012337a0 gate 1589998805395637700 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b1a 0xc0012337a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b1b 0xc0012337a0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b1c 0xc0012337a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org2.example.com | [8d4 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d5 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8d6 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d7 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [8d8 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +peer1.org2.example.com | 00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +peer1.org2.example.com | 00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +peer1.org2.example.com | 00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +peer1.org2.example.com | 00000040 7c 58 26 3b 84 ff e8 ||X&;...| +peer1.org2.example.com | [8da 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [8db 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 7b 18 2c b5 76 25 45 db ce ea 3f |0D. 6{.,.v%E...?| +peer1.org2.example.com | 00000010 d8 81 59 e8 3b f5 77 38 10 14 a6 72 c1 c0 f3 3f |..Y.;.w8...r...?| +peer1.org2.example.com | 00000020 c2 7c a1 d8 02 20 59 79 65 ef fd a1 11 d6 53 6f |.|... Yye.....So| +peer1.org2.example.com | 00000030 c7 94 b6 5a 8a e7 6b 04 28 88 c9 c0 95 8d e7 9c |...Z..k.(.......| +peer1.org2.example.com | 00000040 c9 39 32 48 9a 65 |.92H.e| +peer1.org2.example.com | [8dc 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [8dd 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [8de 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [8df 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [8e0 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [8e1 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8e2 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8e3 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8e4 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [8e5 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8e6 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8e7 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\010\246\003\243\275A\217\014A}6\023\031\002 \003\256?\322\302\322k=c\364\206\351\304\330\357\267\300\235\260\373\306\254G\275\356\305\007&\272\276O\r" > > +peer1.org2.example.com | [8e8 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org2.example.com | [8e9 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ea 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [9fc 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9fd 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9fe 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9ff 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a00 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [a01 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [a02 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [a03 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [a04 05-20 18:20:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ����)�����H�5���K��q���2���( +peer1.org1.example.com | [a05 05-20 18:20:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a06 05-20 18:20:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a07 05-20 18:20:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a08 05-20 18:20:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a09 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a0a 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a0b 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a0c 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a0d 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a0e 05-20 18:20:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [a0f 05-20 18:20:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a10 05-20 18:20:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [a11 05-20 18:20:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a12 05-20 18:20:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [a13 05-20 18:20:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a14 05-20 18:20:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [a15 05-20 18:20:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a16 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [a17 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [a18 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a19 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [a1a 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [a1b 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [a1c 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a1d 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [a1e 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161018 +peer1.org1.example.com | [a1f 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8867CE9374E51922B226ECEA8D67381E759B51AD1D21347334720CBD71D7D9C3 +peer1.org1.example.com | [a20 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [a21 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [a22 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [a23 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a24 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a25 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a26 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [a27 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a28 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [a29 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8cc 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8cd 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8ce 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8cf 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8d0 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8d1 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8d2 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8d3 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8d4 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [8d5 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [8d6 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [8d7 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 gate 1589998806796049400 evaluation starts +peer0.org1.example.com | [8d8 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [8d9 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [8da 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 principal matched by identity 0 +peer0.org1.example.com | [8db 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [8dc 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 dd a9 e4 88 b0 a2 82 48 e6 a8 07 |0D. U.......H...| +peer0.org1.example.com | 00000010 6b be 96 31 36 22 e7 75 75 d5 e2 cc cd 36 4d 8f |k..16".uu....6M.| +peer0.org1.example.com | 00000020 dd 52 67 47 02 20 5c 26 50 74 3d d8 01 95 6d dc |.RgG. \&Pt=...m.| +peer0.org1.example.com | 00000030 39 61 b4 85 97 7d fd 25 a9 96 ac 0b 23 df ce ac |9a...}.%....#...| +peer0.org1.example.com | 00000040 c4 b3 14 a7 3f 0f |....?.| +peer0.org1.example.com | [8dd 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [8de 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 gate 1589998806796049400 evaluation succeeds +peer0.org1.example.com | [8df 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8e0 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8e1 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [8e2 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [8e3 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:33994 +peer0.org1.example.com | [8e4 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:33994 +peer0.org1.example.com | [8e5 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [8e6 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:33990 disconnected +peer0.org1.example.com | [8e7 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:33990 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=104.4844ms +peer0.org1.example.com | [8e9 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:33994 disconnected +peer0.org1.example.com | [8ea 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.789Z grpc.peer_address=172.18.0.6:33994 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=7.1054ms +peer0.org1.example.com | [8eb 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org1.example.com | [8ec 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org1.example.com | [8e8 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [8ed 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [8ee 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [8ef 05-20 18:20:07.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8f0 05-20 18:20:07.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8f1 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [8f2 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [8f3 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [8f4 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [8f5 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [8f6 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org1.example.com | [8f7 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [8f8 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003cc41f0, CONNECTING +peer0.org1.example.com | [8f9 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [8fa 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [8fb 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [8fc 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [8fd 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [8fe 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [8ff 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +orderer0.example.com | "2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b1d 0xc0012337a0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [cauthdsl] func1 -> DEBU b1e 0xc0012337a0 gate 1589998805395637700 evaluation fails" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [policies] func1 -> DEBU b21 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b22 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b26 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [cauthdsl] func1 -> DEBU b27 0xc00125a4b0 gate 1589998805396634000 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [cauthdsl] func2 -> DEBU b28 0xc00125a4b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [cauthdsl] func2 -> DEBU b29 0xc00125a4b0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b2a Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-05-20 18:20:05.396 UTC [msp] Validate -> DEBU b2b MSP OrdererMSP validating identity" +orderer0.example.com | "2020-05-20 18:20:05.397 UTC [msp] getCertificationChain -> DEBU b2c MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-05-20 18:20:05.397 UTC [cauthdsl] func2 -> DEBU b2d 0xc00125a4b0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:20:05.397 UTC [msp.identity] Verify -> DEBU b2e Verify: digest = 00000000 3c 37 bb 71 60 be 2a 5d cc c1 22 4e 4f 27 d1 58 |<7.q`.*].."NO'.X| +orderer0.example.com | 00000010 61 69 d0 5c 2e e4 d9 b0 e3 9c e2 21 7e 90 49 40 |ai.\.......!~.I@|" +orderer0.example.com | "2020-05-20 18:20:05.398 UTC [msp.identity] Verify -> DEBU b2f Verify: sig = 00000000 30 45 02 21 00 f1 60 c6 0c 5d 48 6b 58 d3 55 d6 |0E.!..`..]HkX.U.| +orderer0.example.com | 00000010 55 aa 91 32 59 e9 96 66 be 0b b5 dc d7 6d 1e cd |U..2Y..f.....m..| +orderer0.example.com | 00000020 f6 0e 3e eb ae 02 20 0b 84 cd 3c d4 a3 21 14 67 |..>... ...<..!.g| +orderer0.example.com | 00000030 cc 8e d7 67 bd 5d 55 59 2b de 4a 52 0f f7 5f bf |...g.]UY+.JR.._.| +orderer0.example.com | 00000040 23 c2 cc 10 3c 4b c5 |#... DEBU b30 0xc00125a4b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:20:05.398 UTC [cauthdsl] func1 -> DEBU b31 0xc00125a4b0 gate 1589998805396634000 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b32 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b33 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b34 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b36 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [orderer.common.msgprocessor] Apply -> DEBU b38 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] NewStandardValues -> DEBU b39 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3a Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3b Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3c Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3d Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3e Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] NewStandardValues -> DEBU b3f Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b40 Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b41 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] NewStandardValues -> DEBU b42 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b43 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.400 UTC [common.channelconfig] NewStandardValues -> DEBU b44 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU b45 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.400 UTC [common.channelconfig] Validate -> DEBU b46 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:20:05.400 UTC [common.channelconfig] validateMSP -> DEBU b47 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.400 UTC [msp] newBccspMsp -> DEBU b48 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.400 UTC [msp] New -> DEBU b49 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.400 UTC [msp] Setup -> DEBU b4a Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.400 UTC [msp.identity] newIdentity -> DEBU b4b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [8eb 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8ec 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8ed 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8ee 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [8ef 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8f0 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [8f1 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8f2 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [8f3 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8f4 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f5 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8f6 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f7 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8f8 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f9 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [8fa 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [8fb 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8fc 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [8fd 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [8fe 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ff 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [900 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161017 +peer1.org2.example.com | [901 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 68BE1D08F5F9DEBE46917721FF06646C200D02642B59293F4FB4D83FED7B0DC3 +peer1.org2.example.com | [902 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [903 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [904 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [905 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\340.\002 m\235+x\031<\273\027\305j.\177\340\210[L\031\244\211\337\320a\\w\t\270\262.\210\030^S" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [906 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a2a 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [a2b 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a2c 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [a2d 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [a2e 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 67 ce 93 74 e5 19 22 b2 26 ec ea 8d 67 38 1e |.g..t..".&...g8.| +peer1.org1.example.com | 00000010 75 9b 51 ad 1d 21 34 73 34 72 0c bd 71 d7 d9 c3 |u.Q..!4s4r..q...| +peer1.org1.example.com | [a2f 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 1c c4 89 f0 1b c1 72 4e d2 71 6c |0D. A......rN.ql| +peer1.org1.example.com | 00000010 b2 10 11 61 44 58 5a 52 ce f5 87 73 80 86 52 47 |...aDXZR...s..RG| +peer1.org1.example.com | 00000020 5c a3 c9 59 02 20 36 a3 ed 95 eb 45 e3 c5 6d 45 |\..Y. 6....E..mE| +peer1.org1.example.com | 00000030 a0 04 b4 b8 cf bb 4b f7 55 6c 55 8d 51 72 fe 08 |......K.UlU.Qr..| +peer1.org1.example.com | 00000040 1c c0 58 4f af 5d |..XO.]| +peer1.org1.example.com | [a30 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [a31 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 ef 66 e4 67 af cb 37 3f 92 bc |0E.!...f.g..7?..| +peer1.org1.example.com | 00000010 b6 96 6a c7 eb d3 21 20 81 da 4c 7a 61 d8 ec 03 |..j...! ..Lza...| +peer1.org1.example.com | 00000020 35 bd 67 9f ee 02 20 7a f5 fc ec 21 ff a4 6b 9c |5.g... z...!..k.| +peer1.org1.example.com | 00000030 1b 07 46 af d9 c4 9d e8 e1 31 3f 75 b8 9a 96 ae |..F......1?u....| +peer1.org1.example.com | 00000040 c3 60 d4 98 8e 6a 6d |.`...jm| +peer1.org1.example.com | [a32 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [a33 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [a34 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a35 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a36 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [a37 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [900 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [901 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003ce79a0, CONNECTING +peer0.org1.example.com | [902 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [903 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [904 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [905 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [906 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [907 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [908 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [909 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [90a 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [90b 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [90c 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [90d 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [90e 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [90f 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [910 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [911 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003d20e30, CONNECTING +peer0.org1.example.com | [912 05-20 18:20:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003cc41f0, READY +peer0.org1.example.com | [913 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [914 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [915 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [916 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer0.org1.example.com | [917 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003ce79a0, READY +peer0.org1.example.com | [918 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003d20e30, READY +peer0.org1.example.com | [91a 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [91b 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [919 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +peer0.org1.example.com | [91c 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.401 UTC [common.channelconfig] NewStandardValues -> DEBU b4c Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.401 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4d Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.401 UTC [common.channelconfig] NewStandardValues -> DEBU b4e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.401 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4f Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.401 UTC [common.channelconfig] Validate -> DEBU b50 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:20:05.401 UTC [common.channelconfig] validateMSP -> DEBU b51 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.401 UTC [msp] newBccspMsp -> DEBU b52 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.402 UTC [msp] New -> DEBU b53 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.402 UTC [msp] Setup -> DEBU b54 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.402 UTC [msp.identity] newIdentity -> DEBU b55 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.403 UTC [common.channelconfig] NewStandardValues -> DEBU b56 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:20:05.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU b57 Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b58 Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b59 Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5a Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5b Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5c Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] NewStandardValues -> DEBU b5d Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5e Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] NewStandardValues -> DEBU b5f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b60 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.405 UTC [common.channelconfig] validateMSP -> DEBU b61 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.405 UTC [msp] newBccspMsp -> DEBU b62 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.405 UTC [msp] New -> DEBU b63 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.405 UTC [msp] Setup -> DEBU b64 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:20:05.405 UTC [msp.identity] newIdentity -> DEBU b65 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.406 UTC [msp] Setup -> DEBU b66 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:20:05.406 UTC [msp] Setup -> DEBU b67 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b68 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b69 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b6a Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b6b Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b6c Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b6d Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.407 UTC [policies] GetPolicy -> DEBU b6e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.407 UTC [policies] GetPolicy -> DEBU b6f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b70 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b71 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b72 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b73 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] GetPolicy -> DEBU b74 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] GetPolicy -> DEBU b75 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b76 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b77 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b78 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b79 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7a Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7b Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7c Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7d Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7e Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7f Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b80 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [common.configtx] addToMap -> DEBU b81 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [common.configtx] addToMap -> DEBU b82 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [common.configtx] addToMap -> DEBU b83 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.409 UTC [common.configtx] addToMap -> DEBU b84 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b85 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b86 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b87 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b88 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b89 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b8a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8b Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8f Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org2.example.com | [907 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [908 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [909 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [90a 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\340.\002 m\235+x\031<\273\027\305j.\177\340\210[L\031\244\211\337\320a\\w\t\270\262.\210\030^S" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [90b 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [90c 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [90d 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [90e 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [90f 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [910 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [911 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 be 1d 08 f5 f9 de be 46 91 77 21 ff 06 64 6c |h.......F.w!..dl| +peer1.org2.example.com | 00000010 20 0d 02 64 2b 59 29 3f 4f b4 d8 3f ed 7b 0d c3 | ..d+Y)?O..?.{..| +peer1.org2.example.com | [912 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 90 99 23 ee e2 94 a9 79 5c a2 |0E.!....#....y\.| +peer1.org2.example.com | 00000010 42 32 39 ac 9b 2b 93 28 74 c0 ba 10 2b e5 20 f3 |B29..+.(t...+. .| +peer1.org2.example.com | 00000020 77 2d d7 b8 09 02 20 09 f6 9c d1 22 dd 6b f7 e3 |w-.... ....".k..| +peer1.org2.example.com | 00000030 a1 b3 98 05 27 06 b0 bd b0 21 e4 1d c8 eb c6 05 |....'....!......| +peer1.org2.example.com | 00000040 6f b9 c4 e5 c2 f8 5d |o.....]| +peer1.org2.example.com | [913 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [914 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b e8 74 4a 60 b4 c2 b9 b7 9b fd a4 |0D. k.tJ`.......| +peer1.org2.example.com | 00000010 c5 01 10 32 73 48 c3 de 91 40 22 e2 79 ad 38 ea |...2sH...@".y.8.| +peer1.org2.example.com | 00000020 f3 3e e0 2e 02 20 6d 9d 2b 78 19 3c bb 17 c5 6a |.>... m.+x.<...j| +peer1.org2.example.com | 00000030 2e 7f e0 88 5b 4c 19 a4 89 df d0 61 5c 77 09 b8 |....[L.....a\w..| +peer1.org2.example.com | 00000040 b2 2e 88 18 5e 53 |....^S| +peer1.org2.example.com | [915 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [916 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [917 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [918 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [919 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [91a 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [91b 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [91c 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [91d 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a38 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a39 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [a3a 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [a3b 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [a3c 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 67 ce 93 74 e5 19 22 b2 26 ec ea 8d 67 38 1e |.g..t..".&...g8.| +peer1.org1.example.com | 00000010 75 9b 51 ad 1d 21 34 73 34 72 0c bd 71 d7 d9 c3 |u.Q..!4s4r..q...| +peer1.org1.example.com | [a3d 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 1c c4 89 f0 1b c1 72 4e d2 71 6c |0D. A......rN.ql| +peer1.org1.example.com | 00000010 b2 10 11 61 44 58 5a 52 ce f5 87 73 80 86 52 47 |...aDXZR...s..RG| +peer1.org1.example.com | 00000020 5c a3 c9 59 02 20 36 a3 ed 95 eb 45 e3 c5 6d 45 |\..Y. 6....E..mE| +peer1.org1.example.com | 00000030 a0 04 b4 b8 cf bb 4b f7 55 6c 55 8d 51 72 fe 08 |......K.UlU.Qr..| +peer1.org1.example.com | 00000040 1c c0 58 4f af 5d |..XO.]| +peer1.org1.example.com | [a3e 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [a3f 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [a40 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a41 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [a42 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +peer1.org1.example.com | 00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +peer1.org1.example.com | [a43 05-20 18:20:12.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +peer1.org1.example.com | 00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +peer1.org1.example.com | 00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +peer1.org1.example.com | 00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +peer1.org1.example.com | 00000040 5c de b0 54 71 0f |\..Tq.| +peer1.org1.example.com | [a44 05-20 18:20:12.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [a45 05-20 18:20:12.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a46 05-20 18:20:12.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a47 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [a48 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [a49 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [a4a 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a4b 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a4c 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a4d 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a4e 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [a4f 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a50 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [a51 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [a52 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a53 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [a54 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [a55 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [91e 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:7051 +peer0.org1.example.com | [91d 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [91f 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [920 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [921 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [922 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [923 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +peer0.org1.example.com | [924 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [925 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 62 de a9 06 3a 8f ef b2 11 06 |0E.!..b...:.....| +peer0.org1.example.com | 00000010 e2 17 31 a2 b5 18 bf 74 bb 95 60 cb 81 b6 88 e3 |..1....t..`.....| +peer0.org1.example.com | 00000020 64 c7 44 47 e1 02 20 61 03 21 56 9b 23 ca f8 9e |d.DG.. a.!V.#...| +peer0.org1.example.com | 00000030 4d 4e b9 56 4e 8d 86 ca f3 01 e2 f7 c2 90 4d 54 |MN.VN.........MT| +peer0.org1.example.com | 00000040 8d 2c 51 31 39 dc 64 |.,Q19.d| +peer0.org1.example.com | [926 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer1.org2.example.com | [91e 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [91f 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [920 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [921 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [922 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [923 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [924 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334dec0 gate 1589998812868468300 evaluation starts +peer1.org2.example.com | [925 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334dec0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [926 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334dec0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [927 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334dec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [928 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334dec0 principal evaluation fails +peer1.org2.example.com | [929 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334dec0 gate 1589998812868468300 evaluation fails +peer1.org2.example.com | [92a 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [92b 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [92c 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [92d 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c450 gate 1589998812868979400 evaluation starts +peer1.org2.example.com | [92e 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [92f 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c450 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [930 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c450 principal matched by identity 0 +peer1.org2.example.com | [931 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +peer1.org2.example.com | 00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +peer1.org2.example.com | [932 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +peer1.org2.example.com | 00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +peer1.org2.example.com | 00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +peer1.org2.example.com | 00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +peer1.org2.example.com | 00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +peer1.org2.example.com | [933 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c450 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [934 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2c450 gate 1589998812868979400 evaluation succeeds +peer1.org2.example.com | [935 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [936 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [937 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [938 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [939 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [93a 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [93b 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [93c 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [93d 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [93e 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [93f 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [941 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [942 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a56 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a57 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a58 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a59 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a5a 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a5b 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a5c 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ff9a0 gate 1589998812657923600 evaluation starts +peer1.org1.example.com | [a5d 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ff9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a5e 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ff9a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [a5f 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ff9a0 principal matched by identity 0 +peer1.org1.example.com | [a60 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +peer1.org1.example.com | 00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +peer1.org1.example.com | 00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +peer1.org1.example.com | 00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +peer1.org1.example.com | 00000040 7c 58 26 3b 84 ff e8 ||X&;...| +peer1.org1.example.com | [a62 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ff9a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a63 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ff9a0 gate 1589998812657923600 evaluation succeeds +peer1.org1.example.com | [a64 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a65 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a66 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a67 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a68 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [a69 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [a6a 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [a6b 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [a6c 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [a6d 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a6e 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a6f 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a70 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [a71 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a72 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a73 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [8c1 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320a2a0 gate 1589998808195192600 evaluation starts +peer0.org2.example.com | [8c2 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320a2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8c3 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320a2a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [8c4 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [8c5 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [8c6 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [8c7 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320a2a0 principal matched by identity 0 +peer0.org2.example.com | [8c8 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [8c9 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [8ca 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320a2a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [8cb 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320a2a0 gate 1589998808195192600 evaluation succeeds +peer0.org2.example.com | [8cc 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8cd 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8ce 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8cf 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8d0 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8d1 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8d2 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8d3 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8d4 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8d5 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8d6 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8d7 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [8d8 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa1f0 gate 1589998808199045400 evaluation starts +peer0.org2.example.com | [8d9 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8da 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa1f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [8db 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [8dc 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa1f0 principal evaluation fails +peer0.org2.example.com | [8dd 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa1f0 gate 1589998808199045400 evaluation fails +peer0.org2.example.com | [8de 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8df 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8e0 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [8e1 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa840 gate 1589998808199307400 evaluation starts +peer0.org2.example.com | [8e2 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa840 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8e3 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa840 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [8e4 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa840 principal matched by identity 0 +peer0.org2.example.com | [8e5 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [927 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [928 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [929 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [92a 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [92b 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [92c 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [92d 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [92e 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [92f 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer0.org1.example.com | [930 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [931 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [932 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [933 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [934 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [935 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [936 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 gate 1589998807694773900 evaluation starts +peer0.org1.example.com | [937 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [938 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [939 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 principal matched by identity 0 +peer0.org1.example.com | [93a 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [93b 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 e6 23 8c a8 59 16 ab 0f 92 9c 1c |0D. ..#..Y......| +peer0.org1.example.com | 00000010 5e 9c 06 db b8 cb 74 db f9 92 c0 0e ab ab 6e 1b |^.....t.......n.| +peer0.org1.example.com | 00000020 93 27 25 a8 02 20 78 58 09 87 77 5b 24 c9 a8 41 |.'%.. xX..w[$..A| +peer0.org1.example.com | 00000030 29 6d 07 ca f7 ef 5b 90 11 1b dd 71 70 ae 33 07 |)m....[....qp.3.| +peer0.org1.example.com | 00000040 3c 5e b0 14 18 88 |<^....| +peer0.org1.example.com | [93c 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [93d 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 gate 1589998807694773900 evaluation succeeds +peer0.org1.example.com | [93e 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [93f 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [940 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [941 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [942 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [943 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [944 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [945 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a74 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer1.org1.example.com | [a75 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org1.example.com | [a76 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a77 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [a78 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [a79 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [a7a 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a7b 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [a7c 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a7d 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [a7e 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [a7f 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +peer1.org1.example.com | 00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +peer1.org1.example.com | [a80 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +peer1.org1.example.com | 00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +peer1.org1.example.com | 00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +peer1.org1.example.com | 00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +peer1.org1.example.com | 00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +peer1.org1.example.com | [a81 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [a82 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc d6 e6 4e 08 59 b9 38 e5 64 df |0E.!....N.Y.8.d.| +peer1.org1.example.com | 00000010 24 79 1d 83 72 59 f5 fa 41 f4 b7 c9 07 6a 07 f2 |$y..rY..A....j..| +peer1.org1.example.com | 00000020 a0 ce 22 a4 e6 02 20 27 98 e7 14 ad b2 6f 62 bb |.."... '.....ob.| +peer1.org1.example.com | 00000030 b3 1f dd 97 89 34 33 c2 58 cd 7d 8f 14 ae a4 33 |.....43.X.}....3| +peer1.org1.example.com | 00000040 dc f0 85 1a 75 98 ed |....u..| +peer1.org1.example.com | [a83 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [a84 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [a85 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [a86 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [a87 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [a88 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a89 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a8a 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a8b 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [a8c 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a8d 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a8e 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" secret_envelope: > alive: +peer1.org1.example.com | [a8f 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [a90 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a91 05-20 18:20:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [a92 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [a93 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161019 +peer1.org1.example.com | [a94 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 597EB6CFFE56FFC074F946FAF577C82B0B14025B13D729C2F9BA2BF24A8B8850 +peer1.org1.example.com | [a95 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [a96 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [a97 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [a98 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [a99 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a9a 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [a9b 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a9c 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [a9d 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [a9e 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a9f 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [aa0 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aa1 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer0.org2.example.com:7051 +peer1.org1.example.com | [aa2 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [aa3 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa4 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aa5 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15741230374541469320, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa6 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15741230374541469320, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [aa7 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aa8 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aa9 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org2.example.com | [943 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [944 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [945 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > alive: +peer1.org2.example.com | [946 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org2.example.com | [947 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [948 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [940 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [949 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [94b 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [94a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [94c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [94d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +peer1.org2.example.com | 00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +peer1.org2.example.com | 00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +peer1.org2.example.com | 00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +peer1.org2.example.com | 00000040 7c 58 26 3b 84 ff e8 ||X&;...| +peer1.org2.example.com | [94f 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [950 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [951 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [952 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 be 1d 08 f5 f9 de be 46 91 77 21 ff 06 64 6c |h.......F.w!..dl| +peer1.org2.example.com | 00000010 20 0d 02 64 2b 59 29 3f 4f b4 d8 3f ed 7b 0d c3 | ..d+Y)?O..?.{..| +peer1.org2.example.com | [953 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 90 99 23 ee e2 94 a9 79 5c a2 |0E.!....#....y\.| +peer1.org2.example.com | 00000010 42 32 39 ac 9b 2b 93 28 74 c0 ba 10 2b e5 20 f3 |B29..+.(t...+. .| +peer1.org2.example.com | 00000020 77 2d d7 b8 09 02 20 09 f6 9c d1 22 dd 6b f7 e3 |w-.... ....".k..| +peer1.org2.example.com | 00000030 a1 b3 98 05 27 06 b0 bd b0 21 e4 1d c8 eb c6 05 |....'....!......| +peer1.org2.example.com | 00000040 6f b9 c4 e5 c2 f8 5d |o.....]| +peer1.org2.example.com | [954 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [955 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [956 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [957 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [958 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [959 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [95a 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [95b 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [95c 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [95d 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [95e 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [95f 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [960 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [961 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [962 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [963 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [8e6 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [8e7 05-20 18:20:08.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa840 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [8e8 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa840 gate 1589998808199307400 evaluation succeeds +peer0.org2.example.com | [8e9 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8ea 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8eb 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8ec 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8ed 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ee 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8ef 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer0.org2.example.com | [8f0 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8f1 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8f2 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8f3 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8f4 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8f5 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8f6 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8f7 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8f8 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [8f9 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032abd30 gate 1589998808205429500 evaluation starts +peer0.org2.example.com | [8fa 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032abd30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8fb 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032abd30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [8fc 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032abd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [8fd 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032abd30 principal evaluation fails +peer0.org2.example.com | [8fe 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032abd30 gate 1589998808205429500 evaluation fails +peer0.org2.example.com | [8ff 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [900 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [901 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [902 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330c3c0 gate 1589998808207260400 evaluation starts +peer0.org2.example.com | [903 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330c3c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [904 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330c3c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [905 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330c3c0 principal matched by identity 0 +peer0.org2.example.com | [906 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [907 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [908 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330c3c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [909 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330c3c0 gate 1589998808207260400 evaluation succeeds +peer0.org2.example.com | [90a 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [90b 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [90c 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [90d 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [90e 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [90f 05-20 18:20:08.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [910 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [946 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [947 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer0.org1.example.com | [948 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [949 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [94a 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [94b 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [94c 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [94d 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [94e 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [94f 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [950 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [951 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [952 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [953 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 gate 1589998807719000300 evaluation starts +peer0.org1.example.com | [954 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [956 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [955 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer0.org1.example.com | [957 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +peer0.org1.example.com | [958 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 principal matched by identity 0 +peer0.org1.example.com | [959 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [95a 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c da 07 c5 8d b7 76 71 5f 86 ad de |0D. \.....vq_...| +peer0.org1.example.com | 00000010 e5 fa 56 e3 49 e0 f7 7d 5d 63 2a c7 14 92 27 dd |..V.I..}]c*...'.| +peer0.org1.example.com | 00000020 e1 56 1e b6 02 20 6d e6 b4 36 77 2c e1 ef 36 f6 |.V... m..6w,..6.| +peer0.org1.example.com | 00000030 fe 85 8c f6 d4 01 03 50 b2 51 cb 6d 6e 11 ca fe |.......P.Q.mn...| +peer0.org1.example.com | 00000040 ef ff a0 f4 e4 a5 |......| +peer0.org1.example.com | [95b 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [95d 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 gate 1589998807719000300 evaluation succeeds +peer0.org1.example.com | [95e 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer0.org1.example.com | [95f 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [960 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [961 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [962 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [963 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org1.example.com | [964 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [965 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [966 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3e 5c 4a 11 e1 a3 69 d4 28 30 4d f7 e2 3d 3f |/>\J...i.(0M..=?| +peer0.org1.example.com | 00000010 b5 1c 6f 96 b3 ef b9 a2 dc d4 aa 30 25 70 c7 29 |..o........0%p.)| +peer0.org1.example.com | [968 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 86 23 6c 12 fe e6 23 43 2b a1 |0E.!...#l...#C+.| +peer0.org1.example.com | 00000010 35 62 8d ab 15 e5 77 95 57 d4 f5 4c 02 79 bd 58 |5b....w.W..L.y.X| +peer0.org1.example.com | 00000020 84 96 b6 36 97 02 20 30 a1 f7 0f 63 f5 dd 55 6d |...6.. 0...c..Um| +peer0.org1.example.com | 00000030 9d bf b7 42 24 ef 9a 3e cb 01 23 53 09 7e 68 09 |...B$..>..#S.~h.| +peer0.org1.example.com | 00000040 4b 61 c8 f9 67 09 9a |Ka..g..| +peer0.org1.example.com | [95c 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [967 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [969 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [96a 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [96b 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b90 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b91 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b92 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b93 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b94 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b95 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b96 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b97 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b98 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b99 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b9a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b9b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b9c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU b9d Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU b9e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU b9f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Value] /Channel/Capabilities" +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [aaa 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [aab 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [aac 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [aad 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [aae 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [aaf 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [ab0 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [ab1 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ab2 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691e30 gate 1589998813293940300 evaluation starts +peer1.org1.example.com | [ab3 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691e30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ab4 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691e30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [ab5 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [ab6 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [ab7 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [ab8 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691e30 principal matched by identity 0 +peer1.org1.example.com | [ab9 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +peer1.org1.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer1.org1.example.com | [aba 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 73 5e bb 22 1a ce fd c4 d7 e3 |0E.!..s^."......| +peer1.org1.example.com | 00000010 05 e7 7c f9 6a 1e b1 b4 ed 2e fe 4c 41 ed 4c 42 |..|.j......LA.LB| +peer1.org1.example.com | 00000020 e5 c0 02 0a 19 02 20 29 12 fd de 2e 6e 26 1b 7d |...... )....n&.}| +peer1.org1.example.com | 00000030 53 e4 ef 11 8d 21 11 42 ee 45 74 fc ef 59 2a c7 |S....!.B.Et..Y*.| +peer1.org1.example.com | 00000040 2c 53 7a ce 90 71 cc |,Sz..q.| +peer1.org1.example.com | [abb 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691e30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [abc 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002691e30 gate 1589998813293940300 evaluation succeeds +peer1.org1.example.com | [abd 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [abe 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [abf 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ac0 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ac1 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [964 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [965 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [966 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [967 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [968 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d b7 3d 67 fc 8b 03 4f 16 5d 1f d2 35 c7 b2 11 |M.=g...O.]..5...| +peer1.org2.example.com | 00000010 00 ba 15 dd 15 89 63 f4 f6 b3 37 77 68 6e 70 1e |......c...7whnp.| +peer1.org2.example.com | [969 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 0c 35 eb be 9f 24 d1 6c 03 c6 |0E.!...5...$.l..| +peer1.org2.example.com | 00000010 0e a1 61 51 f7 73 cb 16 68 66 92 97 84 30 6e 73 |..aQ.s..hf...0ns| +peer1.org2.example.com | 00000020 64 b3 25 ed 2f 02 20 1a 76 fa c0 20 97 0d ef 4c |d.%./. .v.. ...L| +peer1.org2.example.com | 00000030 d3 75 ba d4 80 be ee ba 27 66 83 c3 0a 9c 00 7c |.u......'f.....|| +peer1.org2.example.com | 00000040 c8 05 15 44 20 fd 6b |...D .k| +peer1.org2.example.com | [96a 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [96b 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [96c 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [96d 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [96e 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [96f 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [970 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [971 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [972 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [973 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [974 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [975 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [976 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [911 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [912 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [913 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [914 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [915 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [916 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d5c0 gate 1589998808212754500 evaluation starts +peer0.org2.example.com | [917 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d5c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [918 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d5c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [919 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [91a 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d5c0 principal evaluation fails +peer0.org2.example.com | [91b 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330d5c0 gate 1589998808212754500 evaluation fails +peer0.org2.example.com | [91c 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [91d 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [91e 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [91f 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330db30 gate 1589998808214104400 evaluation starts +peer0.org2.example.com | [920 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330db30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [921 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330db30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [922 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330db30 principal matched by identity 0 +peer0.org2.example.com | [923 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [924 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [925 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330db30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [926 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330db30 gate 1589998808214104400 evaluation succeeds +peer0.org2.example.com | [927 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [928 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [929 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [92a 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [92b 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [ac2 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ac3 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15741230374541469320, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [ac4 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ac5 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ac6 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ac7 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ac8 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [96c 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [96d 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [96e 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [96f 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [970 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [971 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:20:05.415 UTC [orderer.consensus.etcdraft] propose -> INFO bad Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:20:05.415 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bae [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:53454" +orderer0.example.com | "2020-05-20 18:20:05.415 UTC [orderer.consensus.etcdraft] serveRequest -> INFO baf Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:20:05.415 UTC [orderer.consensus.etcdraft] 2 -> DEBU bb0 Proposed block [2] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:20:05.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bb1 Sending msg of 27272 bytes to 2 on channel businesschannel took 22.2µs" +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [orderer.common.broadcast] Handle -> WARN bb4 Error reading from 172.18.0.9:53454: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bb5 Sending msg of 27272 bytes to 3 on channel businesschannel took 16.5µs" +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [orderer.common.server] func1 -> DEBU bb6 Closing Broadcast stream" +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [comm.grpc.server] 1 -> INFO bb7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53454 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.9651ms +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [grpc] infof -> DEBU bb9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [orderer.common.cluster.step] sendMessage -> DEBU bb8 Send of ConsensusRequest for channel businesschannel with payload of size 27272 to orderer2.example.com(orderer2.example.com:7050) took 126.3µs " +orderer0.example.com | "2020-05-20 18:20:05.419 UTC [grpc] infof -> DEBU bb3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:20:05.419 UTC [common.deliver] Handle -> WARN bb2 Error reading from 172.18.0.9:53452: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [orderer.common.server] func1 -> DEBU bba Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbb Send of ConsensusRequest for channel businesschannel with payload of size 27272 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " +orderer0.example.com | "2020-05-20 18:20:05.420 UTC [comm.grpc.server] 1 -> INFO bbc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53452 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=100.899ms +orderer0.example.com | "2020-05-20 18:20:05.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU bbd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bbe Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-05-20 18:20:05.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.2µs " +orderer0.example.com | "2020-05-20 18:20:05.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc1 Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" +orderer0.example.com | "2020-05-20 18:20:05.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc2 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +orderer0.example.com | "2020-05-20 18:20:05.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU bc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 39.6µs " +orderer0.example.com | "2020-05-20 18:20:05.429 UTC [orderer.consensus.etcdraft] writeBlock -> INFO bc4 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:20:05.432 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU bc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.5µs " +orderer0.example.com | "2020-05-20 18:20:05.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.444 UTC [common.configtx] addToMap -> DEBU bc9 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:05.444 UTC [common.configtx] addToMap -> DEBU bca Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.444 UTC [common.configtx] addToMap -> DEBU bcb Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bcc Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +orderer0.example.com | "2020-05-20 18:20:05.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU bce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.9µs " +orderer0.example.com | "2020-05-20 18:20:05.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU bd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.8µs " +orderer0.example.com | "2020-05-20 18:20:05.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bcf Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +orderer0.example.com | "2020-05-20 18:20:05.444 UTC [common.configtx] addToMap -> DEBU bcd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.448 UTC [common.configtx] addToMap -> DEBU bd2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU bd3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU bd1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.449 UTC [common.configtx] addToMap -> DEBU bd4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org1.example.com | [ac9 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [aca 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 4 +peer1.org1.example.com | [acb 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [acc 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [acd 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ace 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [acf 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ad0 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [ad1 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ad2 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ad3 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ad4 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ad5 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [ad6 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [ad7 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ad8 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a4520 gate 1589998813637857100 evaluation starts +peer1.org1.example.com | [ad9 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a4520 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ada 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a4520 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [adb 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a4520 principal matched by identity 0 +peer1.org1.example.com | [adc 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d b7 3d 67 fc 8b 03 4f 16 5d 1f d2 35 c7 b2 11 |M.=g...O.]..5...| +peer1.org1.example.com | 00000010 00 ba 15 dd 15 89 63 f4 f6 b3 37 77 68 6e 70 1e |......c...7whnp.| +peer1.org1.example.com | [add 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 0c 35 eb be 9f 24 d1 6c 03 c6 |0E.!...5...$.l..| +peer1.org1.example.com | 00000010 0e a1 61 51 f7 73 cb 16 68 66 92 97 84 30 6e 73 |..aQ.s..hf...0ns| +peer1.org1.example.com | 00000020 64 b3 25 ed 2f 02 20 1a 76 fa c0 20 97 0d ef 4c |d.%./. .v.. ...L| +peer1.org1.example.com | 00000030 d3 75 ba d4 80 be ee ba 27 66 83 c3 0a 9c 00 7c |.u......'f.....|| +peer1.org1.example.com | 00000040 c8 05 15 44 20 fd 6b |...D .k| +peer1.org1.example.com | [ade 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a4520 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [adf 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a4520 gate 1589998813637857100 evaluation succeeds +peer1.org1.example.com | [ae0 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [977 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [978 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [979 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [97a 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [97b 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [97c 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [97d 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [97e 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [97f 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [980 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [981 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [982 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [983 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [984 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [985 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [986 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [987 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7cfc0 gate 1589998813832833000 evaluation starts +peer1.org2.example.com | [988 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7cfc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [989 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7cfc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [98a 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7cfc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [98b 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7cfc0 principal evaluation fails +peer1.org2.example.com | [98c 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7cfc0 gate 1589998813832833000 evaluation fails +peer1.org2.example.com | [98d 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [98e 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [98f 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [990 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7d530 gate 1589998813839752000 evaluation starts +peer1.org2.example.com | [991 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [993 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [992 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7d530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [994 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7d530 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [995 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [92c 05-20 18:20:08.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [92e 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [92f 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [930 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [931 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [932 05-20 18:20:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [933 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [934 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [935 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [936 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [937 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [938 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [939 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [93a 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [93b 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [93c 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [93d 05-20 18:20:08.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [93e 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [93f 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d800 gate 1589998808310215900 evaluation starts +peer0.org2.example.com | [940 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [941 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d800 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [942 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [943 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d800 principal evaluation fails +peer0.org2.example.com | [944 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d800 gate 1589998808310215900 evaluation fails +peer0.org2.example.com | [945 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [946 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [972 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org1.example.com | [973 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [974 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 gate 1589998807764809300 evaluation starts +peer0.org1.example.com | [975 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [976 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [977 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [978 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 principal evaluation fails +peer0.org1.example.com | [979 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 gate 1589998807764809300 evaluation fails +peer0.org1.example.com | [97a 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [97b 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [97c 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [97d 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 gate 1589998807771636300 evaluation starts +peer0.org1.example.com | [97e 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [97f 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [980 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [981 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [982 05-20 18:20:07.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [983 05-20 18:20:07.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 principal matched by identity 0 +peer0.org1.example.com | [984 05-20 18:20:07.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [985 05-20 18:20:07.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [986 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [987 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 gate 1589998807771636300 evaluation succeeds +peer0.org1.example.com | [988 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [989 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [98a 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [98b 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [98c 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [98d 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +peer0.org1.example.com | [98e 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [98f 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [990 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ae1 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ae2 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ae3 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ae4 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ae5 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [ae6 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [ae7 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [ae8 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [ae9 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aea 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aeb 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aec 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aed 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aee 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aef 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [af0 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [af1 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [af2 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [af3 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [af4 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [af5 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [af6 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [af7 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [af8 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [af9 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [afa 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [afb 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 a9 17 9f ab 79 f9 8c 06 cc a7 53 96 67 67 43 |.....y.....S.ggC| +peer1.org1.example.com | 00000010 37 06 b0 28 53 9a 14 49 3d f2 b9 39 a4 3f 1c 91 |7..(S..I=..9.?..| +peer1.org1.example.com | [afc 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 39 1c d5 a7 bf 5e 07 b2 83 30 cc |0D. e9....^...0.| +peer1.org1.example.com | 00000010 fd 8b 3f 5d 72 38 30 15 2d e6 51 65 f3 32 a0 99 |..?]r80.-.Qe.2..| +peer1.org1.example.com | 00000020 12 c2 43 f5 02 20 0f d5 ba 11 7d 40 e7 b5 4a 7f |..C.. ....}@..J.| +peer1.org1.example.com | 00000030 9e 2d 83 e1 a4 87 91 a0 23 e0 34 00 28 e8 b6 2b |.-......#.4.(..+| +peer1.org1.example.com | 00000040 27 38 aa e8 2b c5 |'8..+.| +peer1.org1.example.com | [afd 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [afe 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [aff 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [b00 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [991 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [992 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [993 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [994 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [995 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [996 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [997 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 gate 1589998807792670000 evaluation starts +peer0.org1.example.com | [998 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [999 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [99a 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 principal matched by identity 0 +peer0.org1.example.com | [99b 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [99c 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [99d 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [99e 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 gate 1589998807792670000 evaluation succeeds +peer0.org1.example.com | [99f 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9a0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9a1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9a2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9a3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9a4 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9a5 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9a6 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [9a7 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [9a8 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [9a9 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 gate 1589998807793841800 evaluation starts +peer0.org1.example.com | [9aa 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9ab 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [9ac 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 principal matched by identity 0 +peer0.org1.example.com | [9ad 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [9ae 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [9af 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9b0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 gate 1589998807793841800 evaluation succeeds +peer0.org1.example.com | [9b1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9b2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9b3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9b4 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9b5 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9b6 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [9b7 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [9b8 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9b9 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ba 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9bb 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9bc 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9bd 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [9be 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9bf 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9c0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [9c1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [9c2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [9c3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 gate 1589998807796841000 evaluation starts +peer0.org1.example.com | [9c4 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9c5 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [9c6 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 principal matched by identity 0 +peer0.org1.example.com | [9c7 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [9c8 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e8ae40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9ca 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 gate 1589998807796841000 evaluation succeeds +peer0.org1.example.com | [9cb 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9cc 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9cd 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9ce 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9cf 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9d0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9d1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9d2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [9d3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [9d4 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [9d5 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 gate 1589998807798473300 evaluation starts +peer0.org1.example.com | [9d6 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9d7 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [9d8 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 principal matched by identity 0 +peer0.org1.example.com | [9d9 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [9da 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e8b980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9dc 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 gate 1589998807798473300 evaluation succeeds +peer0.org1.example.com | [9dd 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9de 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9df 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9e0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9e1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [9e2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [9e3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9e4 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [9e5 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [9e6 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9e7 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9e8 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9e9 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ea 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [9eb 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ec 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [9ed 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9ee 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [9ef 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [9f0 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [9f1 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [9f2 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9f3 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f4 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f5 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f6 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [9f7 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [996 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161018 +peer1.org2.example.com | [997 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8FA13E51E0FC3E0E1BD67268C9A1C2BD76C3281AAAE3EAC84DA348FC361EB9C4 +peer1.org2.example.com | [998 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [999 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [99a 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [99b 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [99c 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to peer0.org2.example.com:7051 +peer1.org2.example.com | [99d 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [99e 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer0.org1.example.com:7051 +peer1.org2.example.com | [99f 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [9a0 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [9a1 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9a2 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9a3 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [9a4 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9a5 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [9a6 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [9a7 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9a8 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [9a9 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9aa 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [9ab 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9ac 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7d530 principal matched by identity 0 +peer1.org2.example.com | [9ad 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 a9 17 9f ab 79 f9 8c 06 cc a7 53 96 67 67 43 |.....y.....S.ggC| +peer1.org2.example.com | 00000010 37 06 b0 28 53 9a 14 49 3d f2 b9 39 a4 3f 1c 91 |7..(S..I=..9.?..| +peer1.org2.example.com | [9ae 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 39 1c d5 a7 bf 5e 07 b2 83 30 cc |0D. e9....^...0.| +peer1.org2.example.com | 00000010 fd 8b 3f 5d 72 38 30 15 2d e6 51 65 f3 32 a0 99 |..?]r80.-.Qe.2..| +peer1.org2.example.com | 00000020 12 c2 43 f5 02 20 0f d5 ba 11 7d 40 e7 b5 4a 7f |..C.. ....}@..J.| +peer1.org2.example.com | 00000030 9e 2d 83 e1 a4 87 91 a0 23 e0 34 00 28 e8 b6 2b |.-......#.4.(..+| +peer1.org2.example.com | 00000040 27 38 aa e8 2b c5 |'8..+.| +peer1.org2.example.com | [9af 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8081942272002462780, Envelope: 960 bytes, Signature: 0 bytes +peer1.org2.example.com | [9b0 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7d530 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [9b1 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7d530 gate 1589998813839752000 evaluation succeeds +peer1.org2.example.com | [9b2 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [9b3 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [9b4 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [9b5 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [9b6 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [9b7 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [9b8 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [9b9 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [947 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [948 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ddb0 gate 1589998808312464500 evaluation starts +peer0.org2.example.com | [949 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ddb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [94a 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ddb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [94b 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ddb0 principal matched by identity 0 +peer0.org2.example.com | [94c 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 2c be 09 b9 0b 47 60 0a 3a a4 cf 3a 6b 85 35 |.,....G`.:..:k.5| +peer0.org2.example.com | 00000010 31 f2 31 83 c2 f9 b0 8f 4b bc e6 5c 8f fa ba 24 |1.1.....K..\...$| +peer0.org2.example.com | [94d 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 94 cb a9 cc 91 a3 94 50 d4 03 |0E.!.........P..| +peer0.org2.example.com | 00000010 c3 f0 8d c2 b6 9b 58 46 fa 17 5e 65 db 99 45 62 |......XF..^e..Eb| +peer0.org2.example.com | 00000020 1a 3b 3f ba 29 02 20 44 a2 ac 27 3f 57 3b 2d cf |.;?.). D..'?W;-.| +peer0.org2.example.com | 00000030 29 8e 40 7f 26 0e cc fb 30 74 4b 87 4d 71 ee 07 |).@.&...0tK.Mq..| +peer0.org2.example.com | 00000040 1f fa 80 50 13 08 61 |...P..a| +peer0.org2.example.com | [94e 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ddb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [94f 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ddb0 gate 1589998808312464500 evaluation succeeds +peer0.org2.example.com | [950 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [951 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [952 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [953 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [954 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [955 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [956 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [957 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [958 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [959 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [95a 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [95b 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [95c 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [95d 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [95e 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [95f 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [960 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [961 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [962 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9ba 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [9bb 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9bc 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9bd 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9be 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [9bf 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9c0 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9c1 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16518909289075705512, Envelope: 962 bytes, Signature: 0 bytes +peer1.org2.example.com | [9c2 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9c3 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9c4 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [9c5 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [9c6 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [9c7 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9c8 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9c9 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9ca 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9cb 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9cc 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9cd 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9ce 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [9cf 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [9d0 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9d1 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [9d2 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [9d3 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [9d4 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003950 gate 1589998813907050400 evaluation starts +peer1.org2.example.com | [9d5 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [9d6 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003950 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [9d7 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [9d8 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003950 principal evaluation fails +peer1.org2.example.com | [9d9 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003950 gate 1589998813907050400 evaluation fails +peer1.org2.example.com | [9da 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9db 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9dc 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [9dd 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003ee0 gate 1589998813909962100 evaluation starts +peer1.org2.example.com | [9de 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [9df 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003ee0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [9e0 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [9e1 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [9e2 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [9e3 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003ee0 principal matched by identity 0 +peer1.org2.example.com | [9e4 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +peer1.org2.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +peer1.org2.example.com | [9e5 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 ae f9 7a e5 d1 ac 53 38 2b b1 |0E.!....z...S8+.| +peer1.org2.example.com | 00000010 a4 cb 80 08 b7 ab 83 46 ae 06 e5 b5 80 70 49 aa |.......F.....pI.| +peer1.org2.example.com | 00000020 ea 8e 39 c1 94 02 20 0a e7 4c 7c 7c a9 d9 3d 86 |..9... ..L||..=.| +peer1.org2.example.com | 00000030 ac 68 b3 6b bb 47 20 35 e4 b9 cd c4 8a b8 3d cb |.h.k.G 5......=.| +peer1.org2.example.com | 00000040 ba 34 00 cf cd be 1f |.4.....| +peer1.org2.example.com | [9e6 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003ee0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [9e7 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003003ee0 gate 1589998813909962100 evaluation succeeds +peer1.org2.example.com | [9e8 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [9e9 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [9ea 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:20:05.449 UTC [common.configtx] addToMap -> DEBU bd5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bd6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bd7 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bd8 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bd9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bda Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.451 UTC [common.configtx] addToMap -> DEBU bdb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.451 UTC [common.configtx] addToMap -> DEBU bdc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.451 UTC [common.configtx] addToMap -> DEBU bdd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.451 UTC [common.configtx] verifyDeltaSet -> DEBU bde Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.451 UTC [common.configtx] policyForItem -> DEBU bdf Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2020-05-20 18:20:05.452 UTC [policies] Manager -> DEBU be0 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:20:05.452 UTC [policies] Manager -> DEBU be1 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:05.452 UTC [policies] Manager -> DEBU be2 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:05.452 UTC [policies] Manager -> DEBU be3 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:20:05.453 UTC [policies] Manager -> DEBU be4 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.454 UTC [policies] Manager -> DEBU be5 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.455 UTC [policies] Manager -> DEBU be6 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2020-05-20 18:20:05.455 UTC [policies] Manager -> DEBU be7 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.456 UTC [policies] Manager -> DEBU be8 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.456 UTC [policies] Manager -> DEBU be9 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2020-05-20 18:20:05.456 UTC [policies] Evaluate -> DEBU bea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:20:05.456 UTC [cauthdsl] func1 -> DEBU beb 0xc000d8fa80 gate 1589998805456934500 evaluation starts" +orderer0.example.com | "2020-05-20 18:20:05.457 UTC [cauthdsl] func2 -> DEBU bec 0xc000d8fa80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:20:05.457 UTC [cauthdsl] func2 -> DEBU bed 0xc000d8fa80 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:20:05.457 UTC [cauthdsl] func2 -> DEBU bee 0xc000d8fa80 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:20:05.457 UTC [msp.identity] Verify -> DEBU bef Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +orderer0.example.com | 00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D|" +orderer0.example.com | "2020-05-20 18:20:05.458 UTC [msp.identity] Verify -> DEBU bf0 Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +orderer0.example.com | 00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +orderer0.example.com | 00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +orderer0.example.com | 00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +orderer0.example.com | 00000040 c1 0e dd 4e f6 78 ea |...N.x.|" +orderer0.example.com | "2020-05-20 18:20:05.458 UTC [cauthdsl] func2 -> DEBU bf1 0xc000d8fa80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:20:05.459 UTC [cauthdsl] func1 -> DEBU bf2 0xc000d8fa80 gate 1589998805456934500 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:20:05.459 UTC [policies] Evaluate -> DEBU bf3 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.459 UTC [policies] Evaluate -> DEBU bf4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.459 UTC [common.configtx] verifyDeltaSet -> DEBU bf5 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.459 UTC [common.configtx] recurseConfigMap -> DEBU bf6 Setting policy for key Admins to " +orderer0.example.com | "2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bf7 Setting policy for key Readers to " +orderer0.example.com | "2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bf8 Setting policy for key Writers to " +orderer0.example.com | "2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bf9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bfa Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bfb Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bfc Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU bfd Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU bfe Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU bff Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU c00 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU c01 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU c02 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c03 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c04 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b01 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [b02 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b03 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b04 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b05 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b06 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b07 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [b08 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b09 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b0a 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b0b 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b0c 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b0d 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b0e 05-20 18:20:13.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b0f 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b10 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b11 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b12 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [b13 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b14 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b15 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b16 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b17 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b18 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b19 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b1a 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4db0 gate 1589998813876040400 evaluation starts +peer1.org1.example.com | [b1b 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4db0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b1c 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4db0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [b1d 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4db0 principal matched by identity 0 +peer1.org1.example.com | [b1e 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f a1 3e 51 e0 fc 3e 0e 1b d6 72 68 c9 a1 c2 bd |..>Q..>...rh....| +peer1.org1.example.com | 00000010 76 c3 28 1a aa e3 ea c8 4d a3 48 fc 36 1e b9 c4 |v.(.....M.H.6...| +peer1.org1.example.com | [b1f 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 52 31 04 3a 1b d7 19 fc 70 89 0d |0D. wR1.:....p..| +peer1.org1.example.com | 00000010 9d 12 bb f6 36 6a 10 64 70 0a 13 09 17 a0 4c 59 |....6j.dp.....LY| +peer1.org1.example.com | 00000020 dc b6 5e 86 02 20 26 e1 03 20 ff 73 d8 2f 98 62 |..^.. &.. .s./.b| +peer1.org1.example.com | 00000030 4c 7f 54 09 f1 b5 a5 af 72 f1 12 93 62 d2 ce 45 |L.T.....r...b..E| +peer1.org1.example.com | 00000040 66 8c 4b ea 8f 10 |f.K...| +peer1.org1.example.com | [b20 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4db0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b21 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4db0 gate 1589998813876040400 evaluation succeeds +peer1.org1.example.com | [b22 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b23 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b24 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b25 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b26 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b27 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org1.example.com | [b28 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b29 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b2a 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b2b 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b2c 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b2d 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b2e 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b2f 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b30 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b31 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b32 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b33 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [b34 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b35 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b36 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [b37 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b38 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b39 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b3a 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [b3b 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [b3c 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [b3d 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer1.org1.example.com | [b3e 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [b3f 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0028c39e0, CONNECTING +peer1.org1.example.com | [b40 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b41 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b42 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b43 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b44 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b45 05-20 18:20:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0028c39e0, READY +peer1.org1.example.com | [b46 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [b47 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [b48 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [b49 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [b4a 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +peer1.org1.example.com | [b4b 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b4c 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b4d 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b4e 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b4f 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b50 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b51 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b52 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b53 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b54 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b55 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b56 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002960050 gate 1589998813941235200 evaluation starts +peer1.org1.example.com | [b57 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002960050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b58 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002960050 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [b59 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002960050 principal matched by identity 0 +peer1.org1.example.com | [b5a 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer1.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer1.org1.example.com | [b5b 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df 51 33 66 e7 94 d8 96 b3 8b 69 |0E.!..Q3f......i| +peer1.org1.example.com | 00000010 8f 58 37 ef f7 5c a8 63 3a 76 f6 74 e1 91 a5 31 |.X7..\.c:v.t...1| +peer1.org1.example.com | 00000020 36 0f eb de 0d 02 20 25 2a fe cd fc 33 c2 21 be |6..... %*...3.!.| +peer1.org1.example.com | 00000030 b9 6f 22 53 09 d0 8d 9c c6 10 80 97 be 7c b8 d7 |.o"S.........|..| +peer1.org1.example.com | 00000040 b6 7c 0a fb cb b1 9e |.|.....| +peer1.org1.example.com | [b5c 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002960050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b5d 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002960050 gate 1589998813941235200 evaluation succeeds +peer1.org1.example.com | [b5e 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b5f 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b60 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b61 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b62 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org1.example.com | [b63 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [963 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [964 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [965 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [966 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368660 gate 1589998808344272200 evaluation starts +peer0.org2.example.com | [967 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [968 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368660 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [969 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [96a 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368660 principal evaluation fails +peer0.org2.example.com | [96b 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368660 gate 1589998808344272200 evaluation fails +peer0.org2.example.com | [96c 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [96d 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [96e 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [96f 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368bd0 gate 1589998808356769300 evaluation starts +peer0.org2.example.com | [971 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [972 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368bd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [973 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368bd0 principal matched by identity 0 +peer0.org2.example.com | [974 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 31 17 4c 37 d2 16 39 ee 1d 34 cb a7 ec 6d 0b |.1.L7..9..4...m.| +peer0.org2.example.com | 00000010 93 d6 49 dc 35 ca f7 32 c4 ad 4c 9a 6f a6 25 dc |..I.5..2..L.o.%.| +peer0.org2.example.com | [975 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 e7 d9 63 91 ab 58 49 8d d8 c1 1b |0D. ..c..XI....| +peer0.org2.example.com | 00000010 36 d1 52 33 88 f9 5b b7 26 f9 34 f3 da bf 18 96 |6.R3..[.&.4.....| +peer0.org2.example.com | 00000020 a1 81 9b 85 02 20 3a d3 0c f2 31 e3 af 14 c2 42 |..... :...1....B| +peer0.org2.example.com | 00000030 7a 1c fe 58 a4 37 7b f8 29 5f 9d f8 8b 8d 94 9c |z..X.7{.)_......| +peer0.org2.example.com | 00000040 fa 29 4f 83 25 35 |.)O.%5| +peer0.org2.example.com | [976 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368bd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [977 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368bd0 gate 1589998808356769300 evaluation succeeds +peer0.org2.example.com | [978 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [979 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [97a 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [97b 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [97c 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [97d 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [97e 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [97f 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [980 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [981 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [982 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [983 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [984 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [985 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [986 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [987 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [988 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [970 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [98c 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [98d 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [98e 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [989 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:<\351n\002 ~xy|\336J\002\325\005\217)\357\255i\330@\032\\F\275\226\217\361\351DC\357\255\247t\014\310" > dead: +peer0.org2.example.com | [98a 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [98b 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [98f 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [990 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [991 05-20 18:20:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [992 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [993 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [994 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [995 05-20 18:20:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [996 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [997 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [998 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [999 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [99a 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [99b 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [99c 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [99d 05-20 18:20:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [99e 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [99f 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [9a0 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [9a1 05-20 18:20:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9a2 05-20 18:20:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [9a3 05-20 18:20:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [9a4 05-20 18:20:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [9a5 05-20 18:20:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [9a6 05-20 18:20:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [9a7 05-20 18:20:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9a8 05-20 18:20:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [9a9 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9aa 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f8 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f9 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [9fa 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9fb 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [9fc 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [9fd 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 31 17 4c 37 d2 16 39 ee 1d 34 cb a7 ec 6d 0b |.1.L7..9..4...m.| +peer0.org1.example.com | 00000010 93 d6 49 dc 35 ca f7 32 c4 ad 4c 9a 6f a6 25 dc |..I.5..2..L.o.%.| +peer0.org1.example.com | [9fe 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 e7 d9 63 91 ab 58 49 8d d8 c1 1b |0D. ..c..XI....| +peer0.org1.example.com | 00000010 36 d1 52 33 88 f9 5b b7 26 f9 34 f3 da bf 18 96 |6.R3..[.&.4.....| +peer0.org1.example.com | 00000020 a1 81 9b 85 02 20 3a d3 0c f2 31 e3 af 14 c2 42 |..... :...1....B| +peer0.org1.example.com | 00000030 7a 1c fe 58 a4 37 7b f8 29 5f 9d f8 8b 8d 94 9c |z..X.7{.)_......| +peer0.org1.example.com | 00000040 fa 29 4f 83 25 35 |.)O.%5| +peer0.org1.example.com | [9ff 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [a00 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 0f 93 c1 dc 13 ac 64 ee b1 75 76 |0D. s......d..uv| +peer0.org1.example.com | 00000010 46 8d 13 75 3e 65 69 99 ff df 16 2e 88 9e b8 15 |F..u>ei.........| +peer0.org1.example.com | 00000020 7e 93 5a 3c 02 20 3c c2 ce 79 b6 5d cf 51 49 b3 |~.Z<. <..y.].QI.| +peer0.org1.example.com | 00000030 c7 ef c1 56 9b a3 a0 93 93 df 32 4f 98 9b 92 b9 |...V......2O....| +peer0.org1.example.com | 00000040 b7 a1 63 f6 db 01 |..c...| +peer0.org1.example.com | [a01 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [a02 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [a03 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [a04 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [a05 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [a06 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a07 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a08 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a09 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [a0a 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a0b 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a0c 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a0d 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a0e 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a0f 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [a10 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a11 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 2c be 09 b9 0b 47 60 0a 3a a4 cf 3a 6b 85 35 |.,....G`.:..:k.5| +peer0.org1.example.com | 00000010 31 f2 31 83 c2 f9 b0 8f 4b bc e6 5c 8f fa ba 24 |1.1.....K..\...$| +peer0.org1.example.com | [a12 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [9eb 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [9ec 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9ee 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:15.92Z grpc.peer_address=172.18.0.8:57236 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=166.3µs +peer1.org2.example.com | [9ef 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [9f0 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [9f1 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [9f2 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:57236 +peer1.org2.example.com | [9f3 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57236 +peer1.org2.example.com | [9f4 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9f5 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9f6 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9f7 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9f8 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9f9 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9fa 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9fb 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9fc 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9fd 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [9fe 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [9ff 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [a00 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031600d0 gate 1589998813932557200 evaluation starts +peer1.org2.example.com | [a01 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031600d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a02 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031600d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [a03 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031600d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [a04 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031600d0 principal evaluation fails +peer0.org2.example.com | [9ab 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [9ad 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ac 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [9ae 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161013 +peer0.org2.example.com | [9af 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 978F94B2F55EF51D04E9DB0683166EF7A7849C47F1774EAF365D13808B6AAED2 +peer0.org2.example.com | [9b0 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [9b1 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [9b2 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [9b3 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [9b4 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [9b5 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [9b6 05-20 18:20:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9b7 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9b8 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9b9 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [9ba 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [9bb 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [9bc 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9bd 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [9be 05-20 18:20:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9bf 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [9c0 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161014 +peer0.org2.example.com | [9c1 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FDD200D0D05EF94D5A09B218182561EB664C3042AD18219E82503B9E85299F32 +peer0.org2.example.com | [9c2 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [9c3 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [9c4 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [9c5 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [9c6 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9c7 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [9c8 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [9c9 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ca 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [9cb 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9cc 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [9cd 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ce 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [9cf 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [9d0 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 8f 94 b2 f5 5e f5 1d 04 e9 db 06 83 16 6e f7 |.....^........n.| +peer0.org2.example.com | 00000010 a7 84 9c 47 f1 77 4e af 36 5d 13 80 8b 6a ae d2 |...G.wN.6]...j..| +peer0.org2.example.com | [9d1 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 3e 18 0a 80 68 5a f7 bd 3a 71 |0E.!..>...hZ..:q| +peer0.org2.example.com | 00000010 bd fa 2b 39 06 97 ae f9 4b f8 9a 8a 76 6d 2e 26 |..+9....K...vm.&| +peer0.org2.example.com | 00000020 29 93 a7 dc dc 02 20 6a 8d 11 c7 7e 6f d4 2b 65 |)..... j...~o.+e| +peer0.org2.example.com | 00000030 6a 5a d7 ca 9d 26 ac e0 7a 2a fb 5d b5 4c e8 0f |jZ...&..z*.].L..| +peer0.org2.example.com | 00000040 b7 1d 24 9c b8 1a 71 |..$...q| +peer0.org2.example.com | [9d2 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [9d3 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9d4 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org2.example.com | [9d5 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9d6 05-20 18:20:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org2.example.com | [9d7 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [b64 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [b65 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b66 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b67 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b68 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b69 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [b6a 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [b6b 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [b6c 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a14 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > alive: > +peer0.org1.example.com | [a13 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 94 cb a9 cc 91 a3 94 50 d4 03 |0E.!.........P..| +peer0.org1.example.com | 00000010 c3 f0 8d c2 b6 9b 58 46 fa 17 5e 65 db 99 45 62 |......XF..^e..Eb| +peer0.org1.example.com | 00000020 1a 3b 3f ba 29 02 20 44 a2 ac 27 3f 57 3b 2d cf |.;?.). D..'?W;-.| +peer0.org1.example.com | 00000030 29 8e 40 7f 26 0e cc fb 30 74 4b 87 4d 71 ee 07 |).@.&...0tK.Mq..| +peer0.org1.example.com | 00000040 1f fa 80 50 13 08 61 |...P..a| +peer0.org1.example.com | [a15 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer0.org1.example.com | [a16 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a17 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a18 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1589998788301091000, 23 but got ts: inc_num:1589998788301091000 seq_num:22 +peer0.org1.example.com | [a19 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a1a 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a1b 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a1c 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a1d 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a1e 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [a1f 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a20 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [a21 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a22 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a23 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a24 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a25 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a26 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a27 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a28 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a29 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [a2a 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a2b 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [a2c 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a2d 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a2e 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [a2f 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [a30 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [a31 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 gate 1589998808652832200 evaluation starts +peer0.org1.example.com | [a32 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [a33 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [a34 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 principal matched by identity 0 +peer0.org1.example.com | [a35 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 8f 94 b2 f5 5e f5 1d 04 e9 db 06 83 16 6e f7 |.....^........n.| +peer0.org1.example.com | 00000010 a7 84 9c 47 f1 77 4e af 36 5d 13 80 8b 6a ae d2 |...G.wN.6]...j..| +peer0.org1.example.com | [a36 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 3e 18 0a 80 68 5a f7 bd 3a 71 |0E.!..>...hZ..:q| +peer0.org1.example.com | 00000010 bd fa 2b 39 06 97 ae f9 4b f8 9a 8a 76 6d 2e 26 |..+9....K...vm.&| +peer0.org1.example.com | 00000020 29 93 a7 dc dc 02 20 6a 8d 11 c7 7e 6f d4 2b 65 |)..... j...~o.+e| +peer0.org1.example.com | 00000030 6a 5a d7 ca 9d 26 ac e0 7a 2a fb 5d b5 4c e8 0f |jZ...&..z*.].L..| +peer0.org1.example.com | 00000040 b7 1d 24 9c b8 1a 71 |..$...q| +peer0.org1.example.com | [a37 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [a38 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 gate 1589998808652832200 evaluation succeeds +peer0.org1.example.com | [a39 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a3a 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a3b 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [a3c 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [a3d 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a3e 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [a3f 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [a40 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [a41 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [a42 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a43 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a44 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a45 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a46 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a47 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a48 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a49 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a4a 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a4b 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a4c 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [a4d 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a4e 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a4f 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a50 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a51 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [a52 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a53 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a05 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031600d0 gate 1589998813932557200 evaluation fails +peer1.org2.example.com | [a06 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a07 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a08 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [a09 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003160640 gate 1589998813933781000 evaluation starts +peer1.org2.example.com | [a0a 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003160640 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a0b 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003160640 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [a0c 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003160640 principal matched by identity 0 +peer1.org2.example.com | [a0d 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer1.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer1.org2.example.com | [a0e 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 25 f1 b6 9d b9 11 aa e0 ef 38 5e |0D. Y%........8^| +peer1.org2.example.com | 00000010 2c d7 a5 bc 66 02 da f8 fc a2 3d ab b2 8c 82 22 |,...f.....=...."| +peer1.org2.example.com | 00000020 8c d1 d4 c5 02 20 03 74 8d 90 e3 4f bc 0f 4b 37 |..... .t...O..K7| +peer1.org2.example.com | 00000030 7a 93 b3 22 65 fc ed 5c 0b 5d ef 20 eb 44 8b 89 |z.."e..\.]. .D..| +peer1.org2.example.com | 00000040 e2 80 b4 ec f4 57 |.....W| +peer1.org2.example.com | [a0f 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003160640 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a10 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003160640 gate 1589998813933781000 evaluation succeeds +peer1.org2.example.com | [a11 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a12 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a13 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a14 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [a15 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57236 +peer1.org2.example.com | [a16 05-20 18:20:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57236 +peer1.org2.example.com | [9ed 05-20 18:20:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a17 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16518909289075705512, Envelope: 962 bytes, Signature: 0 bytes +peer1.org2.example.com | [a18 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9d8 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd d2 00 d0 d0 5e f9 4d 5a 09 b2 18 18 25 61 eb |.....^.MZ....%a.| +peer0.org2.example.com | 00000010 66 4c 30 42 ad 18 21 9e 82 50 3b 9e 85 29 9f 32 |fL0B..!..P;..).2| +peer0.org2.example.com | [9d9 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 45 8d 27 72 c7 ff 0b 7e ea 47 6d |0D. vE.'r...~.Gm| +peer0.org2.example.com | 00000010 58 28 0e 09 6e dc bc c2 9c 75 3e 7e 96 fa 08 a0 |X(..n....u>~....| +peer0.org2.example.com | 00000020 09 44 2b a9 02 20 06 32 d3 88 1f a7 de 51 c2 db |.D+.. .2.....Q..| +peer0.org2.example.com | 00000030 7a c1 d9 d1 a3 69 d0 fa bb c3 4b ab d6 c1 b2 2b |z....i....K....+| +peer0.org2.example.com | 00000040 15 d2 f7 7c b7 2c |...|.,| +peer0.org2.example.com | [9da 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [9db 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 84 fe ff ad 76 fc 5d b3 fb 80 13 |0D. S....v.]....| +peer0.org2.example.com | 00000010 a9 69 27 8a e7 97 8b 05 66 5e 2a 9b 9a cd 50 33 |.i'.....f^*...P3| +peer0.org2.example.com | 00000020 ad 40 3d d6 02 20 08 53 6d ea 4f 3f e7 41 1c b0 |.@=.. .Sm.O?.A..| +peer0.org2.example.com | 00000030 ae a5 c2 cc 4c 15 2e 5e 2f 62 c2 7b af 61 20 a4 |....L..^/b.{.a .| +peer0.org2.example.com | 00000040 62 ee ab 59 9d 32 |b..Y.2| +peer0.org2.example.com | [9dc 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [9dd 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [9de 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9df 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [9e0 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf a5 55 e6 ae c4 52 33 34 01 d8 19 6d 85 40 6b |..U...R34...m.@k| +peer0.org2.example.com | 00000010 3e f9 0d 6e 53 14 14 51 74 cc 83 f1 8f 78 b7 89 |>..nS..Qt....x..| +peer0.org2.example.com | [9e1 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b d6 00 6c a6 28 02 eb f6 36 67 c6 |0D. ;..l.(...6g.| +peer0.org2.example.com | 00000010 d3 2e 41 5e d1 f5 09 40 79 e0 52 1f fd 31 2b ae |..A^...@y.R..1+.| +peer0.org2.example.com | 00000020 e0 ca 93 2a 02 20 27 57 4c 27 70 97 1f b2 d1 22 |...*. 'WL'p...."| +peer0.org2.example.com | 00000030 0c c0 7c 3e 31 38 71 b3 87 22 3f 68 d1 d9 0f b2 |..|>18q.."?h....| +peer0.org2.example.com | 00000040 ef 9f 75 81 92 43 |..u..C| +peer0.org2.example.com | [9e2 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [9e3 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 79 e6 0c 05 fc e7 30 a3 e8 29 |0E.!..y.....0..)| +peer0.org2.example.com | 00000010 f0 a2 38 64 3d fd 00 6d a9 0b 5a 50 39 09 06 92 |..8d=..m..ZP9...| +peer0.org2.example.com | 00000020 85 64 6d 40 93 02 20 07 d6 64 3f 5c cb c9 0f 00 |.dm@.. ..d?\....| +peer0.org2.example.com | 00000030 2a a5 6d 3c 5b 2a f7 d7 d0 3d 7a c8 2d dd 8c 7f |*.m<[*...=z.-...| +peer0.org2.example.com | 00000040 c7 5a d4 d5 73 33 e9 |.Z..s3.| +peer0.org2.example.com | [9e4 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [9e5 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1589998788850055200, 19 but got ts: inc_num:1589998788850055200 seq_num:8 +peer0.org2.example.com | [9e6 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9e7 05-20 18:20:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9e8 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org2.example.com | [9e9 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ea 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org2.example.com | [9eb 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [9ec 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9ed 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9ee 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9ef 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9f0 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9f1 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [9f2 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [9f3 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032183c0 gate 1589998808693781000 evaluation starts +peer0.org2.example.com | [9f4 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032183c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9f5 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032183c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [9f6 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032183c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [9f7 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032183c0 principal evaluation fails +peer0.org2.example.com | [9f8 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032183c0 gate 1589998808693781000 evaluation fails +peer0.org2.example.com | [9f9 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [9fa 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [9fb 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [9fc 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003218930 gate 1589998808696902000 evaluation starts +peer0.org2.example.com | [9fd 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003218930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9fe 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003218930 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [9ff 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003218930 principal matched by identity 0 +peer0.org2.example.com | [a00 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e e1 3c 74 a6 8b 07 1d 38 c5 35 da 0d db 11 9c |>. DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ad b4 b4 8a c4 89 d7 65 8f e3 |0E.!.........e..| +peer0.org2.example.com | 00000010 14 ac 36 09 8b e1 3a 52 3b a7 7a 17 f7 03 b6 7c |..6...:R;.z....|| +peer0.org2.example.com | 00000020 14 4a c3 48 fe 02 20 10 fd 31 39 00 32 79 56 d0 |.J.H.. ..19.2yV.| +peer0.org2.example.com | 00000030 c7 71 61 8b 4a ef 34 f7 20 66 f1 ae 3f 73 0f a4 |.qa.J.4. f..?s..| +peer0.org2.example.com | 00000040 83 ee 02 33 57 83 98 |...3W..| +peer0.org2.example.com | [a02 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003218930 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a03 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003218930 gate 1589998808696902000 evaluation succeeds +peer0.org2.example.com | [a04 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a05 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a06 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a07 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a08 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [a09 05-20 18:20:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a0a 05-20 18:20:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [a0b 05-20 18:20:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd d2 00 d0 d0 5e f9 4d 5a 09 b2 18 18 25 61 eb |.....^.MZ....%a.| +peer0.org2.example.com | 00000010 66 4c 30 42 ad 18 21 9e 82 50 3b 9e 85 29 9f 32 |fL0B..!..P;..).2| +peer0.org2.example.com | [a0c 05-20 18:20:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 45 8d 27 72 c7 ff 0b 7e ea 47 6d |0D. vE.'r...~.Gm| +peer0.org2.example.com | 00000010 58 28 0e 09 6e dc bc c2 9c 75 3e 7e 96 fa 08 a0 |X(..n....u>~....| +peer0.org2.example.com | 00000020 09 44 2b a9 02 20 06 32 d3 88 1f a7 de 51 c2 db |.D+.. .2.....Q..| +peer0.org2.example.com | 00000030 7a c1 d9 d1 a3 69 d0 fa bb c3 4b ab d6 c1 b2 2b |z....i....K....+| +peer0.org2.example.com | 00000040 15 d2 f7 7c b7 2c |...|.,| +peer0.org2.example.com | [a0d 05-20 18:20:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [a0e 05-20 18:20:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [a0f 05-20 18:20:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a10 05-20 18:20:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a11 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [a12 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [a13 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a14 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [a15 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a16 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [a17 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [a18 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [a19 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a1a 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [a1b 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a1c 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [a1d 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [a1e 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 7a 04 1b e5 5a 1f 7e 57 ab 83 08 b9 ef fa 20 |Vz...Z.~W...... | +peer0.org2.example.com | 00000010 5e 70 ee 1f bf 26 77 4c 9f bc 49 8c 2a 9c 67 fd |^p...&wL..I.*.g.| +peer0.org2.example.com | [a1f 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 77 bc 45 e4 a3 06 30 b7 4a 3d e1 |0D. Ew.E...0.J=.| +peer0.org2.example.com | 00000010 0e 5e 9e e8 e0 02 f8 d6 84 b6 49 0f 02 41 da d8 |.^........I..A..| +peer0.org2.example.com | 00000020 7d 97 95 e7 02 20 4f d8 cb 54 17 6d dc ce 92 5b |}.... O..T.m...[| +peer0.org2.example.com | 00000030 72 b8 9e 69 10 a9 b6 73 61 a5 4f 8c d3 52 07 b9 |r..i...sa.O..R..| +peer0.org2.example.com | 00000040 aa 95 e5 42 bc 6c |...B.l| +peer0.org2.example.com | [a20 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [a21 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [b6d 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [b6e 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [b6f 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [b70 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [b71 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 29 76 37 cc be e2 50 c4 ea 08 0f 31 9d 3a e9 |.)v7...P....1.:.| +peer1.org1.example.com | 00000010 aa 7e b2 7f 36 b1 67 42 40 98 af d1 55 5a 0d ba |.~..6.gB@...UZ..| +peer1.org1.example.com | [b72 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 f3 14 f1 1c 3c c8 ea 46 86 5f ff |0D. 9....<..F._.| +peer1.org1.example.com | 00000010 81 46 7d b8 60 d6 fd 4a a2 50 5c 9b a6 f6 a5 b0 |.F}.`..J.P\.....| +peer1.org1.example.com | 00000020 e6 dc 52 35 02 20 7d 4d b7 8a 33 22 bd ea 45 f6 |..R5. }M..3"..E.| +peer1.org1.example.com | 00000030 a1 35 6f c8 dc d4 da ac 4c 23 2b 5b b3 fa da 07 |.5o.....L#+[....| +peer1.org1.example.com | 00000040 60 49 b9 8c 37 94 |`I..7.| +peer1.org1.example.com | [b73 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b74 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b75 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [b76 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b77 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b78 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [b79 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b7a 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b7b 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b7c 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b7d 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b7e 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b7f 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [b81 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [b82 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [b80 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer1.org1.example.com | [b83 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [b84 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [b85 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [b86 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b87 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b88 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b89 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [b8a 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b8b 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [b8c 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [b8d 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a19 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a1a 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a1b 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a1c 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org2.example.com | [a1d 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 3 +peer1.org2.example.com | [a1e 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a1f 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8081942272002462780, Envelope: 960 bytes, Signature: 0 bytes +peer1.org2.example.com | [a20 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [a22 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 fe a5 6a 16 88 e3 ee 38 d7 a0 bc |0D. 9..j....8...| +peer0.org2.example.com | 00000010 ac c4 44 b7 5c 4d 3e 08 a6 03 a3 bd 41 8f 0c 41 |..D.\M>.....A..A| +peer0.org2.example.com | 00000020 7d 36 13 19 02 20 03 ae 3f d2 c2 d2 6b 3d 63 f4 |}6... ..?...k=c.| +peer0.org2.example.com | 00000030 86 e9 c4 d8 ef b7 c0 9d b0 fb c6 ac 47 bd ee c5 |............G...| +peer0.org2.example.com | 00000040 07 26 ba be 4f 0d |.&..O.| +peer0.org2.example.com | [a23 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [a24 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [a25 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [a26 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [a27 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [a28 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a29 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a2a 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a2b 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a2c 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [a2d 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a2e 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a30 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [a31 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [a32 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a2f 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [a33 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [a34 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 08 8f 14 76 15 70 52 57 25 c4 d3 89 11 fa cc |-...v.pRW%......| +peer0.org2.example.com | 00000010 42 b7 cd c1 31 b5 56 99 69 7a dd b0 8d 5c b4 34 |B...1.V.iz...\.4| +peer0.org2.example.com | [a35 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 2d 6b 9d a2 9f cf cf 60 bb 56 |0E.!..-k.....`.V| +peer0.org2.example.com | 00000010 f3 70 27 ff 85 ff 42 a6 92 a1 b0 e3 7b 7e 50 f6 |.p'...B.....{~P.| +peer0.org2.example.com | 00000020 e3 ac f3 a1 85 02 20 60 e4 64 0a 0e 8e 68 87 da |...... `.d...h..| +peer0.org2.example.com | 00000030 8b 46 51 54 06 3f 96 59 52 00 02 3c 4d fa 27 51 |.FQT.?.YR..| +peer0.org2.example.com | [a36 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [a37 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 f0 73 5b 8f 6a 72 7b 08 ef a9 a4 |0D. e.s[.jr{....| +peer0.org2.example.com | 00000010 8b 75 c5 18 33 2a 68 87 f6 87 12 42 ea bd 27 23 |.u..3*h....B..'#| +peer0.org2.example.com | 00000020 92 a4 f9 0a 02 20 7d ab cd 68 35 9b 34 71 15 4e |..... }..h5.4q.N| +peer0.org2.example.com | 00000030 ca 7e 51 cb 84 96 b0 e3 af db 91 36 18 50 21 da |.~Q........6.P!.| +peer0.org2.example.com | 00000040 89 f2 e6 9d 1a cd |......| +peer0.org2.example.com | [a38 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [a39 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [a3a 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [a3b 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [a3c 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [a3d 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a3e 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a3f 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a40 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [a41 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [a42 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a43 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a44 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a45 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a46 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a47 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a48 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a49 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033521c0 gate 1589998808866129400 evaluation starts +peer0.org2.example.com | [a4a 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033521c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a4b 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033521c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [a4c 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033521c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [a4d 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033521c0 principal evaluation fails +peer0.org2.example.com | [a4e 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033521c0 gate 1589998808866129400 evaluation fails +peer0.org2.example.com | [a4f 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a50 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a51 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [a52 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003352730 gate 1589998808867437500 evaluation starts +peer0.org2.example.com | [a53 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003352730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a54 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003352730 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [a55 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003352730 principal matched by identity 0 +peer0.org2.example.com | [a56 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +peer0.org2.example.com | 00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +peer0.org2.example.com | [a57 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +peer0.org2.example.com | 00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +peer0.org2.example.com | 00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +peer0.org2.example.com | 00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +peer1.org2.example.com | [a21 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a22 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a23 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a24 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [a25 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [a26 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [a27 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031888b0 gate 1589998813949660300 evaluation starts +peer1.org2.example.com | [a28 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031888b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a29 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031888b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [a2a 05-20 18:20:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031888b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [a2b 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031888b0 principal evaluation fails +peer1.org2.example.com | [a2c 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031888b0 gate 1589998813949660300 evaluation fails +peer1.org2.example.com | [a2d 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a2e 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a2f 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [a30 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003188e20 gate 1589998813950839900 evaluation starts +peer1.org2.example.com | [a31 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003188e20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a32 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003188e20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [a33 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003188e20 principal matched by identity 0 +peer1.org2.example.com | [a34 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +peer1.org2.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +peer1.org2.example.com | [a35 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 86 fd 14 40 d1 30 9c a5 4f 8e 72 |0D. %...@.0..O.r| +peer1.org2.example.com | 00000010 38 76 a4 c0 1d 80 66 e8 9d dd ab 79 2c 7e 4e a5 |8v....f....y,~N.| +peer1.org2.example.com | 00000020 d0 3d b0 d4 02 20 06 63 ed 86 f1 5d 89 fc 7a 9d |.=... .c...]..z.| +peer1.org2.example.com | 00000030 fe cd a9 b0 ea 02 f1 42 73 e4 ef ad 0b 53 b9 e6 |.......Bs....S..| +peer1.org2.example.com | 00000040 0b 17 6a 86 cc 62 |..j..b| +peer1.org2.example.com | [a36 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003188e20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a37 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003188e20 gate 1589998813950839900 evaluation succeeds +peer1.org2.example.com | [a38 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a39 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a3a 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a3b 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [a3c 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a3d 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a3e 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8081942272002462780, Envelope: 960 bytes, Signature: 0 bytes +peer1.org2.example.com | [a3f 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a40 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a41 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a42 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a43 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org2.example.com | [a44 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 4 +peer1.org2.example.com | [a45 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a46 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [a47 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a48 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [a49 05-20 18:20:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [a4a 05-20 18:20:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f a1 3e 51 e0 fc 3e 0e 1b d6 72 68 c9 a1 c2 bd |..>Q..>...rh....| +peer1.org2.example.com | 00000010 76 c3 28 1a aa e3 ea c8 4d a3 48 fc 36 1e b9 c4 |v.(.....M.H.6...| +peer1.org2.example.com | [a4b 05-20 18:20:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 52 31 04 3a 1b d7 19 fc 70 89 0d |0D. wR1.:....p..| +peer1.org2.example.com | 00000010 9d 12 bb f6 36 6a 10 64 70 0a 13 09 17 a0 4c 59 |....6j.dp.....LY| +peer1.org2.example.com | 00000020 dc b6 5e 86 02 20 26 e1 03 20 ff 73 d8 2f 98 62 |..^.. &.. .s./.b| +peer1.org2.example.com | 00000030 4c 7f 54 09 f1 b5 a5 af 72 f1 12 93 62 d2 ce 45 |L.T.....r...b..E| +peer1.org2.example.com | 00000040 66 8c 4b ea 8f 10 |f.K...| +peer1.org2.example.com | [a4c 05-20 18:20:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [a4d 05-20 18:20:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a4e 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [a4f 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a50 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a51 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a52 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [a53 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a54 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a55 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a56 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [a57 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [a58 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a59 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a5a 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [a5b 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [a5c 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [a5d 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [a5e 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a5f 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [a60 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [a61 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [a62 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610041801 +peer1.org2.example.com | [a63 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F58D524BFB09419069E75A740E965DF49E8C8BDF40246077C4FFD0AD50111DCC +orderer0.example.com | "2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c05 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c06 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c07 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c08 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c09 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.463 UTC [common.configtx] recurseConfigMap -> DEBU c0a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:20:05.463 UTC [common.channelconfig] NewStandardValues -> DEBU c0b Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:20:05.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0c Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:05.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0d Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:05.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0e Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:05.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0f Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c10 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.464 UTC [common.channelconfig] NewStandardValues -> DEBU c11 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c12 Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c13 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.464 UTC [common.channelconfig] NewStandardValues -> DEBU c14 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c15 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.464 UTC [common.channelconfig] NewStandardValues -> DEBU c16 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c17 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.465 UTC [common.channelconfig] Validate -> DEBU c18 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:20:05.465 UTC [common.channelconfig] validateMSP -> DEBU c19 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.465 UTC [msp] newBccspMsp -> DEBU c1a Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.465 UTC [msp] New -> DEBU c1b Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.465 UTC [msp] Setup -> DEBU c1c Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.466 UTC [msp.identity] newIdentity -> DEBU c1d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.467 UTC [common.channelconfig] NewStandardValues -> DEBU c1e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.467 UTC [common.channelconfig] initializeProtosStruct -> DEBU c1f Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.467 UTC [common.channelconfig] NewStandardValues -> DEBU c20 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.467 UTC [common.channelconfig] initializeProtosStruct -> DEBU c21 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.468 UTC [common.channelconfig] Validate -> DEBU c22 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:20:05.468 UTC [common.channelconfig] validateMSP -> DEBU c23 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.468 UTC [msp] newBccspMsp -> DEBU c24 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.468 UTC [msp] New -> DEBU c25 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.468 UTC [msp] Setup -> DEBU c26 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.469 UTC [msp.identity] newIdentity -> DEBU c27 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [a54 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [a55 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [a56 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161012 +peer0.org1.example.com | [a58 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F3BE99BD209F3B249AC0651508367BB416312A4A62C4D48EEBDAD0D3E9146E22 +peer0.org1.example.com | [a57 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a59 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [a5b 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [a5c 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [a5d 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [a5e 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [a5f 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a5a 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [a60 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [a62 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [a63 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [a61 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a64 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [a66 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a65 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [a68 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [a6a 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [a6b 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161013 +peer0.org1.example.com | [a6c 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6BB1916D60776A67F71CF49C693E62935998CDCFB6B466A6FA970F5F336DB060 +peer0.org1.example.com | [a6d 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [a6e 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [a6f 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [a70 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a71 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a72 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a73 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a74 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a75 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [a76 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a77 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [a78 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a79 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [a7a 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a7b 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a7c 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a7d 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a7e 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [a7f 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a69 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a67 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a80 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [a81 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [a82 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [a83 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a84 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [a86 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [a87 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [a88 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a89 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a8a 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a8b 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [a8c 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [a8d 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a8e 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [a8f 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [a90 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +peer0.org1.example.com | 00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +peer0.org1.example.com | [a91 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +peer0.org1.example.com | 00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +peer0.org1.example.com | 00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +peer0.org1.example.com | 00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +peer0.org1.example.com | 00000040 5c de b0 54 71 0f |\..Tq.| +peer0.org1.example.com | [a92 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [a93 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 83 cb 98 a2 23 01 d4 81 0a 7a 5f |0D. b....#....z_| +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.471 UTC [common.channelconfig] NewStandardValues -> DEBU c28 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2a Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2b Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2c Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2d Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:05.472 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2e Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.472 UTC [common.channelconfig] NewStandardValues -> DEBU c2f Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:20:05.472 UTC [common.channelconfig] initializeProtosStruct -> DEBU c30 Processing field: Endpoints" +peer1.org1.example.com | [b8e 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b8f 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b90 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b91 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b92 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b93 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b94 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1b20 gate 1589998815935113300 evaluation starts +peer1.org1.example.com | [b95 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1b20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b96 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1b20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [b97 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1b20 principal matched by identity 0 +peer1.org1.example.com | [b98 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [b99 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [b9a 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1b20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b9b 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f1b20 gate 1589998815935113300 evaluation succeeds +peer1.org1.example.com | [b9c 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b9d 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b9e 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b9f 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ba0 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ba1 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ba2 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ba3 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [ba4 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [ba5 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ba6 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3c690 gate 1589998815944916000 evaluation starts +peer1.org1.example.com | [ba7 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3c690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ba8 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3c690 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [ba9 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3c690 principal matched by identity 0 +peer1.org1.example.com | [baa 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [bab 05-20 18:20:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [bac 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3c690 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 d7 67 ba 78 1d 46 b6 81 cc 40 93 22 53 49 79 21 |.g.x.F...@."SIy!| +peer0.org1.example.com | 00000020 df ae ad 64 02 20 7e a9 50 8b 93 50 a1 16 c2 80 |...d. ~.P..P....| +peer0.org1.example.com | 00000030 a9 df 0e c0 2f ad 9c c5 2a 0a 6e 5f ca 41 fc b3 |..../...*.n_.A..| +peer0.org1.example.com | 00000040 eb 4c 99 27 bd 2a |.L.'.*| +peer0.org1.example.com | [a94 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [a95 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [a85 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [a96 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a97 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [a98 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a99 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a9a 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a9b 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a9c 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a9d 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a9e 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +peer0.org1.example.com | [a9f 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa0 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa1 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aa2 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa3 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +peer0.org1.example.com | [aa4 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [aa5 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [aa6 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [aa7 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [aa8 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [aa9 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [aaa 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [aab 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [aac 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 gate 1589998808874457100 evaluation starts +peer0.org1.example.com | [aad 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [aae 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [aaf 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 principal matched by identity 0 +peer0.org1.example.com | [ab0 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd d2 00 d0 d0 5e f9 4d 5a 09 b2 18 18 25 61 eb |.....^.MZ....%a.| +peer0.org1.example.com | 00000010 66 4c 30 42 ad 18 21 9e 82 50 3b 9e 85 29 9f 32 |fL0B..!..P;..).2| +peer0.org1.example.com | [ab1 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 45 8d 27 72 c7 ff 0b 7e ea 47 6d |0D. vE.'r...~.Gm| +peer0.org1.example.com | 00000010 58 28 0e 09 6e dc bc c2 9c 75 3e 7e 96 fa 08 a0 |X(..n....u>~....| +peer0.org1.example.com | 00000020 09 44 2b a9 02 20 06 32 d3 88 1f a7 de 51 c2 db |.D+.. .2.....Q..| +peer0.org1.example.com | 00000030 7a c1 d9 d1 a3 69 d0 fa bb c3 4b ab d6 c1 b2 2b |z....i....K....+| +peer0.org1.example.com | 00000040 15 d2 f7 7c b7 2c |...|.,| +peer0.org1.example.com | [ab2 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ab3 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 gate 1589998808874457100 evaluation succeeds +peer0.org1.example.com | [ab4 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ab5 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ab6 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ab7 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ab8 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ab9 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [aba 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [abb 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [abc 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [abd 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [abe 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [abf 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [ac0 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +peer0.org1.example.com | 00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +peer0.org1.example.com | [ac1 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +peer0.org1.example.com | 00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +peer0.org1.example.com | 00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +peer0.org1.example.com | 00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +peer0.org1.example.com | 00000040 5c de b0 54 71 0f |\..Tq.| +peer0.org1.example.com | [ac2 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ac3 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ac4 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ac5 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ac6 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [ac7 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a64 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [a65 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a66 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a67 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [a68 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a69 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [a6a 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a6b 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [a6c 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [a6d 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a6e 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a6f 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a70 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a71 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a72 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a73 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [a74 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a75 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [a76 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a77 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [a78 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [a79 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a7a 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a7b 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a7c 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a7d 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [a7e 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [a7f 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [a80 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dea0 gate 1589998816341833300 evaluation starts +peer1.org2.example.com | [a81 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a82 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dea0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [a83 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [a84 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dea0 principal evaluation fails +peer1.org2.example.com | [a85 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dea0 gate 1589998816341833300 evaluation fails +peer1.org2.example.com | [a86 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a87 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a88 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [a89 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4410 gate 1589998816343204400 evaluation starts +peer1.org2.example.com | [a8a 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4410 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a8b 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4410 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [a8c 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4410 principal matched by identity 0 +peer1.org2.example.com | [a8d 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer1.org2.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +peer1.org2.example.com | [a8e 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer1.org2.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer1.org2.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +peer1.org2.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +peer1.org2.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +peer1.org2.example.com | [a8f 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4410 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a90 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d4410 gate 1589998816343204400 evaluation succeeds +peer1.org2.example.com | [a91 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a92 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a93 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a94 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [a95 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [a96 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org2.example.com | [a97 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [bad 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3c690 gate 1589998815944916000 evaluation succeeds +peer1.org1.example.com | [bae 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [baf 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bb0 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [bb1 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [bb2 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bb3 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bb4 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [bb5 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bb6 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bb7 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [bb8 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [bb9 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [bba 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3da30 gate 1589998815954122200 evaluation starts +peer1.org1.example.com | [bbb 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3da30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [bbc 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3da30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [bbd 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3da30 principal matched by identity 0 +peer1.org1.example.com | [bbe 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [bbf 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc002b3da30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [bc1 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3da30 gate 1589998815954122200 evaluation succeeds +peer1.org1.example.com | [bc2 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bc3 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bc4 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [bc5 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [bc6 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc7 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer1.org1.example.com | [bc8 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bc9 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 5c de b0 54 71 0f |\..Tq.| +peer0.org2.example.com | [a58 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003352730 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a59 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003352730 gate 1589998808867437500 evaluation succeeds +peer0.org2.example.com | [a5a 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a5b 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a5c 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a5d 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a5e 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [a5f 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1589998788834158300 19 {} [] 0} +peer0.org2.example.com | [a60 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a61 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a62 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a63 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [a64 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a65 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a66 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a67 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [a68 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" > alive: alive: alive:\030\n\200hZ\367\275:q\275\372+9\006\227\256\371K\370\232\212vm.&)\223\247\334\334\002 j\215\021\307~o\324+ejZ\327\312\235&\254\340z*\373]\265L\350\017\267\035$\234\270\032q" > +peer0.org2.example.com | [a69 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [a6a 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a6b 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [a6c 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a6d 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a6e 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [a6f 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" secret_envelope: > alive:\030\n\200hZ\367\275:q\275\372+9\006\227\256\371K\370\232\212vm.&)\223\247\334\334\002 j\215\021\307~o\324+ejZ\327\312\235&\254\340z*\373]\265L\350\017\267\035$\234\270\032q" > +peer0.org2.example.com | [a70 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [a71 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a72 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a73 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [a74 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:05.472 UTC [common.channelconfig] NewStandardValues -> DEBU c31 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:20:05.472 UTC [common.channelconfig] initializeProtosStruct -> DEBU c32 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:20:05.472 UTC [common.channelconfig] validateMSP -> DEBU c33 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.473 UTC [msp] newBccspMsp -> DEBU c34 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.473 UTC [msp] New -> DEBU c35 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:20:05.473 UTC [msp] Setup -> DEBU c36 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:20:05.474 UTC [msp.identity] newIdentity -> DEBU c37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:20:05.475 UTC [msp] Setup -> DEBU c38 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-05-20 18:20:05.475 UTC [msp] Setup -> DEBU c39 MSP manager setup complete, setup 3 msps" +peer1.org1.example.com | [bca 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bcb 05-20 18:20:15.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [bcc 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bcd 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bce 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [bcf 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ac8 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ac9 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [aca 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [acb 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [acc 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [acd 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ace 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 gate 1589998808905150600 evaluation starts +peer0.org1.example.com | [acf 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ad0 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [ad1 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 principal matched by identity 0 +peer0.org1.example.com | [ad2 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 7a 04 1b e5 5a 1f 7e 57 ab 83 08 b9 ef fa 20 |Vz...Z.~W...... | +peer0.org1.example.com | 00000010 5e 70 ee 1f bf 26 77 4c 9f bc 49 8c 2a 9c 67 fd |^p...&wL..I.*.g.| +peer0.org1.example.com | [ad3 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 77 bc 45 e4 a3 06 30 b7 4a 3d e1 |0D. Ew.E...0.J=.| +peer0.org1.example.com | 00000010 0e 5e 9e e8 e0 02 f8 d6 84 b6 49 0f 02 41 da d8 |.^........I..A..| +peer0.org1.example.com | 00000020 7d 97 95 e7 02 20 4f d8 cb 54 17 6d dc ce 92 5b |}.... O..T.m...[| +peer0.org1.example.com | 00000030 72 b8 9e 69 10 a9 b6 73 61 a5 4f 8c d3 52 07 b9 |r..i...sa.O..R..| +peer0.org1.example.com | 00000040 aa 95 e5 42 bc 6c |...B.l| +peer0.org1.example.com | [ad4 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ad5 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 gate 1589998808905150600 evaluation succeeds +peer0.org1.example.com | [ad6 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ad7 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ad8 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ad9 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ada 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [adb 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [adc 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [add 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [ade 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [adf 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ae0 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ae1 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ae2 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [ae3 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [ae4 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:05.475 UTC [policies] NewManagerImpl -> DEBU c3a Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.475 UTC [policies] NewManagerImpl -> DEBU c3b Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.475 UTC [policies] NewManagerImpl -> DEBU c3c Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.476 UTC [policies] NewManagerImpl -> DEBU c3d Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.476 UTC [policies] NewManagerImpl -> DEBU c3e Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.476 UTC [policies] NewManagerImpl -> DEBU c3f Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.476 UTC [policies] NewManagerImpl -> DEBU c40 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.476 UTC [policies] GetPolicy -> DEBU c41 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.477 UTC [policies] GetPolicy -> DEBU c42 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c43 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.477 UTC [policies] GetPolicy -> DEBU c44 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.477 UTC [policies] GetPolicy -> DEBU c45 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c46 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c47 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c48 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c49 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4b Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4c Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4d Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4e Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4f Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c50 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:20:05.479 UTC [policies] NewManagerImpl -> DEBU c51 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:20:05.479 UTC [policies] NewManagerImpl -> DEBU c52 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:20:05.479 UTC [common.configtx] addToMap -> DEBU c53 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:20:05.479 UTC [common.configtx] addToMap -> DEBU c54 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:20:05.479 UTC [common.configtx] addToMap -> DEBU c55 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c56 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c57 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c58 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c59 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c5a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c5b Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c5c Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c5d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c5e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c5f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c60 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c61 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c62 Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org2.example.com | [a98 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a99 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a9a 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a9b 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [a9c 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a9d 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a9e 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a9f 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [aa0 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [aa1 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aa2 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [aa3 05-20 18:20:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aa4 05-20 18:20:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aa5 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [aa6 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ae5 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ae6 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ae7 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ae8 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ae9 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [aea 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [aeb 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 gate 1589998808916739200 evaluation starts +peer0.org1.example.com | [aec 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [aed 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [aee 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 principal matched by identity 0 +peer0.org1.example.com | [aef 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 08 8f 14 76 15 70 52 57 25 c4 d3 89 11 fa cc |-...v.pRW%......| +peer0.org1.example.com | 00000010 42 b7 cd c1 31 b5 56 99 69 7a dd b0 8d 5c b4 34 |B...1.V.iz...\.4| +peer0.org1.example.com | [af0 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 2d 6b 9d a2 9f cf cf 60 bb 56 |0E.!..-k.....`.V| +peer0.org1.example.com | 00000010 f3 70 27 ff 85 ff 42 a6 92 a1 b0 e3 7b 7e 50 f6 |.p'...B.....{~P.| +peer0.org1.example.com | 00000020 e3 ac f3 a1 85 02 20 60 e4 64 0a 0e 8e 68 87 da |...... `.d...h..| +peer0.org1.example.com | 00000030 8b 46 51 54 06 3f 96 59 52 00 02 3c 4d fa 27 51 |.FQT.?.YR..| +peer0.org1.example.com | [af1 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [af2 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 gate 1589998808916739200 evaluation succeeds +peer0.org1.example.com | [af3 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [af4 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [af5 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [af6 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [af7 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [af8 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [af9 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [afa 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [afb 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [afc 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [afd 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [afe 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aff 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [b00 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b01 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b02 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b03 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [aa7 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aa8 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [aa9 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aaa 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [aab 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aac 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [aad 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aae 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aaf 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ab0 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ab1 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ab2 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ab3 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ab5 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ab6 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [ab7 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338670 gate 1589998816492056800 evaluation starts +peer1.org2.example.com | [ab4 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [ab8 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338670 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ab9 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338670 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [aba 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [abc 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338670 principal evaluation fails +peer1.org2.example.com | [abd 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338670 gate 1589998816492056800 evaluation fails +peer1.org2.example.com | [abb 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [abf 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [abe 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ac0 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ac1 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [ac3 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338bf0 gate 1589998816494474500 evaluation starts +peer1.org2.example.com | [ac4 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ac2 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ac5 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338bf0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [ac6 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338bf0 principal matched by identity 0 +peer1.org2.example.com | [ac7 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ac9 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [aca 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ac8 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [a75 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [a76 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [a77 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [a78 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a79 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a7a 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a7b 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a7c 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a7d 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a7e 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a7f 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aaf0 gate 1589998808875926900 evaluation starts +peer0.org2.example.com | [a80 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aaf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a81 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aaf0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [a82 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [a83 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aaf0 principal evaluation fails +peer0.org2.example.com | [a84 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aaf0 gate 1589998808875926900 evaluation fails +peer0.org2.example.com | [a85 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a86 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a87 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [a88 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337b060 gate 1589998808892854100 evaluation starts +peer0.org2.example.com | [a89 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337b060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a8a 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337b060 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [a8b 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337b060 principal matched by identity 0 +peer0.org2.example.com | [a8c 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 be 99 bd 20 9f 3b 24 9a c0 65 15 08 36 7b b4 |.... .;$..e..6{.| +peer0.org2.example.com | 00000010 16 31 2a 4a 62 c4 d4 8e eb da d0 d3 e9 14 6e 22 |.1*Jb.........n"| +peer0.org2.example.com | [a8d 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 4d 53 f8 c1 81 af 7e bc 00 ac e6 |0D. 1MS....~....| +peer0.org2.example.com | 00000010 97 04 4e 16 7f e8 d5 77 99 84 9b 43 4d d5 7a ac |..N....w...CM.z.| +peer0.org2.example.com | 00000020 cb 6a e4 c7 02 20 60 82 26 4a 8e 1f 07 92 97 39 |.j... `.&J.....9| +peer0.org2.example.com | 00000030 a1 36 e6 ad 35 6b b4 aa 5d f9 99 fb 0d fc 4e 8a |.6..5k..].....N.| +peer0.org2.example.com | 00000040 60 b3 a8 9a 5b 33 |`...[3| +peer0.org2.example.com | [a8e 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337b060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a8f 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337b060 gate 1589998808892854100 evaluation succeeds +peer0.org2.example.com | [a90 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a91 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a92 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a93 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a94 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [bd0 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [bd1 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcced0 gate 1589998815961837400 evaluation starts +peer1.org1.example.com | [bd2 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcced0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [bd3 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcced0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [bd4 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcced0 principal matched by identity 0 +peer1.org1.example.com | [bd5 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [bd6 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [bd7 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcced0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [bd8 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcced0 gate 1589998815961837400 evaluation succeeds +peer1.org1.example.com | [bd9 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bda 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bdb 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [bdc 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [bdd 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [bde 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [bdf 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [be0 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b04 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > alive:" > alive: +peer0.org1.example.com | [b05 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [b06 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b07 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b08 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [b09 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b0a 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [b0b 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [b0c 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b0d 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b0e 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b0f 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b10 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b11 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b12 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b13 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 gate 1589998808942748700 evaluation starts +peer0.org1.example.com | [b14 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b15 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [b16 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 principal matched by identity 0 +peer0.org1.example.com | [b17 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 08 8f 14 76 15 70 52 57 25 c4 d3 89 11 fa cc |-...v.pRW%......| +peer0.org1.example.com | 00000010 42 b7 cd c1 31 b5 56 99 69 7a dd b0 8d 5c b4 34 |B...1.V.iz...\.4| +peer0.org1.example.com | [b18 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 2d 6b 9d a2 9f cf cf 60 bb 56 |0E.!..-k.....`.V| +peer0.org1.example.com | 00000010 f3 70 27 ff 85 ff 42 a6 92 a1 b0 e3 7b 7e 50 f6 |.p'...B.....{~P.| +peer0.org1.example.com | 00000020 e3 ac f3 a1 85 02 20 60 e4 64 0a 0e 8e 68 87 da |...... `.d...h..| +peer0.org1.example.com | 00000030 8b 46 51 54 06 3f 96 59 52 00 02 3c 4d fa 27 51 |.FQT.?.YR..| +peer0.org1.example.com | [b19 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b1a 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 gate 1589998808942748700 evaluation succeeds +peer0.org1.example.com | [b1b 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b1c 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b1d 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b1e 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [acb 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [acc 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338bf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [acd 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003338bf0 gate 1589998816494474500 evaluation succeeds +peer1.org2.example.com | [ace 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [acf 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [ad0 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [ad1 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ad2 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ad3 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ad4 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ad5 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ad6 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ad7 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [ad8 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033583b0 gate 1589998816499751600 evaluation starts +peer1.org2.example.com | [ad9 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033583b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ada 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033583b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [adb 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033583b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [adc 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033583b0 principal evaluation fails +peer1.org2.example.com | [add 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033583b0 gate 1589998816499751600 evaluation fails +peer1.org2.example.com | [ade 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [adf 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ae0 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [ae1 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358920 gate 1589998816500883200 evaluation starts +peer1.org2.example.com | [ae2 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358920 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ae3 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358920 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [ae4 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358920 principal matched by identity 0 +peer1.org2.example.com | [ae5 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [ae6 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [ae7 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358920 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [ae8 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358920 gate 1589998816500883200 evaluation succeeds +peer1.org2.example.com | [ae9 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [aea 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [aeb 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [aec 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [aed 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aee 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aef 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [be1 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [be2 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [be3 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [be4 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [be5 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [be6 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [be7 05-20 18:20:15.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c827c0 gate 1589998815969967900 evaluation starts +peer1.org1.example.com | [be8 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c827c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [be9 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c827c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [bea 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c827c0 principal matched by identity 0 +peer1.org1.example.com | [beb 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [bec 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc002c827c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [bee 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c827c0 gate 1589998815969967900 evaluation succeeds +peer1.org1.example.com | [bef 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bf0 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bf1 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [bf2 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [bf3 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf4 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [bf5 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bf6 05-20 18:20:15.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bf7 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bf8 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [bf9 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bfa 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bfb 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [bfc 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [bfd 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [bfe 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c83d50 gate 1589998815999017800 evaluation starts +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c63 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c64 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c65 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c66 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c67 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c68 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c69 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6f Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c70 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c71 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c72 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c73 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c74 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c75 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c76 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c77 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c78 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c79 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c7a Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c7b Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c7c Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c7d Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [common.channelconfig] LogSanityChecks -> DEBU c7f As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [common.channelconfig] LogSanityChecks -> DEBU c80 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c81 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c82 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c83 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c84 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c85 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c86 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:20:05.483 UTC [common.channelconfig] LogSanityChecks -> DEBU c87 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c88 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c89 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8a Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8b Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8c Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8d Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8e Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c8f As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c90 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c91 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c92 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [common.capabilities] Supported -> DEBU c93 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [common.capabilities] Supported -> DEBU c94 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [orderer.common.server] func1 -> DEBU c95 Executing callback to update root CAs" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [orderer.common.server] updateTrustedRoots -> DEBU c96 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [orderer.common.server] updateTrustedRoots -> DEBU c97 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [orderer.common.server] updateTrustedRoots -> DEBU c98 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-05-20 18:20:05.484 UTC [orderer.common.server] updateTrustedRoots -> DEBU c99 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-05-20 18:20:05.485 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c9a [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +peer0.org1.example.com | [b1f 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [b20 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b21 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [b22 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 31 17 4c 37 d2 16 39 ee 1d 34 cb a7 ec 6d 0b |.1.L7..9..4...m.| +peer0.org1.example.com | 00000010 93 d6 49 dc 35 ca f7 32 c4 ad 4c 9a 6f a6 25 dc |..I.5..2..L.o.%.| +peer0.org1.example.com | [b23 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 e7 d9 63 91 ab 58 49 8d d8 c1 1b |0D. ..c..XI....| +peer0.org1.example.com | 00000010 36 d1 52 33 88 f9 5b b7 26 f9 34 f3 da bf 18 96 |6.R3..[.&.4.....| +peer0.org1.example.com | 00000020 a1 81 9b 85 02 20 3a d3 0c f2 31 e3 af 14 c2 42 |..... :...1....B| +peer0.org1.example.com | 00000030 7a 1c fe 58 a4 37 7b f8 29 5f 9d f8 8b 8d 94 9c |z..X.7{.)_......| +peer0.org1.example.com | 00000040 fa 29 4f 83 25 35 |.)O.%5| +peer0.org1.example.com | [b24 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [b25 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b26 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [b27 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +peer0.org1.example.com | 00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +peer0.org1.example.com | [b28 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +peer0.org1.example.com | 00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +peer0.org1.example.com | 00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +peer0.org1.example.com | 00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +peer0.org1.example.com | 00000040 5c de b0 54 71 0f |\..Tq.| +peer0.org1.example.com | [b29 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [b2a 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [b2b 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b2c 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b2d 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]] +peer0.org1.example.com | [b2e 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37078 +peer0.org1.example.com | [b2f 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002498ff0 +peer0.org1.example.com | [b30 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [b31 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [b32 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [b33 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [b34 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 aa 9a 2a 86 0c 6b 49 35 f1 9d 5d 3b c6 a7 b2 |T..*..kI5..];...| +peer0.org1.example.com | 00000010 f4 03 40 82 c9 c7 e3 99 cf 53 41 12 6a 78 db 0a |..@......SA.jx..| +peer0.org1.example.com | [b35 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 a8 e4 73 2f 8b 18 d6 c8 b6 01 16 |0D. y..s/.......| +peer0.org1.example.com | 00000010 74 2a bf 4a 62 ad e5 79 7e 06 22 48 7e e8 66 0e |t*.Jb..y~."H~.f.| +peer0.org1.example.com | 00000020 11 73 b7 eb 02 20 19 48 cc cf 1b 47 24 a0 23 2b |.s... .H...G$.#+| +peer0.org1.example.com | 00000030 a1 94 f8 29 a9 5e 0a d2 e2 d2 0d cc e0 ed b0 5c |...).^.........\| +peer0.org1.example.com | 00000040 b2 d9 b8 9c 00 6b |.....k| +peer0.org1.example.com | [b36 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [b37 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001715e0, header 0xc002499450 +peer0.org1.example.com | [b38 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [b39 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][35006658] processing txid: 350066582fdbaccb4f227226a0435fcb122622726f92ecfa4ee6f7ef9f6cf234 +peer0.org1.example.com | [b3a 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][35006658] Entry chaincode: name:"lscc" +peer0.org1.example.com | [b3b 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> INFO [][35006658] Entry chaincode: name:"lscc" +peer0.org1.example.com | [b3c 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [b3d 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 aa 9a 2a 86 0c 6b 49 35 f1 9d 5d 3b c6 a7 b2 |T..*..kI5..];...| +peer0.org1.example.com | 00000010 f4 03 40 82 c9 c7 e3 99 cf 53 41 12 6a 78 db 0a |..@......SA.jx..| +peer0.org1.example.com | [b3e 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 a8 e4 73 2f 8b 18 d6 c8 b6 01 16 |0D. y..s/.......| +peer0.org1.example.com | 00000010 74 2a bf 4a 62 ad e5 79 7e 06 22 48 7e e8 66 0e |t*.Jb..y~."H~.f.| +peer0.org1.example.com | 00000020 11 73 b7 eb 02 20 19 48 cc cf 1b 47 24 a0 23 2b |.s... .H...G$.#+| +peer0.org1.example.com | 00000030 a1 94 f8 29 a9 5e 0a d2 e2 d2 0d cc e0 ed b0 5c |...).^.........\| +peer0.org1.example.com | 00000040 b2 d9 b8 9c 00 6b |.....k| +peer0.org1.example.com | [b3f 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org1.example.com | [b40 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer0.org1.example.com | [b41 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org2.example.com | [af0 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [af1 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [af2 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [af3 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [af4 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [af5 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [af6 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003359b20 gate 1589998816508664100 evaluation starts +peer1.org2.example.com | [af7 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003359b20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [af8 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003359b20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [af9 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003359b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [afa 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003359b20 principal evaluation fails +peer1.org2.example.com | [afb 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003359b20 gate 1589998816508664100 evaluation fails +peer1.org2.example.com | [afc 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [afd 05-20 18:20:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [afe 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [aff 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337c090 gate 1589998816510152600 evaluation starts +peer1.org2.example.com | [b00 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337c090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b01 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337c090 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b02 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337c090 principal matched by identity 0 +peer1.org2.example.com | [b03 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [b04 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [b05 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337c090 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [b06 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337c090 gate 1589998816510152600 evaluation succeeds +peer1.org2.example.com | [b07 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b08 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b09 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b0a 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b0b 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [b0c 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [b0e 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [b0f 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b10 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [b11 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b12 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b13 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b14 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [b15 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b16 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b17 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [b18 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [b19 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [b1a 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033922c0 gate 1589998816518117400 evaluation starts +peer1.org2.example.com | [b1b 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033922c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b1c 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033922c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b1d 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033922c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [b1e 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033922c0 principal evaluation fails +peer1.org2.example.com | [b1f 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033922c0 gate 1589998816518117400 evaluation fails +peer1.org2.example.com | [b20 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b21 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b22 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b23 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003392830 gate 1589998816519671800 evaluation starts +peer1.org2.example.com | [b24 05-20 18:20:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003392830 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b25 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003392830 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b26 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003392830 principal matched by identity 0 +peer1.org2.example.com | [b27 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [b28 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [b29 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003392830 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [b2a 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003392830 gate 1589998816519671800 evaluation succeeds +peer1.org2.example.com | [b2b 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b2c 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b2d 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b2e 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b2f 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b30 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bff 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c83d50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c00 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c83d50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [c01 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c83d50 principal matched by identity 0 +peer1.org1.example.com | [c02 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [c03 05-20 18:20:15.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc002c83d50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c05 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c83d50 gate 1589998815999017800 evaluation succeeds +peer1.org1.example.com | [c06 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c07 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c08 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c09 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c0a 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [c0b 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [c0c 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [c0d 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [c0e 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c0f 05-20 18:20:16.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c10 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c11 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c12 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c13 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c14 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c15 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c16 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7810 gate 1589998816012941400 evaluation starts +peer1.org1.example.com | [c17 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7810 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c18 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7810 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [c19 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7810 principal matched by identity 0 +peer1.org1.example.com | [c1a 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [c1b 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +orderer0.example.com | "2020-05-20 18:20:05.485 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c9b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2020-05-20 18:20:05.485 UTC [msp] GetDefaultSigningIdentity -> DEBU c9c Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:20:05.485 UTC [msp] GetDefaultSigningIdentity -> DEBU c9d Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:20:05.485 UTC [msp.identity] Sign -> DEBU c9e Sign: plaintext: 0A020802120B0A090A03010203100418...AB819CE3307668257A7BAF10780BE1BC " +orderer0.example.com | "2020-05-20 18:20:05.485 UTC [msp.identity] Sign -> DEBU c9f Sign: digest: B1B93DF7F5E50310DD45C3CE9CE96C3CF4878EEC9C174BA54034643BF744444D " +orderer0.example.com | "2020-05-20 18:20:05.488 UTC [fsblkstorage] indexBlock -> DEBU ca0 Indexing block [blockNum=2, blockHash=[]byte{0xf5, 0x87, 0x9d, 0xf3, 0xcd, 0xbf, 0xbf, 0x43, 0x96, 0xe2, 0xb0, 0xb9, 0x62, 0xaf, 0x50, 0x91, 0xe3, 0xeb, 0x80, 0x22, 0x57, 0x52, 0xd1, 0xfd, 0x79, 0x4c, 0xe4, 0xfe, 0xe5, 0xa7, 0x26, 0x2a} txOffsets= +orderer0.example.com | txId=11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0 locPointer=offset=71, bytesLength=27141 +orderer0.example.com | ]" +orderer0.example.com | "2020-05-20 18:20:05.490 UTC [fsblkstorage] updateCheckpoint -> DEBU ca1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84818], isChainEmpty=[false], lastBlockNumber=[2]" +orderer0.example.com | "2020-05-20 18:20:05.490 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ca2 [channel: businesschannel] Wrote block [2]" +orderer0.example.com | "2020-05-20 18:20:05.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.928 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca4 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-05-20 18:20:05.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +orderer0.example.com | "2020-05-20 18:20:05.948 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca6 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-05-20 18:20:05.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.6µs " +orderer0.example.com | "2020-05-20 18:20:05.948 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca8 Sending msg of 28 bytes to 3 on channel businesschannel took 55.3µs" +orderer0.example.com | "2020-05-20 18:20:05.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 286.2µs " +orderer0.example.com | "2020-05-20 18:20:05.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU caa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:05.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU cab Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:06.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU cac Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:06.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cad Sending msg of 28 bytes to 3 on channel testchainid took 25.9µs" +orderer0.example.com | "2020-05-20 18:20:06.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU cae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 248.1µs " +orderer0.example.com | "2020-05-20 18:20:06.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU caf Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +orderer0.example.com | "2020-05-20 18:20:06.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2020-05-20 18:20:06.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.5µs " +orderer0.example.com | "2020-05-20 18:20:06.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0075ms " +orderer0.example.com | "2020-05-20 18:20:06.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:06.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:06.928 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:06.928 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb6 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +orderer0.example.com | "2020-05-20 18:20:06.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.5µs " +orderer0.example.com | "2020-05-20 18:20:06.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +orderer0.example.com | "2020-05-20 18:20:06.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cba Sending msg of 28 bytes to 3 on channel businesschannel took 162.7µs" +orderer0.example.com | "2020-05-20 18:20:06.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.5µs " +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [c1c 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7810 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c1d 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7810 gate 1589998816012941400 evaluation succeeds +peer1.org1.example.com | [c1e 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c1f 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c20 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c21 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c22 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c23 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [c24 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [c25 05-20 18:20:16.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c26 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c27 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c28 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c29 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c2a 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c2b 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c2c 05-20 18:20:16.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [c2d 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c2e 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [c30 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c2f 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [c31 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [c34 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c35 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [c36 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [c37 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b31 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a95 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1589998788834158300, 19 but got ts: inc_num:1589998788834158300 seq_num:18 +peer0.org1.example.com | [b42 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8053d927-6c31-43b6-a803-eacf4ebfc1ea] +orderer0.example.com | "2020-05-20 18:20:06.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99µs " +orderer0.example.com | "2020-05-20 18:20:06.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [b32 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a96 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b43 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +orderer0.example.com | "2020-05-20 18:20:06.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c33 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b33 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a97 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b44 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8053d927-6c31-43b6-a803-eacf4ebfc1ea] +orderer0.example.com | "2020-05-20 18:20:07.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbe Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [c32 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [b34 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a98 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [b45 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +orderer0.example.com | "2020-05-20 18:20:07.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cbf Sending msg of 28 bytes to 3 on channel testchainid took 38.4µs" +peer1.org1.example.com | [c38 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b35 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a9a 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b46 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +orderer0.example.com | "2020-05-20 18:20:07.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.8µs " +peer1.org1.example.com | [c39 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [b36 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a99 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b47 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU [35006658] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | "2020-05-20 18:20:07.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 129.4µs" +peer1.org1.example.com | [c3a 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b37 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393a30 gate 1589998816524197000 evaluation starts +peer0.org2.example.com | [a9b 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [a9c 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:20:07.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.9µs " +peer0.org1.example.com | [b48 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU [35006658] notifying Txid:350066582fdbaccb4f227226a0435fcb122622726f92ecfa4ee6f7ef9f6cf234, channelID: +peer1.org2.example.com | [b38 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393a30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c3b 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer1.org2.example.com | [b39 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393a30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b3a 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-05-20 18:20:07.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc3 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +peer0.org1.example.com | [b49 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [b4a 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> INFO [][35006658] Exit chaincode: name:"lscc" (2ms) +peer1.org2.example.com | [b3b 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393a30 principal evaluation fails +peer0.org1.example.com | [b4b 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU [][35006658] Exit +peer0.org2.example.com | [a9d 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b3c 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393a30 gate 1589998816524197000 evaluation fails +peer1.org1.example.com | [c3c 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:07.447 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.2003ms " +peer0.org1.example.com | [b4c 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37078 +peer0.org2.example.com | [a9e 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b3d 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b4d 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37078 grpc.code=OK grpc.call_duration=6.8163ms +peer0.org1.example.com | [b4e 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [b4f 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37078: read: connection reset by peer +peer0.org1.example.com | [b50 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [b51 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer0.org1.example.com | [b52 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [b53 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +peer0.org1.example.com | [b54 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [b55 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [b56 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b57 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [b58 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b59 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6739994221805968038, Envelope: 957 bytes, Signature: 0 bytes +peer0.org1.example.com | [b5a 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6739994221805968038, Envelope: 957 bytes, Signature: 0 bytes +peer0.org1.example.com | [b5c 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b5d 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b5e 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b5f 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b60 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b61 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b62 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b63 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 gate 1589998809839901600 evaluation starts +peer0.org1.example.com | [b64 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b65 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [b66 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 principal matched by identity 0 +peer0.org1.example.com | [b5b 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16133348451842637739, Envelope: 962 bytes, Signature: 0 bytes +peer0.org1.example.com | [b67 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +peer0.org1.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer0.org1.example.com | [b68 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 73 5e bb 22 1a ce fd c4 d7 e3 |0E.!..s^."......| +peer0.org1.example.com | 00000010 05 e7 7c f9 6a 1e b1 b4 ed 2e fe 4c 41 ed 4c 42 |..|.j......LA.LB| +peer0.org1.example.com | 00000020 e5 c0 02 0a 19 02 20 29 12 fd de 2e 6e 26 1b 7d |...... )....n&.}| +peer0.org1.example.com | 00000030 53 e4 ef 11 8d 21 11 42 ee 45 74 fc ef 59 2a c7 |S....!.B.Et..Y*.| +peer0.org1.example.com | 00000040 2c 53 7a ce 90 71 cc |,Sz..q.| +peer0.org1.example.com | [b69 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b6a 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 gate 1589998809839901600 evaluation succeeds +peer0.org1.example.com | [b6b 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b6c 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b6d 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b6e 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b3e 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b3f 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b40 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393fa0 gate 1589998816528137800 evaluation starts +peer1.org2.example.com | [b41 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393fa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b42 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393fa0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b43 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393fa0 principal matched by identity 0 +peer1.org2.example.com | [b44 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [b45 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [b46 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393fa0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [b47 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003393fa0 gate 1589998816528137800 evaluation succeeds +peer1.org2.example.com | [b48 05-20 18:20:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b49 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b4a 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b4b 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b4c 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [b4d 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [b4e 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [b4f 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [b51 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [b52 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [b53 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [b55 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b56 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [b57 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b58 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b59 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [b5a 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [b5b 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [b5c 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456810 gate 1589998816535416900 evaluation starts +peer1.org2.example.com | [b5d 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b5e 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456810 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b5f 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [b60 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456810 principal evaluation fails +peer1.org2.example.com | [b61 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456810 gate 1589998816535416900 evaluation fails +peer1.org2.example.com | [b62 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b63 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b64 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b65 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456d80 gate 1589998816536948500 evaluation starts +peer1.org2.example.com | [b66 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b67 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456d80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b68 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456d80 principal matched by identity 0 +peer1.org2.example.com | [b69 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [b6a 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [b6b 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456d80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [b6c 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456d80 gate 1589998816536948500 evaluation succeeds +peer1.org2.example.com | [b6d 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b6e 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b6f 05-20 18:20:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b70 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b71 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b72 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c3d 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer1.org1.example.com | [c3f 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c40 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [c3e 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [c41 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816101A +peer1.org1.example.com | [c42 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 75941EDB9391EDB9E944FA9E531BABF0D6A3A90D844A6EF4AEC26DD93226D76A +peer1.org1.example.com | [c44 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [c43 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [c45 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [c46 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [c47 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [c48 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c49 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c4a 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c4b 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [c4d 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c4c 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c4e 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [c4f 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c50 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c51 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c52 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [c53 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a9f 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [aa0 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [aa1 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [aa2 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [aa3 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [aa4 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [aa5 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [aa6 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [aa7 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [aa8 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [aa9 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [aaa 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [aab 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [aac 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [aad 05-20 18:20:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [aae 05-20 18:20:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [aaf 05-20 18:20:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ab0 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ab1 05-20 18:20:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [ab2 05-20 18:20:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to peer1.org1.example.com:7051 +peer0.org2.example.com | [ab3 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [ab4 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +peer0.org2.example.com | [ab5 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [ab6 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [ab7 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ab8 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [ab9 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [aba 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10790601132367151345, Envelope: 958 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:07.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:07.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:07.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:07.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc8 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2020-05-20 18:20:07.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.6µs " +orderer0.example.com | "2020-05-20 18:20:07.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cca Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +orderer0.example.com | "2020-05-20 18:20:07.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2020-05-20 18:20:07.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.8µs " +orderer0.example.com | "2020-05-20 18:20:07.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.9µs " +orderer0.example.com | "2020-05-20 18:20:07.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU cce Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:07.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:08.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:08.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +orderer0.example.com | "2020-05-20 18:20:08.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229.6µs " +orderer0.example.com | "2020-05-20 18:20:08.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd3 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2020-05-20 18:20:08.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd4 Sending msg of 28 bytes to 3 on channel businesschannel took 59.3µs" +orderer0.example.com | "2020-05-20 18:20:08.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 310µs " +orderer0.example.com | "2020-05-20 18:20:08.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 533.9µs " +orderer0.example.com | "2020-05-20 18:20:08.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:08.450 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:08.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:08.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +orderer0.example.com | "2020-05-20 18:20:08.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +orderer0.example.com | "2020-05-20 18:20:08.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdc Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +orderer0.example.com | "2020-05-20 18:20:08.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdd Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:20:08.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU cde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 254.8µs " +orderer0.example.com | "2020-05-20 18:20:08.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.6µs " +orderer0.example.com | "2020-05-20 18:20:08.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:08.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:09.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:09.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2020-05-20 18:20:09.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.2µs " +orderer0.example.com | "2020-05-20 18:20:09.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2020-05-20 18:20:09.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +orderer0.example.com | "2020-05-20 18:20:09.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233.3µs " +orderer0.example.com | "2020-05-20 18:20:09.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.3µs " +orderer0.example.com | "2020-05-20 18:20:09.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:09.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU cea Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:09.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU ceb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:09.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +orderer0.example.com | "2020-05-20 18:20:09.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.8µs " +orderer0.example.com | "2020-05-20 18:20:09.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +orderer0.example.com | "2020-05-20 18:20:09.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cef Sending msg of 28 bytes to 3 on channel businesschannel took 9.8µs" +orderer0.example.com | "2020-05-20 18:20:09.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.8µs " +orderer0.example.com | "2020-05-20 18:20:09.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 265.6µs " +orderer0.example.com | "2020-05-20 18:20:09.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:09.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:10.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:10.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel testchainid took 460.3µs" +orderer0.example.com | "2020-05-20 18:20:10.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 463.8µs " +orderer0.example.com | "2020-05-20 18:20:10.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf7 Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +orderer0.example.com | "2020-05-20 18:20:10.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf8 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-05-20 18:20:10.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.8µs " +orderer0.example.com | "2020-05-20 18:20:10.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +orderer0.example.com | "2020-05-20 18:20:10.445 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:10.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:10.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:10.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 3 on channel testchainid took 234.9µs" +orderer0.example.com | "2020-05-20 18:20:10.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.5µs " +orderer0.example.com | "2020-05-20 18:20:10.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d00 Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +orderer0.example.com | "2020-05-20 18:20:10.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d01 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +orderer0.example.com | "2020-05-20 18:20:10.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5935ms " +orderer0.example.com | "2020-05-20 18:20:10.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 872.3µs " +orderer0.example.com | "2020-05-20 18:20:10.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:10.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU d05 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:11.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:11.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +orderer0.example.com | "2020-05-20 18:20:11.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 314.7µs " +orderer0.example.com | "2020-05-20 18:20:11.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +orderer0.example.com | "2020-05-20 18:20:11.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2020-05-20 18:20:11.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.5µs " +orderer0.example.com | "2020-05-20 18:20:11.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 330.8µs " +orderer0.example.com | "2020-05-20 18:20:11.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:11.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:11.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:11.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " +orderer0.example.com | "2020-05-20 18:20:11.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d11 Sending msg of 28 bytes to 3 on channel testchainid took 9.7µs" +orderer0.example.com | "2020-05-20 18:20:11.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 45µs" +orderer0.example.com | "2020-05-20 18:20:11.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 28 bytes to 3 on channel businesschannel took 7.1µs" +orderer0.example.com | "2020-05-20 18:20:11.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 208.5µs " +orderer0.example.com | "2020-05-20 18:20:11.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.4µs " +orderer0.example.com | "2020-05-20 18:20:11.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c54 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [c55 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c56 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [c57 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [c58 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer1.org1.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +peer1.org1.example.com | [c59 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer1.org1.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer1.org1.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +peer1.org1.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +peer1.org1.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +peer1.org1.example.com | [c5a 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [c5b 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 93 09 64 9b 02 aa 2e 75 97 e8 |0E.!....d....u..| +peer1.org1.example.com | 00000010 86 92 b5 1a 44 78 da e7 71 43 ae 86 74 36 9b 2c |....Dx..qC..t6.,| +peer1.org1.example.com | 00000020 ae 42 06 4f 06 02 20 27 6c f7 04 85 ca ac 49 66 |.B.O.. 'l.....If| +peer1.org1.example.com | 00000030 ef b4 b8 38 6c 91 9d ee f9 12 0d 10 32 9b b5 06 |...8l.......2...| +peer1.org1.example.com | 00000040 82 04 ee 03 6f f8 bb |....o..| +peer1.org1.example.com | [c5c 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [c5d 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [c5e 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c5f 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c60 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [c61 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [c62 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c63 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [c64 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [c65 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer1.org1.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +peer1.org1.example.com | [c66 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer1.org1.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer1.org1.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +peer1.org1.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +peer1.org1.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +peer1.org1.example.com | [c67 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [c68 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [c69 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c6a 05-20 18:20:16.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c6b 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [c6c 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [b6f 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b70 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b71 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6739994221805968038, Envelope: 957 bytes, Signature: 0 bytes +peer0.org1.example.com | [b72 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [abb 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +peer0.org2.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer0.org2.example.com | [abc 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 73 5e bb 22 1a ce fd c4 d7 e3 |0E.!..s^."......| +peer0.org2.example.com | 00000010 05 e7 7c f9 6a 1e b1 b4 ed 2e fe 4c 41 ed 4c 42 |..|.j......LA.LB| +peer0.org2.example.com | 00000020 e5 c0 02 0a 19 02 20 29 12 fd de 2e 6e 26 1b 7d |...... )....n&.}| +peer0.org2.example.com | 00000030 53 e4 ef 11 8d 21 11 42 ee 45 74 fc ef 59 2a c7 |S....!.B.Et..Y*.| +peer0.org2.example.com | 00000040 2c 53 7a ce 90 71 cc |,Sz..q.| +peer0.org2.example.com | [abd 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10790601132367151345, Envelope: 958 bytes, Signature: 0 bytes +peer0.org2.example.com | [abe 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [abf 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 2 +peer0.org2.example.com | [ac0 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ac1 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 10017736020931152126, Envelope: 1905 bytes, Signature: 0 bytes +peer0.org2.example.com | [ac2 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ac3 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [ac4 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ac5 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ac6 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ac7 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ac8 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [ac9 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8b0 gate 1589998809627950200 evaluation starts +peer0.org2.example.com | [aca 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [acb 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [acc 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [acd 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8b0 principal evaluation fails +peer0.org2.example.com | [ace 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8b0 gate 1589998809627950200 evaluation fails +peer0.org2.example.com | [acf 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ad0 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ad1 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [ad2 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340fe20 gate 1589998809629055100 evaluation starts +peer0.org2.example.com | [ad3 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340fe20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ad4 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340fe20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [ad5 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340fe20 principal matched by identity 0 +peer0.org2.example.com | [ad6 05-20 18:20:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +peer0.org2.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +peer0.org2.example.com | [ad7 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 ae f9 7a e5 d1 ac 53 38 2b b1 |0E.!....z...S8+.| +peer0.org2.example.com | 00000010 a4 cb 80 08 b7 ab 83 46 ae 06 e5 b5 80 70 49 aa |.......F.....pI.| +peer0.org2.example.com | 00000020 ea 8e 39 c1 94 02 20 0a e7 4c 7c 7c a9 d9 3d 86 |..9... ..L||..=.| +peer0.org2.example.com | 00000030 ac 68 b3 6b bb 47 20 35 e4 b9 cd c4 8a b8 3d cb |.h.k.G 5......=.| +peer0.org2.example.com | 00000040 ba 34 00 cf cd be 1f |.4.....| +peer0.org2.example.com | [ad8 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340fe20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ad9 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340fe20 gate 1589998809629055100 evaluation succeeds +peer0.org2.example.com | [ada 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [adb 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [adc 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [add 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ade 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [adf 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [ae0 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:11.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:12.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:12.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2020-05-20 18:20:12.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.7µs " +orderer0.example.com | "2020-05-20 18:20:12.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +orderer0.example.com | "2020-05-20 18:20:12.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2020-05-20 18:20:12.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " +orderer0.example.com | "2020-05-20 18:20:12.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.3µs " +orderer0.example.com | "2020-05-20 18:20:12.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:12.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:12.542 UTC [orderer.common.server] Broadcast -> DEBU d21 Starting new Broadcast handler" +orderer0.example.com | "2020-05-20 18:20:12.543 UTC [orderer.common.broadcast] Handle -> DEBU d22 Starting new broadcast loop for 172.18.0.9:53516" +orderer0.example.com | "2020-05-20 18:20:12.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU d23 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:12.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d24 Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +orderer0.example.com | "2020-05-20 18:20:12.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.2µs " +orderer0.example.com | "2020-05-20 18:20:12.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d26 Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +orderer0.example.com | "2020-05-20 18:20:12.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d27 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2020-05-20 18:20:12.944 UTC [orderer.common.cluster.step] sendMessage -> DEBU d28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +orderer0.example.com | "2020-05-20 18:20:12.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.4µs " +orderer0.example.com | "2020-05-20 18:20:12.945 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:12.945 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:13.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:13.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2d Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2020-05-20 18:20:13.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.2µs " +orderer0.example.com | "2020-05-20 18:20:13.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2f Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +orderer0.example.com | "2020-05-20 18:20:13.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d30 Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2020-05-20 18:20:13.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +orderer0.example.com | "2020-05-20 18:20:13.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.9µs " +orderer0.example.com | "2020-05-20 18:20:13.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU d33 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:13.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU d34 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:13.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU d35 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:13.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d36 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2020-05-20 18:20:13.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU d37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +orderer0.example.com | "2020-05-20 18:20:13.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d38 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +orderer0.example.com | "2020-05-20 18:20:13.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.4µs " +orderer0.example.com | "2020-05-20 18:20:13.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3a Sending msg of 28 bytes to 3 on channel businesschannel took 303.2µs" +orderer0.example.com | "2020-05-20 18:20:13.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 342.1µs " +orderer0.example.com | "2020-05-20 18:20:13.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:13.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:14.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:14.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3f Sending msg of 28 bytes to 3 on channel testchainid took 21.4µs" +orderer0.example.com | "2020-05-20 18:20:14.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU d40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.1µs " +orderer0.example.com | "2020-05-20 18:20:14.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d41 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +orderer0.example.com | "2020-05-20 18:20:14.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d42 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2020-05-20 18:20:14.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.7µs " +orderer0.example.com | "2020-05-20 18:20:14.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.9µs " +orderer0.example.com | "2020-05-20 18:20:14.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU d45 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:14.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU d46 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:14.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU d47 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [c6d 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c6e 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [c6f 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [c70 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer1.org1.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +peer1.org1.example.com | [c71 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer1.org1.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer1.org1.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +peer1.org1.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +peer1.org1.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +peer1.org1.example.com | [c72 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [b73 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b74 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b75 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b76 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [b77 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 3 +peer0.org1.example.com | [b78 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b79 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16133348451842637739, Envelope: 962 bytes, Signature: 0 bytes +peer0.org1.example.com | [b7a 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b7b 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b7c 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b7d 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b7e 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b7f 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b80 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b81 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 gate 1589998809869668900 evaluation starts +peer0.org1.example.com | [b82 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b83 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [b84 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 principal matched by identity 0 +peer0.org1.example.com | [b85 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer0.org1.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer0.org1.example.com | [b86 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 99 79 7b 92 b7 58 27 f8 68 51 |0E.!...y{..X'.hQ| +peer0.org1.example.com | 00000010 e9 4d 29 a0 c1 f2 8e 3e b0 be a3 54 d3 c2 c6 e7 |.M)....>...T....| +peer0.org1.example.com | 00000020 7e e2 56 cc c6 02 20 22 29 78 c2 5a a5 a5 88 c2 |~.V... ")x.Z....| +peer0.org1.example.com | 00000030 f8 57 2f 1f 8f 8e 08 26 d1 18 29 5c 37 fa 22 bf |.W/....&..)\7.".| +peer0.org1.example.com | 00000040 fe 29 d3 32 f6 2c c2 |.).2.,.| +peer0.org1.example.com | [b87 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b88 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 gate 1589998809869668900 evaluation succeeds +peer0.org1.example.com | [b89 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b8a 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b8b 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b8c 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b8d 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b8e 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b8f 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16133348451842637739, Envelope: 962 bytes, Signature: 0 bytes +peer0.org1.example.com | [b90 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b91 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b92 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b93 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b94 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [b95 05-20 18:20:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 4 +peer0.org1.example.com | [b96 05-20 18:20:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b73 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [b74 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b75 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b76 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [b77 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [b78 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [b79 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003457f80 gate 1589998816545315700 evaluation starts +peer1.org2.example.com | [b7a 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003457f80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b7b 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003457f80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b7c 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003457f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [b7d 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003457f80 principal evaluation fails +peer1.org2.example.com | [b7e 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003457f80 gate 1589998816545315700 evaluation fails +peer1.org2.example.com | [b7f 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b80 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b81 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b82 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e4f0 gate 1589998816546981900 evaluation starts +peer1.org2.example.com | [b83 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e4f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b84 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e4f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [b85 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e4f0 principal matched by identity 0 +peer1.org2.example.com | [b86 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [b87 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [b88 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e4f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [b89 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346e4f0 gate 1589998816546981900 evaluation succeeds +peer1.org2.example.com | [b8a 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b8b 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b8c 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b8d 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b8e 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [b8f 05-20 18:20:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | [b97 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [b98 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [b99 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [b9a 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610031801 +peer0.org1.example.com | [b9b 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1DEF86033A83223C56916EA0CC9093889BAC36CB56F97CBAA7A186247BA8931B +peer0.org1.example.com | [b9c 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [b9d 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b9e 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b9f 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ba0 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ba1 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [ba2 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ba3 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ba4 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [ba5 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ba6 05-20 18:20:11.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ba7 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ba8 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [ba9 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [baa 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bab 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [bac 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bad 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer0.org1.example.com | [bae 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer0.org1.example.com | [baf 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bb0 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bb1 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bb2 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bb3 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bb4 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bb5 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [bb6 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:14.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d48 Sending msg of 28 bytes to 3 on channel testchainid took 283.7µs" +orderer0.example.com | "2020-05-20 18:20:14.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.8µs " +orderer0.example.com | "2020-05-20 18:20:14.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4a Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +orderer0.example.com | "2020-05-20 18:20:14.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4b Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2020-05-20 18:20:14.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 249.6µs " +orderer0.example.com | "2020-05-20 18:20:14.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.4µs " +orderer0.example.com | "2020-05-20 18:20:14.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:14.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:15.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d50 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:15.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d51 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2020-05-20 18:20:15.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d52 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.9µs " +orderer0.example.com | "2020-05-20 18:20:15.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d53 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +peer0.org1.example.com | [bb7 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [bb8 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 gate 1589998811652744700 evaluation starts +peer0.org1.example.com | [bb9 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [bba 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [bbb 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 principal matched by identity 0 +peer0.org1.example.com | [bbc 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [bbd 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [bbe 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [bbf 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 gate 1589998811652744700 evaluation succeeds +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [b90 05-20 18:20:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b91 05-20 18:20:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [b92 05-20 18:20:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [b93 05-20 18:20:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b94 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [b95 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [b96 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:15.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d54 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2020-05-20 18:20:15.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.1µs " +orderer0.example.com | "2020-05-20 18:20:15.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.7µs " +orderer0.example.com | "2020-05-20 18:20:15.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU d57 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:15.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU d58 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:15.928 UTC [orderer.common.cluster.step] handleMessage -> DEBU d59 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:15.928 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5a Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +orderer0.example.com | "2020-05-20 18:20:15.929 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278.7µs " +orderer0.example.com | "2020-05-20 18:20:15.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5c Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +orderer0.example.com | "2020-05-20 18:20:15.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5d Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-05-20 18:20:15.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.6µs " +orderer0.example.com | "2020-05-20 18:20:15.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:15.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.5µs " +orderer0.example.com | "2020-05-20 18:20:15.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU d61 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:16.048 UTC [orderer.common.server] replicateDisabledChains -> DEBU d62 No inactive chains to try to replicate" +orderer0.example.com | "2020-05-20 18:20:16.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d63 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:16.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d64 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2020-05-20 18:20:16.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95µs " +orderer0.example.com | "2020-05-20 18:20:16.449 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d66 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +orderer0.example.com | "2020-05-20 18:20:16.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d67 Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +orderer0.example.com | "2020-05-20 18:20:16.450 UTC [orderer.common.cluster.step] sendMessage -> DEBU d68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.3µs " +orderer0.example.com | "2020-05-20 18:20:16.450 UTC [orderer.common.cluster.step] sendMessage -> DEBU d69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.8µs " +orderer0.example.com | "2020-05-20 18:20:16.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:16.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:16.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:16.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6d Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2020-05-20 18:20:16.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 523µs " +orderer0.example.com | "2020-05-20 18:20:16.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6f Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +orderer0.example.com | "2020-05-20 18:20:16.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +orderer0.example.com | "2020-05-20 18:20:16.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.5µs " +orderer0.example.com | "2020-05-20 18:20:16.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0366ms " +orderer0.example.com | "2020-05-20 18:20:16.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU d73 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:16.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU d74 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:17.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:17.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d76 Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" +orderer0.example.com | "2020-05-20 18:20:17.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.7µs " +orderer0.example.com | "2020-05-20 18:20:17.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d78 Sending msg of 28 bytes to 2 on channel businesschannel took 22.9µs" +orderer0.example.com | "2020-05-20 18:20:17.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d79 Sending msg of 28 bytes to 3 on channel businesschannel took 64.3µs" +peer0.org1.example.com | [bc1 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer0.org1.example.com | [bc2 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc3 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc4 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [bc5 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc6 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc7 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [bc8 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [bc9 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bc0 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bca 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bcb 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [bcc 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [bcd 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [bce 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [bcf 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [bd0 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bd1 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bd2 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bd3 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bd4 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bd5 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [bd6 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [bd7 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [bd8 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 gate 1589998811661778900 evaluation starts +peer0.org1.example.com | [bd9 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [bda 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [bdb 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 principal matched by identity 0 +peer0.org1.example.com | [bdd 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [bde 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0003bbe20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [be0 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 gate 1589998811661778900 evaluation succeeds +peer0.org1.example.com | [be1 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [be2 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [be3 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [be4 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [be5 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [be6 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer0.org1.example.com | [be7 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [be8 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [be9 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [bea 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [beb 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bdc 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bec 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [bed 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [bee 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bef 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bf0 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bf1 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bf2 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [bf3 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [bf4 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c73 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [c74 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c75 05-20 18:20:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c76 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c77 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c78 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c79 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c7a 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c7b 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c7c 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [c7d 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [c7e 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [c7f 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c80 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c81 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c82 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c83 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c84 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c85 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [c86 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c87 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [c88 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [c89 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c8a 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [c8b 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [c8c 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b97 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [b98 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b99 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9a 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9b 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b9c 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9d 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [b9e 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +peer1.org2.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +peer1.org2.example.com | [b9f 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer1.org2.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +peer1.org2.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer1.org2.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [ba1 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 3f c9 83 f1 61 38 5c ed 92 bf 03 |0D. .?...a8\....| +peer1.org2.example.com | 00000010 11 9a 70 a5 41 01 cc ff 6e d3 40 ce 14 6a aa b6 |..p.A...n.@..j..| +peer1.org2.example.com | 00000020 d1 5f dd 40 02 20 24 66 02 91 9a 91 1b 93 a9 8f |._.@. $f........| +peer1.org2.example.com | 00000030 ca c2 65 b8 6c 81 c7 ff 27 19 65 61 4a 77 2e c8 |..e.l...'.eaJw..| +peer1.org2.example.com | 00000040 64 a6 94 77 27 55 |d..w'U| +peer1.org2.example.com | [ba2 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [ba3 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [ba4 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [ba5 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [ba6 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [ba7 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ba8 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ba9 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [baa 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [bab 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bac 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bad 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:17.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 379.2µs " +orderer0.example.com | "2020-05-20 18:20:17.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 951.8µs " +orderer0.example.com | "2020-05-20 18:20:17.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:17.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:17.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:17.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 3 on channel testchainid took 430.8µs" +orderer0.example.com | "2020-05-20 18:20:17.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.5µs " +orderer0.example.com | "2020-05-20 18:20:17.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d81 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +orderer0.example.com | "2020-05-20 18:20:17.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 561.9µs " +orderer0.example.com | "2020-05-20 18:20:17.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2020-05-20 18:20:17.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 892.5µs " +orderer0.example.com | "2020-05-20 18:20:17.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d85 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:17.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d86 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:18.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU d87 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:18.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d88 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2020-05-20 18:20:18.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62µs " +orderer0.example.com | "2020-05-20 18:20:18.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8a Sending msg of 28 bytes to 2 on channel businesschannel took 56.5µs" +orderer0.example.com | "2020-05-20 18:20:18.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel businesschannel took 50.4µs" +orderer0.example.com | "2020-05-20 18:20:18.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 691µs " +orderer0.example.com | "2020-05-20 18:20:18.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.3µs " +orderer0.example.com | "2020-05-20 18:20:18.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:18.451 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:18.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU d90 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:18.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2020-05-20 18:20:18.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +orderer0.example.com | "2020-05-20 18:20:18.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d93 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +orderer0.example.com | "2020-05-20 18:20:18.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2020-05-20 18:20:18.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.1µs " +orderer0.example.com | "2020-05-20 18:20:18.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.4µs " +orderer0.example.com | "2020-05-20 18:20:18.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:18.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU d98 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:19.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU d99 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:19.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9a Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2020-05-20 18:20:19.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.5µs " +orderer0.example.com | "2020-05-20 18:20:19.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9c Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-05-20 18:20:19.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +orderer0.example.com | "2020-05-20 18:20:19.444 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " +orderer0.example.com | "2020-05-20 18:20:19.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.3µs " +orderer0.example.com | "2020-05-20 18:20:19.445 UTC [orderer.common.cluster.step] handleMessage -> DEBU da0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:19.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU da1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:19.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU da2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:19.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.6µs " +orderer0.example.com | "2020-05-20 18:20:19.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da3 Sending msg of 28 bytes to 3 on channel testchainid took 698.3µs" +orderer0.example.com | "2020-05-20 18:20:19.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da5 Sending msg of 28 bytes to 2 on channel businesschannel took 46.1µs" +orderer0.example.com | "2020-05-20 18:20:19.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da6 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +orderer0.example.com | "2020-05-20 18:20:19.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU da7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210µs " +orderer0.example.com | "2020-05-20 18:20:19.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU da8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 324.6µs " +orderer0.example.com | "2020-05-20 18:20:19.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:19.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU daa Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:20.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU dab Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:20.425 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dac Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2020-05-20 18:20:20.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58µs " +orderer0.example.com | "2020-05-20 18:20:20.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dae Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +orderer0.example.com | "2020-05-20 18:20:20.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db0 Sending msg of 28 bytes to 3 on channel businesschannel took 413.5µs" +orderer0.example.com | "2020-05-20 18:20:20.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU daf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.5µs " +orderer0.example.com | "2020-05-20 18:20:20.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU db1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " +orderer0.example.com | "2020-05-20 18:20:20.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:20.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU db3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:20.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU db4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:20.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db5 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +orderer0.example.com | "2020-05-20 18:20:20.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU db6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " +orderer0.example.com | "2020-05-20 18:20:20.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +orderer0.example.com | "2020-05-20 18:20:20.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db8 Sending msg of 28 bytes to 3 on channel businesschannel took 51µs" +orderer0.example.com | "2020-05-20 18:20:20.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU db9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.9µs " +orderer0.example.com | "2020-05-20 18:20:20.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU dba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 923.6µs " +orderer0.example.com | "2020-05-20 18:20:20.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [bae 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > alive: +peer1.org2.example.com | [baf 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [bb0 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bb1 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [bb2 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [bb3 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb4 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb5 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb6 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb7 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb8 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb9 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [bba 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bbb 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [bbc 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bbd 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [bbe 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bbf 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [bc0 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bc1 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [bc2 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bc3 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [bc5 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bc4 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [bc6 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bc7 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [bc8 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [bc9 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [bca 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bcb 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:20.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:21.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:21.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +orderer0.example.com | "2020-05-20 18:20:21.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.6µs " +orderer0.example.com | "2020-05-20 18:20:21.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc0 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +orderer0.example.com | "2020-05-20 18:20:21.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.6µs " +orderer0.example.com | "2020-05-20 18:20:21.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc3 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-05-20 18:20:21.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " +orderer0.example.com | "2020-05-20 18:20:21.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:21.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:21.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:21.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +orderer0.example.com | "2020-05-20 18:20:21.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 282.4µs " +orderer0.example.com | "2020-05-20 18:20:21.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +orderer0.example.com | "2020-05-20 18:20:21.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dca Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2020-05-20 18:20:21.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.7µs " +orderer0.example.com | "2020-05-20 18:20:21.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.4µs " +orderer0.example.com | "2020-05-20 18:20:21.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcd Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:21.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:22.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcf Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:22.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd0 Sending msg of 28 bytes to 3 on channel testchainid took 63.7µs" +orderer0.example.com | "2020-05-20 18:20:22.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.9µs " +orderer0.example.com | "2020-05-20 18:20:22.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd2 Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +orderer0.example.com | "2020-05-20 18:20:22.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +orderer0.example.com | "2020-05-20 18:20:22.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:22.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.7µs " +orderer0.example.com | "2020-05-20 18:20:22.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs " +orderer0.example.com | "2020-05-20 18:20:22.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:22.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd8 Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +orderer0.example.com | "2020-05-20 18:20:22.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU dda Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:22.960 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddb Sending msg of 28 bytes to 3 on channel testchainid took 119.6µs" +orderer0.example.com | "2020-05-20 18:20:22.961 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529.1µs " +orderer0.example.com | "2020-05-20 18:20:22.962 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.2µs " +orderer0.example.com | "2020-05-20 18:20:22.966 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 328.2µs " +orderer0.example.com | "2020-05-20 18:20:22.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +orderer0.example.com | "2020-05-20 18:20:22.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:22.977 UTC [orderer.common.cluster.step] handleMessage -> DEBU de0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:23.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU de1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:23.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de2 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +orderer0.example.com | "2020-05-20 18:20:23.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU de3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.9µs " +orderer0.example.com | "2020-05-20 18:20:23.457 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de4 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +orderer0.example.com | "2020-05-20 18:20:23.457 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 3 on channel businesschannel took 60.5µs" +orderer0.example.com | "2020-05-20 18:20:23.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.4µs " +orderer0.example.com | "2020-05-20 18:20:23.463 UTC [orderer.common.cluster.step] sendMessage -> DEBU de7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.6061ms " +orderer0.example.com | "2020-05-20 18:20:23.480 UTC [orderer.common.cluster.step] handleMessage -> DEBU de8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:23.509 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:23.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU dea Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:23.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU deb Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +peer1.org2.example.com | [bcc 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [bcd 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bce 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [bcf 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161019 +peer1.org2.example.com | [bd0 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3D33528D1A9038B646FE95037F40B7AF9207AE2849B3E947FF61D2B49B66366C +peer1.org2.example.com | [bd1 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [bd2 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [bd3 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [bd4 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bd5 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bd6 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [bd7 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bd9 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bdb 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bda 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [bdc 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [bde 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bdd 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bdf 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [be0 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bd8 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [be1 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [be2 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [be3 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [be4 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ae1 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [ae2 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ae3 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ae4 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ae5 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ae6 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [ae7 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429620 gate 1589998809634413000 evaluation starts +peer0.org2.example.com | [ae8 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429620 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ae9 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429620 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [aea 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [aeb 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429620 principal evaluation fails +peer0.org2.example.com | [aec 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429620 gate 1589998809634413000 evaluation fails +peer0.org2.example.com | [aed 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [aee 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [aef 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [af0 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429b90 gate 1589998809636054400 evaluation starts +peer0.org2.example.com | [af1 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429b90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [af2 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429b90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [af3 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429b90 principal matched by identity 0 +peer0.org2.example.com | [af4 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +peer0.org2.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +peer0.org2.example.com | [af5 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 86 fd 14 40 d1 30 9c a5 4f 8e 72 |0D. %...@.0..O.r| +peer0.org2.example.com | 00000010 38 76 a4 c0 1d 80 66 e8 9d dd ab 79 2c 7e 4e a5 |8v....f....y,~N.| +peer0.org2.example.com | 00000020 d0 3d b0 d4 02 20 06 63 ed 86 f1 5d 89 fc 7a 9d |.=... .c...]..z.| +peer0.org2.example.com | 00000030 fe cd a9 b0 ea 02 f1 42 73 e4 ef ad 0b 53 b9 e6 |.......Bs....S..| +peer0.org2.example.com | 00000040 0b 17 6a 86 cc 62 |..j..b| +peer0.org2.example.com | [af6 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429b90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [af7 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003429b90 gate 1589998809636054400 evaluation succeeds +peer0.org2.example.com | [af8 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [af9 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [afa 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [afb 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [afc 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [afd 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [afe 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 10017736020931152126, Envelope: 1905 bytes, Signature: 0 bytes +peer0.org2.example.com | [aff 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b00 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b01 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b02 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b03 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [b04 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 3 +peer0.org2.example.com | [b05 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b06 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b07 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b08 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b09 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [c8d 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c8e 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c8f 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c90 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c91 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c92 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c93 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319aca0 gate 1589998816670285800 evaluation starts +peer1.org1.example.com | [c94 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319aca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c95 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319aca0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [c96 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319aca0 principal matched by identity 0 +peer1.org1.example.com | [c97 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +peer1.org1.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +peer1.org1.example.com | [c98 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer1.org1.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +peer1.org1.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer1.org1.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU 0xc00319aca0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c9a 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319aca0 gate 1589998816670285800 evaluation succeeds +peer1.org1.example.com | [c9b 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c9c 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c9d 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c9e 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c9f 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ca0 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [ca1 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [ca2 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [ca3 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [ca4 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ca5 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ca6 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ca7 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [ca8 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ca9 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [caa 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cab 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [cac 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; alive: alive: +peer1.org1.example.com | [cad 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [cae 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b0a 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 4 +peer0.org2.example.com | [b0b 05-20 18:20:09.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b0c 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [b0d 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [b0e 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b0f 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [b11 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [b12 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b10 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [b13 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b14 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [b15 05-20 18:20:10.18 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]] +peer0.org2.example.com | [b16 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37408 +peer0.org2.example.com | [b17 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003427db0 +peer0.org2.example.com | [b18 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [b19 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [b1a 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [b1b 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [b1c 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce 25 09 90 75 09 af 84 dd 27 2d 4b 65 6f 7b |..%..u....'-Keo{| +peer0.org2.example.com | 00000010 a5 40 1a b7 9e 1b af ab 95 f9 74 a5 6f 9d 3d ab |.@........t.o.=.| +peer0.org2.example.com | [b1d 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 c7 01 b2 82 b8 f1 d0 e7 20 10 aa |0D. $........ ..| +peer0.org2.example.com | 00000010 33 c6 ec 8b ac f6 b7 bc 3b d0 b9 22 83 e5 ac 52 |3.......;.."...R| +peer0.org2.example.com | 00000020 5f 3d 92 24 02 20 74 8d 63 d0 f6 6c 4e c1 48 fd |_=.$. t.c..lN.H.| +peer0.org2.example.com | 00000030 77 72 a7 93 04 98 fc 05 13 6f b4 b9 57 a5 54 1b |wr.......o..W.T.| +peer0.org2.example.com | 00000040 93 97 bf e6 9b a4 |......| +peer0.org2.example.com | [b1e 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [b1f 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003131b20, header 0xc0034bc1e0 +peer0.org2.example.com | [b20 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org2.example.com | [b21 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU [][0abb093f] processing txid: 0abb093ff75ff250ffe615d2e4219c41a48a1ddd6205b192f32f53ad9c14da56 +peer0.org2.example.com | [b22 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU [][0abb093f] Entry chaincode: name:"lscc" +peer0.org2.example.com | [b23 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> INFO [][0abb093f] Entry chaincode: name:"lscc" +peer0.org2.example.com | [b24 05-20 18:20:11.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [b25 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ce 25 09 90 75 09 af 84 dd 27 2d 4b 65 6f 7b |..%..u....'-Keo{| +peer0.org2.example.com | 00000010 a5 40 1a b7 9e 1b af ab 95 f9 74 a5 6f 9d 3d ab |.@........t.o.=.| +peer0.org2.example.com | [b26 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 c7 01 b2 82 b8 f1 d0 e7 20 10 aa |0D. $........ ..| +peer0.org2.example.com | 00000010 33 c6 ec 8b ac f6 b7 bc 3b d0 b9 22 83 e5 ac 52 |3.......;.."...R| +peer0.org2.example.com | 00000020 5f 3d 92 24 02 20 74 8d 63 d0 f6 6c 4e c1 48 fd |_=.$. t.c..lN.H.| +peer0.org2.example.com | 00000030 77 72 a7 93 04 98 fc 05 13 6f b4 b9 57 a5 54 1b |wr.......o..W.T.| +peer0.org2.example.com | 00000040 93 97 bf e6 9b a4 |......| +peer0.org2.example.com | [b27 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org2.example.com | [b28 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer0.org2.example.com | [b29 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer0.org2.example.com | [b2a 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3118861a-f849-498c-90a3-f69b3ff6c720] +orderer0.example.com | "2020-05-20 18:20:23.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU dec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.9µs " +orderer0.example.com | "2020-05-20 18:20:23.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ded Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +orderer0.example.com | "2020-05-20 18:20:23.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dee Sending msg of 28 bytes to 3 on channel businesschannel took 25.8µs" +orderer0.example.com | "2020-05-20 18:20:23.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU def Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +orderer0.example.com | "2020-05-20 18:20:23.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 885µs " +orderer0.example.com | "2020-05-20 18:20:23.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:23.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:24.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU df3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:24.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2020-05-20 18:20:24.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU df5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +orderer0.example.com | "2020-05-20 18:20:24.455 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df6 Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" +orderer0.example.com | "2020-05-20 18:20:24.455 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df7 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2020-05-20 18:20:24.456 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.8µs " +orderer0.example.com | "2020-05-20 18:20:24.456 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.1µs " +orderer0.example.com | "2020-05-20 18:20:24.457 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:24.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:24.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:24.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfd Sending msg of 28 bytes to 3 on channel testchainid took 16.2µs" +orderer0.example.com | "2020-05-20 18:20:24.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.9µs " +orderer0.example.com | "2020-05-20 18:20:24.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +orderer0.example.com | "2020-05-20 18:20:24.947 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-05-20 18:20:24.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 228.6µs " +orderer0.example.com | "2020-05-20 18:20:24.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.3µs " +orderer0.example.com | "2020-05-20 18:20:24.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:24.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:25.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:25.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e06 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2020-05-20 18:20:25.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU e07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 462.8µs " +orderer0.example.com | "2020-05-20 18:20:25.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2020-05-20 18:20:25.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +orderer0.example.com | "2020-05-20 18:20:25.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 447.5µs " +orderer0.example.com | "2020-05-20 18:20:25.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 506.9µs " +orderer0.example.com | "2020-05-20 18:20:25.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:25.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:25.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:25.940 UTC [orderer.common.cluster.step] sendMessage -> DEBU e10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.4µs " +orderer0.example.com | "2020-05-20 18:20:25.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2020-05-20 18:20:25.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 3 on channel businesschannel took 20.6µs" +peer1.org2.example.com | [be5 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [be6 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [be7 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +peer1.org2.example.com | 00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +peer1.org2.example.com | [be8 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +peer1.org2.example.com | 00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +peer1.org2.example.com | 00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +peer1.org2.example.com | 00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +peer1.org2.example.com | 00000040 5e da f7 a5 da 3d |^....=| +peer1.org2.example.com | [be9 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [bea 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 b8 76 70 01 62 6b 47 1c ed 3a 78 |0D. .vp.bkG..:x| +peer1.org2.example.com | 00000010 64 b4 b9 49 b7 c8 e1 da a1 24 84 f3 1e 7a 11 24 |d..I.....$...z.$| +peer1.org2.example.com | 00000020 f8 dc 79 02 02 20 45 1e 5f 7d b2 ca 1b ff 27 e4 |..y.. E._}....'.| +peer1.org2.example.com | 00000030 ae 43 27 28 2c d9 ee c8 8d 2e cb d3 64 5b 65 43 |.C'(,.......d[eC| +peer1.org2.example.com | 00000040 ea bd 72 24 86 79 |..r$.y| +peer1.org2.example.com | [beb 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [bec 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [bed 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bee 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bef 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [bf0 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bf1 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [bf2 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [bf3 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +peer1.org2.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +peer1.org2.example.com | [bf4 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer1.org2.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +peer1.org2.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer1.org2.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [bf6 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bf7 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [bf8 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +peer1.org2.example.com | 00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +peer1.org2.example.com | [bf9 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +peer1.org2.example.com | 00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +peer1.org2.example.com | 00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +peer1.org2.example.com | 00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +peer1.org2.example.com | 00000040 5e da f7 a5 da 3d |^....=| +peer1.org2.example.com | [bfa 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [bfc 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [bfd 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bfe 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [bfb 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [bff 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c00 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c01 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c02 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c03 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c04 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c05 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c06 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dff90 gate 1589998816881811200 evaluation starts +peer1.org2.example.com | [c07 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dff90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c08 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dff90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [c09 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dff90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c0a 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dff90 principal evaluation fails +peer1.org2.example.com | [c0b 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dff90 gate 1589998816881811200 evaluation fails +peer1.org2.example.com | [c0c 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c0d 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c0e 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c0f 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003506500 gate 1589998816884291500 evaluation starts +peer1.org2.example.com | [c10 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003506500 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c11 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003506500 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [c12 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003506500 principal matched by identity 0 +peer1.org2.example.com | [c13 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 7e b6 cf fe 56 ff c0 74 f9 46 fa f5 77 c8 2b |Y~...V..t.F..w.+| +peer1.org2.example.com | 00000010 0b 14 02 5b 13 d7 29 c2 f9 ba 2b f2 4a 8b 88 50 |...[..)...+.J..P| +peer1.org2.example.com | [c14 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 22 52 27 23 46 4a 10 4c 84 59 |0E.!.."R'#FJ.L.Y| +peer1.org2.example.com | 00000010 a4 14 d5 d0 e0 ee 35 36 b2 c6 9b 17 aa ae ab d4 |......56........| +peer1.org2.example.com | 00000020 9c a5 4a 03 4c 02 20 56 70 85 1b 5e 22 85 8c 2e |..J.L. Vp..^"...| +peer1.org2.example.com | 00000030 73 bf 44 ee 28 37 36 62 8e 1b 73 a8 24 23 ab a2 |s.D.(76b..s.$#..| +peer1.org2.example.com | 00000040 26 fe 94 3f da f1 0f |&..?...| +peer1.org2.example.com | [c15 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003506500 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c16 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003506500 gate 1589998816884291500 evaluation succeeds +peer0.org1.example.com | [bf5 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 gate 1589998811678190700 evaluation starts +peer0.org1.example.com | [bf6 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [bf7 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [bf8 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 principal matched by identity 0 +peer0.org1.example.com | [bf9 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [bfa 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc000428150 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [caf 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [cb0 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [cb1 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [cb2 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cb3 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [cb4 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [cb5 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [cb6 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cb7 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cb8 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cb9 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cba 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cbb 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cbc 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [cbd 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cbe 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [cbf 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc0 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc1 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [cc2 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cc3 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [cc4 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [cc5 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [cc6 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b2b 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [b2c 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3118861a-f849-498c-90a3-f69b3ff6c720] +peer0.org2.example.com | [b2d 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer0.org2.example.com | [b2e 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer0.org2.example.com | [b2f 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU [0abb093f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [b30 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU [0abb093f] notifying Txid:0abb093ff75ff250ffe615d2e4219c41a48a1ddd6205b192f32f53ad9c14da56, channelID: +peer0.org2.example.com | [b31 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | "2020-05-20 18:20:25.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 419.7µs " +orderer0.example.com | "2020-05-20 18:20:25.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.4µs " +orderer0.example.com | "2020-05-20 18:20:25.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0f Sending msg of 28 bytes to 3 on channel testchainid took 74.3µs" +orderer0.example.com | "2020-05-20 18:20:25.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:26.012 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:26.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:26.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e18 Sending msg of 28 bytes to 3 on channel testchainid took 42.3µs" +orderer0.example.com | "2020-05-20 18:20:26.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU e19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 293.3µs " +orderer0.example.com | "2020-05-20 18:20:26.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2020-05-20 18:20:26.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +orderer0.example.com | "2020-05-20 18:20:26.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.7µs " +orderer0.example.com | "2020-05-20 18:20:26.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 400.1µs " +orderer0.example.com | "2020-05-20 18:20:26.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:26.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:26.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:26.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e21 Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" +orderer0.example.com | "2020-05-20 18:20:26.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU e22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208µs " +orderer0.example.com | "2020-05-20 18:20:26.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 2 on channel businesschannel took 39.5µs" +orderer0.example.com | "2020-05-20 18:20:26.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2020-05-20 18:20:26.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +orderer0.example.com | "2020-05-20 18:20:26.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 483µs " +orderer0.example.com | "2020-05-20 18:20:26.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:26.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:27.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:27.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2a Sending msg of 28 bytes to 3 on channel testchainid took 9.2µs" +orderer0.example.com | "2020-05-20 18:20:27.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 828.8µs " +orderer0.example.com | "2020-05-20 18:20:27.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +orderer0.example.com | "2020-05-20 18:20:27.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 3 on channel businesschannel took 99µs" +orderer0.example.com | "2020-05-20 18:20:27.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 250.3µs " +orderer0.example.com | "2020-05-20 18:20:27.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.3µs " +orderer0.example.com | "2020-05-20 18:20:27.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:27.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:27.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:27.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +orderer0.example.com | "2020-05-20 18:20:27.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU e34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +orderer0.example.com | "2020-05-20 18:20:27.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +peer1.org2.example.com | [c17 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c18 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c19 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c1a 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c1b 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c1c 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1589998788301091000, 26 but got ts: inc_num:1589998788301091000 seq_num:25 +peer1.org2.example.com | [c1d 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c1e 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c1f 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [bfc 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 gate 1589998811678190700 evaluation succeeds +peer0.org1.example.com | [bfd 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bfe 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bff 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [c00 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [c01 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c02 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [c03 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c04 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c05 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c06 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [c07 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c08 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c09 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [c0a 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [c0b 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [c0c 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 gate 1589998811691457400 evaluation starts +peer0.org1.example.com | [c0d 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c0e 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [c0f 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 principal matched by identity 0 +peer0.org1.example.com | [c10 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [c11 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc000429780 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c13 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 gate 1589998811691457400 evaluation succeeds +peer0.org1.example.com | [c14 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c15 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c16 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [c17 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [c18 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [c19 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [c1a 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [c1b 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [c1c 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c1d 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c1e 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [c1f 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c20 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c21 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [c22 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [c23 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [c24 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 gate 1589998811705311100 evaluation starts +peer0.org1.example.com | [c25 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c26 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [c27 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 principal matched by identity 0 +peer0.org1.example.com | [c28 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [c29 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [c2a 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c2b 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 gate 1589998811705311100 evaluation succeeds +peer0.org1.example.com | [c2c 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c2d 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c2e 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [c2f 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [c30 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c31 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c32 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c33 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c34 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c35 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c36 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c37 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c38 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c39 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [c3a 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [c3b 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [c3c 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [c3d 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c3e 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc7 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [cc8 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [cc9 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103d90 gate 1589998816861404000 evaluation starts +peer1.org1.example.com | [cca 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103d90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ccb 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103d90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [ccc 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103d90 principal matched by identity 0 +peer1.org1.example.com | [ccd 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cce 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +peer1.org1.example.com | 00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +peer1.org1.example.com | [ccf 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +peer1.org1.example.com | 00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +peer1.org1.example.com | 00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +peer1.org1.example.com | 00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +peer1.org1.example.com | 00000040 5e da f7 a5 da 3d |^....=| +peer1.org1.example.com | [cd0 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103d90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [cd1 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103d90 gate 1589998816861404000 evaluation succeeds +peer1.org1.example.com | [cd2 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cd3 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cd4 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [cd5 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [cd6 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [cd7 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [cd8 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [cd9 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [cda 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [cdb 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cdc 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b32 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> INFO [][0abb093f] Exit chaincode: name:"lscc" (3ms) +peer0.org2.example.com | [b33 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU [][0abb093f] Exit +peer0.org2.example.com | [b34 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37408 +peer0.org2.example.com | [b35 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37408 grpc.code=OK grpc.call_duration=5.5405ms +peer0.org2.example.com | [b36 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [b37 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [b38 05-20 18:20:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [b39 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +peer0.org2.example.com | [b3a 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [b3b 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08B4D68C81C1EFB3881610031801 +peer0.org2.example.com | [b3c 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F67126E9CD14E6AA2948B0AECF595E80A5731634869A1B926EAC94E2F503104E +peer0.org2.example.com | [b3d 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [b3e 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b3f 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b40 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b41 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b42 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [b43 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b44 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [b45 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b46 05-20 18:20:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b47 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [b48 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 ee 0b f4 e9 30 e3 7a 33 aa 82 16 f3 a6 17 56 |E....0.z3......V| +peer0.org2.example.com | 00000010 5e c3 89 ba d6 b4 8f 20 c6 a5 09 c0 e5 f3 e3 c0 |^...... ........| +peer0.org2.example.com | [b49 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 5c 3f dd b0 26 fa 86 ab dc 98 |0E.!..\?..&.....| +peer0.org2.example.com | 00000010 63 2f c9 74 1a 99 40 fa d0 88 b1 b8 52 b0 09 a0 |c/.t..@.....R...| +peer0.org2.example.com | 00000020 8a 6d 90 91 c7 02 20 46 e6 2e 93 20 55 0c 59 09 |.m.... F... U.Y.| +peer0.org2.example.com | 00000030 86 d8 05 f5 7c 76 aa 5f 88 78 b4 32 46 56 0d 13 |....|v._.x.2FV..| +peer0.org2.example.com | 00000040 67 ae 44 d7 08 90 d3 |g.D....| +peer0.org2.example.com | [b4a 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b4b 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b4c 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b4d 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [b4e 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +peer0.org2.example.com | [b4f 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> INFO a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 Stopped being a leader +peer0.org2.example.com | [b50 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> INFO Renounced leadership, stopping delivery service for channel businesschannel +peer0.org2.example.com | [b51 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [b52 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b53 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU This peer will stop pass blocks from orderer service to other peers +peer0.org2.example.com | [b55 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [b56 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [b58 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [b57 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [b54 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [b59 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b5a 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> WARN Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s +peer0.org2.example.com | [b5b 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> WARN [businesschannel] Receive error: client is closing +peer0.org2.example.com | [b5c 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [b5d 05-20 18:20:11.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b5e 05-20 18:20:11.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [b5f 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [b60 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b61 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b62 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b63 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b64 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [b65 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b66 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b67 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b68 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b69 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b6a 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b6b 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [b6c 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [b6d 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c3f 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [cdd 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cde 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [cdf 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ce0 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ce1 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ce2 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [ce3 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; alive: alive: +peer1.org1.example.com | [ce4 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [ce5 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b6e 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [b6f 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b70 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [b71 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b72 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [b73 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b74 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b75 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b76 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b77 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b78 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b79 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b7a 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b7b 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [b7c 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520de0 gate 1589998812200327900 evaluation starts +peer0.org2.example.com | [b7d 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520de0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b7e 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520de0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [b7f 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [b80 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520de0 principal evaluation fails +peer0.org2.example.com | [b81 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520de0 gate 1589998812200327900 evaluation fails +peer0.org2.example.com | [b82 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b83 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b84 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [b85 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003521350 gate 1589998812203423400 evaluation starts +peer0.org2.example.com | [b87 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003521350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b88 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003521350 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [b89 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003521350 principal matched by identity 0 +peer0.org2.example.com | [b8a 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [b8b 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [b8c 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003521350 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b8d 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003521350 gate 1589998812203423400 evaluation succeeds +peer1.org2.example.com | [c21 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [c20 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c22 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c23 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c24 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c25 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c26 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c27 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c28 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c29 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516990 gate 1589998816893709200 evaluation starts +peer1.org2.example.com | [c2a 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516990 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c2b 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516990 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [c2c 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c2d 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516990 principal evaluation fails +peer1.org2.example.com | [c2e 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516990 gate 1589998816893709200 evaluation fails +peer1.org2.example.com | [c2f 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c30 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c31 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c32 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516f00 gate 1589998816894682700 evaluation starts +peer1.org2.example.com | [c33 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516f00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c34 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516f00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [c35 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516f00 principal matched by identity 0 +peer1.org2.example.com | [c36 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +peer1.org2.example.com | 00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +peer1.org2.example.com | [c37 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +peer1.org2.example.com | 00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +peer1.org2.example.com | 00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +peer1.org2.example.com | 00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +peer1.org2.example.com | 00000040 be e2 7e ca bd f3 |..~...| +peer1.org2.example.com | [c38 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516f00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c39 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516f00 gate 1589998816894682700 evaluation succeeds +peer1.org2.example.com | [c3a 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c3b 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c3c 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c3d 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c3e 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c3f 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [ce6 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [ce7 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ce8 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [ce9 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [cea 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +peer1.org1.example.com | 00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +peer1.org1.example.com | [ceb 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +peer1.org1.example.com | 00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +peer1.org1.example.com | 00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +peer1.org1.example.com | 00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +peer1.org1.example.com | 00000040 be e2 7e ca bd f3 |..~...| +peer1.org1.example.com | [cec 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [ced 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a c6 44 a9 71 5a 23 41 e7 8c b5 bb |0D. j.D.qZ#A....| +peer1.org1.example.com | 00000010 58 94 4a eb 36 18 48 bf eb 1f 86 b9 54 bc 74 11 |X.J.6.H.....T.t.| +peer1.org1.example.com | 00000020 b1 b5 b8 c2 02 20 78 de 28 b5 09 ef af 75 77 75 |..... x.(....uwu| +peer1.org1.example.com | 00000030 c9 19 d3 d7 de 67 78 78 8e 24 3b 33 7c e6 7f 39 |.....gxx.$;3|..9| +peer1.org1.example.com | 00000040 65 b0 fa 94 b4 61 |e....a| +peer1.org1.example.com | [cee 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [cef 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [cf0 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [cf1 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [cf2 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [cf3 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cf4 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cf5 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cf6 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [cf7 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cf8 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cf9 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [cfa 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [cfb 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [cfc 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cfd 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [cfe 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816101B +peer1.org1.example.com | [cff 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3824AD0D5DFF78C0A5D0DEE0D7DAAEE34BC72A3FC61F2925A596371F824274EB +peer1.org1.example.com | [d00 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [d01 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [d02 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [d03 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [d04 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d05 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d06 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d07 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [d08 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d09 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [d0a 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [d0b 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d0c 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d0d 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d0e 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d0f 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d10 05-20 18:20:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c40 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c41 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c42 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c43 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c44 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c45 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c46 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c47 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [c48 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c49 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4a 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4b 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c4c 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4d 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [c4e 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 67 ce 93 74 e5 19 22 b2 26 ec ea 8d 67 38 1e |.g..t..".&...g8.| +peer0.org1.example.com | 00000010 75 9b 51 ad 1d 21 34 73 34 72 0c bd 71 d7 d9 c3 |u.Q..!4s4r..q...| +peer0.org1.example.com | [c4f 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 1c c4 89 f0 1b c1 72 4e d2 71 6c |0D. A......rN.ql| +peer0.org1.example.com | 00000010 b2 10 11 61 44 58 5a 52 ce f5 87 73 80 86 52 47 |...aDXZR...s..RG| +peer0.org1.example.com | 00000020 5c a3 c9 59 02 20 36 a3 ed 95 eb 45 e3 c5 6d 45 |\..Y. 6....E..mE| +peer0.org1.example.com | 00000030 a0 04 b4 b8 cf bb 4b f7 55 6c 55 8d 51 72 fe 08 |......K.UlU.Qr..| +peer0.org1.example.com | 00000040 1c c0 58 4f af 5d |..XO.]| +peer0.org1.example.com | [c50 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [c51 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 ef 66 e4 67 af cb 37 3f 92 bc |0E.!...f.g..7?..| +peer0.org1.example.com | 00000010 b6 96 6a c7 eb d3 21 20 81 da 4c 7a 61 d8 ec 03 |..j...! ..Lza...| +peer0.org1.example.com | 00000020 35 bd 67 9f ee 02 20 7a f5 fc ec 21 ff a4 6b 9c |5.g... z...!..k.| +peer0.org2.example.com | [b8e 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b8f 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b90 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [b91 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [b92 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b93 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b86 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b94 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b95 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [b96 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b97 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b98 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b99 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b9b 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b9c 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [b9a 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b9d 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550550 gate 1589998812208814400 evaluation starts +peer0.org2.example.com | [b9e 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b9f 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550550 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [ba0 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ba2 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [ba1 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [ba3 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550550 principal evaluation fails +peer0.org2.example.com | [ba4 05-20 18:20:12.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550550 gate 1589998812208814400 evaluation fails +peer0.org2.example.com | [ba5 05-20 18:20:12.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ba6 05-20 18:20:12.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ba7 05-20 18:20:12.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [ba8 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550ac0 gate 1589998812220014200 evaluation starts +peer1.org1.example.com | [d11 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d12 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d13 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d14 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d15 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [d16 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d17 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d18 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d19 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d1a 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d1b 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c40 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [c41 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [c42 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [c43 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c44 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c45 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c46 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [c47 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c48 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c49 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c4a 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [c4b 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; alive: alive: alive: +peer1.org2.example.com | [c4c 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [c4d 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c4e 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [c4f 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c50 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [c51 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [c52 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c53 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c54 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c55 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c56 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c57 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:27.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.6µs " +orderer0.example.com | "2020-05-20 18:20:27.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2020-05-20 18:20:27.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " +orderer0.example.com | "2020-05-20 18:20:27.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:27.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:28.394 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:28.395 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 3 on channel testchainid took 10µs" +orderer0.example.com | "2020-05-20 18:20:28.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.4µs " +orderer0.example.com | "2020-05-20 18:20:28.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 51.1µs" +orderer0.example.com | "2020-05-20 18:20:28.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 97.4µs" +orderer0.example.com | "2020-05-20 18:20:28.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.3µs " +orderer0.example.com | "2020-05-20 18:20:28.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " +orderer0.example.com | "2020-05-20 18:20:28.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:28.414 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:28.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:28.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e45 Sending msg of 28 bytes to 3 on channel testchainid took 12µs" +orderer0.example.com | "2020-05-20 18:20:28.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU e46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.6µs " +orderer0.example.com | "2020-05-20 18:20:28.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e47 Sending msg of 28 bytes to 2 on channel businesschannel took 37.4µs" +orderer0.example.com | "2020-05-20 18:20:28.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 3 on channel businesschannel took 13.2µs" +orderer0.example.com | "2020-05-20 18:20:28.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU e49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.4µs " +orderer0.example.com | "2020-05-20 18:20:28.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +orderer0.example.com | "2020-05-20 18:20:28.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:28.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:29.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:29.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4e Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2020-05-20 18:20:29.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.6µs " +orderer0.example.com | "2020-05-20 18:20:29.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 3 on channel businesschannel took 98.5µs" +orderer0.example.com | "2020-05-20 18:20:29.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-05-20 18:20:29.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.6µs " +orderer0.example.com | "2020-05-20 18:20:29.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " +orderer0.example.com | "2020-05-20 18:20:29.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU e54 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:29.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:29.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:29.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e57 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2020-05-20 18:20:29.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU e58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.7µs " +orderer0.example.com | "2020-05-20 18:20:29.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" +orderer0.example.com | "2020-05-20 18:20:29.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5a Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2020-05-20 18:20:29.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 179.7µs " +orderer0.example.com | "2020-05-20 18:20:29.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +orderer0.example.com | "2020-05-20 18:20:29.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:29.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:30.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:30.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e60 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-05-20 18:20:30.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU e61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 674.4µs " +orderer0.example.com | "2020-05-20 18:20:30.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +orderer0.example.com | "2020-05-20 18:20:30.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2020-05-20 18:20:30.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56µs " +orderer0.example.com | "2020-05-20 18:20:30.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.7µs " +orderer0.example.com | "2020-05-20 18:20:30.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:30.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:30.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:30.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +orderer0.example.com | "2020-05-20 18:20:30.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.8µs " +orderer0.example.com | "2020-05-20 18:20:30.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +orderer0.example.com | "2020-05-20 18:20:30.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2020-05-20 18:20:30.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 624.4µs " +orderer0.example.com | "2020-05-20 18:20:30.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 243.3µs " +orderer0.example.com | "2020-05-20 18:20:30.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:30.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:31.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:31.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +orderer0.example.com | "2020-05-20 18:20:31.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU e73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.3µs " +orderer0.example.com | "2020-05-20 18:20:31.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +orderer0.example.com | "2020-05-20 18:20:31.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.5µs " +orderer0.example.com | "2020-05-20 18:20:31.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 2 on channel businesschannel took 253.2µs" +orderer0.example.com | "2020-05-20 18:20:31.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.5µs " +orderer0.example.com | "2020-05-20 18:20:31.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:31.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:31.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7a Sending msg of 28 bytes to 2 on channel businesschannel took 67.7µs" +orderer0.example.com | "2020-05-20 18:20:31.941 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +peer0.org1.example.com | 00000030 1b 07 46 af d9 c4 9d e8 e1 31 3f 75 b8 9a 96 ae |..F......1?u....| +peer0.org1.example.com | 00000040 c3 60 d4 98 8e 6a 6d |.`...jm| +peer0.org1.example.com | [c52 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [c53 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [c54 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [c55 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [c56 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [c57 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c58 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c59 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [c5a 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c5b 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c5c 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c5d 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c5e 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [c5f 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [c60 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c61 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c62 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c63 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c64 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c65 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c66 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c67 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37094 +peer0.org1.example.com | [c68 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00252a640 +peer0.org1.example.com | [c69 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [c6a 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [c6b 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [c6c 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c6d 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org2.example.com | [ba9 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550ac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [baa 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550ac0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [bab 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550ac0 principal matched by identity 0 +peer0.org2.example.com | [bac 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [bad 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [bae 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550ac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [baf 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003550ac0 gate 1589998812220014200 evaluation succeeds +peer0.org2.example.com | [bb0 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bb1 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bb2 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [bb3 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [bb4 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [bb5 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [bb6 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [bb7 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [bb9 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bba 05-20 18:20:12.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bbb 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer0.org2.example.com | [bbc 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bbd 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bbe 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bbf 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [bc0 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bc1 05-20 18:20:12.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bc2 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [bc3 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [bc4 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [bc5 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356ccf0 gate 1589998812240776000 evaluation starts +peer0.org2.example.com | [bc6 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356ccf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [bc7 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356ccf0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [bc8 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356ccf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [bc9 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356ccf0 principal evaluation fails +peer0.org2.example.com | [bca 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356ccf0 gate 1589998812240776000 evaluation fails +peer0.org2.example.com | [bcb 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [bcc 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [bcd 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [bce 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356d260 gate 1589998812241111400 evaluation starts +peer0.org2.example.com | [bcf 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356d260 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [bd0 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356d260 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [bd1 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356d260 principal matched by identity 0 +peer0.org2.example.com | [bd2 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [bd3 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [bd4 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356d260 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [bd5 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356d260 gate 1589998812241111400 evaluation succeeds +peer0.org2.example.com | [bd6 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bd7 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bd8 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [bd9 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [bda 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bdb 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d1c 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d1d 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219ef0 gate 1589998818695610500 evaluation starts +peer1.org1.example.com | [d1e 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219ef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d1f 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219ef0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [d20 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219ef0 principal matched by identity 0 +peer1.org1.example.com | [d21 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 53 a2 26 ab 7b 16 84 8d b7 8e 72 ff 9f 08 fa |&S.&.{.....r....| +peer1.org1.example.com | 00000010 0f 2e d6 67 68 27 ac 07 bb a3 7e 59 44 44 7e 31 |...gh'....~YDD~1| +peer1.org1.example.com | [d22 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 be b8 67 b8 54 e4 3a 00 46 0b d6 |0D. X..g.T.:.F..| +peer1.org1.example.com | 00000010 ed 64 eb 0d 9b 5e 17 e3 fd da fb 34 1d 8e 07 2c |.d...^.....4...,| +peer1.org1.example.com | 00000020 1d f0 37 35 02 20 39 ce d5 a0 79 f9 9d 7c 5a 84 |..75. 9...y..|Z.| +peer1.org1.example.com | 00000030 75 58 f9 08 53 d8 4a 16 b8 ae ad f2 4e 30 4d 45 |uX..S.J.....N0ME| +peer1.org1.example.com | 00000040 f6 f9 c7 bf 90 86 |......| +peer1.org1.example.com | [d23 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219ef0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d24 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219ef0 gate 1589998818695610500 evaluation succeeds +peer1.org1.example.com | [d25 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d26 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d27 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d28 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d29 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d2a 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [d2b 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [d2c 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [d2d 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [d2e 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d2f 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d31 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d30 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d32 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d33 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d34 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d35 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d36 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d37 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d38 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d39 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d3a 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d3b 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d3c 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c58 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c59 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035343d0 gate 1589998816909781600 evaluation starts +peer1.org2.example.com | [c5a 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035343d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c5b 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035343d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [c5c 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035343d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c5d 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035343d0 principal evaluation fails +peer1.org2.example.com | [c5e 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035343d0 gate 1589998816909781600 evaluation fails +peer1.org2.example.com | [c5f 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c60 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c61 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c62 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003534940 gate 1589998816911999000 evaluation starts +peer1.org2.example.com | [c63 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003534940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c64 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003534940 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [c65 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003534940 principal matched by identity 0 +peer1.org2.example.com | [c66 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer1.org2.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +peer1.org2.example.com | [c67 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer1.org2.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer1.org2.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +peer1.org2.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +peer1.org2.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +peer1.org2.example.com | [c68 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003534940 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c69 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003534940 gate 1589998816911999000 evaluation succeeds +peer1.org2.example.com | [c6a 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c6b 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c6c 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c6d 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c6e 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c6f 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c70 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [c71 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +peer1.org2.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +peer1.org2.example.com | [c72 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer1.org2.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +peer1.org2.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer1.org2.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c74 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c75 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [c76 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +peer1.org2.example.com | 00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +peer1.org2.example.com | [c77 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +peer1.org2.example.com | 00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +peer1.org2.example.com | 00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +peer1.org2.example.com | 00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +peer1.org2.example.com | 00000040 5e da f7 a5 da 3d |^....=| +peer1.org2.example.com | [c78 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c79 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [c7a 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c7b 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c7c 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c7d 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:31.943 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 335.8µs " +orderer0.example.com | "2020-05-20 18:20:31.944 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 892.5µs " +orderer0.example.com | "2020-05-20 18:20:31.944 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:31.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2020-05-20 18:20:31.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.1µs " +orderer0.example.com | "2020-05-20 18:20:31.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:31.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:32.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e83 Sending msg of 28 bytes to 2 on channel businesschannel took 106µs" +orderer0.example.com | "2020-05-20 18:20:32.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU e84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 159.4µs " +orderer0.example.com | "2020-05-20 18:20:32.429 UTC [orderer.common.cluster.step] handleMessage -> DEBU e85 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:32.430 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +orderer0.example.com | "2020-05-20 18:20:32.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +orderer0.example.com | "2020-05-20 18:20:32.432 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.4µs " +orderer0.example.com | "2020-05-20 18:20:32.430 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.8µs " +orderer0.example.com | "2020-05-20 18:20:32.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:32.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:32.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:32.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8d Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2020-05-20 18:20:32.906 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.9348ms " +orderer0.example.com | "2020-05-20 18:20:32.929 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +orderer0.example.com | "2020-05-20 18:20:32.929 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2020-05-20 18:20:32.929 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.9µs " +orderer0.example.com | "2020-05-20 18:20:32.929 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.9µs " +orderer0.example.com | "2020-05-20 18:20:32.930 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:32.932 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:33.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:33.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e96 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +orderer0.example.com | "2020-05-20 18:20:33.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU e97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.8µs " +orderer0.example.com | "2020-05-20 18:20:33.414 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +orderer0.example.com | "2020-05-20 18:20:33.414 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e99 Sending msg of 28 bytes to 3 on channel businesschannel took 93.9µs" +orderer0.example.com | "2020-05-20 18:20:33.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.3µs " +orderer0.example.com | "2020-05-20 18:20:33.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.9µs " +orderer0.example.com | "2020-05-20 18:20:33.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:33.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:33.893 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:33.894 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9f Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2020-05-20 18:20:33.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.8µs " +orderer0.example.com | "2020-05-20 18:20:33.913 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +orderer0.example.com | "2020-05-20 18:20:33.914 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea2 Sending msg of 28 bytes to 3 on channel businesschannel took 25µs" +orderer0.example.com | "2020-05-20 18:20:33.914 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +orderer0.example.com | "2020-05-20 18:20:33.931 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 17.3088ms " +orderer0.example.com | "2020-05-20 18:20:33.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:33.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:34.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:34.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea8 Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +orderer0.example.com | "2020-05-20 18:20:34.413 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2020-05-20 18:20:34.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.5µs " +peer1.org2.example.com | [c7e 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c7f 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [c80 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c81 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c82 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c83 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c84 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c85 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c86 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c87 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035606b0 gate 1589998818300839400 evaluation starts +peer1.org2.example.com | [c88 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035606b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c89 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035606b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [c8a 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035606b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c8b 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035606b0 principal evaluation fails +peer1.org2.example.com | [c8c 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035606b0 gate 1589998818300839400 evaluation fails +peer1.org2.example.com | [c8d 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c8e 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c8f 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c90 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c91 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035548b0 gate 1589998818307653600 evaluation starts +peer1.org2.example.com | [c92 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035548b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c93 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035548b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [c94 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035548b0 principal matched by identity 0 +peer1.org2.example.com | [c95 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 24 ad 0d 5d ff 78 c0 a5 d0 de e0 d7 da ae e3 |8$..].x.........| +peer1.org2.example.com | 00000010 4b c7 2a 3f c6 1f 29 25 a5 96 37 1f 82 42 74 eb |K.*?..)%..7..Bt.| +peer1.org2.example.com | [c96 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 2e 64 fa 37 6f bd ab cb aa a3 |0E.!...d.7o.....| +peer1.org2.example.com | 00000010 3d b7 40 ee cf 08 50 26 25 b7 e5 08 ef 27 d8 6d |=.@...P&%....'.m| +peer1.org2.example.com | 00000020 18 8e cf 62 3c 02 20 27 4e 85 47 75 c1 dc 4f 5d |...b<. 'N.Gu..O]| +peer1.org2.example.com | 00000030 63 65 e4 4d f6 54 28 aa 7f 1e e1 4d cb 72 2b 31 |ce.M.T(....M.r+1| +peer1.org2.example.com | 00000040 bd 4b 42 c1 09 11 f7 |.KB....| +peer1.org2.example.com | [c97 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035548b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c98 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035548b0 gate 1589998818307653600 evaluation succeeds +peer1.org2.example.com | [c99 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c9a 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c9b 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c9c 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:20:34.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.9µs " +orderer0.example.com | "2020-05-20 18:20:34.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU eac Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7347ms " +orderer0.example.com | "2020-05-20 18:20:34.423 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ead Sending msg of 28 bytes to 3 on channel testchainid took 433.1µs" +orderer0.example.com | "2020-05-20 18:20:34.444 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:34.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:34.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:34.893 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb1 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2020-05-20 18:20:34.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +orderer0.example.com | "2020-05-20 18:20:34.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +orderer0.example.com | "2020-05-20 18:20:34.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb4 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2020-05-20 18:20:34.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 645.7µs " +orderer0.example.com | "2020-05-20 18:20:34.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5822ms " +orderer0.example.com | "2020-05-20 18:20:34.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:34.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:35.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:35.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eba Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +orderer0.example.com | "2020-05-20 18:20:35.393 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178µs " +orderer0.example.com | "2020-05-20 18:20:35.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2020-05-20 18:20:35.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +orderer0.example.com | "2020-05-20 18:20:35.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.4µs " +orderer0.example.com | "2020-05-20 18:20:35.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.145ms " +orderer0.example.com | "2020-05-20 18:20:35.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:35.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:35.893 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:35.893 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec3 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +orderer0.example.com | "2020-05-20 18:20:35.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.2µs " +orderer0.example.com | "2020-05-20 18:20:35.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +orderer0.example.com | "2020-05-20 18:20:35.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec6 Sending msg of 28 bytes to 3 on channel businesschannel took 104.5µs" +orderer0.example.com | "2020-05-20 18:20:35.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +orderer0.example.com | "2020-05-20 18:20:35.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.7µs " +orderer0.example.com | "2020-05-20 18:20:35.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:35.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:36.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:36.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecc Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +orderer0.example.com | "2020-05-20 18:20:36.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.2µs " +orderer0.example.com | "2020-05-20 18:20:36.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +orderer0.example.com | "2020-05-20 18:20:36.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecf Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +orderer0.example.com | "2020-05-20 18:20:36.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 228.6µs " +peer0.org2.example.com | [bdc 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [bdd 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bde 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bdf 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [be0 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [be1 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [be2 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c460 gate 1589998812242190200 evaluation starts +peer0.org2.example.com | [be3 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [be4 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c460 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [be5 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [be6 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c460 principal evaluation fails +peer0.org2.example.com | [be7 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c460 gate 1589998812242190200 evaluation fails +peer0.org2.example.com | [be8 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [be9 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d3d 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d3e 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d3f 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d40 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [d41 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d42 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d43 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d45 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [d44 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d46 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d47 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d48 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d49 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d4a 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d4b 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [d4c 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 0e 66 6e 81 6b eb 9c 98 55 be b1 05 c1 44 a8 |..fn.k...U....D.| +peer1.org1.example.com | 00000010 1c 49 4f 3d 9f e9 9a 46 24 38 22 9c c8 98 70 76 |.IO=...F$8"...pv| +peer1.org1.example.com | [d4d 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 18 81 03 e1 18 46 be e3 f2 58 95 |0D. _.....F...X.| +peer1.org1.example.com | 00000010 be 45 44 09 6c ab d9 f0 70 17 d7 f0 3b 9e 99 87 |.ED.l...p...;...| +peer1.org1.example.com | 00000020 b1 76 17 e3 02 20 42 72 3a 99 70 01 6f 0b 51 7b |.v... Br:.p.o.Q{| +peer1.org1.example.com | 00000030 24 55 90 5b 8c 30 07 db b0 5d 21 ba e6 70 20 79 |$U.[.0...]!..p y| +peer1.org1.example.com | 00000040 79 ee c3 bd 42 51 |y...BQ| +peer1.org1.example.com | [d4e 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d4f 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [d50 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [d51 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [d52 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [d53 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d54 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d55 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d56 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d57 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d58 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d59 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [d5a 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d5b 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [d5c 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d5d 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [c6e 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [c6f 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [c70 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [c71 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [c72 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 43 f3 9e 54 ee c3 c0 32 14 16 ca cb 78 df 6f |.C..T...2....x.o| +peer0.org1.example.com | 00000010 5a ba ac f3 1b 4e c8 a4 37 f5 fa 32 ab f6 17 c4 |Z....N..7..2....| +peer0.org1.example.com | [c73 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd d8 85 f9 7f ca ff 23 ae bb 8e |0E.!........#...| +peer0.org1.example.com | 00000010 0c 51 62 57 05 32 0d fa ae 9d 46 ad 67 31 25 75 |.QbW.2....F.g1%u| +peer0.org1.example.com | 00000020 f8 c8 5a 64 28 02 20 1c a9 aa c7 eb 0e cd 7b 4e |..Zd(. .......{N| +peer0.org1.example.com | 00000030 d4 cf 03 d6 39 f4 72 45 18 c2 32 89 89 97 c4 34 |....9.rE..2....4| +peer0.org1.example.com | 00000040 1f 1f 43 e6 87 d7 73 |..C...s| +peer0.org1.example.com | [c74 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [c75 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002665b0, header 0xc00252ab40 +peer1.org2.example.com | [c9d 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [c9e 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [c9f 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [ca0 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [ca1 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [ca2 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca3 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca4 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca5 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca6 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ca7 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca8 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ca9 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [caa 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cab 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cac 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cad 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cae 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [caf 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [cb0 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb1 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [cb2 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cb3 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cb4 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cb5 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cb6 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cb7 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cb8 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cb9 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cba 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cbb 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cbc 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cbd 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cbe 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cbf 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [cc0 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 53 a2 26 ab 7b 16 84 8d b7 8e 72 ff 9f 08 fa |&S.&.{.....r....| +peer1.org2.example.com | 00000010 0f 2e d6 67 68 27 ac 07 bb a3 7e 59 44 44 7e 31 |...gh'....~YDD~1| +peer1.org1.example.com | [d5e 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d5f 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d60 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d61 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d62 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d63 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d64 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d65 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d66 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d67 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d68 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d69 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d6a 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d6b 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d6c 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d6d 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [d6f 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d6e 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d70 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d71 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d72 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d73 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d74 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [d75 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d76 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2100 gate 1589998818881552600 evaluation starts +peer0.org1.example.com | [c76 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [c77 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] processing txid: d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb +peer0.org1.example.com | [c78 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +peer0.org1.example.com | [c79 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [c7a 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +peer0.org1.example.com | [c7b 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] Entry chaincode: name:"lscc" +peer0.org1.example.com | [c7c 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d4839f2a] Entry chaincode: name:"lscc" +peer0.org1.example.com | [c7d 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [c7e 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [c7f 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] handling GET_STATE from chaincode +peer0.org1.example.com | [c80 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [c81 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [c82 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] No state associated with key: exp02. Sending RESPONSE with an empty payload +peer0.org1.example.com | [c83 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [c84 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [c85 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 gate 1589998812556936000 evaluation starts +peer0.org1.example.com | [c86 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c87 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [c88 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [c89 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [c8a 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [c8b 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [c8c 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [c8d 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [c8e 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 principal matched by identity 0 +peer0.org1.example.com | [c8f 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 43 f3 9e 54 ee c3 c0 32 14 16 ca cb 78 df 6f |.C..T...2....x.o| +peer0.org1.example.com | 00000010 5a ba ac f3 1b 4e c8 a4 37 f5 fa 32 ab f6 17 c4 |Z....N..7..2....| +peer0.org1.example.com | [c90 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd d8 85 f9 7f ca ff 23 ae bb 8e |0E.!........#...| +peer0.org1.example.com | 00000010 0c 51 62 57 05 32 0d fa ae 9d 46 ad 67 31 25 75 |.QbW.2....F.g1%u| +peer0.org1.example.com | 00000020 f8 c8 5a 64 28 02 20 1c a9 aa c7 eb 0e cd 7b 4e |..Zd(. .......{N| +peer0.org1.example.com | 00000030 d4 cf 03 d6 39 f4 72 45 18 c2 32 89 89 97 c4 34 |....9.rE..2....4| +peer0.org1.example.com | 00000040 1f 1f 43 e6 87 d7 73 |..C...s| +peer0.org1.example.com | [c91 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c92 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [c93 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 skipping identity 0 because it has already been used +peer0.org1.example.com | [c94 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 principal evaluation fails +peer0.org1.example.com | [c95 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 gate 1589998812556936000 evaluation succeeds +peer0.org1.example.com | [c96 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [c97 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] handling PUT_STATE from chaincode +peer0.org1.example.com | [c98 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [c99 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU No collection configuration specified +peer0.org1.example.com | [c9a 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [c9b 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] notifying Txid:d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, channelID:businesschannel +peer0.org1.example.com | [c9c 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [c9d 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [c9e 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:1.0 +peer0.org1.example.com | [c9f 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [ca0 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02:1.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [ca1 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +peer0.org1.example.com | [ca2 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +peer0.org1.example.com | [ca3 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [ca4 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [ca5 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-1.0 +peer1.org1.example.com | [d77 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d78 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2100 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [d79 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2100 principal matched by identity 0 +peer1.org1.example.com | [d7a 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 17 55 c6 9b df 54 f4 4a dd d3 2c 5e 18 c1 62 |..U...T.J..,^..b| +peer1.org1.example.com | 00000010 49 e9 22 2f 7c ac c6 c7 b8 3c ae 9e 2b 12 05 15 |I."/|....<..+...| +peer1.org1.example.com | [d7b 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 60 e7 7a df 7e e1 07 bb 89 7f |0E.!..`.z.~.....| +peer1.org1.example.com | 00000010 4d e7 7f 80 a2 08 5a d9 52 42 d2 d8 80 f5 c9 d5 |M.....Z.RB......| +peer1.org1.example.com | 00000020 4c 19 da a0 2c 02 20 54 d0 07 d5 e0 ec ca 8c 68 |L...,. T.......h| +peer1.org1.example.com | 00000030 bd 74 71 f2 48 ba f0 21 41 17 7a 4b ff da 84 55 |.tq.H..!A.zK...U| +peer1.org1.example.com | 00000040 51 86 04 b5 64 99 02 |Q...d..| +peer1.org1.example.com | [d7c 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d7d 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d2100 gate 1589998818881552600 evaluation succeeds +peer1.org1.example.com | [d7e 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d7f 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d80 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d81 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d82 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d83 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [d84 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [d85 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [d86 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [d87 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d88 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d89 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d8a 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d8b 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d8c 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d8d 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d8e 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d8f 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d90 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d91 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d92 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d93 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d94 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d95 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d96 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [d97 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d98 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d9a 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d99 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d9c 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d9d 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [bea 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [beb 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c9d0 gate 1589998812242485100 evaluation starts +peer0.org2.example.com | [bec 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c9d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [bed 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c9d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [bee 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c9d0 principal matched by identity 0 +peer0.org2.example.com | [bef 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [bf0 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [bf1 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c9d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [bf2 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c9d0 gate 1589998812242485100 evaluation succeeds +peer0.org2.example.com | [bf3 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bf4 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bf5 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [bf6 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [bf7 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [bf8 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [bfa 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer0.org2.example.com | [bfb 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [bfc 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [bfd 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bfe 05-20 18:20:12.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bff 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [c00 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c01 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c02 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c03 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [c04 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [c05 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aab50 gate 1589998812256673900 evaluation starts +peer0.org2.example.com | [c06 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aab50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c07 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aab50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [c08 05-20 18:20:12.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aab50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [c09 05-20 18:20:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aab50 principal evaluation fails +peer0.org2.example.com | [c0a 05-20 18:20:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aab50 gate 1589998812256673900 evaluation fails +peer0.org2.example.com | [c0b 05-20 18:20:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c0c 05-20 18:20:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c0d 05-20 18:20:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [c0e 05-20 18:20:12.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ab0c0 gate 1589998812266793700 evaluation starts +peer0.org2.example.com | [c0f 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ab0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c10 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ab0c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [c11 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ab0c0 principal matched by identity 0 +peer0.org2.example.com | [c12 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [c13 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [c14 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ab0c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [c15 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ab0c0 gate 1589998812266793700 evaluation succeeds +peer0.org2.example.com | [c16 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c17 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c18 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [c19 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [c1a 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [c1b 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [c1d 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [c1e 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [c1f 05-20 18:20:12.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c20 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [c21 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [c22 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c23 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c24 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c25 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c26 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c27 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c28 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [c29 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c2a 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [c2b 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c2c 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [c2d 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [c2e 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c2f 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [c30 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c31 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c32 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c33 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [c34 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [c35 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356f540 gate 1589998812317703900 evaluation starts +peer0.org2.example.com | [c36 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356f540 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c37 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356f540 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [c38 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356f540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [c39 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356f540 principal evaluation fails +peer0.org2.example.com | [c3a 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356f540 gate 1589998812317703900 evaluation fails +peer0.org2.example.com | [c3b 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c3c 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c3d 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [c3e 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356fab0 gate 1589998812318121100 evaluation starts +peer0.org2.example.com | [c3f 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356fab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c40 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356fab0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [c41 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356fab0 principal matched by identity 0 +peer0.org2.example.com | [c42 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 67 ce 93 74 e5 19 22 b2 26 ec ea 8d 67 38 1e |.g..t..".&...g8.| +peer0.org2.example.com | 00000010 75 9b 51 ad 1d 21 34 73 34 72 0c bd 71 d7 d9 c3 |u.Q..!4s4r..q...| +peer0.org2.example.com | [c43 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 1c c4 89 f0 1b c1 72 4e d2 71 6c |0D. A......rN.ql| +peer0.org2.example.com | 00000010 b2 10 11 61 44 58 5a 52 ce f5 87 73 80 86 52 47 |...aDXZR...s..RG| +peer0.org2.example.com | 00000020 5c a3 c9 59 02 20 36 a3 ed 95 eb 45 e3 c5 6d 45 |\..Y. 6....E..mE| +peer0.org2.example.com | 00000030 a0 04 b4 b8 cf bb 4b f7 55 6c 55 8d 51 72 fe 08 |......K.UlU.Qr..| +peer0.org2.example.com | 00000040 1c c0 58 4f af 5d |..XO.]| +peer0.org2.example.com | [c44 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356fab0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [cc1 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 be b8 67 b8 54 e4 3a 00 46 0b d6 |0D. X..g.T.:.F..| +peer1.org2.example.com | 00000010 ed 64 eb 0d 9b 5e 17 e3 fd da fb 34 1d 8e 07 2c |.d...^.....4...,| +peer1.org2.example.com | 00000020 1d f0 37 35 02 20 39 ce d5 a0 79 f9 9d 7c 5a 84 |..75. 9...y..|Z.| +peer1.org2.example.com | 00000030 75 58 f9 08 53 d8 4a 16 b8 ae ad f2 4e 30 4d 45 |uX..S.J.....N0ME| +peer1.org2.example.com | 00000040 f6 f9 c7 bf 90 86 |......| +peer1.org2.example.com | [cc2 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cc3 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [cc4 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [cc5 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [cc6 05-20 18:20:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [cc7 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cc8 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cc9 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cca 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ccb 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ccc 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ccd 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [cce 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ccf 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [cd0 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cd1 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cd2 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cd3 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cd4 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cd5 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cd6 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cd7 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cd8 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cd9 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cda 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cdb 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cdc 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cdd 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cde 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cdf 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-05-20 18:20:36.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.1µs " +orderer0.example.com | "2020-05-20 18:20:36.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:36.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:36.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +orderer0.example.com | "2020-05-20 18:20:36.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed5 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-05-20 18:20:36.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +orderer0.example.com | "2020-05-20 18:20:36.942 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 8.6102ms " +orderer0.example.com | "2020-05-20 18:20:36.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:36.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:36.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +orderer0.example.com | "2020-05-20 18:20:36.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:36.949 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +orderer0.example.com | "2020-05-20 18:20:37.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU edd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:37.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ede Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +orderer0.example.com | "2020-05-20 18:20:37.393 UTC [orderer.common.cluster.step] sendMessage -> DEBU edf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150µs " +orderer0.example.com | "2020-05-20 18:20:37.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee0 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2020-05-20 18:20:37.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.1µs " +orderer0.example.com | "2020-05-20 18:20:37.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84µs " +orderer0.example.com | "2020-05-20 18:20:37.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:37.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee4 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2020-05-20 18:20:37.415 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:37.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:37.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +orderer0.example.com | "2020-05-20 18:20:37.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.2µs " +orderer0.example.com | "2020-05-20 18:20:37.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2020-05-20 18:20:37.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.2µs " +orderer0.example.com | "2020-05-20 18:20:37.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 3 on channel businesschannel took 32.3µs" +orderer0.example.com | "2020-05-20 18:20:37.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +orderer0.example.com | "2020-05-20 18:20:37.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:37.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:38.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:38.394 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef0 Sending msg of 28 bytes to 3 on channel testchainid took 50.9µs" +orderer0.example.com | "2020-05-20 18:20:38.395 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.4µs " +orderer0.example.com | "2020-05-20 18:20:38.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel businesschannel took 563.5µs" +peer0.org1.example.com | [ca6 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [ca7 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [ca8 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [ca9 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [caa 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [cab 05-20 18:20:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU +peer0.org1.example.com | FROM hyperledger/fabric-baseos:amd64-0.4.20 +peer0.org1.example.com | ADD binpackage.tar /usr/local/bin +peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ +peer0.org1.example.com | org.hyperledger.fabric.version="1.4.7" \ +peer0.org1.example.com | org.hyperledger.fabric.base.version="0.4.20" +peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=1.4.7 +peer0.org1.example.com | [cac 05-20 18:20:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [cad 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +peer0.org1.example.com | [cae 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:latest +peer0.org1.example.com | [caf 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [cb0 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [cb1 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [cb2 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb3 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb4 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb5 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb6 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb7 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb8 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [cb9 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cba 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [cbb 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [cbc 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cbd 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [cbe 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [cbf 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ce0 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ce1 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ce2 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ce3 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ce4 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ce5 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ce6 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [ce7 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4a70 gate 1589998818833364400 evaluation starts +peer1.org2.example.com | [ce8 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4a70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ce9 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4a70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [cea 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [ceb 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4a70 principal evaluation fails +peer1.org2.example.com | [cec 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4a70 gate 1589998818833364400 evaluation fails +peer1.org2.example.com | [ced 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [cee 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [cef 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [cf0 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4fe0 gate 1589998818837361100 evaluation starts +peer1.org2.example.com | [cf1 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [cf2 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4fe0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [cf3 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4fe0 principal matched by identity 0 +peer1.org2.example.com | [cf4 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 0e 66 6e 81 6b eb 9c 98 55 be b1 05 c1 44 a8 |..fn.k...U....D.| +peer1.org2.example.com | 00000010 1c 49 4f 3d 9f e9 9a 46 24 38 22 9c c8 98 70 76 |.IO=...F$8"...pv| +peer1.org2.example.com | [cf5 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 18 81 03 e1 18 46 be e3 f2 58 95 |0D. _.....F...X.| +peer1.org2.example.com | 00000010 be 45 44 09 6c ab d9 f0 70 17 d7 f0 3b 9e 99 87 |.ED.l...p...;...| +peer1.org2.example.com | 00000020 b1 76 17 e3 02 20 42 72 3a 99 70 01 6f 0b 51 7b |.v... Br:.p.o.Q{| +peer1.org2.example.com | 00000030 24 55 90 5b 8c 30 07 db b0 5d 21 ba e6 70 20 79 |$U.[.0...]!..p y| +peer1.org2.example.com | 00000040 79 ee c3 bd 42 51 |y...BQ| +peer1.org2.example.com | [cf6 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4fe0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [cf7 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b4fe0 gate 1589998818837361100 evaluation succeeds +peer1.org2.example.com | [cf8 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [cf9 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [cfa 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [cfb 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [cfc 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cfd 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d00 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [c45 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00356fab0 gate 1589998812318121100 evaluation succeeds +peer0.org2.example.com | [c46 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c47 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c48 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [c49 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [c4a 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c4b 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [c4c 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [c4d 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:20:38.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:20:38.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.8µs " +orderer0.example.com | "2020-05-20 18:20:38.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.9µs " +orderer0.example.com | "2020-05-20 18:20:38.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:38.415 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef7 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:38.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef8 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +orderer0.example.com | "2020-05-20 18:20:38.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef9 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2020-05-20 18:20:38.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU efa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.1µs " +orderer0.example.com | "2020-05-20 18:20:38.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU efb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.4µs " +orderer0.example.com | "2020-05-20 18:20:38.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU efc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:38.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efd Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +orderer0.example.com | "2020-05-20 18:20:38.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU efe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.5µs " +orderer0.example.com | "2020-05-20 18:20:38.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:38.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU f00 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:39.393 UTC [orderer.common.cluster.step] handleMessage -> DEBU f01 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:39.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f02 Sending msg of 28 bytes to 3 on channel testchainid took 27.8µs" +orderer0.example.com | "2020-05-20 18:20:39.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU f03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492µs " +orderer0.example.com | "2020-05-20 18:20:39.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" +orderer0.example.com | "2020-05-20 18:20:39.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f06 Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +orderer0.example.com | "2020-05-20 18:20:39.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 322.3µs " +orderer0.example.com | "2020-05-20 18:20:39.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.6µs " +orderer0.example.com | "2020-05-20 18:20:39.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:39.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:39.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:39.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0b Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" +orderer0.example.com | "2020-05-20 18:20:39.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 981.6µs " +orderer0.example.com | "2020-05-20 18:20:39.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +orderer0.example.com | "2020-05-20 18:20:39.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 200.8µs " +orderer0.example.com | "2020-05-20 18:20:39.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0f Sending msg of 28 bytes to 3 on channel businesschannel took 124.5µs" +orderer0.example.com | "2020-05-20 18:20:39.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.4µs " +orderer0.example.com | "2020-05-20 18:20:39.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:39.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:40.399 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:40.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2020-05-20 18:20:40.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " +orderer0.example.com | "2020-05-20 18:20:40.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +orderer0.example.com | "2020-05-20 18:20:40.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2020-05-20 18:20:40.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.7µs " +orderer0.example.com | "2020-05-20 18:20:40.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.6µs " +orderer0.example.com | "2020-05-20 18:20:40.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:40.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:40.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:40.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1d Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" +orderer0.example.com | "2020-05-20 18:20:40.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 351µs " +orderer0.example.com | "2020-05-20 18:20:40.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.8µs " +orderer0.example.com | "2020-05-20 18:20:40.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU f20 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:40.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f21 Sending msg of 28 bytes to 2 on channel businesschannel took 2.1838ms" +orderer0.example.com | "2020-05-20 18:20:40.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f22 Sending msg of 28 bytes to 3 on channel businesschannel took 48.4µs" +orderer0.example.com | "2020-05-20 18:20:40.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU f23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.4µs " +orderer0.example.com | "2020-05-20 18:20:40.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU f24 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:41.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:41.397 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f26 Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +orderer0.example.com | "2020-05-20 18:20:41.398 UTC [orderer.common.cluster.step] sendMessage -> DEBU f27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.9µs " +orderer0.example.com | "2020-05-20 18:20:41.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" +orderer0.example.com | "2020-05-20 18:20:41.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f29 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2020-05-20 18:20:41.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.5µs " +orderer0.example.com | "2020-05-20 18:20:41.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.072ms " +orderer0.example.com | "2020-05-20 18:20:41.414 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:41.415 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:41.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:41.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2f Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-05-20 18:20:41.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f30 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.6µs " +orderer0.example.com | "2020-05-20 18:20:41.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +orderer0.example.com | "2020-05-20 18:20:41.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 329.9µs " +orderer0.example.com | "2020-05-20 18:20:41.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.3µs " +orderer0.example.com | "2020-05-20 18:20:41.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f34 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-05-20 18:20:41.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:41.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:42.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:42.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f38 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +orderer0.example.com | "2020-05-20 18:20:42.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU f39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.7µs " +orderer0.example.com | "2020-05-20 18:20:42.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2020-05-20 18:20:42.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2020-05-20 18:20:42.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 193.4µs " +orderer0.example.com | "2020-05-20 18:20:42.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.3µs " +orderer0.example.com | "2020-05-20 18:20:42.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:42.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:42.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:42.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f41 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2020-05-20 18:20:42.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.4µs " +orderer0.example.com | "2020-05-20 18:20:42.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +orderer0.example.com | "2020-05-20 18:20:42.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f44 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2020-05-20 18:20:42.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115.2µs " +orderer0.example.com | "2020-05-20 18:20:42.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.6µs " +orderer0.example.com | "2020-05-20 18:20:42.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU f47 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:42.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:43.394 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:43.394 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4a Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs" +orderer0.example.com | "2020-05-20 18:20:43.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 633.8µs " +orderer0.example.com | "2020-05-20 18:20:43.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 2 on channel businesschannel took 83.9µs" +orderer0.example.com | "2020-05-20 18:20:43.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.2µs " +orderer0.example.com | "2020-05-20 18:20:43.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2020-05-20 18:20:43.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 557µs " +orderer0.example.com | "2020-05-20 18:20:43.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU f50 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:43.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:43.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f52 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:43.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f53 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +orderer0.example.com | "2020-05-20 18:20:43.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.2µs " +orderer0.example.com | "2020-05-20 18:20:43.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +orderer0.example.com | "2020-05-20 18:20:43.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f56 Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +orderer0.example.com | "2020-05-20 18:20:43.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 249.8µs " +orderer0.example.com | "2020-05-20 18:20:43.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.8µs " +orderer0.example.com | "2020-05-20 18:20:43.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU f59 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [d9e 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d9b 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [d9f 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [da0 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da1 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [da2 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da3 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da4 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da5 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [da6 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [da7 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [da8 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [daa 05-20 18:20:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da9 05-20 18:20:19.90 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] +peer1.org1.example.com | [dab 05-20 18:20:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dac 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [dad 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [dae 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [daf 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [db1 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [db0 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [db4 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [db5 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [db6 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [db3 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [db2 05-20 18:20:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [db7 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [db8 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [db9 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [dba 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [dbb 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dbc 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c4e 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [c4f 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c50 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c51 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c52 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [c53 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c54 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c55 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c56 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c57 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [c58 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c59 05-20 18:20:12.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" > alive: alive: alive:\030\n\200hZ\367\275:q\275\372+9\006\227\256\371K\370\232\212vm.&)\223\247\334\334\002 j\215\021\307~o\324+ejZ\327\312\235&\254\340z*\373]\265L\350\017\267\035$\234\270\032q" > +peer0.org2.example.com | [c5a 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [c5b 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c5c 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c5d 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c5e 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [c5f 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [c60 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [c61 05-20 18:20:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c62 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [c63 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c64 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [c65 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c66 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [c67 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c68 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [c6a 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [c69 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c6b 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c6c 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [c6d 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c6e 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org2.example.com | [c6f 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org2.example.com | [c70 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c71 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org2.example.com | [c72 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org2.example.com | [c73 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c74 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [c75 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [c76 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c77 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c78 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161015 +peer0.org2.example.com | [c79 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E63131B84E33E6F425C31E4A6DD83C4EEAB6BCFBE66EDDDDAA904064583BBD82 +peer0.org2.example.com | [c7a 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c7b 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [c7c 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [c7d 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c7e 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c7f 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c80 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c81 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c82 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [c83 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [c84 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c85 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c86 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [c87 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c88 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org2.example.com | [c89 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8a 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org2.example.com | [c8b 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [c8c 05-20 18:20:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c8d 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [c8e 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c8f 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c90 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c91 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [c92 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [c93 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7660 gate 1589998812660358700 evaluation starts +peer0.org2.example.com | [c94 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c95 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7660 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [c96 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [c97 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7660 principal evaluation fails +peer0.org2.example.com | [c98 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7660 gate 1589998812660358700 evaluation fails +orderer0.example.com | "2020-05-20 18:20:43.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [c99 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c9a 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c9b 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [dbd 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [dbe 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [c9c 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7bd0 gate 1589998812660949000 evaluation starts +orderer0.example.com | "2020-05-20 18:20:44.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [cc0 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [dc0 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d01 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:20:44.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5c Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +peer0.org1.example.com | [cc1 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [dc1 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [cfe 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:20:44.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.5µs " +peer0.org1.example.com | [cc2 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [dbf 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [cff 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c9d 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cc3 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [dc3 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d02 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [c9e 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7bd0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:20:44.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +peer1.org1.example.com | [dc2 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d04 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [c9f 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7bd0 principal matched by identity 0 +peer0.org1.example.com | [cc4 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:44.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5f Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +peer1.org1.example.com | [dc4 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d05 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ca0 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +peer0.org2.example.com | 00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +peer1.org1.example.com | [dc5 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [d06 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:44.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 334.9µs " +peer0.org2.example.com | [ca1 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +peer0.org1.example.com | [cc5 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [dc6 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d07 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:44.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.9µs " +peer0.org2.example.com | 00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +peer0.org1.example.com | [cc6 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 gate 1589998812665221400 evaluation starts +peer1.org1.example.com | [dc7 05-20 18:20:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [dc8 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:44.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f62 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +peer0.org1.example.com | [cc7 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cc8 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [d08 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +peer0.org1.example.com | [cc9 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 principal matched by identity 0 +peer1.org1.example.com | [dc9 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 5c de b0 54 71 0f |\..Tq.| +peer0.org1.example.com | [cca 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU 0xc00335b920 gate 1589998819956718400 evaluation starts +orderer0.example.com | "2020-05-20 18:20:44.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU f63 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [d09 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d0a 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d0b 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dcb 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b920 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d03 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816101A +peer0.org2.example.com | [ca2 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7bd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ca3 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7bd0 gate 1589998812660949000 evaluation succeeds +peer1.org1.example.com | [dcc 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b920 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:20:44.896 UTC [orderer.common.cluster.step] handleMessage -> DEBU f64 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [d0d 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A91755C69BDF54F44ADDD32C5E18C16249E9222F7CACC6C7B83CAE9E2B120515 +peer0.org2.example.com | [ca4 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [dcd 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b920 principal matched by identity 0 +peer0.org1.example.com | 00000010 ea b6 bc fb e6 6e dd dd aa 90 40 64 58 3b bd 82 |.....n....@dX;..| +orderer0.example.com | "2020-05-20 18:20:44.897 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f65 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +peer1.org2.example.com | [d0c 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ca5 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org1.example.com | [dce 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +orderer0.example.com | "2020-05-20 18:20:44.898 UTC [orderer.common.cluster.step] sendMessage -> DEBU f66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 406.7µs " +peer1.org2.example.com | [d0e 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [d0f 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [ccb 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +orderer0.example.com | "2020-05-20 18:20:44.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +peer1.org2.example.com | [d10 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [ca6 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [dcf 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +orderer0.example.com | "2020-05-20 18:20:44.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f68 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +peer1.org2.example.com | [d11 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [ca7 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +orderer0.example.com | "2020-05-20 18:20:44.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +peer1.org2.example.com | [d12 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d13 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ca8 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +peer1.org2.example.com | [d14 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ca9 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000040 7c 58 26 3b 84 ff e8 ||X&;...| +orderer0.example.com | "2020-05-20 18:20:44.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [d15 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [caa 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [ccc 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:20:44.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 548.2µs " +peer1.org2.example.com | [d16 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cab 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [ccd 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 gate 1589998812665221400 evaluation succeeds +orderer0.example.com | "2020-05-20 18:20:44.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [d17 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cac 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU 0xc00335b920 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [cce 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:20:45.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:45.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6e Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2020-05-20 18:20:45.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.3µs " +peer1.org1.example.com | [dd1 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b920 gate 1589998819956718400 evaluation succeeds +peer0.org1.example.com | [ccf 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:20:45.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f70 Sending msg of 28 bytes to 2 on channel businesschannel took 49µs" +peer1.org2.example.com | [d18 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dd2 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 ea b6 bc fb e6 6e dd dd aa 90 40 64 58 3b bd 82 |.....n....@dX;..| +peer0.org1.example.com | [cd0 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:20:45.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +peer1.org2.example.com | [d19 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dd3 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [cad 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +peer0.org1.example.com | [cd1 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:20:45.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.2µs " +peer1.org2.example.com | [d1a 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dd4 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +peer0.org1.example.com | [cd2 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:20:45.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.6µs " +peer1.org2.example.com | [d1b 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [dd5 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +peer0.org1.example.com | [cd3 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-05-20 18:20:45.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [d1c 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dd6 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +peer0.org1.example.com | [cd4 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [cd5 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d1d 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 7c 58 26 3b 84 ff e8 ||X&;...| +peer0.org1.example.com | [cd6 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [d1e 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [dd7 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:45.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [cae 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [cd7 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d1f 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dd8 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:20:45.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f76 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [caf 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d20 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [dd9 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:20:45.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f77 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +peer0.org2.example.com | [cb0 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d21 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cd8 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dda 05-20 18:20:19.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:20:45.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +peer0.org2.example.com | [cb1 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d22 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [ddb 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:20:45.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +peer0.org2.example.com | [cb2 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org2.example.com | [d25 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cd9 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ddc 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:45.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 2 on channel businesschannel took 15.9µs" +peer0.org2.example.com | [cb3 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [d26 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [cda 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [cdb 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ddd 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [cb4 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:20:45.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.3µs " +peer0.org2.example.com | [cb5 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +peer0.org2.example.com | 00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +peer0.org2.example.com | 00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +peer1.org2.example.com | [d28 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dde 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1a30 gate 1589998819971648400 evaluation starts +peer0.org2.example.com | 00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +peer0.org2.example.com | 00000040 7c 58 26 3b 84 ff e8 ||X&;...| +peer1.org2.example.com | [d23 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [cdc 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ddf 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1a30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [cb6 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | [d29 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:45.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.1µs " +peer0.org1.example.com | [cdd 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de0 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1a30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [d2a 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:20:45.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [cde 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [de1 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1a30 principal matched by identity 0 +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [d2b 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:45.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [cdf 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [de2 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [cb7 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 7b 18 2c b5 76 25 45 db ce ea 3f |0D. 6{.,.v%E...?| +orderer0.example.com | "2020-05-20 18:20:46.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:46.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f80 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [d24 05-20 18:20:18.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 d8 81 59 e8 3b f5 77 38 10 14 a6 72 c1 c0 f3 3f |..Y.;.w8...r...?| +peer0.org1.example.com | [ce0 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d2c 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:46.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 369.9µs " +peer1.org1.example.com | [de3 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000020 c2 7c a1 d8 02 20 59 79 65 ef fd a1 11 d6 53 6f |.|... Yye.....So| +peer0.org2.example.com | 00000030 c7 94 b6 5a 8a e7 6b 04 28 88 c9 c0 95 8d e7 9c |...Z..k.(.......| +peer1.org2.example.com | [d2d 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:46.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000040 c9 39 32 48 9a 65 |.92H.e| +peer1.org2.example.com | [d2e 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ce1 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" > alive: alive: +orderer0.example.com | "2020-05-20 18:20:46.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f83 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [d2f 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ce2 05-20 18:20:12.70 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +orderer0.example.com | "2020-05-20 18:20:46.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.2µs " +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [cb9 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [d30 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ce3 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-05-20 18:20:46.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.3µs " +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [cba 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d31 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ce4 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:46.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [de4 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1a30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [cbb 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d32 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ce5 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-05-20 18:20:46.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [de5 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1a30 gate 1589998819971648400 evaluation succeeds +peer0.org2.example.com | [cbc 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d33 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ce6 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:46.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f88 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [de6 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [cbd 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [d34 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ce7 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:46.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f89 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +peer1.org1.example.com | [de7 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [de8 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [cbe 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cbf 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ce8 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [cc0 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [cc1 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU Obtaining identity +peer1.org1.example.com | [de9 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [cc2 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +peer0.org2.example.com | 00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +peer0.org2.example.com | 00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +peer1.org2.example.com | [d36 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dea 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +peer1.org2.example.com | [d37 05-20 18:20:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ce9 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-05-20 18:20:46.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.4µs " +orderer0.example.com | "2020-05-20 18:20:46.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +peer0.org2.example.com | 00000040 7c 58 26 3b 84 ff e8 ||X&;...| +peer0.org1.example.com | [cea 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:46.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76µs " +peer0.org2.example.com | [cc3 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [deb 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [dec 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d38 05-20 18:20:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:46.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57µs " +peer0.org2.example.com | [cc4 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ded 05-20 18:20:19.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d39 05-20 18:20:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ceb 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:46.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [cc5 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dee 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cec 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:46.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [cc6 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [def 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [d3a 05-20 18:20:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ced 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:46.913 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f90 Sending msg of 28 bytes to 3 on channel businesschannel took 1.5704ms" +peer0.org2.example.com | [cc7 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 08 8f 14 76 15 70 52 57 25 c4 d3 89 11 fa cc |-...v.pRW%......| +peer1.org1.example.com | [df0 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d3b 05-20 18:20:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cee 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:47.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f91 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000010 42 b7 cd c1 31 b5 56 99 69 7a dd b0 8d 5c b4 34 |B...1.V.iz...\.4| +peer1.org1.example.com | [df1 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d3c 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [cef 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:47.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f92 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +peer0.org2.example.com | [cc8 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 2d 6b 9d a2 9f cf cf 60 bb 56 |0E.!..-k.....`.V| +peer1.org1.example.com | [df2 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d3d 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:47.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU f93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.3µs " +peer0.org2.example.com | 00000010 f3 70 27 ff 85 ff 42 a6 92 a1 b0 e3 7b 7e 50 f6 |.p'...B.....{~P.| +peer1.org1.example.com | [df3 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [d3e 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [cf0 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:47.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +peer0.org2.example.com | 00000020 e3 ac f3 a1 85 02 20 60 e4 64 0a 0e 8e 68 87 da |...... `.d...h..| +peer1.org1.example.com | [df4 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [d3f 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [cf1 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:47.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f95 Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +peer0.org2.example.com | 00000030 8b 46 51 54 06 3f 96 59 52 00 02 3c 4d fa 27 51 |.FQT.?.YR.. DEBU Exiting +peer1.org1.example.com | [df5 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342aed0 gate 1589998819982230900 evaluation starts +peer0.org1.example.com | [cf2 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:47.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 563.8µs " +peer0.org2.example.com | 00000040 55 c6 1e 30 5c e2 3e |U..0\.>| +peer1.org2.example.com | [d41 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [df6 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342aed0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cf3 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:47.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.2µs " +peer0.org2.example.com | [cc9 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d42 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [df7 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342aed0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [cf4 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:47.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f98 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [cca 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d43 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [df8 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342aed0 principal matched by identity 0 +peer1.org1.example.com | [df9 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | [cf5 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org2.example.com | [ccb 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [d44 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [cf6 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:47.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f99 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [ccc 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d45 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dfa 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | [cf7 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:20:47.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [ccd 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [d46 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | [cf8 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161014 +orderer0.example.com | "2020-05-20 18:20:47.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9b Sending msg of 28 bytes to 3 on channel testchainid took 32µs" +peer0.org2.example.com | [cce 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d47 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Sign: digest: 54C3D9699444DB4FA430FBD57997E12A3CBCAFAFADCCE9B3BEC73D38AA600545 +orderer0.example.com | "2020-05-20 18:20:47.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.3µs " +peer0.org2.example.com | [ccf 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d48 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org1.example.com | [cfa 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:20:47.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +peer0.org2.example.com | [cd0 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d49 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org1.example.com | [cfb 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-05-20 18:20:47.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9e Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +peer1.org2.example.com | [d4a 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dfb 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342aed0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [cfc 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [cfd 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [cfe 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d4b 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [dfc 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342aed0 gate 1589998819982230900 evaluation succeeds +peer1.org2.example.com | [d4c 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cd1 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:47.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.8µs " +peer0.org1.example.com | [cff 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [dfd 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d4d 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [cd2 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:20:47.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 338.7µs " +peer0.org1.example.com | [d00 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dfe 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [cd3 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365ea30 gate 1589998812674317200 evaluation starts +peer1.org2.example.com | [d4e 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:20:47.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [d01 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [dff 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [cd4 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365ea30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d4f 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:47.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:48.396 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:48.396 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa4 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2020-05-20 18:20:48.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.7µs " +peer0.org1.example.com | [d02 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [d03 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [e00 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [cd5 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365ea30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [d50 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:20:48.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +orderer0.example.com | "2020-05-20 18:20:48.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.3µs " +peer1.org1.example.com | [e01 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [cd6 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365ea30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [d51 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:20:48.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa8 Sending msg of 28 bytes to 3 on channel businesschannel took 153.2µs" +peer0.org1.example.com | [d04 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [cd7 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365ea30 principal evaluation fails +peer1.org2.example.com | [d52 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:20:48.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.8µs " +orderer0.example.com | "2020-05-20 18:20:48.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU faa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:48.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU fab Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [cd8 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365ea30 gate 1589998812674317200 evaluation fails +peer1.org2.example.com | [d53 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:20:48.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU fac Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [d05 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e02 05-20 18:20:19.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | [cd9 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d54 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:48.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fad Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +peer0.org1.example.com | [d06 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | [cda 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d55 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:20:48.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU fae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 294.9µs " +orderer0.example.com | "2020-05-20 18:20:48.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 2 on channel businesschannel took 13.9µs" +orderer0.example.com | "2020-05-20 18:20:48.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb0 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +peer1.org2.example.com | [d56 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a600 gate 1589998820352741000 evaluation starts +orderer0.example.com | "2020-05-20 18:20:48.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.9µs " +peer1.org2.example.com | [d57 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a600 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | [cdb 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [d07 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:48.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51µs " +peer1.org2.example.com | [d58 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a600 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | [cdc 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efa0 gate 1589998812675305400 evaluation starts +peer0.org1.example.com | [d08 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:48.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [d59 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [cdd 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d09 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:48.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [d5a 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a600 principal evaluation fails +peer1.org2.example.com | [d5b 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361a600 gate 1589998820352741000 evaluation fails +peer1.org2.example.com | [d5c 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d5d 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d0a 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [d0b 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d0c 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [d0d 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [d0e 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [e03 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [d5e 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [cde 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efa0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [d0f 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:49.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [d5f 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361ab70 gate 1589998820354195400 evaluation starts +peer0.org2.example.com | [cdf 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efa0 principal matched by identity 0 +peer0.org1.example.com | [d10 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:49.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb6 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +peer1.org1.example.com | [e04 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | [ce0 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 67 ce 93 74 e5 19 22 b2 26 ec ea 8d 67 38 1e |.g..t..".&...g8.| +peer0.org1.example.com | [d11 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:49.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000010 75 9b 51 ad 1d 21 34 73 34 72 0c bd 71 d7 d9 c3 |u.Q..!4s4r..q...| +peer0.org2.example.com | [ce1 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 1c c4 89 f0 1b c1 72 4e d2 71 6c |0D. A......rN.ql| +peer0.org1.example.com | [d12 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000010 b2 10 11 61 44 58 5a 52 ce f5 87 73 80 86 52 47 |...aDXZR...s..RG| +peer1.org2.example.com | [d60 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361ab70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d13 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:49.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 2 on channel businesschannel took 376µs" +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | 00000020 5c a3 c9 59 02 20 36 a3 ed 95 eb 45 e3 c5 6d 45 |\..Y. 6....E..mE| +peer1.org2.example.com | [d61 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361ab70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [d14 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:49.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 484.1µs " +peer1.org1.example.com | [e05 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 a0 04 b4 b8 cf bb 4b f7 55 6c 55 8d 51 72 fe 08 |......K.UlU.Qr..| +peer0.org1.example.com | [d15 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:49.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fba Sending msg of 28 bytes to 3 on channel businesschannel took 17µs" +orderer0.example.com | "2020-05-20 18:20:49.420 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0351ms " +orderer0.example.com | "2020-05-20 18:20:49.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:49.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [d16 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [d17 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +peer0.org1.example.com | 00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +peer0.org1.example.com | [d18 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +peer0.org1.example.com | 00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +peer0.org1.example.com | 00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +peer0.org1.example.com | 00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +peer0.org1.example.com | 00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +peer0.org1.example.com | [d1a 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [d1b 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc d6 e6 4e 08 59 b9 38 e5 64 df |0E.!....N.Y.8.d.| +peer0.org1.example.com | 00000010 24 79 1d 83 72 59 f5 fa 41 f4 b7 c9 07 6a 07 f2 |$y..rY..A....j..| +peer0.org1.example.com | 00000020 a0 ce 22 a4 e6 02 20 27 98 e7 14 ad b2 6f 62 bb |.."... '.....ob.| +peer0.org1.example.com | 00000030 b3 1f dd 97 89 34 33 c2 58 cd 7d 8f 14 ae a4 33 |.....43.X.}....3| +peer0.org1.example.com | 00000040 dc f0 85 1a 75 98 ed |....u..| +peer0.org1.example.com | [d1c 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [d62 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361ab70 principal matched by identity 0 +peer1.org2.example.com | [d63 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer1.org2.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +peer1.org2.example.com | [d64 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer1.org2.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer1.org2.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer1.org2.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer1.org2.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer1.org2.example.com | [d65 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361ab70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [d66 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361ab70 gate 1589998820354195400 evaluation succeeds +peer1.org2.example.com | [d67 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d68 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d69 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [d6a 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [d6b 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d6c 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [d6d 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [d6e 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d6f 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [d70 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d71 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d72 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [d73 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d74 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d75 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d76 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d77 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [d78 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [d79 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d7a 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d7b 05-20 18:20:20.47 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]] +peer1.org2.example.com | [d7c 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d7d 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d1d 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [d1e 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d1f 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d19 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d20 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d21 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d22 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d24 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d25 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d26 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d27 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [d28 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d29 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d2a 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d2b 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d2c 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d23 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [d2d 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [d2e 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d2f 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d30 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d31 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d32 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 gate 1589998812865600900 evaluation starts +peer0.org1.example.com | [d33 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d34 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [d35 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 principal matched by identity 0 +peer0.org1.example.com | [d36 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 be 1d 08 f5 f9 de be 46 91 77 21 ff 06 64 6c |h.......F.w!..dl| +peer0.org1.example.com | 00000010 20 0d 02 64 2b 59 29 3f 4f b4 d8 3f ed 7b 0d c3 | ..d+Y)?O..?.{..| +peer0.org1.example.com | [d37 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 90 99 23 ee e2 94 a9 79 5c a2 |0E.!....#....y\.| +peer0.org1.example.com | 00000010 42 32 39 ac 9b 2b 93 28 74 c0 ba 10 2b e5 20 f3 |B29..+.(t...+. .| +peer0.org1.example.com | 00000020 77 2d d7 b8 09 02 20 09 f6 9c d1 22 dd 6b f7 e3 |w-.... ....".k..| +peer0.org1.example.com | 00000030 a1 b3 98 05 27 06 b0 bd b0 21 e4 1d c8 eb c6 05 |....'....!......| +peer0.org1.example.com | 00000040 6f b9 c4 e5 c2 f8 5d |o.....]| +peer0.org1.example.com | [d38 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [d39 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 gate 1589998812865600900 evaluation succeeds +peer0.org1.example.com | [d3a 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d3b 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d3c 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d3d 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d3e 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [d3f 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [d40 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [d41 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [d42 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [d43 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d44 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d46 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | 00000040 1c c0 58 4f af 5d |..XO.]| +peer0.org2.example.com | [ce2 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ce3 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efa0 gate 1589998812675305400 evaluation succeeds +peer0.org2.example.com | [ce4 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ce5 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ce6 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [ce7 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ce8 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ce9 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cea 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ceb 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [cec 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [ced 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cee 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cef 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cf0 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cf1 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cf2 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cf3 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [cf4 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf5 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [cf6 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [cf7 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [cf8 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf9 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [cfa 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cfb 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [cfc 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [cfd 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cfe 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [cff 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d00 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d01 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d02 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d03 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [d04 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ad90 gate 1589998812848948200 evaluation starts +peer0.org2.example.com | [d05 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ad90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d06 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ad90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [e06 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e07 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e08 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e09 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e0a 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e0b 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e0c 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e0d 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562eb0 gate 1589998819996414800 evaluation starts +peer1.org1.example.com | [e0e 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e0f 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562eb0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [e10 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562eb0 principal matched by identity 0 +peer1.org1.example.com | [e11 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [e12 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +orderer0.example.com | "2020-05-20 18:20:49.893 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:49.894 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbf Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +orderer0.example.com | "2020-05-20 18:20:49.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0495ms " +orderer0.example.com | "2020-05-20 18:20:49.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +orderer0.example.com | "2020-05-20 18:20:49.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 2 on channel businesschannel took 144.7µs" +orderer0.example.com | "2020-05-20 18:20:49.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +orderer0.example.com | "2020-05-20 18:20:49.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 953.8µs " +orderer0.example.com | "2020-05-20 18:20:49.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:49.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:50.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:50.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc8 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2020-05-20 18:20:50.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.5µs " +peer1.org2.example.com | [d7e 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [d7f 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d80 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d81 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d82 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d83 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d84 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d85 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [d86 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d87 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d88 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d89 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [d8a 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d8b 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d8c 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d8d 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [d8e 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [d8f 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e470 gate 1589998820490610600 evaluation starts +peer1.org2.example.com | [d90 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e470 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d91 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e470 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [d92 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [d93 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e470 principal evaluation fails +peer1.org2.example.com | [d94 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e470 gate 1589998820490610600 evaluation fails +peer1.org2.example.com | [d95 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d96 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d97 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [d98 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e9e0 gate 1589998820491931600 evaluation starts +peer1.org2.example.com | [d99 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d9a 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e9e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [d9b 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e9e0 principal matched by identity 0 +peer1.org2.example.com | [d9c 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [d9e 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [d47 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d48 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d49 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d4a 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d4b 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [d4c 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [d07 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ad90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [d08 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ad90 principal evaluation fails +peer0.org2.example.com | [d09 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ad90 gate 1589998812848948200 evaluation fails +peer0.org2.example.com | [d0a 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d0b 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d0c 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [d0d 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364b300 gate 1589998812850756400 evaluation starts +peer0.org2.example.com | [d0e 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364b300 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d0f 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364b300 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [d10 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364b300 principal matched by identity 0 +peer0.org2.example.com | [d11 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +peer0.org2.example.com | 00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +peer0.org2.example.com | [d12 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +peer0.org2.example.com | 00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +peer0.org2.example.com | 00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +peer0.org2.example.com | 00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +peer0.org2.example.com | 00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +peer0.org2.example.com | [d13 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364b300 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [d14 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364b300 gate 1589998812850756400 evaluation succeeds +peer0.org2.example.com | [d15 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d16 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d17 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [d18 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d19 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d1a 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [d1b 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [d1d 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [d1e 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [d1f 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d20 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d1c 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\340.\002 m\235+x\031<\273\027\305j.\177\340\210[L\031\244\211\337\320a\\w\t\270\262.\210\030^S" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [e13 05-20 18:20:19.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562eb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e14 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562eb0 gate 1589998819996414800 evaluation succeeds +peer1.org1.example.com | [e15 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e16 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e17 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [e18 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [e19 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e1a 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [e1b 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1c 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1d 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1e 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e1f 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e20 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e21 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e22 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e23 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e24 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4fd0 gate 1589998820007221900 evaluation starts +peer1.org1.example.com | [e25 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e26 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4fd0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [e27 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4fd0 principal matched by identity 0 +peer1.org1.example.com | [e28 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [e29 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [e2a 05-20 18:20:20.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4fd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e2b 05-20 18:20:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a4fd0 gate 1589998820007221900 evaluation succeeds +peer1.org1.example.com | [e2c 05-20 18:20:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e2d 05-20 18:20:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e2e 05-20 18:20:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [e2f 05-20 18:20:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [e30 05-20 18:20:20.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [e31 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [d9f 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e9e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [da0 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e9e0 gate 1589998820491931600 evaluation succeeds +peer1.org2.example.com | [da1 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [da2 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [da3 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [da4 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [da5 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [da6 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d9d 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [da7 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [da8 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [da9 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [daa 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dac 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [dad 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dab 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [dae 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [daf 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [db0 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [db1 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364fbe0 gate 1589998820498314000 evaluation starts +peer1.org2.example.com | [db2 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364fbe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [db3 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364fbe0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [db4 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364fbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [db5 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364fbe0 principal evaluation fails +peer1.org2.example.com | [db6 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364fbe0 gate 1589998820498314000 evaluation fails +peer1.org2.example.com | [db7 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [db8 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [db9 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [dba 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e150 gate 1589998820499700600 evaluation starts +peer1.org2.example.com | [dbb 05-20 18:20:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [dbc 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e150 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [dbd 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e150 principal matched by identity 0 +peer1.org2.example.com | [dbe 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [dbf 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [dc0 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e150 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [dc1 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366e150 gate 1589998820499700600 evaluation succeeds +peer1.org2.example.com | [dc2 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [dc3 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [dc4 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [dc5 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [dc6 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [dc7 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [dc8 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [dc9 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:50.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +orderer0.example.com | "2020-05-20 18:20:50.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 3 on channel businesschannel took 85.5µs" +orderer0.example.com | "2020-05-20 18:20:50.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.6µs " +orderer0.example.com | "2020-05-20 18:20:50.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 293µs " +orderer0.example.com | "2020-05-20 18:20:50.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU fce Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:50.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcf Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:50.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:50.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd1 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2020-05-20 18:20:50.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +orderer0.example.com | "2020-05-20 18:20:50.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd3 Sending msg of 28 bytes to 2 on channel businesschannel took 24.7µs" +orderer0.example.com | "2020-05-20 18:20:50.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-05-20 18:20:50.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.3µs " +orderer0.example.com | "2020-05-20 18:20:50.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7424ms " +orderer0.example.com | "2020-05-20 18:20:50.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd7 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:50.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:51.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:51.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fda Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-05-20 18:20:51.393 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325µs " +orderer0.example.com | "2020-05-20 18:20:51.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdc Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +orderer0.example.com | "2020-05-20 18:20:51.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdd Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +orderer0.example.com | "2020-05-20 18:20:51.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU fde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.2µs " +orderer0.example.com | "2020-05-20 18:20:51.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:51.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.87ms " +orderer0.example.com | "2020-05-20 18:20:51.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:51.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:51.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe3 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2020-05-20 18:20:51.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.3µs " +orderer0.example.com | "2020-05-20 18:20:51.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe5 Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:20:51.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe6 Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +orderer0.example.com | "2020-05-20 18:20:51.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.7µs " +orderer0.example.com | "2020-05-20 18:20:51.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 895.4µs " +orderer0.example.com | "2020-05-20 18:20:51.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:51.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU fea Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:52.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU feb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:52.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fec Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +orderer0.example.com | "2020-05-20 18:20:52.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU fed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.7µs " +orderer0.example.com | "2020-05-20 18:20:52.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fee Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2020-05-20 18:20:52.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff0 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +peer1.org1.example.com | [e32 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e33 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e34 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e35 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e36 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e37 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e38 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e39 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e3a 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2890 gate 1589998820027644400 evaluation starts +peer1.org1.example.com | [e3b 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2890 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e3c 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2890 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [e3d 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2890 principal matched by identity 0 +peer1.org1.example.com | [e3e 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [e3f 05-20 18:20:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0035e2890 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e41 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2890 gate 1589998820027644400 evaluation succeeds +peer1.org1.example.com | [e42 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e43 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e44 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [e45 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [e46 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [e47 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [e48 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e49 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4a 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4b 05-20 18:20:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e4c 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4d 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4e 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e4f 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e50 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e51 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e52 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [e53 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e55 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e56 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e57 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e58 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e54 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [e59 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e5a 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [e5b 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e5c 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e5d 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e5e 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e5f 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [e60 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e61 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [e62 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [e63 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [e64 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e65 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [e66 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816101C +peer1.org1.example.com | [e67 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2B12D8100BAEDF95C7632E8659B708E77832C47C2A41878E2EAA1F376AF3E5C2 +peer1.org1.example.com | [e68 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [e69 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [e6a 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [e6b 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e6c 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e6d 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e6e 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [dcb 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [dcc 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dcd 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dce 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dcf 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dd0 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [dd1 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [dd2 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d4d 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d45 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d4e 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [d4f 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [d51 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d50 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [d52 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d53 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d54 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d55 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d56 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d57 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d58 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 gate 1589998812879447300 evaluation starts +peer0.org1.example.com | [d59 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d5a 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [d5b 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 principal matched by identity 0 +peer0.org1.example.com | [d5c 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 be 1d 08 f5 f9 de be 46 91 77 21 ff 06 64 6c |h.......F.w!..dl| +peer0.org1.example.com | 00000010 20 0d 02 64 2b 59 29 3f 4f b4 d8 3f ed 7b 0d c3 | ..d+Y)?O..?.{..| +peer0.org1.example.com | [d5d 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 90 99 23 ee e2 94 a9 79 5c a2 |0E.!....#....y\.| +peer0.org1.example.com | 00000010 42 32 39 ac 9b 2b 93 28 74 c0 ba 10 2b e5 20 f3 |B29..+.(t...+. .| +peer0.org1.example.com | 00000020 77 2d d7 b8 09 02 20 09 f6 9c d1 22 dd 6b f7 e3 |w-.... ....".k..| +peer0.org1.example.com | 00000030 a1 b3 98 05 27 06 b0 bd b0 21 e4 1d c8 eb c6 05 |....'....!......| +peer0.org1.example.com | 00000040 6f b9 c4 e5 c2 f8 5d |o.....]| +peer0.org1.example.com | [d5e 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [d5f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d60 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [d61 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 gate 1589998812879447300 evaluation succeeds +peer0.org1.example.com | [d62 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d63 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d64 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d65 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d66 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [d67 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d68 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [d69 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 67 ce 93 74 e5 19 22 b2 26 ec ea 8d 67 38 1e |.g..t..".&...g8.| +peer0.org1.example.com | 00000010 75 9b 51 ad 1d 21 34 73 34 72 0c bd 71 d7 d9 c3 |u.Q..!4s4r..q...| +peer0.org1.example.com | [d6a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 1c c4 89 f0 1b c1 72 4e d2 71 6c |0D. A......rN.ql| +peer0.org2.example.com | [d21 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d23 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\340.\002 m\235+x\031<\273\027\305j.\177\340\210[L\031\244\211\337\320a\\w\t\270\262.\210\030^S" > > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:52.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU fef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140µs " +orderer0.example.com | "2020-05-20 18:20:52.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +orderer0.example.com | "2020-05-20 18:20:52.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:52.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:52.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:52.893 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff5 Sending msg of 28 bytes to 3 on channel testchainid took 9.4µs" +orderer0.example.com | "2020-05-20 18:20:52.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.4µs " +orderer0.example.com | "2020-05-20 18:20:52.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff7 Sending msg of 28 bytes to 2 on channel businesschannel took 50.4µs" +orderer0.example.com | "2020-05-20 18:20:52.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff8 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +orderer0.example.com | "2020-05-20 18:20:52.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.6µs " +orderer0.example.com | "2020-05-20 18:20:52.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38.7µs " +orderer0.example.com | "2020-05-20 18:20:52.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffb Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:52.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:53.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:53.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffe Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2020-05-20 18:20:53.393 UTC [orderer.common.cluster.step] sendMessage -> DEBU fff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265.2µs " +orderer0.example.com | "2020-05-20 18:20:53.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1000 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 706.1µs " +orderer0.example.com | "2020-05-20 18:20:53.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1001 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2020-05-20 18:20:53.413 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1002 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +orderer0.example.com | "2020-05-20 18:20:53.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1003 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:53.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1004 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +orderer0.example.com | "2020-05-20 18:20:53.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1005 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:53.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1006 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:53.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1007 Sending msg of 28 bytes to 3 on channel testchainid took 8.4µs" +orderer0.example.com | "2020-05-20 18:20:53.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1008 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.7µs " +orderer0.example.com | "2020-05-20 18:20:53.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1009 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.8µs " +orderer0.example.com | "2020-05-20 18:20:53.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 2 on channel businesschannel took 35.3µs" +orderer0.example.com | "2020-05-20 18:20:53.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100c Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2020-05-20 18:20:53.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:53.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +orderer0.example.com | "2020-05-20 18:20:53.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:54.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:54.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1010 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2020-05-20 18:20:54.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1011 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +orderer0.example.com | "2020-05-20 18:20:54.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1012 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +orderer0.example.com | "2020-05-20 18:20:54.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1014 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +orderer0.example.com | "2020-05-20 18:20:54.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1013 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.4µs " +orderer0.example.com | "2020-05-20 18:20:54.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1015 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.7µs " +orderer0.example.com | "2020-05-20 18:20:54.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1016 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:54.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1017 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:54.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1018 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:54.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1019 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +orderer0.example.com | "2020-05-20 18:20:54.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.4µs " +orderer0.example.com | "2020-05-20 18:20:54.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101b Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +orderer0.example.com | "2020-05-20 18:20:54.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101d Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2020-05-20 18:20:54.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.9µs " +orderer0.example.com | "2020-05-20 18:20:54.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.3µs " +orderer0.example.com | "2020-05-20 18:20:54.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:54.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1020 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:55.397 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1021 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:55.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1022 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +orderer0.example.com | "2020-05-20 18:20:55.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1023 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +orderer0.example.com | "2020-05-20 18:20:55.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1024 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +orderer0.example.com | "2020-05-20 18:20:55.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2020-05-20 18:20:55.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1026 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 209.2µs " +orderer0.example.com | "2020-05-20 18:20:55.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 406.7µs " +orderer0.example.com | "2020-05-20 18:20:55.415 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1028 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [e6f 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e70 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e71 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e73 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [e74 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e72 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [e75 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e76 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [e77 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [e78 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e79 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [e7a 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [e7b 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer1.org1.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +peer1.org1.example.com | [e7c 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer1.org1.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer1.org1.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer1.org1.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer1.org1.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer1.org1.example.com | [e7d 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [e7e 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [e7f 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [e80 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e81 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e82 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [e83 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [e84 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer1.org1.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +peer1.org1.example.com | [e85 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer1.org1.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer1.org1.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer1.org1.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer1.org1.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer1.org1.example.com | [e86 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [e87 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 57 9e c3 0a c0 6c 0b 8d 97 3d |0E.!..W....l...=| +peer1.org1.example.com | 00000010 31 10 db 43 4f 10 02 b1 d1 11 c8 1f 51 84 45 75 |1..CO.......Q.Eu| +peer1.org2.example.com | [dd3 05-20 18:20:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [dd4 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [dd5 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [dd6 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [dd7 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [dd8 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [dd9 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [dda 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a300 gate 1589998820515589900 evaluation starts +peer1.org2.example.com | [ddb 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ddc 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a300 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [ddd 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [dde 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a300 principal evaluation fails +peer1.org2.example.com | [ddf 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a300 gate 1589998820515589900 evaluation fails +peer1.org2.example.com | [de0 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [de1 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [de2 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [de3 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a870 gate 1589998820517482100 evaluation starts +peer1.org2.example.com | [de4 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [de5 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a870 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [de6 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a870 principal matched by identity 0 +peer1.org2.example.com | [de7 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [de8 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [de9 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a870 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [dea 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368a870 gate 1589998820517482100 evaluation succeeds +peer0.org2.example.com | [d24 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [d25 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 be 1d 08 f5 f9 de be 46 91 77 21 ff 06 64 6c |h.......F.w!..dl| +peer0.org2.example.com | 00000010 20 0d 02 64 2b 59 29 3f 4f b4 d8 3f ed 7b 0d c3 | ..d+Y)?O..?.{..| +peer0.org2.example.com | [d26 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 90 99 23 ee e2 94 a9 79 5c a2 |0E.!....#....y\.| +peer0.org2.example.com | 00000010 42 32 39 ac 9b 2b 93 28 74 c0 ba 10 2b e5 20 f3 |B29..+.(t...+. .| +peer0.org2.example.com | 00000020 77 2d d7 b8 09 02 20 09 f6 9c d1 22 dd 6b f7 e3 |w-.... ....".k..| +peer0.org2.example.com | 00000030 a1 b3 98 05 27 06 b0 bd b0 21 e4 1d c8 eb c6 05 |....'....!......| +peer0.org2.example.com | 00000040 6f b9 c4 e5 c2 f8 5d |o.....]| +peer0.org2.example.com | [d27 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [d28 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b e8 74 4a 60 b4 c2 b9 b7 9b fd a4 |0D. k.tJ`.......| +peer0.org2.example.com | 00000010 c5 01 10 32 73 48 c3 de 91 40 22 e2 79 ad 38 ea |...2sH...@".y.8.| +peer0.org2.example.com | 00000020 f3 3e e0 2e 02 20 6d 9d 2b 78 19 3c bb 17 c5 6a |.>... m.+x.<...j| +peer0.org2.example.com | 00000030 2e 7f e0 88 5b 4c 19 a4 89 df d0 61 5c 77 09 b8 |....[L.....a\w..| +peer0.org2.example.com | 00000040 b2 2e 88 18 5e 53 |....^S| +peer0.org2.example.com | [d29 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [d22 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [d2a 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d2b 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [d2c 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d2d 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [d2e 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [d2f 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [d30 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d31 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d32 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d33 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [d34 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d35 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d37 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [d38 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\340.\002 m\235+x\031<\273\027\305j.\177\340\210[L\031\244\211\337\320a\\w\t\270\262.\210\030^S" > > alive:\030\n\200hZ\367\275:q\275\372+9\006\227\256\371K\370\232\212vm.&)\223\247\334\334\002 j\215\021\307~o\324+ejZ\327\312\235&\254\340z*\373]\265L\350\017\267\035$\234\270\032q" > +peer0.org2.example.com | [d36 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d39 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [d3b 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d3a 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d3c 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 47 3a eb a3 09 02 20 1b e8 84 10 4c d7 5f 0f 3e |G:.... ....L._.>| +peer1.org1.example.com | 00000030 74 51 d9 be 09 9d f8 7e 54 19 19 fe 27 ac 29 54 |tQ.....~T...'.)T| +peer1.org1.example.com | 00000040 22 83 8a 9c 16 3f 22 |"....?"| +peer1.org1.example.com | [e88 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [e89 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [e8a 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e8b 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e8c 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e8d 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e8e 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e8f 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e90 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e91 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [e92 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [e93 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e94 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [e95 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [e96 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer1.org1.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +peer1.org1.example.com | [e97 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer1.org1.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer1.org1.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer1.org1.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer1.org1.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer1.org1.example.com | [e98 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [e99 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [e9a 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e9b 05-20 18:20:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e9c 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 b2 10 11 61 44 58 5a 52 ce f5 87 73 80 86 52 47 |...aDXZR...s..RG| +peer0.org1.example.com | 00000020 5c a3 c9 59 02 20 36 a3 ed 95 eb 45 e3 c5 6d 45 |\..Y. 6....E..mE| +peer0.org1.example.com | 00000030 a0 04 b4 b8 cf bb 4b f7 55 6c 55 8d 51 72 fe 08 |......K.UlU.Qr..| +peer0.org1.example.com | 00000040 1c c0 58 4f af 5d |..XO.]| +peer0.org1.example.com | [d6b 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d6c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d6d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [d6e 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +peer0.org1.example.com | 00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +peer0.org1.example.com | [d6f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +peer0.org1.example.com | 00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +peer0.org1.example.com | 00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +peer0.org1.example.com | 00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +peer0.org1.example.com | 00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +peer0.org1.example.com | [d70 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [d71 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [d72 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d73 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d75 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d74 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [d76 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [d77 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d78 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d79 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d7a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d7b 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d7c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d7d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d7e 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 gate 1589998812886838700 evaluation starts +peer1.org1.example.com | [e9d 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e9e 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e9f 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ea0 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ea1 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ea2 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ea3 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ea4 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ea5 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ea6 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ea7 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ea8 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ea9 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eaa 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eab 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [eac 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ead 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [eae 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [eaf 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [eb0 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [eb1 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [eb2 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eb3 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [eb4 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [eb5 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [eb6 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [eb7 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [eb8 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [eb9 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367fa00 gate 1589998820670230700 evaluation starts +orderer0.example.com | "2020-05-20 18:20:55.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:55.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:55.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102b Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +orderer0.example.com | "2020-05-20 18:20:55.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.1µs " +orderer0.example.com | "2020-05-20 18:20:55.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102d Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +orderer0.example.com | "2020-05-20 18:20:55.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102e Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2020-05-20 18:20:55.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +orderer0.example.com | "2020-05-20 18:20:55.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1030 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 343.7µs " +orderer0.example.com | "2020-05-20 18:20:55.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1031 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:55.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:56.014 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1033 No inactive chains to try to replicate" +orderer0.example.com | "2020-05-20 18:20:56.395 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1034 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:56.397 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1035 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +orderer0.example.com | "2020-05-20 18:20:56.398 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1036 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.4µs " +orderer0.example.com | "2020-05-20 18:20:56.514 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1037 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1757ms" +orderer0.example.com | "2020-05-20 18:20:56.514 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1038 Sending msg of 28 bytes to 3 on channel businesschannel took 137.6µs" +orderer0.example.com | "2020-05-20 18:20:56.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1039 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.6µs " +orderer0.example.com | "2020-05-20 18:20:56.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.4µs " +orderer0.example.com | "2020-05-20 18:20:56.525 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d3d 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > alive:\030\n\200hZ\367\275:q\275\372+9\006\227\256\371K\370\232\212vm.&)\223\247\334\334\002 j\215\021\307~o\324+ejZ\327\312\235&\254\340z*\373]\265L\350\017\267\035$\234\270\032q" > +peer0.org2.example.com | [d3e 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [d3f 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d40 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d41 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d42 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d43 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [d44 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d45 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d46 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d47 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d48 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d49 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d4a 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [d4b 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b93a0 gate 1589998813285286500 evaluation starts +peer0.org2.example.com | [d4c 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b93a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d4d 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b93a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [d4e 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b93a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [d4f 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b93a0 principal evaluation fails +peer0.org2.example.com | [d50 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b93a0 gate 1589998813285286500 evaluation fails +peer0.org2.example.com | [d51 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d52 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d53 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [d54 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b9910 gate 1589998813285665600 evaluation starts +peer0.org2.example.com | [d55 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b9910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d56 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b9910 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [d57 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b9910 principal matched by identity 0 +peer0.org2.example.com | [d58 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 7e b6 cf fe 56 ff c0 74 f9 46 fa f5 77 c8 2b |Y~...V..t.F..w.+| +peer0.org2.example.com | 00000010 0b 14 02 5b 13 d7 29 c2 f9 ba 2b f2 4a 8b 88 50 |...[..)...+.J..P| +peer0.org2.example.com | [d59 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 22 52 27 23 46 4a 10 4c 84 59 |0E.!.."R'#FJ.L.Y| +peer0.org2.example.com | 00000010 a4 14 d5 d0 e0 ee 35 36 b2 c6 9b 17 aa ae ab d4 |......56........| +peer0.org2.example.com | 00000020 9c a5 4a 03 4c 02 20 56 70 85 1b 5e 22 85 8c 2e |..J.L. Vp..^"...| +peer0.org2.example.com | 00000030 73 bf 44 ee 28 37 36 62 8e 1b 73 a8 24 23 ab a2 |s.D.(76b..s.$#..| +peer0.org2.example.com | 00000040 26 fe 94 3f da f1 0f |&..?...| +peer0.org2.example.com | [d5a 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b9910 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [d5b 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b9910 gate 1589998813285665600 evaluation succeeds +peer0.org2.example.com | [d5c 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d5d 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d5e 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [d5f 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d60 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d61 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [d62 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [d63 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [d64 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [d65 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d66 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d67 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d68 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d69 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d6a 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d6b 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d6c 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d6d 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d6e 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [d6f 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d70 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d71 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [d72 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d73 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d74 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d75 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d76 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d77 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d78 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d79 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d7a 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [d7b 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [d7c 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d7d 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d7e 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [d7f 05-20 18:20:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [d80 05-20 18:20:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [d81 05-20 18:20:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161016 +peer1.org1.example.com | [eba 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367fa00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ebb 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367fa00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [ebc 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367fa00 principal matched by identity 0 +peer1.org1.example.com | [ebd 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +peer1.org1.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +peer1.org1.example.com | [ebe 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +peer1.org1.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +peer1.org1.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer1.org1.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer1.org1.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer1.org1.example.com | [ebf 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367fa00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ec0 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367fa00 gate 1589998820670230700 evaluation succeeds +peer1.org1.example.com | [ec1 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ec2 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ec3 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ec4 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ec5 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ec6 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [ec7 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [ec8 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [ec9 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [eca 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ecb 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ecc 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ecd 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [ece 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ecf 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed0 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed1 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [ed2 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [ed4 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ed3 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [ed5 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [ed6 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 40 da 97 c9 a7 c9 e4 fc 52 c8 a6 c5 30 f1 45 |F@.......R...0.E| +peer1.org1.example.com | 00000010 85 1a 53 0b f0 10 d1 e7 f4 17 a1 dd da ab 46 f9 |..S...........F.| +peer1.org1.example.com | [ed7 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 5a 9d 92 52 6e 5d c6 41 f9 58 59 |0D. .Z..Rn].A.XY| +peer1.org1.example.com | 00000010 98 d1 90 42 ea 34 43 b5 21 b7 8a 52 48 ab a2 5d |...B.4C.!..RH..]| +peer1.org1.example.com | 00000020 61 c1 14 76 02 20 59 a8 27 bb c3 f0 e4 b2 ae 58 |a..v. Y.'......X| +peer1.org1.example.com | 00000030 05 7a 46 4e e4 5c 81 ad 4c 17 7e 90 f8 88 46 9b |.zFN.\..L.~...F.| +peer1.org1.example.com | 00000040 67 24 5a 5a cf 94 |g$ZZ..| +peer1.org1.example.com | [ed8 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ed9 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eda 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [edb 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [edc 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [edd 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ede 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [edf 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ee0 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ee1 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ee2 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ee3 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ee4 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ee5 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ee6 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ee7 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ee8 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ee9 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [eea 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [eeb 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [eec 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [eed 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [eee 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [eef 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [ef0 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ef1 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ef2 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ef3 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ef4 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [ef5 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [ef6 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ef7 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 gate 1589998820866843500 evaluation starts +peer1.org1.example.com | [ef8 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ef9 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [efa 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 principal matched by identity 0 +peer1.org1.example.com | [efb 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +peer1.org1.example.com | 00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +peer1.org1.example.com | [efc 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +peer1.org1.example.com | 00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +peer1.org1.example.com | 00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +peer1.org1.example.com | 00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +peer1.org1.example.com | 00000040 cd dc 6d 0d 94 00 0a |..m....| +peer1.org1.example.com | [efd 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [efe 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 gate 1589998820866843500 evaluation succeeds +peer1.org1.example.com | [eff 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f00 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f01 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f02 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f03 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f04 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [f05 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [f06 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [f07 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [f08 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f09 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f0a 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [f0b 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f0c 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f0d 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f0e 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f0f 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [f10 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [f11 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f12 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d82 05-20 18:20:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4DB73D67FC8B034F165D1FD235C7B21100BA15DD158963F4F6B33777686E701E +peer0.org2.example.com | [d83 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [d84 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [d85 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [d86 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [d87 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d88 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d89 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [d8a 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d8b 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [d8c 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d8d 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [d8e 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d8f 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d90 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d91 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d92 05-20 18:20:13.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d93 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d94 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [d95 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d96 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [d97 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [d98 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d99 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d9a 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d9b 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d9c 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d9d 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d9e 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [d9f 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ad40 gate 1589998813829152400 evaluation starts +peer0.org2.example.com | [da0 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ad40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [da1 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ad40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [da2 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ad40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [da3 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ad40 principal evaluation fails +peer0.org2.example.com | [da4 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ad40 gate 1589998813829152400 evaluation fails +peer0.org2.example.com | [da5 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [da6 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [da7 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [da8 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2700 gate 1589998813831807200 evaluation starts +peer0.org2.example.com | [da9 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [daa 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2700 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [dab 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2700 principal matched by identity 0 +peer0.org2.example.com | [dac 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 a9 17 9f ab 79 f9 8c 06 cc a7 53 96 67 67 43 |.....y.....S.ggC| +peer0.org2.example.com | 00000010 37 06 b0 28 53 9a 14 49 3d f2 b9 39 a4 3f 1c 91 |7..(S..I=..9.?..| +peer0.org2.example.com | [dad 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 39 1c d5 a7 bf 5e 07 b2 83 30 cc |0D. e9....^...0.| +peer0.org2.example.com | 00000010 fd 8b 3f 5d 72 38 30 15 2d e6 51 65 f3 32 a0 99 |..?]r80.-.Qe.2..| +peer0.org2.example.com | 00000020 12 c2 43 f5 02 20 0f d5 ba 11 7d 40 e7 b5 4a 7f |..C.. ....}@..J.| +peer0.org2.example.com | 00000030 9e 2d 83 e1 a4 87 91 a0 23 e0 34 00 28 e8 b6 2b |.-......#.4.(..+| +peer0.org2.example.com | 00000040 27 38 aa e8 2b c5 |'8..+.| +peer0.org2.example.com | [dae 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2700 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [daf 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2700 gate 1589998813831807200 evaluation succeeds +peer0.org2.example.com | [db0 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [db1 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [db2 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [db3 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [db4 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [db5 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [db6 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [db7 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [db8 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [db9 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dba 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dbb 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dbc 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dbd 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [deb 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:20:56.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:56.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [f13 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\366\270\336's" secret_envelope:=\225\214[\233\371\013\322`\241\324\236\326\002\253\313@i\n\030<\2279\002 \023\325\342\314\2161X.5T\271\032j\255\376p\263\272\342\220\026!\355\212\270L\034_\355\207\032\347" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [d7f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [dec 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:20:56.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103e Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +peer1.org1.example.com | [f14 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d80 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [dbe 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ded 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:20:56.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 421.9µs " +peer1.org1.example.com | [f15 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\366\270\336's" secret_envelope:=\225\214[\233\371\013\322`\241\324\236\326\002\253\313@i\n\030<\2279\002 \023\325\342\314\2161X.5T\271\032j\255\376p\263\272\342\220\026!\355\212\270L\034_\355\207\032\347" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [d81 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 principal matched by identity 0 +peer0.org2.example.com | [dbf 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dee 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:20:56.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1040 Sending msg of 28 bytes to 2 on channel businesschannel took 63µs" +peer1.org1.example.com | [f16 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [d82 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU Obtaining identity +peer1.org2.example.com | [def 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:56.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1041 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +peer1.org1.example.com | [f17 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +peer0.org1.example.com | 00000010 ea b6 bc fb e6 6e dd dd aa 90 40 64 58 3b bd 82 |.....n....@dX;..| +peer0.org2.example.com | [dc1 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +peer0.org1.example.com | [d83 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +peer0.org2.example.com | [dc2 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [f18 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +orderer0.example.com | "2020-05-20 18:20:56.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1042 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 201.7µs " +peer1.org2.example.com | [df0 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +peer0.org2.example.com | [dc3 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +orderer0.example.com | "2020-05-20 18:20:56.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1043 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 837µs " +peer1.org2.example.com | [df1 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +peer1.org1.example.com | 00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +peer0.org2.example.com | [dc4 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:20:56.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1044 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:20:56.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1045 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +peer1.org1.example.com | 00000030 17 39 d7 6d 8c e4 fd e8 88 36 f0 c8 1d 02 66 57 |.9.m.....6....fW| +peer0.org2.example.com | [dc5 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:57.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1046 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [df2 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 7c 58 26 3b 84 ff e8 ||X&;...| +peer1.org1.example.com | 00000040 3e f6 b8 de 27 73 |>...'s| +peer0.org2.example.com | [dc6 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:20:57.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +peer1.org2.example.com | [df3 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d84 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f19 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [dc7 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:57.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1048 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 538.4µs " +peer1.org2.example.com | [df4 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d85 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 gate 1589998812886838700 evaluation succeeds +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [dc8 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:57.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1049 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +peer1.org1.example.com | [f1a 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 5e 0f 15 1b e6 ef 5d 3e 3d 95 |0E.!..^.....]>=.| +peer0.org2.example.com | [dc9 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:20:57.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104a Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +peer1.org1.example.com | 00000010 8c 5b 9b f9 0b d2 60 a1 d4 9e d6 02 ab cb 40 69 |.[....`.......@i| +peer0.org1.example.com | [d86 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [df5 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [dca 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:20:57.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.4µs " +peer1.org1.example.com | 00000020 0a 18 3c 97 39 02 20 13 d5 e2 cc 8e 31 58 2e 35 |..<.9. .....1X.5| +peer1.org1.example.com | 00000030 54 b9 1a 6a ad fe 70 b3 ba e2 90 16 21 ed 8a b8 |T..j..p.....!...| +peer0.org1.example.com | [d87 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [dcb 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:57.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000040 4c 1c 5f ed 87 1a e7 |L._....| +peer0.org1.example.com | [d88 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [df6 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [dcc 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [df7 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368ba70 gate 1589998820525955100 evaluation starts +peer1.org1.example.com | [f1b 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [dcd 05-20 18:20:13.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [df8 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368ba70 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:20:57.414 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [f1c 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [dce 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [df9 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368ba70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [dfa 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368ba70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [f1d 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [d89 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [dcf 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:57.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.8168ms " +peer1.org2.example.com | [dfb 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368ba70 principal evaluation fails +peer1.org1.example.com | [f1e 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [d8a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [dd0 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +orderer0.example.com | "2020-05-20 18:20:57.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [dfc 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368ba70 gate 1589998820525955100 evaluation fails +peer1.org1.example.com | [f1f 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [f20 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dd1 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:57.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1050 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +orderer0.example.com | "2020-05-20 18:20:57.893 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1051 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +peer1.org1.example.com | [f21 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dd2 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d8b 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:57.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1052 Sending msg of 28 bytes to 2 on channel businesschannel took 59.9µs" +peer1.org2.example.com | [dfd 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f22 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dd3 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d8c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-05-20 18:20:57.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1053 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +peer1.org2.example.com | [dfe 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f23 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [dd4 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d8d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +orderer0.example.com | "2020-05-20 18:20:57.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1054 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +peer1.org2.example.com | [dff 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [f24 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dd5 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e00 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368bfe0 gate 1589998820528478500 evaluation starts +peer1.org1.example.com | [f25 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dd6 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | 00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +peer1.org2.example.com | [e01 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368bfe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f26 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [dd7 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f a1 3e 51 e0 fc 3e 0e 1b d6 72 68 c9 a1 c2 bd |..>Q..>...rh....| +peer0.org1.example.com | [d8e 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +peer1.org2.example.com | [e02 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368bfe0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:20:57.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1055 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.2µs " +peer1.org1.example.com | [f27 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\366\270\336's" secret_envelope:=\225\214[\233\371\013\322`\241\324\236\326\002\253\313@i\n\030<\2279\002 \023\325\342\314\2161X.5T\271\032j\255\376p\263\272\342\220\026!\355\212\270L\034_\355\207\032\347" > > alive: +peer1.org1.example.com | [f28 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [f29 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f2a 05-20 18:20:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 76 c3 28 1a aa e3 ea c8 4d a3 48 fc 36 1e b9 c4 |v.(.....M.H.6...| +peer0.org1.example.com | 00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +peer0.org2.example.com | [dd8 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 52 31 04 3a 1b d7 19 fc 70 89 0d |0D. wR1.:....p..| +peer1.org1.example.com | [f2b 05-20 18:20:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816101D +peer0.org1.example.com | 00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +peer0.org1.example.com | 00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +peer0.org1.example.com | 00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +peer0.org2.example.com | 00000010 9d 12 bb f6 36 6a 10 64 70 0a 13 09 17 a0 4c 59 |....6j.dp.....LY| +peer1.org1.example.com | [f2c 05-20 18:20:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A6005F18F5592C41D746EE2F9ACE9132BF290D8ED219562542280D9FAF6F8FDC +peer0.org2.example.com | 00000020 dc b6 5e 86 02 20 26 e1 03 20 ff 73 d8 2f 98 62 |..^.. &.. .s./.b| +peer0.org2.example.com | 00000030 4c 7f 54 09 f1 b5 a5 af 72 f1 12 93 62 d2 ce 45 |L.T.....r...b..E| +peer0.org2.example.com | 00000040 66 8c 4b ea 8f 10 |f.K...| +peer1.org1.example.com | [f2d 05-20 18:20:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [dd9 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [dda 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [f2e 05-20 18:20:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [f2f 05-20 18:20:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [f30 05-20 18:20:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [ddb 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [ddc 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [f31 05-20 18:20:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ddd 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [e03 05-20 18:20:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368bfe0 principal matched by identity 0 +peer1.org2.example.com | [e04 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | [f32 05-20 18:20:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f33 05-20 18:20:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dde 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f34 05-20 18:20:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [f35 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [ddf 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [f36 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [de0 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:57.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1056 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [e05 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | [d8f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f37 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [de1 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:20:57.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1057 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | [d90 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f38 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [de2 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [de3 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | [d91 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f39 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [de4 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:20:58.422 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1058 Sending msg of 28 bytes to 2 on channel businesschannel took 24.1µs" +peer0.org1.example.com | [d92 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [f3a 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [de5 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | "2020-05-20 18:20:58.422 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1059 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +peer0.org1.example.com | [d93 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f3b 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [de6 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e06 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368bfe0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f3c 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [de7 05-20 18:20:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e07 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368bfe0 gate 1589998820528478500 evaluation succeeds +peer0.org1.example.com | [d94 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f3d 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:58.423 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " +peer0.org2.example.com | [de8 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [de9 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dea 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f3e 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:58.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.1µs " +peer1.org1.example.com | [f3f 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e08 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e09 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [d95 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [deb 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f40 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e0a 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [e0b 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [e0c 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [dec 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f41 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dee 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [d96 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d97 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f42 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [def 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ded 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [f43 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:20:58.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [df0 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f44 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f45 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f46 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [df1 05-20 18:20:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f47 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d98 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:58.432 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [df2 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f48 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f49 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f4a 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [df3 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f4b 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:20:58.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [df4 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e0d 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | [d99 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f4c 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f4d 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [df5 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | [d9a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 gate 1589998812889168100 evaluation starts +peer1.org1.example.com | [f4e 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003821200 gate 1589998823739226100 evaluation starts +peer0.org2.example.com | [df6 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:20:58.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105f Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc002844770 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f4f 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003821200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [df7 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:58.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1060 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.4µs " +peer1.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org1.example.com | [d9c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [f50 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003821200 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [df8 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:20:58.861 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1061 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org1.example.com | [d9d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 principal matched by identity 0 +peer1.org1.example.com | [f51 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003821200 principal matched by identity 0 +peer0.org2.example.com | [df9 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e0e 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +orderer0.example.com | "2020-05-20 18:20:58.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1062 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.4µs " +peer0.org1.example.com | [d9e 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 7a 04 1b e5 5a 1f 7e 57 ab 83 08 b9 ef fa 20 |Vz...Z.~W...... | +peer1.org1.example.com | [f52 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 9f 80 de 10 a7 9b ce a7 85 4d 51 12 0e cc 19 |..........MQ....| +peer0.org2.example.com | [dfa 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +orderer0.example.com | "2020-05-20 18:20:58.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1063 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +peer0.org1.example.com | 00000010 5e 70 ee 1f bf 26 77 4c 9f bc 49 8c 2a 9c 67 fd |^p...&wL..I.*.g.| +peer1.org1.example.com | 00000010 fc 82 40 99 b5 4c 4e 13 d3 1e 58 a6 c3 aa 13 8f |..@..LN...X.....| +peer0.org2.example.com | [dfb 05-20 18:20:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [e0f 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +orderer0.example.com | "2020-05-20 18:20:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1064 Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +peer0.org1.example.com | [d9f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 77 bc 45 e4 a3 06 30 b7 4a 3d e1 |0D. Ew.E...0.J=.| +peer1.org1.example.com | [f53 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 f6 29 b1 8b ce 2d df d5 62 e8 72 |0D. E.)...-..b.r| +peer0.org2.example.com | [dfc 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +orderer0.example.com | "2020-05-20 18:20:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1065 Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +peer0.org1.example.com | 00000010 0e 5e 9e e8 e0 02 f8 d6 84 b6 49 0f 02 41 da d8 |.^........I..A..| +peer1.org1.example.com | 00000010 74 0a d5 8d a8 19 72 11 c3 b1 1e f2 0a d2 ee 23 |t.....r........#| +peer0.org2.example.com | [dfd 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +orderer0.example.com | "2020-05-20 18:20:58.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1066 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.9µs " +peer0.org1.example.com | 00000020 7d 97 95 e7 02 20 4f d8 cb 54 17 6d dc ce 92 5b |}.... O..T.m...[| +peer1.org1.example.com | 00000020 28 2f c0 ad 02 20 1c 2b db 4d 43 9d af c5 09 d6 |(/... .+.MC.....| +peer0.org2.example.com | [dfe 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +orderer0.example.com | "2020-05-20 18:20:58.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1067 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4825ms " +peer1.org1.example.com | 00000030 e6 b1 de 0f 63 06 ca e1 2d a2 05 b6 11 bc 04 86 |....c...-.......| +peer0.org2.example.com | [dff 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [e10 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 1e 65 36 23 13 f1 |.e6#..| +peer0.org1.example.com | 00000030 72 b8 9e 69 10 a9 b6 73 61 a5 4f 8c d3 52 07 b9 |r..i...sa.O..R..| +peer0.org2.example.com | [e00 05-20 18:20:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e01 05-20 18:20:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e11 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [f54 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003821200 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 aa 95 e5 42 bc 6c |...B.l| +peer0.org2.example.com | [e02 05-20 18:20:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [e12 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +orderer0.example.com | "2020-05-20 18:20:58.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1068 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [f55 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003821200 gate 1589998823739226100 evaluation succeeds +peer0.org1.example.com | [da0 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e03 05-20 18:20:16.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +orderer0.example.com | "2020-05-20 18:20:58.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1069 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [f56 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [da1 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 gate 1589998812889168100 evaluation succeeds +peer0.org2.example.com | [e04 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e13 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +orderer0.example.com | "2020-05-20 18:20:59.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [f57 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [da2 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e05 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | [f58 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [da3 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e06 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:20:59.359 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106b Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +peer0.org1.example.com | [da4 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [e07 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [da5 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f5a 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:20:59.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " +peer0.org2.example.com | [e08 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e09 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org1.example.com | [f5b 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-05-20 18:20:59.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106d Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs" +peer0.org2.example.com | [e0a 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org1.example.com | [f5c 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:20:59.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106e Sending msg of 28 bytes to 3 on channel businesschannel took 34.3µs" +peer0.org2.example.com | [e0b 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [da6 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e14 05-20 18:20:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f5d 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:20:59.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.1µs " +peer0.org2.example.com | [e0c 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [da7 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1589998788850055200, 23 but got ts: inc_num:1589998788850055200 seq_num:21 +peer0.org1.example.com | [da8 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f5e 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:20:59.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1070 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 895.1µs " +peer0.org2.example.com | [e0d 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [da9 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e15 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f5f 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:20:59.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1071 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e0e 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [daa 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e16 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f60 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:20:59.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1072 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e0f 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [dab 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dac 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f61 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [dad 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e10 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f62 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dae 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [e17 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:20:59.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1073 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [e11 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f63 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [daf 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 7e b6 cf fe 56 ff c0 74 f9 46 fa f5 77 c8 2b |Y~...V..t.F..w.+| +peer1.org2.example.com | [e18 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:20:59.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1074 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +peer0.org2.example.com | [e12 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f64 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 0b 14 02 5b 13 d7 29 c2 f9 ba 2b f2 4a 8b 88 50 |...[..)...+.J..P| +peer1.org2.example.com | [e19 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:20:59.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1075 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 276.1µs " +peer0.org2.example.com | [e13 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378e6a0 gate 1589998816204031800 evaluation starts +peer1.org1.example.com | [f65 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [db0 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 22 52 27 23 46 4a 10 4c 84 59 |0E.!.."R'#FJ.L.Y| +peer1.org2.example.com | [e1a 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:20:59.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1076 Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +peer0.org2.example.com | [e14 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378e6a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f66 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 a4 14 d5 d0 e0 ee 35 36 b2 c6 9b 17 aa ae ab d4 |......56........| +peer1.org2.example.com | [e1b 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:20:59.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1077 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +peer0.org2.example.com | [e15 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378e6a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [f67 05-20 18:20:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 9c a5 4a 03 4c 02 20 56 70 85 1b 5e 22 85 8c 2e |..J.L. Vp..^"...| +peer1.org2.example.com | [e1c 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8850 gate 1589998820544956300 evaluation starts +orderer0.example.com | "2020-05-20 18:20:59.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1078 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.2µs " +peer0.org2.example.com | [e16 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378e6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [f68 05-20 18:20:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 73 bf 44 ee 28 37 36 62 8e 1b 73 a8 24 23 ab a2 |s.D.(76b..s.$#..| +peer1.org2.example.com | [e1d 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8850 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:20:59.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1079 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 207.5µs " +peer0.org2.example.com | [e17 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378e6a0 principal evaluation fails +peer1.org1.example.com | [f69 05-20 18:20:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f6a 05-20 18:20:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 26 fe 94 3f da f1 0f |&..?...| +peer1.org2.example.com | [e1e 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8850 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [e1f 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [e18 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378e6a0 gate 1589998816204031800 evaluation fails +peer1.org1.example.com | [f6b 05-20 18:20:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db1 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e20 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8850 principal evaluation fails +peer0.org2.example.com | [e19 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:20:59.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [f6c 05-20 18:20:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db2 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [e1a 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:20:59.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [f6d 05-20 18:20:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [db3 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [e1b 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [e21 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8850 gate 1589998820544956300 evaluation fails +peer1.org1.example.com | [f6e 05-20 18:20:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db4 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [e1c 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378ec10 gate 1589998816206634000 evaluation starts +peer1.org2.example.com | [e22 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f70 05-20 18:20:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db5 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [e1d 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378ec10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e23 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f6f 05-20 18:20:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [db6 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:00.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [e1e 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378ec10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [e24 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [f71 05-20 18:20:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [db7 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [db8 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e1f 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378ec10 principal matched by identity 0 +peer1.org2.example.com | [e25 05-20 18:20:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8dc0 gate 1589998820549642500 evaluation starts +peer1.org1.example.com | [f72 05-20 18:20:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:00.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107d Sending msg of 28 bytes to 3 on channel testchainid took 63.3µs" +peer0.org2.example.com | [e20 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | [e26 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f73 05-20 18:20:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f74 05-20 18:20:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f75 05-20 18:20:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [e21 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [f76 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [f77 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [e22 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378ec10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e23 05-20 18:20:16.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378ec10 gate 1589998816206634000 evaluation succeeds +peer0.org2.example.com | [e24 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [f78 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e25 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [f79 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [f7a 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [f7b 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e27 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8dc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [e26 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f7c 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [f7d 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f7e 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [f7f 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e27 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f80 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e28 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e29 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e28 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8dc0 principal matched by identity 0 +peer0.org1.example.com | [db9 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f81 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e29 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:00.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3275ms " +peer0.org1.example.com | [dba 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f82 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [e2a 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [dbb 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f83 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e2a 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:00.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107f Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +peer1.org1.example.com | [f84 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dbc 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:00.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1080 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +peer0.org2.example.com | [e2b 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f85 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:21:00.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1081 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 315.9µs " +peer0.org2.example.com | [e2c 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f86 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [dbd 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dbe 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:00.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1082 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.9µs " +peer0.org2.example.com | [e2d 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f87 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f88 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:00.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1083 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e2e 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f89 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [dbf 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:00.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1084 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e2f 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f8a 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [e2b 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8dc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [dc0 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:00.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1085 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [e30 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378fe10 gate 1589998816212677700 evaluation starts +peer1.org1.example.com | [f8b 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e2c 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c8dc0 gate 1589998820549642500 evaluation succeeds +peer0.org1.example.com | [dc1 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:00.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1086 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +peer0.org2.example.com | [e31 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378fe10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f8c 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [e2d 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [dc2 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:00.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1087 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 370.3µs " +peer0.org2.example.com | [e32 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378fe10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [f8d 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e2e 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [dc3 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e33 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378fe10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [f8e 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f8f 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:00.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1088 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +peer0.org1.example.com | [dc4 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e34 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378fe10 principal evaluation fails +peer1.org1.example.com | [f90 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-05-20 18:21:00.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1089 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +peer1.org2.example.com | [e2f 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [dc5 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e35 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378fe10 gate 1589998816212677700 evaluation fails +peer1.org1.example.com | [f91 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:00.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185µs " +peer1.org2.example.com | [e30 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [dc6 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e36 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f92 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:00.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.6µs " +peer1.org2.example.com | [e31 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dc7 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e37 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f93 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:00.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [e32 05-20 18:20:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dc8 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e38 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [f94 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [dc9 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e39 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6380 gate 1589998816216119700 evaluation starts +peer1.org1.example.com | [f95 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [e3a 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6380 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f96 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e3b 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6380 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [e33 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e34 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e35 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f97 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [e3c 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6380 principal matched by identity 0 +peer1.org1.example.com | [f98 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385c230 gate 1589998823989521100 evaluation starts +peer0.org1.example.com | [dca 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dcb 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e3d 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | [f99 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385c230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e36 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +orderer0.example.com | "2020-05-20 18:21:00.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [f9a 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385c230 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [e37 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e3e 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | [dcc 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-05-20 18:21:01.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [f9b 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385c230 principal matched by identity 0 +peer1.org2.example.com | [e38 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | [dcd 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:01.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108f Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +peer1.org1.example.com | [f9c 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 44 5d df 21 54 e4 bf 96 6b 82 14 02 fa f6 af |.D].!T...k......| +peer1.org1.example.com | 00000010 62 81 39 11 9e d8 d2 1c bf 0b 54 fc be 6d 73 30 |b.9.......T..ms0| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [f9d 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 94 3c c8 9c 02 78 52 ce 35 34 c3 |0D. ..<...xR.54.| +peer0.org2.example.com | [e3f 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6380 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e40 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6380 gate 1589998816216119700 evaluation succeeds +peer0.org2.example.com | [e41 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e42 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 43 5f 8e 1b c0 bd 3d ac b7 17 69 ad c5 fd a8 65 |C_....=...i....e| +peer0.org2.example.com | [e43 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 14 33 62 fd 02 20 38 b1 5f ab 65 1a c3 fe 5a 75 |.3b.. 8._.e...Zu| +peer1.org1.example.com | 00000030 f0 11 d6 a2 47 90 03 8b d8 86 4c 87 19 51 8d 99 |....G.....L..Q..| +peer1.org1.example.com | 00000040 9b 63 bf fa e3 4e |.c...N| +peer1.org1.example.com | [f9e 05-20 18:20:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385c230 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e44 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f9f 05-20 18:20:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385c230 gate 1589998823989521100 evaluation succeeds +peer0.org2.example.com | [e45 05-20 18:20:16.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | [e39 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c9fc0 gate 1589998820562376900 evaluation starts +peer0.org1.example.com | [dce 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:01.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1090 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101µs " +peer1.org1.example.com | [fa0 05-20 18:20:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [e3a 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c9fc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [dcf 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:01.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1091 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +peer1.org1.example.com | [fa1 05-20 18:20:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e46 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | [e3b 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c9fc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [dd0 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:01.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1093 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +peer1.org1.example.com | [fa2 05-20 18:20:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | [e3c 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c9fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [dd1 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:01.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1094 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.1µs " +peer1.org1.example.com | [fa3 05-20 18:20:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | [e3d 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c9fc0 principal evaluation fails +peer0.org1.example.com | [dd2 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:01.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1092 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.4µs " +peer1.org1.example.com | [fa4 05-20 18:20:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | [e3e 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c9fc0 gate 1589998820562376900 evaluation fails +peer1.org2.example.com | [e3f 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [dd3 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [fa5 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [e40 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [dd4 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 gate 1589998813645171400 evaluation starts +orderer0.example.com | "2020-05-20 18:21:01.381 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1095 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [fa6 05-20 18:20:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [e47 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | [e41 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [dd5 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:01.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1096 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [fa7 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [e42 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6530 gate 1589998820563301100 evaluation starts +peer0.org1.example.com | [dd6 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:01.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1097 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [fa8 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e48 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | [e43 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [dd7 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:01.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1098 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +peer1.org1.example.com | [fa9 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | [e44 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6530 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [dd8 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d b7 3d 67 fc 8b 03 4f 16 5d 1f d2 35 c7 b2 11 |M.=g...O.]..5...| +orderer0.example.com | "2020-05-20 18:21:01.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1099 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e45 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6530 principal matched by identity 0 +peer0.org1.example.com | 00000010 00 ba 15 dd 15 89 63 f4 f6 b3 37 77 68 6e 70 1e |......c...7whnp.| +orderer0.example.com | "2020-05-20 18:21:01.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109a Sending msg of 28 bytes to 2 on channel businesschannel took 17.6µs" +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org1.example.com | [fab 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e46 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | [dd9 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 0c 35 eb be 9f 24 d1 6c 03 c6 |0E.!...5...$.l..| +orderer0.example.com | "2020-05-20 18:21:01.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109b Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org1.example.com | [fac 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | 00000010 0e a1 61 51 f7 73 cb 16 68 66 92 97 84 30 6e 73 |..aQ.s..hf...0ns| +orderer0.example.com | "2020-05-20 18:21:01.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274µs " +peer0.org2.example.com | [e49 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fad 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [e47 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000020 64 b3 25 ed 2f 02 20 1a 76 fa c0 20 97 0d ef 4c |d.%./. .v.. ...L| +orderer0.example.com | "2020-05-20 18:21:01.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.3µs " +peer0.org2.example.com | [e4a 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [fae 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000030 d3 75 ba d4 80 be ee ba 27 66 83 c3 0a 9c 00 7c |.u......'f.....|| +orderer0.example.com | "2020-05-20 18:21:01.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e4b 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [faf 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000040 c8 05 15 44 20 fd 6b |...D .k| +peer0.org2.example.com | [e4c 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fb0 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003946850 gate 1589998824059260600 evaluation starts +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | [dda 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:01.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e4d 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [ddb 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 gate 1589998813645171400 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:02.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [fb1 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003946850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e48 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ddc 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e4e 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:02.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a1 Sending msg of 28 bytes to 3 on channel testchainid took 8.2µs" +peer1.org1.example.com | [fb2 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003946850 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [e49 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6530 gate 1589998820563301100 evaluation succeeds +peer0.org1.example.com | [ddd 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e4f 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:02.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +peer1.org1.example.com | [fb3 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003946850 principal matched by identity 0 +peer1.org2.example.com | [e4a 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [dde 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [e50 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:02.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a3 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +peer1.org1.example.com | [fb4 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | [e4b 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [ddf 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e51 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:02.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a5 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [e4c 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [de0 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e53 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:02.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [fb5 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | [e4d 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [de1 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [e52 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:02.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs " +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | [de2 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [e4e 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | [e54 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-05-20 18:21:02.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | [de3 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [e55 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:02.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [de4 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [e4f 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | [e56 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:02.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [de5 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | [e57 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c85b0 gate 1589998816228738400 evaluation starts +orderer0.example.com | "2020-05-20 18:21:02.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10aa Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +peer0.org1.example.com | [de6 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | [e58 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:02.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.6µs " +peer1.org1.example.com | [fb6 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003946850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [de7 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | [e59 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:02.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ac Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +peer1.org1.example.com | [fb7 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003946850 gate 1589998824059260600 evaluation succeeds +peer0.org1.example.com | [de8 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [e5a 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:02.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ad Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +peer1.org1.example.com | [fb8 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [de9 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e50 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e5b 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [fb9 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:02.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 209.1µs " +peer0.org1.example.com | [dea 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e51 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [e5c 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fba 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:02.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +peer0.org1.example.com | [deb 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e52 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [e5d 05-20 18:20:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c85b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [fbb 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:02.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [dec 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e53 05-20 18:20:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e5e 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c85b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [fbc 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:02.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [ded 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e54 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e5f 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c85b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +orderer0.example.com | "2020-05-20 18:21:03.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [dee 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e55 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e60 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c85b0 principal evaluation fails +peer1.org1.example.com | [fbd 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:03.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b3 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +peer0.org1.example.com | [def 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [e56 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e61 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c85b0 gate 1589998816228738400 evaluation fails +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:03.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +peer0.org1.example.com | [df0 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e57 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [e62 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:21:03.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +peer0.org1.example.com | [df1 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [e58 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e63 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:03.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 3 on channel businesschannel took 122.8µs" +peer0.org1.example.com | [df2 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e59 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [e64 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | "2020-05-20 18:21:03.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.6µs " +peer0.org1.example.com | [df3 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e5a 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [e65 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8b20 gate 1589998816235903600 evaluation starts +peer1.org1.example.com | [fbe 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:03.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.5µs " +peer0.org1.example.com | [df4 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e5b 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e66 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8b20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [fbf 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:03.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [df5 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e5c 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [e67 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8b20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [fc0 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:03.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ba Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [df6 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e5d 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [e68 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8b20 principal matched by identity 0 +peer1.org1.example.com | [fc1 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:03.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [df7 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e5e 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +peer0.org2.example.com | [e69 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | [fc2 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:03.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +peer0.org1.example.com | [df8 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [fc3 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:03.867 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bd Sending msg of 28 bytes to 3 on channel testchainid took 347.5µs" +peer0.org1.example.com | [df9 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e5f 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +peer0.org2.example.com | [e6a 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | [fc4 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:03.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10be Sending msg of 28 bytes to 2 on channel businesschannel took 93.3µs" +peer0.org1.example.com | [dfa 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [fc5 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:03.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bf Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +peer1.org2.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer0.org1.example.com | [dfb 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [fc6 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c2170 gate 1589998824067843600 evaluation starts +orderer0.example.com | "2020-05-20 18:21:03.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.3µs " +peer1.org2.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer0.org1.example.com | [dfc 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | [fc7 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c2170 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:03.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.9µs " +peer1.org2.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer0.org1.example.com | [dfe 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [fc8 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c2170 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:03.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [e60 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [dff 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e6b 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8b20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [fc9 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c2170 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:03.881 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [dfd 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e6c 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8b20 gate 1589998816235903600 evaluation succeeds +peer1.org1.example.com | [fca 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +orderer0.example.com | "2020-05-20 18:21:04.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [e61 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 4c 53 be 39 25 95 77 f2 6f 0b 69 |0D. .LS.9%.w.o.i| +peer0.org1.example.com | [e00 05-20 18:20:13.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [e6d 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +orderer0.example.com | "2020-05-20 18:21:04.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c5 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +peer1.org2.example.com | 00000010 1a 2d 52 ac 24 18 5e f1 55 a1 99 c0 90 dc 1c ba |.-R.$.^.U.......| +peer0.org1.example.com | [e01 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e6e 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [fcb 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +orderer0.example.com | "2020-05-20 18:21:04.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +peer1.org2.example.com | 00000020 99 eb b5 66 02 20 36 f7 92 66 f8 0d 13 e2 c3 66 |...f. 6..f.....f| +peer0.org1.example.com | [e02 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161015 +peer0.org2.example.com | [e6f 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +orderer0.example.com | "2020-05-20 18:21:04.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c7 Sending msg of 28 bytes to 2 on channel businesschannel took 54µs" +peer1.org2.example.com | 00000030 eb 44 39 f8 4c 79 7b 41 e4 da 61 7b 5e 56 fb 28 |.D9.Ly{A..a{^V.(| +peer0.org1.example.com | [e03 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F8A9179FAB79F98C06CCA753966767433706B028539A14493DF2B939A43F1C91 +peer0.org2.example.com | [e70 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 10c8 Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +peer1.org2.example.com | 00000040 c0 1d ae 28 70 1e |...(p.| +peer0.org1.example.com | [e04 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e71 05-20 18:20:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +orderer0.example.com | "2020-05-20 18:21:04.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.4µs " +peer1.org2.example.com | [e62 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [e05 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [e72 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +orderer0.example.com | "2020-05-20 18:21:04.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.5µs " +peer1.org2.example.com | [e63 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [e06 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [fcc 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c2170 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e73 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:04.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e07 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [e64 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [fcd 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c2170 gate 1589998824067843600 evaluation succeeds +peer0.org2.example.com | [e74 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:04.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e08 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e65 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [fce 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e75 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:04.860 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e09 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e66 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [fcf 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e76 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:04.869 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ce Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +peer0.org1.example.com | [e0a 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e67 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fd0 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [e77 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:04.871 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7111ms " +peer0.org1.example.com | [e0b 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e68 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fd1 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e78 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:04.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d0 Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +peer0.org1.example.com | [e0c 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e69 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fd2 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | [e79 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9d20 gate 1589998816241414000 evaluation starts +orderer0.example.com | "2020-05-20 18:21:04.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d1 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +peer0.org1.example.com | [e0d 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e6a 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [e7a 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9d20 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:04.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.5µs " +peer0.org1.example.com | [e0e 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e6b 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fd3 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | [e7b 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9d20 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:04.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.9µs " +peer0.org1.example.com | [e0f 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e6c 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | [e7c 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-05-20 18:21:04.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e10 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e6d 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | [e7d 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9d20 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:04.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e11 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e6e 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | [e7e 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9d20 gate 1589998816241414000 evaluation fails +orderer0.example.com | "2020-05-20 18:21:05.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e12 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e6f 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [e7f 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:05.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d7 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +peer0.org1.example.com | [e13 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e70 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [fd4 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e80 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:05.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 871.9µs " +peer0.org1.example.com | [e14 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e71 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [fd5 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [e81 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:05.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d9 Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" +peer0.org1.example.com | [e15 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [e72 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [fd6 05-20 18:20:23.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [e82 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e6290 gate 1589998816247132800 evaluation starts +orderer0.example.com | "2020-05-20 18:21:05.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 638.8µs " +peer0.org1.example.com | [e16 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e73 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [fd7 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [e83 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e6290 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:05.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10db Sending msg of 28 bytes to 3 on channel businesschannel took 74.8µs" +peer0.org1.example.com | [e17 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [e74 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [fd8 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [e84 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e6290 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:05.383 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e18 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [e75 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [fd9 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [e85 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e6290 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:05.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10dd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.6729ms " +peer0.org1.example.com | [e19 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e76 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [fda 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e86 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:05.383 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10de Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e1a 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e77 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [fdb 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +orderer0.example.com | "2020-05-20 18:21:05.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10df Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e1b 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e78 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [fdc 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e87 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:05.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e0 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +peer0.org1.example.com | [e1c 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e79 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fdd 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:05.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 527.4µs " +peer0.org1.example.com | [e1d 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [e7a 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [fde 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:21:05.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e2 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +peer0.org1.example.com | [e1e 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [e7b 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fdf 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:05.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e3 Sending msg of 28 bytes to 3 on channel businesschannel took 31.2µs" +peer0.org1.example.com | [e1f 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e7c 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [fe0 05-20 18:20:24.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:05.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.2µs " +peer0.org1.example.com | [e21 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e7d 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [fe1 05-20 18:20:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:05.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0868ms " +peer0.org1.example.com | [e22 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e7e 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e88 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e6290 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [fe2 05-20 18:20:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:05.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e23 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e7f 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e89 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e6290 gate 1589998816247132800 evaluation succeeds +peer1.org1.example.com | [fe3 05-20 18:20:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:05.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e7 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e24 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [e80 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e8a 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [fe4 05-20 18:20:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:06.359 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e25 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [e81 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e8b 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [fe5 05-20 18:20:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:06.359 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e9 Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +peer0.org1.example.com | [e26 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [e82 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e8c 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [fe6 05-20 18:20:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:06.360 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +peer0.org1.example.com | [e27 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 gate 1589998813863951700 evaluation starts +peer1.org2.example.com | [e83 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e8d 05-20 18:20:16.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [fe7 05-20 18:20:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:06.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10eb Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +peer0.org1.example.com | [e28 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e84 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fe8 05-20 18:20:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [e8e 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +orderer0.example.com | "2020-05-20 18:21:06.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ec Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +peer0.org1.example.com | [e29 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [e85 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [fe9 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385cf40 gate 1589998824186529200 evaluation starts +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +orderer0.example.com | "2020-05-20 18:21:06.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 487.3µs " +peer0.org1.example.com | [e2a 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 principal matched by identity 0 +peer1.org2.example.com | [e86 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fea 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385cf40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e8f 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +orderer0.example.com | "2020-05-20 18:21:06.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171µs " +peer0.org1.example.com | [e2b 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f a1 3e 51 e0 fc 3e 0e 1b d6 72 68 c9 a1 c2 bd |..>Q..>...rh....| +peer1.org1.example.com | [feb 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385cf40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +orderer0.example.com | "2020-05-20 18:21:06.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ef Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000010 76 c3 28 1a aa e3 ea c8 4d a3 48 fc 36 1e b9 c4 |v.(.....M.H.6...| +peer1.org1.example.com | [fec 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385cf40 principal matched by identity 0 +peer1.org2.example.com | [e87 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 10f0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e2c 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 52 31 04 3a 1b d7 19 fc 70 89 0d |0D. wR1.:....p..| +peer1.org1.example.com | [fed 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | [e88 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +orderer0.example.com | "2020-05-20 18:21:06.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000010 9d 12 bb f6 36 6a 10 64 70 0a 13 09 17 a0 4c 59 |....6j.dp.....LY| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [e89 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +orderer0.example.com | "2020-05-20 18:21:06.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f2 Sending msg of 28 bytes to 3 on channel testchainid took 10.1µs" +peer0.org1.example.com | 00000020 dc b6 5e 86 02 20 26 e1 03 20 ff 73 d8 2f 98 62 |..^.. &.. .s./.b| +peer1.org1.example.com | [fee 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | [e8a 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e90 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +orderer0.example.com | "2020-05-20 18:21:06.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +peer0.org1.example.com | 00000030 4c 7f 54 09 f1 b5 a5 af 72 f1 12 93 62 d2 ce 45 |L.T.....r...b..E| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | [e8b 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816101B +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +orderer0.example.com | "2020-05-20 18:21:06.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f4 Sending msg of 28 bytes to 3 on channel businesschannel took 79.3µs" +peer0.org1.example.com | 00000040 66 8c 4b ea 8f 10 |f.K...| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Sign: digest: 0E50D86AA52428E9B074336B9214E133AE2BE1563AE539E8CF1470B8A33465BE +peer0.org2.example.com | [e91 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +orderer0.example.com | "2020-05-20 18:21:06.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f5 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +peer0.org1.example.com | [e20 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org2.example.com | [e8d 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +orderer0.example.com | "2020-05-20 18:21:06.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.6µs " +peer0.org1.example.com | [e2d 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org2.example.com | [e8e 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +orderer0.example.com | "2020-05-20 18:21:06.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.9µs " +peer0.org1.example.com | [e2e 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 gate 1589998813863951700 evaluation succeeds +peer1.org1.example.com | [fef 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e8f 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +orderer0.example.com | "2020-05-20 18:21:06.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e2f 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ff0 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e90 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +orderer0.example.com | "2020-05-20 18:21:06.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e30 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ff1 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e91 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [e92 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e31 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:07.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fa Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [ff2 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e92 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e93 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer0.org1.example.com | [e32 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:07.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fb Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +peer1.org1.example.com | [ff3 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e93 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e94 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | [e33 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:07.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.5µs " +peer1.org1.example.com | [ff4 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e95 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [e34 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-05-20 18:21:07.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fd Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +peer1.org1.example.com | [ff5 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [e94 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [e95 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | [e35 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:07.379 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1100 Sending msg of 28 bytes to 3 on channel businesschannel took 139.2µs" +peer1.org1.example.com | [ff6 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e96 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | [e36 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:07.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.1µs " +peer1.org1.example.com | [ff8 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385cf40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [e97 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | [e37 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:07.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ff Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [ff9 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385cf40 gate 1589998824186529200 evaluation succeeds +peer1.org2.example.com | [e98 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [e38 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:07.381 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1101 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 862.8µs " +peer1.org1.example.com | [ffa 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e99 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [e39 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:07.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1102 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [ffb 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e9a 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e96 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e3a 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:07.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1103 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [ffc 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [e9b 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [e97 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e3b 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:07.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1104 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer1.org1.example.com | [ffd 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e98 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e9c 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:07.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1105 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.8µs " +peer0.org1.example.com | [e3c 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ffe 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [e99 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e9e 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:07.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1106 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +peer0.org1.example.com | [e3d 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [e9a 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e9f 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:07.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1107 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.6µs " +peer0.org1.example.com | [e3e 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fff 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | [e9b 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ea0 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:07.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1108 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +peer0.org1.example.com | [e3f 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | [e9c 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ea2 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:07.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1109 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 482.9µs " +peer0.org1.example.com | [e40 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | [e9d 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [e9d 05-20 18:20:20.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:07.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e41 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | [e9e 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800b00 gate 1589998816254994500 evaluation starts +peer1.org2.example.com | [ea1 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:07.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e42 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [e9f 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800b00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ea3 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:08.360 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e43 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ff7 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ea0 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800b00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [ea4 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:08.360 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110d Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +peer0.org1.example.com | [e44 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1000 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [ea1 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [ea6 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:08.360 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.8µs " +peer0.org1.example.com | [e45 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1001 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ea2 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800b00 principal evaluation fails +peer1.org2.example.com | [ea5 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:08.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110f Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +peer0.org1.example.com | [e46 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1002 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ea3 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800b00 gate 1589998816254994500 evaluation fails +peer1.org2.example.com | [ea7 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-05-20 18:21:08.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +peer0.org1.example.com | [e47 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1003 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ea4 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ea8 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +orderer0.example.com | "2020-05-20 18:21:08.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +peer0.org1.example.com | [e48 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1004 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ea5 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +orderer0.example.com | "2020-05-20 18:21:08.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1112 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.2µs " +peer0.org1.example.com | [e49 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1005 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [ea6 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [ea9 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +orderer0.example.com | "2020-05-20 18:21:08.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1113 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e4a 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1006 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ea7 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003801070 gate 1589998816255994200 evaluation starts +peer1.org2.example.com | 00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +orderer0.example.com | "2020-05-20 18:21:08.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1114 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e4b 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ea8 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003801070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1007 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +orderer0.example.com | "2020-05-20 18:21:08.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1115 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e4c 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ea9 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003801070 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1008 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +orderer0.example.com | "2020-05-20 18:21:08.856 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1116 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +peer0.org1.example.com | [e4d 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eaa 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003801070 principal matched by identity 0 +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | 00000040 cd dc 6d 0d 94 00 0a |..m....| +orderer0.example.com | "2020-05-20 18:21:08.856 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1117 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " +peer0.org1.example.com | [e4e 05-20 18:20:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1009 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | [eab 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | [eaa 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:08.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1118 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" +peer0.org1.example.com | [e4f 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [eab 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:08.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 2 on channel businesschannel took 6.9µs" +peer0.org1.example.com | [e50 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | [eac 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | [eac 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:08.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69µs " +peer0.org1.example.com | [e51 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | [ead 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-05-20 18:21:08.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45µs " +peer0.org1.example.com | [e54 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | [eae 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +orderer0.example.com | "2020-05-20 18:21:08.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e52 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [100a 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +orderer0.example.com | "2020-05-20 18:21:08.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e56 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [100b 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [eaf 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +orderer0.example.com | "2020-05-20 18:21:09.363 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e53 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [100c 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ead 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003801070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +orderer0.example.com | "2020-05-20 18:21:09.363 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111f Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +peer0.org1.example.com | [e55 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +peer1.org1.example.com | [100d 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [eae 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003801070 gate 1589998816255994200 evaluation succeeds +peer1.org2.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer0.org1.example.com | [e57 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:09.363 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1120 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +peer1.org1.example.com | [100e 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [eaf 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer0.org1.example.com | [e58 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:09.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1121 Sending msg of 28 bytes to 2 on channel businesschannel took 35.7µs" +peer1.org1.example.com | [100f 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [eb0 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer0.org1.example.com | [e59 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:09.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +peer1.org1.example.com | [1010 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [eb1 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [eb0 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e5a 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:09.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1123 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95µs " +peer1.org1.example.com | [1011 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [eb2 05-20 18:20:16.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [eb1 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e5b 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +orderer0.example.com | "2020-05-20 18:21:09.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1124 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.5µs " +peer1.org1.example.com | [1012 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [eb3 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | [eb2 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +orderer0.example.com | "2020-05-20 18:21:09.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1125 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1013 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7d20 gate 1589998824286715800 evaluation starts +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [eb3 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e5c 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +orderer0.example.com | "2020-05-20 18:21:09.383 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1126 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1014 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7d20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [eb4 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | [eb4 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +orderer0.example.com | "2020-05-20 18:21:09.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1127 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:09.859 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1128 Sending msg of 28 bytes to 3 on channel testchainid took 44µs" +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | [eb5 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:09.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1129 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.6µs " +peer1.org1.example.com | [1015 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7d20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 112a Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +peer1.org2.example.com | [eb6 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1016 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7d20 principal matched by identity 0 +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +orderer0.example.com | "2020-05-20 18:21:09.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +peer1.org2.example.com | [eb7 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1017 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +orderer0.example.com | "2020-05-20 18:21:09.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 191µs " +peer1.org2.example.com | [eb8 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [eb5 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e5d 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:09.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 899.1µs " +peer1.org2.example.com | [eb9 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1018 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | [eb6 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +orderer0.example.com | "2020-05-20 18:21:09.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [eba 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | [eb7 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e5e 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:09.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [ebb 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | [eb8 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:10.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1130 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [ebc 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | [eb9 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:21:10.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1131 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +peer1.org2.example.com | [ebd 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [eba 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 8d 52 4b fb 09 41 90 69 e7 5a 74 0e 96 5d f4 |..RK..A.i.Zt..].| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:10.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1132 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +peer1.org2.example.com | [ebe 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e800 gate 1589998820933590700 evaluation starts +peer1.org1.example.com | [1019 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7d20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 9e 8c 8b df 40 24 60 77 c4 ff d0 ad 50 11 1d cc |....@$`w....P...| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | "2020-05-20 18:21:10.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1133 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +peer1.org2.example.com | [ebf 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e800 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [101a 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7d20 gate 1589998824286715800 evaluation succeeds +peer0.org2.example.com | [ebb 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df f2 af 30 d0 20 f4 8e bd 6f 7c |0E.!....0. ...o|| +orderer0.example.com | "2020-05-20 18:21:10.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 3 on channel businesschannel took 60.9µs" +peer0.org1.example.com | [e5f 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ec0 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e800 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [101b 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 fd 0c 8b 9e c7 57 4e bf ba 30 d4 d9 d6 6d f4 1e |.....WN..0...m..| +orderer0.example.com | "2020-05-20 18:21:10.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1135 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.2µs " +peer0.org1.example.com | [e60 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ec1 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [101c 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 10 d6 e6 2d 9c 02 20 16 33 b5 55 61 dd 94 d5 5b |...-.. .3.Ua...[| +orderer0.example.com | "2020-05-20 18:21:10.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.5µs " +peer0.org1.example.com | [e61 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ec2 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e800 principal evaluation fails +peer1.org1.example.com | [101d 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 bd 23 e1 ae 9f 77 2d 21 64 87 7c 49 86 41 ea c9 |.#...w-!d.|I.A..| +orderer0.example.com | "2020-05-20 18:21:10.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1137 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e62 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ec3 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e800 gate 1589998820933590700 evaluation fails +peer1.org1.example.com | [101e 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 aa 8f 1f f4 f5 62 90 |.....b.| +orderer0.example.com | "2020-05-20 18:21:10.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e63 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ec4 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [101f 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ebc 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:10.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e64 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ec5 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1020 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ebd 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:10.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113a Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +peer0.org1.example.com | [e65 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ec6 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1021 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ebe 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:10.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.5µs " +peer0.org1.example.com | [e66 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [ec7 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ed70 gate 1589998820939978600 evaluation starts +peer1.org1.example.com | [1022 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ebf 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +orderer0.example.com | "2020-05-20 18:21:10.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113c Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +peer0.org1.example.com | [e67 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 gate 1589998815661183000 evaluation starts +peer1.org2.example.com | [ec8 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ed70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ec0 05-20 18:20:16.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | [1023 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:10.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +peer0.org1.example.com | [e68 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ec9 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ed70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [ec1 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1024 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-05-20 18:21:10.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 494.6µs " +peer0.org1.example.com | [e69 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [eca 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ed70 principal matched by identity 0 +peer0.org2.example.com | [ec2 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1025 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 a1 cc b5 c8 8c 41 2b b3 71 e7 50 2c 0a 47 87 |b.....A+.q.P,.G.| +orderer0.example.com | "2020-05-20 18:21:10.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.7µs " +peer0.org1.example.com | [e6a 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 principal matched by identity 0 +peer1.org2.example.com | [ecb 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +peer0.org2.example.com | [ec3 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 44 e2 8f 24 8c b9 fe 7b 56 43 4a 74 2a 41 69 b2 |D..$...{VCJt*Ai.| +orderer0.example.com | "2020-05-20 18:21:10.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1140 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e6b 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +peer0.org2.example.com | [ec4 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1026 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b5 e9 19 d2 f1 2e 41 37 85 bc |0E.!........A7..| +orderer0.example.com | "2020-05-20 18:21:10.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [ecc 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +peer0.org2.example.com | [ec5 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 67 9e a8 7f d2 2e 02 23 07 43 11 de 1e 55 5a a8 |g......#.C...UZ.| +orderer0.example.com | "2020-05-20 18:21:10.937 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1142 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:53516 with txid 'd4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb' of type ENDORSER_TRANSACTION" +peer0.org1.example.com | [e6c 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +peer0.org2.example.com | [ec6 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 53 37 e1 65 f9 02 20 17 90 9c b1 9b 7e 0e 80 75 |S7.e.. .....~..u| +orderer0.example.com | "2020-05-20 18:21:10.938 UTC [policies] Evaluate -> DEBU 1143 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +peer0.org2.example.com | [ec7 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 5b 2a c6 eb a4 3d b1 c7 86 24 f4 a1 aa 07 40 9a |[*...=...$....@.| +orderer0.example.com | "2020-05-20 18:21:10.938 UTC [policies] Evaluate -> DEBU 1144 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org1.example.com | 00000040 0d c1 f7 02 15 f5 6f |......o| +orderer0.example.com | "2020-05-20 18:21:10.938 UTC [policies] Evaluate -> DEBU 1145 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org2.example.com | 00000040 3e f6 b8 de 27 73 |>...'s| +peer0.org2.example.com | [ec9 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [1027 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +orderer0.example.com | "2020-05-20 18:21:10.939 UTC [policies] Evaluate -> DEBU 1146 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [ecd 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ed70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [eca 05-20 18:20:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1028 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [e6d 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:10.939 UTC [policies] Evaluate -> DEBU 1147 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer1.org2.example.com | [ece 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ed70 gate 1589998820939978600 evaluation succeeds +peer0.org2.example.com | [ecb 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1029 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [e6e 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 gate 1589998815661183000 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:10.939 UTC [msp] DeserializeIdentity -> DEBU 1148 Obtaining identity" +peer1.org2.example.com | [ecf 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ecc 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [102a 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e6f 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:10.940 UTC [msp.identity] newIdentity -> DEBU 1149 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [ed0 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ecd 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [102b 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [e70 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [ed1 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [102c 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ece 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [e71 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [ed2 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [102d 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ecf 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e72 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [ed3 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [102e 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ed0 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [ed4 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [102f 05-20 18:20:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ed1 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e73 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [1030 05-20 18:20:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ed5 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [ed2 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e74 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | [1031 05-20 18:20:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ed6 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [ed3 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [e75 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | [1033 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [ed7 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [ed4 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [e76 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | [1034 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ed8 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ed5 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [e77 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [1035 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ed9 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ed6 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381ee90 gate 1589998816329954400 evaluation starts +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | [e78 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1036 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eda 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [ed7 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381ee90 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | [e79 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1037 05-20 18:20:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [edb 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ed8 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381ee90 processing identity 0 with bytes of 115a110 +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | [e7a 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1038 05-20 18:20:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [edc 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ed9 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381ee90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [e7b 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1039 05-20 18:20:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [edd 05-20 18:20:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [eda 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381ee90 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:10.941 UTC [cauthdsl] func1 -> DEBU 114a 0xc000ff66b0 gate 1589998870941195800 evaluation starts" +peer0.org1.example.com | [e7c 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1032 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [ede 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [edb 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381ee90 gate 1589998816329954400 evaluation fails +orderer0.example.com | "2020-05-20 18:21:10.941 UTC [cauthdsl] func2 -> DEBU 114b 0xc000ff66b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [e7d 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [103a 05-20 18:20:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ee0 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [edc 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:10.941 UTC [cauthdsl] func2 -> DEBU 114c 0xc000ff66b0 processing identity 0 with bytes of fe0d40" +peer0.org1.example.com | [e7e 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 gate 1589998815673355400 evaluation starts +peer1.org1.example.com | [103b 05-20 18:20:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [ee1 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +peer0.org2.example.com | [edd 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:10.942 UTC [cauthdsl] func2 -> DEBU 114d 0xc000ff66b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +peer0.org1.example.com | [e7f 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [103c 05-20 18:20:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +peer0.org2.example.com | [ede 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:10.942 UTC [cauthdsl] func2 -> DEBU 114e 0xc000ff66b0 principal evaluation fails" +peer0.org1.example.com | [e80 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [103d 05-20 18:20:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [ee2 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [edf 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381f400 gate 1589998816331854700 evaluation starts +orderer0.example.com | "2020-05-20 18:21:10.942 UTC [cauthdsl] func1 -> DEBU 114f 0xc000ff66b0 gate 1589998870941195800 evaluation fails" +peer0.org1.example.com | [e81 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 principal matched by identity 0 +peer1.org1.example.com | [103e 05-20 18:20:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [edf 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ee0 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381f400 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:10.942 UTC [policies] Evaluate -> DEBU 1150 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | [e82 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | [103f 05-20 18:20:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [ee4 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ee1 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381f400 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:10.942 UTC [policies] Evaluate -> DEBU 1151 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1040 05-20 18:20:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ee5 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [ee2 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381f400 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:10.943 UTC [policies] func1 -> DEBU 1152 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +peer0.org1.example.com | [e83 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | [1041 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [ee3 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +peer0.org2.example.com | [ee3 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +orderer0.example.com | "2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1153 Signature set did not satisfy policy /Channel/Orderer/Writers" +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | [1042 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +peer0.org2.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +orderer0.example.com | "2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1154 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +peer0.org2.example.com | [ee4 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +orderer0.example.com | "2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1155 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org1.example.com | [1044 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +peer0.org2.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +orderer0.example.com | "2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1156 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org1.example.com | [1045 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000040 cd dc 6d 0d 94 00 0a |..m....| +peer0.org2.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +orderer0.example.com | "2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1157 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | [e84 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1046 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816101E +peer1.org2.example.com | [ee6 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\366\270\336's" > alive: alive: +peer0.org2.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +orderer0.example.com | "2020-05-20 18:21:10.944 UTC [cauthdsl] func1 -> DEBU 1158 0xc000ff7d20 gate 1589998870944261900 evaluation starts" +peer0.org1.example.com | [e85 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 gate 1589998815673355400 evaluation succeeds +peer1.org1.example.com | [1047 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DEEB2F699EB5252AF7F91510C7A049884D606344F033D656696C9965A3C14839 +peer1.org2.example.com | [ee7 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +orderer0.example.com | "2020-05-20 18:21:10.944 UTC [cauthdsl] func2 -> DEBU 1159 0xc000ff7d20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [e86 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1048 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [ee5 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381f400 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:10.944 UTC [cauthdsl] func2 -> DEBU 115a 0xc000ff7d20 processing identity 0 with bytes of fe0d40" +peer0.org1.example.com | [e87 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1049 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [ee8 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 8b 73 e5 df dc d8 cc 72 79 46 |0E.!...s.....ryF| +peer0.org2.example.com | [ee6 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381f400 gate 1589998816331854700 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:10.945 UTC [cauthdsl] func2 -> DEBU 115b 0xc000ff7d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | [e88 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [104a 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | 00000010 50 68 aa 76 57 52 8b 28 67 59 fa c0 cf 65 ae ae |Ph.vWR.(gY...e..| +peer0.org2.example.com | [ee7 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:10.945 UTC [cauthdsl] func2 -> DEBU 115c 0xc000ff7d20 principal evaluation fails" +peer0.org1.example.com | [e89 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [104b 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 26 57 92 dd 79 02 20 0b 5f a8 9d 0b 1a 77 ed c0 |&W..y. ._....w..| +peer0.org2.example.com | [ee8 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:10.945 UTC [cauthdsl] func1 -> DEBU 115d 0xc000ff7d20 gate 1589998870944261900 evaluation fails" +peer0.org1.example.com | [e8a 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [104c 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 f2 6a ea 8e c7 e9 0f 3a ac e2 87 f8 ce 48 07 23 |.j.....:.....H.#| +peer0.org2.example.com | [ee9 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:10.945 UTC [policies] Evaluate -> DEBU 115e Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | [e8b 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000040 59 07 81 50 dd db fe |Y..P...| +peer0.org2.example.com | [eea 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:10.945 UTC [policies] Evaluate -> DEBU 115f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | [e8c 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [104d 05-20 18:20:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [eeb 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:10.945 UTC [policies] Evaluate -> DEBU 1160 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | [e8d 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ee9 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [104e 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eec 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-05-20 18:21:10.946 UTC [cauthdsl] func1 -> DEBU 1161 0xc001010580 gate 1589998870945941300 evaluation starts" +peer0.org1.example.com | [e8e 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [eea 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [104f 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [eed 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:10.946 UTC [cauthdsl] func2 -> DEBU 1162 0xc001010580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [e8f 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [eeb 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1050 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:10.946 UTC [cauthdsl] func2 -> DEBU 1163 0xc001010580 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [eee 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e90 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [eec 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1051 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:10.946 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1164 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org2.example.com | [eef 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [e91 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [eed 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1052 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:10.946 UTC [msp] Validate -> DEBU 1165 MSP Org1MSP validating identity" +peer0.org2.example.com | [ef0 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e92 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [eee 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +orderer0.example.com | "2020-05-20 18:21:10.947 UTC [msp] getCertificationChain -> DEBU 1166 MSP Org1MSP getting certification chain" +peer0.org2.example.com | [ef1 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e93 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | [eef 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1053 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:10.948 UTC [cauthdsl] func2 -> DEBU 1167 0xc001010580 principal matched by identity 0" +peer0.org2.example.com | [ef2 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e94 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org2.example.com | [ef0 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:10.948 UTC [msp.identity] Verify -> DEBU 1168 Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer0.org2.example.com | [ef3 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [e95 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [ef1 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..|" +peer0.org2.example.com | [ef4 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e96 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610041801 +peer1.org2.example.com | [ef2 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:10.948 UTC [msp.identity] Verify -> DEBU 1169 Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer0.org2.example.com | [ef5 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e97 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A2297637CCBEE250C4EA080F319D3AE9AA7EB27F36B167424098AFD1555A0DBA +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [ef3 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer0.org2.example.com | [ef6 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e98 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org1.example.com | [1054 05-20 18:20:24.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ef4 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer0.org2.example.com | [ef7 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [e99 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1055 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ef5 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer0.org2.example.com | [ef8 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [e9a 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1056 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [ef6 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000040 cf eb d4 a9 50 ef |....P.|" +peer0.org2.example.com | [ef9 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e9b 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1059 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ef7 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:10.949 UTC [cauthdsl] func2 -> DEBU 116a 0xc001010580 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [efa 05-20 18:20:16.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [e9c 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [105a 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [ef8 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:10.949 UTC [cauthdsl] func1 -> DEBU 116b 0xc001010580 gate 1589998870945941300 evaluation succeeds" +peer0.org2.example.com | [efb 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e9d 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [105b 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ef9 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781780 gate 1589998820966230500 evaluation starts +orderer0.example.com | "2020-05-20 18:21:10.949 UTC [policies] Evaluate -> DEBU 116c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [efc 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e9e 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1057 05-20 18:20:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [efa 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781780 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:10.950 UTC [policies] Evaluate -> DEBU 116d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [efd 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e9f 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [105c 05-20 18:20:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [efb 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781780 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:10.950 UTC [policies] Evaluate -> DEBU 116e Signature set satisfies policy /Channel/Application/Writers" +peer0.org2.example.com | [efe 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ea0 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [105d 05-20 18:20:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [efc 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-05-20 18:21:10.950 UTC [policies] Evaluate -> DEBU 116f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org2.example.com | [eff 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [ea1 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [105e 05-20 18:20:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [efd 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781780 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:10.950 UTC [policies] Evaluate -> DEBU 1170 Signature set satisfies policy /Channel/Writers" +peer0.org2.example.com | [f00 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [ea2 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | [1058 05-20 18:20:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [efe 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781780 gate 1589998820966230500 evaluation fails +orderer0.example.com | "2020-05-20 18:21:10.951 UTC [policies] Evaluate -> DEBU 1171 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org2.example.com | [f01 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [105f 05-20 18:20:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [eff 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:10.951 UTC [orderer.common.blockcutter] Ordered -> DEBU 1172 Enqueuing message into batch" +peer0.org2.example.com | [f02 05-20 18:20:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ea3 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [1060 05-20 18:20:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [f00 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:10.951 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1173 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:53516" +peer0.org2.example.com | [f03 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [f01 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:10.956 UTC [grpc] warningf -> DEBU 1174 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:53516: read: connection reset by peer" +peer0.org2.example.com | [f04 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1061 05-20 18:20:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | [f02 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781cf0 gate 1589998820966897500 evaluation starts +orderer0.example.com | "2020-05-20 18:21:10.956 UTC [grpc] infof -> DEBU 1175 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [f05 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | [f03 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781cf0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:10.957 UTC [orderer.common.broadcast] Handle -> WARN 1176 Error reading from 172.18.0.9:53516: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [f06 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [f04 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781cf0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:10.957 UTC [orderer.common.server] func1 -> DEBU 1177 Closing Broadcast stream" +peer0.org2.example.com | [f07 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | [ea4 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [f05 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781cf0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:10.959 UTC [comm.grpc.server] 1 -> INFO 1178 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53516 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.4863661s +peer0.org2.example.com | [f08 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [f06 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +orderer0.example.com | "2020-05-20 18:21:11.361 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1179 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [f0a 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1062 05-20 18:20:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ea5 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +orderer0.example.com | "2020-05-20 18:21:11.363 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +peer0.org2.example.com | [f0c 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1063 05-20 18:20:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | [f07 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +orderer0.example.com | "2020-05-20 18:21:11.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.2µs " +peer0.org2.example.com | [f0b 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1064 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +orderer0.example.com | "2020-05-20 18:21:11.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117c Sending msg of 28 bytes to 2 on channel businesschannel took 86.9µs" +peer0.org2.example.com | [f09 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1065 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +orderer0.example.com | "2020-05-20 18:21:11.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117d Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +peer0.org2.example.com | [f0d 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1066 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +orderer0.example.com | "2020-05-20 18:21:11.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.8µs " +peer0.org2.example.com | [f0e 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1067 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ea6 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +orderer0.example.com | "2020-05-20 18:21:11.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 374.2µs " +peer0.org2.example.com | [f0f 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1068 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ea7 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 04 bf a2 07 40 7b |....@{| +orderer0.example.com | "2020-05-20 18:21:11.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1180 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1069 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f10 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [ea8 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f08 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781cf0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:11.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1181 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [106a 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f11 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ea9 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f09 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003781cf0 gate 1589998820966897500 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:11.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1182 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" +peer1.org1.example.com | [106b 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [106c 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [eaa 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f0a 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:11.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1183 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +peer1.org1.example.com | [106d 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abf2f0 gate 1589998824547791500 evaluation starts +peer0.org1.example.com | [eab 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f12 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [f13 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [106e 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abf2f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [eac 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:11.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1184 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 289.2µs " +peer1.org2.example.com | [f0b 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f14 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [106f 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abf2f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [ead 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:11.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1185 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 292µs " +peer1.org2.example.com | [f0c 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f15 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1070 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abf2f0 principal matched by identity 0 +peer0.org1.example.com | [eae 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 gate 1589998815715185900 evaluation starts +orderer0.example.com | "2020-05-20 18:21:11.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1186 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [f0d 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f16 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1071 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | [eaf 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:11.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1187 Sending msg of 28 bytes to 3 on channel testchainid took 11.5µs" +peer1.org2.example.com | [f0e 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [f17 05-20 18:20:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [eb0 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:11.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1188 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.7µs " +peer1.org1.example.com | [1072 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [eb1 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 principal matched by identity 0 +peer0.org1.example.com | [eb2 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | [f0f 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f10 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [f18 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1073 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [f11 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +peer0.org2.example.com | [f19 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161017 +peer0.org2.example.com | [f1a 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC5C2A7B585FF881E22110EB5CB677DB5D7B1EE72E058216517235155EF07394 +peer0.org1.example.com | [eb3 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +peer0.org2.example.com | [f1b 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +orderer0.example.com | "2020-05-20 18:21:11.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1189 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | [f12 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +peer0.org2.example.com | [f1c 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +orderer0.example.com | "2020-05-20 18:21:11.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [f1d 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +orderer0.example.com | "2020-05-20 18:21:12.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1074 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abf2f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +peer0.org2.example.com | [f1e 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +orderer0.example.com | "2020-05-20 18:21:12.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118c Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +peer1.org1.example.com | [1075 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abf2f0 gate 1589998824547791500 evaluation succeeds +peer1.org2.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer0.org2.example.com | [f1f 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [eb4 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:12.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +peer1.org1.example.com | [1076 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f20 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer0.org1.example.com | [eb5 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 gate 1589998815715185900 evaluation succeeds +peer0.org1.example.com | [eb6 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [eb7 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f21 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer0.org1.example.com | [eb8 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:12.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118e Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +peer0.org2.example.com | [f22 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1077 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f13 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [eb9 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:12.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1190 Sending msg of 28 bytes to 2 on channel businesschannel took 49.6µs" +peer0.org2.example.com | [f23 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1078 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [f14 05-20 18:20:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eba 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:12.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.9µs " +peer0.org2.example.com | [f24 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1079 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [f15 05-20 18:20:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [ebb 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:12.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1191 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.8µs " +peer1.org1.example.com | [107a 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f16 05-20 18:20:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +peer0.org1.example.com | [ebc 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:12.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1192 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [107b 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f25 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +peer0.org1.example.com | [ebd 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:12.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1193 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [f26 05-20 18:20:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [107c 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f17 05-20 18:20:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +peer0.org1.example.com | [ebe 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:12.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [f27 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [f28 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [107d 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:12.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1195 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +peer0.org2.example.com | [f29 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [107e 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:12.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1196 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +peer0.org1.example.com | [ebf 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +peer0.org2.example.com | [f2a 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [107f 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:12.878 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1197 Sending msg of 28 bytes to 2 on channel businesschannel took 120.9µs" +peer0.org1.example.com | [ec0 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +peer0.org2.example.com | [f2b 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1080 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:12.878 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1198 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +peer0.org1.example.com | [ec1 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +peer0.org2.example.com | [f2c 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1081 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:12.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1199 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.2µs " +peer0.org1.example.com | [ec2 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000040 cd dc 6d 0d 94 00 0a |..m....| +peer0.org2.example.com | [f2d 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1082 05-20 18:20:24.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:12.879 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.4µs " +peer0.org1.example.com | [ec3 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f18 05-20 18:20:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [f2e 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1083 05-20 18:20:24.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298550 gate 1589998824618374000 evaluation starts +peer0.org1.example.com | [ec4 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:12.881 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f19 05-20 18:20:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [f2f 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1084 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298550 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ec5 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 gate 1589998815720329000 evaluation starts +orderer0.example.com | "2020-05-20 18:21:12.882 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f1a 05-20 18:20:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f1b 05-20 18:20:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1085 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298550 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [ec6 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:12.953 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 119d Batch timer expired, creating block" channel=businesschannel node=1 +peer1.org2.example.com | [f1c 05-20 18:20:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer0.org2.example.com | [f30 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1086 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298550 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:12.953 UTC [orderer.consensus.etcdraft] propose -> INFO 119e Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +peer1.org2.example.com | [f1d 05-20 18:20:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer0.org2.example.com | [f31 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1087 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | [ec7 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:12.954 UTC [orderer.consensus.etcdraft] 2 -> DEBU 119f Proposed block [3] to raft consensus" channel=businesschannel node=1 +peer1.org2.example.com | [f1e 05-20 18:20:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [f32 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [ec8 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:12.958 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a0 Send of ConsensusRequest for channel businesschannel with payload of size 3647 to orderer1.example.com(orderer1.example.com:7050) took 123.1µs " +peer1.org2.example.com | [f1f 05-20 18:20:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610051801 +peer0.org2.example.com | [f33 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1088 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | [ec9 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +orderer0.example.com | "2020-05-20 18:21:12.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a1 Sending msg of 3647 bytes to 2 on channel businesschannel took 43.3µs" +peer1.org2.example.com | [f20 05-20 18:20:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CCB5CA95D3876CF7B282C7778F14CCFEA210770B1DF66C4C5816E43DB9F79F1C +peer0.org2.example.com | [f34 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +orderer0.example.com | "2020-05-20 18:21:12.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a2 Send of ConsensusRequest for channel businesschannel with payload of size 3647 to orderer2.example.com(orderer2.example.com:7050) took 166.1µs " +peer1.org2.example.com | [f21 05-20 18:20:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org2.example.com | [f35 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e990 gate 1589998816690904800 evaluation starts +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +orderer0.example.com | "2020-05-20 18:21:12.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f22 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f36 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e990 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +orderer0.example.com | "2020-05-20 18:21:12.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a4 Sending msg of 3647 bytes to 3 on channel businesschannel took 3.2866ms" +peer1.org2.example.com | [f23 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f37 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e990 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +orderer0.example.com | "2020-05-20 18:21:12.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f24 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f38 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1089 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298550 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +orderer0.example.com | "2020-05-20 18:21:12.967 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a6 Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +peer1.org2.example.com | [f25 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f39 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e990 principal evaluation fails +peer1.org1.example.com | [108a 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298550 gate 1589998824618374000 evaluation succeeds +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +orderer0.example.com | "2020-05-20 18:21:12.968 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a9 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +peer1.org2.example.com | [f26 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [f3a 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388e990 gate 1589998816690904800 evaluation fails +orderer0.example.com | "2020-05-20 18:21:12.968 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 270.6µs " +peer1.org1.example.com | [108b 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:12.967 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 11a7 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +peer1.org2.example.com | [f27 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ecb 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f3b 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [108c 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:12.968 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 11ab [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +peer1.org2.example.com | [f28 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ecc 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 gate 1589998815720329000 evaluation succeeds +peer0.org2.example.com | [f3c 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [108d 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:12.968 UTC [msp] GetDefaultSigningIdentity -> DEBU 11ac Obtaining default signing identity" +peer1.org2.example.com | [f29 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [ecd 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f3d 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [108e 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:12.969 UTC [msp] GetDefaultSigningIdentity -> DEBU 11ad Obtaining default signing identity" +peer1.org2.example.com | [f2a 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ece 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f3e 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ef00 gate 1589998816693603200 evaluation starts +peer1.org1.example.com | [108f 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:12.969 UTC [msp.identity] Sign -> DEBU 11ae Sign: plaintext: 0A020802120B0A090A03010203100418...2D28A0829A0E49AFEA8F8402854E7ABE " +peer1.org2.example.com | [f2b 05-20 18:20:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ecf 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f3f 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ef00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1090 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:12.970 UTC [msp.identity] Sign -> DEBU 11af Sign: digest: 6C1B423BB90D53735B1923F0702F95DE248BE9D3FAD627EACC57A14C3A9CD61F " +peer1.org2.example.com | [f2c 05-20 18:20:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ed0 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f40 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ef00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1091 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:12.967 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.6µs " +peer1.org2.example.com | [f2d 05-20 18:20:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ed1 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [f41 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ef00 principal matched by identity 0 +peer1.org1.example.com | [1092 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:12.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f2e 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [f42 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer0.org2.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +orderer0.example.com | "2020-05-20 18:21:12.976 UTC [fsblkstorage] indexBlock -> DEBU 11b1 Indexing block [blockNum=3, blockHash=[]byte{0xe4, 0xd0, 0x6e, 0x11, 0x83, 0x40, 0x38, 0x1c, 0x2a, 0x25, 0xb9, 0x5b, 0xef, 0x40, 0xdf, 0xab, 0x76, 0x31, 0x92, 0x2e, 0xb6, 0x6d, 0xd2, 0x76, 0xed, 0x67, 0x48, 0xc4, 0x26, 0xd8, 0xcb, 0xd9} txOffsets= +peer1.org2.example.com | [f2f 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ed2 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | [f43 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer1.org1.example.com | [1093 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | txId=d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb locPointer=offset=70, bytesLength=3519 +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | [f30 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer1.org1.example.com | [1094 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | ]" +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | [f31 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1095 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +orderer0.example.com | "2020-05-20 18:21:12.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | [f32 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1096 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +orderer0.example.com | "2020-05-20 18:21:12.990 UTC [fsblkstorage] updateCheckpoint -> DEBU 11b3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89369], isChainEmpty=[false], lastBlockNumber=[3]" +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [f33 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1097 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +orderer0.example.com | "2020-05-20 18:21:12.991 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 11b4 [channel: businesschannel] Wrote block [3]" +peer0.org1.example.com | [ed3 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f34 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f35 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1098 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:13.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [ed4 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f36 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9020 gate 1589998823479834600 evaluation starts +peer1.org2.example.com | [f37 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f44 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ef00 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:13.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b6 Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" +peer0.org1.example.com | [ed5 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f38 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9020 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [f45 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ef00 gate 1589998816693603200 evaluation succeeds +peer1.org1.example.com | [1099 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:13.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.7µs " +peer0.org1.example.com | [ed6 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f39 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f46 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [109a 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:13.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b8 Sending msg of 28 bytes to 2 on channel businesschannel took 59.5µs" +peer0.org1.example.com | [ed7 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f3a 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9020 principal evaluation fails +peer0.org2.example.com | [f47 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [109b 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:13.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bb Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +peer0.org1.example.com | [ed8 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [f3b 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9020 gate 1589998823479834600 evaluation fails +peer0.org2.example.com | [f48 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [109c 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:13.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 315.7µs " +peer0.org1.example.com | [ed9 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f3c 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f49 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [109d 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:13.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ba Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [eda 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [f3d 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f4a 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [109e 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:13.379 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0693ms " +peer0.org1.example.com | [edb 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 gate 1589998815730229700 evaluation starts +peer1.org2.example.com | [f3e 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [f3f 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9590 gate 1589998823487801000 evaluation starts +peer1.org2.example.com | [f40 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9590 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f4b 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [edc 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f41 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9590 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [f42 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9590 principal matched by identity 0 +peer1.org2.example.com | [f43 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 00 5f 18 f5 59 2c 41 d7 46 ee 2f 9a ce 91 32 |.._..Y,A.F./...2| +peer0.org2.example.com | [f4c 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [edd 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | 00000010 bf 29 0d 8e d2 19 56 25 42 28 0d 9f af 6f 8f dc |.)....V%B(...o..| +peer0.org2.example.com | [f4d 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +peer1.org1.example.com | [109f 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:13.381 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11bd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [ede 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 principal matched by identity 0 +peer1.org2.example.com | [f44 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a be 29 8d 7c e9 5f e9 a0 cf 6f bc |0D. ..).|._...o.| +peer0.org2.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +peer1.org1.example.com | [10a0 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:13.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11be Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [edf 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 f6 99 4f 15 64 5e e7 8d 70 8a c3 af 5b 07 7c d7 |..O.d^..p...[.|.| +peer0.org2.example.com | [f4e 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer1.org1.example.com | [10a1 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:13.859 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bf Sending msg of 28 bytes to 3 on channel testchainid took 41.2µs" +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | 00000020 df fb c1 36 02 20 23 c2 cd b7 41 35 e6 56 0b f5 |...6. #...A5.V..| +peer0.org2.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +peer1.org1.example.com | [10a2 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:13.860 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 844.9µs " +peer0.org1.example.com | [ee0 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000030 4c 92 96 49 83 d6 22 f4 1c 92 30 93 21 79 36 f7 |L..I.."...0.!y6.| +peer0.org2.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer1.org1.example.com | [10a3 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:13.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c1 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000040 f1 f0 7c 36 56 64 |..|6Vd| +peer0.org2.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:13.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c2 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +peer1.org2.example.com | [f45 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9590 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f4f 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10a5 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 11c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.9µs " +orderer0.example.com | "2020-05-20 18:21:13.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 225.6µs " +orderer0.example.com | "2020-05-20 18:21:13.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [10a6 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:13.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:14.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:14.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c8 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" +orderer0.example.com | "2020-05-20 18:21:14.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 306.2µs " +orderer0.example.com | "2020-05-20 18:21:14.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ca Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2020-05-20 18:21:14.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cb Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2020-05-20 18:21:14.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.1µs " +orderer0.example.com | "2020-05-20 18:21:14.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 513.3µs " +orderer0.example.com | "2020-05-20 18:21:14.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ce Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:14.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11cf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:14.532 UTC [orderer.common.server] Broadcast -> DEBU 11d0 Starting new Broadcast handler" +peer1.org1.example.com | [10a8 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org1.example.com | [ee1 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ee2 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 gate 1589998815730229700 evaluation succeeds +peer0.org1.example.com | [ee3 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ee4 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ee5 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ee6 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ee7 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f50 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:14.534 UTC [orderer.common.broadcast] Handle -> DEBU 11d1 Starting new broadcast loop for 172.18.0.9:53552" +peer1.org1.example.com | [10a7 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [10a9 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ee8 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [f46 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b9590 gate 1589998823487801000 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:14.547 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 11d2 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:53552 with txid '523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb' of type ENDORSER_TRANSACTION" +peer1.org1.example.com | [10aa 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ee9 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [f51 05-20 18:20:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f47 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:14.547 UTC [policies] Evaluate -> DEBU 11d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer1.org1.example.com | [10ab 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eea 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f52 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f48 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:14.548 UTC [policies] Evaluate -> DEBU 11d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [10ac 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eeb 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f54 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [f49 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:14.548 UTC [policies] Evaluate -> DEBU 11d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer1.org1.example.com | [10ad 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [eec 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f53 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f4a 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:14.548 UTC [policies] Evaluate -> DEBU 11d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [10ae 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [eed 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f55 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [f4b 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:14.548 UTC [policies] Evaluate -> DEBU 11d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer1.org2.example.com | [f4c 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [f4d 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [f4e 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [f4f 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [eee 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10af 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f50 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eef 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ef0 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [ef1 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [ef2 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [ef3 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [ef4 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ef5 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ef6 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ef7 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.548 UTC [cauthdsl] func1 -> DEBU 11d8 0xc0010a3c40 gate 1589998874548778400 evaluation starts" +peer1.org1.example.com | [10b1 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [f51 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ef8 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f56 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +orderer0.example.com | "2020-05-20 18:21:14.548 UTC [cauthdsl] func2 -> DEBU 11d9 0xc0010a3c40 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [10b0 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [f52 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10b2 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b3 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +orderer0.example.com | "2020-05-20 18:21:14.549 UTC [cauthdsl] func2 -> DEBU 11da 0xc0010a3c40 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [f53 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ef9 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f57 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer1.org2.example.com | [f54 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [efa 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10b4 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b5 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer1.org1.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +orderer0.example.com | "2020-05-20 18:21:14.549 UTC [cauthdsl] func2 -> DEBU 11db 0xc0010a3c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +peer0.org1.example.com | [efb 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b6 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +orderer0.example.com | "2020-05-20 18:21:14.549 UTC [cauthdsl] func2 -> DEBU 11dc 0xc0010a3c40 principal evaluation fails" +peer0.org2.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +peer0.org2.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer1.org2.example.com | [f55 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f56 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:14.549 UTC [cauthdsl] func1 -> DEBU 11dd 0xc0010a3c40 gate 1589998874548778400 evaluation fails" +peer0.org2.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [efc 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:14.549 UTC [policies] Evaluate -> DEBU 11de Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer0.org2.example.com | 00000040 a2 c9 8c 9e 3a 08 39 |....:.9| +peer0.org2.example.com | [f58 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [f59 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [f5a 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [f5b 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [efd 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:14.549 UTC [policies] Evaluate -> DEBU 11df == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:14.550 UTC [policies] func1 -> DEBU 11e0 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e1 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer1.org1.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer1.org2.example.com | [f58 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [efe 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [f5c 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +orderer0.example.com | "2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [f59 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eff 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f5d 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +orderer0.example.com | "2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer1.org2.example.com | [f5a 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f00 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [f5e 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b7 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:14.551 UTC [cauthdsl] func1 -> DEBU 11e6 0xc0010ee930 gate 1589998874550979200 evaluation starts" +peer1.org2.example.com | [f5b 05-20 18:20:23.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f01 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [f5f 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [10b8 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:14.551 UTC [cauthdsl] func2 -> DEBU 11e7 0xc0010ee930 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [f5c 05-20 18:20:23.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f02 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f60 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +peer1.org1.example.com | [10b9 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:14.551 UTC [cauthdsl] func2 -> DEBU 11e8 0xc0010ee930 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [f5d 05-20 18:20:23.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f03 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +peer1.org1.example.com | [10ba 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:14.551 UTC [cauthdsl] func2 -> DEBU 11e9 0xc0010ee930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer1.org2.example.com | [f5e 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [f04 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [f05 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer0.org1.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +peer0.org1.example.com | [f06 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer0.org1.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer0.org2.example.com | [f61 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer0.org1.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +peer0.org2.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +orderer0.example.com | "2020-05-20 18:21:14.551 UTC [cauthdsl] func2 -> DEBU 11ea 0xc0010ee930 principal evaluation fails" +peer1.org1.example.com | [10bb 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +peer1.org2.example.com | [f5f 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer0.org2.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU 11eb 0xc0010ee930 gate 1589998874550979200 evaluation fails" +peer0.org1.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +peer1.org2.example.com | [f60 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000040 a2 c9 8c 9e 3a 08 39 |....:.9| +orderer0.example.com | "2020-05-20 18:21:14.551 UTC [policies] Evaluate -> DEBU 11ec Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer1.org1.example.com | [10bc 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f07 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [f61 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:14.552 UTC [policies] Evaluate -> DEBU 11ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | [f62 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [f62 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [10bd 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [10be 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:14.552 UTC [policies] Evaluate -> DEBU 11ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | [f08 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 93 09 64 9b 02 aa 2e 75 97 e8 |0E.!....d....u..| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [10bf 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.552 UTC [cauthdsl] func1 -> DEBU 11ef 0xc0010ef170 gate 1589998874552576000 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:14.552 UTC [cauthdsl] func2 -> DEBU 11f0 0xc0010ef170 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [f64 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f63 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 3f c9 83 f1 61 38 5c ed 92 bf 03 |0D. .?...a8\....| +peer1.org1.example.com | [10c0 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.552 UTC [cauthdsl] func2 -> DEBU 11f1 0xc0010ef170 processing identity 0 with bytes of fe0d40" +peer0.org1.example.com | 00000010 86 92 b5 1a 44 78 da e7 71 43 ae 86 74 36 9b 2c |....Dx..qC..t6.,| +peer1.org2.example.com | [f63 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 11 9a 70 a5 41 01 cc ff 6e d3 40 ce 14 6a aa b6 |..p.A...n.@..j..| +peer1.org1.example.com | [10c1 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.552 UTC [cauthdsl] func2 -> DEBU 11f2 0xc0010ef170 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:14.553 UTC [msp.identity] Verify -> DEBU 11f3 Verify: digest = 00000000 9a 7e c4 71 ef b0 20 ae cd 05 10 be 77 ae f6 68 |.~.q.. .....w..h| +orderer0.example.com | 00000010 4b 20 de 34 61 55 df 2a 9b 70 6c 05 f8 d9 58 f1 |K .4aU.*.pl...X.|" +peer1.org2.example.com | [f65 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [10c2 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f66 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 ae 42 06 4f 06 02 20 27 6c f7 04 85 ca ac 49 66 |.B.O.. 'l.....If| +peer0.org2.example.com | 00000020 d1 5f dd 40 02 20 24 66 02 91 9a 91 1b 93 a9 8f |._.@. $f........| +peer1.org1.example.com | [10c3 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.553 UTC [msp.identity] Verify -> DEBU 11f4 Verify: sig = 00000000 30 45 02 21 00 e9 f1 17 4c a9 a9 d6 1e 50 a5 18 |0E.!....L....P..| +peer1.org2.example.com | [f67 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 ef b4 b8 38 6c 91 9d ee f9 12 0d 10 32 9b b5 06 |...8l.......2...| +peer0.org1.example.com | 00000040 82 04 ee 03 6f f8 bb |....o..| +peer0.org2.example.com | 00000030 ca c2 65 b8 6c 81 c7 ff 27 19 65 61 4a 77 2e c8 |..e.l...'.eaJw..| +peer1.org1.example.com | [10c4 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 e7 94 ff 3a 5b 3e 7f 2a d7 2f 47 85 a5 2a e8 5a |...:[>.*./G..*.Z| +peer1.org2.example.com | [f68 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [f09 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [f0a 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [f0b 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [f0c 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [f69 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f0d 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [10c5 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [10c6 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | 00000040 64 a6 94 77 27 55 |d..w'U| +peer1.org2.example.com | [f6a 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f6b 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f6c 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f6d 05-20 18:20:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f6e 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f6f 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f70 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [f0e 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f71 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f0f 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 8a 68 49 69 f0 02 20 3c f9 13 4b 83 24 18 9c c7 |.hIi.. <..K.$...| +peer1.org1.example.com | [10c7 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f64 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [f72 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [10c8 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [f73 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [f74 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 9f 80 de 10 a7 9b ce a7 85 4d 51 12 0e cc 19 |..........MQ....| +peer0.org2.example.com | [f65 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | 00000030 06 c2 76 90 44 10 43 e8 4b 7a ea 74 b6 08 d1 7e |..v.D.C.Kz.t...~| +peer0.org1.example.com | [f10 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 fc 82 40 99 b5 4c 4e 13 d3 1e 58 a6 c3 aa 13 8f |..@..LN...X.....| +peer1.org1.example.com | [10c9 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer0.org2.example.com | [f66 05-20 18:20:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 9d 56 77 6a 8e 23 e5 |.Vwj.#.|" +peer0.org1.example.com | [f11 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [f75 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 f6 29 b1 8b ce 2d df d5 62 e8 72 |0D. E.)...-..b.r| +peer1.org1.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +peer0.org2.example.com | [f67 05-20 18:20:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:14.553 UTC [cauthdsl] func2 -> DEBU 11f5 0xc0010ef170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [f12 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 74 0a d5 8d a8 19 72 11 c3 b1 1e f2 0a d2 ee 23 |t.....r........#| +peer1.org1.example.com | [10ca 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +peer0.org2.example.com | [f68 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:14.554 UTC [cauthdsl] func1 -> DEBU 11f6 0xc0010ef170 gate 1589998874552576000 evaluation succeeds" +peer0.org1.example.com | [f13 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 28 2f c0 ad 02 20 1c 2b db 4d 43 9d af c5 09 d6 |(/... .+.MC.....| +peer1.org1.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer0.org2.example.com | [f69 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11f7 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [f14 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 e6 b1 de 0f 63 06 ca e1 2d a2 05 b6 11 bc 04 86 |....c...-.......| +peer1.org1.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer0.org2.example.com | [f6a 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [f15 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +peer0.org1.example.com | [f16 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 1e 65 36 23 13 f1 |.e6#..| +peer1.org1.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +peer0.org2.example.com | [f6b 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11f9 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | [f17 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f76 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [10cb 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [f6c 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | [f18 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f77 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [f6d 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11fb Signature set satisfies policy /Channel/Writers" +peer0.org1.example.com | [f19 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f78 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [10cc 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 73 b3 4b 7a 2f bd ea 38 84 d9 |0E.!..s.Kz/..8..| +peer0.org2.example.com | [f6e 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org1.example.com | [f1a 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 87 99 7f 55 39 4f 9a da 85 b1 92 de 07 91 c7 de |...U9O..........| +peer0.org2.example.com | [f6f 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f79 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:14.555 UTC [orderer.common.blockcutter] Ordered -> DEBU 11fd Enqueuing message into batch" +peer0.org1.example.com | [f1b 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 a7 0a 08 05 02 02 20 58 a7 10 de 08 19 9d 45 e7 |...... X......E.| +peer0.org2.example.com | [f70 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [f7a 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:14.555 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 11fe [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:53552" +peer0.org1.example.com | [f1c 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 7b 38 ce 2b 58 e9 4f a9 fb 21 9b 26 5b cd a7 30 |{8.+X.O..!.&[..0| +peer0.org2.example.com | [f71 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f7b 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:14.558 UTC [grpc] infof -> DEBU 11ff transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [f1d 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 ed 04 38 d2 5e aa b9 |..8.^..| +peer0.org2.example.com | [f72 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [f7c 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:14.558 UTC [orderer.common.broadcast] Handle -> WARN 1200 Error reading from 172.18.0.9:53552: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [f1e 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [10cd 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [f73 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [f7d 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:14.559 UTC [orderer.common.server] func1 -> DEBU 1201 Closing Broadcast stream" +peer0.org1.example.com | [f1f 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [10ce 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [f74 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [f7e 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.559 UTC [comm.grpc.server] 1 -> INFO 1202 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53552 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.7182ms +peer0.org1.example.com | [f20 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [10cf 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f75 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f7f 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1203 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [f21 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10d0 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f76 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [f80 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:14.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1204 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +peer0.org1.example.com | [f22 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10d1 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [f77 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f81 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:14.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1205 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.4µs " +peer0.org1.example.com | [f23 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10d2 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f78 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [f82 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:14.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1206 Sending msg of 28 bytes to 2 on channel businesschannel took 245.5µs" +peer0.org1.example.com | [f24 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10d3 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [f79 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [f83 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:14.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1207 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.6µs " +peer0.org1.example.com | [f25 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f7a 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +peer1.org2.example.com | [f84 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f85 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [10d4 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [10d5 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer0.org2.example.com | 00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +peer1.org1.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +orderer0.example.com | "2020-05-20 18:21:14.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1208 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 321.4µs " +peer0.org1.example.com | [f26 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f7b 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +peer1.org2.example.com | [f86 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [10d6 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +orderer0.example.com | "2020-05-20 18:21:14.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1209 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [f27 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | 00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +peer1.org2.example.com | [f87 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +orderer0.example.com | "2020-05-20 18:21:14.880 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120a Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +peer0.org1.example.com | [f28 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +peer1.org2.example.com | [f88 05-20 18:20:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +orderer0.example.com | "2020-05-20 18:21:14.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [f29 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +peer1.org2.example.com | [f89 05-20 18:20:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +orderer0.example.com | "2020-05-20 18:21:15.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [f2a 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 5e da f7 a5 da 3d |^....=| +peer1.org2.example.com | [f8a 05-20 18:20:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +orderer0.example.com | "2020-05-20 18:21:15.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120d Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +peer0.org1.example.com | [f2b 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f7c 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | [f8b 05-20 18:20:23.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10d7 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:15.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 120e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 411.9µs " +peer0.org1.example.com | [f2c 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [f8c 05-20 18:20:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [10d8 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:15.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120f Sending msg of 28 bytes to 3 on channel businesschannel took 30.2µs" +peer0.org1.example.com | [f2d 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [f7d 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 b8 76 70 01 62 6b 47 1c ed 3a 78 |0D. .vp.bkG..:x| +peer1.org2.example.com | [f8d 05-20 18:20:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816101C +peer1.org1.example.com | [10d9 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:15.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1210 Sending msg of 28 bytes to 2 on channel businesschannel took 10.8µs" +peer0.org1.example.com | [f2e 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 64 b4 b9 49 b7 c8 e1 da a1 24 84 f3 1e 7a 11 24 |d..I.....$...z.$| +peer1.org2.example.com | [f8e 05-20 18:20:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8E445DDF2154E4BF966B821402FAF6AF628139119ED8D21CBF0B54FCBE6D7330 +peer1.org1.example.com | [10da 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:15.378 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1211 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +peer0.org2.example.com | 00000020 f8 dc 79 02 02 20 45 1e 5f 7d b2 ca 1b ff 27 e4 |..y.. E._}....'.| +peer0.org1.example.com | [f2f 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f8f 05-20 18:20:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [10db 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:15.379 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1212 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 963.1µs " +peer0.org2.example.com | 00000030 ae 43 27 28 2c d9 ee c8 8d 2e cb d3 64 5b 65 43 |.C'(,.......d[eC| +peer0.org1.example.com | [f30 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f90 05-20 18:20:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [10dc 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:15.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1213 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000040 ea bd 72 24 86 79 |..r$.y| +peer0.org1.example.com | [f31 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f32 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f33 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [10dd 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-05-20 18:21:15.381 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1214 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [f7e 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [f34 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [10de 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f91 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer0.example.com | "2020-05-20 18:21:15.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1215 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [f35 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 gate 1589998816670872900 evaluation starts +peer0.org1.example.com | [f36 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f7f 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [f92 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | "2020-05-20 18:21:15.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1216 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.2µs " +peer0.org2.example.com | [f80 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [f81 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [f82 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [f83 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f84 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f85 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [f86 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f87 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f88 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f89 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f8a 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [f8b 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [f8c 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f8d 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [f8e 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f8f 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [f90 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [f91 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f92 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f93 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f93 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f94 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f95 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:15.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1217 Sending msg of 28 bytes to 3 on channel testchainid took 344.2µs" +orderer0.example.com | "2020-05-20 18:21:15.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1218 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +orderer0.example.com | "2020-05-20 18:21:15.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1219 Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +peer0.org1.example.com | [f37 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [f38 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 principal matched by identity 0 +peer0.org1.example.com | [f39 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +peer0.org1.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +peer0.org1.example.com | [f3a 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer0.org1.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +peer0.org1.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer0.org1.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU 0xc003081d60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f3c 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 gate 1589998816670872900 evaluation succeeds +peer0.org1.example.com | [f3d 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f3e 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f3f 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f40 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f41 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [f42 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [f43 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [f44 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [f45 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [f46 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f47 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f48 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [f49 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f4a 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f4b 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f4c 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f4d 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; alive: alive: +peer1.org2.example.com | [f96 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [f97 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f98 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [f99 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9a 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f9b 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9c 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f9d 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [f9e 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9f 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fa0 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [fa1 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa2 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa3 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa4 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fa5 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fa7 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fa8 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [fa9 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [faa 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [fa6 05-20 18:20:23.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fab 05-20 18:20:24.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fac 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fad 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [fae 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [faf 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [fb0 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003834350 gate 1589998824025653300 evaluation starts +peer1.org2.example.com | [fb1 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003834350 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fb2 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003834350 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [fb3 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003834350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [fb4 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003834350 principal evaluation fails +peer1.org2.example.com | [fb5 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003834350 gate 1589998824025653300 evaluation fails +peer1.org2.example.com | [fb6 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fb7 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fb8 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [fb9 05-20 18:20:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038348c0 gate 1589998824028219900 evaluation starts +peer1.org2.example.com | [fba 05-20 18:20:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038348c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fbb 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038348c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [fbc 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038348c0 principal matched by identity 0 +peer1.org2.example.com | [fbd 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 a1 cc b5 c8 8c 41 2b b3 71 e7 50 2c 0a 47 87 |b.....A+.q.P,.G.| +peer1.org2.example.com | 00000010 44 e2 8f 24 8c b9 fe 7b 56 43 4a 74 2a 41 69 b2 |D..$...{VCJt*Ai.| +peer1.org2.example.com | [fbe 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b5 e9 19 d2 f1 2e 41 37 85 bc |0E.!........A7..| +peer1.org2.example.com | 00000010 67 9e a8 7f d2 2e 02 23 07 43 11 de 1e 55 5a a8 |g......#.C...UZ.| +peer1.org2.example.com | 00000020 53 37 e1 65 f9 02 20 17 90 9c b1 9b 7e 0e 80 75 |S7.e.. .....~..u| +peer1.org2.example.com | 00000030 5b 2a c6 eb a4 3d b1 c7 86 24 f4 a1 aa 07 40 9a |[*...=...$....@.| +peer1.org2.example.com | 00000040 0d c1 f7 02 15 f5 6f |......o| +peer0.org1.example.com | [f4e 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [f4f 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f50 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f51 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [f52 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f53 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [f54 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f55 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [f56 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f57 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [f58 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f59 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f5a 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f5b 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f5c 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f5d 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [f5e 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [f5f 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [f60 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f61 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [f62 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [f63 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [f64 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f65 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [f66 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f67 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [f94 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f95 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f96 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f97 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f98 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf200 gate 1589998816873874000 evaluation starts +peer0.org2.example.com | [f99 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f9a 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf200 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [f9b 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f9c 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf200 principal evaluation fails +peer0.org2.example.com | [f9d 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf200 gate 1589998816873874000 evaluation fails +peer0.org2.example.com | [f9e 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f9f 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [fa0 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [fa1 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf770 gate 1589998816874154100 evaluation starts +peer0.org2.example.com | [fa2 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf770 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fa3 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf770 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [fa4 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf770 principal matched by identity 0 +peer0.org2.example.com | [fa5 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +peer0.org2.example.com | 00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +peer0.org2.example.com | [fa6 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +peer0.org2.example.com | 00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +peer0.org2.example.com | 00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +peer0.org2.example.com | 00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +peer0.org2.example.com | 00000040 be e2 7e ca bd f3 |..~...| +peer0.org2.example.com | [fa7 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf770 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [fa8 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cf770 gate 1589998816874154100 evaluation succeeds +peer0.org2.example.com | [fa9 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [faa 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fab 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [fac 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [fad 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [fae 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [faf 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [fb0 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [fb1 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [fb2 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fb3 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fb4 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fb5 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [fb6 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fb7 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fb8 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fb9 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:15.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 455.7µs " +orderer0.example.com | "2020-05-20 18:21:15.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:15.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6234ms " +orderer0.example.com | "2020-05-20 18:21:15.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 121f Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +orderer0.example.com | "2020-05-20 18:21:16.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1220 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.1µs " +orderer0.example.com | "2020-05-20 18:21:16.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1221 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +orderer0.example.com | "2020-05-20 18:21:16.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1222 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2020-05-20 18:21:16.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1223 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.2µs " +orderer0.example.com | "2020-05-20 18:21:16.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1224 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.379 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1225 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.415ms " +orderer0.example.com | "2020-05-20 18:21:16.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1226 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.555 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1227 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:16.556 UTC [orderer.consensus.etcdraft] propose -> INFO 1228 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:16.557 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1229 Proposed block [4] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:16.561 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122a Sending msg of 3110 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2020-05-20 18:21:16.561 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122b Sending msg of 3110 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2020-05-20 18:21:16.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122c Send of ConsensusRequest for channel businesschannel with payload of size 3110 to orderer2.example.com(orderer2.example.com:7050) took 254.3µs " +orderer0.example.com | "2020-05-20 18:21:16.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122d Send of ConsensusRequest for channel businesschannel with payload of size 3110 to orderer1.example.com(orderer1.example.com:7050) took 802.7µs " +orderer0.example.com | "2020-05-20 18:21:16.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.567 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122f Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +orderer0.example.com | "2020-05-20 18:21:16.567 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2020-05-20 18:21:16.568 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.2µs " +orderer0.example.com | "2020-05-20 18:21:16.568 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1232 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.568 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1233 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:16.569 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1234 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2020-05-20 18:21:16.569 UTC [msp] GetDefaultSigningIdentity -> DEBU 1235 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:21:16.569 UTC [msp] GetDefaultSigningIdentity -> DEBU 1236 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:21:16.569 UTC [msp.identity] Sign -> DEBU 1237 Sign: plaintext: 0A020802120B0A090A03010203100418...1D95C41FFF473D2AA497045CA14C9638 " +orderer0.example.com | "2020-05-20 18:21:16.569 UTC [msp.identity] Sign -> DEBU 1238 Sign: digest: 2E8DC98619B913D624355CC832A0AAC42F1A68FD82E9BB775E91F26F9932D788 " +orderer0.example.com | "2020-05-20 18:21:16.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1239 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.8µs " +orderer0.example.com | "2020-05-20 18:21:16.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.574 UTC [fsblkstorage] indexBlock -> DEBU 123c Indexing block [blockNum=4, blockHash=[]byte{0xa4, 0x2e, 0x9a, 0xd0, 0x47, 0x9a, 0xd6, 0x54, 0xc0, 0x1a, 0xaa, 0x8c, 0xcf, 0x92, 0x89, 0x7b, 0x18, 0x78, 0x45, 0x2d, 0x50, 0x36, 0x95, 0xaf, 0xa8, 0x78, 0xd1, 0xa7, 0xb2, 0x8a, 0xb1, 0xaf} txOffsets= +orderer0.example.com | txId=523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb locPointer=offset=70, bytesLength=2982 +orderer0.example.com | ]" +orderer0.example.com | "2020-05-20 18:21:16.581 UTC [fsblkstorage] updateCheckpoint -> DEBU 123d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93382], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2020-05-20 18:21:16.585 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 123e [channel: businesschannel] Wrote block [4]" +orderer0.example.com | "2020-05-20 18:21:16.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [f68 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [f69 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f6a 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f6b 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f6c 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f6d 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f6e 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f6f 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f70 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f71 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f72 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [f73 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f74 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [f75 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161016 +peer0.org1.example.com | [f76 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 59ACC572969B92D798BC0D28F1F3328DD541FFD3F6184F84B0B0E0E75A686001 +peer0.org1.example.com | [f77 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [f78 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [f79 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [f7a 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f7b 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f7c 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f7d 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f7e 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f7f 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [f80 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f81 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [f82 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f83 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [f84 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f85 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [f86 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [f87 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f88 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [f89 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [f8a 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f8b 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f8c 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f8d 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f8e 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f8f 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f90 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f91 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 gate 1589998816876645900 evaluation starts +peer0.org1.example.com | [f92 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f93 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [f94 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 principal matched by identity 0 +peer0.org1.example.com | [f95 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +peer0.org1.example.com | 00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +peer0.org1.example.com | [f96 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +peer0.org1.example.com | 00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +peer0.org1.example.com | 00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +peer0.org1.example.com | 00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +peer0.org1.example.com | 00000040 5e da f7 a5 da 3d |^....=| +peer0.org1.example.com | [f97 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f98 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 gate 1589998816876645900 evaluation succeeds +peer0.org1.example.com | [f99 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f9a 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f9b 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f9c 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f9d 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [f9e 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [f9f 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [fa0 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [fa1 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [fa2 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fa3 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fa4 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fa5 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [fa6 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [fa7 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fa8 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [fa9 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [faa 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fab 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [fac 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fad 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fae 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [faf 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [fb0 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [fb1 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 gate 1589998816884354700 evaluation starts +peer0.org1.example.com | [fb2 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [fb3 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [fb4 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 principal matched by identity 0 +peer0.org1.example.com | [fb5 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +peer0.org1.example.com | 00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +peer0.org1.example.com | [fb6 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +peer0.org1.example.com | 00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +peer0.org1.example.com | 00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +peer0.org1.example.com | 00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +peer0.org1.example.com | 00000040 5e da f7 a5 da 3d |^....=| +peer0.org1.example.com | [fb7 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [fb8 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 gate 1589998816884354700 evaluation succeeds +peer0.org1.example.com | [fb9 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fba 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fbb 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [fbf 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038348c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [fc0 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038348c0 gate 1589998824028219900 evaluation succeeds +peer1.org2.example.com | [fc1 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [fc2 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [fc3 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [fc4 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [fc5 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fc6 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [fc7 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [fc8 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [fc9 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [fca 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fcb 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fcc 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fcd 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fce 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fcf 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fd0 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fd1 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fd2 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd3 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd4 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd5 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd6 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd7 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd8 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fd9 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [fda 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fdc 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [fdd 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fde 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fdb 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fdf 05-20 18:20:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fe0 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [fe1 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [fe2 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe3 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe4 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fe5 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [10df 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [10e0 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10e1 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10e2 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [10e3 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [10e5 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [10e6 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c26c50 gate 1589998824836782800 evaluation starts +peer1.org1.example.com | [10e4 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [10e7 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c26c50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [10e9 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c26c50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [10ea 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c26c50 principal matched by identity 0 +peer1.org1.example.com | [10eb 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer1.org1.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer1.org1.example.com | [10ec 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer1.org1.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer1.org1.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer1.org1.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer1.org1.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer1.org1.example.com | [10ed 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c26c50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [10ee 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c26c50 gate 1589998824836782800 evaluation succeeds +peer0.org2.example.com | [fba 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [fbb 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [fbc 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fbd 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [fbe 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [fbf 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fc0 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [fc1 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fc2 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [fc3 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [fc4 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [fc5 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [fc6 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [fc7 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [fc8 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [fc9 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909510 gate 1589998818304020300 evaluation starts +peer0.org2.example.com | [fca 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fcb 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909510 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [fcc 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [fcd 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909510 principal evaluation fails +peer0.org2.example.com | [fce 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909510 gate 1589998818304020300 evaluation fails +peer0.org2.example.com | [fcf 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [fd0 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [fd1 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [fd2 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909a80 gate 1589998818311639000 evaluation starts +peer0.org2.example.com | [fd3 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909a80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fd4 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909a80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [fd5 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909a80 principal matched by identity 0 +peer0.org2.example.com | [fd6 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 24 ad 0d 5d ff 78 c0 a5 d0 de e0 d7 da ae e3 |8$..].x.........| +peer0.org2.example.com | 00000010 4b c7 2a 3f c6 1f 29 25 a5 96 37 1f 82 42 74 eb |K.*?..)%..7..Bt.| +peer0.org2.example.com | [fd7 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 2e 64 fa 37 6f bd ab cb aa a3 |0E.!...d.7o.....| +peer0.org2.example.com | 00000010 3d b7 40 ee cf 08 50 26 25 b7 e5 08 ef 27 d8 6d |=.@...P&%....'.m| +peer0.org2.example.com | 00000020 18 8e cf 62 3c 02 20 27 4e 85 47 75 c1 dc 4f 5d |...b<. 'N.Gu..O]| +peer0.org2.example.com | 00000030 63 65 e4 4d f6 54 28 aa 7f 1e e1 4d cb 72 2b 31 |ce.M.T(....M.r+1| +peer0.org2.example.com | 00000040 bd 4b 42 c1 09 11 f7 |.KB....| +peer0.org2.example.com | [fd8 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909a80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [fd9 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909a80 gate 1589998818311639000 evaluation succeeds +peer0.org2.example.com | [fda 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fdb 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fdc 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [fdd 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [fde 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [fdf 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [fe0 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [fe1 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [fe2 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [fe3 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe4 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe5 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe6 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [fe7 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe8 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe9 05-20 18:20:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fea 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [feb 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fec 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fed 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fee 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fef 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff0 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [ff1 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff2 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ff3 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ff4 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ff5 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ff7 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ff6 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [ff9 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ffa 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ff8 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ffb 05-20 18:20:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [ffc 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161018 +peer0.org2.example.com | [ffd 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2653A226AB7B16848DB78E72FF9F08FA0F2ED6676827AC07BBA37E5944447E31 +peer0.org2.example.com | [ffe 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [fff 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1000 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1001 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1002 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1003 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1004 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1005 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1006 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1007 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1008 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1009 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [100a 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [100b 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [100c 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [100d 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [100e 05-20 18:20:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [100f 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1010 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1011 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1012 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1013 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ef 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10f0 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10f1 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [10f2 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [10f3 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10f4 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [10f5 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [10f6 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [10e8 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [10f7 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [10f8 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10f9 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [10fa 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10fb 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10fc 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10fd 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [10fe 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ff 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1100 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1101 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1102 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1103 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1104 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1105 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1106 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fbc 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [fbd 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fbe 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fbf 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [fc0 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer0.org1.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +peer0.org1.example.com | [fc1 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer0.org1.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer0.org1.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +peer0.org1.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +peer0.org1.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +peer0.org1.example.com | [fc2 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fc3 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fc4 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [fc5 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +peer0.org1.example.com | 00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +peer0.org1.example.com | [fc6 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +peer0.org1.example.com | 00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +peer0.org1.example.com | 00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +peer0.org1.example.com | 00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +peer0.org1.example.com | 00000040 be e2 7e ca bd f3 |..~...| +peer0.org1.example.com | [fc7 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fc8 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fc9 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fca 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fcb 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [fcc 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [fcd 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fce 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fcf 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fd0 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [fd1 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [fd2 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd3 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [fd4 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [fd5 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +peer0.org1.example.com | 00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +peer0.org1.example.com | [fd6 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +peer0.org1.example.com | 00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +peer0.org1.example.com | 00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +peer0.org1.example.com | 00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +peer0.org1.example.com | 00000040 be e2 7e ca bd f3 |..~...| +peer0.org1.example.com | [fd7 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [fd8 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a c6 44 a9 71 5a 23 41 e7 8c b5 bb |0D. j.D.qZ#A....| +peer0.org1.example.com | 00000010 58 94 4a eb 36 18 48 bf eb 1f 86 b9 54 bc 74 11 |X.J.6.H.....T.t.| +peer0.org1.example.com | 00000020 b1 b5 b8 c2 02 20 78 de 28 b5 09 ef af 75 77 75 |..... x.(....uwu| +peer0.org1.example.com | 00000030 c9 19 d3 d7 de 67 78 78 8e 24 3b 33 7c e6 7f 39 |.....gxx.$;3|..9| +peer0.org1.example.com | 00000040 65 b0 fa 94 b4 61 |e....a| +peer0.org1.example.com | [fd9 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [fda 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1107 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1108 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1109 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer1.org1.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer1.org1.example.com | [110a 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer1.org1.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer1.org1.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer1.org1.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer1.org1.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer1.org1.example.com | [110b 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [110c 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 00 2c 36 11 c2 a7 49 65 0d bf |0E.!...,6...Ie..| +peer1.org1.example.com | 00000010 9b 8a e3 97 a9 60 29 b7 fd b4 b3 7d 2e a0 38 8b |.....`)....}..8.| +peer1.org1.example.com | 00000020 5f 74 26 94 79 02 20 24 94 3d b8 7d df d9 7d be |_t&.y. $.=.}..}.| +peer1.org1.example.com | 00000030 6e ea 63 65 2b 8a c7 d4 79 2b 93 99 80 f6 11 1a |n.ce+...y+......| +peer1.org1.example.com | 00000040 46 38 d5 d5 dc a5 b7 |F8.....| +peer1.org1.example.com | [110d 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [110e 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [110f 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1110 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1111 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1112 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1113 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1114 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1115 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1116 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1117 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1118 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1119 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [111a 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [111b 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [111c 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [111d 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [111e 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [111f 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1120 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1121 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1122 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1123 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1124 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1125 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe6 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [fe7 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [fe8 05-20 18:20:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [fe9 05-20 18:20:24.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fea 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [feb 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [fec 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fed 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fee 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fef 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff0 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff1 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff2 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [ff3 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ff4 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [ff5 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ff6 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [ff7 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [ff8 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff9 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ffa 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ffb 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ffc 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ffd 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ffe 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [fff 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859720 gate 1589998824436581300 evaluation starts +peer1.org2.example.com | [1000 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1001 05-20 18:20:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859720 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1002 05-20 18:20:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1003 05-20 18:20:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859720 principal evaluation fails +peer1.org2.example.com | [1004 05-20 18:20:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859720 gate 1589998824436581300 evaluation fails +orderer0.example.com | "2020-05-20 18:21:16.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1240 Sending msg of 28 bytes to 3 on channel testchainid took 224µs" +orderer0.example.com | "2020-05-20 18:21:16.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1241 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.9µs " +orderer0.example.com | "2020-05-20 18:21:16.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1242 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-05-20 18:21:16.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1243 Sending msg of 28 bytes to 3 on channel businesschannel took 90.1µs" +orderer0.example.com | "2020-05-20 18:21:16.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1244 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 248.2µs " +orderer0.example.com | "2020-05-20 18:21:16.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1245 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.1µs " +orderer0.example.com | "2020-05-20 18:21:16.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1246 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:16.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1247 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:17.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1248 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:17.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1249 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2020-05-20 18:21:17.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 648.3µs " +orderer0.example.com | "2020-05-20 18:21:17.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124b Sending msg of 28 bytes to 2 on channel businesschannel took 44.3µs" +orderer0.example.com | "2020-05-20 18:21:17.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124c Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:21:17.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +orderer0.example.com | "2020-05-20 18:21:17.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 124e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:17.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 124f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:17.378 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1250 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4092ms " +orderer0.example.com | "2020-05-20 18:21:17.493 UTC [orderer.common.server] Broadcast -> DEBU 1251 Starting new Broadcast handler" +orderer0.example.com | "2020-05-20 18:21:17.493 UTC [orderer.common.broadcast] Handle -> DEBU 1252 Starting new broadcast loop for 172.18.0.9:53566" +orderer0.example.com | "2020-05-20 18:21:17.533 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1253 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:53566 with txid 'f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2020-05-20 18:21:17.534 UTC [policies] Evaluate -> DEBU 1254 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-05-20 18:21:17.534 UTC [policies] Evaluate -> DEBU 1255 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:17.534 UTC [policies] Evaluate -> DEBU 1256 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-05-20 18:21:17.535 UTC [policies] Evaluate -> DEBU 1257 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:17.535 UTC [policies] Evaluate -> DEBU 1258 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-05-20 18:21:17.535 UTC [msp] DeserializeIdentity -> DEBU 1259 Obtaining identity" +orderer0.example.com | "2020-05-20 18:21:17.536 UTC [msp.identity] newIdentity -> DEBU 125a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +orderer0.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +orderer0.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +orderer0.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:17.538 UTC [cauthdsl] func1 -> DEBU 125b 0xc0011925e0 gate 1589998877538093500 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:17.539 UTC [cauthdsl] func2 -> DEBU 125c 0xc0011925e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:17.539 UTC [cauthdsl] func2 -> DEBU 125d 0xc0011925e0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:17.540 UTC [cauthdsl] func2 -> DEBU 125e 0xc0011925e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2020-05-20 18:21:17.540 UTC [cauthdsl] func2 -> DEBU 125f 0xc0011925e0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:17.540 UTC [cauthdsl] func1 -> DEBU 1260 0xc0011925e0 gate 1589998877538093500 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:17.540 UTC [policies] Evaluate -> DEBU 1261 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:17.541 UTC [policies] Evaluate -> DEBU 1262 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:17.541 UTC [policies] func1 -> DEBU 1263 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-05-20 18:21:17.541 UTC [policies] Evaluate -> DEBU 1264 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:17.541 UTC [policies] Evaluate -> DEBU 1265 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:17.541 UTC [policies] Evaluate -> DEBU 1266 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-05-20 18:21:17.542 UTC [policies] Evaluate -> DEBU 1267 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:17.542 UTC [policies] Evaluate -> DEBU 1268 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-05-20 18:21:17.542 UTC [cauthdsl] func1 -> DEBU 1269 0xc001193c50 gate 1589998877542939700 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:17.543 UTC [cauthdsl] func2 -> DEBU 126a 0xc001193c50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:17.543 UTC [cauthdsl] func2 -> DEBU 126b 0xc001193c50 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:17.543 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 126c Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2020-05-20 18:21:17.544 UTC [msp] Validate -> DEBU 126d MSP Org2MSP validating identity" +orderer0.example.com | "2020-05-20 18:21:17.544 UTC [msp] getCertificationChain -> DEBU 126e MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:21:17.545 UTC [cauthdsl] func2 -> DEBU 126f 0xc001193c50 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:17.545 UTC [msp.identity] Verify -> DEBU 1270 Verify: digest = 00000000 bf 39 ad 16 51 9c 3a 63 61 b3 8b e7 78 81 98 26 |.9..Q.:ca...x..&| +orderer0.example.com | 00000010 fa 45 70 07 9c c9 7e c2 9a 96 46 22 d6 5c 7d 38 |.Ep...~...F".\}8|" +orderer0.example.com | "2020-05-20 18:21:17.546 UTC [msp.identity] Verify -> DEBU 1271 Verify: sig = 00000000 30 44 02 20 4a 04 e6 28 19 1c 5d a6 e5 ec 93 0a |0D. J..(..].....| +orderer0.example.com | 00000010 c1 a3 fe a2 2d b1 5e 21 14 5f 55 25 ee 8b 39 22 |....-.^!._U%..9"| +orderer0.example.com | 00000020 ee 75 f0 7e 02 20 77 94 f8 8e ec a2 44 4a 6b 45 |.u.~. w.....DJkE| +orderer0.example.com | 00000030 a4 95 29 d7 fa ec 6f 2a f1 ac 43 a8 e4 d6 92 5b |..)...o*..C....[| +orderer0.example.com | 00000040 b2 87 c3 52 76 5a |...RvZ|" +orderer0.example.com | "2020-05-20 18:21:17.547 UTC [cauthdsl] func2 -> DEBU 1272 0xc001193c50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:17.547 UTC [cauthdsl] func1 -> DEBU 1273 0xc001193c50 gate 1589998877542939700 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:17.548 UTC [policies] Evaluate -> DEBU 1274 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:17.548 UTC [policies] Evaluate -> DEBU 1275 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:17.548 UTC [policies] Evaluate -> DEBU 1276 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:17.549 UTC [policies] Evaluate -> DEBU 1277 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:17.549 UTC [policies] Evaluate -> DEBU 1278 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:21:17.549 UTC [policies] Evaluate -> DEBU 1279 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:21:17.550 UTC [orderer.common.blockcutter] Ordered -> DEBU 127a Enqueuing message into batch" +orderer0.example.com | "2020-05-20 18:21:17.550 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 127b [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:53566" +orderer0.example.com | "2020-05-20 18:21:17.555 UTC [grpc] infof -> DEBU 127c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:17.555 UTC [orderer.common.broadcast] Handle -> WARN 127d Error reading from 172.18.0.9:53566: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:17.556 UTC [orderer.common.server] func1 -> DEBU 127e Closing Broadcast stream" +orderer0.example.com | "2020-05-20 18:21:17.557 UTC [comm.grpc.server] 1 -> INFO 127f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53566 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=63.4911ms +orderer0.example.com | "2020-05-20 18:21:17.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1280 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:17.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1281 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145µs " +orderer0.example.com | "2020-05-20 18:21:17.859 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1282 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +orderer0.example.com | "2020-05-20 18:21:17.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1283 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +orderer0.example.com | "2020-05-20 18:21:17.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1284 Sending msg of 28 bytes to 3 on channel businesschannel took 127.5µs" +orderer0.example.com | "2020-05-20 18:21:17.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1285 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 573.1µs " +orderer0.example.com | "2020-05-20 18:21:17.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1286 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 382µs " +orderer0.example.com | "2020-05-20 18:21:17.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1287 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:17.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1288 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:18.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1289 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:18.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.2µs " +orderer0.example.com | "2020-05-20 18:21:18.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128b Sending msg of 28 bytes to 3 on channel testchainid took 50.4µs" +orderer0.example.com | "2020-05-20 18:21:18.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.3µs " +orderer0.example.com | "2020-05-20 18:21:18.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128d Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2020-05-20 18:21:18.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128e Sending msg of 28 bytes to 3 on channel businesschannel took 82.3µs" +orderer0.example.com | "2020-05-20 18:21:18.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 963.6µs " +orderer0.example.com | "2020-05-20 18:21:18.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1290 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:18.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1291 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:18.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1292 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [fdb 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fdc 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fdd 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; alive: alive: +peer0.org1.example.com | [fde 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [fdf 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fe0 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [fe1 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [fe2 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fe3 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [fe4 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [fe5 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fe6 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [fe7 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fe8 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fe9 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [fea 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [feb 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [fec 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 gate 1589998816910812900 evaluation starts +peer0.org1.example.com | [fed 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [fee 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [fef 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 principal matched by identity 0 +peer0.org1.example.com | [ff0 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +peer0.org1.example.com | 00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +peer0.org1.example.com | [ff1 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +peer0.org1.example.com | 00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +peer0.org1.example.com | 00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +peer0.org1.example.com | 00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1015 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1016 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1017 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1018 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1019 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [101a 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394b6f0 gate 1589998818832612600 evaluation starts +peer0.org2.example.com | [101b 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394b6f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [101c 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394b6f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [101d 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394b6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [101e 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394b6f0 principal evaluation fails +peer0.org2.example.com | [101f 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394b6f0 gate 1589998818832612600 evaluation fails +peer0.org2.example.com | [1020 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1021 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1022 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1023 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394bc60 gate 1589998818837911900 evaluation starts +peer0.org2.example.com | [1024 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394bc60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1025 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394bc60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1026 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394bc60 principal matched by identity 0 +peer0.org2.example.com | [1027 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 0e 66 6e 81 6b eb 9c 98 55 be b1 05 c1 44 a8 |..fn.k...U....D.| +peer0.org2.example.com | 00000010 1c 49 4f 3d 9f e9 9a 46 24 38 22 9c c8 98 70 76 |.IO=...F$8"...pv| +peer0.org2.example.com | [1028 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 18 81 03 e1 18 46 be e3 f2 58 95 |0D. _.....F...X.| +peer0.org2.example.com | 00000010 be 45 44 09 6c ab d9 f0 70 17 d7 f0 3b 9e 99 87 |.ED.l...p...;...| +peer0.org2.example.com | 00000020 b1 76 17 e3 02 20 42 72 3a 99 70 01 6f 0b 51 7b |.v... Br:.p.o.Q{| +peer0.org2.example.com | 00000030 24 55 90 5b 8c 30 07 db b0 5d 21 ba e6 70 20 79 |$U.[.0...]!..p y| +peer0.org2.example.com | 00000040 79 ee c3 bd 42 51 |y...BQ| +peer0.org2.example.com | [1029 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394bc60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [102a 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394bc60 gate 1589998818837911900 evaluation succeeds +peer0.org2.example.com | [102b 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [102c 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [102d 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [102e 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [102f 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1030 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1031 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1032 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1033 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1034 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1035 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1036 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1037 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1038 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1039 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [103a 05-20 18:20:18.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [103b 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [103c 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [103d 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [103e 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [103f 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1040 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1041 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1042 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1044 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1045 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1043 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1046 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1047 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1048 05-20 18:20:18.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1049 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [104a 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [104b 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [104c 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [104d 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [104e 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 17 55 c6 9b df 54 f4 4a dd d3 2c 5e 18 c1 62 |..U...T.J..,^..b| +peer0.org2.example.com | 00000010 49 e9 22 2f 7c ac c6 c7 b8 3c ae 9e 2b 12 05 15 |I."/|....<..+...| +peer0.org2.example.com | [104f 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 60 e7 7a df 7e e1 07 bb 89 7f |0E.!..`.z.~.....| +orderer0.example.com | "2020-05-20 18:21:18.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1293 Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +orderer0.example.com | "2020-05-20 18:21:18.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1294 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.1µs " +orderer0.example.com | "2020-05-20 18:21:18.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1295 Sending msg of 28 bytes to 2 on channel businesschannel took 34.2µs" +orderer0.example.com | "2020-05-20 18:21:18.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1296 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +orderer0.example.com | "2020-05-20 18:21:18.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1297 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.2µs " +orderer0.example.com | "2020-05-20 18:21:18.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1298 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.1932ms " +orderer0.example.com | "2020-05-20 18:21:18.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1299 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:18.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129c Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +orderer0.example.com | "2020-05-20 18:21:19.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167µs " +orderer0.example.com | "2020-05-20 18:21:19.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129e Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +orderer0.example.com | "2020-05-20 18:21:19.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129f Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +orderer0.example.com | "2020-05-20 18:21:19.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.5µs " +orderer0.example.com | "2020-05-20 18:21:19.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 589.3µs " +orderer0.example.com | "2020-05-20 18:21:19.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.550 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 12a4 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:19.551 UTC [orderer.consensus.etcdraft] propose -> INFO 12a5 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:19.551 UTC [orderer.consensus.etcdraft] 2 -> DEBU 12a6 Proposed block [5] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:19.555 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a7 Sending msg of 3108 bytes to 2 on channel businesschannel took 23.3µs" +orderer0.example.com | "2020-05-20 18:21:19.555 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a8 Send of ConsensusRequest for channel businesschannel with payload of size 3108 to orderer1.example.com(orderer1.example.com:7050) took 325µs " +orderer0.example.com | "2020-05-20 18:21:19.555 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a9 Sending msg of 3108 bytes to 3 on channel businesschannel took 42µs" +orderer0.example.com | "2020-05-20 18:21:19.556 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12aa Send of ConsensusRequest for channel businesschannel with payload of size 3108 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +orderer0.example.com | "2020-05-20 18:21:19.560 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ab Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.560 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ac Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +orderer0.example.com | "2020-05-20 18:21:19.560 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ad Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.561 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 12ae Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:19.562 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 12af [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2020-05-20 18:21:19.562 UTC [msp] GetDefaultSigningIdentity -> DEBU 12b1 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:21:19.561 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b0 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2020-05-20 18:21:19.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 482.8µs " +orderer0.example.com | "2020-05-20 18:21:19.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 94.6µs " +orderer0.example.com | "2020-05-20 18:21:19.564 UTC [msp] GetDefaultSigningIdentity -> DEBU 12b4 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:21:19.569 UTC [msp.identity] Sign -> DEBU 12b7 Sign: plaintext: 0A020802120B0A090A03010203100418...C2978E4ACEF8D9E80C554D2C65B8CF50 " +orderer0.example.com | "2020-05-20 18:21:19.569 UTC [msp.identity] Sign -> DEBU 12b8 Sign: digest: 45E98A8AF968BED4E593335471F8AF7F2B95D606563A82E691B2CABEDA5D1C58 " +orderer0.example.com | "2020-05-20 18:21:19.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.584 UTC [fsblkstorage] indexBlock -> DEBU 12b9 Indexing block [blockNum=5, blockHash=[]byte{0x60, 0xc5, 0x4f, 0x44, 0x0, 0x2d, 0xfc, 0xe6, 0x2a, 0x7, 0x13, 0xb5, 0xf5, 0xfc, 0xb9, 0xf0, 0xb, 0x61, 0x18, 0xa, 0xe3, 0x93, 0x45, 0xfc, 0x9f, 0x46, 0x5c, 0xc4, 0x56, 0x14, 0x37, 0xcd} txOffsets= +orderer0.example.com | txId=f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 locPointer=offset=70, bytesLength=2980 +orderer0.example.com | ]" +peer1.org1.example.com | [1126 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1127 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1128 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1129 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [112a 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [112b 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [112c 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [112d 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [112e 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [112f 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1130 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1131 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1132 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1133 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c896e0 gate 1589998824985879800 evaluation starts +peer1.org1.example.com | [1134 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c896e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1135 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c896e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1136 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c896e0 principal matched by identity 0 +peer1.org1.example.com | [1137 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer1.org1.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer1.org1.example.com | [1138 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer1.org1.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer1.org1.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer1.org1.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer1.org1.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer1.org1.example.com | [1139 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c896e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [113a 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c896e0 gate 1589998824985879800 evaluation succeeds +peer1.org1.example.com | [113b 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [113c 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [113d 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [113e 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [113f 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ff2 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ff3 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 gate 1589998816910812900 evaluation succeeds +peer0.org1.example.com | [ff4 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ff5 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ff6 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ff7 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ff8 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ff9 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ffa 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [ffb 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +peer0.org1.example.com | 00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +peer0.org1.example.com | [ffc 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +peer0.org1.example.com | 00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +peer0.org1.example.com | 00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +peer0.org1.example.com | 00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +peer0.org1.example.com | 00000040 be e2 7e ca bd f3 |..~...| +peer0.org1.example.com | [ffd 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ffe 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fff 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1000 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1001 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +peer0.org1.example.com | 00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +peer0.org1.example.com | [1002 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +peer0.org1.example.com | 00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +peer0.org1.example.com | 00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +peer0.org1.example.com | 00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +peer0.org1.example.com | 00000040 20 37 05 ef 50 1d | 7..P.| +peer0.org1.example.com | [1003 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1004 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1005 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1006 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1007 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1008 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1009 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [100a 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [100b 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 24 ad 0d 5d ff 78 c0 a5 d0 de e0 d7 da ae e3 |8$..].x.........| +peer0.org1.example.com | 00000010 4b c7 2a 3f c6 1f 29 25 a5 96 37 1f 82 42 74 eb |K.*?..)%..7..Bt.| +peer0.org1.example.com | [100c 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 2e 64 fa 37 6f bd ab cb aa a3 |0E.!...d.7o.....| +peer0.org1.example.com | 00000010 3d b7 40 ee cf 08 50 26 25 b7 e5 08 ef 27 d8 6d |=.@...P&%....'.m| +peer0.org1.example.com | 00000020 18 8e cf 62 3c 02 20 27 4e 85 47 75 c1 dc 4f 5d |...b<. 'N.Gu..O]| +peer0.org1.example.com | 00000030 63 65 e4 4d f6 54 28 aa 7f 1e e1 4d cb 72 2b 31 |ce.M.T(....M.r+1| +peer0.org1.example.com | 00000040 bd 4b 42 c1 09 11 f7 |.KB....| +peer0.org1.example.com | [100d 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [100e 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [100f 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1005 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1006 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1007 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1008 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859c90 gate 1589998824452715500 evaluation starts +peer1.org2.example.com | [1009 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859c90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [100a 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859c90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [100b 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859c90 principal matched by identity 0 +peer1.org2.example.com | [100c 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer1.org2.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +peer1.org2.example.com | [100d 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +peer1.org2.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer1.org2.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer1.org2.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +peer1.org2.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +peer1.org2.example.com | [100e 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859c90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [100f 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003859c90 gate 1589998824452715500 evaluation succeeds +peer1.org2.example.com | [1010 05-20 18:20:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1011 05-20 18:20:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1012 05-20 18:20:24.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1013 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1014 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1015 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1016 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1017 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1018 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1019 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [101a 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [101b 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [101c 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [101d 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [101e 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [101f 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1020 05-20 18:20:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1021 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1022 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1023 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1024 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1025 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1026 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1027 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1028 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1029 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [102a 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [102b 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [102c 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [102d 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [102e 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [102f 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1030 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1031 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1032 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1033 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1034 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1035 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1036 05-20 18:20:24.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1037 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1038 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1039 05-20 18:20:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [103a 05-20 18:20:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [103b 05-20 18:20:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [103c 05-20 18:20:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [103d 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [103e 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [103f 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1040 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1041 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 4d e7 7f 80 a2 08 5a d9 52 42 d2 d8 80 f5 c9 d5 |M.....Z.RB......| +peer0.org2.example.com | 00000020 4c 19 da a0 2c 02 20 54 d0 07 d5 e0 ec ca 8c 68 |L...,. T.......h| +peer0.org2.example.com | 00000030 bd 74 71 f2 48 ba f0 21 41 17 7a 4b ff da 84 55 |.tq.H..!A.zK...U| +peer0.org2.example.com | 00000040 51 86 04 b5 64 99 02 |Q...d..| +peer0.org2.example.com | [1050 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1051 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1052 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1053 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1054 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1055 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1056 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1057 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1058 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1059 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [105a 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [105b 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [105c 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [105d 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [105e 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [105f 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1010 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1011 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1012 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1013 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1014 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1015 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1016 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1017 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1018 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1019 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [101a 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [101c 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [101d 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [101b 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [101e 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [101f 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1020 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1021 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1022 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1023 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1024 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1025 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1026 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1027 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1028 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1029 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [102a 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [102b 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [102c 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [102d 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [102e 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [102f 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1030 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1031 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1032 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1033 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1034 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1035 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 gate 1589998818703239300 evaluation starts +peer0.org1.example.com | [1036 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1037 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1038 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 principal matched by identity 0 +peer0.org1.example.com | [1039 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 53 a2 26 ab 7b 16 84 8d b7 8e 72 ff 9f 08 fa |&S.&.{.....r....| +peer0.org1.example.com | 00000010 0f 2e d6 67 68 27 ac 07 bb a3 7e 59 44 44 7e 31 |...gh'....~YDD~1| +peer0.org1.example.com | [103a 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 be b8 67 b8 54 e4 3a 00 46 0b d6 |0D. X..g.T.:.F..| +peer0.org1.example.com | 00000010 ed 64 eb 0d 9b 5e 17 e3 fd da fb 34 1d 8e 07 2c |.d...^.....4...,| +peer0.org1.example.com | 00000020 1d f0 37 35 02 20 39 ce d5 a0 79 f9 9d 7c 5a 84 |..75. 9...y..|Z.| +peer0.org1.example.com | 00000030 75 58 f9 08 53 d8 4a 16 b8 ae ad f2 4e 30 4d 45 |uX..S.J.....N0ME| +peer0.org1.example.com | 00000040 f6 f9 c7 bf 90 86 |......| +peer0.org1.example.com | [103b 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [103c 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 gate 1589998818703239300 evaluation succeeds +peer0.org1.example.com | [103d 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [103e 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [103f 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1040 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1041 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1042 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1043 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1044 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1045 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1046 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1047 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1048 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1049 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [104a 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [104b 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [104c 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [104d 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [104e 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [104f 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1050 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1051 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1052 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1053 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1054 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1055 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1056 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1057 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1058 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1059 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [105a 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [105b 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [105c 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [105d 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [105e 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [105f 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1060 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1061 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1062 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161017 +peer0.org1.example.com | [1063 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE0E666E816BEB9C9855BEB105C144A81C494F3D9FE99A462438229CC8987076 +peer0.org1.example.com | [1064 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1065 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1066 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1067 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1068 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1069 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [106a 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [106b 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [106c 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [106d 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [106e 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [106f 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1070 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1071 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1060 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1061 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1062 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1063 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1064 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1065 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1066 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1067 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1068 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1069 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [106a 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [106b 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [106c 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [106d 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [106e 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [106f 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1070 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1071 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1072 05-20 18:20:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1073 05-20 18:20:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1074 05-20 18:20:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1075 05-20 18:20:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1076 05-20 18:20:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1077 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1078 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1079 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [107a 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [107b 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [107c 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [107d 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [107e 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [107f 05-20 18:20:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1080 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1081 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1082 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1083 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1140 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1141 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1142 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1143 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1144 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1145 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1146 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1147 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1148 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1149 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [114a 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [114b 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [114c 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [114d 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [114e 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [114f 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [1150 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [1151 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1152 05-20 18:20:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1153 05-20 18:20:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec a0 8b 6a 61 33 e1 6b 7e ed 3e 23 98 1f fd bd |...ja3.k~.>#....| +peer1.org1.example.com | 00000010 11 d3 a3 3b 2f c4 f8 9e ef c0 fb 79 14 68 11 f9 |...;/......y.h..| +peer1.org1.example.com | [1154 05-20 18:20:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 4b 85 89 56 59 dd cf 12 be 77 |0E.!..K..VY....w| +peer1.org1.example.com | 00000010 73 7a 84 4f 63 dd c3 52 86 5b ea 86 aa f6 51 9f |sz.Oc..R.[....Q.| +peer1.org1.example.com | 00000020 2d 48 e6 fd bb 02 20 53 5b ef d6 b8 5b 3f 53 41 |-H.... S[...[?SA| +peer1.org1.example.com | 00000030 61 0f 39 29 84 27 a8 e6 09 c1 d2 4f 38 16 fb 3e |a.9).'.....O8..>| +peer1.org1.example.com | 00000040 c0 3f 06 a0 9c e6 3d |.?....=| +peer1.org1.example.com | [1155 05-20 18:20:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1156 05-20 18:20:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1157 05-20 18:20:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1158 05-20 18:20:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [1159 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [115a 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [115b 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [115c 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [115d 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [115e 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1072 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1073 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1074 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1075 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1076 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1077 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1078 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1079 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [107a 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [107b 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [107c 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [107e 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [107d 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [107f 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1080 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1081 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1082 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1083 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 gate 1589998818884466600 evaluation starts +peer0.org1.example.com | [1084 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1085 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1086 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 principal matched by identity 0 +peer0.org1.example.com | [1087 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 17 55 c6 9b df 54 f4 4a dd d3 2c 5e 18 c1 62 |..U...T.J..,^..b| +peer0.org1.example.com | 00000010 49 e9 22 2f 7c ac c6 c7 b8 3c ae 9e 2b 12 05 15 |I."/|....<..+...| +peer0.org1.example.com | [1088 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 60 e7 7a df 7e e1 07 bb 89 7f |0E.!..`.z.~.....| +peer0.org1.example.com | 00000010 4d e7 7f 80 a2 08 5a d9 52 42 d2 d8 80 f5 c9 d5 |M.....Z.RB......| +peer0.org1.example.com | 00000020 4c 19 da a0 2c 02 20 54 d0 07 d5 e0 ec ca 8c 68 |L...,. T.......h| +peer0.org1.example.com | 00000030 bd 74 71 f2 48 ba f0 21 41 17 7a 4b ff da 84 55 |.tq.H..!A.zK...U| +peer0.org1.example.com | 00000040 51 86 04 b5 64 99 02 |Q...d..| +peer0.org1.example.com | [1089 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [108a 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 gate 1589998818884466600 evaluation succeeds +peer0.org1.example.com | [108b 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:19.589 UTC [fsblkstorage] updateCheckpoint -> DEBU 12ba Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97393], isChainEmpty=[false], lastBlockNumber=[5]" +orderer0.example.com | "2020-05-20 18:21:19.589 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 12bb [channel: businesschannel] Wrote block [5]" +orderer0.example.com | "2020-05-20 18:21:19.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12bc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12bd Sending msg of 28 bytes to 3 on channel testchainid took 468.2µs" +orderer0.example.com | "2020-05-20 18:21:19.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 598.2µs " +orderer0.example.com | "2020-05-20 18:21:19.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12bf Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +orderer0.example.com | "2020-05-20 18:21:19.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c0 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2020-05-20 18:21:19.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +orderer0.example.com | "2020-05-20 18:21:19.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.9µs " +orderer0.example.com | "2020-05-20 18:21:19.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:19.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:20.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:20.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c6 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2020-05-20 18:21:20.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 522.6µs " +orderer0.example.com | "2020-05-20 18:21:20.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c8 Sending msg of 28 bytes to 3 on channel businesschannel took 27.9µs" +orderer0.example.com | "2020-05-20 18:21:20.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c9 Sending msg of 28 bytes to 2 on channel businesschannel took 13.9µs" +orderer0.example.com | "2020-05-20 18:21:20.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.5µs " +orderer0.example.com | "2020-05-20 18:21:20.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12cb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 40.1µs " +orderer0.example.com | "2020-05-20 18:21:20.376 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:20.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:20.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ce Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:20.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cf Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-05-20 18:21:20.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +orderer0.example.com | "2020-05-20 18:21:20.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.2µs " +orderer0.example.com | "2020-05-20 18:21:20.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d2 Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" +orderer0.example.com | "2020-05-20 18:21:20.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d3 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +orderer0.example.com | "2020-05-20 18:21:20.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +orderer0.example.com | "2020-05-20 18:21:20.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:20.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:21.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:21.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d8 Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +orderer0.example.com | "2020-05-20 18:21:21.356 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +orderer0.example.com | "2020-05-20 18:21:21.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12da Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +orderer0.example.com | "2020-05-20 18:21:21.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12db Sending msg of 28 bytes to 2 on channel businesschannel took 10.4µs" +orderer0.example.com | "2020-05-20 18:21:21.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.9µs " +orderer0.example.com | "2020-05-20 18:21:21.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12dd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.7µs " +orderer0.example.com | "2020-05-20 18:21:21.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12de Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:21.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12df Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:21.860 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:21.867 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e1 Sending msg of 28 bytes to 3 on channel testchainid took 27.9µs" +orderer0.example.com | "2020-05-20 18:21:21.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +orderer0.example.com | "2020-05-20 18:21:21.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e3 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-05-20 18:21:21.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e4 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2020-05-20 18:21:21.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.4µs " +orderer0.example.com | "2020-05-20 18:21:21.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.7µs " +orderer0.example.com | "2020-05-20 18:21:21.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e7 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:21.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:22.360 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:22.360 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ea Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +orderer0.example.com | "2020-05-20 18:21:22.361 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12eb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 420.4µs " +orderer0.example.com | "2020-05-20 18:21:22.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ec Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +orderer0.example.com | "2020-05-20 18:21:22.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ed Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +orderer0.example.com | "2020-05-20 18:21:22.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " +orderer0.example.com | "2020-05-20 18:21:22.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54µs " +orderer0.example.com | "2020-05-20 18:21:22.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:22.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:22.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:22.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f3 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +orderer0.example.com | "2020-05-20 18:21:22.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.3µs " +orderer0.example.com | "2020-05-20 18:21:22.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f5 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:21:22.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f6 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +orderer0.example.com | "2020-05-20 18:21:22.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.3µs " +orderer0.example.com | "2020-05-20 18:21:22.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.2µs " +orderer0.example.com | "2020-05-20 18:21:22.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:22.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:23.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:23.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fc Sending msg of 28 bytes to 3 on channel testchainid took 6.7µs" +orderer0.example.com | "2020-05-20 18:21:23.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +orderer0.example.com | "2020-05-20 18:21:23.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fe Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2020-05-20 18:21:23.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ff Sending msg of 28 bytes to 3 on channel businesschannel took 28.3µs" +orderer0.example.com | "2020-05-20 18:21:23.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1300 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.6µs " +orderer0.example.com | "2020-05-20 18:21:23.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1301 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.4µs " +orderer0.example.com | "2020-05-20 18:21:23.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1302 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:23.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1303 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:23.549 UTC [orderer.common.server] Deliver -> DEBU 1304 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:23.550 UTC [common.deliver] Handle -> DEBU 1305 Starting new deliver loop for 172.18.0.9:53612" +orderer0.example.com | "2020-05-20 18:21:23.551 UTC [common.deliver] Handle -> DEBU 1306 Attempting to read seek info message from 172.18.0.9:53612" +orderer0.example.com | "2020-05-20 18:21:23.553 UTC [policies] Evaluate -> DEBU 1307 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [115f 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1160 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1161 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1162 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1163 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1164 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1165 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1166 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1167 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1168 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1169 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [116a 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [116b 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [116c 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [116d 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [116e 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [116f 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1170 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1171 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1172 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1173 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1174 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1175 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1176 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd9550 gate 1589998827918428800 evaluation starts +peer1.org1.example.com | [1177 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd9550 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1178 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd9550 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1179 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd9550 principal matched by identity 0 +peer1.org1.example.com | [117a 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [117b 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc002cd9550 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [117d 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd9550 gate 1589998827918428800 evaluation succeeds +peer1.org1.example.com | [117e 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1042 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1043 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0c20 gate 1589998824593737000 evaluation starts +peer1.org2.example.com | [1044 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0c20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1045 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0c20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1046 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1047 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0c20 principal evaluation fails +peer1.org2.example.com | [1048 05-20 18:20:24.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0c20 gate 1589998824593737000 evaluation fails +peer1.org2.example.com | [1049 05-20 18:20:24.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [104a 05-20 18:20:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [104b 05-20 18:20:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [104c 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1190 gate 1589998824649858100 evaluation starts +peer1.org2.example.com | [104d 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1190 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [104e 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1190 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [104f 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1190 principal matched by identity 0 +peer1.org2.example.com | [1050 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1051 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1052 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1053 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1054 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1055 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1190 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1056 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1190 gate 1589998824649858100 evaluation succeeds +peer1.org2.example.com | [1057 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1058 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1059 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [105a 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [105b 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [105c 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [105d 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [105e 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [105f 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [108c 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [108d 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [108e 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [108f 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1090 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1091 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1092 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1093 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1094 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1095 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1096 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1097 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1098 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1099 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [109a 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [109b 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [109c 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [109d 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [109e 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [109f 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10a0 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [10a1 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10a2 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10a3 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10a4 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10a5 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [10a6 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10a7 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10a8 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10a9 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10aa 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ab 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10ac 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ad 05-20 18:20:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10ae 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10af 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [10b0 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [10b1 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10b2 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [10b5 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10b3 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [10b4 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [10b7 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [10b8 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10b9 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [10b6 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ba 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10bc 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10bd 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [10bb 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [10be 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10bf 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10c0 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [10c1 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [10c2 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [10c3 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 gate 1589998819657658800 evaluation starts +peer0.org1.example.com | [10c4 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [10c5 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [10c6 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 principal matched by identity 0 +peer0.org1.example.com | [10c7 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [117f 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1180 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1181 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1182 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1183 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1184 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1185 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1186 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1187 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1188 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1189 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [118a 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [118b 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [118c 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [118d 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [118e 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003141530 gate 1589998827927592400 evaluation starts +peer1.org1.example.com | [118f 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003141530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1190 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003141530 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1191 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003141530 principal matched by identity 0 +peer1.org1.example.com | [1192 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1193 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1194 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003141530 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1195 05-20 18:20:27.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003141530 gate 1589998827927592400 evaluation succeeds +peer1.org1.example.com | [1196 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1197 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1198 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1199 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [119a 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [119b 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [119c 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [119d 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [119e 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [119f 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11a0 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11a1 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11a2 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11a3 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11a4 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11a5 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315c980 gate 1589998827934932200 evaluation starts +peer1.org1.example.com | [11a6 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315c980 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11a7 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315c980 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [11a8 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315c980 principal matched by identity 0 +peer1.org1.example.com | [11a9 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +orderer0.example.com | "2020-05-20 18:21:23.553 UTC [policies] Evaluate -> DEBU 1308 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:23.553 UTC [policies] Evaluate -> DEBU 1309 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:23.553 UTC [policies] Evaluate -> DEBU 130a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:23.554 UTC [policies] Evaluate -> DEBU 130b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:23.554 UTC [msp] DeserializeIdentity -> DEBU 130c Obtaining identity" +orderer0.example.com | "2020-05-20 18:21:23.555 UTC [msp.identity] newIdentity -> DEBU 130d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:23.556 UTC [cauthdsl] func1 -> DEBU 130e 0xc0012457e0 gate 1589998883556301700 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:23.556 UTC [cauthdsl] func2 -> DEBU 130f 0xc0012457e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:23.556 UTC [cauthdsl] func2 -> DEBU 1310 0xc0012457e0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [cauthdsl] func2 -> DEBU 1311 0xc0012457e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [cauthdsl] func2 -> DEBU 1312 0xc0012457e0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [cauthdsl] func1 -> DEBU 1313 0xc0012457e0 gate 1589998883556301700 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [policies] Evaluate -> DEBU 1314 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [policies] Evaluate -> DEBU 1315 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [policies] Evaluate -> DEBU 1316 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [cauthdsl] func1 -> DEBU 1317 0xc00128e9a0 gate 1589998883557556900 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [cauthdsl] func2 -> DEBU 1318 0xc00128e9a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:23.557 UTC [cauthdsl] func2 -> DEBU 1319 0xc00128e9a0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:23.558 UTC [cauthdsl] func2 -> DEBU 131a 0xc00128e9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:23.558 UTC [cauthdsl] func2 -> DEBU 131b 0xc00128e9a0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:23.558 UTC [cauthdsl] func1 -> DEBU 131c 0xc00128e9a0 gate 1589998883557556900 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:23.558 UTC [policies] Evaluate -> DEBU 131d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:23.558 UTC [policies] Evaluate -> DEBU 131e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:23.558 UTC [policies] func1 -> DEBU 131f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:23.558 UTC [policies] Evaluate -> DEBU 1320 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:23.559 UTC [policies] Evaluate -> DEBU 1321 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:23.559 UTC [policies] Evaluate -> DEBU 1322 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:23.559 UTC [policies] Evaluate -> DEBU 1323 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:23.559 UTC [policies] Evaluate -> DEBU 1324 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:23.559 UTC [cauthdsl] func1 -> DEBU 1325 0xc00128f6b0 gate 1589998883559821300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:23.560 UTC [cauthdsl] func2 -> DEBU 1326 0xc00128f6b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:23.560 UTC [cauthdsl] func2 -> DEBU 1327 0xc00128f6b0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:23.560 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1328 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-05-20 18:21:23.560 UTC [msp] Validate -> DEBU 1329 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-05-20 18:21:23.561 UTC [msp] getCertificationChain -> DEBU 132a MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-05-20 18:21:23.561 UTC [cauthdsl] func2 -> DEBU 132b 0xc00128f6b0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:23.561 UTC [msp.identity] Verify -> DEBU 132c Verify: digest = 00000000 d7 2f 77 c0 72 e3 19 03 68 44 7a 30 91 91 b7 a6 |./w.r...hDz0....| +orderer0.example.com | 00000010 7f 5f 62 c6 f3 1b 33 12 e0 49 77 67 13 3c b4 9a |._b...3..Iwg.<..|" +orderer0.example.com | "2020-05-20 18:21:23.561 UTC [msp.identity] Verify -> DEBU 132d Verify: sig = 00000000 30 44 02 20 1d d1 75 b9 8e 37 f5 8c 2d 76 28 27 |0D. ..u..7..-v('| +orderer0.example.com | 00000010 7e 3b cd 5f 5b 84 9c 58 05 c0 a1 7a 3a b8 f2 e6 |~;._[..X...z:...| +orderer0.example.com | 00000020 96 43 7d d8 02 20 4c 88 4a a7 89 31 50 7a 30 a9 |.C}.. L.J..1Pz0.| +orderer0.example.com | 00000030 e9 7e 8a bd 0c 22 66 78 d2 47 b0 07 50 71 8f 43 |.~..."fx.G..Pq.C| +orderer0.example.com | 00000040 fd 05 a1 5c 4d 40 |...\M@|" +orderer0.example.com | "2020-05-20 18:21:23.562 UTC [cauthdsl] func2 -> DEBU 132e 0xc00128f6b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:23.562 UTC [cauthdsl] func1 -> DEBU 132f 0xc00128f6b0 gate 1589998883559821300 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:23.565 UTC [policies] Evaluate -> DEBU 1330 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:23.565 UTC [policies] Evaluate -> DEBU 1331 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:23.566 UTC [policies] Evaluate -> DEBU 1332 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:23.566 UTC [policies] Evaluate -> DEBU 1333 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:23.566 UTC [policies] Evaluate -> DEBU 1334 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:23.567 UTC [policies] Evaluate -> DEBU 1335 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [1084 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1085 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1086 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1087 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1088 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1089 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [108a 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003995f20 gate 1589998820224522200 evaluation starts +peer0.org2.example.com | [108b 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003995f20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [108c 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003995f20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [108d 05-20 18:20:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [108e 05-20 18:20:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [108f 05-20 18:20:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1090 05-20 18:20:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1091 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1092 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1093 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1094 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1095 05-20 18:20:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003995f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1096 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003995f20 principal evaluation fails +peer0.org2.example.com | [1097 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003995f20 gate 1589998820224522200 evaluation fails +peer0.org2.example.com | [1098 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1099 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [109a 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [109b 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ccb80 gate 1589998820274662300 evaluation starts +peer0.org2.example.com | [109c 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ccb80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [109d 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ccb80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [109e 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ccb80 principal matched by identity 0 +peer0.org2.example.com | [109f 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [10a0 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [10a1 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ccb80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [10a2 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ccb80 gate 1589998820274662300 evaluation succeeds +peer0.org2.example.com | [10a3 05-20 18:20:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10a4 05-20 18:20:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10a5 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [10a6 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [10a7 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a8 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1060 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1061 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1062 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1063 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1064 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4390 gate 1589998824731253600 evaluation starts +peer1.org2.example.com | [1065 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4390 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1066 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4390 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1067 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1068 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4390 principal evaluation fails +peer1.org2.example.com | [1069 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4390 gate 1589998824731253600 evaluation fails +peer1.org2.example.com | [106a 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [106b 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [106c 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [106d 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4900 gate 1589998824742047100 evaluation starts +peer1.org2.example.com | [106e 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4900 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [106f 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4900 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1070 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4900 principal matched by identity 0 +peer1.org2.example.com | [1071 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1072 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1073 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4900 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1074 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d4900 gate 1589998824742047100 evaluation succeeds +peer1.org2.example.com | [1075 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1076 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1077 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1078 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1079 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [107a 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [107b 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [107c 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [107e 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [107f 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1080 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [1082 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c8 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003371580 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [10ca 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 gate 1589998819657658800 evaluation succeeds +peer0.org1.example.com | [10cb 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10cc 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10cd 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [10ce 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [10cf 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [10d0 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | [10a9 05-20 18:20:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [10aa 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10ab 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10ac 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [10ad 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [10ae 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [10af 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cdd80 gate 1589998820315703300 evaluation starts +peer0.org2.example.com | [10b0 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cdd80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10b1 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cdd80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [10b2 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cdd80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [10b3 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cdd80 principal evaluation fails +peer0.org2.example.com | [10b4 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cdd80 gate 1589998820315703300 evaluation fails +peer0.org2.example.com | [10b5 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10b6 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10b7 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [10b8 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e42f0 gate 1589998820319424400 evaluation starts +peer0.org2.example.com | [10b9 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e42f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10ba 05-20 18:20:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e42f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [10bb 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e42f0 principal matched by identity 0 +peer0.org2.example.com | [10bc 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [10bd 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [10be 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e42f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [10bf 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e42f0 gate 1589998820319424400 evaluation succeeds +peer0.org2.example.com | [10c0 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10c1 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10c2 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [10c3 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [10c4 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [10c5 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [10c6 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [10c7 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 1336 [channel: businesschannel] Received seekInfo (0xc0011f8c00) start: > stop: > from 172.18.0.9:53612" +orderer0.example.com | "2020-05-20 18:21:23.567 UTC [fsblkstorage] Next -> DEBU 1337 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-05-20 18:21:23.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1338 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93382]" +orderer0.example.com | "2020-05-20 18:21:23.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1339 Remaining bytes=[4011], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:23.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 133a Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93382], bytesOffset=[93384]}" +orderer0.example.com | "2020-05-20 18:21:23.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 133b blockbytes [4009] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:23.568 UTC [common.deliver] deliverBlocks -> DEBU 133c [channel: businesschannel] Delivering block [5] for (0xc0011f8c00) for 172.18.0.9:53612" +orderer0.example.com | "2020-05-20 18:21:23.568 UTC [common.deliver] deliverBlocks -> DEBU 133d [channel: businesschannel] Done delivering to 172.18.0.9:53612 for (0xc0011f8c00)" +orderer0.example.com | "2020-05-20 18:21:23.569 UTC [common.deliver] Handle -> DEBU 133e Waiting for new SeekInfo from 172.18.0.9:53612" +orderer0.example.com | "2020-05-20 18:21:23.569 UTC [common.deliver] Handle -> DEBU 133f Attempting to read seek info message from 172.18.0.9:53612" +orderer0.example.com | "2020-05-20 18:21:23.578 UTC [grpc] infof -> DEBU 1340 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:23.578 UTC [common.deliver] Handle -> WARN 1341 Error reading from 172.18.0.9:53612: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:23.578 UTC [orderer.common.server] func1 -> DEBU 1342 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:23.578 UTC [comm.grpc.server] 1 -> INFO 1343 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53612 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.6118ms +orderer0.example.com | "2020-05-20 18:21:23.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1344 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:23.859 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1345 Sending msg of 28 bytes to 3 on channel testchainid took 146.2µs" +orderer0.example.com | "2020-05-20 18:21:23.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1346 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.7µs " +orderer0.example.com | "2020-05-20 18:21:23.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1347 Sending msg of 28 bytes to 2 on channel businesschannel took 109.2µs" +orderer0.example.com | "2020-05-20 18:21:23.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1348 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +orderer0.example.com | "2020-05-20 18:21:23.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1349 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.6µs " +orderer0.example.com | "2020-05-20 18:21:23.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.7µs " +orderer0.example.com | "2020-05-20 18:21:23.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:23.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:24.085 UTC [orderer.common.server] Deliver -> DEBU 134d Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:24.087 UTC [common.deliver] Handle -> DEBU 134e Starting new deliver loop for 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.088 UTC [common.deliver] Handle -> DEBU 134f Attempting to read seek info message from 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1350 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1351 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1352 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1353 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.093 UTC [cauthdsl] func1 -> DEBU 1355 0xc000ae8dd0 gate 1589998884093720200 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.093 UTC [cauthdsl] func2 -> DEBU 1356 0xc000ae8dd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.093 UTC [cauthdsl] func2 -> DEBU 1357 0xc000ae8dd0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.094 UTC [cauthdsl] func2 -> DEBU 1358 0xc000ae8dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:24.094 UTC [cauthdsl] func2 -> DEBU 1359 0xc000ae8dd0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.094 UTC [cauthdsl] func1 -> DEBU 135a 0xc000ae8dd0 gate 1589998884093720200 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.095 UTC [policies] Evaluate -> DEBU 135b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.095 UTC [policies] Evaluate -> DEBU 135c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.104 UTC [policies] Evaluate -> DEBU 135d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.105 UTC [cauthdsl] func1 -> DEBU 135e 0xc000ae9640 gate 1589998884105421100 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.106 UTC [cauthdsl] func2 -> DEBU 135f 0xc000ae9640 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.106 UTC [cauthdsl] func2 -> DEBU 1360 0xc000ae9640 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.106 UTC [cauthdsl] func2 -> DEBU 1361 0xc000ae9640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:24.107 UTC [cauthdsl] func2 -> DEBU 1362 0xc000ae9640 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.107 UTC [cauthdsl] func1 -> DEBU 1363 0xc000ae9640 gate 1589998884105421100 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.108 UTC [policies] Evaluate -> DEBU 1364 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.108 UTC [policies] Evaluate -> DEBU 1365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [10c8 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10c9 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [10ca 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10cb 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10cc 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10cd 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [10ce 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10cf 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10d0 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [10d1 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [10d2 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [10d3 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04520 gate 1589998820327033900 evaluation starts +peer0.org2.example.com | [10d4 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04520 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10d5 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04520 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [10d6 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [10d7 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04520 principal evaluation fails +peer0.org2.example.com | [10d8 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04520 gate 1589998820327033900 evaluation fails +peer0.org2.example.com | [10d9 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10da 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10db 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [10dc 05-20 18:20:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04a90 gate 1589998820329902500 evaluation starts +peer0.org2.example.com | [10dd 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04a90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10de 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04a90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [10df 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04a90 principal matched by identity 0 +peer0.org2.example.com | [10e0 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [10e1 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [10e2 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04a90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [10e3 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04a90 gate 1589998820329902500 evaluation succeeds +peer0.org2.example.com | [10e4 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10e5 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10e6 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [10e7 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [10e8 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10e9 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:24.109 UTC [policies] func1 -> DEBU 1366 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:24.109 UTC [policies] Evaluate -> DEBU 1367 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:24.109 UTC [policies] Evaluate -> DEBU 1368 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:24.110 UTC [policies] Evaluate -> DEBU 1369 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.110 UTC [policies] Evaluate -> DEBU 136a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.111 UTC [policies] Evaluate -> DEBU 136b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.112 UTC [cauthdsl] func1 -> DEBU 136c 0xc0005be400 gate 1589998884112388200 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.112 UTC [cauthdsl] func2 -> DEBU 136d 0xc0005be400 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.113 UTC [cauthdsl] func2 -> DEBU 136e 0xc0005be400 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.117 UTC [cauthdsl] func2 -> DEBU 136f 0xc0005be400 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:24.117 UTC [msp.identity] Verify -> DEBU 1370 Verify: digest = 00000000 da 29 73 cb c5 16 0f ae 3f d4 92 63 cf e4 45 7a |.)s.....?..c..Ez| +orderer0.example.com | 00000010 d1 c7 19 0e cc 3f 72 fc ac 68 44 f3 31 29 5f f5 |.....?r..hD.1)_.|" +orderer0.example.com | "2020-05-20 18:21:24.117 UTC [msp.identity] Verify -> DEBU 1371 Verify: sig = 00000000 30 44 02 20 7c 21 c6 c6 3c 3c 7e 26 5b c6 80 48 |0D. |!..<<~&[..H| +orderer0.example.com | 00000010 29 5b 0a 2a 19 5f 48 8d 4d 6a 71 e5 5d c3 bd 9b |)[.*._H.Mjq.]...| +orderer0.example.com | 00000020 79 2b da 97 02 20 7d ad c1 95 89 af 97 f8 ca 1d |y+... }.........| +orderer0.example.com | 00000030 88 0b 58 02 8d 8d 47 30 39 a1 44 7d 01 66 bb a9 |..X...G09.D}.f..| +orderer0.example.com | 00000040 c8 b1 4b b6 6a b5 |..K.j.|" +orderer0.example.com | "2020-05-20 18:21:24.128 UTC [cauthdsl] func2 -> DEBU 1372 0xc0005be400 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:24.129 UTC [cauthdsl] func1 -> DEBU 1373 0xc0005be400 gate 1589998884112388200 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:24.129 UTC [policies] Evaluate -> DEBU 1374 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:24.129 UTC [policies] Evaluate -> DEBU 1375 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:24.130 UTC [policies] Evaluate -> DEBU 1376 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:24.130 UTC [policies] Evaluate -> DEBU 1377 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:24.130 UTC [policies] Evaluate -> DEBU 1378 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:24.130 UTC [policies] Evaluate -> DEBU 1379 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:24.132 UTC [common.deliver] deliverBlocks -> DEBU 137a [channel: businesschannel] Received seekInfo (0xc0013d03c0) start: > stop: > from 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.133 UTC [fsblkstorage] Next -> DEBU 137b Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-05-20 18:21:24.133 UTC [fsblkstorage] newBlockfileStream -> DEBU 137c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93382]" +orderer0.example.com | "2020-05-20 18:21:24.134 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 137d Remaining bytes=[4011], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:24.134 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 137e Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93382], bytesOffset=[93384]}" +orderer0.example.com | "2020-05-20 18:21:24.135 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 137f blockbytes [4009] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:24.136 UTC [common.deliver] deliverBlocks -> DEBU 1380 [channel: businesschannel] Delivering block [5] for (0xc0013d03c0) for 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.137 UTC [common.deliver] deliverBlocks -> DEBU 1381 [channel: businesschannel] Done delivering to 172.18.0.9:53614 for (0xc0013d03c0)" +orderer0.example.com | "2020-05-20 18:21:24.137 UTC [common.deliver] Handle -> DEBU 1382 Waiting for new SeekInfo from 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.138 UTC [common.deliver] Handle -> DEBU 1383 Attempting to read seek info message from 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1384 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1385 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1386 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1387 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1388 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.145 UTC [cauthdsl] func1 -> DEBU 1389 0xc000dae9e0 gate 1589998884145971400 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 138a 0xc000dae9e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 138b 0xc000dae9e0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 138c 0xc000dae9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 138d 0xc000dae9e0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [cauthdsl] func1 -> DEBU 138e 0xc000dae9e0 gate 1589998884145971400 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [policies] Evaluate -> DEBU 138f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [policies] Evaluate -> DEBU 1391 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [cauthdsl] func1 -> DEBU 1392 0xc000daf220 gate 1589998884146814400 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 1393 0xc000daf220 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 1394 0xc000daf220 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.147 UTC [cauthdsl] func2 -> DEBU 1395 0xc000daf220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:24.147 UTC [cauthdsl] func2 -> DEBU 1396 0xc000daf220 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.147 UTC [cauthdsl] func1 -> DEBU 1397 0xc000daf220 gate 1589998884146814400 evaluation fails" +peer0.org2.example.com | [10ea 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [10eb 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10ec 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10ed 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [10ee 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [10ef 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [10f0 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05c90 gate 1589998820333745200 evaluation starts +peer0.org2.example.com | [10f1 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05c90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10f2 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05c90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [10f3 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [10f4 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05c90 principal evaluation fails +peer0.org2.example.com | [10f5 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05c90 gate 1589998820333745200 evaluation fails +peer0.org2.example.com | [10f6 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10f7 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10f8 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [10f9 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1c200 gate 1589998820335404800 evaluation starts +peer0.org2.example.com | [10fa 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1c200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10fb 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1c200 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [10fc 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1c200 principal matched by identity 0 +peer0.org2.example.com | [10fd 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [10fe 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [10ff 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1c200 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1100 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1c200 gate 1589998820335404800 evaluation succeeds +peer0.org2.example.com | [1101 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1102 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1103 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1104 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1105 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1106 05-20 18:20:20.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1108 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1109 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:24.148 UTC [policies] Evaluate -> DEBU 1398 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.148 UTC [policies] Evaluate -> DEBU 1399 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.148 UTC [policies] func1 -> DEBU 139a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:24.150 UTC [policies] Evaluate -> DEBU 139b Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:24.150 UTC [policies] Evaluate -> DEBU 139c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:24.151 UTC [policies] Evaluate -> DEBU 139d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.151 UTC [policies] Evaluate -> DEBU 139e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.151 UTC [policies] Evaluate -> DEBU 139f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.151 UTC [cauthdsl] func1 -> DEBU 13a0 0xc000daff20 gate 1589998884151860200 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.152 UTC [cauthdsl] func2 -> DEBU 13a1 0xc000daff20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.152 UTC [cauthdsl] func2 -> DEBU 13a2 0xc000daff20 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.152 UTC [cauthdsl] func2 -> DEBU 13a3 0xc000daff20 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:24.152 UTC [msp.identity] Verify -> DEBU 13a4 Verify: digest = 00000000 d5 b5 73 35 7e 1f be b1 c0 65 ba d1 1b d1 54 a3 |..s5~....e....T.| +orderer0.example.com | 00000010 94 2e 32 6b ad 93 89 28 42 c4 61 c4 d7 b8 b0 3a |..2k...(B.a....:|" +orderer0.example.com | "2020-05-20 18:21:24.152 UTC [msp.identity] Verify -> DEBU 13a5 Verify: sig = 00000000 30 45 02 21 00 90 17 47 db 86 87 57 a1 bb db 5b |0E.!...G...W...[| +orderer0.example.com | 00000010 b9 24 d7 70 12 67 01 37 13 8d 5f b6 4b 1d 1c dc |.$.p.g.7.._.K...| +orderer0.example.com | 00000020 56 34 3d 63 8f 02 20 66 ed bb 3a 52 fb 66 f9 c2 |V4=c.. f..:R.f..| +orderer0.example.com | 00000030 e0 f8 e6 05 ca aa 11 b8 c4 50 4b bc ac 0f 2c 27 |.........PK...,'| +orderer0.example.com | 00000040 75 a3 96 63 32 db a2 |u..c2..|" +orderer0.example.com | "2020-05-20 18:21:24.153 UTC [cauthdsl] func2 -> DEBU 13a6 0xc000daff20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:24.155 UTC [cauthdsl] func1 -> DEBU 13a7 0xc000daff20 gate 1589998884151860200 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:24.155 UTC [policies] Evaluate -> DEBU 13a8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:24.155 UTC [policies] Evaluate -> DEBU 13a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:24.156 UTC [policies] Evaluate -> DEBU 13aa Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:24.156 UTC [policies] Evaluate -> DEBU 13ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:24.156 UTC [policies] Evaluate -> DEBU 13ac Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:24.156 UTC [policies] Evaluate -> DEBU 13ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:24.157 UTC [common.deliver] deliverBlocks -> DEBU 13ae [channel: businesschannel] Received seekInfo (0xc001112100) start: > stop: > from 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.157 UTC [fsblkstorage] Next -> DEBU 13af Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-05-20 18:21:24.157 UTC [fsblkstorage] newBlockfileStream -> DEBU 13b0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56644]" +orderer0.example.com | "2020-05-20 18:21:24.158 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13b1 Remaining bytes=[40749], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:24.166 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13b2 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56644], bytesOffset=[56647]}" +orderer0.example.com | "2020-05-20 18:21:24.167 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13b3 blockbytes [28171] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:24.168 UTC [common.deliver] deliverBlocks -> DEBU 13b4 [channel: businesschannel] Delivering block [2] for (0xc001112100) for 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.172 UTC [common.deliver] deliverBlocks -> DEBU 13b5 [channel: businesschannel] Done delivering to 172.18.0.9:53614 for (0xc001112100)" +orderer0.example.com | "2020-05-20 18:21:24.172 UTC [common.deliver] Handle -> DEBU 13b6 Waiting for new SeekInfo from 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.173 UTC [common.deliver] Handle -> DEBU 13b7 Attempting to read seek info message from 172.18.0.9:53614" +orderer0.example.com | "2020-05-20 18:21:24.188 UTC [grpc] infof -> DEBU 13b8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:24.189 UTC [common.deliver] Handle -> WARN 13b9 Error reading from 172.18.0.9:53614: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:24.190 UTC [orderer.common.server] func1 -> DEBU 13ba Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:24.190 UTC [comm.grpc.server] 1 -> INFO 13bb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53614 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=105.298ms +orderer0.example.com | "2020-05-20 18:21:24.359 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13bc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:24.360 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bd Sending msg of 28 bytes to 3 on channel testchainid took 31.9µs" +orderer0.example.com | "2020-05-20 18:21:24.361 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.7µs " +orderer0.example.com | "2020-05-20 18:21:24.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bf Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +orderer0.example.com | "2020-05-20 18:21:24.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c0 Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" +orderer0.example.com | "2020-05-20 18:21:24.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.7µs " +orderer0.example.com | "2020-05-20 18:21:24.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.5µs " +peer0.org2.example.com | [110a 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [110b 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [110c 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [110d 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [110e 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [110f 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1110 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1111 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1112 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1113 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1114 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1115 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ca70 gate 1589998820357363600 evaluation starts +peer0.org2.example.com | [1116 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ca70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1117 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ca70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1118 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ca70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1119 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ca70 principal evaluation fails +peer0.org2.example.com | [111a 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3ca70 gate 1589998820357363600 evaluation fails +peer0.org2.example.com | [111b 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [111c 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [111d 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [111e 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3cfe0 gate 1589998820364866800 evaluation starts +peer0.org2.example.com | [111f 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3cfe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1120 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3cfe0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1121 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3cfe0 principal matched by identity 0 +peer0.org2.example.com | [1122 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1123 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1124 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3cfe0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1125 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3cfe0 gate 1589998820364866800 evaluation succeeds +peer0.org2.example.com | [1126 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1127 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1128 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1129 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [112a 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [112b 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [112d 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [112e 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [112f 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1130 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1131 05-20 18:20:20.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1132 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1133 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1134 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a608d0 gate 1589998820370273600 evaluation starts +peer0.org2.example.com | [1135 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a608d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1136 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a608d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1137 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a608d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1083 05-20 18:20:24.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1084 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1085 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1086 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1087 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1088 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1089 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9170 gate 1589998824802035000 evaluation starts +peer1.org2.example.com | [108a 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9170 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [108b 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9170 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [108c 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [108d 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9170 principal evaluation fails +peer1.org2.example.com | [108e 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f9170 gate 1589998824802035000 evaluation fails +peer1.org2.example.com | [108f 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1090 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1091 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1092 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f96e0 gate 1589998824802794500 evaluation starts +peer1.org2.example.com | [1093 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f96e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1094 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f96e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1095 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f96e0 principal matched by identity 0 +peer1.org2.example.com | [1096 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1097 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1098 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f96e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1099 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f96e0 gate 1589998824802794500 evaluation succeeds +peer1.org2.example.com | [109a 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [109b 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [109c 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [109d 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [109e 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [109f 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:24.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:24.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [10d1 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [10d2 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [10d3 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10d4 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10d5 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [10d6 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10d7 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10d8 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [10d9 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [10da 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [10db 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 gate 1589998819666387300 evaluation starts +peer0.org1.example.com | [10dc 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [10dd 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [10de 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 principal matched by identity 0 +peer0.org1.example.com | [10df 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [10e0 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [10e1 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [10e2 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 gate 1589998819666387300 evaluation succeeds +peer0.org1.example.com | [10e3 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10e4 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10e5 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [10e6 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [10e7 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10e8 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [10e9 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [10ea 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [10eb 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [10ec 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [10ed 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10ee 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10ef 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [10f0 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10f1 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10f2 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [10f3 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [10f4 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [10f5 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 gate 1589998819680927400 evaluation starts +peer0.org1.example.com | [10f6 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [10f7 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [10f8 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10f9 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10fa 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [10fb 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [11aa 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [11ab 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315c980 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [11ac 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00315c980 gate 1589998827934932200 evaluation succeeds +peer1.org1.example.com | [11ad 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11ae 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11af 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [11b0 05-20 18:20:27.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [11b1 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [11b2 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [11b3 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11b4 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11b5 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11b6 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11b7 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11b8 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11b9 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11ba 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11bb 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317c270 gate 1589998827943460200 evaluation starts +peer1.org1.example.com | [11bc 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317c270 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11bd 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317c270 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [11be 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317c270 principal matched by identity 0 +peer1.org1.example.com | [11bf 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [11c0 05-20 18:20:27.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00317c270 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [11c2 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317c270 gate 1589998827943460200 evaluation succeeds +peer1.org1.example.com | [11c3 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11c4 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11c5 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [11c6 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [11c7 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [11c8 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | [1138 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a608d0 principal evaluation fails +peer0.org2.example.com | [1139 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a608d0 gate 1589998820370273600 evaluation fails +peer0.org2.example.com | [113a 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [113b 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [113c 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [113d 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a60e40 gate 1589998820371702500 evaluation starts +peer0.org2.example.com | [113e 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a60e40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [113f 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a60e40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1140 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a60e40 principal matched by identity 0 +peer0.org2.example.com | [1141 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1142 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1143 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a60e40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1144 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a60e40 gate 1589998820371702500 evaluation succeeds +peer0.org2.example.com | [1145 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1146 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1147 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1148 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1149 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [114a 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [114b 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [114c 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [114d 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [114e 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [114f 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1150 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1151 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1152 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1153 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1154 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1155 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1156 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1157 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1158 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1159 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [115a 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [115b 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [115c 05-20 18:20:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [115d 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [115e 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [115f 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1160 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1161 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1162 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7cbe0 gate 1589998820380573100 evaluation starts +peer0.org2.example.com | [1163 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7cbe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1164 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7cbe0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1165 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7cbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1166 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7cbe0 principal evaluation fails +peer0.org2.example.com | [1167 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7cbe0 gate 1589998820380573100 evaluation fails +orderer0.example.com | "2020-05-20 18:21:24.513 UTC [orderer.common.server] Deliver -> DEBU 13c5 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:24.513 UTC [common.deliver] Handle -> DEBU 13c6 Starting new deliver loop for 172.18.0.9:53616" +orderer0.example.com | "2020-05-20 18:21:24.514 UTC [common.deliver] Handle -> DEBU 13c7 Attempting to read seek info message from 172.18.0.9:53616" +orderer0.example.com | "2020-05-20 18:21:24.517 UTC [policies] Evaluate -> DEBU 13c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.517 UTC [policies] Evaluate -> DEBU 13c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.518 UTC [policies] Evaluate -> DEBU 13ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.519 UTC [policies] Evaluate -> DEBU 13cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.519 UTC [policies] Evaluate -> DEBU 13cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.519 UTC [cauthdsl] func1 -> DEBU 13cd 0xc000cbabd0 gate 1589998884519887900 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.520 UTC [cauthdsl] func2 -> DEBU 13ce 0xc000cbabd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.521 UTC [cauthdsl] func2 -> DEBU 13cf 0xc000cbabd0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.521 UTC [cauthdsl] func2 -> DEBU 13d0 0xc000cbabd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:24.522 UTC [cauthdsl] func2 -> DEBU 13d1 0xc000cbabd0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.523 UTC [cauthdsl] func1 -> DEBU 13d2 0xc000cbabd0 gate 1589998884519887900 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.524 UTC [policies] Evaluate -> DEBU 13d3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.524 UTC [policies] Evaluate -> DEBU 13d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.525 UTC [policies] Evaluate -> DEBU 13d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.525 UTC [cauthdsl] func1 -> DEBU 13d6 0xc000cbb530 gate 1589998884525792900 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.525 UTC [cauthdsl] func2 -> DEBU 13d7 0xc000cbb530 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.526 UTC [cauthdsl] func2 -> DEBU 13d8 0xc000cbb530 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.526 UTC [cauthdsl] func2 -> DEBU 13d9 0xc000cbb530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:24.527 UTC [cauthdsl] func2 -> DEBU 13da 0xc000cbb530 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.527 UTC [cauthdsl] func1 -> DEBU 13db 0xc000cbb530 gate 1589998884525792900 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.527 UTC [policies] Evaluate -> DEBU 13dc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.528 UTC [policies] Evaluate -> DEBU 13dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.528 UTC [policies] func1 -> DEBU 13de Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:24.528 UTC [policies] Evaluate -> DEBU 13df Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:24.529 UTC [policies] Evaluate -> DEBU 13e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:24.529 UTC [policies] Evaluate -> DEBU 13e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.530 UTC [policies] Evaluate -> DEBU 13e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.530 UTC [policies] Evaluate -> DEBU 13e3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.531 UTC [cauthdsl] func1 -> DEBU 13e4 0xc000c8a220 gate 1589998884531065100 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.531 UTC [cauthdsl] func2 -> DEBU 13e5 0xc000c8a220 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.531 UTC [cauthdsl] func2 -> DEBU 13e6 0xc000c8a220 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.531 UTC [cauthdsl] func2 -> DEBU 13e7 0xc000c8a220 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:24.531 UTC [msp.identity] Verify -> DEBU 13e8 Verify: digest = 00000000 34 3f 71 29 06 d2 e7 0a 25 71 28 7c 59 c8 d3 29 |4?q)....%q(|Y..)| +orderer0.example.com | 00000010 f1 ee c6 68 ed 54 89 dc b2 a2 69 d9 a3 2d af 46 |...h.T....i..-.F|" +orderer0.example.com | "2020-05-20 18:21:24.532 UTC [msp.identity] Verify -> DEBU 13e9 Verify: sig = 00000000 30 45 02 21 00 f4 b7 a6 e6 0b 48 e9 04 e6 46 f4 |0E.!......H...F.| +orderer0.example.com | 00000010 ff f5 80 b3 01 53 c6 8e 7c 7e fe b9 34 35 b7 72 |.....S..|~..45.r| +orderer0.example.com | 00000020 4e cc 44 ee da 02 20 57 b4 cf 35 d8 c7 e6 10 6d |N.D... W..5....m| +orderer0.example.com | 00000030 da 70 ce 38 9b 80 50 64 66 b2 53 ff 33 1a 7d 12 |.p.8..Pdf.S.3.}.| +orderer0.example.com | 00000040 f8 0f 7f 2c 28 29 de |...,().|" +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [cauthdsl] func2 -> DEBU 13ea 0xc000c8a220 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [cauthdsl] func1 -> DEBU 13eb 0xc000c8a220 gate 1589998884531065100 evaluation succeeds" +peer0.org2.example.com | [1168 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1169 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [116a 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [116b 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d150 gate 1589998820382297500 evaluation starts +peer0.org2.example.com | [116c 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d150 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [116d 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d150 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [116e 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d150 principal matched by identity 0 +peer0.org2.example.com | [116f 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer0.org2.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +peer0.org2.example.com | [1170 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer0.org2.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer0.org2.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer0.org2.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer0.org2.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer0.org2.example.com | [1171 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d150 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1172 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d150 gate 1589998820382297500 evaluation succeeds +peer0.org2.example.com | [1173 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1174 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1175 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1176 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1177 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1178 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1179 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [117a 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [117b 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [117c 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117d 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117e 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117f 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1180 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1181 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1182 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1183 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1184 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1185 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1186 05-20 18:20:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1187 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1188 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1189 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10fc 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10fd 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [10fe 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [10ff 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1100 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1101 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 principal matched by identity 0 +peer0.org1.example.com | [1102 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1103 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0034f77d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1105 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 gate 1589998819680927400 evaluation succeeds +peer0.org1.example.com | [1106 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1107 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1108 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1109 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [110a 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110b 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110c 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [110d 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [110e 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [110f 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1110 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1111 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1112 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 gate 1589998819698077100 evaluation starts +peer0.org1.example.com | [1113 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1114 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1115 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 principal matched by identity 0 +peer0.org1.example.com | [1116 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1117 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1118 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1119 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 gate 1589998819698077100 evaluation succeeds +peer0.org1.example.com | [111a 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [111b 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [111c 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [111d 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [111e 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [111f 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1120 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1121 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1122 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [118a 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [118b 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [118c 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [118d 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [118e 05-20 18:20:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [118f 05-20 18:20:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1190 05-20 18:20:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1191 05-20 18:20:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1192 05-20 18:20:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1193 05-20 18:20:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1194 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1196 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1195 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1197 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1198 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1199 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [119a 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [119b 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [119c 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [119d 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [119e 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [119f 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [11a0 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11a1 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [11a2 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [11a3 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11a4 05-20 18:20:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [11a5 05-20 18:20:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161019 +peer0.org2.example.com | [11a6 05-20 18:20:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F430A52BB7F4EF9467E2EF6DFAF3F1C89D1CD8DEDC12A40549BF789D532D6FF8 +peer0.org2.example.com | [11a7 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [11a8 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1123 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1124 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1125 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1126 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1127 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1128 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1129 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 gate 1589998819708201200 evaluation starts +peer0.org1.example.com | [112a 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [112b 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [112c 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 principal matched by identity 0 +peer0.org1.example.com | [112d 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [112e 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [112f 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1130 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 gate 1589998819708201200 evaluation succeeds +peer0.org1.example.com | [1131 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1132 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1133 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1134 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1135 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1136 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1137 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1138 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1139 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [113a 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [113b 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [113c 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13ec Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13ed == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [11c9 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11ca 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [11cb 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [11cc 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [11cd 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [11ce 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [11cf 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11d0 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11d1 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11d2 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11d3 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11d4 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11d5 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11d6 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11d7 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003194ae0 gate 1589998827951818300 evaluation starts +peer1.org1.example.com | [11d8 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003194ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11d9 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003194ae0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [11da 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003194ae0 principal matched by identity 0 +peer1.org1.example.com | [11db 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [11dc 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [11dd 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003194ae0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [11de 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003194ae0 gate 1589998827951818300 evaluation succeeds +peer1.org1.example.com | [11df 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11e0 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11e1 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [11e2 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [11e3 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11e4 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11e5 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11e6 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11e7 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11e8 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11e9 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11ea 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11eb 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003195ce0 gate 1589998827958417600 evaluation starts +peer1.org1.example.com | [11ec 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003195ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11ed 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003195ce0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [11ee 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003195ce0 principal matched by identity 0 +peer1.org1.example.com | [11ef 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [11f0 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003195ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [11f2 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003195ce0 gate 1589998827958417600 evaluation succeeds +peer1.org1.example.com | [11f3 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11f4 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11a9 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [11aa 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11ab 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11ac 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11ad 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11ae 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11af 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [11b0 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11b1 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [11b2 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11b3 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [11b4 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11b5 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [11b6 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11b7 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [11b8 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [11b9 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +peer0.org2.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +peer0.org2.example.com | [11ba 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +peer0.org2.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +peer0.org2.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer0.org2.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer0.org2.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer0.org2.example.com | [11bb 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [11bc 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [11bd 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 4c 53 be 39 25 95 77 f2 6f 0b 69 |0D. .LS.9%.w.o.i| +peer0.org2.example.com | 00000010 1a 2d 52 ac 24 18 5e f1 55 a1 99 c0 90 dc 1c ba |.-R.$.^.U.......| +peer0.org2.example.com | 00000020 99 eb b5 66 02 20 36 f7 92 66 f8 0d 13 e2 c3 66 |...f. 6..f.....f| +peer0.org2.example.com | 00000030 eb 44 39 f8 4c 79 7b 41 e4 da 61 7b 5e 56 fb 28 |.D9.Ly{A..a{^V.(| +peer0.org2.example.com | 00000040 c0 1d ae 28 70 1e |...(p.| +peer0.org2.example.com | [11be 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [11bf 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [11c0 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11c1 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11c2 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [11c4 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [11c3 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11c5 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [11c6 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +peer0.org2.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +peer0.org2.example.com | [11c7 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +peer0.org2.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +peer0.org2.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer0.org2.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer0.org2.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer0.org2.example.com | [11c8 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [11c9 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [11ca 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11cb 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11cc 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [11cd 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [11ce 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11cf 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [11d0 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11d1 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11d2 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [11d3 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [11d4 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [11d5 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae72f0 gate 1589998820697496700 evaluation starts +peer0.org2.example.com | [11d6 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae72f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [11d7 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae72f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [11d8 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae72f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [11d9 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae72f0 principal evaluation fails +peer0.org2.example.com | [11da 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae72f0 gate 1589998820697496700 evaluation fails +peer0.org2.example.com | [11db 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11dc 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11dd 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [11de 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae7860 gate 1589998820698767400 evaluation starts +peer0.org2.example.com | [11df 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11e0 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae7860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [11e1 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae7860 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [11e2 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae7860 principal matched by identity 0 +peer0.org2.example.com | [11e3 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer0.org2.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +peer0.org2.example.com | [11e4 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer0.org2.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer0.org2.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer0.org2.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer0.org2.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer0.org2.example.com | [11e5 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae7860 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [11e6 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae7860 gate 1589998820698767400 evaluation succeeds +peer0.org2.example.com | [11e7 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [11f5 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [11f6 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [11f7 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11f8 05-20 18:20:27.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11f9 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11fa 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [11fb 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11fc 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11fd 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11fe 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ff 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1200 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1201 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1202 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1203 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1204 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1205 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1206 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1207 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1208 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1209 05-20 18:20:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [120a 05-20 18:20:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816101F +peer1.org1.example.com | [120b 05-20 18:20:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A84316863155C43165ED507A05D4D0D85CF857C38C575D69EF9FA30DF7F137B3 +peer1.org1.example.com | [120c 05-20 18:20:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [120d 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [120e 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [120f 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1210 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1211 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1212 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1213 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1214 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1215 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1217 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1218 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [113d 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [113e 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [113f 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 gate 1589998819718485700 evaluation starts +peer0.org1.example.com | [1140 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1141 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1142 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 principal matched by identity 0 +peer0.org1.example.com | [1143 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1144 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00368d800 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1146 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 gate 1589998819718485700 evaluation succeeds +peer0.org1.example.com | [1147 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1148 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1149 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [114a 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [114b 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [114c 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [114d 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [114e 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [114f 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1150 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1151 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1152 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1153 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1154 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1155 05-20 18:20:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1156 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1157 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1158 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1159 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [115a 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [115b 05-20 18:20:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [115c 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [115d 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [115e 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [115f 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1160 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1161 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1162 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1163 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1219 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [121b 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [121a 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [121c 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1216 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [121d 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [121e 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [121f 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1220 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1221 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1223 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1224 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1225 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1222 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1227 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1226 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1228 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1229 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [122a 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [122b 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [122c 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [122d 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161020 +peer1.org1.example.com | [122e 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8581B6CADCE33556C1F85A0FB8A59AF350B361E8CE21C644334942587E09361F +peer1.org1.example.com | [122f 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1230 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1231 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1232 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1234 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1233 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1235 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10a0 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [10a1 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10a2 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10a3 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [10a4 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [10a5 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [10a6 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148e0 gate 1589998824805700900 evaluation starts +peer1.org2.example.com | [10a7 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10a8 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [10a9 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [10aa 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148e0 principal evaluation fails +peer1.org2.example.com | [10ab 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039148e0 gate 1589998824805700900 evaluation fails +peer1.org2.example.com | [10ac 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10ad 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10ae 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [10af 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003914e50 gate 1589998824808967900 evaluation starts +peer1.org2.example.com | [10b0 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003914e50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10b1 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003914e50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [10b2 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003914e50 principal matched by identity 0 +peer1.org2.example.com | [10b3 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [10b4 05-20 18:20:24.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [10b5 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003914e50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [10b6 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003914e50 gate 1589998824808967900 evaluation succeeds +peer1.org2.example.com | [10b7 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10b8 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10b9 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [10ba 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [10bb 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [10bc 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [10bd 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10be 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [10bf 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [10c0 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [10c1 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10c2 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [10c3 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [10c4 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10c5 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13ee Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13f0 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:24.536 UTC [common.deliver] deliverBlocks -> DEBU 13f2 [channel: businesschannel] Received seekInfo (0xc001113300) start: > stop: > from 172.18.0.9:53616" +orderer0.example.com | "2020-05-20 18:21:24.539 UTC [fsblkstorage] Next -> DEBU 13f3 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-05-20 18:21:24.539 UTC [fsblkstorage] newBlockfileStream -> DEBU 13f4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-05-20 18:21:24.539 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f5 Remaining bytes=[97393], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:24.539 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f6 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-05-20 18:21:24.539 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f7 blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:24.539 UTC [common.deliver] deliverBlocks -> DEBU 13f8 [channel: businesschannel] Delivering block [0] for (0xc001113300) for 172.18.0.9:53616" +orderer0.example.com | "2020-05-20 18:21:24.540 UTC [common.deliver] deliverBlocks -> DEBU 13f9 [channel: businesschannel] Done delivering to 172.18.0.9:53616 for (0xc001113300)" +orderer0.example.com | "2020-05-20 18:21:24.540 UTC [common.deliver] Handle -> DEBU 13fa Waiting for new SeekInfo from 172.18.0.9:53616" +orderer0.example.com | "2020-05-20 18:21:24.540 UTC [common.deliver] Handle -> DEBU 13fb Attempting to read seek info message from 172.18.0.9:53616" +orderer0.example.com | "2020-05-20 18:21:24.557 UTC [grpc] infof -> DEBU 13fc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:24.558 UTC [common.deliver] Handle -> WARN 13fd Error reading from 172.18.0.9:53616: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:24.558 UTC [orderer.common.server] func1 -> DEBU 13fe Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:24.559 UTC [comm.grpc.server] 1 -> INFO 13ff streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53616 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.9936ms +orderer0.example.com | "2020-05-20 18:21:24.809 UTC [orderer.common.server] Deliver -> DEBU 1400 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:24.809 UTC [common.deliver] Handle -> DEBU 1401 Starting new deliver loop for 172.18.0.9:53618" +orderer0.example.com | "2020-05-20 18:21:24.809 UTC [common.deliver] Handle -> DEBU 1402 Attempting to read seek info message from 172.18.0.9:53618" +orderer0.example.com | "2020-05-20 18:21:24.810 UTC [policies] Evaluate -> DEBU 1403 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.811 UTC [policies] Evaluate -> DEBU 1404 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.811 UTC [policies] Evaluate -> DEBU 1405 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.811 UTC [policies] Evaluate -> DEBU 1406 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:24.812 UTC [policies] Evaluate -> DEBU 1407 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.812 UTC [cauthdsl] func1 -> DEBU 1408 0xc0003bdcd0 gate 1589998884812277700 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.812 UTC [cauthdsl] func2 -> DEBU 1409 0xc0003bdcd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.812 UTC [cauthdsl] func2 -> DEBU 140a 0xc0003bdcd0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.812 UTC [cauthdsl] func2 -> DEBU 140b 0xc0003bdcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:24.813 UTC [cauthdsl] func2 -> DEBU 140c 0xc0003bdcd0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.813 UTC [cauthdsl] func1 -> DEBU 140d 0xc0003bdcd0 gate 1589998884812277700 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.813 UTC [policies] Evaluate -> DEBU 140e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.813 UTC [policies] Evaluate -> DEBU 140f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.814 UTC [policies] Evaluate -> DEBU 1410 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.814 UTC [cauthdsl] func1 -> DEBU 1411 0xc00004e5b0 gate 1589998884814517500 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:24.814 UTC [cauthdsl] func2 -> DEBU 1412 0xc00004e5b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:24.814 UTC [cauthdsl] func2 -> DEBU 1413 0xc00004e5b0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:24.815 UTC [cauthdsl] func2 -> DEBU 1414 0xc00004e5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:24.815 UTC [cauthdsl] func2 -> DEBU 1415 0xc00004e5b0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.815 UTC [cauthdsl] func1 -> DEBU 1416 0xc00004e5b0 gate 1589998884814517500 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:24.816 UTC [policies] Evaluate -> DEBU 1417 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.816 UTC [policies] Evaluate -> DEBU 1418 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:24.816 UTC [policies] func1 -> DEBU 1419 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:24.816 UTC [policies] Evaluate -> DEBU 141a Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:24.817 UTC [policies] Evaluate -> DEBU 141b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:24.817 UTC [policies] Evaluate -> DEBU 141c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:24.817 UTC [policies] Evaluate -> DEBU 141d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [1164 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1165 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1166 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1167 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1168 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1169 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [116a 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [116b 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer0.org1.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +peer0.org1.example.com | [116c 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer0.org1.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer0.org1.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer0.org1.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer0.org1.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer0.org1.example.com | [116d 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [116e 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 57 9e c3 0a c0 6c 0b 8d 97 3d |0E.!..W....l...=| +peer0.org1.example.com | 00000010 31 10 db 43 4f 10 02 b1 d1 11 c8 1f 51 84 45 75 |1..CO.......Q.Eu| +peer0.org1.example.com | 00000020 47 3a eb a3 09 02 20 1b e8 84 10 4c d7 5f 0f 3e |G:.... ....L._.>| +peer0.org1.example.com | 00000030 74 51 d9 be 09 9d f8 7e 54 19 19 fe 27 ac 29 54 |tQ.....~T...'.)T| +peer0.org1.example.com | 00000040 22 83 8a 9c 16 3f 22 |"....?"| +peer0.org1.example.com | [116f 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1170 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [1171 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1172 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1173 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1174 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1175 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1176 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1177 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1178 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1179 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [117a 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1236 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1237 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1239 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1238 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [123a 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [123c 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [123b 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [123d 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [123e 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [123f 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1240 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1241 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1242 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1243 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1244 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1245 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1246 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1247 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1248 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1249 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer1.org1.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +peer1.org1.example.com | [124a 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +peer1.org1.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +peer1.org1.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +peer1.org1.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +peer1.org1.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +peer1.org2.example.com | [10c6 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10c7 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [10c8 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10c9 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ca 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10cb 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [10cc 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [10cd 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10ce 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10cf 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [10d0 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [10d1 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [10d2 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b080 gate 1589998824824125300 evaluation starts +peer1.org2.example.com | [10d3 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b080 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10d4 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b080 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [10d5 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [10d6 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b080 principal evaluation fails +peer1.org2.example.com | [10d7 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b080 gate 1589998824824125300 evaluation fails +peer1.org2.example.com | [10d8 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10d9 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10da 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [10db 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [10dc 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b5f0 gate 1589998824825956200 evaluation starts +peer1.org2.example.com | [10dd 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b5f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10de 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b5f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [10df 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b5f0 principal matched by identity 0 +peer1.org2.example.com | [10e0 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [10e1 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [10e2 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b5f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [10e3 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392b5f0 gate 1589998824825956200 evaluation succeeds +peer0.org1.example.com | [117b 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > alive: +peer0.org1.example.com | [117c 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [117d 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [117e 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [117f 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1180 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1181 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1182 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1183 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1184 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1185 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1186 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1187 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1188 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1189 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [118a 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [118b 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [118c 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [118d 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [118e 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [118f 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1190 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1191 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1192 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1193 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1194 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1195 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1196 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1197 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1198 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1199 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [119a 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [119b 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 gate 1589998820671940100 evaluation starts +peer0.org1.example.com | [119c 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [119d 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [119e 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 principal matched by identity 0 +peer0.org1.example.com | [119f 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +peer0.org1.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +peer0.org1.example.com | [11a0 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +peer0.org1.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +peer0.org1.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer0.org1.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer0.org1.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer0.org1.example.com | [11a1 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11a2 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 gate 1589998820671940100 evaluation succeeds +peer0.org1.example.com | [11a3 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11a4 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11a5 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11a6 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [11e8 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10e4 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10e5 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10e6 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [124b 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | "2020-05-20 18:21:24.817 UTC [policies] Evaluate -> DEBU 141e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [10e7 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [10e8 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2020-05-20 18:21:24.818 UTC [cauthdsl] func1 -> DEBU 141f 0xc00004f3c0 gate 1589998884818199900 evaluation starts" +peer0.org2.example.com | [11e9 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [10e9 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [124c 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 79 2c 4d 70 44 7b 24 49 9f b2 |0E.!..y,MpD{$I..| +peer0.org1.example.com | [11a7 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:24.818 UTC [cauthdsl] func2 -> DEBU 1420 0xc00004f3c0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [11ea 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [10ea 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 e5 54 8f 26 f9 e1 9a ff fc 4b 8c 78 ce da fb 41 |.T.&.....K.x...A| +peer0.org1.example.com | [11a8 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-05-20 18:21:24.818 UTC [cauthdsl] func2 -> DEBU 1421 0xc00004f3c0 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [11eb 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10eb 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 29 b6 12 13 0a 02 20 21 41 86 39 0b 6c 59 53 04 |)..... !A.9.lYS.| +peer0.org1.example.com | [11a9 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:24.818 UTC [cauthdsl] func2 -> DEBU 1422 0xc00004f3c0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:24.819 UTC [msp.identity] Verify -> DEBU 1423 Verify: digest = 00000000 7a 5d d6 e4 3b 6a af fe 85 e4 75 5b b5 6d ea 45 |z]..;j....u[.m.E| +peer1.org2.example.com | [10ec 05-20 18:20:24.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 06 a9 50 a2 5d b8 0a 3c a3 63 a6 d2 3f e6 ab b5 |..P.]..<.c..?...| +peer0.org1.example.com | [11aa 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [11ab 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [10ee 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer0.org2.example.com | [11ec 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 3b 3b b4 95 d4 25 7d |;;...%}| +peer0.org1.example.com | [11ac 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 70 b3 7e 37 08 bb 3f 7c 72 97 f8 59 ca b0 84 8f |p.~7..?|r..Y....|" +peer1.org2.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer0.org2.example.com | [11ed 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [124d 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [11ad 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:24.819 UTC [msp.identity] Verify -> DEBU 1424 Verify: sig = 00000000 30 45 02 21 00 a5 f8 5d f4 32 f6 88 e0 73 b4 67 |0E.!...].2...s.g| +peer1.org2.example.com | [10ef 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer0.org2.example.com | [11ee 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +peer1.org1.example.com | [124e 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [11ae 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +orderer0.example.com | 00000010 22 a2 24 7d 3e 1d a5 21 64 90 e6 b3 47 f7 90 23 |".$}>..!d...G..#| +peer1.org2.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer0.org2.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +peer1.org1.example.com | [124f 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11af 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 58 37 f8 16 92 02 20 0a ed af 02 b1 34 60 ee 32 |X7.... .....4`.2| +peer1.org2.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer0.org2.example.com | [11ef 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +peer1.org1.example.com | [1250 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11b0 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 f8 21 e5 3d 1d c7 0f 59 3f e2 48 df 68 72 d0 94 |.!.=...Y?.H.hr..| +peer1.org2.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer0.org2.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +peer1.org1.example.com | [1251 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [11b1 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000040 fa 46 34 c2 0b ac fb |.F4....|" +peer1.org2.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer0.org2.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer1.org1.example.com | [1252 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [11b2 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:24.819 UTC [cauthdsl] func2 -> DEBU 1425 0xc00004f3c0 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [10ed 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer1.org1.example.com | [1253 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:24.820 UTC [cauthdsl] func1 -> DEBU 1426 0xc00004f3c0 gate 1589998884818199900 evaluation succeeds" +peer0.org1.example.com | [11b3 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [10f0 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer1.org1.example.com | [1254 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:24.820 UTC [policies] Evaluate -> DEBU 1427 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:24.820 UTC [policies] Evaluate -> DEBU 1428 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:24.820 UTC [policies] Evaluate -> DEBU 1429 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:24.820 UTC [policies] Evaluate -> DEBU 142a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:24.821 UTC [policies] Evaluate -> DEBU 142b Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [10f1 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:24.821 UTC [policies] Evaluate -> DEBU 142c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [10f2 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039427f0 gate 1589998824845497800 evaluation starts +peer0.org1.example.com | [11b5 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11f0 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10f3 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039427f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [11b4 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:24.821 UTC [common.deliver] deliverBlocks -> DEBU 142d [channel: businesschannel] Received seekInfo (0xc001113900) start: > stop: > from 172.18.0.9:53618" +peer1.org1.example.com | [1255 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [11f1 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [11f2 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10f4 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039427f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [10f5 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039427f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [11b6 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10f6 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039427f0 principal evaluation fails +peer1.org1.example.com | [1256 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11f3 05-20 18:20:20.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:24.821 UTC [fsblkstorage] Next -> DEBU 142e Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer0.org1.example.com | [11b7 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | [10f7 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039427f0 gate 1589998824845497800 evaluation fails +peer1.org1.example.com | [1257 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:24.822 UTC [fsblkstorage] newBlockfileStream -> DEBU 142f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28474]" +peer0.org1.example.com | [11b8 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org2.example.com | [10f8 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10f9 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:24.822 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1430 Remaining bytes=[68919], Going to peek [8] bytes" +peer0.org1.example.com | [11b9 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [10fa 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:24.823 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1431 Returning blockbytes - length=[28167], placementInfo={fileNum=[0], startOffset=[28474], bytesOffset=[28477]}" +peer0.org2.example.com | [11f4 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1258 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11ba 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610051801 +peer1.org2.example.com | [10fb 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942d60 gate 1589998824846080200 evaluation starts +orderer0.example.com | "2020-05-20 18:21:24.823 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1432 blockbytes [28167] read from file [0]" +peer0.org2.example.com | [11f5 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1259 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11bb 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4640DA97C9A7C9E4FC52C8A6C530F145851A530BF010D1E7F417A1DDDAAB46F9 +peer1.org2.example.com | [10fc 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942d60 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:24.823 UTC [common.deliver] deliverBlocks -> DEBU 1433 [channel: businesschannel] Delivering block [1] for (0xc001113900) for 172.18.0.9:53618" +peer0.org2.example.com | [11f6 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125a 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11bc 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org2.example.com | [10fd 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942d60 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:24.824 UTC [common.deliver] deliverBlocks -> DEBU 1434 [channel: businesschannel] Done delivering to 172.18.0.9:53618 for (0xc001113900)" +peer0.org2.example.com | [11f7 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125b 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [11bd 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10fe 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942d60 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:24.824 UTC [common.deliver] Handle -> DEBU 1435 Waiting for new SeekInfo from 172.18.0.9:53618" +peer0.org2.example.com | [11f8 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125c 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [11be 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ff 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:24.824 UTC [common.deliver] Handle -> DEBU 1436 Attempting to read seek info message from 172.18.0.9:53618" +orderer0.example.com | "2020-05-20 18:21:24.830 UTC [common.deliver] Handle -> WARN 1437 Error reading from 172.18.0.9:53618: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [11bf 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:24.830 UTC [orderer.common.server] func1 -> DEBU 1438 Closing Deliver stream" +peer0.org2.example.com | [11f9 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125d 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032705a0 gate 1589998828450912400 evaluation starts +peer1.org2.example.com | [1100 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | [11c0 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:24.830 UTC [comm.grpc.server] 1 -> INFO 1439 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53618 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.023ms +peer0.org2.example.com | [11fa 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125e 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032705a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | [11c1 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:24.830 UTC [grpc] infof -> DEBU 143a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [11fb 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [125f 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032705a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [11fc 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1260 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032705a0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:24.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1102 05-20 18:20:24.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [11c2 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11c3 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [11c4 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11c5 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1103 05-20 18:20:24.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 50 d0 c5 ef e9 41 76 a1 6b af |0E.!..P....Av.k.| +peer1.org2.example.com | 00000010 ef da 45 87 05 ea 18 bc c4 f8 54 dd 0d ce 60 1e |..E.......T...`.| +peer1.org2.example.com | 00000020 78 3d 53 5d 7b 02 20 3b 9a 71 a4 24 fe 28 a4 22 |x=S]{. ;.q.$.(."| +peer1.org2.example.com | 00000030 bf 7c 46 51 38 c0 7c a4 c7 20 fd 9e 83 94 16 ec |.|FQ8.|.. ......| +peer1.org2.example.com | 00000040 dc 68 58 d6 8f 4b 45 |.hX..KE| +peer1.org2.example.com | [1106 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1107 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [1101 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942d60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1109 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003942d60 gate 1589998824846080200 evaluation succeeds +peer1.org2.example.com | [110a 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [110b 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [110c 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [110d 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1108 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [110e 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [110f 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1110 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1111 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1112 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1113 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [1114 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1115 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1116 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1117 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [1118 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1119 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1105 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [111a 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816101D +peer1.org2.example.com | [111b 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7B67A22C3DF5778F3CF2D35E93D7D0AB89A17B87C2C103DB05B7FFEC83B8EC3C +peer1.org2.example.com | [111c 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [111d 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [111e 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [111f 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1120 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1121 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1122 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1123 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1124 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1104 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1125 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1126 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1127 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1128 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1129 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [112a 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [112b 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [112c 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [112d 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [112e 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [112f 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1130 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1131 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org1.example.com | [11c6 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [11c7 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [11c8 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [11c9 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [11cb 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11ca 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [11cc 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [11ce 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [11cd 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [11cf 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d0 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:24.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143c Sending msg of 28 bytes to 3 on channel testchainid took 31.2µs" +orderer0.example.com | "2020-05-20 18:21:24.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118µs " +orderer0.example.com | "2020-05-20 18:21:24.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143e Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +orderer0.example.com | "2020-05-20 18:21:24.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143f Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2020-05-20 18:21:24.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1440 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 347.6µs " +orderer0.example.com | "2020-05-20 18:21:24.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1441 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.4µs " +orderer0.example.com | "2020-05-20 18:21:24.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1442 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:24.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1443 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:25.101 UTC [orderer.common.server] Deliver -> DEBU 1444 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:25.101 UTC [common.deliver] Handle -> DEBU 1445 Starting new deliver loop for 172.18.0.9:53620" +orderer0.example.com | "2020-05-20 18:21:25.101 UTC [common.deliver] Handle -> DEBU 1446 Attempting to read seek info message from 172.18.0.9:53620" +orderer0.example.com | "2020-05-20 18:21:25.101 UTC [policies] Evaluate -> DEBU 1447 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1133 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1134 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1135 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1136 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1137 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1139 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1138 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [113a 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [113b 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [113c 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [113d 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [113e 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [113f 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1140 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1141 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1142 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1143 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1144 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1145 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1146 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1147 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1148 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1149 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [114a 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [114b 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [114c 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [114d 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer1.org2.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer1.org2.example.com | [114e 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer1.org2.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer1.org2.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer1.org2.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer1.org2.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer1.org2.example.com | [114f 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1150 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 7a 13 05 8a 24 d0 51 5a 68 a1 63 |0D. qz...$.QZh.c| +peer1.org2.example.com | 00000010 5e de c4 26 3a ca d8 35 e5 55 6a 01 76 33 b7 a8 |^..&:..5.Uj.v3..| +peer1.org2.example.com | 00000020 41 07 9a 0f 02 20 63 3f 99 49 bd 7d 0c 66 db 73 |A.... c?.I.}.f.s| +peer1.org2.example.com | 00000030 02 68 40 53 10 1b 66 4c b5 14 ce 5c 6d ea 32 08 |.h@S..fL...\m.2.| +peer1.org2.example.com | 00000040 89 b1 34 91 6c dd |..4.l.| +peer1.org2.example.com | [1151 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1152 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1153 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1154 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1155 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1156 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1158 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d1 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d2 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d3 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d4 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d5 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d6 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d7 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d8 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d9 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11da 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11db 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11dc 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11dd 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11de 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11df 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e0 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e1 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e2 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e3 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [11e4 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [11e5 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11e6 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [11e7 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [11e8 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:25.101 UTC [policies] Evaluate -> DEBU 1448 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.101 UTC [policies] Evaluate -> DEBU 1449 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [policies] Evaluate -> DEBU 144a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [policies] Evaluate -> DEBU 144b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [cauthdsl] func1 -> DEBU 144c 0xc000d83860 gate 1589998885102346200 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [cauthdsl] func2 -> DEBU 144d 0xc000d83860 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [cauthdsl] func2 -> DEBU 144e 0xc000d83860 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [cauthdsl] func2 -> DEBU 144f 0xc000d83860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [cauthdsl] func2 -> DEBU 1450 0xc000d83860 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [cauthdsl] func1 -> DEBU 1451 0xc000d83860 gate 1589998885102346200 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [policies] Evaluate -> DEBU 1452 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.102 UTC [policies] Evaluate -> DEBU 1453 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.103 UTC [policies] Evaluate -> DEBU 1454 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.103 UTC [cauthdsl] func1 -> DEBU 1455 0xc0002820a0 gate 1589998885103053500 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.103 UTC [cauthdsl] func2 -> DEBU 1456 0xc0002820a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.103 UTC [cauthdsl] func2 -> DEBU 1457 0xc0002820a0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.103 UTC [cauthdsl] func2 -> DEBU 1458 0xc0002820a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:25.103 UTC [cauthdsl] func2 -> DEBU 1459 0xc0002820a0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.103 UTC [cauthdsl] func1 -> DEBU 145a 0xc0002820a0 gate 1589998885103053500 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.103 UTC [policies] Evaluate -> DEBU 145b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 145c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.104 UTC [policies] func1 -> DEBU 145d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 145e Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 145f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 1460 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 1461 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 1462 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.104 UTC [cauthdsl] func1 -> DEBU 1463 0xc000283120 gate 1589998885104943500 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.105 UTC [cauthdsl] func2 -> DEBU 1464 0xc000283120 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.105 UTC [cauthdsl] func2 -> DEBU 1465 0xc000283120 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.105 UTC [cauthdsl] func2 -> DEBU 1466 0xc000283120 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:25.105 UTC [msp.identity] Verify -> DEBU 1467 Verify: digest = 00000000 55 7f 4d 86 82 66 f4 45 39 8e 75 ae de bb ef 3f |U.M..f.E9.u....?| +orderer0.example.com | 00000010 c3 5d 69 6f fb 74 16 c1 3d e8 83 fd 7f 6e f0 94 |.]io.t..=....n..|" +orderer0.example.com | "2020-05-20 18:21:25.105 UTC [msp.identity] Verify -> DEBU 1468 Verify: sig = 00000000 30 45 02 21 00 a2 8d b6 56 01 78 7d 0e c3 b0 0b |0E.!....V.x}....| +orderer0.example.com | 00000010 3c 36 f8 ee e0 72 19 01 70 00 30 24 5c 36 96 51 |<6...r..p.0$\6.Q| +orderer0.example.com | 00000020 d7 42 b5 ca 2a 02 20 55 b0 88 8f 1b 52 ea 1c f1 |.B..*. U....R...| +orderer0.example.com | 00000030 f0 9e 19 1a 61 0f 67 df 63 56 b7 f8 42 38 1d a4 |....a.g.cV..B8..| +orderer0.example.com | 00000040 8a de 0d a4 95 c7 05 |.......|" +orderer0.example.com | "2020-05-20 18:21:25.106 UTC [cauthdsl] func2 -> DEBU 1469 0xc000283120 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:25.106 UTC [cauthdsl] func1 -> DEBU 146a 0xc000283120 gate 1589998885104943500 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 1470 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:25.107 UTC [common.deliver] deliverBlocks -> DEBU 1471 [channel: businesschannel] Received seekInfo (0xc0013d0f00) start: > stop: > from 172.18.0.9:53620" +orderer0.example.com | "2020-05-20 18:21:25.107 UTC [fsblkstorage] Next -> DEBU 1472 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-05-20 18:21:25.107 UTC [fsblkstorage] newBlockfileStream -> DEBU 1473 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56644]" +orderer0.example.com | "2020-05-20 18:21:25.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1474 Remaining bytes=[40749], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:25.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1475 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56644], bytesOffset=[56647]}" +orderer0.example.com | "2020-05-20 18:21:25.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1476 blockbytes [28171] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:25.108 UTC [common.deliver] deliverBlocks -> DEBU 1477 [channel: businesschannel] Delivering block [2] for (0xc0013d0f00) for 172.18.0.9:53620" +orderer0.example.com | "2020-05-20 18:21:25.108 UTC [common.deliver] deliverBlocks -> DEBU 1478 [channel: businesschannel] Done delivering to 172.18.0.9:53620 for (0xc0013d0f00)" +peer0.org1.example.com | [11e9 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [11ea 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161018 +peer0.org1.example.com | [11eb 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 730E466552CB5BD7210A5EF67F5BD9A32691A743B487C214987A1AF5FDD8ED3E +peer0.org1.example.com | [11ec 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [11ed 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [11ee 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [11ef 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\366\270\336's" secret_envelope:=\225\214[\233\371\013\322`\241\324\236\326\002\253\313@i\n\030<\2279\002 \023\325\342\314\2161X.5T\271\032j\255\376p\263\272\342\220\026!\355\212\270L\034_\355\207\032\347" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [11f0 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11f1 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [11f2 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11f3 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [11f6 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [11f7 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11f4 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [11f8 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11f5 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\366\270\336's" secret_envelope:=\225\214[\233\371\013\322`\241\324\236\326\002\253\313@i\n\030<\2279\002 \023\325\342\314\2161X.5T\271\032j\255\376p\263\272\342\220\026!\355\212\270L\034_\355\207\032\347" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [11f9 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11fa 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [11fc 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [11fb 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [11fd 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11ff 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [11fe 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1159 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [115a 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1157 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [115b 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [115c 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [115e 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [115f 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1160 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [115d 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1161 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1162 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1164 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1163 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1165 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1166 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1167 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398b610 gate 1589998825001006400 evaluation starts +peer1.org2.example.com | [1168 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398b610 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1169 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398b610 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [116a 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398b610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [116b 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398b610 principal evaluation fails +peer1.org2.example.com | [116c 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398b610 gate 1589998825001006400 evaluation fails +peer1.org2.example.com | [116d 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [116e 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [116f 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1170 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398bb80 gate 1589998825018678500 evaluation starts +peer1.org2.example.com | [1171 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398bb80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1172 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398bb80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1173 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398bb80 principal matched by identity 0 +peer1.org2.example.com | [1174 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer1.org2.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer1.org2.example.com | [1175 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer1.org2.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer1.org2.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer1.org2.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer1.org2.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer1.org2.example.com | [1176 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398bb80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1177 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398bb80 gate 1589998825018678500 evaluation succeeds +peer1.org2.example.com | [1178 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1179 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [117a 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1261 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer1.org1.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer1.org1.example.com | [1262 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer1.org1.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer1.org1.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer1.org1.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer1.org1.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer1.org1.example.com | [1263 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032705a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1264 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032705a0 gate 1589998828450912400 evaluation succeeds +peer1.org1.example.com | [1265 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1266 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:25.109 UTC [common.deliver] Handle -> DEBU 1479 Waiting for new SeekInfo from 172.18.0.9:53620" +orderer0.example.com | "2020-05-20 18:21:25.109 UTC [common.deliver] Handle -> DEBU 147a Attempting to read seek info message from 172.18.0.9:53620" +orderer0.example.com | "2020-05-20 18:21:25.128 UTC [grpc] infof -> DEBU 147b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:25.129 UTC [common.deliver] Handle -> WARN 147c Error reading from 172.18.0.9:53620: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:25.129 UTC [orderer.common.server] func1 -> DEBU 147d Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:25.129 UTC [comm.grpc.server] 1 -> INFO 147e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53620 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.1438ms +orderer0.example.com | "2020-05-20 18:21:25.344 UTC [orderer.common.server] Deliver -> DEBU 147f Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:25.344 UTC [common.deliver] Handle -> DEBU 1480 Starting new deliver loop for 172.18.0.9:53622" +orderer0.example.com | "2020-05-20 18:21:25.344 UTC [common.deliver] Handle -> DEBU 1481 Attempting to read seek info message from 172.18.0.9:53622" +orderer0.example.com | "2020-05-20 18:21:25.345 UTC [policies] Evaluate -> DEBU 1482 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.345 UTC [policies] Evaluate -> DEBU 1483 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.345 UTC [policies] Evaluate -> DEBU 1484 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.346 UTC [policies] Evaluate -> DEBU 1485 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.346 UTC [policies] Evaluate -> DEBU 1486 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.346 UTC [cauthdsl] func1 -> DEBU 1487 0xc00023d8c0 gate 1589998885346194900 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.346 UTC [cauthdsl] func2 -> DEBU 1488 0xc00023d8c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.346 UTC [cauthdsl] func2 -> DEBU 1489 0xc00023d8c0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.346 UTC [cauthdsl] func2 -> DEBU 148a 0xc00023d8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:25.346 UTC [cauthdsl] func2 -> DEBU 148b 0xc00023d8c0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.347 UTC [cauthdsl] func1 -> DEBU 148c 0xc00023d8c0 gate 1589998885346194900 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.347 UTC [policies] Evaluate -> DEBU 148d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.347 UTC [policies] Evaluate -> DEBU 148e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.347 UTC [policies] Evaluate -> DEBU 148f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.347 UTC [cauthdsl] func1 -> DEBU 1490 0xc0002f6210 gate 1589998885347529900 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.347 UTC [cauthdsl] func2 -> DEBU 1491 0xc0002f6210 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.347 UTC [cauthdsl] func2 -> DEBU 1492 0xc0002f6210 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [cauthdsl] func2 -> DEBU 1493 0xc0002f6210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [cauthdsl] func2 -> DEBU 1494 0xc0002f6210 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [cauthdsl] func1 -> DEBU 1495 0xc0002f6210 gate 1589998885347529900 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 1496 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 1497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [policies] func1 -> DEBU 1498 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 1499 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 149a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 149b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.349 UTC [policies] Evaluate -> DEBU 149c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.349 UTC [policies] Evaluate -> DEBU 149d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.349 UTC [cauthdsl] func1 -> DEBU 149e 0xc0002f71a0 gate 1589998885349364900 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.349 UTC [cauthdsl] func2 -> DEBU 149f 0xc0002f71a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.349 UTC [cauthdsl] func2 -> DEBU 14a0 0xc0002f71a0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.349 UTC [cauthdsl] func2 -> DEBU 14a1 0xc0002f71a0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:25.349 UTC [msp.identity] Verify -> DEBU 14a2 Verify: digest = 00000000 3d 2e 83 77 0c 79 d7 d5 a8 fe 98 09 d6 21 87 3a |=..w.y.......!.:| +orderer0.example.com | 00000010 89 f1 19 4e 65 52 33 91 ea 27 30 c4 b3 f9 8d c0 |...NeR3..'0.....|" +orderer0.example.com | "2020-05-20 18:21:25.349 UTC [msp.identity] Verify -> DEBU 14a3 Verify: sig = 00000000 30 45 02 21 00 af bc 7b 5e d5 3a 4b 1e c1 9f 70 |0E.!...{^.:K...p| +orderer0.example.com | 00000010 e3 19 85 a4 85 91 8c d8 01 e3 83 fc 0e 6f f4 7f |.............o..| +orderer0.example.com | 00000020 fe 42 c1 5a 89 02 20 53 5e e9 86 63 39 55 93 21 |.B.Z.. S^..c9U.!| +orderer0.example.com | 00000030 70 f1 d4 31 c3 c4 f4 19 23 96 d6 27 4c fd 9b f0 |p..1....#..'L...| +orderer0.example.com | 00000040 8c b0 af 4a b2 8a 91 |...J...|" +orderer0.example.com | "2020-05-20 18:21:25.350 UTC [cauthdsl] func2 -> DEBU 14a4 0xc0002f71a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:25.351 UTC [cauthdsl] func1 -> DEBU 14a5 0xc0002f71a0 gate 1589998885349364900 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:25.351 UTC [policies] Evaluate -> DEBU 14a6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:25.351 UTC [policies] Evaluate -> DEBU 14a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:25.352 UTC [policies] Evaluate -> DEBU 14a8 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:25.352 UTC [policies] Evaluate -> DEBU 14a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:25.352 UTC [policies] Evaluate -> DEBU 14aa Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:25.352 UTC [policies] Evaluate -> DEBU 14ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [1267 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1268 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1269 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [126a 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [126b 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [126c 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer1.org1.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer1.org1.example.com | [126d 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer1.org1.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer1.org1.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer1.org1.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer1.org1.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer1.org1.example.com | [126e 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [126f 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1270 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1271 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer1.org1.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +peer1.org1.example.com | [1272 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +peer1.org1.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +peer1.org1.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +peer1.org1.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +peer1.org1.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +peer1.org1.example.com | [1273 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1274 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1275 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1277 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:25.353 UTC [common.deliver] deliverBlocks -> DEBU 14ac [channel: businesschannel] Received seekInfo (0xc0013d12c0) start: > stop: > from 172.18.0.9:53622" +orderer0.example.com | "2020-05-20 18:21:25.353 UTC [fsblkstorage] Next -> DEBU 14ad Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-05-20 18:21:25.353 UTC [fsblkstorage] newBlockfileStream -> DEBU 14ae newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84818]" +orderer0.example.com | "2020-05-20 18:21:25.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14af Remaining bytes=[12575], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:25.354 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14b0 Returning blockbytes - length=[4549], placementInfo={fileNum=[0], startOffset=[84818], bytesOffset=[84820]}" +orderer0.example.com | "2020-05-20 18:21:25.354 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14b1 blockbytes [4549] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:25.355 UTC [common.deliver] deliverBlocks -> DEBU 14b2 [channel: businesschannel] Delivering block [3] for (0xc0013d12c0) for 172.18.0.9:53622" +orderer0.example.com | "2020-05-20 18:21:25.355 UTC [common.deliver] deliverBlocks -> DEBU 14b3 [channel: businesschannel] Done delivering to 172.18.0.9:53622 for (0xc0013d12c0)" +orderer0.example.com | "2020-05-20 18:21:25.356 UTC [common.deliver] Handle -> DEBU 14b4 Waiting for new SeekInfo from 172.18.0.9:53622" +orderer0.example.com | "2020-05-20 18:21:25.356 UTC [common.deliver] Handle -> DEBU 14b5 Attempting to read seek info message from 172.18.0.9:53622" +orderer0.example.com | "2020-05-20 18:21:25.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:25.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b7 Sending msg of 28 bytes to 3 on channel testchainid took 35.8µs" +orderer0.example.com | "2020-05-20 18:21:25.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.1µs " +orderer0.example.com | "2020-05-20 18:21:25.367 UTC [grpc] infof -> DEBU 14b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:25.367 UTC [common.deliver] Handle -> WARN 14ba Error reading from 172.18.0.9:53622: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:25.367 UTC [orderer.common.server] func1 -> DEBU 14bb Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:25.367 UTC [comm.grpc.server] 1 -> INFO 14bc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53622 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.4006ms +orderer0.example.com | "2020-05-20 18:21:25.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bd Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +orderer0.example.com | "2020-05-20 18:21:25.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14be Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2020-05-20 18:21:25.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 419.7µs " +orderer0.example.com | "2020-05-20 18:21:25.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 740.5µs " +orderer0.example.com | "2020-05-20 18:21:25.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:25.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:25.558 UTC [orderer.common.server] Deliver -> DEBU 14c3 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:25.559 UTC [common.deliver] Handle -> DEBU 14c4 Starting new deliver loop for 172.18.0.9:53624" +orderer0.example.com | "2020-05-20 18:21:25.559 UTC [common.deliver] Handle -> DEBU 14c5 Attempting to read seek info message from 172.18.0.9:53624" +orderer0.example.com | "2020-05-20 18:21:25.559 UTC [policies] Evaluate -> DEBU 14c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [policies] Evaluate -> DEBU 14c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [policies] Evaluate -> DEBU 14c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [policies] Evaluate -> DEBU 14c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [policies] Evaluate -> DEBU 14ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [cauthdsl] func1 -> DEBU 14cb 0xc0005590a0 gate 1589998885560516400 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [cauthdsl] func2 -> DEBU 14cc 0xc0005590a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [cauthdsl] func2 -> DEBU 14cd 0xc0005590a0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [cauthdsl] func2 -> DEBU 14ce 0xc0005590a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:25.560 UTC [cauthdsl] func2 -> DEBU 14cf 0xc0005590a0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.561 UTC [cauthdsl] func1 -> DEBU 14d0 0xc0005590a0 gate 1589998885560516400 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.561 UTC [policies] Evaluate -> DEBU 14d1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.561 UTC [policies] Evaluate -> DEBU 14d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.561 UTC [policies] Evaluate -> DEBU 14d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.561 UTC [cauthdsl] func1 -> DEBU 14d4 0xc000559910 gate 1589998885561664600 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.561 UTC [cauthdsl] func2 -> DEBU 14d5 0xc000559910 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.561 UTC [cauthdsl] func2 -> DEBU 14d6 0xc000559910 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.562 UTC [cauthdsl] func2 -> DEBU 14d7 0xc000559910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:25.562 UTC [cauthdsl] func2 -> DEBU 14d8 0xc000559910 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.562 UTC [cauthdsl] func1 -> DEBU 14d9 0xc000559910 gate 1589998885561664600 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.562 UTC [policies] Evaluate -> DEBU 14da Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [11fd 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11fe 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [11ff 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1200 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1201 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [117b 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [117c 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [117d 05-20 18:20:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [117e 05-20 18:20:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [117f 05-20 18:20:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1180 05-20 18:20:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1181 05-20 18:20:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1182 05-20 18:20:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1183 05-20 18:20:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1184 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1185 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1186 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1187 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1188 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1189 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [118a 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [118b 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [118c 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [118d 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [118e 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [118f 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1190 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer1.org2.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer1.org2.example.com | [1191 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer1.org2.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer1.org1.example.com | [1276 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1278 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1279 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127a 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127b 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [127c 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127d 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [127e 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [127f 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1280 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1281 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1282 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1283 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1284 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1285 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1286 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1287 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1288 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1289 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a87f0 gate 1589998828485486300 evaluation starts +peer1.org1.example.com | [128a 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a87f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [128b 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a87f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [128c 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a87f0 principal matched by identity 0 +peer1.org1.example.com | [128d 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer1.org1.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer1.org1.example.com | [128e 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer1.org1.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer1.org1.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer1.org1.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer1.org1.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer1.org1.example.com | [128f 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a87f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1290 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a87f0 gate 1589998828485486300 evaluation succeeds +peer1.org1.example.com | [1291 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1292 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1293 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1294 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1295 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1296 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1297 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1298 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer1.org1.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +peer1.org1.example.com | [1299 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +peer1.org1.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +peer1.org1.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +peer1.org1.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +peer1.org1.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +peer1.org1.example.com | [129a 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [129b 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [129c 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [129d 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [129e 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer1.org1.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer1.org1.example.com | [129f 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer1.org1.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer1.org1.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer1.org1.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer1.org1.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer1.org1.example.com | [12a0 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12a1 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a2 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a3 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [12a4 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1200 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1201 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1202 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1203 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1204 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1205 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1206 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1207 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1208 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 gate 1589998820897915900 evaluation starts +peer0.org1.example.com | [1209 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [120a 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [120b 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 principal matched by identity 0 +peer0.org1.example.com | [120c 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +peer0.org1.example.com | 00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +peer0.org1.example.com | [120d 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +peer0.org1.example.com | 00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +peer0.org1.example.com | 00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +peer0.org1.example.com | 00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +peer0.org1.example.com | 00000040 cd dc 6d 0d 94 00 0a |..m....| +peer0.org1.example.com | [120e 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [120f 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 gate 1589998820897915900 evaluation succeeds +peer0.org1.example.com | [1210 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1211 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1212 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1213 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1214 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1215 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1216 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1217 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1218 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1219 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [121a 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [121b 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [121d 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [121f 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [121c 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1220 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1221 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1222 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1223 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [121e 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1224 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +peer0.org1.example.com | 00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +peer0.org1.example.com | [1225 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1226 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1227 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1229 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1228 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +peer0.org1.example.com | 00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +peer0.org1.example.com | 00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +peer0.org1.example.com | 00000030 17 39 d7 6d 8c e4 fd e8 88 36 f0 c8 1d 02 66 57 |.9.m.....6....fW| +peer0.org1.example.com | 00000040 3e f6 b8 de 27 73 |>...'s| +peer0.org1.example.com | [122a 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [122b 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [122c 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 5e 0f 15 1b e6 ef 5d 3e 3d 95 |0E.!..^.....]>=.| +peer0.org1.example.com | 00000010 8c 5b 9b f9 0b d2 60 a1 d4 9e d6 02 ab cb 40 69 |.[....`.......@i| +peer0.org1.example.com | 00000020 0a 18 3c 97 39 02 20 13 d5 e2 cc 8e 31 58 2e 35 |..<.9. .....1X.5| +peer0.org1.example.com | 00000030 54 b9 1a 6a ad fe 70 b3 ba e2 90 16 21 ed 8a b8 |T..j..p.....!...| +peer0.org1.example.com | 00000040 4c 1c 5f ed 87 1a e7 |L._....| +peer0.org1.example.com | [122d 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [122e 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [122f 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1230 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1231 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1232 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1233 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1234 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1235 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1236 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1237 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1238 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1239 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [123a 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [123b 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 gate 1589998820920939000 evaluation starts +peer0.org1.example.com | [123c 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [123d 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [123e 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 principal matched by identity 0 +peer0.org1.example.com | [123f 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +peer0.org1.example.com | 00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +peer0.org1.example.com | [1240 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +peer0.org1.example.com | 00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +peer0.org1.example.com | 00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +peer0.org1.example.com | 00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +peer0.org1.example.com | 00000040 cd dc 6d 0d 94 00 0a |..m....| +peer0.org1.example.com | [1241 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1242 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 gate 1589998820920939000 evaluation succeeds +peer0.org1.example.com | [1243 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1244 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1245 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1246 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1247 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1248 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1249 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [124a 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer0.org1.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +orderer0.example.com | "2020-05-20 18:21:25.562 UTC [policies] Evaluate -> DEBU 14db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer1.org2.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer1.org2.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer1.org2.example.com | [1192 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1193 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1194 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1195 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer1.org2.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer1.org2.example.com | [1196 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer1.org2.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer1.org2.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer1.org2.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer1.org2.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer1.org2.example.com | [1197 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1198 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1199 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [119a 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [119b 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [119c 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [119d 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [119e 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [119f 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [11a0 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [11a1 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [11a2 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ec5b0 gate 1589998825075606700 evaluation starts +peer1.org2.example.com | [11a3 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ec5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11a4 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ec5b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [11a5 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ec5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [11a6 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ec5b0 principal evaluation fails +peer1.org2.example.com | [11a7 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ec5b0 gate 1589998825075606700 evaluation fails +peer1.org2.example.com | [11a8 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11a9 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11aa 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [11ab 05-20 18:20:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ecb20 gate 1589998825078876300 evaluation starts +peer1.org2.example.com | [11ac 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ecb20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11ad 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ecb20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [124b 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer0.org1.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer0.org1.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer0.org1.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer0.org1.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer0.org1.example.com | [124c 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [124d 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [124e 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [124f 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +peer0.org1.example.com | 00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +peer0.org1.example.com | [1250 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +peer0.org1.example.com | 00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +peer0.org1.example.com | 00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +peer0.org1.example.com | 00000030 17 39 d7 6d 8c e4 fd e8 88 36 f0 c8 1d 02 66 57 |.9.m.....6....fW| +peer0.org1.example.com | 00000040 3e f6 b8 de 27 73 |>...'s| +peer0.org1.example.com | [1251 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1252 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1253 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1254 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1255 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1256 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1257 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1258 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1259 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [125a 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [125b 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [125c 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [125d 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [125e 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [125f 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1260 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1261 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 gate 1589998820956893600 evaluation starts +peer0.org1.example.com | [1262 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1263 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1264 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 principal matched by identity 0 +peer0.org1.example.com | [1265 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +peer0.org1.example.com | 00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +peer0.org1.example.com | [1266 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +peer0.org1.example.com | 00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +peer0.org1.example.com | 00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +peer0.org1.example.com | 00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +peer0.org1.example.com | 00000040 fd 70 a7 84 6e b5 |.p..n.| +peer0.org1.example.com | [1267 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1268 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 gate 1589998820956893600 evaluation succeeds +peer0.org1.example.com | [1269 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [126a 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:25.562 UTC [policies] func1 -> DEBU 14dc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:25.562 UTC [policies] Evaluate -> DEBU 14dd Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [policies] Evaluate -> DEBU 14de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [policies] Evaluate -> DEBU 14df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [policies] Evaluate -> DEBU 14e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [policies] Evaluate -> DEBU 14e1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [cauthdsl] func1 -> DEBU 14e2 0xc00056e600 gate 1589998885563428600 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [cauthdsl] func2 -> DEBU 14e3 0xc00056e600 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [cauthdsl] func2 -> DEBU 14e4 0xc00056e600 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [cauthdsl] func2 -> DEBU 14e5 0xc00056e600 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:25.563 UTC [msp.identity] Verify -> DEBU 14e6 Verify: digest = 00000000 05 3c fa 0f ff d5 82 40 b7 5a 08 57 6d eb aa f2 |.<.....@.Z.Wm...| +orderer0.example.com | 00000010 0e 9f 1a 3f c1 a1 42 14 6d 8e 4c 35 d4 2c fc e8 |...?..B.m.L5.,..|" +orderer0.example.com | "2020-05-20 18:21:25.564 UTC [msp.identity] Verify -> DEBU 14e7 Verify: sig = 00000000 30 44 02 20 21 5c 63 e6 3b 7c 8c 40 c6 1e 94 56 |0D. !\c.;|.@...V| +orderer0.example.com | 00000010 d9 74 ad ff f0 a7 aa ff 50 d3 b2 7d 7f f2 ef 40 |.t......P..}...@| +orderer0.example.com | 00000020 e4 48 be 71 02 20 73 77 12 72 35 12 9f 5e d7 c1 |.H.q. sw.r5..^..| +orderer0.example.com | 00000030 6a f6 0f 7c d3 4c 35 6c 1a f8 30 b5 12 4a cf e8 |j..|.L5l..0..J..| +orderer0.example.com | 00000040 f2 cb 9d bc 59 2b |....Y+|" +orderer0.example.com | "2020-05-20 18:21:25.564 UTC [cauthdsl] func2 -> DEBU 14e8 0xc00056e600 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:25.564 UTC [cauthdsl] func1 -> DEBU 14e9 0xc00056e600 gate 1589998885563428600 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14ea Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14eb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14ec Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14ee Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:25.565 UTC [policies] Evaluate -> DEBU 14ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:25.565 UTC [common.deliver] deliverBlocks -> DEBU 14f0 [channel: businesschannel] Received seekInfo (0xc000d72700) start: > stop: > from 172.18.0.9:53624" +orderer0.example.com | "2020-05-20 18:21:25.565 UTC [fsblkstorage] Next -> DEBU 14f1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-05-20 18:21:25.565 UTC [fsblkstorage] newBlockfileStream -> DEBU 14f2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89369]" +orderer0.example.com | "2020-05-20 18:21:25.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14f3 Remaining bytes=[8024], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:25.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14f4 Returning blockbytes - length=[4011], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +orderer0.example.com | "2020-05-20 18:21:25.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14f5 blockbytes [4011] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:25.566 UTC [common.deliver] deliverBlocks -> DEBU 14f6 [channel: businesschannel] Delivering block [4] for (0xc000d72700) for 172.18.0.9:53624" +orderer0.example.com | "2020-05-20 18:21:25.566 UTC [common.deliver] deliverBlocks -> DEBU 14f7 [channel: businesschannel] Done delivering to 172.18.0.9:53624 for (0xc000d72700)" +orderer0.example.com | "2020-05-20 18:21:25.567 UTC [common.deliver] Handle -> DEBU 14f8 Waiting for new SeekInfo from 172.18.0.9:53624" +orderer0.example.com | "2020-05-20 18:21:25.567 UTC [common.deliver] Handle -> DEBU 14f9 Attempting to read seek info message from 172.18.0.9:53624" +orderer0.example.com | "2020-05-20 18:21:25.575 UTC [grpc] infof -> DEBU 14fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:25.575 UTC [common.deliver] Handle -> WARN 14fb Error reading from 172.18.0.9:53624: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:25.576 UTC [orderer.common.server] func1 -> DEBU 14fc Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:25.576 UTC [comm.grpc.server] 1 -> INFO 14fd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53624 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.1667ms +orderer0.example.com | "2020-05-20 18:21:25.772 UTC [orderer.common.server] Deliver -> DEBU 14fe Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:25.773 UTC [common.deliver] Handle -> DEBU 14ff Starting new deliver loop for 172.18.0.9:53626" +orderer0.example.com | "2020-05-20 18:21:25.773 UTC [common.deliver] Handle -> DEBU 1500 Attempting to read seek info message from 172.18.0.9:53626" +orderer0.example.com | "2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1501 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1502 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1503 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1504 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1505 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [cauthdsl] func1 -> DEBU 1506 0xc00059ea40 gate 1589998885774929100 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [cauthdsl] func2 -> DEBU 1507 0xc00059ea40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [cauthdsl] func2 -> DEBU 1508 0xc00059ea40 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [cauthdsl] func2 -> DEBU 1509 0xc00059ea40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [cauthdsl] func2 -> DEBU 150a 0xc00059ea40 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [cauthdsl] func1 -> DEBU 150b 0xc00059ea40 gate 1589998885774929100 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [policies] Evaluate -> DEBU 150c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [11ae 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ecb20 principal matched by identity 0 +peer1.org2.example.com | [11af 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer1.org2.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer1.org2.example.com | [11b0 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer1.org2.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer1.org2.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer1.org2.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer1.org2.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer1.org2.example.com | [11b1 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ecb20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [11b2 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ecb20 gate 1589998825078876300 evaluation succeeds +peer1.org2.example.com | [11b3 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11b4 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11b5 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [11b6 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [11b7 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11b8 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11b9 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11ba 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [11bb 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11bc 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [11bd 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer1.org2.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer1.org2.example.com | [11be 05-20 18:20:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer1.org2.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer1.org2.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer1.org2.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer1.org2.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer1.org2.example.com | [11bf 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11c0 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11c1 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [11c2 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer1.org2.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer1.org2.example.com | [11c3 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer1.org2.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer1.org2.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer1.org2.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer1.org2.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer1.org2.example.com | [11c4 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11c5 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11c6 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11c7 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [11c8 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [policies] Evaluate -> DEBU 150d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.775 UTC [policies] Evaluate -> DEBU 150e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [cauthdsl] func1 -> DEBU 150f 0xc00059f410 gate 1589998885776145300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [cauthdsl] func2 -> DEBU 1510 0xc00059f410 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [cauthdsl] func2 -> DEBU 1511 0xc00059f410 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [cauthdsl] func2 -> DEBU 1512 0xc00059f410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [cauthdsl] func2 -> DEBU 1513 0xc00059f410 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [cauthdsl] func1 -> DEBU 1514 0xc00059f410 gate 1589998885776145300 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [policies] Evaluate -> DEBU 1515 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [policies] Evaluate -> DEBU 1516 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:25.776 UTC [policies] func1 -> DEBU 1517 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 1518 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 1519 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 151a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 151b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 151c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.777 UTC [cauthdsl] func1 -> DEBU 151d 0xc0009d8160 gate 1589998885777877300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.777 UTC [cauthdsl] func2 -> DEBU 151e 0xc0009d8160 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.778 UTC [cauthdsl] func2 -> DEBU 151f 0xc0009d8160 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.778 UTC [cauthdsl] func2 -> DEBU 1520 0xc0009d8160 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:25.778 UTC [msp.identity] Verify -> DEBU 1521 Verify: digest = 00000000 26 10 42 54 30 ff 0a bf ff 2f 23 ee 9d ce 4b 18 |&.BT0..../#...K.| +orderer0.example.com | 00000010 54 60 65 4f 93 41 a4 9f 91 cf bf ba 28 1a 56 e6 |T`eO.A......(.V.|" +orderer0.example.com | "2020-05-20 18:21:25.778 UTC [msp.identity] Verify -> DEBU 1522 Verify: sig = 00000000 30 44 02 20 73 d1 eb fa da 98 99 26 ab dc e7 7b |0D. s......&...{| +orderer0.example.com | 00000010 c9 16 f8 2c 46 b0 74 c8 61 88 fb 18 84 cb 5b 0e |...,F.t.a.....[.| +orderer0.example.com | 00000020 8f 8d 48 cc 02 20 45 d9 d4 61 20 d6 d3 be 44 dc |..H.. E..a ...D.| +orderer0.example.com | 00000030 ea 8d af 1f 4a 6b 7f 0e b4 9c 59 a8 f0 90 1d 13 |....Jk....Y.....| +orderer0.example.com | 00000040 d6 aa 5e a2 54 f2 |..^.T.|" +orderer0.example.com | "2020-05-20 18:21:25.779 UTC [cauthdsl] func2 -> DEBU 1523 0xc0009d8160 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:25.779 UTC [cauthdsl] func1 -> DEBU 1524 0xc0009d8160 gate 1589998885777877300 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1525 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1526 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1527 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1528 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1529 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:25.780 UTC [policies] Evaluate -> DEBU 152a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:25.780 UTC [common.deliver] deliverBlocks -> DEBU 152b [channel: businesschannel] Received seekInfo (0xc0013d1a80) start: > stop: > from 172.18.0.9:53626" +orderer0.example.com | "2020-05-20 18:21:25.780 UTC [fsblkstorage] Next -> DEBU 152c Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-05-20 18:21:25.780 UTC [fsblkstorage] newBlockfileStream -> DEBU 152d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93382]" +orderer0.example.com | "2020-05-20 18:21:25.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 152e Remaining bytes=[4011], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:25.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 152f Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93382], bytesOffset=[93384]}" +orderer0.example.com | "2020-05-20 18:21:25.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1530 blockbytes [4009] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:25.781 UTC [common.deliver] deliverBlocks -> DEBU 1531 [channel: businesschannel] Delivering block [5] for (0xc0013d1a80) for 172.18.0.9:53626" +orderer0.example.com | "2020-05-20 18:21:25.781 UTC [common.deliver] deliverBlocks -> DEBU 1532 [channel: businesschannel] Done delivering to 172.18.0.9:53626 for (0xc0013d1a80)" +orderer0.example.com | "2020-05-20 18:21:25.781 UTC [common.deliver] Handle -> DEBU 1533 Waiting for new SeekInfo from 172.18.0.9:53626" +orderer0.example.com | "2020-05-20 18:21:25.781 UTC [common.deliver] Handle -> DEBU 1534 Attempting to read seek info message from 172.18.0.9:53626" +orderer0.example.com | "2020-05-20 18:21:25.788 UTC [common.deliver] Handle -> WARN 1535 Error reading from 172.18.0.9:53626: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:25.788 UTC [orderer.common.server] func1 -> DEBU 1536 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:25.788 UTC [comm.grpc.server] 1 -> INFO 1537 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53626 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9934ms +orderer0.example.com | "2020-05-20 18:21:25.789 UTC [grpc] infof -> DEBU 1538 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:25.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1539 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:25.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153a Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2020-05-20 18:21:25.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 153b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.8µs " +orderer0.example.com | "2020-05-20 18:21:25.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153c Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +orderer0.example.com | "2020-05-20 18:21:25.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153d Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2020-05-20 18:21:25.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 153e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.4µs " +orderer0.example.com | "2020-05-20 18:21:25.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 153f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.9µs " +orderer0.example.com | "2020-05-20 18:21:25.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1540 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:25.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1541 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:25.970 UTC [orderer.common.server] Deliver -> DEBU 1542 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:25.971 UTC [common.deliver] Handle -> DEBU 1543 Starting new deliver loop for 172.18.0.9:53628" +orderer0.example.com | "2020-05-20 18:21:25.971 UTC [common.deliver] Handle -> DEBU 1544 Attempting to read seek info message from 172.18.0.9:53628" +orderer0.example.com | "2020-05-20 18:21:25.972 UTC [policies] Evaluate -> DEBU 1545 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.972 UTC [policies] Evaluate -> DEBU 1546 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.972 UTC [policies] Evaluate -> DEBU 1547 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.973 UTC [policies] Evaluate -> DEBU 1548 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:25.973 UTC [policies] Evaluate -> DEBU 1549 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:25.973 UTC [msp] DeserializeIdentity -> DEBU 154a Obtaining identity" +orderer0.example.com | "2020-05-20 18:21:25.974 UTC [msp.identity] newIdentity -> DEBU 154b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:25.975 UTC [cauthdsl] func1 -> DEBU 154c 0xc0004e8cb0 gate 1589998885975264600 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:25.975 UTC [cauthdsl] func2 -> DEBU 154d 0xc0004e8cb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:25.975 UTC [cauthdsl] func2 -> DEBU 154e 0xc0004e8cb0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:25.975 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 154f Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-05-20 18:21:25.975 UTC [msp] Validate -> DEBU 1550 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-05-20 18:21:25.976 UTC [msp] getCertificationChain -> DEBU 1551 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-05-20 18:21:25.976 UTC [cauthdsl] func2 -> DEBU 1552 0xc0004e8cb0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:25.977 UTC [msp.identity] Verify -> DEBU 1553 Verify: digest = 00000000 d3 0c a0 a0 24 69 15 4b 14 42 7c f3 96 f3 51 28 |....$i.K.B|...Q(| +orderer0.example.com | 00000010 5e 9c 74 70 34 58 d8 67 71 3e 08 67 7b 2b 97 9a |^.tp4X.gq>.g{+..|" +orderer0.example.com | "2020-05-20 18:21:25.977 UTC [msp.identity] Verify -> DEBU 1554 Verify: sig = 00000000 30 44 02 20 08 f7 fc db 63 0b 86 9c 3f c1 6b ab |0D. ....c...?.k.| +orderer0.example.com | 00000010 ea a7 45 7a 86 e0 fd 8e ec 9c be 90 cb d0 47 b6 |..Ez..........G.| +orderer0.example.com | 00000020 01 7e c8 71 02 20 75 49 58 e6 d2 92 14 c8 c0 6a |.~.q. uIX......j| +orderer0.example.com | 00000030 a9 e8 24 ce 5e 0d 2a 23 67 79 3e 69 64 e1 62 da |..$.^.*#gy>id.b.| +orderer0.example.com | 00000040 22 5a 10 64 b1 7f |"Z.d..|" +orderer0.example.com | "2020-05-20 18:21:25.977 UTC [cauthdsl] func2 -> DEBU 1555 0xc0004e8cb0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:25.977 UTC [cauthdsl] func1 -> DEBU 1556 0xc0004e8cb0 gate 1589998885975264600 evaluation succeeds" +peer0.org2.example.com | [1202 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [12a5 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [126b 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [11c9 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 1557 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1203 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a6 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126c 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [11ca 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 1558 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1204 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [12a7 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126d 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [11cb 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 1559 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1205 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [12a8 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126e 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11cc 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 155a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1206 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +peer1.org1.example.com | [12a9 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126f 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [11cd 05-20 18:20:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 155b Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | 00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +peer1.org1.example.com | [12aa 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1270 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +peer1.org2.example.com | [11ce 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:25.979 UTC [policies] Evaluate -> DEBU 155c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [1207 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +peer1.org1.example.com | [12ab 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +peer1.org2.example.com | [11cf 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d230 gate 1589998825101995900 evaluation starts +orderer0.example.com | "2020-05-20 18:21:25.979 UTC [common.deliver] deliverBlocks -> DEBU 155d [channel: testchainid] Received seekInfo (0xc0003d2300) start: > stop: > from 172.18.0.9:53628" +peer0.org2.example.com | 00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +peer1.org1.example.com | [12ac 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1271 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +peer1.org2.example.com | [11d0 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d230 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:25.980 UTC [fsblkstorage] Next -> DEBU 155e Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org2.example.com | 00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +peer1.org1.example.com | [12ad 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +peer1.org2.example.com | [11d1 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d230 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:25.980 UTC [fsblkstorage] newBlockfileStream -> DEBU 155f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer0.org2.example.com | 00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +peer1.org1.example.com | [12ae 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +peer1.org2.example.com | [11d2 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-05-20 18:21:25.981 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1560 Remaining bytes=[30409], Going to peek [8] bytes" +peer0.org2.example.com | 00000040 cd dc 6d 0d 94 00 0a |..m....| +peer1.org1.example.com | [12af 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 17 39 d7 6d 8c e4 fd e8 88 36 f0 c8 1d 02 66 57 |.9.m.....6....fW| +peer1.org2.example.com | [11d3 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d230 principal evaluation fails +peer1.org2.example.com | [11d4 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d230 gate 1589998825101995900 evaluation fails +orderer0.example.com | "2020-05-20 18:21:25.982 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1561 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer1.org1.example.com | [12b0 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 3e f6 b8 de 27 73 |>...'s| +peer1.org2.example.com | [11d5 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:25.983 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1562 blockbytes [30406] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:25.983 UTC [common.deliver] deliverBlocks -> DEBU 1563 [channel: testchainid] Delivering block [1] for (0xc0003d2300) for 172.18.0.9:53628" +peer0.org2.example.com | [1208 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [1272 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [11d6 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:25.983 UTC [common.deliver] deliverBlocks -> DEBU 1564 [channel: testchainid] Done delivering to 172.18.0.9:53628 for (0xc0003d2300)" +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [12b1 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1273 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1274 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1275 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1209 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 8b 73 e5 df dc d8 cc 72 79 46 |0E.!...s.....ryF| +peer0.org2.example.com | 00000010 50 68 aa 76 57 52 8b 28 67 59 fa c0 cf 65 ae ae |Ph.vWR.(gY...e..| +orderer0.example.com | "2020-05-20 18:21:25.984 UTC [common.deliver] Handle -> DEBU 1565 Waiting for new SeekInfo from 172.18.0.9:53628" +peer1.org2.example.com | [11d7 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:25.984 UTC [common.deliver] Handle -> DEBU 1566 Attempting to read seek info message from 172.18.0.9:53628" +peer0.org1.example.com | [1276 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +peer0.org1.example.com | 00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +peer1.org1.example.com | [12b2 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | 00000020 26 57 92 dd 79 02 20 0b 5f a8 9d 0b 1a 77 ed c0 |&W..y. ._....w..| +orderer0.example.com | "2020-05-20 18:21:25.993 UTC [common.deliver] Handle -> WARN 1567 Error reading from 172.18.0.9:53628: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [1277 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +peer1.org2.example.com | [11d8 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d7a0 gate 1589998825105144100 evaluation starts +peer1.org1.example.com | [12b3 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 f2 6a ea 8e c7 e9 0f 3a ac e2 87 f8 ce 48 07 23 |.j.....:.....H.#| +orderer0.example.com | "2020-05-20 18:21:25.993 UTC [orderer.common.server] func1 -> DEBU 1568 Closing Deliver stream" +peer0.org1.example.com | 00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +peer1.org2.example.com | [11d9 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d7a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [12b4 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 59 07 81 50 dd db fe |Y..P...| +orderer0.example.com | "2020-05-20 18:21:25.993 UTC [comm.grpc.server] 1 -> INFO 1569 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53628 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.2745ms +peer0.org1.example.com | 00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +peer1.org2.example.com | [11da 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d7a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [12b5 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [120a 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:25.994 UTC [grpc] infof -> DEBU 156a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | 00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +peer1.org2.example.com | [11db 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d7a0 principal matched by identity 0 +peer1.org1.example.com | [12b6 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [120b 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +orderer0.example.com | "2020-05-20 18:21:26.218 UTC [orderer.common.server] Deliver -> DEBU 156b Starting new Deliver handler" +peer0.org1.example.com | 00000040 04 bf a2 07 40 7b |....@{| +peer1.org2.example.com | [11dc 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer1.org1.example.com | [12b7 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [120c 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:26.218 UTC [common.deliver] Handle -> DEBU 156c Starting new deliver loop for 172.18.0.9:53630" +peer0.org1.example.com | [1278 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +peer1.org1.example.com | [12b8 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [120d 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:26.218 UTC [common.deliver] Handle -> DEBU 156d Attempting to read seek info message from 172.18.0.9:53630" +peer0.org1.example.com | [1279 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12b9 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [120e 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:26.219 UTC [policies] Evaluate -> DEBU 156e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [127a 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11dd 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +peer1.org1.example.com | [12ba 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294fd0 gate 1589998828679043900 evaluation starts +peer0.org2.example.com | [120f 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.219 UTC [policies] Evaluate -> DEBU 156f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [127b 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer1.org1.example.com | [12bb 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1210 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.219 UTC [policies] Evaluate -> DEBU 1570 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [127c 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer1.org1.example.com | [12bc 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294fd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1211 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.220 UTC [policies] Evaluate -> DEBU 1571 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [127d 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +peer1.org1.example.com | [12bd 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294fd0 principal matched by identity 0 +peer0.org2.example.com | [1212 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +orderer0.example.com | "2020-05-20 18:21:26.220 UTC [policies] Evaluate -> DEBU 1572 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [127e 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +peer1.org1.example.com | [12be 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 9d 6c 58 ae 31 24 cc db f7 5f 55 14 c0 ce c3 |6.lX.1$..._U....| +peer0.org2.example.com | [1213 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.220 UTC [cauthdsl] func1 -> DEBU 1573 0xc000548290 gate 1589998886220902400 evaluation starts" +peer0.org1.example.com | [127f 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [11de 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d7a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 61 18 49 32 74 23 32 16 04 44 5a 7b 2f 94 f3 44 |a.I2t#2..DZ{/..D| +peer0.org2.example.com | [1214 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.221 UTC [cauthdsl] func2 -> DEBU 1574 0xc000548290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [1280 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 00 5f 18 f5 59 2c 41 d7 46 ee 2f 9a ce 91 32 |.._..Y,A.F./...2| +peer1.org2.example.com | [11df 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d7a0 gate 1589998825105144100 evaluation succeeds +peer1.org1.example.com | [12bf 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 07 47 1b eb ae 8c ef cc b3 2a b7 |0D. ..G.......*.| +peer0.org2.example.com | [1215 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:26.221 UTC [cauthdsl] func2 -> DEBU 1575 0xc000548290 processing identity 0 with bytes of fe0d40" +peer0.org1.example.com | 00000010 bf 29 0d 8e d2 19 56 25 42 28 0d 9f af 6f 8f dc |.)....V%B(...o..| +peer1.org2.example.com | [11e0 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 85 23 60 3f dd c5 53 d9 70 81 27 1a 7e c5 c3 9b |.#`?..S.p.'.~...| +peer0.org2.example.com | [1216 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:26.222 UTC [cauthdsl] func2 -> DEBU 1576 0xc000548290 principal matched by identity 0" +peer0.org1.example.com | [1281 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a be 29 8d 7c e9 5f e9 a0 cf 6f bc |0D. ..).|._...o.| +peer1.org2.example.com | [11e1 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 b0 48 5d 89 02 20 36 63 a8 de 99 74 6e 28 f5 da |.H].. 6c...tn(..| +peer0.org2.example.com | [1217 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | "2020-05-20 18:21:26.222 UTC [msp.identity] Verify -> DEBU 1577 Verify: digest = 00000000 2a 10 b3 2f 30 50 38 9a 2a 65 b6 24 13 b1 ce 0f |*../0P8.*e.$....| +peer0.org1.example.com | 00000010 f6 99 4f 15 64 5e e7 8d 70 8a c3 af 5b 07 7c d7 |..O.d^..p...[.|.| +peer1.org2.example.com | [11e2 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1218 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 11 23 58 53 d6 3d bb f4 ba 39 3d 3e 62 07 4c bb |.#XS.=...9=>b.L.| +orderer0.example.com | 00000010 f3 0a bc 64 89 3a 39 18 4c d0 07 b5 3b 0f c3 ac |...d.:9.L...;...|" +peer0.org1.example.com | 00000020 df fb c1 36 02 20 23 c2 cd b7 41 35 e6 56 0b f5 |...6. #...A5.V..| +peer1.org2.example.com | [11e3 05-20 18:20:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1219 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 6c ff dd 51 f8 db |l..Q..| +orderer0.example.com | "2020-05-20 18:21:26.222 UTC [msp.identity] Verify -> DEBU 1578 Verify: sig = 00000000 30 44 02 20 41 c1 10 d0 b7 f6 d1 ec b3 a3 e8 c9 |0D. A...........| +peer0.org1.example.com | 00000030 4c 92 96 49 83 d6 22 f4 1c 92 30 93 21 79 36 f7 |L..I.."...0.!y6.| +peer1.org2.example.com | [11e4 05-20 18:20:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [121a 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 91 a1 7d e2 d7 5e 6b 33 c5 75 b4 c7 c4 1f cd e6 |..}..^k3.u......| +peer0.org1.example.com | 00000040 f1 f0 7c 36 56 64 |..|6Vd| +peer1.org2.example.com | [11e5 05-20 18:20:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [121b 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | 00000020 50 be 51 2a 02 20 26 82 26 d6 b2 08 4b 44 6c 42 |P.Q*. &.&...KDlB| +peer1.org2.example.com | [11e6 05-20 18:20:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11e7 05-20 18:20:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +orderer0.example.com | 00000030 15 10 f0 fa 42 47 87 b4 15 2d 9b 83 94 e0 da 93 |....BG...-......| +peer0.org1.example.com | [1282 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [12c0 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294fd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [11e8 05-20 18:20:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer0.org2.example.com | [121c 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | 00000040 a4 ea 8e 6f 32 45 |...o2E|" +peer0.org1.example.com | [1283 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [12c1 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294fd0 gate 1589998828679043900 evaluation succeeds +peer1.org2.example.com | [11e9 05-20 18:20:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [121d 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.223 UTC [cauthdsl] func2 -> DEBU 1579 0xc000548290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [1284 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [12c2 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11ea 05-20 18:20:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610061801 +peer0.org2.example.com | [121e 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1285 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [12c3 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11eb 05-20 18:20:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 603C1D1F1E3B521CF55E47F2824CF1816039CF087CBD99ADD7A4F0E46729CCB0 +peer0.org2.example.com | [121f 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:26.223 UTC [cauthdsl] func1 -> DEBU 157a 0xc000548290 gate 1589998886220902400 evaluation succeeds" +peer1.org1.example.com | [12c4 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1286 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [11ec 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org2.example.com | [1220 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [12c5 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1287 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11ed 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1221 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1222 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1223 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [11ee 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1224 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae9030 gate 1589998820889625400 evaluation starts +orderer0.example.com | "2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157d Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [12c6 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1288 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11ef 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1225 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae9030 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [12c7 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1289 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11f0 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1226 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae9030 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157f Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [12c8 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [128a 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11f1 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1227 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae9030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-05-20 18:21:26.225 UTC [policies] Evaluate -> DEBU 1580 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [12c9 05-20 18:20:28.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [128b 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11f2 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1228 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae9030 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:26.225 UTC [common.deliver] deliverBlocks -> DEBU 1581 [channel: testchainid] Received seekInfo (0xc0003d32c0) start: > stop: > from 172.18.0.9:53630" +peer1.org1.example.com | [12ca 05-20 18:20:28.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [128c 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11f4 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1229 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae9030 gate 1589998820889625400 evaluation fails +orderer0.example.com | "2020-05-20 18:21:26.225 UTC [fsblkstorage] Next -> DEBU 1582 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org1.example.com | [12cb 05-20 18:20:28.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [128d 05-20 18:20:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [11f3 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [122a 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:26.225 UTC [fsblkstorage] newBlockfileStream -> DEBU 1583 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer1.org1.example.com | [12cc 05-20 18:20:28.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [128e 05-20 18:20:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11f5 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [122b 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:26.225 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1584 Remaining bytes=[30409], Going to peek [8] bytes" +peer1.org1.example.com | [12cd 05-20 18:20:28.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [128f 05-20 18:20:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [11f6 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [122c 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:26.226 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1585 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer1.org1.example.com | [12ce 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1290 05-20 18:20:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [11f7 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [122d 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae95a0 gate 1589998820890156000 evaluation starts +orderer0.example.com | "2020-05-20 18:21:26.226 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1586 blockbytes [30406] read from file [0]" +peer1.org1.example.com | [12cf 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1291 05-20 18:20:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11f8 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [122e 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae95a0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:26.227 UTC [common.deliver] deliverBlocks -> DEBU 1587 [channel: testchainid] Delivering block [1] for (0xc0003d32c0) for 172.18.0.9:53630" +peer1.org1.example.com | [12d0 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1292 05-20 18:20:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [11f9 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [122f 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae95a0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:26.227 UTC [common.deliver] deliverBlocks -> DEBU 1588 [channel: testchainid] Done delivering to 172.18.0.9:53630 for (0xc0003d32c0)" +peer1.org1.example.com | [12d1 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1293 05-20 18:20:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11fa 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1230 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae95a0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:26.227 UTC [common.deliver] Handle -> DEBU 1589 Waiting for new SeekInfo from 172.18.0.9:53630" +peer1.org1.example.com | [12d2 05-20 18:20:28.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1294 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [11fb 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1231 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +orderer0.example.com | "2020-05-20 18:21:26.228 UTC [common.deliver] Handle -> DEBU 158a Attempting to read seek info message from 172.18.0.9:53630" +peer1.org1.example.com | [12d3 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1295 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1296 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +peer1.org1.example.com | [12d4 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1297 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1232 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +orderer0.example.com | "2020-05-20 18:21:26.238 UTC [policies] Evaluate -> DEBU 158b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [11fc 05-20 18:20:27.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d5 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1298 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +orderer0.example.com | "2020-05-20 18:21:26.238 UTC [policies] Evaluate -> DEBU 158c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [11fd 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d6 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1299 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +orderer0.example.com | "2020-05-20 18:21:26.238 UTC [policies] Evaluate -> DEBU 158d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [11fe 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d7 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [129a 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 17 39 d7 6d 8c e4 fd e8 88 36 f0 c8 1d 02 66 57 |.9.m.....6....fW| +orderer0.example.com | "2020-05-20 18:21:26.239 UTC [policies] Evaluate -> DEBU 158e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [11ff 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12d8 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [129b 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 3e f6 b8 de 27 73 |>...'s| +peer0.org2.example.com | [1233 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae95a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1234 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae95a0 gate 1589998820890156000 evaluation succeeds +peer0.org2.example.com | [1235 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:26.239 UTC [policies] Evaluate -> DEBU 158f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [1236 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1237 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1238 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:26.239 UTC [cauthdsl] func1 -> DEBU 1590 0xc0009f9a20 gate 1589998886239907900 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:26.240 UTC [cauthdsl] func2 -> DEBU 1591 0xc0009f9a20 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1200 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:26.240 UTC [cauthdsl] func2 -> DEBU 1592 0xc0009f9a20 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:26.240 UTC [cauthdsl] func2 -> DEBU 1593 0xc0009f9a20 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:26.240 UTC [msp.identity] Verify -> DEBU 1594 Verify: digest = 00000000 5f da 9c fe 98 77 74 b6 c6 59 4c c9 04 31 80 ed |_....wt..YL..1..| +peer1.org1.example.com | [12d9 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1239 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000010 50 35 36 8a a3 76 6c 25 f4 d7 bd 96 6d 8d 88 4e |P56..vl%....m..N|" +peer1.org2.example.com | [1201 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1202 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1203 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1204 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12da 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1205 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [12db 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [12dc 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [12dd 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295fa0 gate 1589998828717297300 evaluation starts +peer1.org1.example.com | [12de 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [129c 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [129d 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [129e 05-20 18:20:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [129f 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1206 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1207 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1208 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1209 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.240 UTC [msp.identity] Verify -> DEBU 1595 Verify: sig = 00000000 30 45 02 21 00 ba f2 0c 58 8d 5f 4c fd 6d 3c 39 |0E.!....X._L.m<9| +peer0.org1.example.com | [12a0 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [123a 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [120a 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12df 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295fa0 processing identity 0 with bytes of 115a110 +orderer0.example.com | 00000010 09 02 a2 b2 1f 29 df ed 00 ba c6 53 5a 64 8a 82 |.....).....SZd..| +peer0.org1.example.com | [12a1 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [123b 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [123c 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [123d 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [123e 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [123f 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1240 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [120b 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [120c 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12a2 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1241 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1243 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [120d 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [120e 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 66 80 2d 7b 66 02 20 09 f8 fb 13 0e 40 e5 b4 7e |f.-{f. .....@..~| +peer0.org2.example.com | [1242 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [120f 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [12a3 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e0 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295fa0 principal matched by identity 0 +orderer0.example.com | 00000030 08 c4 94 7e 5f 09 11 37 3e e4 37 2e de e6 67 31 |...~_..7>.7...g1| +peer0.org2.example.com | [1244 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1210 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12a4 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e2 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1245 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | 00000040 c7 fd a0 1b 43 92 68 |....C.h|" +peer1.org2.example.com | [1211 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12a5 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e3 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1246 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:26.241 UTC [cauthdsl] func2 -> DEBU 1596 0xc0009f9a20 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [1212 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [12a6 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e1 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 5e 22 63 2e 10 12 65 2c a2 fa 9a 28 3e 33 3c |'^"c...e,...(>3<| +peer0.org2.example.com | [1247 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.241 UTC [cauthdsl] func1 -> DEBU 1597 0xc0009f9a20 gate 1589998886239907900 evaluation succeeds" +peer1.org2.example.com | [1213 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [12a7 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 b8 d6 e4 c1 89 60 b0 de bb bd 6d ef 35 08 3c 88 |.....`....m.5.<.| +peer0.org2.example.com | [1248 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\366\270\336's" > alive: +orderer0.example.com | "2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 1598 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1214 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [12a8 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e4 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 87 19 6c 50 2a 4f 0d e8 d0 e6 14 |0D. (..lP*O.....| +peer0.org2.example.com | [1249 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +orderer0.example.com | "2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 1599 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1215 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21970 gate 1589998828369180900 evaluation starts +peer0.org1.example.com | [12ac 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 d9 dd b8 a8 16 37 11 41 d3 0f bc 1a 4f d8 b9 40 |.....7.A....O..@| +peer0.org2.example.com | [124a 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +orderer0.example.com | "2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 159a Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1216 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21970 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 96 0c ad f0 02 20 3d 26 43 81 f5 37 df e4 5e 05 |..... =&C..7..^.| +peer0.org2.example.com | [124b 05-20 18:20:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +orderer0.example.com | "2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 159b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1217 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21970 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [12ad 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000030 f7 49 ab c2 13 57 6e 8f 38 64 8b 1c 9b 0c 74 fa |.I...Wn.8d....t.| +peer0.org2.example.com | [124c 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 159c Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [1218 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000040 36 67 2c ed 73 95 |6g,.s.| +peer0.org2.example.com | [124d 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc b5 ca 95 d3 87 6c f7 b2 82 c7 77 8f 14 cc fe |......l....w....| +orderer0.example.com | "2020-05-20 18:21:26.242 UTC [policies] Evaluate -> DEBU 159d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [1219 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21970 principal evaluation fails +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [12e5 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295fa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 a2 10 77 0b 1d f6 6c 4c 58 16 e4 3d b9 f7 9f 1c |..w...lLX..=....| +orderer0.example.com | "2020-05-20 18:21:26.242 UTC [common.deliver] deliverBlocks -> DEBU 159e [channel: testchainid] Received seekInfo (0xc000d72fc0) start: > stop: > from 172.18.0.9:53630" +peer1.org2.example.com | [121a 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21970 gate 1589998828369180900 evaluation fails +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | [12e6 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295fa0 gate 1589998828717297300 evaluation succeeds +peer0.org2.example.com | [124e 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd cc 44 da 81 d4 33 af 30 77 98 |0E.!...D...3.0w.| +orderer0.example.com | "2020-05-20 18:21:26.243 UTC [fsblkstorage] Next -> DEBU 159f Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org2.example.com | [121b 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [12e7 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 b5 fc 6e 6d e9 fe 94 50 a3 96 75 97 d8 41 12 8d |..nm...P..u..A..| +orderer0.example.com | "2020-05-20 18:21:26.243 UTC [fsblkstorage] newBlockfileStream -> DEBU 15a0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer1.org2.example.com | [121c 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12ae 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [12e8 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12e9 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:b\007L\273l\377\335Q\370\333" > alive: alive: +peer0.org2.example.com | 00000020 79 1b f3 9e c0 02 20 34 41 9d 00 61 0a 3f 2c 8f |y..... 4A..a.?,.| +peer1.org2.example.com | [121d 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [12ea 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 1d 3f d0 75 f3 d8 3c 8c dc 0d 15 b2 4a 90 6e 16 |.?.u..<.....J.n.| +peer1.org2.example.com | [121e 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ee0 gate 1589998828370707800 evaluation starts +orderer0.example.com | "2020-05-20 18:21:26.243 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15a1 Remaining bytes=[53339], Going to peek [8] bytes" +peer0.org1.example.com | [12af 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [12eb 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 1f 08 3c 1c 59 3d 95 |..<.Y=.| +peer1.org2.example.com | [121f 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ee0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:26.244 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15a2 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | [12ec 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [124f 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1220 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ee0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:26.244 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15a3 blockbytes [22927] read from file [0]" +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | [12ed 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1250 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1221 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ee0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:26.244 UTC [common.deliver] deliverBlocks -> DEBU 15a4 [channel: testchainid] Delivering block [0] for (0xc000d72fc0) for 172.18.0.9:53630" +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [12ee 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1251 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1222 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 43 16 86 31 55 c4 31 65 ed 50 7a 05 d4 d0 d8 |.C..1U.1e.Pz....| +orderer0.example.com | "2020-05-20 18:21:26.245 UTC [common.deliver] deliverBlocks -> DEBU 15a5 [channel: testchainid] Done delivering to 172.18.0.9:53630 for (0xc000d72fc0)" +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [12ef 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [12f0 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1252 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +orderer0.example.com | "2020-05-20 18:21:26.245 UTC [common.deliver] Handle -> DEBU 15a6 Waiting for new SeekInfo from 172.18.0.9:53630" +peer0.org1.example.com | [12b0 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.245 UTC [common.deliver] Handle -> DEBU 15a7 Attempting to read seek info message from 172.18.0.9:53630" +peer1.org2.example.com | 00000010 5c f8 57 c3 8c 57 5d 69 ef 9f a3 0d f7 f1 37 b3 |\.W..W]i......7.| +peer0.org1.example.com | [12b1 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1253 05-20 18:20:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | [12f1 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:26.254 UTC [grpc] infof -> DEBU 15a8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [1223 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 06 50 c9 08 20 3f 6d 90 8c 93 |0E.!...P.. ?m...| +peer0.org1.example.com | [12b2 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1254 05-20 18:20:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [12f2 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:26.254 UTC [common.deliver] Handle -> WARN 15a9 Error reading from 172.18.0.9:53630: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | 00000010 d4 f6 c7 b3 95 7d 32 ff a9 68 a2 b3 af 8a a2 01 |.....}2..h......| +peer0.org1.example.com | [12aa 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1255 05-20 18:20:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12f3 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.255 UTC [orderer.common.server] func1 -> DEBU 15aa Closing Deliver stream" +peer1.org2.example.com | 00000020 84 7f f6 22 00 02 20 5c a0 40 84 4f 94 b1 b5 94 |...".. \.@.O....| +peer0.org1.example.com | [12ab 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1256 05-20 18:20:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [12f4 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.255 UTC [comm.grpc.server] 1 -> INFO 15ab streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53630 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.6535ms +peer1.org2.example.com | 00000030 3c 38 62 3b a4 4f 06 07 b8 84 a7 75 0e fb 3f e0 |<8b;.O.....u..?.| +peer0.org1.example.com | [12b3 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1257 05-20 18:20:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [12f5 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ac Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000040 b8 a5 fa 87 8e 3c 1c |.....<.| +peer0.org1.example.com | [12b4 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1258 05-20 18:20:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12f6 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ad Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +peer1.org2.example.com | [1224 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ee0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [12a9 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1259 05-20 18:20:23.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [12f7 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 379.1µs " +peer1.org2.example.com | [1225 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ee0 gate 1589998828370707800 evaluation succeeds +peer0.org1.example.com | [12b5 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [125a 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [12f8 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15af Sending msg of 28 bytes to 2 on channel businesschannel took 39.6µs" +peer1.org2.example.com | [1226 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [12b6 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [125b 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12f9 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15b0 Sending msg of 28 bytes to 3 on channel businesschannel took 118.1µs" +peer1.org2.example.com | [1227 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [12b7 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [125c 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12fa 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 676.3µs " +peer1.org2.example.com | [1228 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [12b8 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [125d 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [12fb 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:26.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.6µs " +peer1.org2.example.com | [1229 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [12b9 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [125e 05-20 18:20:23.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:26.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [12fc 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [122a 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12ba 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [125f 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:26.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [12fd 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [122b 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [12bc 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1260 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b742e0 gate 1589998823491115200 evaluation starts +orderer0.example.com | "2020-05-20 18:21:26.480 UTC [orderer.common.server] Deliver -> DEBU 15b5 Starting new Deliver handler" +peer1.org1.example.com | [12fe 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [122c 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [12bd 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1261 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b742e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:26.480 UTC [common.deliver] Handle -> DEBU 15b6 Starting new deliver loop for 172.18.0.9:53632" +peer1.org1.example.com | [1300 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12ff 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1301 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1302 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1303 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1304 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [122d 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1262 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b742e0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:26.480 UTC [common.deliver] Handle -> DEBU 15b7 Attempting to read seek info message from 172.18.0.9:53632" +peer1.org1.example.com | [1305 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [12be 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [122e 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [122f 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [1306 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12bf 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1230 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1263 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b742e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1307 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [12bb 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1231 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1264 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b742e0 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1308 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12c0 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1232 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1265 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b742e0 gate 1589998823491115200 evaluation fails +orderer0.example.com | "2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1309 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [12c1 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 gate 1589998823768818900 evaluation starts +peer1.org2.example.com | [1233 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1266 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15bc == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [130a 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12c2 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1234 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1267 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:26.481 UTC [cauthdsl] func1 -> DEBU 15bd 0xc000e6a570 gate 1589998886481691900 evaluation starts" +peer1.org1.example.com | [130b 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [12c3 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1235 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1268 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:26.482 UTC [cauthdsl] func2 -> DEBU 15be 0xc000e6a570 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [130c 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12c4 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 principal matched by identity 0 +peer1.org2.example.com | [1236 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1269 05-20 18:20:23.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b74850 gate 1589998823499323600 evaluation starts +orderer0.example.com | "2020-05-20 18:21:26.482 UTC [cauthdsl] func2 -> DEBU 15bf 0xc000e6a570 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [130d 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [12c5 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1237 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [126a 05-20 18:20:23.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b74850 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:26.482 UTC [cauthdsl] func2 -> DEBU 15c0 0xc000e6a570 principal matched by identity 0" +peer1.org1.example.com | [130e 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [12c6 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161019 +peer1.org2.example.com | [1238 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [126b 05-20 18:20:23.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b74850 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:26.482 UTC [msp.identity] Verify -> DEBU 15c1 Verify: digest = 00000000 01 39 80 f0 f5 7b 84 ab 44 5a 9b df c5 86 f4 a7 |.9...{..DZ......| +peer1.org1.example.com | [130f 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [12c7 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 62A1CCB5C88C412BB371E7502C0A478744E28F248CB9FE7B56434A742A4169B2 +peer1.org2.example.com | [1239 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [126c 05-20 18:20:23.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b74850 principal matched by identity 0 +peer0.org2.example.com | [126d 05-20 18:20:23.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 00 5f 18 f5 59 2c 41 d7 46 ee 2f 9a ce 91 32 |.._..Y,A.F./...2| +orderer0.example.com | 00000010 a3 83 10 35 b2 57 32 5d 3b 59 f7 11 65 d7 86 2b |...5.W2];Y..e..+|" +peer1.org2.example.com | [123a 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c8 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 bf 29 0d 8e d2 19 56 25 42 28 0d 9f af 6f 8f dc |.)....V%B(...o..| +peer0.org2.example.com | [126e 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a be 29 8d 7c e9 5f e9 a0 cf 6f bc |0D. ..).|._...o.| +peer0.org2.example.com | 00000010 f6 99 4f 15 64 5e e7 8d 70 8a c3 af 5b 07 7c d7 |..O.d^..p...[.|.| +peer1.org2.example.com | [123b 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 df fb c1 36 02 20 23 c2 cd b7 41 35 e6 56 0b f5 |...6. #...A5.V..| +peer0.org2.example.com | 00000030 4c 92 96 49 83 d6 22 f4 1c 92 30 93 21 79 36 f7 |L..I.."...0.!y6.| +peer0.org2.example.com | 00000040 f1 f0 7c 36 56 64 |..|6Vd| +peer0.org2.example.com | [126f 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b74850 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1270 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b74850 gate 1589998823499323600 evaluation succeeds +peer1.org2.example.com | [123c 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c9 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1310 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:26.483 UTC [msp.identity] Verify -> DEBU 15c2 Verify: sig = 00000000 30 45 02 21 00 d6 50 87 20 db 12 f2 8b b6 33 45 |0E.!..P. .....3E| +peer0.org2.example.com | [1271 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [123d 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [12ca 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [1311 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | 00000010 a5 01 ce 04 1f 16 c1 78 06 77 21 ec b2 c6 b1 9d |.......x.w!.....| +peer0.org2.example.com | [1272 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [123e 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12cb 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [12cc 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [12cd 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [12ce 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | [1312 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1313 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [123f 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1274 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1314 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1275 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +orderer0.example.com | 00000020 13 b4 9e 2f 66 02 20 10 e5 b1 42 a6 11 d2 c0 1a |.../f. ...B.....| +peer0.org2.example.com | [1276 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1277 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1278 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1315 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | 00000030 50 42 f5 d2 6e df fb c4 49 1c e5 31 30 7c 27 2c |PB..n...I..10|',| +peer0.org2.example.com | [1279 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1316 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org2.example.com | [1240 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1241 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 c3 41 52 b9 b0 dd c5 |.AR....|" +peer0.org2.example.com | [127a 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1317 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [12cf 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [12d0 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 gate 1589998823768818900 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:26.484 UTC [cauthdsl] func2 -> DEBU 15c3 0xc000e6a570 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [127b 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [127c 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1318 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12d1 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12d2 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [12d3 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12d4 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [12d5 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [12d6 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12d7 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12d8 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [12d9 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12da 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12db 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [12dc 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [12dd 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [12de 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 gate 1589998823894082200 evaluation starts +peer0.org1.example.com | [12df 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [12e0 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [12e1 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 principal matched by identity 0 +peer0.org1.example.com | [12e2 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [12e3 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [12e4 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [12e5 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 gate 1589998823894082200 evaluation succeeds +peer0.org1.example.com | [12e6 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1242 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1243 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1244 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1245 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1246 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1247 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1248 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1249 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [124a 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [124b 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [124c 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [124d 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [124e 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [124f 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1250 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1251 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1252 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1253 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1254 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1255 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1256 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1257 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1258 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1259 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88530 gate 1589998828425869900 evaluation starts +peer1.org2.example.com | [125a 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [125b 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88530 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:26.484 UTC [cauthdsl] func1 -> DEBU 15c4 0xc000e6a570 gate 1589998886481691900 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:26.484 UTC [policies] Evaluate -> DEBU 15c5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:26.484 UTC [policies] Evaluate -> DEBU 15c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:26.484 UTC [policies] Evaluate -> DEBU 15c7 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:26.485 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:26.485 UTC [policies] Evaluate -> DEBU 15c9 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:26.486 UTC [policies] Evaluate -> DEBU 15ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:26.486 UTC [common.deliver] deliverBlocks -> DEBU 15cb [channel: testchainid] Received seekInfo (0xc000d73580) start: > stop: > from 172.18.0.9:53632" +orderer0.example.com | "2020-05-20 18:21:26.486 UTC [fsblkstorage] Next -> DEBU 15cc Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-05-20 18:21:26.487 UTC [fsblkstorage] newBlockfileStream -> DEBU 15cd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-05-20 18:21:26.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15ce Remaining bytes=[53339], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:26.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15cf Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-05-20 18:21:26.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15d0 blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:26.490 UTC [common.deliver] deliverBlocks -> DEBU 15d1 [channel: testchainid] Delivering block [0] for (0xc000d73580) for 172.18.0.9:53632" +orderer0.example.com | "2020-05-20 18:21:26.490 UTC [common.deliver] deliverBlocks -> DEBU 15d2 [channel: testchainid] Done delivering to 172.18.0.9:53632 for (0xc000d73580)" +orderer0.example.com | "2020-05-20 18:21:26.491 UTC [common.deliver] Handle -> DEBU 15d3 Waiting for new SeekInfo from 172.18.0.9:53632" +orderer0.example.com | "2020-05-20 18:21:26.491 UTC [common.deliver] Handle -> DEBU 15d4 Attempting to read seek info message from 172.18.0.9:53632" +orderer0.example.com | "2020-05-20 18:21:26.502 UTC [grpc] infof -> DEBU 15d5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:26.502 UTC [common.deliver] Handle -> WARN 15d6 Error reading from 172.18.0.9:53632: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:26.502 UTC [orderer.common.server] func1 -> DEBU 15d7 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:26.502 UTC [comm.grpc.server] 1 -> INFO 15d8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53632 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.7895ms +orderer0.example.com | "2020-05-20 18:21:26.745 UTC [orderer.common.server] Deliver -> DEBU 15d9 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:26.745 UTC [common.deliver] Handle -> DEBU 15da Starting new deliver loop for 172.18.0.9:53634" +orderer0.example.com | "2020-05-20 18:21:26.745 UTC [common.deliver] Handle -> DEBU 15db Attempting to read seek info message from 172.18.0.9:53634" +orderer0.example.com | "2020-05-20 18:21:26.751 UTC [policies] Evaluate -> DEBU 15dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:26.752 UTC [policies] Evaluate -> DEBU 15dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:26.752 UTC [policies] Evaluate -> DEBU 15de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:26.752 UTC [policies] Evaluate -> DEBU 15df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:26.752 UTC [policies] Evaluate -> DEBU 15e0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:26.752 UTC [cauthdsl] func1 -> DEBU 15e1 0xc000d4bd80 gate 1589998886752697700 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:26.752 UTC [cauthdsl] func2 -> DEBU 15e2 0xc000d4bd80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:26.752 UTC [cauthdsl] func2 -> DEBU 15e3 0xc000d4bd80 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:26.753 UTC [cauthdsl] func2 -> DEBU 15e4 0xc000d4bd80 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:26.753 UTC [msp.identity] Verify -> DEBU 15e5 Verify: digest = 00000000 9f 16 c9 60 65 00 cd 29 b2 f5 4c 82 ff 56 29 78 |...`e..)..L..V)x| +orderer0.example.com | 00000010 7c 43 db f2 23 37 a9 53 4f 82 33 95 30 6e b1 0b ||C..#7.SO.3.0n..|" +orderer0.example.com | "2020-05-20 18:21:26.753 UTC [msp.identity] Verify -> DEBU 15e6 Verify: sig = 00000000 30 44 02 20 3d 6d 0e 4a 9f 13 1b cd 7f 24 a7 ec |0D. =m.J.....$..| +orderer0.example.com | 00000010 68 2d f0 62 70 88 63 42 89 c5 2a ed f5 1d 0c d0 |h-.bp.cB..*.....| +orderer0.example.com | 00000020 fe 18 7a 89 02 20 23 a7 2b 97 b2 b4 3b 62 76 b7 |..z.. #.+...;bv.| +orderer0.example.com | 00000030 9f 86 df cc c6 2e 3d be 1e 70 7f 23 48 b1 eb 3a |......=..p.#H..:| +orderer0.example.com | 00000040 62 b5 45 f4 91 80 |b.E...|" +orderer0.example.com | "2020-05-20 18:21:26.753 UTC [cauthdsl] func2 -> DEBU 15e7 0xc000d4bd80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:26.754 UTC [cauthdsl] func1 -> DEBU 15e8 0xc000d4bd80 gate 1589998886752697700 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:26.754 UTC [policies] Evaluate -> DEBU 15e9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:26.754 UTC [policies] Evaluate -> DEBU 15ea == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:26.754 UTC [policies] Evaluate -> DEBU 15eb Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:26.755 UTC [policies] Evaluate -> DEBU 15ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:26.755 UTC [policies] Evaluate -> DEBU 15ed Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:26.755 UTC [policies] Evaluate -> DEBU 15ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:26.755 UTC [common.deliver] deliverBlocks -> DEBU 15ef [channel: testchainid] Received seekInfo (0xc000cfe340) start: > stop: > from 172.18.0.9:53634" +orderer0.example.com | "2020-05-20 18:21:26.755 UTC [fsblkstorage] Next -> DEBU 15f0 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-05-20 18:21:26.755 UTC [fsblkstorage] newBlockfileStream -> DEBU 15f1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +orderer0.example.com | "2020-05-20 18:21:26.756 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15f2 Remaining bytes=[30409], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:26.756 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15f3 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-05-20 18:21:26.756 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15f4 blockbytes [30406] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:26.756 UTC [common.deliver] deliverBlocks -> DEBU 15f5 [channel: testchainid] Delivering block [1] for (0xc000cfe340) for 172.18.0.9:53634" +orderer0.example.com | "2020-05-20 18:21:26.757 UTC [common.deliver] deliverBlocks -> DEBU 15f6 [channel: testchainid] Done delivering to 172.18.0.9:53634 for (0xc000cfe340)" +orderer0.example.com | "2020-05-20 18:21:26.757 UTC [common.deliver] Handle -> DEBU 15f7 Waiting for new SeekInfo from 172.18.0.9:53634" +orderer0.example.com | "2020-05-20 18:21:26.757 UTC [common.deliver] Handle -> DEBU 15f8 Attempting to read seek info message from 172.18.0.9:53634" +orderer0.example.com | "2020-05-20 18:21:26.765 UTC [common.deliver] Handle -> WARN 15f9 Error reading from 172.18.0.9:53634: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:26.765 UTC [orderer.common.server] func1 -> DEBU 15fa Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:26.765 UTC [comm.grpc.server] 1 -> INFO 15fb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53634 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.6923ms +orderer0.example.com | "2020-05-20 18:21:26.766 UTC [grpc] infof -> DEBU 15fc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:26.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15fd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:26.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15fe Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" +orderer0.example.com | "2020-05-20 18:21:26.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15ff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " +orderer0.example.com | "2020-05-20 18:21:26.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1600 Sending msg of 28 bytes to 2 on channel businesschannel took 33.8µs" +orderer0.example.com | "2020-05-20 18:21:26.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1601 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +orderer0.example.com | "2020-05-20 18:21:26.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1602 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +orderer0.example.com | "2020-05-20 18:21:26.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1603 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.7µs " +orderer0.example.com | "2020-05-20 18:21:26.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1604 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:26.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1605 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:27.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1606 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:27.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1607 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2020-05-20 18:21:27.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1608 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 333µs " +orderer0.example.com | "2020-05-20 18:21:27.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1609 Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +orderer0.example.com | "2020-05-20 18:21:27.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313.2µs " +orderer0.example.com | "2020-05-20 18:21:27.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160b Sending msg of 28 bytes to 2 on channel businesschannel took 8.6µs" +orderer0.example.com | "2020-05-20 18:21:27.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:27.381 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.6144ms " +orderer0.example.com | "2020-05-20 18:21:27.382 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:27.861 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:27.861 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1610 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2020-05-20 18:21:27.861 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1611 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.5µs " +orderer0.example.com | "2020-05-20 18:21:27.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1612 Sending msg of 28 bytes to 2 on channel businesschannel took 58.4µs" +orderer0.example.com | "2020-05-20 18:21:27.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1613 Sending msg of 28 bytes to 3 on channel businesschannel took 6.2µs" +orderer0.example.com | "2020-05-20 18:21:27.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1614 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.6µs " +orderer0.example.com | "2020-05-20 18:21:27.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1615 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +orderer0.example.com | "2020-05-20 18:21:27.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1616 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:27.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1617 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:28.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1618 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:28.321 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1619 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2020-05-20 18:21:28.321 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.4µs " +orderer0.example.com | "2020-05-20 18:21:28.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161b Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" +orderer0.example.com | "2020-05-20 18:21:28.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161c Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-05-20 18:21:28.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.9µs " +orderer0.example.com | "2020-05-20 18:21:28.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.4µs " +orderer0.example.com | "2020-05-20 18:21:28.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:28.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1620 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:28.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1621 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:28.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1622 Sending msg of 28 bytes to 3 on channel testchainid took 49.4µs" +orderer0.example.com | "2020-05-20 18:21:28.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1623 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.3µs " +orderer0.example.com | "2020-05-20 18:21:28.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1624 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2020-05-20 18:21:28.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1625 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2020-05-20 18:21:28.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1626 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.3µs " +orderer0.example.com | "2020-05-20 18:21:28.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1627 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.8µs " +orderer0.example.com | "2020-05-20 18:21:28.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1628 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:28.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1629 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:29.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:29.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162b Sending msg of 28 bytes to 3 on channel testchainid took 31.5µs" +orderer0.example.com | "2020-05-20 18:21:29.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 679.9µs " +orderer0.example.com | "2020-05-20 18:21:29.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162d Sending msg of 28 bytes to 2 on channel businesschannel took 16.6µs" +orderer0.example.com | "2020-05-20 18:21:29.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162e Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-05-20 18:21:29.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +orderer0.example.com | "2020-05-20 18:21:29.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1630 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.8µs " +orderer0.example.com | "2020-05-20 18:21:29.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1631 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:29.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1632 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:29.828 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1633 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:29.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1634 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +orderer0.example.com | "2020-05-20 18:21:29.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1635 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " +orderer0.example.com | "2020-05-20 18:21:29.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1636 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2020-05-20 18:21:29.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1637 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2020-05-20 18:21:29.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1638 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.4µs " +orderer0.example.com | "2020-05-20 18:21:29.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1639 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 581.8µs " +orderer0.example.com | "2020-05-20 18:21:29.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:29.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:30.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:30.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163d Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +orderer0.example.com | "2020-05-20 18:21:30.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.9µs " +orderer0.example.com | "2020-05-20 18:21:30.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163f Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2020-05-20 18:21:30.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1640 Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2020-05-20 18:21:30.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1641 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.4µs " +orderer0.example.com | "2020-05-20 18:21:30.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1642 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.6µs " +orderer0.example.com | "2020-05-20 18:21:30.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1643 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:30.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1644 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:30.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1645 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:30.825 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1646 Sending msg of 28 bytes to 3 on channel testchainid took 48.1µs" +orderer0.example.com | "2020-05-20 18:21:30.825 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1647 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.3µs " +orderer0.example.com | "2020-05-20 18:21:30.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1648 Sending msg of 28 bytes to 2 on channel businesschannel took 55.5µs" +orderer0.example.com | "2020-05-20 18:21:30.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1649 Sending msg of 28 bytes to 3 on channel businesschannel took 26.4µs" +orderer0.example.com | "2020-05-20 18:21:30.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 655.4µs " +orderer0.example.com | "2020-05-20 18:21:30.845 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.3505ms " +orderer0.example.com | "2020-05-20 18:21:30.847 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:30.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:31.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:31.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164f Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2020-05-20 18:21:31.323 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1650 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " +orderer0.example.com | "2020-05-20 18:21:31.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1651 Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +orderer0.example.com | "2020-05-20 18:21:31.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1652 Sending msg of 28 bytes to 3 on channel businesschannel took 30.5µs" +orderer0.example.com | "2020-05-20 18:21:31.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1653 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.3µs " +orderer0.example.com | "2020-05-20 18:21:31.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1654 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.6µs " +orderer0.example.com | "2020-05-20 18:21:31.345 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1655 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:31.346 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1656 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:31.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1657 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1319 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [131a 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [131b 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [131c 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [131d 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003321e90 gate 1589998828840817500 evaluation starts +peer1.org1.example.com | [131e 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003321e90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [131f 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003321e90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1320 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003321e90 principal matched by identity 0 +peer1.org1.example.com | [1321 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 d4 03 95 0b 28 3c 00 86 94 c3 1d ef b2 33 b4 |W....(<.......3.| +peer1.org1.example.com | 00000010 39 a0 29 39 9e b2 1b d2 b1 f6 4b da 0a 82 db de |9.)9......K.....| +peer1.org1.example.com | [1322 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 de 89 ad cc 1a 7d 8b ab 4b 1a |0E.!.......}..K.| +peer1.org1.example.com | 00000010 84 34 4c 8d 59 e5 b7 84 cd 7c 4b f7 3f 0c 36 64 |.4L.Y....|K.?.6d| +peer1.org1.example.com | 00000020 2b 9d 5f d8 a6 02 20 3d b9 e5 68 dc da 42 7a 74 |+._... =..h..Bzt| +peer1.org1.example.com | 00000030 58 39 5b ad a9 ad ac d6 e6 2e eb c8 56 24 f5 ff |X9[.........V$..| +peer1.org1.example.com | 00000040 f5 85 8c fa cc 84 c6 |.......| +peer1.org1.example.com | [1323 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003321e90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1324 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003321e90 gate 1589998828840817500 evaluation succeeds +peer1.org1.example.com | [1325 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1326 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1327 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1328 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1329 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [132a 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [132b 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [132c 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [132d 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [132e 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [132f 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1330 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1331 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1332 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1333 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1334 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12e7 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12e8 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [12e9 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [12ea 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12eb 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [12ec 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ed 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ee 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ef 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [12f0 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12f1 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12f2 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [12f3 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [12f4 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [12f5 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 gate 1589998823898861900 evaluation starts +peer0.org1.example.com | [12f6 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [12f7 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [12f8 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 principal matched by identity 0 +peer0.org1.example.com | [12f9 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [12fa 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [12fb 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [12fc 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 gate 1589998823898861900 evaluation succeeds +peer0.org1.example.com | [12fd 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12ff 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1300 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [12fe 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1301 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1303 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1304 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1305 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1306 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [127d 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [127e 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [127f 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1280 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1281 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1282 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1283 05-20 18:20:23.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1284 05-20 18:20:23.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1285 05-20 18:20:23.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1286 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1287 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1288 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1289 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [128a 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [128c 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [128d 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [128b 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [128e 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [128f 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1290 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1291 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1292 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1293 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1294 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1295 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1296 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1297 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1298 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816101A +peer0.org2.example.com | [1299 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B59F80DE10A79BCEA7854D51120ECC19FC824099B54C4E13D31E58A6C3AA138F +peer0.org2.example.com | [129a 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [129b 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [129c 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [129d 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [129e 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [129f 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12a0 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12a1 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [12a2 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [12a3 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12a4 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12a5 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12a6 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12a7 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12a8 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [12a9 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12aa 05-20 18:20:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ab 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12ac 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ad 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12ae 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [12af 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 44 5d df 21 54 e4 bf 96 6b 82 14 02 fa f6 af |.D].!T...k......| +peer0.org2.example.com | 00000010 62 81 39 11 9e d8 d2 1c bf 0b 54 fc be 6d 73 30 |b.9.......T..ms0| +peer0.org2.example.com | [12b0 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 94 3c c8 9c 02 78 52 ce 35 34 c3 |0D. ..<...xR.54.| +peer0.org2.example.com | 00000010 43 5f 8e 1b c0 bd 3d ac b7 17 69 ad c5 fd a8 65 |C_....=...i....e| +peer0.org2.example.com | 00000020 14 33 62 fd 02 20 38 b1 5f ab 65 1a c3 fe 5a 75 |.3b.. 8._.e...Zu| +peer0.org2.example.com | 00000030 f0 11 d6 a2 47 90 03 8b d8 86 4c 87 19 51 8d 99 |....G.....L..Q..| +peer0.org2.example.com | 00000040 9b 63 bf fa e3 4e |.c...N| +peer0.org2.example.com | [12b1 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12b2 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [12b3 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [12b4 05-20 18:20:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [12b5 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [12b6 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12b7 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12b8 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12b9 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ba 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12bb 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [12bd 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12be 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12bc 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12bf 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [12c0 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:31.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1658 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2020-05-20 18:21:31.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1659 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.9µs " +orderer0.example.com | "2020-05-20 18:21:31.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165a Sending msg of 28 bytes to 2 on channel businesschannel took 16.8µs" +orderer0.example.com | "2020-05-20 18:21:31.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165b Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" +orderer0.example.com | "2020-05-20 18:21:31.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.4µs " +orderer0.example.com | "2020-05-20 18:21:31.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274.4µs " +orderer0.example.com | "2020-05-20 18:21:31.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:31.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:32.323 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1660 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:32.325 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1661 Sending msg of 28 bytes to 3 on channel testchainid took 43.6µs" +orderer0.example.com | "2020-05-20 18:21:32.326 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1662 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.6µs " +orderer0.example.com | "2020-05-20 18:21:32.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1663 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +orderer0.example.com | "2020-05-20 18:21:32.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1664 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +orderer0.example.com | "2020-05-20 18:21:32.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1665 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.2µs " +orderer0.example.com | "2020-05-20 18:21:32.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1666 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0573ms " +orderer0.example.com | "2020-05-20 18:21:32.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1667 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:32.345 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1668 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:32.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1669 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:32.822 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166a Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-05-20 18:21:32.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +orderer0.example.com | "2020-05-20 18:21:32.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166c Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +orderer0.example.com | "2020-05-20 18:21:32.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166d Sending msg of 28 bytes to 3 on channel businesschannel took 45.6µs" +orderer0.example.com | "2020-05-20 18:21:32.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102µs " +orderer0.example.com | "2020-05-20 18:21:32.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 424.9µs " +orderer0.example.com | "2020-05-20 18:21:32.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1670 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:32.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1671 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:33.338 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1672 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:33.339 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1673 Sending msg of 28 bytes to 3 on channel testchainid took 41.8µs" +orderer0.example.com | "2020-05-20 18:21:33.339 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1674 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +orderer0.example.com | "2020-05-20 18:21:33.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1675 Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +orderer0.example.com | "2020-05-20 18:21:33.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1676 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +orderer0.example.com | "2020-05-20 18:21:33.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1677 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +orderer0.example.com | "2020-05-20 18:21:33.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1678 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.9µs " +orderer0.example.com | "2020-05-20 18:21:33.347 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1679 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:33.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:33.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:33.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167c Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2020-05-20 18:21:33.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " +peer1.org1.example.com | [1335 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1336 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1337 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1339 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [133a 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be b0 ef 21 03 1b 0f 67 69 72 69 ea 79 ed b8 8f |...!...giri.y...| +peer1.org1.example.com | 00000010 23 6b 5d f4 8e 31 0a f4 48 6e 1a 77 9f 94 21 9d |#k]..1..Hn.w..!.| +peer1.org1.example.com | [1338 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [133b 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [133c 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 33 ea 3d 65 75 3a 26 bc a5 2b 56 13 |0C. 3.=eu:&..+V.| +peer1.org1.example.com | 00000010 72 0a 78 bb 88 bb 95 92 55 20 12 14 5a 58 88 d3 |r.x.....U ..ZX..| +peer1.org1.example.com | 00000020 f2 76 39 8d 02 1f 29 42 1e f1 47 2d fc 3d c2 47 |.v9...)B..G-.=.G| +peer1.org1.example.com | 00000030 f0 d1 ba 24 b9 d4 8c f0 58 a1 91 68 19 a3 6e 2f |...$....X..h..n/| +peer1.org1.example.com | 00000040 95 c6 f9 3c e7 |...<.| +peer1.org1.example.com | [133d 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [133f 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]} +peer1.org1.example.com | [1340 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1341 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1342 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1343 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1344 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1345 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1346 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1347 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1348 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1349 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [134a 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [134b 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [134c 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [134d 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [134e 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [133e 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [134f 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1350 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1351 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1352 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1353 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1354 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1355 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1356 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1357 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1358 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [125c 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [125d 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88530 principal evaluation fails +peer1.org2.example.com | [125e 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88530 gate 1589998828425869900 evaluation fails +peer1.org2.example.com | [125f 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1260 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1261 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1262 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88aa0 gate 1589998828428612900 evaluation starts +peer1.org2.example.com | [1263 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88aa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1264 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88aa0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1266 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88aa0 principal matched by identity 0 +peer1.org2.example.com | [1267 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer1.org2.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +peer1.org2.example.com | [1268 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +peer1.org2.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +peer1.org2.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +peer1.org2.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +peer1.org2.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +peer1.org2.example.com | [1265 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1269 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [126a 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88aa0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [126b 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a88aa0 gate 1589998828428612900 evaluation succeeds +peer1.org2.example.com | [126c 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [126d 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [126e 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [126f 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1270 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1271 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1272 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1273 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1274 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1275 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1276 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1277 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1278 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1279 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [127a 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [127b 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [127c 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [127d 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [127e 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [127f 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1359 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [135b 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [135a 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [135c 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [135d 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [135e 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [135f 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1360 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1361 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1362 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1363 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1364 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1365 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1366 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +peer1.org1.example.com | [1367 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1368 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1369 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [136b 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [136a 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +peer1.org1.example.com | [136c 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [136d 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [136e 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [136f 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1370 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1371 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1372 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1373 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1374 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1375 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1376 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a93e0 gate 1589998828887756800 evaluation starts +peer1.org1.example.com | [1377 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1378 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a93e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1379 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [137a 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a93e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [137b 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a93e0 principal matched by identity 0 +peer1.org1.example.com | [137c 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [137d 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer1.org1.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer1.org1.example.com | [137e 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer1.org1.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer1.org1.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer1.org1.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer1.org1.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer1.org1.example.com | [137f 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1380 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1381 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1382 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a93e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1383 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a93e0 gate 1589998828887756800 evaluation succeeds +peer1.org1.example.com | [1384 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1385 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1386 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1387 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1388 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1389 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [138a 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [138b 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [138c 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [138d 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [138e 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [138f 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1390 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1391 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1392 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1393 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1394 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1395 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1396 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1397 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1398 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1399 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [139a 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [139b 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [139c 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +peer1.org1.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +peer1.org1.example.com | [139d 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +peer1.org1.example.com | 00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +peer1.org1.example.com | 00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +peer1.org1.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +peer1.org2.example.com | [1280 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1281 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1282 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1283 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1284 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1285 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1286 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1287 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1288 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1289 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [128a 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [128b 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [128c 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [128d 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [128e 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [128f 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1290 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1291 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1292 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1293 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1294 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95bb0 gate 1589998828457219800 evaluation starts +peer1.org2.example.com | [1295 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1296 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95bb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1297 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1298 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95bb0 principal evaluation fails +peer1.org2.example.com | [1299 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95bb0 gate 1589998828457219800 evaluation fails +peer1.org2.example.com | [129a 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [129b 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [129c 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [129d 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6120 gate 1589998828465277500 evaluation starts +peer1.org2.example.com | [129e 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6120 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1307 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1308 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1309 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [130a 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [130b 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [130c 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [130d 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 gate 1589998823933102200 evaluation starts +peer0.org1.example.com | [130e 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [130f 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1310 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 principal matched by identity 0 +peer0.org1.example.com | [1311 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1312 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003a35c90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1314 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 gate 1589998823933102200 evaluation succeeds +peer0.org1.example.com | [1315 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1316 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1317 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1318 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1302 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1319 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [131a 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [131b 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [131c 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [131d 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [131e 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [131f 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1320 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1321 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1323 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1322 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1324 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1325 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1326 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1327 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1329 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1328 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 gate 1589998823952183500 evaluation starts +peer0.org1.example.com | [132a 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [132b 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [132c 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 principal matched by identity 0 +peer0.org1.example.com | [132d 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [132e 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1330 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1331 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1332 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1333 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1334 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1335 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1336 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1339 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [133a 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1337 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [133b 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 gate 1589998823952183500 evaluation succeeds +peer0.org1.example.com | [133c 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [133d 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [133e 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1338 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [133f 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1340 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +peer1.org1.example.com | [139e 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive: +peer1.org1.example.com | [139f 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [13a0 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13a1 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [13a2 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 18 64 fb 10 a0 b6 34 9c 5e 89 27 |0D. 7.d....4.^.'| +peer1.org1.example.com | 00000010 72 54 20 9f 2f 2c fc 82 41 25 86 34 f8 b3 f9 73 |rT ./,..A%.4...s| +peer1.org1.example.com | 00000020 ef bd 05 ff 02 20 5f e0 6f 1c 1c a1 ee 7a e1 f6 |..... _.o....z..| +peer1.org1.example.com | 00000030 e1 dc 82 64 b9 1c a5 7b fb eb cc 63 92 67 72 88 |...d...{...c.gr.| +peer1.org1.example.com | 00000040 8b 40 7e 46 1c 2c |.@~F.,| +peer1.org1.example.com | [13a3 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [13a4 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [13a5 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [13a6 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [13a7 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership +peer1.org1.example.com | [13a8 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13a9 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13aa 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13ab 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [13ac 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13ad 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13ae 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13af 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" secret_envelope: > alive: +peer1.org1.example.com | [13b0 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [13b1 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13b2 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [13b3 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 71 0f 14 e5 05 c8 25 01 70 1a f2 14 17 18 b5 |.q.....%.p......| +peer1.org1.example.com | 00000010 48 3e b6 5d 3c 47 3f 52 e9 dc 3e 8c 08 66 94 bf |H>.]..f..| +peer1.org1.example.com | [13b4 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 59 28 79 18 7e dd d9 41 19 f6 |0E.!..Y(y.~..A..| +peer1.org1.example.com | 00000010 0f 4e 6e f6 7e fd e4 c4 fd 95 e6 de c4 49 62 d6 |.Nn.~........Ib.| +peer1.org1.example.com | 00000020 fc 0e b8 d3 4e 02 20 74 85 55 f5 f9 14 1b 00 20 |....N. t.U..... | +peer1.org1.example.com | 00000030 99 5e 66 6d 02 3f f7 53 96 7e 0d 4a 41 92 59 e6 |.^fm.?.S.~.JA.Y.| +peer1.org1.example.com | 00000040 3f 4c a0 3f 99 ed 85 |?L.?...| +peer1.org1.example.com | [13b5 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13b6 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13b7 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13b8 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [13b9 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ba 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13bb 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13bc 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13bd 05-20 18:20:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [13be 05-20 18:20:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [13bf 05-20 18:20:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [13c0 05-20 18:20:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13c1 05-20 18:20:32.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13c3 05-20 18:20:32.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13c4 05-20 18:20:32.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13c5 05-20 18:20:32.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [13c6 05-20 18:20:32.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13c2 05-20 18:20:32.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13c7 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [13c8 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c9 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13ca 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13cb 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13cc 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13cd 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13ce 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1341 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1342 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1343 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1344 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1345 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1346 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1347 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1348 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1349 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [134a 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [134b 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [134c 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [134d 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 gate 1589998824087457500 evaluation starts +peer0.org1.example.com | [134e 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [134f 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1350 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 principal matched by identity 0 +peer0.org1.example.com | [1351 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1352 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1353 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1354 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 gate 1589998824087457500 evaluation succeeds +peer0.org1.example.com | [1355 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1356 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1357 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1358 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1359 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [135a 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [135b 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [135c 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [135d 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [135e 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [135f 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1360 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1361 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1362 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1363 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1364 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1365 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1366 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 gate 1589998824143241700 evaluation starts +peer0.org1.example.com | [1368 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1367 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:33.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167e Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +orderer0.example.com | "2020-05-20 18:21:33.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167f Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2020-05-20 18:21:33.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1680 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.5µs " +orderer0.example.com | "2020-05-20 18:21:33.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1681 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.9µs " +orderer0.example.com | "2020-05-20 18:21:33.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1682 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:33.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1683 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:34.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1684 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:34.321 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1685 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2020-05-20 18:21:34.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1686 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +orderer0.example.com | "2020-05-20 18:21:34.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1687 Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +orderer0.example.com | "2020-05-20 18:21:34.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1688 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2020-05-20 18:21:34.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1689 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.7µs " +orderer0.example.com | "2020-05-20 18:21:34.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 168a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.6µs " +orderer0.example.com | "2020-05-20 18:21:34.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:34.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:34.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:34.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 168e Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2020-05-20 18:21:34.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 168f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.4µs " +orderer0.example.com | "2020-05-20 18:21:34.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1690 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:21:34.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1691 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2020-05-20 18:21:34.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1692 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129.3µs " +orderer0.example.com | "2020-05-20 18:21:34.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1693 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:34.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1694 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:34.843 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1695 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7753ms " +orderer0.example.com | "2020-05-20 18:21:35.060 UTC [orderer.common.server] Deliver -> DEBU 1696 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:35.060 UTC [common.deliver] Handle -> DEBU 1697 Starting new deliver loop for 172.18.0.9:53636" +orderer0.example.com | "2020-05-20 18:21:35.061 UTC [common.deliver] Handle -> DEBU 1698 Attempting to read seek info message from 172.18.0.9:53636" +orderer0.example.com | "2020-05-20 18:21:35.078 UTC [orderer.common.server] Broadcast -> DEBU 1699 Starting new Broadcast handler" +orderer0.example.com | "2020-05-20 18:21:35.078 UTC [orderer.common.broadcast] Handle -> DEBU 169a Starting new broadcast loop for 172.18.0.9:53638" +orderer0.example.com | "2020-05-20 18:21:35.079 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 169b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:53638" +orderer0.example.com | "2020-05-20 18:21:35.079 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 169c Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2020-05-20 18:21:35.079 UTC [policies] Evaluate -> DEBU 169d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.079 UTC [policies] Evaluate -> DEBU 169e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:35.079 UTC [policies] Evaluate -> DEBU 169f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.079 UTC [policies] Evaluate -> DEBU 16a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:35.080 UTC [policies] Evaluate -> DEBU 16a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.080 UTC [cauthdsl] func1 -> DEBU 16a2 0xc0012a3c60 gate 1589998895080056400 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:35.080 UTC [cauthdsl] func2 -> DEBU 16a3 0xc0012a3c60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:35.080 UTC [cauthdsl] func2 -> DEBU 16a4 0xc0012a3c60 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.080 UTC [cauthdsl] func2 -> DEBU 16a5 0xc0012a3c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-05-20 18:21:35.080 UTC [cauthdsl] func2 -> DEBU 16a6 0xc0012a3c60 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:35.081 UTC [cauthdsl] func1 -> DEBU 16a7 0xc0012a3c60 gate 1589998895080056400 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16a8 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | [12c1 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [12c2 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12c3 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12c4 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12c5 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12c6 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12c7 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12c8 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12c9 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ca 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12cb 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [12cc 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12cd 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [12ce 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12cf 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12d0 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [12d1 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [12d2 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [12d3 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd82f0 gate 1589998824027005700 evaluation starts +peer0.org2.example.com | [12d4 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd82f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [12d5 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd82f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [12d6 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd82f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [12d7 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd82f0 principal evaluation fails +peer0.org2.example.com | [12d8 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd82f0 gate 1589998824027005700 evaluation fails +peer0.org2.example.com | [12d9 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1369 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [136a 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 principal matched by identity 0 +peer0.org1.example.com | [136b 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 9f 80 de 10 a7 9b ce a7 85 4d 51 12 0e cc 19 |..........MQ....| +peer0.org1.example.com | 00000010 fc 82 40 99 b5 4c 4e 13 d3 1e 58 a6 c3 aa 13 8f |..@..LN...X.....| +peer0.org1.example.com | [136c 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 f6 29 b1 8b ce 2d df d5 62 e8 72 |0D. E.)...-..b.r| +peer0.org1.example.com | 00000010 74 0a d5 8d a8 19 72 11 c3 b1 1e f2 0a d2 ee 23 |t.....r........#| +peer0.org1.example.com | 00000020 28 2f c0 ad 02 20 1c 2b db 4d 43 9d af c5 09 d6 |(/... .+.MC.....| +peer0.org1.example.com | 00000030 e6 b1 de 0f 63 06 ca e1 2d a2 05 b6 11 bc 04 86 |....c...-.......| +peer0.org1.example.com | 00000040 1e 65 36 23 13 f1 |.e6#..| +peer0.org1.example.com | [136d 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [136e 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 gate 1589998824143241700 evaluation succeeds +peer0.org1.example.com | [136f 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1370 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1371 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1372 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1373 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1374 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1375 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:35.081 UTC [policies] func1 -> DEBU 16aa Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16ab Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16ac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.082 UTC [policies] Evaluate -> DEBU 16ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:35.082 UTC [policies] Evaluate -> DEBU 16af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.082 UTC [cauthdsl] func1 -> DEBU 16b0 0xc001046950 gate 1589998895082914700 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:35.083 UTC [cauthdsl] func2 -> DEBU 16b1 0xc001046950 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:35.083 UTC [cauthdsl] func2 -> DEBU 16b2 0xc001046950 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.083 UTC [cauthdsl] func2 -> DEBU 16b3 0xc001046950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-05-20 18:21:35.083 UTC [cauthdsl] func2 -> DEBU 16b4 0xc001046950 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:35.083 UTC [cauthdsl] func1 -> DEBU 16b5 0xc001046950 gate 1589998895082914700 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:35.083 UTC [policies] Evaluate -> DEBU 16b6 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.083 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.083 UTC [policies] Evaluate -> DEBU 16b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.084 UTC [cauthdsl] func1 -> DEBU 16b9 0xc001047190 gate 1589998895084245800 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:35.084 UTC [cauthdsl] func2 -> DEBU 16ba 0xc001047190 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:35.084 UTC [cauthdsl] func2 -> DEBU 16bb 0xc001047190 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.084 UTC [cauthdsl] func2 -> DEBU 16bc 0xc001047190 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:35.084 UTC [msp.identity] Verify -> DEBU 16bd Verify: digest = 00000000 6a 45 7e 9a ac 81 56 b4 7f 32 0a 2a d2 73 0f 48 |jE~...V..2.*.s.H| +orderer0.example.com | 00000010 8e ea e1 6c a9 56 d5 14 f0 0f 04 79 37 9f 6c 6f |...l.V.....y7.lo|" +orderer0.example.com | "2020-05-20 18:21:35.084 UTC [msp.identity] Verify -> DEBU 16be Verify: sig = 00000000 30 44 02 20 3b 10 8c a8 75 55 dc 28 44 5e 4e 7a |0D. ;...uU.(D^Nz| +orderer0.example.com | 00000010 81 71 8b 9f 96 f2 84 f3 da c7 b7 44 cc 17 cd cf |.q.........D....| +orderer0.example.com | 00000020 48 46 84 78 02 20 7b 55 6e a3 05 b2 d1 35 01 03 |HF.x. {Un....5..| +orderer0.example.com | 00000030 f8 67 38 7a 9a 16 6d 17 24 b4 b1 64 b6 91 c1 41 |.g8z..m.$..d...A| +orderer0.example.com | 00000040 93 9a a6 f8 91 c2 |......|" +orderer0.example.com | "2020-05-20 18:21:35.085 UTC [cauthdsl] func2 -> DEBU 16bf 0xc001047190 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:35.085 UTC [cauthdsl] func1 -> DEBU 16c0 0xc001047190 gate 1589998895084245800 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:35.085 UTC [policies] Evaluate -> DEBU 16c1 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.085 UTC [policies] Evaluate -> DEBU 16c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.085 UTC [policies] Evaluate -> DEBU 16c3 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:35.085 UTC [policies] Evaluate -> DEBU 16c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:35.086 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:21:35.086 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:21:35.086 UTC [common.configtx] addToMap -> DEBU 16c7 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:21:35.086 UTC [common.configtx] addToMap -> DEBU 16c8 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.086 UTC [common.configtx] addToMap -> DEBU 16c9 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.086 UTC [common.configtx] addToMap -> DEBU 16ca Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16cb Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16cc Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16cd Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16ce Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16cf Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16d0 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16d1 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d2 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d3 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d4 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d5 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d6 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16da Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16db Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16dc Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | [12da 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [12db 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [12dc 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8860 gate 1589998824027552200 evaluation starts +peer0.org2.example.com | [12dd 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [12de 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8860 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [12df 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8860 principal matched by identity 0 +peer0.org2.example.com | [12e0 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 a1 cc b5 c8 8c 41 2b b3 71 e7 50 2c 0a 47 87 |b.....A+.q.P,.G.| +peer0.org2.example.com | 00000010 44 e2 8f 24 8c b9 fe 7b 56 43 4a 74 2a 41 69 b2 |D..$...{VCJt*Ai.| +peer0.org2.example.com | [12e1 05-20 18:20:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b5 e9 19 d2 f1 2e 41 37 85 bc |0E.!........A7..| +peer0.org2.example.com | 00000010 67 9e a8 7f d2 2e 02 23 07 43 11 de 1e 55 5a a8 |g......#.C...UZ.| +peer0.org2.example.com | 00000020 53 37 e1 65 f9 02 20 17 90 9c b1 9b 7e 0e 80 75 |S7.e.. .....~..u| +peer0.org2.example.com | 00000030 5b 2a c6 eb a4 3d b1 c7 86 24 f4 a1 aa 07 40 9a |[*...=...$....@.| +peer0.org2.example.com | 00000040 0d c1 f7 02 15 f5 6f |......o| +peer0.org2.example.com | [12e2 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8860 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [12e3 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8860 gate 1589998824027552200 evaluation succeeds +peer0.org2.example.com | [12e4 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12e5 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12e6 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [12e7 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [12e8 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12e9 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [12ea 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [12eb 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [12ec 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [12ed 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ee 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ef 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12f0 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f1 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f2 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f3 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f4 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f5 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f6 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f7 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [12f8 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12f9 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [12fa 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12fb 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12fc 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12fd 05-20 18:20:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12fe 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12ff 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1300 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1301 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1302 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1303 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1304 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1305 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1306 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1307 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1308 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1309 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [130a 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [130b 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [130c 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [130d 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [130e 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [130f 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1310 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1311 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1312 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1313 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1314 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1315 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1316 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0cba0 gate 1589998824214774900 evaluation starts +peer0.org2.example.com | [1317 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0cba0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1318 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0cba0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1319 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0cba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [13cf 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [13d0 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13d1 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13d2 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13d3 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13d4 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13d5 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [13d6 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13d7 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13d8 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13d9 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [13da 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13db 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13dc 05-20 18:20:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [13dd 05-20 18:20:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [13de 05-20 18:20:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [13df 05-20 18:20:32.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346c880 gate 1589998832339173000 evaluation starts +peer1.org1.example.com | [13e0 05-20 18:20:32.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346c880 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [13e1 05-20 18:20:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [13e2 05-20 18:20:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13e3 05-20 18:20:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [13e4 05-20 18:20:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13e5 05-20 18:20:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [13e6 05-20 18:20:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13e7 05-20 18:20:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [13e8 05-20 18:20:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13e9 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ea 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13eb 05-20 18:20:32.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346c880 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [13ec 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346c880 principal matched by identity 0 +peer1.org1.example.com | [13ed 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [13ee 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00346c880 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [13f0 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00346c880 gate 1589998832339173000 evaluation succeeds +peer1.org1.example.com | [13f1 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13f2 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13f3 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [13f4 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13f5 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f6 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f7 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f8 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f9 05-20 18:20:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13fa 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [13fb 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [13fd 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [13fe 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1400 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13ff 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [13fc 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1401 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161021 +peer1.org1.example.com | [1403 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8F0227D1562644EBE560FA620B6C65DD523D41EF76EDC6F022D60AC829E7E9B7 +peer1.org1.example.com | [1404 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1405 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1406 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1407 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [131a 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0cba0 principal evaluation fails +peer0.org2.example.com | [131b 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0cba0 gate 1589998824214774900 evaluation fails +peer0.org2.example.com | [131c 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [131d 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [131e 05-20 18:20:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [131f 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0d110 gate 1589998824220732700 evaluation starts +peer0.org2.example.com | [1320 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0d110 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1321 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0d110 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1322 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0d110 principal matched by identity 0 +peer0.org2.example.com | [1323 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1324 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1325 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0d110 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1326 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0d110 gate 1589998824220732700 evaluation succeeds +peer0.org2.example.com | [1327 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1328 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1329 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [132a 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [132b 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [132c 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [132e 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [132f 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1330 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1331 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1332 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1333 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1334 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1335 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2aa00 gate 1589998824255497300 evaluation starts +peer0.org2.example.com | [1336 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2aa00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1337 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2aa00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1338 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2aa00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1339 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2aa00 principal evaluation fails +peer0.org2.example.com | [133a 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2aa00 gate 1589998824255497300 evaluation fails +peer1.org2.example.com | [129f 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6120 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [12a0 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6120 principal matched by identity 0 +peer1.org2.example.com | [12a1 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [12a2 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12a3 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [12a4 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [12a5 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [12a6 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [12a7 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6120 gate 1589998828465277500 evaluation succeeds +peer1.org2.example.com | [12a8 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12a9 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12aa 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [12ab 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [12ac 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12ad 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12ae 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [12af 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12b0 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12b1 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [12b2 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [12b3 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [12b4 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada700 gate 1589998828479664700 evaluation starts +peer1.org2.example.com | [12b5 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12b6 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada700 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [12b7 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [12b8 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada700 principal evaluation fails +peer1.org2.example.com | [12b9 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ada700 gate 1589998828479664700 evaluation fails +peer1.org2.example.com | [12ba 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12bb 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12bc 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [12bd 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adac70 gate 1589998828486765300 evaluation starts +peer1.org2.example.com | [12be 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adac70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12bf 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adac70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [12c0 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adac70 principal matched by identity 0 +peer0.org1.example.com | [1376 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1377 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1378 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1379 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [137a 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [137b 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [137c 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [137d 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [137e 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [137f 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1380 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1381 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1382 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1383 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1384 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1385 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1386 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1387 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1388 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1389 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [138a 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [138b 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [138c 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 gate 1589998824207358500 evaluation starts +peer0.org1.example.com | [138d 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [138e 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1390 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1391 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1392 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1393 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [138f 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [133b 05-20 18:20:24.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [133c 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [133d 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [133e 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2af70 gate 1589998824260555900 evaluation starts +peer0.org2.example.com | [133f 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2af70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1340 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2af70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1341 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2af70 principal matched by identity 0 +peer0.org2.example.com | [1342 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1343 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1344 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2af70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1345 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2af70 gate 1589998824260555900 evaluation succeeds +peer0.org2.example.com | [1346 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1347 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1348 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1349 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [134a 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [134b 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [134c 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [134d 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [134e 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1350 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [134f 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1351 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1352 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1355 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1353 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1356 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1354 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1357 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1358 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1359 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [135a 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [135b 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [135c 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1394 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1395 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1396 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1397 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1398 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1399 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [139c 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [139d 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [139e 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [139f 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13a0 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13a1 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [139a 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [13a2 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 principal matched by identity 0 +peer0.org1.example.com | [13a3 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 44 5d df 21 54 e4 bf 96 6b 82 14 02 fa f6 af |.D].!T...k......| +peer0.org1.example.com | 00000010 62 81 39 11 9e d8 d2 1c bf 0b 54 fc be 6d 73 30 |b.9.......T..ms0| +peer0.org1.example.com | [13a4 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 94 3c c8 9c 02 78 52 ce 35 34 c3 |0D. ..<...xR.54.| +peer0.org1.example.com | 00000010 43 5f 8e 1b c0 bd 3d ac b7 17 69 ad c5 fd a8 65 |C_....=...i....e| +peer0.org1.example.com | 00000020 14 33 62 fd 02 20 38 b1 5f ab 65 1a c3 fe 5a 75 |.3b.. 8._.e...Zu| +peer0.org1.example.com | 00000030 f0 11 d6 a2 47 90 03 8b d8 86 4c 87 19 51 8d 99 |....G.....L..Q..| +peer0.org1.example.com | 00000040 9b 63 bf fa e3 4e |.c...N| +peer0.org1.example.com | [13a5 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [13a6 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 gate 1589998824207358500 evaluation succeeds +peer0.org1.example.com | [13a7 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13a8 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13a9 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13aa 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [13ab 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13ac 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [13ad 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [139b 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ae 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [13af 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [13b0 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13b1 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13b2 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [13b3 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13b4 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13b5 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13b6 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13b7 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [12c1 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [12c2 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [12c3 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adac70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [12c4 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adac70 gate 1589998828486765300 evaluation succeeds +peer1.org2.example.com | [12c5 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12c6 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12c7 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [12c8 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [12c9 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [12ca 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [12cb 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [12cc 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [12ce 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [12cf 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [12d0 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [12d2 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d3 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [12d4 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12d5 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12d6 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [12d7 05-20 18:20:28.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [12d8 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [12d9 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af74e0 gate 1589998828500352000 evaluation starts +peer1.org2.example.com | [12da 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af74e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12db 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af74e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [12dc 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af74e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [12dd 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af74e0 principal evaluation fails +peer1.org2.example.com | [12de 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af74e0 gate 1589998828500352000 evaluation fails +peer1.org2.example.com | [12df 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12e0 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12e1 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [12e2 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7a50 gate 1589998828501511100 evaluation starts +peer1.org2.example.com | [12e3 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7a50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12e4 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7a50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [12e5 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7a50 principal matched by identity 0 +peer1.org2.example.com | [12e6 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [12e7 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [12e8 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7a50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [12e9 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af7a50 gate 1589998828501511100 evaluation succeeds +peer1.org2.example.com | [12ea 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12eb 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12ec 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [12ed 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [12ee 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12ef 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12f0 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [12f1 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12f2 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12f3 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [12f4 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [12f5 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [12f6 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0cc50 gate 1589998828506463700 evaluation starts +peer1.org2.example.com | [12f7 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0cc50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12f8 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0cc50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [12f9 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0cc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [12fa 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0cc50 principal evaluation fails +peer1.org2.example.com | [12fb 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0cc50 gate 1589998828506463700 evaluation fails +peer1.org2.example.com | [12fc 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12fd 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12fe 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [12ff 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0d1c0 gate 1589998828507124600 evaluation starts +peer0.org2.example.com | [135d 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [135e 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [135f 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1360 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1361 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1362 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1363 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54690 gate 1589998824292394700 evaluation starts +peer0.org2.example.com | [1364 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54690 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1365 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54690 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1366 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1367 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54690 principal evaluation fails +peer0.org2.example.com | [1368 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54690 gate 1589998824292394700 evaluation fails +peer0.org2.example.com | [1369 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [136a 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [136b 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [136c 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54c00 gate 1589998824294411900 evaluation starts +peer0.org2.example.com | [136d 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54c00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [136e 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1370 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1371 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 9f 80 de 10 a7 9b ce a7 85 4d 51 12 0e cc 19 |..........MQ....| +peer0.org2.example.com | 00000010 fc 82 40 99 b5 4c 4e 13 d3 1e 58 a6 c3 aa 13 8f |..@..LN...X.....| +peer0.org2.example.com | [1372 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 f6 29 b1 8b ce 2d df d5 62 e8 72 |0D. E.)...-..b.r| +peer0.org2.example.com | 00000010 74 0a d5 8d a8 19 72 11 c3 b1 1e f2 0a d2 ee 23 |t.....r........#| +peer0.org2.example.com | 00000020 28 2f c0 ad 02 20 1c 2b db 4d 43 9d af c5 09 d6 |(/... .+.MC.....| +peer0.org2.example.com | 00000030 e6 b1 de 0f 63 06 ca e1 2d a2 05 b6 11 bc 04 86 |....c...-.......| +peer0.org2.example.com | 00000040 1e 65 36 23 13 f1 |.e6#..| +peer0.org2.example.com | [1373 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1374 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [136f 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54c00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1375 05-20 18:20:24.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54c00 principal matched by identity 0 +peer0.org2.example.com | [1376 05-20 18:20:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1377 05-20 18:20:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1378 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54c00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1379 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c54c00 gate 1589998824294411900 evaluation succeeds +peer0.org2.example.com | [137a 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [137b 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [137c 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [137d 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [137e 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [137f 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1408 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1409 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [140a 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [140b 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [140c 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [140d 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1402 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [140e 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13b8 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13b9 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13ba 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13bb 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13bc 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13bd 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13be 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13bf 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13c0 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13c1 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13c2 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13c3 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13c4 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13c5 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13c6 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13c7 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13c8 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13c9 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ca 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13cb 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13cc 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13cd 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ce 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [13cf 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13d0 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13d1 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [13d2 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13d3 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13d4 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13d5 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13d6 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [13d7 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [13d8 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [13d9 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [13da 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13db 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [13dc 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [13dd 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13de 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13df 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13e0 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13e1 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13e2 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13e3 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13e4 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [13e5 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [13e6 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer0.org1.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +peer0.org1.example.com | [13e7 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +peer0.org1.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer0.org1.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer0.org1.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +peer0.org1.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +peer0.org1.example.com | [13e8 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [13e9 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 73 b3 4b 7a 2f bd ea 38 84 d9 |0E.!..s.Kz/..8..| +peer0.org1.example.com | 00000010 87 99 7f 55 39 4f 9a da 85 b1 92 de 07 91 c7 de |...U9O..........| +peer0.org1.example.com | 00000020 a7 0a 08 05 02 02 20 58 a7 10 de 08 19 9d 45 e7 |...... X......E.| +peer0.org1.example.com | 00000030 7b 38 ce 2b 58 e9 4f a9 fb 21 9b 26 5b cd a7 30 |{8.+X.O..!.&[..0| +peer0.org1.example.com | 00000040 ed 04 38 d2 5e aa b9 |..8.^..| +peer0.org1.example.com | [13ea 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1300 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0d1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1301 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0d1c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1302 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0d1c0 principal matched by identity 0 +peer1.org2.example.com | [1303 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1304 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1305 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0d1c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1306 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b0d1c0 gate 1589998828507124600 evaluation succeeds +peer1.org2.example.com | [1307 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1308 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1309 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [130a 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [130b 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [130c 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [130d 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [130e 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [130f 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1310 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1311 05-20 18:20:28.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1312 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1313 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1314 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1315 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1316 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1317 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1318 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1319 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1380 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1381 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1382 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1383 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1384 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1385 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1386 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4bbb0 gate 1589998824327461000 evaluation starts +peer0.org2.example.com | [1387 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4bbb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1388 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4bbb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1389 05-20 18:20:24.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4bbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [138a 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4bbb0 principal evaluation fails +peer0.org2.example.com | [138b 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4bbb0 gate 1589998824327461000 evaluation fails +peer0.org2.example.com | [138c 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [138d 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [138e 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [138f 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c120 gate 1589998824333210900 evaluation starts +peer0.org2.example.com | [1390 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1391 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c120 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1392 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c120 principal matched by identity 0 +peer0.org2.example.com | [1393 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1394 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1395 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c120 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1396 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7c120 gate 1589998824333210900 evaluation succeeds +peer0.org2.example.com | [1397 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1398 05-20 18:20:24.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1399 05-20 18:20:24.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [139a 05-20 18:20:24.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [139b 05-20 18:20:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [139c 05-20 18:20:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [139d 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [139e 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [13a0 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [13a1 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13a2 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [131a 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [131b 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [131c 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [131d 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [131e 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [131f 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1320 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2ad00 gate 1589998828514516300 evaluation starts +peer1.org2.example.com | [1321 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2ad00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1322 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2ad00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1323 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2ad00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1324 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2ad00 principal evaluation fails +peer1.org2.example.com | [1325 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2ad00 gate 1589998828514516300 evaluation fails +peer1.org2.example.com | [1326 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1327 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1328 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1329 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2b270 gate 1589998828514916500 evaluation starts +peer1.org2.example.com | [132a 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2b270 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [132b 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2b270 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [132c 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2b270 principal matched by identity 0 +peer1.org2.example.com | [132d 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [132e 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [132f 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2b270 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1330 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2b270 gate 1589998828514916500 evaluation succeeds +peer1.org2.example.com | [1331 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1332 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1333 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1334 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1335 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1336 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1337 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [140f 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1410 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1411 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1412 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1413 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1414 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1415 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1416 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1417 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1418 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1419 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [141a 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4860 gate 1589998832653427100 evaluation starts +peer1.org1.example.com | [141b 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [141c 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4860 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [141d 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4860 principal matched by identity 0 +peer1.org1.example.com | [141e 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [141f 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1420 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4860 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1421 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b4860 gate 1589998832653427100 evaluation succeeds +peer1.org1.example.com | [1422 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1423 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1424 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1425 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1426 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1427 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1428 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1429 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [142a 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [142b 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1338 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1339 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [133a 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [133b 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [133c 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [133d 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [133e 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e470 gate 1589998828519346400 evaluation starts +peer1.org2.example.com | [133f 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e470 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1340 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e470 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1341 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1342 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e470 principal evaluation fails +peer1.org2.example.com | [1343 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e470 gate 1589998828519346400 evaluation fails +peer1.org2.example.com | [1344 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1345 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1346 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1347 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e9e0 gate 1589998828522767200 evaluation starts +peer1.org2.example.com | [1348 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1349 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e9e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [134a 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e9e0 principal matched by identity 0 +peer1.org2.example.com | [134b 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [134c 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [134d 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e9e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [134e 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4e9e0 gate 1589998828522767200 evaluation succeeds +peer1.org2.example.com | [134f 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1350 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1351 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1352 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1353 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1354 05-20 18:20:28.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1356 05-20 18:20:28.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1357 05-20 18:20:28.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1358 05-20 18:20:28.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1359 05-20 18:20:28.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [135a 05-20 18:20:28.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [135b 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [135c 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [135d 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [13eb 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [13ec 05-20 18:20:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [13ed 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [13ee 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [13ef 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13f0 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13f1 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13f2 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [13f3 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13f4 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13f5 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [13f6 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [13f7 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13a3 05-20 18:20:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [13a4 05-20 18:20:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13a5 05-20 18:20:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [13a6 05-20 18:20:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13a7 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [13a8 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13a9 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13aa 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13ab 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [13ac 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13ad 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13ae 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [13af 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [13b0 05-20 18:20:24.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [13b1 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a90 gate 1589998824501356400 evaluation starts +peer0.org2.example.com | [13b2 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13b3 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [13b4 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [13b5 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a90 principal evaluation fails +peer0.org2.example.com | [13b6 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c55a90 gate 1589998824501356400 evaluation fails +peer0.org2.example.com | [13b7 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13b8 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13b9 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [13ba 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca6000 gate 1589998824503690300 evaluation starts +peer0.org2.example.com | [13bb 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca6000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13bc 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca6000 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [13bd 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca6000 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16dd Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16de Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16df Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16e0 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16e1 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16e2 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:21:35.090 UTC [common.configtx] verifyDeltaSet -> DEBU 16e3 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.090 UTC [common.configtx] verifyDeltaSet -> DEBU 16e4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.090 UTC [common.configtx] verifyDeltaSet -> DEBU 16e5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.091 UTC [common.configtx] verifyDeltaSet -> DEBU 16e6 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.091 UTC [common.configtx] verifyDeltaSet -> DEBU 16e7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.091 UTC [common.configtx] verifyDeltaSet -> DEBU 16e8 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.091 UTC [common.configtx] policyForItem -> DEBU 16e9 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2020-05-20 18:21:35.091 UTC [policies] Manager -> DEBU 16ea Manager Channel looking up path []" +orderer0.example.com | "2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16eb Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16ec Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16ed Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16ee Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16ef Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16f0 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:21:35.093 UTC [policies] Manager -> DEBU 16f1 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.093 UTC [policies] Manager -> DEBU 16f2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.093 UTC [policies] Evaluate -> DEBU 16f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2020-05-20 18:21:35.093 UTC [policies] Evaluate -> DEBU 16f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:35.093 UTC [policies] Evaluate -> DEBU 16f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:21:35.093 UTC [cauthdsl] deduplicate -> WARN 16f6 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer0.example.com | "2020-05-20 18:21:35.094 UTC [cauthdsl] func1 -> DEBU 16f7 0xc000e50960 gate 1589998895094073300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:35.094 UTC [cauthdsl] func2 -> DEBU 16f8 0xc000e50960 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2020-05-20 18:21:35.094 UTC [cauthdsl] func2 -> DEBU 16f9 0xc000e50960 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.094 UTC [cauthdsl] func2 -> DEBU 16fa 0xc000e50960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-05-20 18:21:35.094 UTC [cauthdsl] func2 -> DEBU 16fb 0xc000e50960 processing identity 1 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.094 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 16fc Checking if identity has been named explicitly as an admin for Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.094 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 16fd Checking if identity carries the admin ou for Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.094 UTC [msp] Validate -> DEBU 16fe MSP Org2MSP validating identity" +orderer0.example.com | "2020-05-20 18:21:35.095 UTC [msp] getCertificationChain -> DEBU 16ff MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:21:35.095 UTC [msp] hasOURole -> DEBU 1700 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2020-05-20 18:21:35.096 UTC [msp] getCertificationChain -> DEBU 1701 MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:21:35.096 UTC [cauthdsl] func2 -> DEBU 1702 0xc000e50960 principal matched by identity 1" +orderer0.example.com | "2020-05-20 18:21:35.096 UTC [msp.identity] Verify -> DEBU 1703 Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +orderer0.example.com | 00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..|" +orderer0.example.com | "2020-05-20 18:21:35.096 UTC [msp.identity] Verify -> DEBU 1704 Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +orderer0.example.com | 00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +orderer0.example.com | 00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +orderer0.example.com | 00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +orderer0.example.com | 00000040 72 24 fc be df 99 95 |r$.....|" +orderer0.example.com | "2020-05-20 18:21:35.097 UTC [cauthdsl] func2 -> DEBU 1705 0xc000e50960 principal evaluation succeeds for identity 1" +orderer0.example.com | "2020-05-20 18:21:35.097 UTC [cauthdsl] func1 -> DEBU 1706 0xc000e50960 gate 1589998895094073300 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:35.097 UTC [policies] Evaluate -> DEBU 1707 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.097 UTC [policies] Evaluate -> DEBU 1708 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.097 UTC [policies] Evaluate -> DEBU 1709 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:21:35.097 UTC [cauthdsl] deduplicate -> WARN 170a De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer0.org2.example.com | [13be 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [13bf 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [13c0 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca6000 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [13c1 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca6000 gate 1589998824503690300 evaluation succeeds +peer0.org2.example.com | [13c2 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13c3 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13c4 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [13c5 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [13c6 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13c7 05-20 18:20:24.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13c8 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [13c9 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13ca 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13cb 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [13cc 05-20 18:20:24.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [13cd 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [13ce 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7200 gate 1589998824563796000 evaluation starts +peer0.org2.example.com | [13cf 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13d0 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7200 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [13d1 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [13d2 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7200 principal evaluation fails +peer0.org2.example.com | [13d3 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7200 gate 1589998824563796000 evaluation fails +peer0.org2.example.com | [13d4 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13d5 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13d6 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [13d7 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7770 gate 1589998824574070300 evaluation starts +peer0.org2.example.com | [13d8 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7770 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13d9 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7770 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [13da 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7770 principal matched by identity 0 +peer0.org2.example.com | [13db 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [13dc 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [13dd 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7770 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [13de 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca7770 gate 1589998824574070300 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:35.097 UTC [cauthdsl] func1 -> DEBU 170b 0xc000e51290 gate 1589998895097415600 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:35.097 UTC [cauthdsl] func2 -> DEBU 170c 0xc000e51290 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2020-05-20 18:21:35.098 UTC [cauthdsl] func2 -> DEBU 170d 0xc000e51290 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.098 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 170e Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.098 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 170f Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.098 UTC [msp] Validate -> DEBU 1710 MSP Org1MSP validating identity" +orderer0.example.com | "2020-05-20 18:21:35.099 UTC [msp] getCertificationChain -> DEBU 1711 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:21:35.099 UTC [msp] hasOURole -> DEBU 1712 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-05-20 18:21:35.099 UTC [msp] getCertificationChain -> DEBU 1713 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-05-20 18:21:35.100 UTC [cauthdsl] func2 -> DEBU 1714 0xc000e51290 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:35.100 UTC [msp.identity] Verify -> DEBU 1715 Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +orderer0.example.com | 00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.|" +orderer0.example.com | "2020-05-20 18:21:35.100 UTC [msp.identity] Verify -> DEBU 1716 Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +orderer0.example.com | 00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +orderer0.example.com | 00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +orderer0.example.com | 00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +orderer0.example.com | 00000040 61 03 26 ae cc 43 |a.&..C|" +orderer0.example.com | "2020-05-20 18:21:35.100 UTC [cauthdsl] func2 -> DEBU 1717 0xc000e51290 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:35.101 UTC [cauthdsl] func1 -> DEBU 1718 0xc000e51290 gate 1589998895097415600 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:35.101 UTC [policies] Evaluate -> DEBU 1719 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.101 UTC [policies] Evaluate -> DEBU 171a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.101 UTC [policies] Evaluate -> DEBU 171b Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.101 UTC [policies] Evaluate -> DEBU 171c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.101 UTC [common.configtx] verifyDeltaSet -> DEBU 171d Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 171e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 171f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 1720 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 1721 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 1722 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1723 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1724 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1725 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1726 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1727 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 1728 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 1729 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 172a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 172b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 172c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 172d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 172e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 172f Setting policy for key Endorsement to " +orderer0.example.com | "2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 1730 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 1731 Setting policy for key Readers to " +orderer0.example.com | "2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 1732 Setting policy for key Writers to " +orderer0.example.com | "2020-05-20 18:21:35.106 UTC [common.configtx] recurseConfigMap -> DEBU 1733 Setting policy for key Admins to " +peer1.org1.example.com | [142c 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [142d 05-20 18:20:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [142e 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [142f 05-20 18:20:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1430 05-20 18:20:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1431 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1432 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1433 05-20 18:20:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1434 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1435 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b5cb0 gate 1589998832814158800 evaluation starts +peer1.org1.example.com | [1436 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b5cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1437 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b5cb0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1438 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b5cb0 principal matched by identity 0 +peer1.org1.example.com | [1439 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [143a 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [143b 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b5cb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [143c 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b5cb0 gate 1589998832814158800 evaluation succeeds +peer1.org1.example.com | [143d 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [143e 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [143f 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1440 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1441 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1442 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1443 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1444 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1445 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1446 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1447 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1448 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1449 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [144a 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [144b 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dd5a0 gate 1589998832839586900 evaluation starts +peer1.org1.example.com | [144c 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dd5a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [144d 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dd5a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [144e 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dd5a0 principal matched by identity 0 +peer1.org1.example.com | [144f 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1450 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0034dd5a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1452 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034dd5a0 gate 1589998832839586900 evaluation succeeds +peer1.org1.example.com | [1453 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1454 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1455 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1456 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1457 05-20 18:20:32.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1458 05-20 18:20:32.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1459 05-20 18:20:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [145a 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [145b 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [145c 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [145d 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [145e 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [145f 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1460 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1461 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1462 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +orderer0.example.com | "2020-05-20 18:21:35.106 UTC [common.configtx] recurseConfigMap -> DEBU 1734 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.106 UTC [common.configtx] recurseConfigMap -> DEBU 1735 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.106 UTC [common.configtx] recurseConfigMap -> DEBU 1736 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.106 UTC [common.channelconfig] NewStandardValues -> DEBU 1737 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:21:35.106 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1738 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:21:35.106 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1739 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:21:35.106 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173a Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:21:35.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173b Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:21:35.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173c Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.108 UTC [common.channelconfig] NewStandardValues -> DEBU 173d Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:21:35.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173e Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:21:35.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173f Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.108 UTC [common.channelconfig] NewStandardValues -> DEBU 1740 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1741 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.109 UTC [common.channelconfig] NewStandardValues -> DEBU 1742 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1743 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.109 UTC [common.channelconfig] Validate -> DEBU 1744 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:21:35.110 UTC [common.channelconfig] validateMSP -> DEBU 1745 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.110 UTC [msp] newBccspMsp -> DEBU 1746 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.110 UTC [msp] New -> DEBU 1747 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.110 UTC [msp] Setup -> DEBU 1748 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.111 UTC [msp.identity] newIdentity -> DEBU 1749 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.113 UTC [common.channelconfig] NewStandardValues -> DEBU 174a Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174b Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.113 UTC [common.channelconfig] NewStandardValues -> DEBU 174c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174d Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.114 UTC [common.channelconfig] Validate -> DEBU 174e Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:21:35.114 UTC [common.channelconfig] validateMSP -> DEBU 174f Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.114 UTC [msp] newBccspMsp -> DEBU 1750 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.115 UTC [msp] New -> DEBU 1751 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.115 UTC [msp] Setup -> DEBU 1752 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.115 UTC [msp.identity] newIdentity -> DEBU 1753 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.116 UTC [common.channelconfig] NewStandardValues -> DEBU 1754 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1755 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.116 UTC [common.channelconfig] NewStandardValues -> DEBU 1756 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1757 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.116 UTC [common.channelconfig] Validate -> DEBU 1758 Anchor peers for org Org3MSP are " +orderer0.example.com | "2020-05-20 18:21:35.117 UTC [common.channelconfig] validateMSP -> DEBU 1759 Setting up MSP for org Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.117 UTC [msp] newBccspMsp -> DEBU 175a Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.117 UTC [msp] New -> DEBU 175b Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.117 UTC [msp] Setup -> DEBU 175c Setting up MSP instance Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.118 UTC [msp.identity] newIdentity -> DEBU 175d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [135e 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [135f 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1360 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1361 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1362 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1363 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1364 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1365 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 9d 6c 58 ae 31 24 cc db f7 5f 55 14 c0 ce c3 |6.lX.1$..._U....| +peer1.org2.example.com | 00000010 61 18 49 32 74 23 32 16 04 44 5a 7b 2f 94 f3 44 |a.I2t#2..DZ{/..D| +peer1.org2.example.com | [1366 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 07 47 1b eb ae 8c ef cc b3 2a b7 |0D. ..G.......*.| +peer1.org2.example.com | 00000010 85 23 60 3f dd c5 53 d9 70 81 27 1a 7e c5 c3 9b |.#`?..S.p.'.~...| +peer1.org2.example.com | 00000020 b0 48 5d 89 02 20 36 63 a8 de 99 74 6e 28 f5 da |.H].. 6c...tn(..| +peer1.org2.example.com | 00000030 11 23 58 53 d6 3d bb f4 ba 39 3d 3e 62 07 4c bb |.#XS.=...9=>b.L.| +peer1.org2.example.com | 00000040 6c ff dd 51 f8 db |l..Q..| +peer1.org2.example.com | [1367 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1368 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 95 1b e7 8f 90 e5 e1 ca 11 ad b6 |0D. b...........| +peer1.org2.example.com | 00000010 b6 17 7e 22 fa 4e 06 bd 0c 32 3c 63 3a f2 f4 f8 |..~".N...2 DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [136a 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [136b 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [136c 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [136d 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [136e 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [136f 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1370 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1371 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13f8 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [13f9 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [13fa 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [13fb 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [13fc 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13fd 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ff 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13fe 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1400 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1401 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1402 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1403 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1404 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1405 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1406 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1407 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1408 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1409 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [140a 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [140b 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [140c 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13df 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13e0 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13e1 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [13e2 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [13e3 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [13e4 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [13e6 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [13e7 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13e8 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [13e9 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [13ea 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13eb 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13ec 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13ed 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13ee 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13ef 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13f0 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [13f1 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13f2 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13f3 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13f4 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [13f5 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13f6 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13f7 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13f8 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [13f9 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13fa 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13fb 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [13fc 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13fd 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [13fe 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] NewStandardValues -> DEBU 175e Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175f Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1760 Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1761 Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1762 Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1763 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1764 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] NewStandardValues -> DEBU 1765 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1766 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:21:35.119 UTC [common.channelconfig] NewStandardValues -> DEBU 1767 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1768 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.120 UTC [common.channelconfig] validateMSP -> DEBU 1769 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.120 UTC [msp] newBccspMsp -> DEBU 176a Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.120 UTC [msp] New -> DEBU 176b Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.120 UTC [msp] Setup -> DEBU 176c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:21:35.121 UTC [msp.identity] newIdentity -> DEBU 176d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.122 UTC [msp] Setup -> DEBU 176e Setting up the MSP manager (4 msps)" +orderer0.example.com | "2020-05-20 18:21:35.122 UTC [msp] Setup -> DEBU 176f MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1770 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1771 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1772 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1773 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1774 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1775 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 1776 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 1777 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 1778 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 1779 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 177a Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.123 UTC [policies] GetPolicy -> DEBU 177b Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.123 UTC [policies] GetPolicy -> DEBU 177c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 177d Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.124 UTC [policies] GetPolicy -> DEBU 177e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.124 UTC [policies] GetPolicy -> DEBU 177f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1780 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1781 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1782 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1783 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1784 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1785 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1786 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1787 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1788 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1789 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 178a Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 178b Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 178c Proposed new policy Readers for Channel" +peer0.org1.example.com | [140d 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [140e 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [140f 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1410 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 gate 1589998824721063200 evaluation starts +peer0.org1.example.com | [1411 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1412 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1413 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 principal matched by identity 0 +peer0.org1.example.com | [1414 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer0.org1.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer0.org1.example.com | [1415 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer0.org1.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer0.org1.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer0.org1.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer0.org1.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer0.org1.example.com | [1416 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1417 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 gate 1589998824721063200 evaluation succeeds +peer0.org1.example.com | [1418 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1419 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [141a 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [141b 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [141c 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [141d 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [141e 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [141f 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1420 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1421 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1422 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1423 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1424 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1425 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1426 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1427 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1428 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1429 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [142a 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [142b 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [142c 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [142d 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [142e 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [142f 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1430 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1431 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1432 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1433 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1434 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1435 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1436 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1437 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1438 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1439 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [143a 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [143b 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [143c 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [143d 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [143e 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [143f 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1440 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1441 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101A +peer0.org1.example.com | [1442 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C45E67E68823150712285332AC3567328DC417D4A78A63EBCC5FB61C7872310C +peer0.org1.example.com | [1443 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1444 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1445 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1446 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1447 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1448 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1449 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [144a 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [144b 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [144c 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [144d 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [144e 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [144f 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1450 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1451 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1452 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1453 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1454 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1455 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1456 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 gate 1589998824903411600 evaluation starts +peer0.org1.example.com | [1457 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1458 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1459 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 principal matched by identity 0 +peer0.org1.example.com | [145a 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer0.org1.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer0.org1.example.com | [145b 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer0.org1.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer0.org1.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1463 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1464 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1465 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1466 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1467 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1468 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1469 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [146a 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [146b 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [146c 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351e000 gate 1589998832997016100 evaluation starts +peer1.org1.example.com | [146d 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351e000 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [146e 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351e000 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [146f 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351e000 principal matched by identity 0 +peer1.org1.example.com | [1470 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1471 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1472 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351e000 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1473 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351e000 gate 1589998832997016100 evaluation succeeds +peer1.org1.example.com | [1474 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1475 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1476 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1477 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1478 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1479 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13ff 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1400 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1401 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1402 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1403 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1404 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1405 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce8360 gate 1589998824633821300 evaluation starts +peer0.org2.example.com | [1406 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce8360 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1407 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce8360 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1408 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce8360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1409 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce8360 principal evaluation fails +peer0.org2.example.com | [140a 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce8360 gate 1589998824633821300 evaluation fails +peer0.org2.example.com | [140b 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [140c 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [140d 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [140e 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce88d0 gate 1589998824634257400 evaluation starts +peer0.org2.example.com | [140f 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce88d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1410 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce88d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1411 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce88d0 principal matched by identity 0 +peer0.org2.example.com | [1412 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer0.org2.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +peer0.org2.example.com | [1413 05-20 18:20:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +peer0.org2.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer0.org2.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer0.org2.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +peer0.org2.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +peer0.org2.example.com | [1414 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1415 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1416 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1417 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1418 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1419 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [141a 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [141b 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [141c 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [141d 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [141e 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [141f 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1420 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1421 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1422 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1423 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1424 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1425 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816101B +peer0.org2.example.com | [1426 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 550E1D2C858E242B6E718F0C4C1249D7B5E34F2C6BEB61650F5333ECA94B3BDF +peer0.org2.example.com | [1427 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1428 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1429 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [142a 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [142c 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [142b 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce88d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [142d 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce88d0 gate 1589998824634257400 evaluation succeeds +peer0.org2.example.com | [1430 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1431 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1372 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1373 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1374 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1375 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1376 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 5e 22 63 2e 10 12 65 2c a2 fa 9a 28 3e 33 3c |'^"c...e,...(>3<| +peer1.org2.example.com | 00000010 b8 d6 e4 c1 89 60 b0 de bb bd 6d ef 35 08 3c 88 |.....`....m.5.<.| +peer1.org2.example.com | [1377 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 87 19 6c 50 2a 4f 0d e8 d0 e6 14 |0D. (..lP*O.....| +peer1.org2.example.com | 00000010 d9 dd b8 a8 16 37 11 41 d3 0f bc 1a 4f d8 b9 40 |.....7.A....O..@| +peer1.org2.example.com | 00000020 96 0c ad f0 02 20 3d 26 43 81 f5 37 df e4 5e 05 |..... =&C..7..^.| +peer1.org2.example.com | 00000030 f7 49 ab c2 13 57 6e 8f 38 64 8b 1c 9b 0c 74 fa |.I...Wn.8d....t.| +peer1.org2.example.com | 00000040 36 67 2c ed 73 95 |6g,.s.| +peer1.org2.example.com | [1378 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1379 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [137a 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [137b 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [137c 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [137d 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [137e 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [137f 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1380 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1381 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1382 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1383 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1384 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1385 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1386 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1387 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1388 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1389 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [138a 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [138b 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [138c 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [138d 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 325 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [138e 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: +peer1.org2.example.com | [138f 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 325 bytes, Signature: 0 bytes +peer1.org2.example.com | [1390 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [147a 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [147b 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [147c 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [147d 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [147e 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [147f 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1480 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351f200 gate 1589998833005494400 evaluation starts +peer1.org1.example.com | [1481 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351f200 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1482 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351f200 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1483 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351f200 principal matched by identity 0 +peer1.org1.example.com | [1484 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1485 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00351f200 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1487 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00351f200 gate 1589998833005494400 evaluation succeeds +peer1.org1.example.com | [1488 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1489 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [148a 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [148b 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [148c 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [148d 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [148e 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [148f 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1490 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1491 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1492 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1493 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [1494 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1495 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1496 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1497 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1498 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [1499 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [149a 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +peer1.org1.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +peer1.org1.example.com | [149b 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +peer1.org1.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +peer1.org1.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [common.configtx] addToMap -> DEBU 178d Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:21:35.125 UTC [common.configtx] addToMap -> DEBU 178e Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 178f Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1790 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1791 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1792 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1793 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1794 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1795 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 1796 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 1797 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 1798 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 1799 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 179a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 179b Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 179c Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 179d Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 179e Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 179f Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 17a0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a1 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a2 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a3 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a4 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a6 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a7 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a8 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17aa Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17ae Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17af Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17b0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17b1 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17b2 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b4 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b5 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b6 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b7 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b8 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17ba Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:21:35.132 UTC [common.configtx] addToMap -> DEBU 17bb Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:21:35.132 UTC [common.configtx] addToMap -> DEBU 17bc Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:21:35.132 UTC [common.configtx] addToMap -> DEBU 17bd Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:21:35.132 UTC [common.configtx] addToMap -> DEBU 17be Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:35.132 UTC [common.channelconfig] LogSanityChecks -> DEBU 17bf As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-05-20 18:21:35.133 UTC [common.channelconfig] LogSanityChecks -> DEBU 17c0 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c1 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c2 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c3 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c4 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c5 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c6 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17c7 Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [common.channelconfig] LogSanityChecks -> DEBU 17c8 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [common.channelconfig] LogSanityChecks -> DEBU 17c9 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [common.channelconfig] LogSanityChecks -> DEBU 17ca As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17cb Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17cc Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17cd Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17ce Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17cf Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.135 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d0 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-05-20 18:21:35.135 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d1 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-05-20 18:21:35.135 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d2 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer1.org2.example.com | [1391 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1392 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1393 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1394 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1395 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1396 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1397 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1398 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1399 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [139a 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [139b 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [139c 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [139d 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [139e 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [139f 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13a0 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13a1 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [13a2 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13a3 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [13a4 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816101E +peer1.org2.example.com | [13a5 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 57D403950B283C008694C31DEFB233B439A029399EB21BD2B1F64BDA0A82DBDE +peer1.org2.example.com | [13a6 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [13a7 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [13a8 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [13a9 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [13aa 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ab 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ac 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ad 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [13ae 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b0 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [13af 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13b1 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b2 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [13b3 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13b5 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b4 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13b6 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b7 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [13b8 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b9 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [13ba 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [13bb 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13bc 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [13bd 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13be 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13bf 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [13c0 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [13c1 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [13c2 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce9d0 gate 1589998828849111100 evaluation starts +peer1.org2.example.com | [13c3 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce9d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [13c4 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce9d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [13c5 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [13c6 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce9d0 principal evaluation fails +peer1.org2.example.com | [13c7 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bce9d0 gate 1589998828849111100 evaluation fails +peer1.org2.example.com | [13c8 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [13ca 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816101F +peer1.org2.example.com | [13cb 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0D2837D2ACC4D79B6917D102D2C2AC7844BED9103E3C3802C1D4A3BFC90170AB +peer1.org2.example.com | [13c9 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13cc 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13cd 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [13d0 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc0770 gate 1589998828855921700 evaluation starts +peer0.org2.example.com | [1432 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [142e 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [142f 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1433 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1434 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1435 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1436 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1438 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1439 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [143a 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [143b 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [143c 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [143d 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [143e 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [143f 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1440 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1442 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1443 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1437 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1441 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer1.org1.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer1.org1.example.com | [149c 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [149d 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 75 e3 05 4a 52 2a d4 fc 22 77 e6 |0D. ~u..JR*.."w.| +peer1.org1.example.com | 00000010 13 1e 53 ea 72 bc cb 53 9a 37 15 76 8b 1a 6d 9d |..S.r..S.7.v..m.| +peer1.org1.example.com | 00000020 05 c7 46 a3 02 20 73 ca c7 88 91 7f 05 da 5c f1 |..F.. s.......\.| +peer1.org1.example.com | 00000030 4e 03 0a 69 9c 9e 67 52 bd 84 54 5a ba 51 fa c1 |N..i..gR..TZ.Q..| +peer1.org1.example.com | 00000040 7f a4 ab aa 74 fd |....t.| +peer1.org1.example.com | [149e 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [149f 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [14a0 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14a1 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14a2 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [14a3 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a4 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a5 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a6 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a7 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a8 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [14a9 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14aa 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [14ab 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [14ac 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ad 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [14ae 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [14af 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [14b0 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14b1 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [14b2 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14b3 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [14b4 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [14b5 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [14b6 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14b7 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [14b8 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [14b9 05-20 18:20:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [14ba 05-20 18:20:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [14bb 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [14bc 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [14bd 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [14be 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547b00 gate 1589998833117532100 evaluation starts +peer1.org1.example.com | [14bf 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547b00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [14c0 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547b00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [14c1 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547b00 principal matched by identity 0 +peer1.org1.example.com | [14c2 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +peer1.org1.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +peer1.org1.example.com | [14c3 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +peer1.org1.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer1.org1.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +peer1.org1.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +peer1.org1.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +peer1.org1.example.com | [14c4 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547b00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [14c5 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003547b00 gate 1589998833117532100 evaluation succeeds +peer1.org1.example.com | [14c6 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [14c7 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [14c8 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [14c9 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [14ca 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [14cb 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [14cc 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [14cd 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [14ce 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [14cf 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d0 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d1 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d2 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d3 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [14d4 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +peer1.org1.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +peer1.org1.example.com | [14d5 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [14d6 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +peer1.org1.example.com | 00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +peer1.org1.example.com | 00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +peer1.org1.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +peer1.org1.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +peer1.org1.example.com | [14d7 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14d8 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14d9 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14db 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14da 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14dc 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14dd 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [14de 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > alive: +peer1.org1.example.com | [14df 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [14e0 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14e1 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +peer1.org1.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +peer1.org1.example.com | [14e2 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +peer1.org1.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +peer1.org1.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +peer1.org1.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer1.org1.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer1.org1.example.com | [14e3 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14e4 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14e5 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14e6 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14e7 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [14e8 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [14e9 05-20 18:20:33.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ea 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [14eb 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [14ec 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [14ed 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +peer1.org1.example.com | 00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +peer1.org1.example.com | [14ee 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +peer1.org1.example.com | 00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +peer1.org1.example.com | 00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +peer1.org1.example.com | 00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +peer1.org1.example.com | 00000040 ea 2b 5a 57 a9 df |.+ZW..| +peer1.org1.example.com | [14ef 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [14f0 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e ba 8f a3 5e a6 01 27 c8 75 60 14 |0D. N...^..'.u`.| +peer1.org1.example.com | 00000010 54 ba 12 aa 12 6f 61 d3 28 08 30 5d 78 8a ba fa |T....oa.(.0]x...| +peer1.org1.example.com | 00000020 a7 b8 21 1a 02 20 0d 3a 19 68 fc 03 05 99 f6 60 |..!.. .:.h.....`| +peer1.org1.example.com | 00000030 1b c4 ef 42 16 39 a0 60 4a fd d9 21 22 12 2f 8a |...B.9.`J..!"./.| +peer1.org1.example.com | 00000040 9b d2 08 72 70 44 |...rpD| +peer1.org1.example.com | [14f1 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [14f2 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [14f3 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [14f4 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [14f5 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [14f6 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14f7 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14f8 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14f9 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [14fa 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14fb 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14fc 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14fd 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [14fe 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [14ff 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1500 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1501 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1502 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1503 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1504 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1505 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1506 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1507 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1508 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1509 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [150a 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [150b 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [150c 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [150d 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [150e 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [150f 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1510 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1511 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1512 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +peer1.org1.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +peer1.org1.example.com | [1513 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +peer1.org1.example.com | 00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +peer1.org1.example.com | 00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +peer1.org1.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +peer1.org1.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +peer1.org1.example.com | [1514 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1515 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1589998788834158300, 29 but got ts: inc_num:1589998788834158300 seq_num:28 +peer1.org1.example.com | [1516 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1517 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1518 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1519 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [151a 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [151b 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [151c 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [151d 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:35.135 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d3 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-05-20 18:21:35.135 UTC [common.capabilities] Supported -> DEBU 17d4 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:21:35.135 UTC [common.capabilities] Supported -> DEBU 17d5 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-05-20 18:21:35.135 UTC [msp] GetDefaultSigningIdentity -> DEBU 17d6 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:21:35.136 UTC [msp] GetDefaultSigningIdentity -> DEBU 17d7 Obtaining default signing identity" +orderer0.example.com | "2020-05-20 18:21:35.136 UTC [msp.identity] Sign -> DEBU 17d8 Sign: plaintext: 0AEA060A1B08011A0608AFEA95F60522...6D1724B4B164B691C141939AA6F891C2 " +orderer0.example.com | "2020-05-20 18:21:35.136 UTC [msp.identity] Sign -> DEBU 17d9 Sign: digest: E149494F234C66AB43406901B928342C712DCFEB1106D8CC15143260E9815821 " +orderer0.example.com | "2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17de == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-05-20 18:21:35.137 UTC [msp] DeserializeIdentity -> DEBU 17df Obtaining identity" +orderer0.example.com | "2020-05-20 18:21:35.138 UTC [msp.identity] newIdentity -> DEBU 17e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.139 UTC [cauthdsl] func1 -> DEBU 17e1 0xc0011ff410 gate 1589998895139178300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:35.139 UTC [cauthdsl] func2 -> DEBU 17e2 0xc0011ff410 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:35.139 UTC [cauthdsl] func2 -> DEBU 17e3 0xc0011ff410 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.139 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17e4 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-05-20 18:21:35.139 UTC [msp] Validate -> DEBU 17e5 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-05-20 18:21:35.139 UTC [msp] getCertificationChain -> DEBU 17e6 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-05-20 18:21:35.140 UTC [cauthdsl] func2 -> DEBU 17e7 0xc0011ff410 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:35.140 UTC [msp.identity] Verify -> DEBU 17e8 Verify: digest = 00000000 e1 49 49 4f 23 4c 66 ab 43 40 69 01 b9 28 34 2c |.IIO#Lf.C@i..(4,| +orderer0.example.com | 00000010 71 2d cf eb 11 06 d8 cc 15 14 32 60 e9 81 58 21 |q-........2`..X!|" +orderer0.example.com | "2020-05-20 18:21:35.140 UTC [msp.identity] Verify -> DEBU 17e9 Verify: sig = 00000000 30 44 02 20 1c 51 e2 c7 48 26 65 f8 8c 6e 5a 85 |0D. .Q..H&e..nZ.| +orderer0.example.com | 00000010 8a 41 ca a0 4b 9c 5c 82 d8 9b c8 b3 00 54 02 d4 |.A..K.\......T..| +orderer0.example.com | 00000020 81 5b 50 d2 02 20 01 14 a5 f1 ad ed ae d1 ee fd |.[P.. ..........| +orderer0.example.com | 00000030 6f ef 05 30 85 7c 16 66 26 77 a5 98 56 0f 7e 61 |o..0.|.f&w..V.~a| +orderer0.example.com | 00000040 43 ae 34 84 59 de |C.4.Y.|" +orderer0.example.com | "2020-05-20 18:21:35.141 UTC [cauthdsl] func2 -> DEBU 17ea 0xc0011ff410 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:35.141 UTC [cauthdsl] func1 -> DEBU 17eb 0xc0011ff410 gate 1589998895139178300 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17ec Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17ed == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17ee Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17f0 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-05-20 18:21:35.148 UTC [orderer.common.msgprocessor] Apply -> DEBU 17f2 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +peer1.org1.example.com | [151e 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [151f 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003604bb0 gate 1589998833231133800 evaluation starts +peer1.org1.example.com | [1520 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003604bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1521 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003604bb0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1522 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003604bb0 principal matched by identity 0 +peer1.org1.example.com | [1523 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer1.org1.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer1.org1.example.com | [1524 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer1.org1.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer1.org1.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer1.org1.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer1.org1.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer1.org1.example.com | [1525 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003604bb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1526 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003604bb0 gate 1589998833231133800 evaluation succeeds +peer1.org1.example.com | [1527 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1528 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1529 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [152a 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [152b 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [152c 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [152d 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [152e 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +peer1.org1.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +peer1.org1.example.com | [152f 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +peer1.org1.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +peer1.org1.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +peer1.org1.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer1.org1.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer1.org1.example.com | [1530 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1531 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1532 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1533 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1534 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1535 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1536 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1537 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1538 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1539 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [153a 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [153b 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [153c 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [153d 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [153e 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036229c0 gate 1589998833267938200 evaluation starts +peer1.org1.example.com | [153f 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036229c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1540 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036229c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1541 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036229c0 principal matched by identity 0 +peer1.org1.example.com | [1542 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 30 0b d1 02 88 00 a6 3f 0b b3 be 7a 4b 35 bc |.0......?...zK5.| +peer1.org1.example.com | 00000010 e2 d2 42 2f 17 2c e3 30 bf a0 03 b3 ea cf 36 50 |..B/.,.0......6P| +peer1.org1.example.com | [1543 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 26 ca 86 55 15 5c cb f4 a0 57 77 |0D. o&..U.\...Ww| +peer1.org1.example.com | 00000010 f3 34 72 6b d5 21 fc a8 e4 e3 b0 04 34 0d 80 c5 |.4rk.!......4...| +peer1.org1.example.com | 00000020 bd 25 0e 1b 02 20 2b d7 b2 e8 e0 43 60 56 cc 26 |.%... +....C`V.&| +peer1.org1.example.com | 00000030 da ae fd f7 ec a4 f7 82 12 50 e7 09 be 39 2f f5 |.........P...9/.| +peer1.org1.example.com | 00000040 1c 76 cc 3b 71 aa |.v.;q.| +peer1.org1.example.com | [1544 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036229c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1545 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036229c0 gate 1589998833267938200 evaluation succeeds +peer1.org1.example.com | [1546 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1547 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1548 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1549 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [154a 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [154b 05-20 18:20:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [154c 05-20 18:20:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [154d 05-20 18:20:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [154e 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [154f 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1550 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1551 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1552 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1553 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1554 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1555 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1556 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1557 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1444 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1446 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1447 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1448 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1449 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1445 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [144a 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [144b 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [144c 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [144d 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [144e 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [144f 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1450 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1451 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1452 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1453 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1454 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1455 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1456 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1457 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1458 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1459 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce5bf0 gate 1589998824758757800 evaluation starts +peer0.org2.example.com | [145a 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce5bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [145b 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce5bf0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [145c 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce5bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [145d 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce5bf0 principal evaluation fails +peer0.org2.example.com | [145e 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce5bf0 gate 1589998824758757800 evaluation fails +peer0.org2.example.com | [145f 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1460 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1461 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1462 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34160 gate 1589998824760068600 evaluation starts +peer0.org2.example.com | [1463 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34160 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1464 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34160 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1465 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34160 principal matched by identity 0 +peer0.org2.example.com | [1466 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer0.org2.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +peer0.org2.example.com | [1467 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +peer0.org2.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer0.org2.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer0.org2.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +peer0.org2.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +peer0.org2.example.com | [1468 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34160 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1469 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34160 gate 1589998824760068600 evaluation succeeds +peer0.org2.example.com | [146a 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [146b 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [146c 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [146d 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [146e 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [146f 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1470 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1471 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer0.org2.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer0.org2.example.com | [1472 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer0.org2.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer0.org2.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer0.org2.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer0.org2.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer0.org2.example.com | [1473 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1474 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1475 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1476 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1477 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [13ce 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [13cf 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [13d1 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc0770 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [13d2 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [13d3 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc0770 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [13d6 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc0770 principal matched by identity 0 +peer1.org2.example.com | [13d7 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be b0 ef 21 03 1b 0f 67 69 72 69 ea 79 ed b8 8f |...!...giri.y...| +peer1.org2.example.com | 00000010 23 6b 5d f4 8e 31 0a f4 48 6e 1a 77 9f 94 21 9d |#k]..1..Hn.w..!.| +peer1.org2.example.com | [13d8 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 33 ea 3d 65 75 3a 26 bc a5 2b 56 13 |0C. 3.=eu:&..+V.| +peer1.org2.example.com | 00000010 72 0a 78 bb 88 bb 95 92 55 20 12 14 5a 58 88 d3 |r.x.....U ..ZX..| +peer1.org2.example.com | 00000020 f2 76 39 8d 02 1f 29 42 1e f1 47 2d fc 3d c2 47 |.v9...)B..G-.=.G| +peer1.org2.example.com | 00000030 f0 d1 ba 24 b9 d4 8c f0 58 a1 91 68 19 a3 6e 2f |...$....X..h..n/| +peer1.org2.example.com | 00000040 95 c6 f9 3c e7 |...<.| +peer1.org2.example.com | [13d9 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc0770 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [13da 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc0770 gate 1589998828855921700 evaluation succeeds +peer1.org1.example.com | [1558 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1559 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [155a 05-20 18:20:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [155b 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [155c 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161022 +peer1.org1.example.com | [155d 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0B3B8B5BAA3C2345FCE583B7AD24DC537305CCE8230FFB1948A48CD64F13464A +peer1.org1.example.com | [155e 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [155f 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1560 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1561 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1562 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1563 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1564 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1565 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1566 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1567 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1568 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1569 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [156a 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [156b 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [156c 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [156d 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [156e 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [156f 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1570 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1571 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1572 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1573 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1574 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer0.org1.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer0.org1.example.com | [145c 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [145d 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 gate 1589998824903411600 evaluation succeeds +peer0.org1.example.com | [145e 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [145f 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:35.148 UTC [common.channelconfig] NewStandardValues -> DEBU 17f3 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:21:35.148 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f4 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:21:35.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f5 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:21:35.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f6 Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:21:35.150 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f7 Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:21:35.150 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f8 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.150 UTC [common.channelconfig] NewStandardValues -> DEBU 17f9 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:21:35.150 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17fa Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:21:35.150 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17fb Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.151 UTC [common.channelconfig] NewStandardValues -> DEBU 17fc Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17fd Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.151 UTC [common.channelconfig] NewStandardValues -> DEBU 17fe Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17ff Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.151 UTC [common.channelconfig] Validate -> DEBU 1800 Anchor peers for org Org3MSP are " +orderer0.example.com | "2020-05-20 18:21:35.151 UTC [common.channelconfig] validateMSP -> DEBU 1801 Setting up MSP for org Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.151 UTC [msp] newBccspMsp -> DEBU 1802 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.151 UTC [msp] New -> DEBU 1803 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.152 UTC [msp] Setup -> DEBU 1804 Setting up MSP instance Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.152 UTC [msp.identity] newIdentity -> DEBU 1805 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.153 UTC [common.channelconfig] NewStandardValues -> DEBU 1806 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.153 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1807 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.153 UTC [common.channelconfig] NewStandardValues -> DEBU 1808 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.153 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1809 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.153 UTC [common.channelconfig] Validate -> DEBU 180a Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:21:35.153 UTC [common.channelconfig] validateMSP -> DEBU 180b Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.154 UTC [msp] newBccspMsp -> DEBU 180c Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.154 UTC [msp] New -> DEBU 180d Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.154 UTC [msp] Setup -> DEBU 180e Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.155 UTC [msp.identity] newIdentity -> DEBU 180f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.156 UTC [common.channelconfig] NewStandardValues -> DEBU 1810 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1811 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.156 UTC [common.channelconfig] NewStandardValues -> DEBU 1812 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1813 Processing field: MSP" +peer1.org2.example.com | [13d4 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13db 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [13dc 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13dd 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13df 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [13e2 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13e0 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [13e3 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d5 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [13e4 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [13e5 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13e6 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13de 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13e8 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [13e1 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [13e7 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13e9 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ea 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13eb 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [13ee 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [13ef 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [13f0 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [13f1 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]} +peer1.org2.example.com | [13f2 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [13f3 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [13f4 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [13f5 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [13f6 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13f7 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13f8 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13f9 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [13fa 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13fb 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13fc 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1575 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1576 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1577 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1578 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1579 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [157a 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [157b 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003652eb0 gate 1589998833860555200 evaluation starts +peer1.org1.example.com | [157c 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003652eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [157d 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003652eb0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [157e 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003652eb0 principal matched by identity 0 +peer1.org1.example.com | [157f 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 df 24 11 a4 32 62 18 97 72 4a 73 00 e0 3b 5d |8.$..2b..rJs..;]| +peer1.org1.example.com | 00000010 d4 e9 c7 ac d4 51 f0 d9 69 4b 06 d0 8a 16 d4 ff |.....Q..iK......| +peer1.org1.example.com | [1580 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 57 8a 43 f9 8b 9e 3b 58 86 ab 11 |0D. MW.C...;X...| +peer1.org1.example.com | 00000010 e6 aa 4f 20 88 b1 98 1f 02 ec 52 ab 7d 91 48 6b |..O ......R.}.Hk| +peer1.org1.example.com | 00000020 b6 78 5b 93 02 20 31 52 31 51 f6 37 10 5e 17 9f |.x[.. 1R1Q.7.^..| +peer1.org1.example.com | 00000030 9c 00 63 fc 5d ec 7a 00 5d 32 4c 73 23 6e fd d2 |..c.].z.]2Ls#n..| +peer1.org1.example.com | 00000040 ab bd e1 98 8b 4d |.....M| +peer1.org1.example.com | [1581 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003652eb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1582 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003652eb0 gate 1589998833860555200 evaluation succeeds +peer1.org1.example.com | [1583 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1584 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1585 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1586 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1587 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1588 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1589 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [158a 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [158b 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [158c 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [158d 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [158e 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [158f 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1590 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1591 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1592 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1593 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1594 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1595 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1596 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1597 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1598 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1599 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [159b 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [159a 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [159c 05-20 18:20:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [159d 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [159e 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [159f 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15a0 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15a1 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [15a2 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15a3 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [15a4 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15a5 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15a6 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [15a7 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [15a8 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [15a9 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c900 gate 1589998833892352400 evaluation starts +peer1.org1.example.com | [15aa 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c900 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [15ab 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c900 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [15ac 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c900 principal matched by identity 0 +peer1.org1.example.com | [15ad 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb a0 7e 49 c8 bd 4b 9e 8a 70 52 7b b1 10 c2 a3 |..~I..K..pR{....| +peer1.org1.example.com | 00000010 b7 f0 4d b5 21 5b 9f d6 45 99 4b 15 a9 25 37 2c |..M.![..E.K..%7,| +peer1.org1.example.com | [15ae 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 0a d0 c1 d4 96 4a ed c0 db 47 58 |0D. C.....J...GX| +peer1.org1.example.com | 00000010 03 ee 34 79 83 82 7a 2a 46 e8 6e 87 fe da fd 64 |..4y..z*F.n....d| +peer1.org1.example.com | 00000020 18 08 2f 7d 02 20 57 73 7b 3a 7f 38 48 33 c0 8b |../}. Ws{:.8H3..| +peer1.org1.example.com | 00000030 2f ff a7 c1 44 f4 ed a6 8a 3e 1d b7 73 83 7d 9a |/...D....>..s.}.| +peer1.org1.example.com | 00000040 dc cc 0a ab bb bc |......| +peer1.org1.example.com | [15af 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c900 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [15b0 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368c900 gate 1589998833892352400 evaluation succeeds +peer1.org1.example.com | [15b1 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15b2 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15b3 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [15b4 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [15b5 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:35.156 UTC [common.channelconfig] Validate -> DEBU 1814 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:21:35.156 UTC [common.channelconfig] validateMSP -> DEBU 1815 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.156 UTC [msp] newBccspMsp -> DEBU 1816 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.156 UTC [msp] New -> DEBU 1817 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.157 UTC [msp] Setup -> DEBU 1818 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.157 UTC [msp.identity] newIdentity -> DEBU 1819 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.158 UTC [common.channelconfig] NewStandardValues -> DEBU 181a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181b Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181c Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181d Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181e Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181f Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1820 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.159 UTC [common.channelconfig] NewStandardValues -> DEBU 1821 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1822 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:21:35.159 UTC [common.channelconfig] NewStandardValues -> DEBU 1823 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1824 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.159 UTC [common.channelconfig] validateMSP -> DEBU 1825 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.160 UTC [msp] newBccspMsp -> DEBU 1826 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.160 UTC [msp] New -> DEBU 1827 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.160 UTC [msp] Setup -> DEBU 1828 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:21:35.160 UTC [msp.identity] newIdentity -> DEBU 1829 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.161 UTC [msp] Setup -> DEBU 182a Setting up the MSP manager (4 msps)" +orderer0.example.com | "2020-05-20 18:21:35.161 UTC [msp] Setup -> DEBU 182b MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2020-05-20 18:21:35.161 UTC [policies] NewManagerImpl -> DEBU 182c Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 182d Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 182e Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 182f Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 1830 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 1831 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 1832 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 1833 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.163 UTC [policies] NewManagerImpl -> DEBU 1834 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.163 UTC [policies] NewManagerImpl -> DEBU 1835 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.163 UTC [policies] NewManagerImpl -> DEBU 1836 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.163 UTC [policies] GetPolicy -> DEBU 1837 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.163 UTC [policies] GetPolicy -> DEBU 1838 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.163 UTC [policies] NewManagerImpl -> DEBU 1839 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.163 UTC [policies] GetPolicy -> DEBU 183a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.164 UTC [policies] GetPolicy -> DEBU 183b Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 183c Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 183d Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 183e Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 183f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [1478 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1479 05-20 18:20:24.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [147a 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [147b 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [147c 05-20 18:20:24.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [147d 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [147e 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [147f 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1480 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1481 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1482 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1483 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1484 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1485 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1486 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1487 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1488 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1489 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [148a 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [148b 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer0.org2.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer0.org2.example.com | [148c 05-20 18:20:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer0.org2.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer0.org2.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer0.org2.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer0.org2.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer0.org2.example.com | [148d 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [148e 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [148f 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1490 05-20 18:20:24.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1491 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1492 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1493 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1494 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1495 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer0.org2.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer0.org2.example.com | [1496 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer0.org2.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer0.org2.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer0.org2.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer0.org2.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer0.org2.example.com | [1497 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1498 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 50 d0 c5 ef e9 41 76 a1 6b af |0E.!..P....Av.k.| +peer0.org2.example.com | 00000010 ef da 45 87 05 ea 18 bc c4 f8 54 dd 0d ce 60 1e |..E.......T...`.| +peer0.org2.example.com | 00000020 78 3d 53 5d 7b 02 20 3b 9a 71 a4 24 fe 28 a4 22 |x=S]{. ;.q.$.(."| +peer0.org2.example.com | 00000030 bf 7c 46 51 38 c0 7c a4 c7 20 fd 9e 83 94 16 ec |.|FQ8.|.. ......| +peer1.org1.example.com | [15b6 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [15b7 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [15b8 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [15b9 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [15ba 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15bb 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15bc 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15bd 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15be 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15bf 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15c0 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15c1 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15c2 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15c3 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15c4 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [15c5 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15c6 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [15c9 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15ca 05-20 18:20:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15c7 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15c8 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15cb 05-20 18:20:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15cc 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15cd 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15ce 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15cf 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15d0 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15d1 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15d2 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15d3 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15d4 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15d5 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15d6 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15d7 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15d8 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [13fd 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [13fe 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ec 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [13ff 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ed 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1400 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1401 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1402 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1403 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1404 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1405 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1406 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1407 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1408 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1409 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +peer1.org2.example.com | [140a 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [140b 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [140c 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +peer1.org2.example.com | [140d 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [140e 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [140f 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [1410 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1411 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [1412 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1413 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1460 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1461 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1462 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1463 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1464 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1465 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1466 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1467 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1468 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1469 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [146a 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146b 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146c 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146d 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146e 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146f 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1470 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1471 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1472 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1473 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1474 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1475 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1476 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1477 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1478 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1479 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [147a 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 dc 68 58 d6 8f 4b 45 |.hX..KE| +peer0.org2.example.com | [1499 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [149a 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [149b 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [149c 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [149d 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [149e 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [149f 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14a0 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [14a1 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [14a2 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [14a3 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [14a4 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14a5 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer0.org2.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer0.org2.example.com | [14a6 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer0.org2.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer0.org2.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer0.org2.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer0.org2.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer0.org2.example.com | [14a7 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [14a8 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 7a 13 05 8a 24 d0 51 5a 68 a1 63 |0D. qz...$.QZh.c| +peer0.org2.example.com | 00000010 5e de c4 26 3a ca d8 35 e5 55 6a 01 76 33 b7 a8 |^..&:..5.Uj.v3..| +peer0.org2.example.com | 00000020 41 07 9a 0f 02 20 63 3f 99 49 bd 7d 0c 66 db 73 |A.... c?.I.}.f.s| +peer0.org2.example.com | 00000030 02 68 40 53 10 1b 66 4c b5 14 ce 5c 6d ea 32 08 |.h@S..fL...\m.2.| +peer0.org2.example.com | 00000040 89 b1 34 91 6c dd |..4.l.| +peer0.org2.example.com | [14a9 05-20 18:20:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [14aa 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [14ab 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [14ac 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [14ad 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [14ae 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15d9 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 2b 3d 47 11 96 b1 62 d3 5e c5 7b f9 5f 03 ff |.+=G...b.^.{._..| +peer1.org1.example.com | 00000010 43 0f f2 13 5e f8 90 41 0a b4 55 9f bc 02 3e 47 |C...^..A..U...>G| +peer1.org1.example.com | [15da 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 42 25 cb 5b db 62 05 dc b4 96 |0E.!..B%.[.b....| +peer1.org1.example.com | 00000010 8e 52 e6 cc 79 10 2a c1 56 68 a1 41 0f 7b d5 ed |.R..y.*.Vh.A.{..| +peer1.org1.example.com | 00000020 62 02 8e cc 42 02 20 08 67 2b d0 be 33 4b 70 72 |b...B. .g+..3Kpr| +peer1.org1.example.com | 00000030 55 5b 00 22 0b f0 9a ef 0f b1 70 19 4c 7b 85 ff |U[."......p.L{..| +peer1.org1.example.com | 00000040 74 45 07 b7 ef a9 73 |tE....s| +peer1.org1.example.com | [15db 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15dc 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [15dd 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [15de 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [15df 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [15e0 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e1 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e2 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e3 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15e4 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15e5 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15e6 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [15e7 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15e8 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [15e9 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15ea 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15eb 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15ec 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15ed 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15ee 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15ef 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15f0 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15f1 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15f2 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15f3 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15f4 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15f5 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15f6 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15f7 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1414 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1415 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1416 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1417 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1418 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1419 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [141a 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer1.org2.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer1.org2.example.com | [141b 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer1.org2.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer1.org2.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer1.org2.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer1.org2.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer1.org2.example.com | [141c 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [141d 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [141e 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [141f 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1420 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1421 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1422 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1423 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1424 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1425 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1426 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1427 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c150 gate 1589998828894631300 evaluation starts +peer1.org2.example.com | [1428 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1429 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c150 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [142a 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [142b 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c150 principal evaluation fails +peer1.org2.example.com | [142c 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c150 gate 1589998828894631300 evaluation fails +peer1.org2.example.com | [142d 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [142e 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [142f 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1430 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c6c0 gate 1589998828895059500 evaluation starts +peer1.org2.example.com | [1431 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c6c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1432 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c6c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1433 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c6c0 principal matched by identity 0 +peer1.org2.example.com | [1434 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer1.org2.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +peer1.org2.example.com | [1435 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +peer1.org2.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +peer1.org2.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +peer1.org2.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +peer1.org2.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +peer1.org2.example.com | [1436 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c6c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1437 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c2c6c0 gate 1589998828895059500 evaluation succeeds +peer1.org2.example.com | [1438 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1439 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [143a 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [143b 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [143c 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [143d 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [143e 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [143f 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1440 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1441 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1442 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [1443 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1444 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | [1445 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1446 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1447 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1448 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1449 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [144a 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [144b 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer1.org2.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer1.org2.example.com | [144c 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer1.org2.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer1.org2.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer1.org2.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer1.org2.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer1.org2.example.com | [144d 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [144e 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 c3 62 4e cf d5 08 da b0 b3 08 d2 |0D. U.bN........| +peer1.org2.example.com | 00000010 f1 38 47 fd 9d 30 e0 68 f2 c6 24 f9 56 e0 f2 ae |.8G..0.h..$.V...| +peer1.org2.example.com | 00000020 85 dc 7f 07 02 20 02 77 d6 2b 3a 52 48 5b 23 94 |..... .w.+:RH[#.| +peer1.org2.example.com | 00000030 3b 5f 4e 9d b5 75 1f 0a c2 19 48 07 6b 1d fc 3f |;_N..u....H.k..?| +peer1.org2.example.com | 00000040 45 f8 b1 39 67 7f |E..9g.| +peer0.org2.example.com | [14af 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14b0 05-20 18:20:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14b1 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [14b2 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14b3 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14b4 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [14b5 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [14b6 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [14b7 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14b8 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [14b9 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14ba 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [14bb 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [14bc 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14bd 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [14be 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14bf 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14c0 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [14c1 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [14c2 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [14c3 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85210 gate 1589998824975424000 evaluation starts +peer0.org2.example.com | [14c4 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14c5 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85210 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [14c6 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [14c7 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85210 principal evaluation fails +peer0.org2.example.com | [14c8 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85210 gate 1589998824975424000 evaluation fails +peer0.org2.example.com | [14c9 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [14ca 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [14cb 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [14cc 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85780 gate 1589998824980604100 evaluation starts +peer0.org2.example.com | [14cd 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14ce 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85780 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [14cf 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85780 principal matched by identity 0 +peer0.org2.example.com | [14d0 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer0.org2.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer0.org2.example.com | [14d1 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer0.org2.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer0.org2.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer0.org2.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer0.org2.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer0.org2.example.com | [14d2 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85780 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [14d3 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d85780 gate 1589998824980604100 evaluation succeeds +peer0.org2.example.com | [14d4 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14d5 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14d6 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [14d7 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [14d8 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [14d9 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [14da 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [14db 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [14dc 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [14dd 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14de 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14df 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [14e0 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14e1 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14e2 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14e3 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [14e4 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [14e5 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [14e6 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14e7 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [144f 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1450 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1451 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1452 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1453 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1454 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1455 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1456 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1457 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1458 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1459 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [145a 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [145b 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [145c 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [145d 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [145e 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c160 gate 1589998828921049500 evaluation starts +peer1.org2.example.com | [145f 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c160 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1460 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c160 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1461 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1462 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c160 principal evaluation fails +peer1.org2.example.com | [1463 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c160 gate 1589998828921049500 evaluation fails +peer1.org2.example.com | [1464 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1465 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1466 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1467 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c6d0 gate 1589998828921478700 evaluation starts +peer1.org2.example.com | [1468 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c6d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1469 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c6d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [146a 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c6d0 principal matched by identity 0 +peer1.org2.example.com | [146b 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +peer1.org2.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +peer1.org2.example.com | [146c 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +peer1.org1.example.com | [15f8 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15f9 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15fa 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15fb 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15fc 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15fd 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15fe 05-20 18:20:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15ff 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1600 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1601 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1602 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1603 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [1604 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [1605 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1606 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1607 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 3f ed 59 19 f6 e1 ca ed c7 d8 77 e9 05 2b 15 |.?.Y.......w..+.| +peer1.org1.example.com | 00000010 44 56 c1 ab d6 89 84 e5 76 96 24 14 05 92 1f 22 |DV......v.$...."| +peer1.org1.example.com | [1608 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 ee ca 90 dd e5 a7 7c f3 5e 66 |0E.!........|.^f| +peer1.org1.example.com | 00000010 fe 1b 72 0d b2 8a cc 8f 36 0c 8c 63 91 e6 e2 ff |..r.....6..c....| +peer1.org1.example.com | 00000020 65 17 60 f0 56 02 20 7c 08 c9 69 3d 40 f0 c7 96 |e.`.V. |..i=@...| +peer1.org1.example.com | 00000030 c7 71 e5 33 59 c2 fb 38 43 0d 9e 4d 31 7c d0 01 |.q.3Y..8C..M1|..| +peer1.org1.example.com | 00000040 4f a4 de be 04 d1 59 |O.....Y| +peer1.org1.example.com | [1609 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [160a 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [160b 05-20 18:20:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [160c 05-20 18:20:35.68 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [160d 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [160e 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [160f 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1610 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1611 05-20 18:20:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1612 05-20 18:20:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes +peer1.org1.example.com | [1613 05-20 18:20:35.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1614 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 1835904277815662645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer1.org1.example.com | [1615 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1616 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 1835904277815662645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer1.org1.example.com | [1617 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1618 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 3b 8b 5b aa 3c 23 45 fc e5 83 b7 ad 24 dc 53 |.;.[.<#E.....$.S| +peer1.org1.example.com | 00000010 73 05 cc e8 23 0f fb 19 48 a4 8c d6 4f 13 46 4a |s...#...H...O.FJ| +peer1.org1.example.com | [1619 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 3c 33 0a 7b a6 e7 5c fa bb 07 18 |0D. %<3.{..\....| +peer1.org1.example.com | 00000010 9a f7 bc 3f 05 97 ae f5 d2 ec 49 8d 47 84 5b 8e |...?......I.G.[.| +peer1.org1.example.com | 00000020 b4 ac cc 95 02 20 78 62 92 53 65 53 2d 0e 03 84 |..... xb.SeS-...| +peer1.org1.example.com | 00000030 ce 0f 74 ae 71 04 06 4b b1 85 80 f5 bb af 6f c4 |..t.q..K......o.| +peer1.org1.example.com | 00000040 95 7a 23 62 e6 a2 |.z#b..| +peer1.org1.example.com | [161a 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [161b 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [161c 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [161d 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [161e 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [161f 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1620 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1621 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1622 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1623 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1624 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1625 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1626 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1627 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1628 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1629 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [162a 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [162b 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [162c 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [162d 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [162e 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [162f 05-20 18:20:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1630 05-20 18:20:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1631 05-20 18:20:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1632 05-20 18:20:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1633 05-20 18:20:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742ce0 gate 1589998835898214800 evaluation starts +peer0.org2.example.com | [14e8 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [14e9 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 3c 1d 1f 1e 3b 52 1c f5 5e 47 f2 82 4c f1 81 |`<...;R..^G..L..| +peer0.org2.example.com | 00000010 60 39 cf 08 7c bd 99 ad d7 a4 f0 e4 67 29 cc b0 |`9..|.......g)..| +peer0.org2.example.com | [14ea 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 2e 83 91 3d 7d 20 95 3b 15 c3 bb |0D. ....=} .;...| +peer0.org2.example.com | 00000010 1f 2b 26 a6 e0 39 96 51 23 bf 5a 95 70 73 57 eb |.+&..9.Q#.Z.psW.| +peer0.org2.example.com | 00000020 55 4a 12 6c 02 20 09 8c 2d 27 d1 14 86 11 e4 8f |UJ.l. ..-'......| +peer0.org2.example.com | 00000030 e2 dc d7 8e fb cf 41 4f 22 c3 40 10 24 63 5c ee |......AO".@.$c\.| +peer0.org2.example.com | 00000040 af 11 a2 23 d4 92 |...#..| +peer0.org2.example.com | [14eb 05-20 18:20:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14ec 05-20 18:20:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ed 05-20 18:20:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ee 05-20 18:20:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [14ef 05-20 18:20:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [14f0 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f1 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14f2 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14f3 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14f4 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14f5 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f6 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14f7 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14f8 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14f9 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14fa 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14fb 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14fc 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [14fd 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14fe 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14ff 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1500 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1501 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1502 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1503 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1504 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1505 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1506 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1507 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1508 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1509 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [150a 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [150b 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [150c 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [150d 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf4d0 gate 1589998828198382700 evaluation starts +peer0.org2.example.com | [150e 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf4d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [150f 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf4d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1510 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1511 05-20 18:20:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf4d0 principal evaluation fails +peer0.org2.example.com | [1512 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daf4d0 gate 1589998828198382700 evaluation fails +peer0.org2.example.com | [1513 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1514 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1515 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1516 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dafa40 gate 1589998828203526700 evaluation starts +peer0.org2.example.com | [1517 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dafa40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1518 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dafa40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1519 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dafa40 principal matched by identity 0 +peer0.org2.example.com | [151a 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [151b 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [151c 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dafa40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [151d 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dafa40 gate 1589998828203526700 evaluation succeeds +peer0.org2.example.com | [151e 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [151f 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1520 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1521 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1522 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1523 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1524 05-20 18:20:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1525 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1526 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1527 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1528 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1529 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [152a 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfac40 gate 1589998828213137900 evaluation starts +peer0.org2.example.com | [152b 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfac40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [152c 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfac40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [152d 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfac40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [152e 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfac40 principal evaluation fails +peer0.org2.example.com | [152f 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfac40 gate 1589998828213137900 evaluation fails +peer0.org2.example.com | [1530 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1531 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1532 05-20 18:20:28.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1533 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb1b0 gate 1589998828220073000 evaluation starts +peer0.org2.example.com | [1534 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb1b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1535 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb1b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1536 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb1b0 principal matched by identity 0 +peer0.org2.example.com | [1537 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1538 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1539 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb1b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [153a 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb1b0 gate 1589998828220073000 evaluation succeeds +peer0.org2.example.com | [153b 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [153c 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [153d 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [153e 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [153f 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1540 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <..d..| +peer1.org2.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +peer1.org2.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +peer1.org2.example.com | [146d 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c6d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [146e 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5c6d0 gate 1589998828921478700 evaluation succeeds +peer1.org2.example.com | [146f 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1470 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1471 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1472 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1473 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1474 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1475 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1476 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1477 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership +peer1.org2.example.com | [1478 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1479 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [147a 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [147b 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [147c 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [147d 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [147e 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [147f 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1480 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1481 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1482 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1483 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1484 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1485 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1486 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer1.org2.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer1.org2.example.com | [1487 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer1.org2.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer1.org2.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer1.org2.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer1.org2.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer1.org2.example.com | [1488 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1489 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [148a 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [148b 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [148c 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > alive: +peer1.org2.example.com | [148d 05-20 18:20:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [148e 05-20 18:20:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [148f 05-20 18:20:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1490 05-20 18:20:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610071801 +peer1.org2.example.com | [1491 05-20 18:20:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9F628A2AC9884CAA0398C80F177E7E1D2911EC205599D36B3B8F2D31579AACFD +peer1.org2.example.com | [1492 05-20 18:20:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [1493 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1494 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1495 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1496 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1497 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1498 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [149a 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1499 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [149b 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [149c 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [149d 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [149e 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [149f 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14a0 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14a1 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a2 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a3 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14a4 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14a5 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14a6 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a7 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a8 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a9 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [14aa 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14ab 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14ac 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14ad 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14ae 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14af 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14b0 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b1 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b2 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [14b3 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b4 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14b5 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b6 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [147b 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [147c 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [147d 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [147e 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [147f 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1480 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1481 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1482 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1483 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1484 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer0.org1.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer0.org1.example.com | [1485 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer0.org1.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer0.org1.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer0.org1.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer0.org1.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer0.org1.example.com | [1486 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1487 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1488 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1489 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [148a 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [148b 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [148c 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [148d 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148e 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148f 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1490 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1491 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1492 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 00 2c 36 11 c2 a7 49 65 0d bf |0E.!...,6...Ie..| +peer0.org1.example.com | 00000010 9b 8a e3 97 a9 60 29 b7 fd b4 b3 7d 2e a0 38 8b |.....`)....}..8.| +peer0.org1.example.com | 00000020 5f 74 26 94 79 02 20 24 94 3d b8 7d df d9 7d be |_t&.y. $.=.}..}.| +peer0.org1.example.com | 00000030 6e ea 63 65 2b 8a c7 d4 79 2b 93 99 80 f6 11 1a |n.ce+...y+......| +peer1.org1.example.com | [1634 05-20 18:20:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1635 05-20 18:20:35.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742ce0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1636 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742ce0 principal matched by identity 0 +peer1.org1.example.com | [1637 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1638 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1639 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [163a 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003742ce0 gate 1589998835898214800 evaluation succeeds +peer1.org1.example.com | [163b 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [163c 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [163d 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [163e 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [163f 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1640 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1641 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1642 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1643 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1644 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1645 05-20 18:20:35.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1646 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1647 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1648 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1649 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376e5d0 gate 1589998835911771100 evaluation starts +peer1.org1.example.com | [164a 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376e5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [164b 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376e5d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [164c 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376e5d0 principal matched by identity 0 +peer1.org1.example.com | [164d 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [164e 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00376e5d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1650 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376e5d0 gate 1589998835911771100 evaluation succeeds +peer1.org1.example.com | [1651 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1652 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1653 05-20 18:20:35.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1654 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1655 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1656 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1657 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1658 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1659 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [165a 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [165b 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [165c 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [165d 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [165e 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [165f 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1660 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1661 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1662 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792110 gate 1589998835929353000 evaluation starts +peer1.org1.example.com | [1663 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1664 05-20 18:20:35.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792110 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1665 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792110 principal matched by identity 0 +peer1.org1.example.com | [1666 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1667 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | [14b7 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b8 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14b9 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [14ba 05-20 18:20:32.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14bb 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14bc 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14bd 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [14be 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14bf 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14c0 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [14c1 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [14c2 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [14c3 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81910 gate 1589998832545383300 evaluation starts +peer1.org2.example.com | [14c4 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [14c5 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81910 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [14c6 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [14c7 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81910 principal evaluation fails +peer1.org2.example.com | [14c8 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81910 gate 1589998832545383300 evaluation fails +peer1.org2.example.com | [14c9 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14ca 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14cb 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [14cc 05-20 18:20:32.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81e80 gate 1589998832548974300 evaluation starts +peer1.org2.example.com | [14ce 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81e80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [14cd 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14d0 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14d1 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [14d2 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14d3 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14d4 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14d5 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [14d6 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14cf 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81e80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [14d7 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81e80 principal matched by identity 0 +peer1.org2.example.com | [14d8 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [14d9 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [14da 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81e80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 46 38 d5 d5 dc a5 b7 |F8.....| +peer0.org1.example.com | [1493 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1494 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1495 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1496 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1497 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1498 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1499 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [149a 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [149b 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [149c 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [149d 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [149e 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [149f 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [14a0 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [14a1 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 gate 1589998825007214700 evaluation starts +peer0.org1.example.com | [14a2 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [14a3 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [14a4 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 principal matched by identity 0 +peer0.org1.example.com | [14a5 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer0.org1.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer0.org1.example.com | [14a6 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer0.org1.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer0.org1.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer0.org1.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer0.org1.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer0.org1.example.com | [14a7 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [14a8 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 gate 1589998825007214700 evaluation succeeds +peer0.org1.example.com | [14a9 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14aa 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14ab 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [14ac 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [14ad 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14ae 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14af 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [14b0 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer0.org1.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +peer0.org1.example.com | [14b1 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +peer0.org1.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer0.org1.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer0.org1.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +peer0.org1.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +peer0.org1.example.com | [14b2 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [14b3 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14b4 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [14b5 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer0.org1.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer0.org1.example.com | [14b6 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer0.org1.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer0.org1.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer0.org1.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer0.org1.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer0.org1.example.com | [14b7 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14b8 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1541 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1542 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1543 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1544 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1545 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1546 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1547 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1548 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1549 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [154a 05-20 18:20:28.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [154b 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [154c 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [154d 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [154e 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [154f 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19a20 gate 1589998828231425400 evaluation starts +peer0.org2.example.com | [1550 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19a20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1551 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19a20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1552 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1553 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19a20 principal evaluation fails +peer0.org2.example.com | [1554 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19a20 gate 1589998828231425400 evaluation fails +peer0.org2.example.com | [1555 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1556 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1557 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1558 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19f90 gate 1589998828233804000 evaluation starts +peer0.org2.example.com | [1559 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19f90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [155a 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19f90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [155b 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19f90 principal matched by identity 0 +peer0.org2.example.com | [155c 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [155d 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [155e 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19f90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [155f 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e19f90 gate 1589998828233804000 evaluation succeeds +peer0.org2.example.com | [1560 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1561 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1562 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1563 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1564 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1565 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [1567 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003792110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1669 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792110 gate 1589998835929353000 evaluation succeeds +peer1.org1.example.com | [166a 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [166b 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [166c 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [166d 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [166e 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [166f 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1670 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1671 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1672 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1673 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1674 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1675 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1676 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1677 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1678 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1679 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [167a 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037fc0f0 gate 1589998835939480000 evaluation starts +peer1.org1.example.com | [167b 05-20 18:20:35.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037fc0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [167c 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037fc0f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [167d 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037fc0f0 principal matched by identity 0 +peer1.org1.example.com | [167e 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [167f 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1680 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037fc0f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1681 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037fc0f0 gate 1589998835939480000 evaluation succeeds +peer1.org1.example.com | [1682 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1683 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1568 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1569 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [156a 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [156b 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [156c 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [156d 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [156e 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37880 gate 1589998828242441600 evaluation starts +peer0.org2.example.com | [156f 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37880 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1570 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37880 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1571 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1572 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37880 principal evaluation fails +peer0.org2.example.com | [1573 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37880 gate 1589998828242441600 evaluation fails +peer0.org2.example.com | [1574 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1575 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1576 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1577 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37df0 gate 1589998828245454500 evaluation starts +peer0.org2.example.com | [1578 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37df0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1579 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37df0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [157a 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37df0 principal matched by identity 0 +peer0.org2.example.com | [157b 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [157c 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [157d 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37df0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [157e 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e37df0 gate 1589998828245454500 evaluation succeeds +peer0.org2.example.com | [157f 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1580 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1581 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1582 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1583 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1584 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1585 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1586 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1587 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1588 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1589 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [158a 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14db 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81e80 gate 1589998832548974300 evaluation succeeds +peer1.org2.example.com | [14dc 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14dd 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14de 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [14df 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [14e0 05-20 18:20:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14e1 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14e2 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [14e3 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14e4 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14e5 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [14e6 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [14e7 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [14e8 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb090 gate 1589998832647630600 evaluation starts +peer1.org2.example.com | [14e9 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [14ea 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb090 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [14eb 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [14ec 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb090 principal evaluation fails +peer1.org2.example.com | [14ed 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb090 gate 1589998832647630600 evaluation fails +peer1.org2.example.com | [14ee 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14ef 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14f0 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [14f1 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb600 gate 1589998832648206900 evaluation starts +peer1.org2.example.com | [14f2 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [14f3 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb600 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [14f4 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb600 principal matched by identity 0 +peer1.org2.example.com | [14f5 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [14f6 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [14f7 05-20 18:20:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb600 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [14f8 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccb600 gate 1589998832648206900 evaluation succeeds +peer1.org2.example.com | [14f9 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14fa 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14fb 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [14fc 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [14fd 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [14b9 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14ba 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14bb 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14bc 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14bd 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14be 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14bf 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [14c0 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14c1 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [14c2 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [14c3 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [14c4 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [14c5 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [14c6 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [14c7 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 gate 1589998825050531900 evaluation starts +peer0.org1.example.com | [14c8 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [14c9 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [14ca 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 1840 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 1841 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1842 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1843 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1844 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1845 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1846 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1847 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:21:35.166 UTC [policies] NewManagerImpl -> DEBU 1848 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:21:35.166 UTC [common.configtx] addToMap -> DEBU 1849 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:21:35.166 UTC [common.configtx] addToMap -> DEBU 184a Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.166 UTC [common.configtx] addToMap -> DEBU 184b Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.166 UTC [common.configtx] addToMap -> DEBU 184c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.167 UTC [common.configtx] addToMap -> DEBU 184d Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.167 UTC [common.configtx] addToMap -> DEBU 184e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 184f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 1850 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 1851 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 1852 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 1853 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1854 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1855 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1856 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1857 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1858 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1859 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 185a Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 185b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 185c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 185d Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 185e Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 185f Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 1860 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 1861 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.171 UTC [common.configtx] addToMap -> DEBU 1862 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:21:35.171 UTC [common.configtx] addToMap -> DEBU 1863 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:35.171 UTC [common.configtx] addToMap -> DEBU 1864 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.171 UTC [common.configtx] addToMap -> DEBU 1865 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 1866 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 1867 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 1868 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 1869 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 186a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 186b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 186c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 186d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 186e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 186f Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 1870 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 1871 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 1872 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 1873 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1874 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1875 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1876 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1877 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org2.example.com | [14fe 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [14ff 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1500 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [1502 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1503 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1504 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1505 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1506 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1507 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1508 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1509 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [150a 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [150b 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [150c 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [150d 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [150e 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [150f 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1510 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1511 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1512 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1513 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1514 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1515 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1516 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1517 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3a10 gate 1589998832672575100 evaluation starts +peer1.org1.example.com | [1684 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1685 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1686 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1687 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1688 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1689 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [168a 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [168b 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [168c 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [168d 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [168e 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [168f 05-20 18:20:35.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1690 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1691 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1692 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1693 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1694 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384e270 gate 1589998835951280500 evaluation starts +peer1.org1.example.com | [1695 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384e270 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1696 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384e270 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1697 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384e270 principal matched by identity 0 +peer1.org1.example.com | [1698 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1699 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [169a 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384e270 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [169b 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384e270 gate 1589998835951280500 evaluation succeeds +peer1.org1.example.com | [169c 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [169d 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [169e 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [169f 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [16a0 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16a1 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14cb 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +peer0.org1.example.com | 00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +peer0.org1.example.com | [14cc 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +peer0.org1.example.com | 00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +peer0.org1.example.com | 00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +peer0.org1.example.com | 00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +peer0.org1.example.com | 00000040 dd f0 8e b9 81 1a 5a |......Z| +peer0.org1.example.com | [14cd 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [14ce 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 gate 1589998825050531900 evaluation succeeds +peer0.org1.example.com | [14cf 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14d0 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14d1 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [14d2 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [14d3 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14d4 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14d5 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [14d6 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer0.org1.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer0.org1.example.com | [14d7 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer0.org1.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer0.org1.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer0.org1.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer0.org1.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer0.org1.example.com | [14d8 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14d9 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14da 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14db 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [14dc 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +peer0.org1.example.com | 00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +peer0.org1.example.com | [14dd 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +peer0.org1.example.com | 00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +peer0.org1.example.com | 00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +peer0.org1.example.com | 00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +peer0.org1.example.com | 00000040 e4 ae 12 f5 e7 e8 |......| +peer0.org1.example.com | [14de 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [14df 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e0 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e1 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [14e2 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [14e3 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [14e4 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610061801 +peer0.org1.example.com | [14e5 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ECA08B6A6133E16B7EED3E23981FFDBD11D3A33B2FC4F89EEFC0FB79146811F9 +peer0.org1.example.com | [14e6 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [14e7 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14e8 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14e9 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ea 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14eb 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [14ec 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ed 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ee 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [14ef 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14f0 05-20 18:20:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14f1 05-20 18:20:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16a2 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [16a3 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [16a4 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [16a5 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [16a6 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [16a7 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [16a8 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384f470 gate 1589998835959528900 evaluation starts +peer1.org1.example.com | [16a9 05-20 18:20:35.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384f470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [16aa 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384f470 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [16ab 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384f470 principal matched by identity 0 +peer1.org1.example.com | [16ac 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [16ad 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00384f470 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [16af 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00384f470 gate 1589998835959528900 evaluation succeeds +peer1.org1.example.com | [16b0 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [16b1 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [16b2 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [16b3 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [16b4 05-20 18:20:35.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b5 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16b6 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b7 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b8 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 12575490344503309973, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b9 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16ba 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 12575490344503309973, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +peer1.org2.example.com | [1518 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3a10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1519 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3a10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [151a 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [151b 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3a10 principal evaluation fails +peer1.org2.example.com | [151c 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3a10 gate 1589998832672575100 evaluation fails +peer1.org2.example.com | [151d 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [151e 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [151f 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1520 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3f80 gate 1589998832672962100 evaluation starts +peer1.org2.example.com | [1521 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3f80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1522 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3f80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1523 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3f80 principal matched by identity 0 +peer1.org2.example.com | [1524 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +peer1.org2.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +peer1.org2.example.com | [1525 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +peer1.org2.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +peer1.org2.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +peer1.org2.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer1.org2.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer1.org2.example.com | [1526 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3f80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1527 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf3f80 gate 1589998832672962100 evaluation succeeds +peer1.org2.example.com | [1528 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1529 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [152a 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [152b 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [152c 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [152d 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [152e 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [152f 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1530 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1531 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1532 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1533 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1534 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1535 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1536 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1537 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1538 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1539 05-20 18:20:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [153a 05-20 18:20:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [153b 05-20 18:20:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [153c 05-20 18:20:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [153d 05-20 18:20:32.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [153e 05-20 18:20:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [153f 05-20 18:20:32.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1540 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1541 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1542 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1543 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1544 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1545 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1546 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1547 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1548 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1549 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [154a 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\240\225\205\332\217\001\313<\226\327R\330\275\215\302\273" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [154b 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\240\225\205\332\217\001\313<\226\327R\330\275\215\302\273" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [154c 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [154d 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\240\225\205\332\217\001\313<\226\327R\330\275\215\302\273" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [154e 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [154f 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +peer1.org2.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +peer1.org2.example.com | [1550 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +peer1.org2.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer1.org2.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +peer1.org2.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +peer1.org2.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +peer1.org2.example.com | [1551 05-20 18:20:32.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > alive: alive: +peer1.org2.example.com | [1552 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1553 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1554 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1555 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [1557 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1558 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1559 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [155a 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [155b 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [155c 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [155d 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [155e 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56590 gate 1589998832954795200 evaluation starts +peer1.org2.example.com | [155f 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1560 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56590 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1561 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1562 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56590 principal evaluation fails +peer1.org2.example.com | [1563 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56590 gate 1589998832954795200 evaluation fails +peer1.org2.example.com | [1564 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1565 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1566 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1567 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56b00 gate 1589998832966742400 evaluation starts +peer1.org2.example.com | [1568 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56b00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1569 05-20 18:20:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56b00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [156a 05-20 18:20:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56b00 principal matched by identity 0 +peer1.org2.example.com | [156b 05-20 18:20:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [156c 05-20 18:20:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [156d 05-20 18:20:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56b00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [156e 05-20 18:20:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d56b00 gate 1589998832966742400 evaluation succeeds +peer1.org2.example.com | [156f 05-20 18:20:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1570 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1571 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1572 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1573 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1574 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1575 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1576 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1577 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1578 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1579 05-20 18:20:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [157a 05-20 18:20:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [157b 05-20 18:20:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d57d00 gate 1589998833039802800 evaluation starts +peer1.org2.example.com | [157c 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d57d00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [157d 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d57d00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [157e 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d57d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [157f 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d57d00 principal evaluation fails +peer1.org2.example.com | [1580 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d57d00 gate 1589998833039802800 evaluation fails +peer1.org2.example.com | [1581 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1582 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1583 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1584 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72270 gate 1589998833040772300 evaluation starts +peer1.org2.example.com | [1585 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72270 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1586 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72270 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1587 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72270 principal matched by identity 0 +peer1.org2.example.com | [1588 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1589 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [158a 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72270 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [158b 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72270 gate 1589998833040772300 evaluation succeeds +peer1.org2.example.com | [158c 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [158d 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [158e 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [158f 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1590 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1591 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1592 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1593 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1594 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1595 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1596 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1597 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1598 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1599 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [159a 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [159b 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [159c 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [159d 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [159e 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [159f 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [15a0 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [15a1 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [15a2 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15a3 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [15a4 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15a5 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15a6 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15a7 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [15a8 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15a9 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15aa 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [15ab 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [15ac 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [15ad 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d949c0 gate 1589998833067701300 evaluation starts +peer0.org1.example.com | [14f2 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [14f3 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [14f4 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14f5 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [14f6 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14f7 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [14f8 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14f9 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [14fa 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [14fb 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14fc 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14fd 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14fe 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [14ff 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1500 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1501 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1502 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1503 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1504 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 gate 1589998827649124200 evaluation starts +peer0.org1.example.com | [1505 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1506 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1507 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 principal matched by identity 0 +peer0.org1.example.com | [1508 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1509 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [150b 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [150c 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [150d 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 gate 1589998827649124200 evaluation succeeds +peer0.org1.example.com | [150e 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [150f 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [150a 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1510 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [16bb 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [16bc 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 3b 8b 5b aa 3c 23 45 fc e5 83 b7 ad 24 dc 53 |.;.[.<#E.....$.S| +peer1.org1.example.com | 00000010 73 05 cc e8 23 0f fb 19 48 a4 8c d6 4f 13 46 4a |s...#...H...O.FJ| +peer1.org1.example.com | [16bd 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 3c 33 0a 7b a6 e7 5c fa bb 07 18 |0D. %<3.{..\....| +peer1.org1.example.com | 00000010 9a f7 bc 3f 05 97 ae f5 d2 ec 49 8d 47 84 5b 8e |...?......I.G.[.| +peer1.org1.example.com | 00000020 b4 ac cc 95 02 20 78 62 92 53 65 53 2d 0e 03 84 |..... xb.SeS-...| +peer1.org1.example.com | 00000030 ce 0f 74 ae 71 04 06 4b b1 85 80 f5 bb af 6f c4 |..t.q..K......o.| +peer1.org1.example.com | 00000040 95 7a 23 62 e6 a2 |.z#b..| +peer1.org1.example.com | [16be 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16bf 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16c0 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16c1 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16c2 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [16c3 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [16c4 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16c5 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16c6 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16c7 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16c8 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [16c9 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16ca 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [16cb 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16cc 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [16cd 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16ce 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [16cf 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16d0 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [16d1 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16d2 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [16d3 05-20 18:20:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16d4 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16d5 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16d6 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16d7 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16d8 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16d9 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16da 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16db 05-20 18:20:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16dc 05-20 18:20:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16dd 05-20 18:20:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16de 05-20 18:20:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16df 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [16e0 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [16e1 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e2 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e3 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e4 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16e5 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e6 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e7 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [16e8 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e9 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ea 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16eb 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [16ec 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16ed 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16ee 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161023 +peer1.org1.example.com | [16ef 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6A8F08DA852BEBCB5321169D790DBE6B04D2B8DB66C8438B7EB3719A2269BB5D +peer1.org1.example.com | [16f0 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16f1 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [16f2 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [16f3 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16f4 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16f5 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16f6 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16f7 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16f8 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [16f9 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16fa 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [16fb 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16fc 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [16fd 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16fe 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [16ff 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1700 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1701 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1702 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1703 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1704 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1705 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1706 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer1.org1.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer1.org1.example.com | [1707 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer1.org1.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer1.org1.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer1.org1.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer1.org1.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer1.org1.example.com | [1708 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1709 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [170a 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [170b 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [170c 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [170d 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [170e 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [170f 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1710 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1711 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1712 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1713 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1714 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1715 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1716 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1717 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1718 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1719 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [171a 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [171b 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [171c 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [171d 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [171e 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [171f 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer1.org1.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer1.org1.example.com | [1720 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer1.org1.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer1.org1.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer1.org1.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer1.org1.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer1.org1.example.com | [1721 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1722 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 9f da 3a 58 39 b8 aa 7e 71 df 45 |0D. ...:X9..~q.E| +peer1.org1.example.com | 00000010 38 e3 61 22 6f 00 b1 0a 45 c2 63 35 3c 70 93 f5 |8.a"o...E.c5 DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1724 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1725 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1726 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1727 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer1.org1.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer1.org1.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer1.org1.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer1.org1.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer1.org1.example.com | [1739 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003934190 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [173a 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003934190 gate 1589998836851857800 evaluation succeeds +peer1.org1.example.com | [173b 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [173c 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [173d 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [173e 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [173f 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1740 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1741 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1742 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1743 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1744 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1745 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1747 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1748 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1749 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [174a 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [174b 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [174c 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer1.org1.example.com | [174d 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [174e 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1746 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [174f 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\030\221\247\375Kz\002 \023\\\207\201\207\213\206\365#\343\241t\r\350\2631\362\303\310\376\305\347\340\367\003H\244\261\365 \243=" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1750 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1751 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\030\221\247\375Kz\002 \023\\\207\201\207\213\206\365#\343\241t\r\350\2631\362\303\310\376\305\347\340\367\003H\244\261\365 \243=" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1511 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1512 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1513 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1514 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1515 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1516 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1517 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1518 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1519 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [151a 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [151b 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [151c 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 gate 1589998827655778700 evaluation starts +peer0.org1.example.com | [151d 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [151e 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [151f 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 principal matched by identity 0 +peer0.org1.example.com | [1520 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1521 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e71af0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1523 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 gate 1589998827655778700 evaluation succeeds +peer0.org1.example.com | [1524 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1525 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1526 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1527 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1528 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1529 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [152a 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [152b 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [152c 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [152d 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [152e 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [158b 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [158c 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [158d 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [158e 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f240 gate 1589998828254112800 evaluation starts +peer0.org2.example.com | [158f 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f240 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1590 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f240 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1591 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1592 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f240 principal evaluation fails +peer0.org2.example.com | [1593 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f240 gate 1589998828254112800 evaluation fails +peer0.org2.example.com | [1594 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1595 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1596 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1597 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f7b0 gate 1589998828256927600 evaluation starts +peer0.org2.example.com | [1598 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f7b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1599 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f7b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [159a 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f7b0 principal matched by identity 0 +peer0.org2.example.com | [159b 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [159c 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [159d 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f7b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [159e 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e4f7b0 gate 1589998828256927600 evaluation succeeds +peer0.org2.example.com | [159f 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15a0 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15a1 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [15a2 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [15a3 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15a4 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15a5 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [15a6 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15a7 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15a8 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [15a9 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [15aa 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [15ab 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a9b0 gate 1589998828263974100 evaluation starts +peer0.org2.example.com | [15ac 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [15ad 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a9b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [15ae 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [15af 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a9b0 principal evaluation fails +peer0.org2.example.com | [15b0 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a9b0 gate 1589998828263974100 evaluation fails +peer0.org2.example.com | [15b1 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [15b2 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [15b3 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [15b4 05-20 18:20:28.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6af20 gate 1589998828267594800 evaluation starts +peer0.org2.example.com | [15b5 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6af20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [15b6 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6af20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [15b7 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6af20 principal matched by identity 0 +peer0.org2.example.com | [15b8 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [15b9 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [15ba 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6af20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [15bb 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6af20 gate 1589998828267594800 evaluation succeeds +peer0.org2.example.com | [15bc 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15bd 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15be 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [15bf 05-20 18:20:28.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [15c0 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [15c1 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [15c2 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [15c3 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [15c5 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15c6 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15c7 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [15c8 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15c9 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15ca 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [15cb 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [15cc 05-20 18:20:28.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15cd 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ce 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [15cf 05-20 18:20:28.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d0 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15d1 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d2 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15d3 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [15d4 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15d5 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15d6 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [15d7 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15d8 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15d9 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [15da 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [15db 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [15dc 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e90d80 gate 1589998828379710900 evaluation starts +peer0.org2.example.com | [15dd 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e90d80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [15de 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e90d80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [15df 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e90d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [15e0 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e90d80 principal evaluation fails +peer0.org2.example.com | [15e1 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e90d80 gate 1589998828379710900 evaluation fails +peer0.org2.example.com | [15e2 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [15e3 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [15e4 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [15e5 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e912f0 gate 1589998828380640900 evaluation starts +peer0.org2.example.com | [15e6 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e912f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [15e7 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e912f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [15e8 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e912f0 principal matched by identity 0 +peer0.org2.example.com | [15e9 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 43 16 86 31 55 c4 31 65 ed 50 7a 05 d4 d0 d8 |.C..1U.1e.Pz....| +orderer0.example.com | "2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1878 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1879 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 187a Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-05-20 18:21:35.176 UTC [orderer.consensus.etcdraft] propose -> INFO 187b Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:35.176 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 187c [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:53638" +orderer0.example.com | "2020-05-20 18:21:35.176 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 187d Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:35.176 UTC [orderer.consensus.etcdraft] 2 -> DEBU 187e Proposed block [6] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 187f Sending msg of 40277 bytes to 2 on channel businesschannel took 17.8µs" +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [common.deliver] Handle -> WARN 1880 Error reading from 172.18.0.9:53636: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1881 Sending msg of 40277 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [orderer.common.server] func1 -> DEBU 1882 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [comm.grpc.server] 1 -> INFO 1883 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53636 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=121.7424ms +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [grpc] infof -> DEBU 1884 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1885 Send of ConsensusRequest for channel businesschannel with payload of size 40277 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [orderer.common.broadcast] Handle -> WARN 1886 Error reading from 172.18.0.9:53638: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [orderer.common.server] func1 -> DEBU 1887 Closing Broadcast stream" +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1889 Send of ConsensusRequest for channel businesschannel with payload of size 40277 to orderer1.example.com(orderer1.example.com:7050) took 51.4µs " +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [comm.grpc.server] 1 -> INFO 1888 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53638 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.5079ms +orderer0.example.com | "2020-05-20 18:21:35.181 UTC [grpc] infof -> DEBU 188a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:35.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 188b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:35.186 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188c Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +orderer0.example.com | "2020-05-20 18:21:35.186 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188d Sending msg of 28 bytes to 3 on channel businesschannel took 30.3µs" +orderer0.example.com | "2020-05-20 18:21:35.186 UTC [orderer.common.cluster.step] sendMessage -> DEBU 188e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163µs " +orderer0.example.com | "2020-05-20 18:21:35.186 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 188f Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-05-20 18:21:35.188 UTC [common.configtx] addToMap -> DEBU 1890 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:21:35.189 UTC [common.configtx] addToMap -> DEBU 1891 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.189 UTC [common.configtx] addToMap -> DEBU 1892 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.190 UTC [common.configtx] addToMap -> DEBU 1893 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.190 UTC [common.configtx] addToMap -> DEBU 1894 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:21:35.191 UTC [common.configtx] addToMap -> DEBU 1895 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.191 UTC [common.configtx] addToMap -> DEBU 1896 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:35.192 UTC [common.configtx] addToMap -> DEBU 1897 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.192 UTC [common.configtx] addToMap -> DEBU 1898 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.192 UTC [common.configtx] addToMap -> DEBU 1899 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:21:35.193 UTC [common.configtx] addToMap -> DEBU 189a Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:35.193 UTC [common.configtx] addToMap -> DEBU 189b Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:21:35.193 UTC [common.configtx] addToMap -> DEBU 189c Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 189e Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 189f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 18a1 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 18a2 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 18a3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 18a4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 189d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:35.195 UTC [common.configtx] addToMap -> DEBU 18a5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104µs " +orderer0.example.com | "2020-05-20 18:21:35.195 UTC [common.configtx] addToMap -> DEBU 18a6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.196 UTC [common.configtx] addToMap -> DEBU 18a7 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.196 UTC [common.configtx] addToMap -> DEBU 18a8 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18aa Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18ab Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18ac Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18ad Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18ae Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.206 UTC [common.configtx] verifyDeltaSet -> DEBU 18af Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-05-20 18:21:35.206 UTC [common.configtx] verifyDeltaSet -> DEBU 18b0 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.206 UTC [common.configtx] policyForItem -> DEBU 18b1 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2020-05-20 18:21:35.206 UTC [policies] Manager -> DEBU 18b2 Manager Channel looking up path []" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b3 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b4 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b5 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b6 Manager Channel has managers Application" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b7 Manager Channel has managers Orderer" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b8 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b9 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18ba Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Evaluate -> DEBU 18bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2020-05-20 18:21:35.207 UTC [policies] Evaluate -> DEBU 18bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:35.208 UTC [policies] Evaluate -> DEBU 18bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:21:35.208 UTC [cauthdsl] deduplicate -> WARN 18be De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer0.example.com | "2020-05-20 18:21:35.208 UTC [cauthdsl] func1 -> DEBU 18bf 0xc0009ce720 gate 1589998895208392600 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:35.208 UTC [cauthdsl] func2 -> DEBU 18c0 0xc0009ce720 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2020-05-20 18:21:35.208 UTC [cauthdsl] func2 -> DEBU 18c1 0xc0009ce720 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.208 UTC [cauthdsl] func2 -> DEBU 18c2 0xc0009ce720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18c3 0xc0009ce720 processing identity 1 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18c4 0xc0009ce720 principal matched by identity 1" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [msp.identity] Verify -> DEBU 18c5 Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +orderer0.example.com | 00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..|" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [msp.identity] Verify -> DEBU 18c6 Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +orderer0.example.com | 00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +orderer0.example.com | 00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +orderer0.example.com | 00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +orderer0.example.com | 00000040 72 24 fc be df 99 95 |r$.....|" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18c7 0xc0009ce720 principal evaluation succeeds for identity 1" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] func1 -> DEBU 18c8 0xc0009ce720 gate 1589998895208392600 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [policies] Evaluate -> DEBU 18c9 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [policies] Evaluate -> DEBU 18ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [policies] Evaluate -> DEBU 18cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] deduplicate -> WARN 18cc De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] func1 -> DEBU 18cd 0xc0009cf0e0 gate 1589998895209773700 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18ce 0xc0009cf0e0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18cf 0xc0009cf0e0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18d0 0xc0009cf0e0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:35.209 UTC [msp.identity] Verify -> DEBU 18d1 Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +orderer0.example.com | 00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.|" +orderer0.example.com | "2020-05-20 18:21:35.210 UTC [msp.identity] Verify -> DEBU 18d2 Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +orderer0.example.com | 00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +orderer0.example.com | 00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +orderer0.example.com | 00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +orderer0.example.com | 00000040 61 03 26 ae cc 43 |a.&..C|" +orderer0.example.com | "2020-05-20 18:21:35.197 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18a9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:35.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18d3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:35.214 UTC [cauthdsl] func2 -> DEBU 18d4 0xc0009cf0e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:35.214 UTC [cauthdsl] func1 -> DEBU 18d5 0xc0009cf0e0 gate 1589998895209773700 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:35.214 UTC [policies] Evaluate -> DEBU 18d6 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.217 UTC [policies] Evaluate -> DEBU 18d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.217 UTC [policies] Evaluate -> DEBU 18d8 Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.218 UTC [policies] Evaluate -> DEBU 18d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2020-05-20 18:21:35.218 UTC [common.configtx] verifyDeltaSet -> DEBU 18da Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-05-20 18:21:35.231 UTC [common.configtx] verifyDeltaSet -> DEBU 18db Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:35.231 UTC [common.configtx] verifyDeltaSet -> DEBU 18dc Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.232 UTC [common.configtx] verifyDeltaSet -> DEBU 18dd Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.232 UTC [common.configtx] verifyDeltaSet -> DEBU 18de Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-05-20 18:21:35.233 UTC [common.configtx] recurseConfigMap -> DEBU 18df Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.233 UTC [common.configtx] recurseConfigMap -> DEBU 18e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.233 UTC [common.configtx] recurseConfigMap -> DEBU 18e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.234 UTC [common.configtx] recurseConfigMap -> DEBU 18e2 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org2.example.com | [15ae 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d949c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15af 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d949c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [15b0 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d949c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [15b1 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d949c0 principal evaluation fails +peer1.org2.example.com | [15b2 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d949c0 gate 1589998833067701300 evaluation fails +peer1.org2.example.com | [15b3 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15b4 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15b5 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [15b6 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d94f30 gate 1589998833068197500 evaluation starts +peer1.org2.example.com | [15b7 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d94f30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15b8 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d94f30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [15b9 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d94f30 principal matched by identity 0 +peer1.org2.example.com | [15ba 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [15bb 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [15bc 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d94f30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [15bd 05-20 18:20:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d94f30 gate 1589998833068197500 evaluation succeeds +peer1.org2.example.com | [15be 05-20 18:20:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15bf 05-20 18:20:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15c0 05-20 18:20:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [15c1 05-20 18:20:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [15c2 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15c3 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15c4 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [15c5 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15c6 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15c7 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [15c8 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [15c9 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [15ca 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0130 gate 1589998833133921900 evaluation starts +peer1.org2.example.com | [15cb 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15cc 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [15cd 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 91 98 4d 04 46 dd d4 85 1e 11 89 |0D. X..M.F......| +peer1.org2.example.com | 00000010 39 a2 f9 86 e4 f5 c8 f7 5f 74 be 28 d7 28 91 ba |9......._t.(.(..| +peer1.org2.example.com | 00000020 f1 1e 4d 21 02 20 75 c0 4e 80 86 8d f9 33 b2 aa |..M!. u.N....3..| +peer1.org2.example.com | 00000030 48 fb be f1 65 3e a0 95 85 da 8f 01 cb 3c 96 d7 |H...e>.......<..| +peer1.org2.example.com | 00000040 52 d8 bd 8d c2 bb |R.....| +peer1.org2.example.com | [15ce 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [15cf 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161020 +peer1.org2.example.com | [15d0 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E9300BD1028800A63F0BB3BE7A4B35BCE2D2422F172CE330BFA003B3EACF3650 +peer1.org2.example.com | [15d1 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [15d2 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [15d3 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [15d4 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15d5 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [15d6 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [15d7 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [15d8 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [15d9 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15da 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [15db 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [15dc 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15dd 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15de 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15df 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [15e0 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15e1 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15e2 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [15e3 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [15e4 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\240\225\205\332\217\001\313<\226\327R\330\275\215\302\273" > > alive: +peer1.org2.example.com | [15e5 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [15e6 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [15e7 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15e8 05-20 18:20:33.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0130 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [15e9 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [15ea 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15eb 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [15ec 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0130 principal evaluation fails +peer1.org2.example.com | [15ed 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0130 gate 1589998833133921900 evaluation fails +peer1.org2.example.com | [15ee 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15ef 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15f0 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f1 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [15f2 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15f3 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db1620 gate 1589998833149275600 evaluation starts +peer1.org2.example.com | [15f4 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db1620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15f5 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db1620 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [15f6 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db1620 principal matched by identity 0 +peer1.org2.example.com | [15f7 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f8 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15f9 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [15fa 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [15fb 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [15fc 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db1620 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [15fd 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db1620 gate 1589998833149275600 evaluation succeeds +peer1.org2.example.com | [15fe 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15ff 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1600 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1601 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1602 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1603 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1605 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1606 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1607 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1608 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1609 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [160a 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [160b 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 5c f8 57 c3 8c 57 5d 69 ef 9f a3 0d f7 f1 37 b3 |\.W..W]i......7.| +peer0.org2.example.com | [15ea 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 06 50 c9 08 20 3f 6d 90 8c 93 |0E.!...P.. ?m...| +peer0.org2.example.com | 00000010 d4 f6 c7 b3 95 7d 32 ff a9 68 a2 b3 af 8a a2 01 |.....}2..h......| +peer0.org2.example.com | 00000020 84 7f f6 22 00 02 20 5c a0 40 84 4f 94 b1 b5 94 |...".. \.@.O....| +peer0.org2.example.com | 00000030 3c 38 62 3b a4 4f 06 07 b8 84 a7 75 0e fb 3f e0 |<8b;.O.....u..?.| +peer0.org2.example.com | 00000040 b8 a5 fa 87 8e 3c 1c |.....<.| +peer0.org2.example.com | [15eb 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e912f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [15ec 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e912f0 gate 1589998828380640900 evaluation succeeds +peer0.org2.example.com | [15ed 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15ee 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15ef 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [15f0 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [15f1 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15f2 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [15f3 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [15f4 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [15f5 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [15f6 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15f7 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15f8 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15f9 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15fa 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15fb 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15fc 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15fe 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15fd 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ff 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1600 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1602 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1603 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1601 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1604 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1605 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1606 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1607 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1608 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1609 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [160a 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [160b 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [160c 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [160d 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [160e 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [160f 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1610 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1611 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1613 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1612 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1614 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1615 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1616 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1617 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1618 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1619 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [161a 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [161b 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [160c 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [160d 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [160e 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [160f 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1611 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1612 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1613 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1614 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1610 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1616 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1617 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1618 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1615 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1619 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [161a 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de92e0 gate 1589998833296152900 evaluation starts +peer1.org2.example.com | [161b 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de92e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [161c 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de92e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [161d 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de92e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [161e 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de92e0 principal evaluation fails +peer1.org2.example.com | [161f 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de92e0 gate 1589998833296152900 evaluation fails +peer1.org2.example.com | [1620 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1621 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1622 05-20 18:20:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1623 05-20 18:20:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003def0b0 gate 1589998833300365900 evaluation starts +peer1.org2.example.com | [1624 05-20 18:20:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003def0b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1625 05-20 18:20:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003def0b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1626 05-20 18:20:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003def0b0 principal matched by identity 0 +peer1.org2.example.com | [1627 05-20 18:20:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +peer1.org2.example.com | 00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +peer1.org2.example.com | [1628 05-20 18:20:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +peer1.org2.example.com | 00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +peer1.org2.example.com | 00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +peer1.org2.example.com | 00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +peer1.org2.example.com | 00000040 ea 2b 5a 57 a9 df |.+ZW..| +peer1.org2.example.com | [1629 05-20 18:20:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003def0b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [162a 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003def0b0 gate 1589998833300365900 evaluation succeeds +peer1.org2.example.com | [162b 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [162c 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [162d 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [162e 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [162f 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1630 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1631 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1632 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1633 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1634 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1635 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1636 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1637 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1638 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1639 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [163b 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [163a 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [163c 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [163d 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [163e 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [163f 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1640 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1641 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1642 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1643 05-20 18:20:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1644 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1645 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1646 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1647 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1648 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1649 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [164a 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [164b 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [164c 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [164d 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defe40 gate 1589998833325565900 evaluation starts +peer1.org2.example.com | [164e 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defe40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [164f 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defe40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1650 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defe40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1651 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defe40 principal evaluation fails +peer1.org2.example.com | [1652 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defe40 gate 1589998833325565900 evaluation fails +peer1.org2.example.com | [1653 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1654 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1655 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1656 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2e3b0 gate 1589998833334488400 evaluation starts +peer1.org2.example.com | [1657 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2e3b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1658 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2e3b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1659 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2e3b0 principal matched by identity 0 +peer1.org2.example.com | [165a 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +peer1.org2.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +peer1.org2.example.com | [165b 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +peer1.org2.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +peer1.org2.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +peer1.org2.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer1.org2.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer1.org2.example.com | [165c 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2e3b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [165d 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2e3b0 gate 1589998833334488400 evaluation succeeds +peer1.org2.example.com | [165e 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [165f 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:35.234 UTC [common.configtx] recurseConfigMap -> DEBU 18e3 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.235 UTC [common.configtx] recurseConfigMap -> DEBU 18e4 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.236 UTC [common.configtx] recurseConfigMap -> DEBU 18e5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.237 UTC [common.configtx] recurseConfigMap -> DEBU 18e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.237 UTC [common.configtx] recurseConfigMap -> DEBU 18e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.238 UTC [common.configtx] recurseConfigMap -> DEBU 18e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.238 UTC [common.configtx] recurseConfigMap -> DEBU 18e9 Setting policy for key Admins to " +orderer0.example.com | "2020-05-20 18:21:35.238 UTC [common.configtx] recurseConfigMap -> DEBU 18ea Setting policy for key Endorsement to " +orderer0.example.com | "2020-05-20 18:21:35.239 UTC [common.configtx] recurseConfigMap -> DEBU 18eb Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2020-05-20 18:21:35.239 UTC [common.configtx] recurseConfigMap -> DEBU 18ec Setting policy for key Readers to " +orderer0.example.com | "2020-05-20 18:21:35.239 UTC [common.configtx] recurseConfigMap -> DEBU 18ed Setting policy for key Writers to " +orderer0.example.com | "2020-05-20 18:21:35.240 UTC [common.configtx] recurseConfigMap -> DEBU 18ee Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.240 UTC [common.configtx] recurseConfigMap -> DEBU 18ef Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.241 UTC [common.configtx] recurseConfigMap -> DEBU 18f0 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.241 UTC [common.configtx] recurseConfigMap -> DEBU 18f1 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.242 UTC [common.configtx] recurseConfigMap -> DEBU 18f2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.243 UTC [common.configtx] recurseConfigMap -> DEBU 18f3 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.243 UTC [common.configtx] recurseConfigMap -> DEBU 18f4 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.243 UTC [common.configtx] recurseConfigMap -> DEBU 18f5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.244 UTC [common.configtx] recurseConfigMap -> DEBU 18f6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.244 UTC [common.configtx] recurseConfigMap -> DEBU 18f7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-05-20 18:21:35.246 UTC [common.channelconfig] NewStandardValues -> DEBU 18f8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-05-20 18:21:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18f9 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-05-20 18:21:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18fa Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-05-20 18:21:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18fb Processing field: OrdererAddresses" +orderer0.example.com | "2020-05-20 18:21:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18fc Processing field: Consortium" +orderer0.example.com | "2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18fd Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.247 UTC [common.channelconfig] NewStandardValues -> DEBU 18fe Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18ff Processing field: ConsensusType" +orderer0.example.com | "2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1900 Processing field: BatchSize" +orderer0.example.com | "2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1901 Processing field: BatchTimeout" +orderer0.example.com | "2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1902 Processing field: KafkaBrokers" +orderer0.example.com | "2020-05-20 18:21:35.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1903 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:21:35.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1904 Processing field: Capabilities" +peer0.org1.example.com | [152f 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1530 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1531 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1532 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1533 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1534 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1535 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 gate 1589998827667229700 evaluation starts +peer0.org1.example.com | [1536 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1537 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1538 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 principal matched by identity 0 +peer0.org1.example.com | [1539 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [153a 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e8b640 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [153c 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 gate 1589998827667229700 evaluation succeeds +peer0.org1.example.com | [153d 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [153e 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [153f 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1540 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1541 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1542 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1543 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1544 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1545 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1546 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [161c 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [161d 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [161e 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [161f 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1620 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1621 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1622 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1623 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee0030 gate 1589998828431769700 evaluation starts +peer0.org2.example.com | [1624 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee0030 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1625 05-20 18:20:28.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee0030 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1626 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee0030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1627 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee0030 principal evaluation fails +peer0.org2.example.com | [1628 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee0030 gate 1589998828431769700 evaluation fails +peer0.org2.example.com | [1629 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [162a 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [162b 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [162c 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee05a0 gate 1589998828446771900 evaluation starts +peer0.org2.example.com | [162d 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee05a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [162e 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee05a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [162f 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee05a0 principal matched by identity 0 +peer0.org2.example.com | [1630 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer0.org2.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +peer0.org2.example.com | [1631 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1632 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1634 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1635 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1633 05-20 18:20:28.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +peer0.org2.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +peer0.org2.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +peer0.org2.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +peer0.org2.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +peer0.org2.example.com | [1636 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee05a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1637 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee05a0 gate 1589998828446771900 evaluation succeeds +peer0.org2.example.com | [1638 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1639 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [163a 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [163b 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [163c 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1752 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1753 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +peer1.org1.example.com | 00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +peer1.org1.example.com | [1754 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +peer1.org1.example.com | 00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +peer1.org1.example.com | 00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +peer1.org1.example.com | 00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +peer1.org1.example.com | 00000040 a6 d7 b2 26 29 cb |...&).| +peer1.org1.example.com | [1755 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1756 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 e1 ca 30 06 bf 00 cc 8a eb 63 |0E.!....0......c| +peer1.org1.example.com | 00000010 0c c5 1c 7e fb 13 9e 54 12 67 64 b4 64 fe 3e 18 |...~...T.gd.d.>.| +peer1.org1.example.com | 00000020 91 a7 fd 4b 7a 02 20 13 5c 87 81 87 8b 86 f5 23 |...Kz. .\......#| +peer1.org1.example.com | 00000030 e3 a1 74 0d e8 b3 31 f2 c3 c8 fe c5 e7 e0 f7 03 |..t...1.........| +peer1.org1.example.com | 00000040 48 a4 b1 f5 20 a3 3d |H... .=| +peer1.org1.example.com | [1757 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1758 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1759 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [175a 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [175b 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [175c 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [175d 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [175e 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [175f 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1760 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1761 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1762 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1547 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1548 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1549 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [154a 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [154b 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [154c 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [154d 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 gate 1589998827677144600 evaluation starts +peer0.org1.example.com | [154e 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [154f 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1550 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 principal matched by identity 0 +peer0.org1.example.com | [1551 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1552 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1553 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1554 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 gate 1589998827677144600 evaluation succeeds +peer0.org1.example.com | [1555 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1556 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1557 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1558 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1559 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [155a 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [155b 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [155c 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [155d 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [155e 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [155f 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1560 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [163d 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [163e 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [163f 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1640 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1641 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1642 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1643 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1644 05-20 18:20:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1645 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1646 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1647 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1648 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1649 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [164a 05-20 18:20:28.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [164b 05-20 18:20:28.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [164c 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [164d 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [164e 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [164f 05-20 18:20:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1650 05-20 18:20:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1651 05-20 18:20:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1652 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1654 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1653 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1655 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1656 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1657 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1658 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1659 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [165b 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.259 UTC [common.channelconfig] NewStandardValues -> DEBU 1905 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1906 Processing field: Endpoints" +orderer0.example.com | "2020-05-20 18:21:35.260 UTC [common.channelconfig] NewStandardValues -> DEBU 1907 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1908 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.260 UTC [common.channelconfig] validateMSP -> DEBU 1909 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.262 UTC [msp] newBccspMsp -> DEBU 190a Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.262 UTC [msp] New -> DEBU 190b Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.263 UTC [msp] Setup -> DEBU 190c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-05-20 18:21:35.266 UTC [msp.identity] newIdentity -> DEBU 190d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.269 UTC [common.channelconfig] NewStandardValues -> DEBU 190e Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-05-20 18:21:35.271 UTC [common.channelconfig] initializeProtosStruct -> DEBU 190f Processing field: ACLs" +orderer0.example.com | "2020-05-20 18:21:35.272 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1910 Processing field: Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.273 UTC [common.channelconfig] NewStandardValues -> DEBU 1911 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.273 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1912 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.273 UTC [common.channelconfig] NewStandardValues -> DEBU 1913 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.273 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1914 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.275 UTC [common.channelconfig] Validate -> DEBU 1915 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:21:35.275 UTC [common.channelconfig] validateMSP -> DEBU 1916 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.276 UTC [msp] newBccspMsp -> DEBU 1917 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.276 UTC [msp] New -> DEBU 1918 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.276 UTC [msp] Setup -> DEBU 1919 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.277 UTC [msp.identity] newIdentity -> DEBU 191a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.279 UTC [common.channelconfig] NewStandardValues -> DEBU 191b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 191c Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.282 UTC [common.channelconfig] NewStandardValues -> DEBU 191d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 191e Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.282 UTC [common.channelconfig] Validate -> DEBU 191f Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-05-20 18:21:35.283 UTC [common.channelconfig] validateMSP -> DEBU 1920 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.283 UTC [msp] newBccspMsp -> DEBU 1921 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.284 UTC [msp] New -> DEBU 1922 Creating Cache-MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.284 UTC [msp] Setup -> DEBU 1923 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.286 UTC [msp.identity] newIdentity -> DEBU 1924 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.286 UTC [common.channelconfig] NewStandardValues -> DEBU 1925 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-05-20 18:21:35.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1926 Processing field: AnchorPeers" +orderer0.example.com | "2020-05-20 18:21:35.289 UTC [common.channelconfig] NewStandardValues -> DEBU 1927 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-05-20 18:21:35.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1928 Processing field: MSP" +orderer0.example.com | "2020-05-20 18:21:35.289 UTC [common.channelconfig] Validate -> DEBU 1929 Anchor peers for org Org3MSP are " +orderer0.example.com | "2020-05-20 18:21:35.289 UTC [common.channelconfig] validateMSP -> DEBU 192a Setting up MSP for org Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.289 UTC [msp] newBccspMsp -> DEBU 192b Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-05-20 18:21:35.289 UTC [msp] New -> DEBU 192c Creating Cache-MSP instance" +peer0.org2.example.com | [165c 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [165d 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [165a 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [165e 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [165f 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1660 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1661 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1662 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1663 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1664 05-20 18:20:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1665 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1666 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816101C +peer0.org2.example.com | [1667 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 369D6C58AE3124CCDBF75F5514C0CEC3611849327423321604445A7B2F94F344 +peer0.org2.example.com | [1668 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1669 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [166a 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [166b 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [166c 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [166d 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [166e 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [166f 05-20 18:20:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1670 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1671 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1672 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1673 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1763 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\030\221\247\375Kz\002 \023\\\207\201\207\213\206\365#\343\241t\r\350\2631\362\303\310\376\305\347\340\367\003H\244\261\365 \243=" > > alive: +peer1.org1.example.com | [1764 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1765 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1766 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1767 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1768 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1769 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [176a 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [176b 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [176c 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [176d 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [176e 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [176f 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1770 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1771 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1772 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989b70 gate 1589998837050727200 evaluation starts +peer1.org1.example.com | [1773 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1774 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989b70 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1775 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989b70 principal matched by identity 0 +peer1.org1.example.com | [1776 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer1.org1.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer1.org1.example.com | [1777 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer1.org1.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer1.org1.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer1.org1.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer1.org1.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer1.org1.example.com | [1778 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989b70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1779 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003989b70 gate 1589998837050727200 evaluation succeeds +peer1.org1.example.com | [177a 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [177b 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [177c 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [177d 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [177e 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [177f 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1660 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1661 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1662 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1663 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1664 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1561 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1562 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1563 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1564 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1565 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1566 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1567 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 gate 1589998827681411200 evaluation starts +peer0.org1.example.com | [1568 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1569 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [156a 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 principal matched by identity 0 +peer0.org1.example.com | [156b 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [156c 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003f39820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [156e 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 gate 1589998827681411200 evaluation succeeds +peer0.org1.example.com | [156f 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1570 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1571 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1572 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1573 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1574 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1575 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1576 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1577 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1578 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1579 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [157a 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [157b 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 gate 1589998827687086300 evaluation starts +peer0.org1.example.com | [157c 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [157d 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1674 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816101D +peer0.org2.example.com | [1675 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 275E22632E1012652CA2FA9A283E333CB8D6E4C18960B0DEBBBD6DEF35083C88 +peer0.org2.example.com | [1676 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1677 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1678 05-20 18:20:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1679 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [167a 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [167b 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [167c 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [167d 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [167e 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [167f 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1680 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1681 05-20 18:20:28.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1683 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1684 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1682 05-20 18:20:28.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1685 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1686 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1687 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1688 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1689 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [168a 05-20 18:20:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [168b 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [168c 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [168d 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1780 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1781 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer1.org1.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer1.org1.example.com | [1782 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer1.org1.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer1.org1.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer1.org1.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer1.org1.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer1.org1.example.com | [1783 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1784 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1785 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1786 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1787 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1788 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1789 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [178a 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [178b 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [178c 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [178d 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [178e 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [178f 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1790 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1791 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1792 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1793 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1794 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1795 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1796 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1797 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.289 UTC [msp] Setup -> DEBU 192d Setting up MSP instance Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.291 UTC [msp.identity] newIdentity -> DEBU 192e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-05-20 18:21:35.291 UTC [msp] Setup -> DEBU 192f Setting up the MSP manager (4 msps)" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [msp] Setup -> DEBU 1930 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1931 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1932 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1933 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1934 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1935 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1936 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1937 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1938 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1939 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 193a Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 193b Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 193c Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 193d Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] GetPolicy -> DEBU 193e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] GetPolicy -> DEBU 193f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 1940 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] GetPolicy -> DEBU 1941 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] GetPolicy -> DEBU 1942 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 1943 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-05-20 18:21:35.298 UTC [policies] NewManagerImpl -> DEBU 1944 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.298 UTC [policies] NewManagerImpl -> DEBU 1945 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.298 UTC [policies] NewManagerImpl -> DEBU 1946 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 1947 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 1948 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 1949 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 194a Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 194b Proposed new policy Writers for Channel" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 194c Proposed new policy Admins for Channel" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 194d Proposed new policy Readers for Channel" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 194e Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 194f Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1950 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1951 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1952 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1953 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1954 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1955 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1956 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1957 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1958 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1959 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 195a Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 195b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 195c Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:35.306 UTC [common.configtx] addToMap -> DEBU 195d Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-05-20 18:21:35.306 UTC [common.configtx] addToMap -> DEBU 195e Adding to config map: [Group] /Channel/Application" +peer0.org2.example.com | [168e 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [168f 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1690 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1691 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1692 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1694 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1695 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a1e0 gate 1589998828731184100 evaluation starts +peer0.org2.example.com | [1696 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a1e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1697 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a1e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1698 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a1e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1693 05-20 18:20:28.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1699 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a1e0 principal evaluation fails +peer0.org2.example.com | [169a 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a1e0 gate 1589998828731184100 evaluation fails +peer0.org2.example.com | [169b 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [169c 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [169d 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [169e 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a750 gate 1589998828738175600 evaluation starts +peer0.org2.example.com | [169f 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16a0 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a750 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [16a1 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a750 principal matched by identity 0 +peer0.org2.example.com | [16a2 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +peer0.org2.example.com | 00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +peer0.org2.example.com | [16a3 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +peer0.org2.example.com | 00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +peer0.org2.example.com | 00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +peer0.org2.example.com | 00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +peer0.org2.example.com | 00000040 9b a8 d0 60 85 bd 70 |...`..p| +peer0.org2.example.com | [16a4 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a750 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [16a5 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4a750 gate 1589998828738175600 evaluation succeeds +peer0.org2.example.com | [16a6 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [16a7 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [16a8 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [16a9 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [16aa 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16ab 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16ac 05-20 18:20:28.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [16ad 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 9d 6c 58 ae 31 24 cc db f7 5f 55 14 c0 ce c3 |6.lX.1$..._U....| +peer0.org2.example.com | 00000010 61 18 49 32 74 23 32 16 04 44 5a 7b 2f 94 f3 44 |a.I2t#2..DZ{/..D| +peer0.org2.example.com | [16ae 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 07 47 1b eb ae 8c ef cc b3 2a b7 |0D. ..G.......*.| +peer0.org2.example.com | 00000010 85 23 60 3f dd c5 53 d9 70 81 27 1a 7e c5 c3 9b |.#`?..S.p.'.~...| +peer0.org2.example.com | 00000020 b0 48 5d 89 02 20 36 63 a8 de 99 74 6e 28 f5 da |.H].. 6c...tn(..| +peer0.org2.example.com | 00000030 11 23 58 53 d6 3d bb f4 ba 39 3d 3e 62 07 4c bb |.#XS.=...9=>b.L.| +peer0.org2.example.com | 00000040 6c ff dd 51 f8 db |l..Q..| +peer0.org2.example.com | [16af 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16b0 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16b1 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16b2 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [16b3 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer0.org2.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer0.org2.example.com | [16b4 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer0.org2.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer0.org2.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer0.org2.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer0.org2.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer0.org2.example.com | [16b5 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16b6 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16b7 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16b8 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [16b9 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16ba 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [16bb 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [16bc 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16bd 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [16be 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16bf 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16c0 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [16c1 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [16c2 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [16c3 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71020 gate 1589998828752048400 evaluation starts +peer0.org2.example.com | [16c4 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16c5 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71020 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [16c6 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [16c7 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71020 principal evaluation fails +peer0.org2.example.com | [16c8 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71020 gate 1589998828752048400 evaluation fails +peer0.org2.example.com | [16c9 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16ca 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16cb 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [16cc 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71590 gate 1589998828755916900 evaluation starts +peer0.org2.example.com | [16cd 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71590 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16ce 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71590 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [16cf 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71590 principal matched by identity 0 +peer0.org2.example.com | [16d0 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer0.org2.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +peer0.org2.example.com | [16d1 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +peer0.org2.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +peer0.org2.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +peer0.org2.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +peer0.org2.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +peer0.org2.example.com | [16d2 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71590 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [16d3 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f71590 gate 1589998828755916900 evaluation succeeds +peer0.org2.example.com | [16d4 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [16d5 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [16d6 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1665 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +peer1.org2.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +peer1.org2.example.com | [1666 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +peer1.org2.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer1.org2.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +peer1.org2.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +peer1.org2.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +peer1.org2.example.com | [1667 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1668 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1669 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [166a 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 30 0b d1 02 88 00 a6 3f 0b b3 be 7a 4b 35 bc |.0......?...zK5.| +peer1.org2.example.com | 00000010 e2 d2 42 2f 17 2c e3 30 bf a0 03 b3 ea cf 36 50 |..B/.,.0......6P| +peer1.org2.example.com | [166b 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 26 ca 86 55 15 5c cb f4 a0 57 77 |0D. o&..U.\...Ww| +peer1.org2.example.com | 00000010 f3 34 72 6b d5 21 fc a8 e4 e3 b0 04 34 0d 80 c5 |.4rk.!......4...| +peer1.org2.example.com | 00000020 bd 25 0e 1b 02 20 2b d7 b2 e8 e0 43 60 56 cc 26 |.%... +....C`V.&| +peer1.org2.example.com | 00000030 da ae fd f7 ec a4 f7 82 12 50 e7 09 be 39 2f f5 |.........P...9/.| +peer1.org2.example.com | 00000040 1c 76 cc 3b 71 aa |.v.;q.| +peer1.org2.example.com | [166c 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [166d 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [166e 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [166f 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1670 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1671 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1672 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 30 0b d1 02 88 00 a6 3f 0b b3 be 7a 4b 35 bc |.0......?...zK5.| +peer1.org2.example.com | 00000010 e2 d2 42 2f 17 2c e3 30 bf a0 03 b3 ea cf 36 50 |..B/.,.0......6P| +peer1.org2.example.com | [1673 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 26 ca 86 55 15 5c cb f4 a0 57 77 |0D. o&..U.\...Ww| +peer1.org2.example.com | 00000010 f3 34 72 6b d5 21 fc a8 e4 e3 b0 04 34 0d 80 c5 |.4rk.!......4...| +peer1.org2.example.com | 00000020 bd 25 0e 1b 02 20 2b d7 b2 e8 e0 43 60 56 cc 26 |.%... +....C`V.&| +peer1.org2.example.com | 00000030 da ae fd f7 ec a4 f7 82 12 50 e7 09 be 39 2f f5 |.........P...9/.| +peer1.org2.example.com | 00000040 1c 76 cc 3b 71 aa |.v.;q.| +peer1.org2.example.com | [1674 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1675 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1676 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1677 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1678 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1679 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [167a 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [167b 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [167c 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [167d 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [167e 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [167f 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1680 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1681 05-20 18:20:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43440 gate 1589998833354181500 evaluation starts +peer1.org2.example.com | [1682 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43440 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1683 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43440 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1684 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1685 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43440 principal evaluation fails +peer1.org2.example.com | [1686 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43440 gate 1589998833354181500 evaluation fails +peer1.org2.example.com | [1687 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1688 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1689 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [168a 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e439b0 gate 1589998833361310500 evaluation starts +peer1.org2.example.com | [168b 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e439b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [168c 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e439b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [168d 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e439b0 principal matched by identity 0 +peer1.org2.example.com | [168e 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +peer1.org2.example.com | 00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +peer1.org2.example.com | [168f 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +peer1.org2.example.com | 00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +peer1.org2.example.com | 00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +peer1.org2.example.com | 00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +peer1.org2.example.com | 00000040 ea 2b 5a 57 a9 df |.+ZW..| +peer1.org2.example.com | [1690 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e439b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1691 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e439b0 gate 1589998833361310500 evaluation succeeds +peer1.org2.example.com | [1692 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1693 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1694 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1695 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1696 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1697 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1698 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1699 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +peer1.org2.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +peer1.org2.example.com | [169a 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +peer1.org2.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer1.org2.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +peer1.org2.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +peer1.org2.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +peer1.org2.example.com | [169b 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [169c 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [169d 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [169e 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [169f 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16a0 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [16a1 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [16a2 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 30 0b d1 02 88 00 a6 3f 0b b3 be 7a 4b 35 bc |.0......?...zK5.| +peer1.org2.example.com | 00000010 e2 d2 42 2f 17 2c e3 30 bf a0 03 b3 ea cf 36 50 |..B/.,.0......6P| +peer1.org2.example.com | [16a3 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 26 ca 86 55 15 5c cb f4 a0 57 77 |0D. o&..U.\...Ww| +peer1.org2.example.com | 00000010 f3 34 72 6b d5 21 fc a8 e4 e3 b0 04 34 0d 80 c5 |.4rk.!......4...| +peer1.org2.example.com | 00000020 bd 25 0e 1b 02 20 2b d7 b2 e8 e0 43 60 56 cc 26 |.%... +....C`V.&| +peer1.org2.example.com | 00000030 da ae fd f7 ec a4 f7 82 12 50 e7 09 be 39 2f f5 |.........P...9/.| +peer1.org2.example.com | 00000040 1c 76 cc 3b 71 aa |.v.;q.| +peer1.org2.example.com | [16a4 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [16a5 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 8c f4 0e 73 6f d8 9e c8 55 02 |0E.!.....so...U.| +peer1.org2.example.com | 00000010 18 fb 91 12 98 51 bc a1 18 8f 24 f0 5a a3 7c a6 |.....Q....$.Z.|.| +peer1.org2.example.com | 00000020 03 cd 73 9e 70 02 20 55 b5 ab 4e bc b4 ef b4 47 |..s.p. U..N....G| +peer1.org2.example.com | 00000030 84 9f cb e6 a0 20 1c 3f 40 7a a3 ae 9c 5b b9 f9 |..... .?@z...[..| +peer1.org2.example.com | 00000040 e2 54 6d 7c 0a ad 4f |.Tm|..O| +peer1.org2.example.com | [16a6 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [16a7 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [16a8 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16a9 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16aa 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16ab 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [16ac 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16ae 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16ad 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16af 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [16b0 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16b1 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16b2 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [16b3 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [16b4 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [16b5 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e175e0 gate 1589998833409540400 evaluation starts +peer1.org1.example.com | [1798 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1799 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [179a 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [179b 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [179c 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [179d 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [179e 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003935c50 gate 1589998837164282200 evaluation starts +peer1.org1.example.com | [179f 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003935c50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17a0 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003935c50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [17a1 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003935c50 principal matched by identity 0 +peer1.org1.example.com | [17a2 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 df 8e 75 41 28 3c 92 bd e8 fd 1c 2a ca e1 ff |...uA(<.....*...| +peer1.org1.example.com | 00000010 e2 3b da db 51 5c ab 6d 9f 6a ef 09 55 47 ae 53 |.;..Q\.m.j..UG.S| +peer1.org1.example.com | [17a3 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 2d 39 bd 82 9d 7e e7 78 8e ca |0D. V7-9...~.x..| +peer1.org1.example.com | 00000010 72 18 11 31 44 d3 9d 70 bb ab dd d9 2a 04 da 69 |r..1D..p....*..i| +peer1.org1.example.com | 00000020 21 82 ce 59 02 20 60 bd e8 cc f9 2a 63 95 fa a4 |!..Y. `....*c...| +peer1.org1.example.com | 00000030 22 eb b5 da 6b 84 0c ff 38 07 3f 03 6a 78 9e 5a |"...k...8.?.jx.Z| +peer1.org1.example.com | 00000040 72 b3 60 b0 47 92 |r.`.G.| +peer1.org1.example.com | [17a4 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003935c50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [17a5 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003935c50 gate 1589998837164282200 evaluation succeeds +peer1.org1.example.com | [17a6 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17a7 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17a8 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [17a9 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [17aa 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [17ab 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [17ac 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [17ad 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [17ae 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [17af 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b0 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b1 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b2 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [17b3 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17b4 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17b5 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17b6 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [17b7 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [17b8 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b9 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer1.org1.example.com | [17ba 05-20 18:20:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [17bb 05-20 18:20:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [17bc 05-20 18:20:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161024 +peer1.org1.example.com | [17bd 05-20 18:20:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7CD1EE271866B54EBF414F60C1AFE1BEBFD2AC602B8414F72B7624B5D505F0D6 +peer1.org1.example.com | [17be 05-20 18:20:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [17bf 05-20 18:20:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [17c0 05-20 18:20:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [17c1 05-20 18:20:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [17c2 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c3 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c4 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c5 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [17c6 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c7 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [17c8 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [17cb 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17c9 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17cd 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17ca 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17ce 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17cc 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17cf 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17d0 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17d1 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17d2 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17d3 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [17d4 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17d5 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [17d6 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17d7 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17d8 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [17d9 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [17da 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [17db 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2f090 gate 1589998838704114100 evaluation starts +peer1.org1.example.com | [17dc 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2f090 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17dd 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2f090 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [17de 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2f090 principal matched by identity 0 +peer1.org1.example.com | [17df 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 a3 07 42 10 8f 78 e7 04 b0 14 b3 8c ed a6 26 |...B..x........&| +peer1.org1.example.com | 00000010 8e b3 fd e0 b4 3a 86 f5 92 5d 42 54 63 5e d9 0d |.....:...]BTc^..| +peer1.org1.example.com | [17e0 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 27 17 18 11 8b 44 4d 7d 3c a5 |0E.!..'....DM}<.| +peer1.org1.example.com | 00000010 1e 6a c3 10 82 fb d2 2c 82 b4 3b 2d b5 90 93 f8 |.j.....,..;-....| +peer1.org1.example.com | 00000020 73 de 82 5b 64 02 20 69 21 63 02 3c 8a 27 0f 3a |s..[d. i!c.<.'.:| +peer1.org1.example.com | 00000030 f2 69 a8 f3 bc 66 6e 6f a2 6f af ff 79 eb 0e 25 |.i...fno.o..y..%| +peer1.org1.example.com | 00000040 f7 8e 05 a4 10 d8 f4 |.......| +peer1.org1.example.com | [17e1 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2f090 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [17e2 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2f090 gate 1589998838704114100 evaluation succeeds +peer1.org1.example.com | [17e3 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17e4 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17e5 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [17e6 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [17e7 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17e8 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [17e9 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [17ea 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [17eb 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [17ec 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17ed 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17ee 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17ef 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f0 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f1 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f2 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f3 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f4 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f5 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [157e 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 195f Adding to config map: [Group] /Channel/Application/Org3MSP" +peer1.org2.example.com | [16b6 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e175e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17f6 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16d7 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [157f 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1960 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer1.org2.example.com | [16b7 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e175e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [17f7 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16d8 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1961 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer1.org2.example.com | [16b8 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e175e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [17f8 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [16d9 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1580 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1962 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer1.org2.example.com | [16b9 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e175e0 principal evaluation fails +peer1.org1.example.com | [17f9 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16da 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1963 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [17fa 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16db 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 9d 6c 58 ae 31 24 cc db f7 5f 55 14 c0 ce c3 |6.lX.1$..._U....| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1964 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer1.org2.example.com | [16ba 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e175e0 gate 1589998833409540400 evaluation fails +peer1.org1.example.com | [17fb 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 61 18 49 32 74 23 32 16 04 44 5a 7b 2f 94 f3 44 |a.I2t#2..DZ{/..D| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1965 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org2.example.com | [16bb 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [16dc 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 07 47 1b eb ae 8c ef cc b3 2a b7 |0D. ..G.......*.| +peer1.org1.example.com | [17fc 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1581 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1966 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer1.org2.example.com | [16bc 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 85 23 60 3f dd c5 53 d9 70 81 27 1a 7e c5 c3 9b |.#`?..S.p.'.~...| +peer1.org1.example.com | [17fd 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1582 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 gate 1589998827687086300 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1967 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer1.org2.example.com | [16bd 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000020 b0 48 5d 89 02 20 36 63 a8 de 99 74 6e 28 f5 da |.H].. 6c...tn(..| +peer1.org1.example.com | [17fe 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1583 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1968 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [16be 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e17b50 gate 1589998833410416900 evaluation starts +peer0.org2.example.com | 00000030 11 23 58 53 d6 3d bb f4 ba 39 3d 3e 62 07 4c bb |.#XS.=...9=>b.L.| +peer1.org1.example.com | [17ff 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1584 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1969 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer1.org2.example.com | [16bf 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e17b50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 6c ff dd 51 f8 db |l..Q..| +peer1.org1.example.com | [1800 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1585 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer1.org2.example.com | [16c0 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e17b50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [16dd 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 325 bytes, Signature: 0 bytes +peer1.org1.example.com | [1801 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1586 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196b Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [16c1 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e17b50 principal matched by identity 0 +peer1.org1.example.com | [1802 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1587 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196c Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org2.example.com | [16de 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16c2 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 3b 8b 5b aa 3c 23 45 fc e5 83 b7 ad 24 dc 53 |.;.[.<#E.....$.S| +peer1.org1.example.com | [1803 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1588 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org2.example.com | [16df 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 73 05 cc e8 23 0f fb 19 48 a4 8c d6 4f 13 46 4a |s...#...H...O.FJ| +peer1.org1.example.com | [1804 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1589 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [16e0 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16c3 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 3c 33 0a 7b a6 e7 5c fa bb 07 18 |0D. %<3.{..\....| +peer1.org1.example.com | [1805 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [158a 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org2.example.com | [16e1 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | 00000010 9a f7 bc 3f 05 97 ae f5 d2 ec 49 8d 47 84 5b 8e |...?......I.G.[.| +peer1.org1.example.com | [1806 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [158b 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1970 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org2.example.com | [16e2 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +peer1.org2.example.com | 00000020 b4 ac cc 95 02 20 78 62 92 53 65 53 2d 0e 03 84 |..... xb.SeS-...| +peer1.org1.example.com | [1807 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [158c 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1971 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | 00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +peer1.org2.example.com | 00000030 ce 0f 74 ae 71 04 06 4b b1 85 80 f5 bb af 6f c4 |..t.q..K......o.| +peer1.org1.example.com | [1808 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [158d 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1972 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org2.example.com | [16e3 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +peer1.org2.example.com | 00000040 95 7a 23 62 e6 a2 |.z#b..| +peer1.org1.example.com | [1809 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [158e 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1973 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org2.example.com | 00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +peer1.org2.example.com | [16c4 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e17b50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [180a 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [158f 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1974 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | 00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +peer1.org2.example.com | [16c5 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e17b50 gate 1589998833410416900 evaluation succeeds +peer1.org1.example.com | [180b 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1590 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1975 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org2.example.com | 00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +peer1.org2.example.com | [16c6 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [180c 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1591 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1976 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org2.example.com | 00000040 dd 9f 8d e4 ef 46 ea |.....F.| +peer1.org2.example.com | [16c7 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [180d 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1592 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1977 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org2.example.com | [16e4 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16c8 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [180e 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1593 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1978 Adding to config map: [Value] /Channel/Capabilities" +peer0.org2.example.com | [16e5 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16c9 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [180f 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1594 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1979 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org2.example.com | [16e6 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16ca 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1810 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1595 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org2.example.com | [16e7 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16cb 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1811 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1596 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197b Adding to config map: [Value] /Channel/Consortium" +peer0.org2.example.com | [16e8 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 325 bytes, Signature: 0 bytes +peer1.org2.example.com | [16cc 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1597 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1812 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197c Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org2.example.com | [16e9 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [16cd 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1598 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1813 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197d Adding to config map: [Policy] /Channel/Readers" +peer0.org2.example.com | [16ea 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 5e 22 63 2e 10 12 65 2c a2 fa 9a 28 3e 33 3c |'^"c...e,...(>3<| +peer1.org2.example.com | [16ce 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [16cf 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1599 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1814 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11e20 gate 1589998839067148300 evaluation starts +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197e Adding to config map: [Policy] /Channel/Writers" +peer0.org2.example.com | 00000010 b8 d6 e4 c1 89 60 b0 de bb bd 6d ef 35 08 3c 88 |.....`....m.5.<.| +peer1.org2.example.com | [16d0 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16d1 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [159a 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1815 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11e20 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197f Adding to config map: [Policy] /Channel/Admins" +peer0.org2.example.com | [16eb 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 87 19 6c 50 2a 4f 0d e8 d0 e6 14 |0D. (..lP*O.....| +peer1.org2.example.com | [16d2 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [159b 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1816 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11e20 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:35.307 UTC [common.channelconfig] LogSanityChecks -> DEBU 1980 As expected, current configuration has policy '/Channel/Readers'" +peer0.org2.example.com | 00000010 d9 dd b8 a8 16 37 11 41 d3 0f bc 1a 4f d8 b9 40 |.....7.A....O..@| +peer1.org2.example.com | [16d3 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [159c 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [1817 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11e20 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1981 As expected, current configuration has policy '/Channel/Writers'" +peer0.org2.example.com | 00000020 96 0c ad f0 02 20 3d 26 43 81 f5 37 df e4 5e 05 |..... =&C..7..^.| +peer1.org2.example.com | [16d4 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [159d 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1818 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 96 fc 2d 67 a4 0f f4 72 ce 8a e4 73 f3 62 43 |$..-g...r...s.bC| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1982 Manager Channel looking up path [Application]" +peer0.org2.example.com | 00000030 f7 49 ab c2 13 57 6e 8f 38 64 8b 1c 9b 0c 74 fa |.I...Wn.8d....t.| +peer1.org2.example.com | [16d5 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [159e 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 68 3b 4e 74 38 20 a9 14 5d 48 48 3a 5e 60 ca ee |h;Nt8 ..]HH:^`..| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1983 Manager Channel has managers Application" +peer0.org2.example.com | 00000040 36 67 2c ed 73 95 |6g,.s.| +peer1.org2.example.com | [16d6 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [159f 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1819 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 08 bc b7 84 09 73 fb 85 4c 06 5b |0D. E.....s..L.[| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1984 Manager Channel has managers Orderer" +peer0.org2.example.com | [16ec 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16d7 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15a0 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ff b8 b5 ca 69 e1 bb 46 4a cf d1 f4 67 9a 22 c3 |....i..FJ...g.".| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1985 Manager Channel/Application looking up path []" +peer0.org2.example.com | [16ed 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16d8 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [15a1 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 f9 a8 24 ef 02 20 33 77 44 ec db 96 9d d7 e3 80 |..$.. 3wD.......| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1986 Manager Channel/Application has managers Org2MSP" +peer1.org2.example.com | [16d9 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16ee 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15a2 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 0c f8 26 9f 43 49 b1 b4 5f 3d 26 b0 df 52 34 8e |..&.CI.._=&..R4.| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1987 Manager Channel/Application has managers Org3MSP" +peer1.org2.example.com | [16da 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ef 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15a3 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 f3 1a 3b 62 3b 6c |..;b;l| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1988 Manager Channel/Application has managers Org1MSP" +peer1.org2.example.com | [16db 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f0 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [15a4 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [181a 05-20 18:20:39.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11e20 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1989 As expected, current configuration has policy '/Channel/Application/Readers'" +peer1.org2.example.com | [16dc 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f1 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [15a5 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [181b 05-20 18:20:39.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11e20 gate 1589998839067148300 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 198a As expected, current configuration has policy '/Channel/Application/Writers'" +peer1.org2.example.com | [16dd 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f2 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15a6 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [181c 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 198b As expected, current configuration has policy '/Channel/Application/Admins'" +peer1.org2.example.com | [16de 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f3 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [181d 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15a7 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 198c Manager Channel looking up path [Orderer]" +peer1.org2.example.com | [16df 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f4 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [181e 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [15a8 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 198d Manager Channel has managers Application" +peer1.org2.example.com | [16e0 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f5 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [181f 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [15a9 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 43 16 86 31 55 c4 31 65 ed 50 7a 05 d4 d0 d8 |.C..1U.1e.Pz....| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 198e Manager Channel has managers Orderer" +peer0.org2.example.com | [16f6 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16e1 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1820 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 5c f8 57 c3 8c 57 5d 69 ef 9f a3 0d f7 f1 37 b3 |\.W..W]i......7.| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 198f Manager Channel/Orderer looking up path []" +peer0.org2.example.com | [16f7 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16e2 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1821 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [15aa 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 06 50 c9 08 20 3f 6d 90 8c 93 |0E.!...P.. ?m...| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1990 Manager Channel/Orderer has managers OrdererOrg" +peer0.org2.example.com | [16f8 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [16e3 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1822 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000010 d4 f6 c7 b3 95 7d 32 ff a9 68 a2 b3 af 8a a2 01 |.....}2..h......| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1991 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org2.example.com | [16f9 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16e4 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1823 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000020 84 7f f6 22 00 02 20 5c a0 40 84 4f 94 b1 b5 94 |...".. \.@.O....| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1992 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org2.example.com | [16fa 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16e5 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1824 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000030 3c 38 62 3b a4 4f 06 07 b8 84 a7 75 0e fb 3f e0 |<8b;.O.....u..?.| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1993 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org2.example.com | [16fc 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16e6 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1825 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 b8 a5 fa 87 8e 3c 1c |.....<.| +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1994 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org2.example.com | [16fd 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [16e7 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1826 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ab 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.capabilities] Supported -> DEBU 1995 Orderer capability V1_4_2 is supported and is enabled" +peer0.org2.example.com | [16fe 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 d4 03 95 0b 28 3c 00 86 94 c3 1d ef b2 33 b4 |W....(<.......3.| +peer1.org2.example.com | [16e8 05-20 18:20:33.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1827 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ac 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [common.capabilities] Supported -> DEBU 1996 Channel capability V1_4_3 is supported and is enabled" +peer0.org2.example.com | 00000010 39 a0 29 39 9e b2 1b d2 b1 f6 4b da 0a 82 db de |9.)9......K.....| +peer1.org2.example.com | [16e9 05-20 18:20:33.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161021 +peer1.org1.example.com | [1828 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [15ad 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [orderer.common.server] func1 -> DEBU 1997 Executing callback to update root CAs" +peer0.org2.example.com | [16ff 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 de 89 ad cc 1a 7d 8b ab 4b 1a |0E.!.......}..K.| +peer1.org2.example.com | [16ea 05-20 18:20:33.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 38DF2411A432621897724A7300E03B5DD4E9C7ACD451F0D9694B06D08A16D4FF +peer1.org1.example.com | [1829 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ae 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1998 updating root CAs for channel [businesschannel]" +peer0.org2.example.com | 00000010 84 34 4c 8d 59 e5 b7 84 cd 7c 4b f7 3f 0c 36 64 |.4L.Y....|K.?.6d| +peer1.org2.example.com | [16eb 05-20 18:20:33.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [182a 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15af 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1999 adding app root CAs for MSP [Org2MSP]" +peer0.org2.example.com | 00000020 2b 9d 5f d8 a6 02 20 3d b9 e5 68 dc da 42 7a 74 |+._... =..h..Bzt| +peer1.org2.example.com | [16ec 05-20 18:20:33.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [182b 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b0 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 199a adding app root CAs for MSP [Org3MSP]" +peer0.org2.example.com | 00000030 58 39 5b ad a9 ad ac d6 e6 2e eb c8 56 24 f5 ff |X9[.........V$..| +peer1.org2.example.com | [16ed 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [182c 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b1 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 199b adding orderer root CAs for MSP [OrdererMSP]" +peer0.org2.example.com | 00000040 f5 85 8c fa cc 84 c6 |.......| +peer1.org2.example.com | [16ee 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [182d 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b2 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 199c adding app root CAs for MSP [Org1MSP]" +peer0.org2.example.com | [1700 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16ef 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [182e 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b3 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.309 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 199d [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +peer0.org2.example.com | [1701 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [16f0 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [182f 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b4 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.309 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 199e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +peer0.org2.example.com | [1702 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [16f1 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1830 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b5 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 199f Obtaining default signing identity" +peer0.org2.example.com | [1703 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [16f2 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1831 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [15b6 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:35.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 19a0 Obtaining default signing identity" +peer0.org2.example.com | [1704 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [16f3 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1832 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b7 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:35.309 UTC [msp.identity] Sign -> DEBU 19a1 Sign: plaintext: 0A020806120B0A090A03010203100418...D58524EE370D8159D91A862F7CBDC7A6 " +peer0.org2.example.com | [1705 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f4 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1833 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b8 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:35.309 UTC [msp.identity] Sign -> DEBU 19a2 Sign: digest: 5F86DFCD9EC951EC71DB036A4486AFA52A8589AF43DE7FC68A1F167DAC429610 " +peer0.org2.example.com | [1706 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f5 05-20 18:20:33.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1834 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [15b9 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:35.317 UTC [fsblkstorage] indexBlock -> DEBU 19a3 Indexing block [blockNum=6, blockHash=[]byte{0xd4, 0xd4, 0x5b, 0x4, 0x4e, 0x8a, 0x13, 0x2b, 0x2, 0xd9, 0x3, 0xc3, 0x1e, 0x8, 0xa3, 0x0, 0x38, 0xa2, 0x72, 0xe6, 0xd8, 0x7f, 0xf1, 0x5f, 0x4f, 0x51, 0x17, 0xe3, 0xb7, 0xa8, 0x82, 0xb3} txOffsets= +peer0.org2.example.com | [1707 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f6 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1835 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [15ba 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | txId=987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2 locPointer=offset=71, bytesLength=40146 +peer0.org2.example.com | [16fb 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f7 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1836 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15bb 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | ]" +peer0.org2.example.com | [1708 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16f8 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1837 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [15bc 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.318 UTC [fsblkstorage] updateCheckpoint -> DEBU 19a4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138572], isChainEmpty=[false], lastBlockNumber=[6]" +peer0.org2.example.com | [1709 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16f9 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1838 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15bd 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.318 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 19a5 [channel: businesschannel] Wrote block [6]" +peer0.org2.example.com | [170a 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16fa 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1839 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15be 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:35.323 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19a6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [170b 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [16fb 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [15bf 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [183a 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:35.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19a7 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +peer0.org2.example.com | [170c 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16fc 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15c0 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [183b 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.323 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19a8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63µs " +peer0.org2.example.com | [170d 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [16fd 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [15c1 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [183c 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:35.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19a9 Sending msg of 28 bytes to 2 on channel businesschannel took 63.8µs" +peer0.org2.example.com | [170e 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16fe 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb a0 7e 49 c8 bd 4b 9e 8a 70 52 7b b1 10 c2 a3 |..~I..K..pR{....| +peer0.org1.example.com | [15c2 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [183d 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-05-20 18:21:35.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ab Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +peer0.org2.example.com | [170f 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 b7 f0 4d b5 21 5b 9f d6 45 99 4b 15 a9 25 37 2c |..M.![..E.K..%7,| +peer0.org1.example.com | [15c3 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [183e 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 37 5c 42 81 31 10 b3 8f 44 f4 30 03 93 cb 5e |m7\B.1...D.0...^| +orderer0.example.com | "2020-05-20 18:21:35.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.3µs " +peer0.org2.example.com | [1710 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16ff 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 0a d0 c1 d4 96 4a ed c0 db 47 58 |0D. C.....J...GX| +peer0.org1.example.com | [15c4 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 99 b8 7b 8b 4e 5f 31 d3 87 a6 8c 6d d3 4c 84 cc |..{.N_1....m.L..| +orderer0.example.com | "2020-05-20 18:21:35.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.2µs " +peer0.org2.example.com | [1711 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 03 ee 34 79 83 82 7a 2a 46 e8 6e 87 fe da fd 64 |..4y..z*F.n....d| +peer0.org1.example.com | [15c5 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [183f 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 5b 5a 43 23 ff ef 1f 75 75 6c |0E.!..[ZC#...uul| +orderer0.example.com | "2020-05-20 18:21:35.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ad Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1712 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | 00000020 18 08 2f 7d 02 20 57 73 7b 3a 7f 38 48 33 c0 8b |../}. Ws{:.8H3..| +peer0.org1.example.com | [15c6 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b7 22 f3 e2 7f bc f1 8b 7b e3 93 73 f9 83 3e f5 |."......{..s..>.| +orderer0.example.com | "2020-05-20 18:21:35.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ae Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1713 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 2f ff a7 c1 44 f4 ed a6 8a 3e 1d b7 73 83 7d 9a |/...D....>..s.}.| +peer0.org1.example.com | [15c7 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 70 2a b1 d4 79 02 20 6e 4f d6 33 3a 21 87 f5 ac |p*..y. nO.3:!...| +orderer0.example.com | "2020-05-20 18:21:35.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19af Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1714 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org2.example.com | 00000040 dc cc 0a ab bb bc |......| +peer0.org1.example.com | [15c8 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 51 10 af 61 a4 e4 9f 3a 4f b3 70 14 cb 57 f5 4b |Q..a...:O.p..W.K| +orderer0.example.com | "2020-05-20 18:21:35.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b0 Sending msg of 28 bytes to 3 on channel testchainid took 72.4µs" +peer0.org2.example.com | [1715 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1700 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15c9 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 15 71 49 ed 71 c4 78 |.qI.q.x| +orderer0.example.com | "2020-05-20 18:21:35.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +peer0.org2.example.com | [1716 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15ca 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1701 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1840 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:35.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b2 Sending msg of 28 bytes to 2 on channel businesschannel took 47.8µs" +peer0.org2.example.com | [1717 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [15cb 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1703 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [1841 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-05-20 18:21:35.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b3 Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +peer0.org2.example.com | [1718 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15cc 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [1842 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:35.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.4µs " +peer0.org2.example.com | [1719 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +peer1.org2.example.com | [1704 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8b f2 7c 4d 7d 35 71 67 3c ff |0E.!....|M}5qg<.| +peer1.org1.example.com | [1843 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:35.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " +peer0.org2.example.com | [171a 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [15cd 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +peer1.org2.example.com | 00000010 53 ec 39 d8 a7 92 2e 15 02 29 29 64 67 aa 67 c8 |S.9......))dg.g.| +peer1.org1.example.com | [1844 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:35.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [171b 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +peer1.org2.example.com | 00000020 ea 5d d2 cc 4c 02 20 15 49 ca 86 3a 09 b2 09 0f |.]..L. .I..:....| +peer1.org1.example.com | [1845 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:35.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [171c 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +peer1.org2.example.com | 00000030 6d ea e0 b7 70 a7 16 41 ac 21 bc 6c e3 ee 77 ae |m...p..A.!.l..w.| +peer1.org1.example.com | [1846 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:36.323 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [171d 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6760 gate 1589998828854566400 evaluation starts +peer0.org1.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +peer1.org2.example.com | 00000040 ee cb 99 57 a0 52 f0 |...W.R.| +peer1.org1.example.com | [1847 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:36.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +peer0.org2.example.com | [171e 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +peer1.org2.example.com | [1702 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1848 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:36.324 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ba Sending msg of 28 bytes to 3 on channel testchainid took 110.3µs" +peer0.org2.example.com | [171f 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6760 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [15ce 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [1705 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1849 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:36.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19bb Sending msg of 28 bytes to 3 on channel businesschannel took 30µs" +peer0.org2.example.com | [1720 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [1706 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [184a 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:36.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19bc Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +peer0.org2.example.com | [1721 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6760 principal evaluation fails +peer0.org1.example.com | [15cf 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 79 2c 4d 70 44 7b 24 49 9f b2 |0E.!..y,MpD{$I..| +peer1.org2.example.com | [1707 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [184b 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:36.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 574.4µs " +peer0.org2.example.com | [1722 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6760 gate 1589998828854566400 evaluation fails +peer0.org1.example.com | 00000010 e5 54 8f 26 f9 e1 9a ff fc 4b 8c 78 ce da fb 41 |.T.&.....K.x...A| +peer1.org2.example.com | [1708 05-20 18:20:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [184c 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:36.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 365.1µs " +peer0.org2.example.com | [1723 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 29 b6 12 13 0a 02 20 21 41 86 39 0b 6c 59 53 04 |)..... !A.9.lYS.| +peer1.org2.example.com | [1709 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [184d 05-20 18:20:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1724 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:36.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19bf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000030 06 a9 50 a2 5d b8 0a 3c a3 63 a6 d2 3f e6 ab b5 |..P.]..<.c..?...| +peer1.org2.example.com | [170a 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [184e 05-20 18:20:39.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1725 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:36.344 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000040 3b 3b b4 95 d4 25 7d |;;...%}| +peer1.org2.example.com | [170b 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [184f 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1726 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cd0 gate 1589998828857690300 evaluation starts +orderer0.example.com | "2020-05-20 18:21:36.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [15d0 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [170c 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1850 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1727 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cd0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:36.822 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c2 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +peer0.org1.example.com | [15d1 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [170e 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1851 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1728 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cd0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:36.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.7µs " +peer0.org1.example.com | [15d2 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [170d 05-20 18:20:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1852 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1729 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cd0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:36.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c4 Sending msg of 28 bytes to 2 on channel businesschannel took 60.2µs" +peer0.org1.example.com | [15d3 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [170f 05-20 18:20:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1853 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [172a 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be b0 ef 21 03 1b 0f 67 69 72 69 ea 79 ed b8 8f |...!...giri.y...| +orderer0.example.com | "2020-05-20 18:21:36.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c5 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +peer0.org1.example.com | [15d4 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1710 05-20 18:20:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1854 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 23 6b 5d f4 8e 31 0a f4 48 6e 1a 77 9f 94 21 9d |#k]..1..Hn.w..!.| +orderer0.example.com | "2020-05-20 18:21:36.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.3µs " +peer0.org1.example.com | [15d5 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1711 05-20 18:20:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1855 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [172b 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 33 ea 3d 65 75 3a 26 bc a5 2b 56 13 |0C. 3.=eu:&..+V.| +orderer0.example.com | "2020-05-20 18:21:36.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 572.3µs " +peer0.org1.example.com | [15d6 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1712 05-20 18:20:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1856 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 72 0a 78 bb 88 bb 95 92 55 20 12 14 5a 58 88 d3 |r.x.....U ..ZX..| +orderer0.example.com | "2020-05-20 18:21:36.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [15d7 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1713 05-20 18:20:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1857 05-20 18:20:39.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 f2 76 39 8d 02 1f 29 42 1e f1 47 2d fc 3d c2 47 |.v9...)B..G-.=.G| +orderer0.example.com | "2020-05-20 18:21:36.845 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [15d8 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1714 05-20 18:20:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1858 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000030 f0 d1 ba 24 b9 d4 8c f0 58 a1 91 68 19 a3 6e 2f |...$....X..h..n/| +orderer0.example.com | "2020-05-20 18:21:37.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ca Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [15d9 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1715 05-20 18:20:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1859 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000040 95 c6 f9 3c e7 |...<.| +orderer0.example.com | "2020-05-20 18:21:37.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19cb Sending msg of 28 bytes to 3 on channel testchainid took 692.8µs" +peer0.org1.example.com | [15da 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1716 05-20 18:20:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [185a 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [172c 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cd0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:37.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2053ms " +peer0.org1.example.com | [15db 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1717 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [185b 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [172d 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cd0 gate 1589998828857690300 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:37.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19cd Sending msg of 28 bytes to 2 on channel businesschannel took 38.1µs" +peer0.org1.example.com | [15dc 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1718 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [185c 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [172e 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:37.342 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ce Sending msg of 28 bytes to 3 on channel businesschannel took 27.3µs" +peer0.org1.example.com | [15dd 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1719 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [185d 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [172f 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:37.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.9µs " +peer0.org1.example.com | [15de 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [171a 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [185e 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1730 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:37.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.9µs " +peer0.org1.example.com | [15df 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [171b 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [185f 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1731 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1860 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15e0 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:37.345 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [171c 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1732 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1861 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15e1 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:37.345 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [171d 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1733 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1862 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [15e2 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:37.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [171e 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1734 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]} +peer1.org1.example.com | [1863 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [15e3 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:37.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d4 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +peer1.org2.example.com | [171f 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1735 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1864 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [15e4 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:37.825 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 887.5µs " +peer1.org2.example.com | [1720 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1736 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1865 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15e5 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:37.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d6 Sending msg of 28 bytes to 2 on channel businesschannel took 48.7µs" +peer1.org2.example.com | [1721 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1737 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1866 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15e6 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:37.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d7 Sending msg of 28 bytes to 3 on channel businesschannel took 27.9µs" +peer1.org2.example.com | [1722 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed84f0 gate 1589998834060655100 evaluation starts +peer0.org2.example.com | [1738 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1867 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15e7 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:37.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 475.2µs " +peer1.org2.example.com | [1723 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed84f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1739 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1868 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [15e8 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:37.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6059ms " +peer1.org2.example.com | [1724 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed84f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [173a 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1869 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [15e9 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:37.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19db Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1725 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed84f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [173b 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [186a 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ea 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:37.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19da Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1726 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed84f0 principal evaluation fails +peer0.org2.example.com | [173c 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [186b 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [15eb 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:38.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19dc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1727 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed84f0 gate 1589998834060655100 evaluation fails +peer0.org2.example.com | [173d 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [186c 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ec 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:38.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dd Sending msg of 28 bytes to 3 on channel testchainid took 48.6µs" +peer1.org2.example.com | [1728 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [173e 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [186d 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [15ed 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 891.8µs " +peer1.org2.example.com | [1729 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1740 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [186e 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ee 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.343 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19df Sending msg of 28 bytes to 2 on channel businesschannel took 769µs" +peer1.org2.example.com | [172a 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1741 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [186f 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [15ef 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.343 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e0 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +peer1.org2.example.com | [172b 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed8a60 gate 1589998834063303100 evaluation starts +peer0.org2.example.com | [1742 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1870 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [15f0 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.347 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.2246ms " +peer1.org2.example.com | [172c 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed8a60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1743 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1871 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15f1 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [172d 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed8a60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1744 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1872 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15f2 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [172e 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed8a60 principal matched by identity 0 +peer0.org2.example.com | [1745 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1873 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15f3 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +orderer0.example.com | "2020-05-20 18:21:38.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.9357ms " +peer1.org2.example.com | [172f 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 2b 3d 47 11 96 b1 62 d3 5e c5 7b f9 5f 03 ff |.+=G...b.^.{._..| +peer0.org2.example.com | [1746 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +peer0.org1.example.com | [15f4 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1874 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 43 0f f2 13 5e f8 90 41 0a b4 55 9f bc 02 3e 47 |C...^..A..U...>G| +orderer0.example.com | "2020-05-20 18:21:38.380 UTC [orderer.common.server] Deliver -> DEBU 19e5 Starting new Deliver handler" +peer0.org2.example.com | [1747 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15f5 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1875 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1730 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 42 25 cb 5b db 62 05 dc b4 96 |0E.!..B%.[.b....| +orderer0.example.com | "2020-05-20 18:21:38.380 UTC [common.deliver] Handle -> DEBU 19e6 Starting new deliver loop for 172.18.0.9:53664" +peer0.org2.example.com | [1748 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +peer0.org1.example.com | [15f6 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1876 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 8e 52 e6 cc 79 10 2a c1 56 68 a1 41 0f 7b d5 ed |.R..y.*.Vh.A.{..| +orderer0.example.com | "2020-05-20 18:21:38.380 UTC [common.deliver] Handle -> DEBU 19e7 Attempting to read seek info message from 172.18.0.9:53664" +peer0.org2.example.com | [1749 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer0.org1.example.com | [15f7 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1877 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000020 62 02 8e cc 42 02 20 08 67 2b d0 be 33 4b 70 72 |b...B. .g+..3Kpr| +orderer0.example.com | "2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [174a 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15f8 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1878 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000030 55 5b 00 22 0b f0 9a ef 0f b1 70 19 4c 7b 85 ff |U[."......p.L{..| +orderer0.example.com | "2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [173f 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1879 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000040 74 45 07 b7 ef a9 73 |tE....s| +orderer0.example.com | "2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org2.example.com | [174b 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [187a 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2e320 gate 1589998839888854400 evaluation starts +peer0.org1.example.com | [15f9 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1731 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed8a60 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [174c 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [187b 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2e320 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [15fa 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1732 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed8a60 gate 1589998834063303100 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org2.example.com | [174d 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [187c 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2e320 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1733 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [15fb 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:38.382 UTC [msp] DeserializeIdentity -> DEBU 19ed Obtaining identity" +peer0.org2.example.com | [174e 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [187d 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2e320 principal matched by identity 0 +peer1.org2.example.com | [1734 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [15fc 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.383 UTC [msp.identity] newIdentity -> DEBU 19ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [174f 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [187e 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | [1735 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [15fd 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [1750 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1736 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [15fe 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [1751 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [187f 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | [1737 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15ff 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [1752 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer0.org2.example.com | [1753 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1754 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1755 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer0.org2.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer0.org2.example.com | [1756 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1600 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +peer0.org2.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org2.example.com | [1739 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1601 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 gate 1589998828692826400 evaluation starts +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org2.example.com | [173a 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1602 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +peer0.org2.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer1.org1.example.com | [1880 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2e320 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [173b 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +peer0.org2.example.com | [1757 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [1881 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [173c 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1603 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 processing identity 0 with bytes of 115a110 +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [1882 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2e320 gate 1589998839888854400 evaluation succeeds +peer1.org2.example.com | [173d 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1604 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 principal matched by identity 0 +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +peer0.org2.example.com | [1758 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 c3 62 4e cf d5 08 da b0 b3 08 d2 |0D. U.bN........| +peer1.org1.example.com | [1883 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [173e 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1605 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 9d 6c 58 ae 31 24 cc db f7 5f 55 14 c0 ce c3 |6.lX.1$..._U....| +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +peer0.org2.example.com | 00000010 f1 38 47 fd 9d 30 e0 68 f2 c6 24 f9 56 e0 f2 ae |.8G..0.h..$.V...| +peer1.org1.example.com | [1884 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [173f 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 61 18 49 32 74 23 32 16 04 44 5a 7b 2f 94 f3 44 |a.I2t#2..DZ{/..D| +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +peer0.org2.example.com | 00000020 85 dc 7f 07 02 20 02 77 d6 2b 3a 52 48 5b 23 94 |..... .w.+:RH[#.| +peer1.org1.example.com | [1885 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1740 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1606 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 07 47 1b eb ae 8c ef cc b3 2a b7 |0D. ..G.......*.| +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +peer0.org2.example.com | 00000030 3b 5f 4e 9d b5 75 1f 0a c2 19 48 07 6b 1d fc 3f |;_N..u....H.k..?| +peer1.org1.example.com | [1886 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1741 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 85 23 60 3f dd c5 53 d9 70 81 27 1a 7e c5 c3 9b |.#`?..S.p.'.~...| +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | 00000040 45 f8 b1 39 67 7f |E..9g.| +peer1.org1.example.com | [1887 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | [1742 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 b0 48 5d 89 02 20 36 63 a8 de 99 74 6e 28 f5 da |.H].. 6c...tn(..| +orderer0.example.com | "2020-05-20 18:21:38.383 UTC [cauthdsl] func1 -> DEBU 19ef 0xc000ae89d0 gate 1589998898383703500 evaluation starts" +peer0.org2.example.com | [1759 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1743 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 11 23 58 53 d6 3d bb f4 ba 39 3d 3e 62 07 4c bb |.#XS.=...9=>b.L.| +orderer0.example.com | "2020-05-20 18:21:38.383 UTC [cauthdsl] func2 -> DEBU 19f0 0xc000ae89d0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [175a 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1888 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | [1744 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 6c ff dd 51 f8 db |l..Q..| +orderer0.example.com | "2020-05-20 18:21:38.384 UTC [cauthdsl] func2 -> DEBU 19f1 0xc000ae89d0 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [175b 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | [1745 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1607 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:38.384 UTC [cauthdsl] func2 -> DEBU 19f2 0xc000ae89d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org2.example.com | [175c 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | [1746 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1608 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 gate 1589998828692826400 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:38.384 UTC [cauthdsl] func2 -> DEBU 19f3 0xc000ae89d0 principal evaluation fails" +peer0.org2.example.com | [175d 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | [1747 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1609 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:38.384 UTC [cauthdsl] func1 -> DEBU 19f4 0xc000ae89d0 gate 1589998898383703500 evaluation fails" +peer0.org2.example.com | [175e 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1748 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [160a 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:38.384 UTC [policies] Evaluate -> DEBU 19f5 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [175f 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1889 05-20 18:20:39.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [1749 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [160b 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:38.385 UTC [policies] Evaluate -> DEBU 19f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [1760 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [174a 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [160c 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:38.385 UTC [policies] Evaluate -> DEBU 19f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org2.example.com | [1761 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [188a 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | [174b 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [160d 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:38.385 UTC [cauthdsl] func1 -> DEBU 19f8 0xc000ae9cb0 gate 1589998898385380100 evaluation starts" +peer0.org2.example.com | [1762 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | [174c 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [160e 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-05-20 18:21:38.385 UTC [cauthdsl] func2 -> DEBU 19f9 0xc000ae9cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1763 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | [174d 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [160f 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:38.385 UTC [cauthdsl] func2 -> DEBU 19fa 0xc000ae9cb0 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [1764 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | [174e 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1610 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:38.385 UTC [cauthdsl] func2 -> DEBU 19fb 0xc000ae9cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org2.example.com | [1765 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [174f 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1612 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:38.386 UTC [cauthdsl] func2 -> DEBU 19fc 0xc000ae9cb0 principal evaluation fails" +peer0.org2.example.com | [1766 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [188b 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1750 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1613 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.386 UTC [cauthdsl] func1 -> DEBU 19fd 0xc000ae9cb0 gate 1589998898385380100 evaluation fails" +peer0.org2.example.com | [1767 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [188c 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1751 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1614 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.386 UTC [policies] Evaluate -> DEBU 19fe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [1768 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" secret_envelope: > alive: +peer1.org1.example.com | [188d 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1752 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1615 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.386 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [1769 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [188e 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1753 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1616 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +orderer0.example.com | "2020-05-20 18:21:38.386 UTC [policies] Evaluate -> DEBU 1a00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org2.example.com | [176a 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [188f 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1754 05-20 18:20:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1617 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.387 UTC [cauthdsl] func1 -> DEBU 1a01 0xc0011fe510 gate 1589998898387239600 evaluation starts" +peer0.org2.example.com | [176b 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1890 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1755 05-20 18:20:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1618 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:38.387 UTC [cauthdsl] func2 -> DEBU 1a02 0xc0011fe510 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [176c 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1891 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1756 05-20 18:20:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1619 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.387 UTC [cauthdsl] func2 -> DEBU 1a03 0xc0011fe510 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [176d 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1892 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1757 05-20 18:20:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [161a 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.387 UTC [cauthdsl] func2 -> DEBU 1a04 0xc0011fe510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org2.example.com | [176e 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | [1893 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49630 gate 1589998839905767500 evaluation starts +peer1.org2.example.com | [1758 05-20 18:20:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:38.387 UTC [cauthdsl] func2 -> DEBU 1a05 0xc0011fe510 principal evaluation fails" +peer0.org1.example.com | [161b 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [176f 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1894 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49630 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1759 05-20 18:20:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.388 UTC [cauthdsl] func1 -> DEBU 1a06 0xc0011fe510 gate 1589998898387239600 evaluation fails" +peer0.org1.example.com | [161d 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1770 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1895 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49630 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [175a 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:38.388 UTC [policies] Evaluate -> DEBU 1a07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [161c 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1771 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1896 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49630 principal matched by identity 0 +peer1.org2.example.com | [175b 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.388 UTC [policies] Evaluate -> DEBU 1a08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [161e 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1772 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1897 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | [175c 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:38.388 UTC [policies] func1 -> DEBU 1a09 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer0.org1.example.com | [1621 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1773 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [175d 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-05-20 18:21:38.388 UTC [policies] Evaluate -> DEBU 1a0a Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [1622 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1774 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1898 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | [175e 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 df 24 11 a4 32 62 18 97 72 4a 73 00 e0 3b 5d |8.$..2b..rJs..;]| +orderer0.example.com | "2020-05-20 18:21:38.389 UTC [policies] Evaluate -> DEBU 1a0b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [161f 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:b\007L\273l\377\335Q\370\333" > alive: alive: +peer0.org2.example.com | [1775 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000010 d4 e9 c7 ac d4 51 f0 d9 69 4b 06 d0 8a 16 d4 ff |.....Q..iK......| +orderer0.example.com | "2020-05-20 18:21:38.389 UTC [policies] Evaluate -> DEBU 1a0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [1620 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1776 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | [175f 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 57 8a 43 f9 8b 9e 3b 58 86 ab 11 |0D. MW.C...;X...| +orderer0.example.com | "2020-05-20 18:21:38.389 UTC [policies] Evaluate -> DEBU 1a0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [1611 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1777 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000010 e6 aa 4f 20 88 b1 98 1f 02 ec 52 ab 7d 91 48 6b |..O ......R.}.Hk| +orderer0.example.com | "2020-05-20 18:21:38.390 UTC [policies] Evaluate -> DEBU 1a0e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [1623 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1624 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1625 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1626 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1627 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 b6 78 5b 93 02 20 31 52 31 51 f6 37 10 5e 17 9f |.x[.. 1R1Q.7.^..| +peer0.org2.example.com | [1778 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:38.390 UTC [cauthdsl] func1 -> DEBU 1a0f 0xc0011ff220 gate 1589998898390370500 evaluation starts" +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | 00000030 9c 00 63 fc 5d ec 7a 00 5d 32 4c 73 23 6e fd d2 |..c.].z.]2Ls#n..| +peer0.org2.example.com | [1779 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.390 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0011ff220 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1899 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49630 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1628 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 ab bd e1 98 8b 4d |.....M| +orderer0.example.com | "2020-05-20 18:21:38.390 UTC [cauthdsl] func2 -> DEBU 1a11 0xc0011ff220 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [189a 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49630 gate 1589998839905767500 evaluation succeeds +peer0.org1.example.com | [1629 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [177a 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1760 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:38.390 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1a12 Checking if identity satisfies MEMBER role for OrdererMSP" +peer1.org1.example.com | [189b 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [162a 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [177b 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1761 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.391 UTC [msp] Validate -> DEBU 1a13 MSP OrdererMSP validating identity" +peer1.org1.example.com | [189c 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [162b 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [177c 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1762 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:38.391 UTC [msp] getCertificationChain -> DEBU 1a14 MSP OrdererMSP getting certification chain" +peer1.org1.example.com | [189d 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [162c 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 gate 1589998828760325200 evaluation starts +peer0.org2.example.com | [177d 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1763 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.392 UTC [cauthdsl] func2 -> DEBU 1a15 0xc0011ff220 principal matched by identity 0" +peer1.org1.example.com | [189e 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [177e 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040092e0 gate 1589998828900940100 evaluation starts +peer0.org1.example.com | [162d 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1764 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [189f 05-20 18:20:39.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.392 UTC [msp.identity] Verify -> DEBU 1a16 Verify: digest = 00000000 d4 2a e5 28 4f 8c a1 fd b9 f4 95 f1 02 72 64 90 |.*.(O........rd.| +peer0.org2.example.com | [177f 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040092e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [162e 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1765 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18a0 05-20 18:20:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 4e a4 3c 7e 3d c6 aa 4c bf e6 af 9c 59 8b 14 b3 |N.<~=..L....Y...|" +peer0.org2.example.com | [1780 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040092e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [162f 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 principal matched by identity 0 +peer1.org2.example.com | [1766 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18a1 05-20 18:20:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:38.392 UTC [msp.identity] Verify -> DEBU 1a17 Verify: sig = 00000000 30 44 02 20 0e ec 39 c9 5e 84 0b 7d 1a aa d5 1c |0D. ..9.^..}....| +peer0.org2.example.com | [1781 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040092e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1630 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 5e 22 63 2e 10 12 65 2c a2 fa 9a 28 3e 33 3c |'^"c...e,...(>3<| +peer1.org2.example.com | [1767 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +orderer0.example.com | 00000010 bc 34 b0 e4 a0 36 f6 f7 e2 ba 35 97 c7 e1 f7 09 |.4...6....5.....| +peer0.org2.example.com | [1782 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040092e0 principal evaluation fails +peer0.org1.example.com | 00000010 b8 d6 e4 c1 89 60 b0 de bb bd 6d ef 35 08 3c 88 |.....`....m.5.<.| +peer1.org2.example.com | [1768 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18a2 05-20 18:20:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | 00000020 1e 76 07 23 02 20 2c e9 a1 56 fc 27 7b ce 4f 43 |.v.#. ,..V.'{.OC| +peer0.org2.example.com | [1783 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040092e0 gate 1589998828900940100 evaluation fails +peer0.org1.example.com | [1631 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 87 19 6c 50 2a 4f 0d e8 d0 e6 14 |0D. (..lP*O.....| +peer1.org2.example.com | [1769 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | 00000030 e9 44 0c a9 cf 90 60 79 8b bc ed 39 61 69 9a 67 |.D....`y...9ai.g| +peer0.org2.example.com | [1784 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 d9 dd b8 a8 16 37 11 41 d3 0f bc 1a 4f d8 b9 40 |.....7.A....O..@| +peer1.org2.example.com | [176a 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | 00000040 16 61 b9 d6 68 b7 |.a..h.|" +peer0.org2.example.com | [1785 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 96 0c ad f0 02 20 3d 26 43 81 f5 37 df e4 5e 05 |..... =&C..7..^.| +peer1.org2.example.com | [176b 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:38.392 UTC [cauthdsl] func2 -> DEBU 1a18 0xc0011ff220 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [1786 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 f7 49 ab c2 13 57 6e 8f 38 64 8b 1c 9b 0c 74 fa |.I...Wn.8d....t.| +peer1.org2.example.com | [176c 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | "2020-05-20 18:21:38.392 UTC [cauthdsl] func1 -> DEBU 1a19 0xc0011ff220 gate 1589998898390370500 evaluation succeeds" +peer0.org2.example.com | [1787 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009850 gate 1589998828901464500 evaluation starts +peer0.org1.example.com | 00000040 36 67 2c ed 73 95 |6g,.s.| +peer1.org2.example.com | [176d 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [18a3 05-20 18:20:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +orderer0.example.com | "2020-05-20 18:21:38.392 UTC [policies] Evaluate -> DEBU 1a1a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1788 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1632 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [176e 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +orderer0.example.com | "2020-05-20 18:21:38.392 UTC [policies] Evaluate -> DEBU 1a1b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1789 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009850 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1633 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 gate 1589998828760325200 evaluation succeeds +peer1.org2.example.com | [176f 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18a4 05-20 18:20:39.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +orderer0.example.com | "2020-05-20 18:21:38.392 UTC [policies] Evaluate -> DEBU 1a1c Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [178a 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009850 principal matched by identity 0 +peer0.org1.example.com | [1634 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1770 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +orderer0.example.com | "2020-05-20 18:21:38.393 UTC [policies] Evaluate -> DEBU 1a1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [178b 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +peer0.org1.example.com | [1635 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1771 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +orderer0.example.com | "2020-05-20 18:21:38.393 UTC [policies] Evaluate -> DEBU 1a1e Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +peer0.org1.example.com | [1636 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1772 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +orderer0.example.com | "2020-05-20 18:21:38.393 UTC [policies] Evaluate -> DEBU 1a1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [178c 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +peer0.org1.example.com | [1637 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1773 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +orderer0.example.com | "2020-05-20 18:21:38.393 UTC [common.deliver] deliverBlocks -> DEBU 1a20 [channel: businesschannel] Received seekInfo (0xc000310840) start: > stop: > from 172.18.0.9:53664" +peer0.org2.example.com | 00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +peer0.org1.example.com | [1638 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1774 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610081801 +peer1.org1.example.com | [18a5 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.394 UTC [fsblkstorage] Next -> DEBU 1a21 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | 00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +peer0.org1.example.com | [1639 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1775 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 14ED6366FF08973139D2E31F70EAF8C7438F623A4F2B18557587738233480B71 +peer1.org1.example.com | [18a6 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.394 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a22 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +peer0.org2.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +peer0.org1.example.com | [163a 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1776 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org1.example.com | [18a7 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:38.394 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a23 Remaining bytes=[41179], Going to peek [8] bytes" +peer0.org2.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +peer0.org1.example.com | [163b 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1777 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18a8 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.394 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a24 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +peer0.org2.example.com | [178d 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [163c 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1778 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18a9 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.394 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a25 blockbytes [41176] read from file [0]" +peer0.org2.example.com | [178e 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009850 gate 1589998828901464500 evaluation succeeds +peer0.org1.example.com | [163d 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1779 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18aa 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:38.394 UTC [common.deliver] deliverBlocks -> DEBU 1a26 [channel: businesschannel] Delivering block [6] for (0xc000310840) for 172.18.0.9:53664" +peer0.org2.example.com | [178f 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [163e 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [163f 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [177a 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.395 UTC [common.deliver] deliverBlocks -> DEBU 1a27 [channel: businesschannel] Done delivering to 172.18.0.9:53664 for (0xc000310840)" +peer0.org2.example.com | [1790 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1640 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [177b 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [18ab 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:38.395 UTC [common.deliver] Handle -> DEBU 1a28 Waiting for new SeekInfo from 172.18.0.9:53664" +peer0.org2.example.com | [1791 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1641 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [177c 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18ac 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:38.395 UTC [common.deliver] Handle -> DEBU 1a29 Attempting to read seek info message from 172.18.0.9:53664" +peer0.org2.example.com | [1792 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1643 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [177d 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18ad 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86390 gate 1589998839923071600 evaluation starts +orderer0.example.com | "2020-05-20 18:21:38.399 UTC [grpc] infof -> DEBU 1a2a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [1793 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1644 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [177e 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [18ae 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86390 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:38.400 UTC [common.deliver] Handle -> WARN 1a2b Error reading from 172.18.0.9:53664: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [1794 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1646 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [177f 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18af 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86390 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:38.400 UTC [orderer.common.server] func1 -> DEBU 1a2c Closing Deliver stream" +peer0.org2.example.com | [1795 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1647 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1780 05-20 18:20:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [18b0 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86390 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:38.400 UTC [comm.grpc.server] 1 -> INFO 1a2d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53664 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8451ms +peer0.org2.example.com | [1796 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1648 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1781 05-20 18:20:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [18b1 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +orderer0.example.com | "2020-05-20 18:21:38.550 UTC [orderer.common.server] Deliver -> DEBU 1a2e Starting new Deliver handler" +peer0.org2.example.com | [1797 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership +peer0.org1.example.com | [1649 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1782 05-20 18:20:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +orderer0.example.com | "2020-05-20 18:21:38.550 UTC [common.deliver] Handle -> DEBU 1a2f Starting new deliver loop for 172.18.0.9:53666" +peer0.org2.example.com | [1798 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1645 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1783 05-20 18:20:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [18b2 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +orderer0.example.com | "2020-05-20 18:21:38.550 UTC [common.deliver] Handle -> DEBU 1a30 Attempting to read seek info message from 172.18.0.9:53666" +peer0.org2.example.com | [1799 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1642 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1784 05-20 18:20:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +orderer0.example.com | "2020-05-20 18:21:38.552 UTC [policies] Evaluate -> DEBU 1a31 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [179a 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [164a 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1785 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +orderer0.example.com | "2020-05-20 18:21:38.553 UTC [policies] Evaluate -> DEBU 1a32 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [179b 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | [164b 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1786 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +orderer0.example.com | "2020-05-20 18:21:38.553 UTC [policies] Evaluate -> DEBU 1a33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org2.example.com | [179c 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [164c 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1787 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +orderer0.example.com | "2020-05-20 18:21:38.553 UTC [policies] Evaluate -> DEBU 1a34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [179d 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [164d 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1788 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18b3 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86390 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:38.554 UTC [policies] Evaluate -> DEBU 1a35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org2.example.com | [179e 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [164f 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1789 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18b4 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86390 gate 1589998839923071600 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:38.554 UTC [cauthdsl] func1 -> DEBU 1a36 0xc001247e40 gate 1589998898554206000 evaluation starts" +peer0.org2.example.com | [179f 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1650 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [178a 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18b5 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:38.554 UTC [cauthdsl] func2 -> DEBU 1a37 0xc001247e40 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [17a0 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive: alive:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > alive: +peer0.org1.example.com | [164e 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [178b 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18b6 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:38.555 UTC [cauthdsl] func2 -> DEBU 1a38 0xc001247e40 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [17a1 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1652 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [178c 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18b7 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:38.555 UTC [cauthdsl] func2 -> DEBU 1a39 0xc001247e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org2.example.com | [17a2 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1651 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [18b8 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [178d 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | "2020-05-20 18:21:38.555 UTC [cauthdsl] func2 -> DEBU 1a3a 0xc001247e40 principal evaluation fails" +peer0.org2.example.com | [17a3 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org1.example.com | [1653 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18b9 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [178e 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17a4 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org1.example.com | [1654 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18ba 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.555 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc001247e40 gate 1589998898554206000 evaluation fails" +peer1.org2.example.com | [178f 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a5 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org1.example.com | [1655 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [18bb 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:38.556 UTC [policies] Evaluate -> DEBU 1a3c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [1790 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a6 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [1656 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [18bc 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.556 UTC [policies] Evaluate -> DEBU 1a3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:38.556 UTC [policies] Evaluate -> DEBU 1a3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org2.example.com | [17a7 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 62 8a 2a c9 88 4c aa 03 98 c8 0f 17 7e 7e 1d |.b.*..L......~~.| +peer0.org1.example.com | [1657 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [18bd 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18be 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1791 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | 00000010 29 11 ec 20 55 99 d3 6b 3b 8f 2d 31 57 9a ac fd |).. U..k;.-1W...| +peer0.org1.example.com | [1658 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [18bf 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:38.556 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc000cc6680 gate 1589998898556580000 evaluation starts" +peer1.org2.example.com | [1792 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [17a8 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 02 7c 40 8f 50 cb 7e ff c4 b4 |0E.!...|@.P.~...| +peer0.org1.example.com | [1659 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [18c0 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:38.556 UTC [cauthdsl] func2 -> DEBU 1a40 0xc000cc6680 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1793 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [165b 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | 00000010 9e b5 ee c3 47 42 bf ba cc 62 4e 3b 27 ed 94 a6 |....GB...bN;'...| +peer1.org1.example.com | [18c1 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87590 gate 1589998839927766500 evaluation starts +orderer0.example.com | "2020-05-20 18:21:38.557 UTC [cauthdsl] func2 -> DEBU 1a41 0xc000cc6680 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [1794 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [165a 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [165c 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 fe 9b a7 d2 00 02 20 41 c5 39 11 02 01 4a a4 71 |...... A.9...J.q| +orderer0.example.com | "2020-05-20 18:21:38.557 UTC [cauthdsl] func2 -> DEBU 1a42 0xc000cc6680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [1795 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [165e 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 b1 5e e6 22 c2 18 ea eb 64 b4 0c e3 99 ca b9 17 |.^."....d.......| +peer1.org1.example.com | [18c2 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1796 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [165f 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 03 09 fe e6 a6 e2 5f |......_| +peer1.org1.example.com | [18c3 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87590 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:38.557 UTC [cauthdsl] func2 -> DEBU 1a43 0xc000cc6680 principal evaluation fails" +peer1.org2.example.com | [1797 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [165d 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [17a9 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c4 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87590 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:38.557 UTC [cauthdsl] func1 -> DEBU 1a44 0xc000cc6680 gate 1589998898556580000 evaluation fails" +peer1.org2.example.com | [1798 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1660 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17aa 05-20 18:20:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18c5 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +orderer0.example.com | "2020-05-20 18:21:38.557 UTC [policies] Evaluate -> DEBU 1a45 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1799 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1661 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [17ab 05-20 18:20:31.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +orderer0.example.com | "2020-05-20 18:21:38.557 UTC [policies] Evaluate -> DEBU 1a46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [179a 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1662 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [17ac 05-20 18:20:31.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer1.org1.example.com | [18c6 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +orderer0.example.com | "2020-05-20 18:21:38.558 UTC [policies] Evaluate -> DEBU 1a47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | [179b 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1663 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [17ad 05-20 18:20:31.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +orderer0.example.com | "2020-05-20 18:21:38.558 UTC [cauthdsl] func1 -> DEBU 1a48 0xc000cc6ec0 gate 1589998898558473600 evaluation starts" +peer1.org2.example.com | [179c 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1664 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17ae 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 1a49 0xc000cc6ec0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:38.558 UTC [cauthdsl] func2 -> DEBU 1a4a 0xc000cc6ec0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:38.559 UTC [cauthdsl] func2 -> DEBU 1a4b 0xc000cc6ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [17af 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [179d 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.559 UTC [cauthdsl] func2 -> DEBU 1a4c 0xc000cc6ec0 principal evaluation fails" +peer0.org1.example.com | [1665 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [17b0 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [179e 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.559 UTC [cauthdsl] func1 -> DEBU 1a4d 0xc000cc6ec0 gate 1589998898558473600 evaluation fails" +peer0.org1.example.com | [1666 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c7 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87590 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [17b1 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [179f 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:38.559 UTC [policies] Evaluate -> DEBU 1a4e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [1667 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c8 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87590 gate 1589998839927766500 evaluation succeeds +peer0.org2.example.com | [17b2 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17a1 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:38.559 UTC [policies] Evaluate -> DEBU 1a4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [1668 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17b3 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17a2 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [18c9 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:38.559 UTC [policies] func1 -> DEBU 1a50 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer0.org1.example.com | [1669 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [17b4 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17a3 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39800 gate 1589998836454386200 evaluation starts +peer1.org1.example.com | [18ca 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:38.560 UTC [policies] Evaluate -> DEBU 1a51 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [166a 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [17b5 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [17a0 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [18cb 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:38.560 UTC [policies] Evaluate -> DEBU 1a52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org2.example.com | [17b6 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [166b 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17a4 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39800 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18cc 05-20 18:20:39.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:38.560 UTC [policies] Evaluate -> DEBU 1a53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | [17b7 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [166c 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17a5 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39800 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [18cd 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.561 UTC [policies] Evaluate -> DEBU 1a54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [17b8 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [166d 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [17a6 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [18ce 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:38.561 UTC [policies] Evaluate -> DEBU 1a55 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [17b9 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [166e 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101B +peer1.org2.example.com | [17a7 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39800 principal evaluation fails +peer1.org1.example.com | [18cf 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.561 UTC [cauthdsl] func1 -> DEBU 1a56 0xc000cc7bb0 gate 1589998898561591800 evaluation starts" +peer0.org2.example.com | [17ba 05-20 18:20:32.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [166f 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BEB0EF21031B0F67697269EA79EDB88F236B5DF48E310AF4486E1A779F94219D +peer1.org2.example.com | [17a8 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39800 gate 1589998836454386200 evaluation fails +peer1.org1.example.com | [18d0 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.561 UTC [cauthdsl] func2 -> DEBU 1a57 0xc000cc7bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [17bb 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1670 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [17a9 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [18d1 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.562 UTC [cauthdsl] func2 -> DEBU 1a58 0xc000cc7bb0 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [17bc 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1671 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [17aa 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [18d2 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:38.562 UTC [cauthdsl] func2 -> DEBU 1a59 0xc000cc7bb0 principal matched by identity 0" +peer0.org2.example.com | [17bd 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1672 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [17ab 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [18d3 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.563 UTC [msp.identity] Verify -> DEBU 1a5a Verify: digest = 00000000 66 8a 42 53 2d 20 46 e1 ac 7a 07 b2 ef 90 4f 23 |f.BS- F..z....O#| +peer0.org2.example.com | [17be 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1673 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [17ac 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39d80 gate 1589998836458657800 evaluation starts +peer1.org1.example.com | [18d4 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000010 dc 8e 42 8c 0c 4c 5c cf 5b 3d 3e 3f 3e f3 d9 bf |..B..L\.[=>?>...|" +peer0.org2.example.com | [17bf 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1674 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17ad 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39d80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18d5 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:38.563 UTC [msp.identity] Verify -> DEBU 1a5b Verify: sig = 00000000 30 44 02 20 38 a9 bc 5c 69 28 7f b3 e9 b8 6b ad |0D. 8..\i(....k.| +peer0.org2.example.com | [17c0 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1675 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17ae 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39d80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [18d6 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | 00000010 ea 4c d0 f4 09 fb bc a6 23 42 6d 4f 48 23 f3 4c |.L......#BmOH#.L| +peer0.org2.example.com | [17c1 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1676 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17af 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39d80 principal matched by identity 0 +peer1.org1.example.com | [18d7 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | 00000020 99 28 76 1b 02 20 03 66 0f eb bb e3 c1 6b 07 35 |.(v.. .f.....k.5| +peer0.org2.example.com | [17c2 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1677 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18d8 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca9e0 gate 1589998839935183500 evaluation starts +peer1.org2.example.com | [17b0 05-20 18:20:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | 00000030 9f eb 71 2c 22 2f a0 ee b7 48 a2 3b 4b 06 0c 5b |..q,"/...H.;K..[| +peer0.org2.example.com | [17c3 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1678 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18d9 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +orderer0.example.com | 00000040 81 99 0e 9f 34 21 |....4!|" +peer0.org2.example.com | [17c4 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1679 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18da 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca9e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [17b1 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:38.563 UTC [cauthdsl] func2 -> DEBU 1a5c 0xc000cc7bb0 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [17c5 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [167a 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +peer1.org1.example.com | [18db 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca9e0 principal matched by identity 0 +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:38.563 UTC [cauthdsl] func1 -> DEBU 1a5d 0xc000cc7bb0 gate 1589998898561591800 evaluation succeeds" +peer0.org2.example.com | [17c6 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [167b 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18dc 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:21:38.563 UTC [policies] Evaluate -> DEBU 1a5e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [17c7 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [167c 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a5f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [17c8 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [167d 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [18dd 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | "2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a60 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [17c9 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [167e 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | [17b2 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39d80 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [17ca 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | [167f 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | [17b3 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39d80 gate 1589998836458657800 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a62 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1680 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | [17b4 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [17cb 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | [1681 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [17b5 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:38.565 UTC [common.deliver] deliverBlocks -> DEBU 1a64 [channel: businesschannel] Received seekInfo (0xc0003110c0) start: > stop: > from 172.18.0.9:53666" +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | [1682 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [18de 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca9e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [17b6 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:38.565 UTC [fsblkstorage] Next -> DEBU 1a65 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | [1683 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [18df 05-20 18:20:39.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca9e0 gate 1589998839935183500 evaluation succeeds +peer1.org2.example.com | [17b7 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:38.565 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a66 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [1684 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [18e0 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17b8 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a67 Remaining bytes=[41179], Going to peek [8] bytes" +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1685 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +peer1.org1.example.com | [18e1 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17b9 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:38.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a68 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +peer0.org2.example.com | [17cc 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1686 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 gate 1589998828840117400 evaluation starts +peer1.org1.example.com | [18e2 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [17ba 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:38.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a69 blockbytes [41176] read from file [0]" +peer0.org2.example.com | [17cd 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1687 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18e3 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [17bb 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.566 UTC [common.deliver] deliverBlocks -> DEBU 1a6a [channel: businesschannel] Delivering block [6] for (0xc0003110c0) for 172.18.0.9:53666" +peer0.org2.example.com | [17ce 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1688 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [18e4 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | [17bc 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:38.566 UTC [common.deliver] deliverBlocks -> DEBU 1a6b [channel: businesschannel] Done delivering to 172.18.0.9:53666 for (0xc0003110c0)" +peer0.org2.example.com | [17cf 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [168a 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [17bd 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:38.570 UTC [common.deliver] Handle -> DEBU 1a6c Waiting for new SeekInfo from 172.18.0.9:53666" +peer0.org2.example.com | [17d0 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [168b 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18e5 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | [17be 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:38.570 UTC [common.deliver] Handle -> DEBU 1a6d Attempting to read seek info message from 172.18.0.9:53666" +peer0.org2.example.com | [17d1 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [168c 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 principal matched by identity 0 +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | [17bf 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:38.573 UTC [grpc] infof -> DEBU 1a6e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [17d2 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [168d 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 d4 03 95 0b 28 3c 00 86 94 c3 1d ef b2 33 b4 |W....(<.......3.| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | [17c0 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ef80 gate 1589998836464594900 evaluation starts +orderer0.example.com | "2020-05-20 18:21:38.573 UTC [common.deliver] Handle -> WARN 1a6f Error reading from 172.18.0.9:53666: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [17d3 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 39 a0 29 39 9e b2 1b d2 b1 f6 4b da 0a 82 db de |9.)9......K.....| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | [17c1 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ef80 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:38.573 UTC [orderer.common.server] func1 -> DEBU 1a70 Closing Deliver stream" +peer0.org2.example.com | [17d4 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084180 gate 1589998832264684200 evaluation starts +peer0.org1.example.com | [168f 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 de 89 ad cc 1a 7d 8b ab 4b 1a |0E.!.......}..K.| +peer0.org1.example.com | 00000010 84 34 4c 8d 59 e5 b7 84 cd 7c 4b f7 3f 0c 36 64 |.4L.Y....|K.?.6d| +peer0.org1.example.com | 00000020 2b 9d 5f d8 a6 02 20 3d b9 e5 68 dc da 42 7a 74 |+._... =..h..Bzt| +peer1.org2.example.com | [17c2 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ef80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [17d5 05-20 18:20:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084180 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 58 39 5b ad a9 ad ac d6 e6 2e eb c8 56 24 f5 ff |X9[.........V$..| +orderer0.example.com | "2020-05-20 18:21:38.573 UTC [comm.grpc.server] 1 -> INFO 1a71 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53666 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.2213ms +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [17c3 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ef80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [17d6 05-20 18:20:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084180 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000040 f5 85 8c fa cc 84 c6 |.......| +orderer0.example.com | "2020-05-20 18:21:38.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a72 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [18e6 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17c4 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ef80 principal evaluation fails +peer0.org2.example.com | [17d7 05-20 18:20:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1690 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:38.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a73 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +peer1.org1.example.com | [18e7 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17c5 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ef80 gate 1589998836464594900 evaluation fails +peer0.org2.example.com | [17d8 05-20 18:20:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084180 principal evaluation fails +peer0.org1.example.com | [168e 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +orderer0.example.com | "2020-05-20 18:21:38.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a74 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +peer1.org1.example.com | [18e8 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [17c6 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [17d9 05-20 18:20:32.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084180 gate 1589998832264684200 evaluation fails +orderer0.example.com | "2020-05-20 18:21:38.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a75 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +peer1.org1.example.com | [18e9 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17c7 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [17da 05-20 18:20:32.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1689 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:38.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a76 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +peer1.org1.example.com | [18ea 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17c8 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [17db 05-20 18:20:32.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1691 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 gate 1589998828840117400 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:38.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +peer1.org1.example.com | [18eb 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [17c9 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6f4f0 gate 1589998836464933300 evaluation starts +peer0.org2.example.com | [17dc 05-20 18:20:32.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1692 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:38.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262.8µs " +peer1.org1.example.com | [18ec 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [17ca 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6f4f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [17dd 05-20 18:20:32.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040846f0 gate 1589998832319363300 evaluation starts +peer0.org1.example.com | [1693 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +orderer0.example.com | "2020-05-20 18:21:38.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a79 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [18ed 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [17cb 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6f4f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [17de 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040846f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1695 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:38.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [18ee 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be82d0 gate 1589998839944887500 evaluation starts +peer1.org2.example.com | [17cc 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6f4f0 principal matched by identity 0 +peer0.org2.example.com | [17df 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040846f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1694 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.105 UTC [orderer.common.server] Deliver -> DEBU 1a7b Starting new Deliver handler" +peer1.org1.example.com | [18ef 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be82d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17cd 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | [17e0 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040846f0 principal matched by identity 0 +peer0.org1.example.com | [1696 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.105 UTC [common.deliver] Handle -> DEBU 1a7c Starting new deliver loop for 172.18.0.9:53668" +peer1.org1.example.com | [18f0 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be82d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [17e1 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | [1697 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.105 UTC [common.deliver] Handle -> DEBU 1a7d Attempting to read seek info message from 172.18.0.9:53668" +peer1.org1.example.com | [18f1 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be82d0 principal matched by identity 0 +peer1.org2.example.com | [17ce 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1698 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.107 UTC [policies] Evaluate -> DEBU 1a7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [18f2 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | [17e2 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | [1699 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:39.107 UTC [policies] Evaluate -> DEBU 1a7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | [169a 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:39.108 UTC [policies] Evaluate -> DEBU 1a80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org1.example.com | [18f3 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | [169b 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.108 UTC [policies] Evaluate -> DEBU 1a81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | [169c 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-05-20 18:21:39.108 UTC [policies] Evaluate -> DEBU 1a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003f6f4f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [169d 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:39.109 UTC [cauthdsl] func1 -> DEBU 1a83 0xc000d229c0 gate 1589998899109074600 evaluation starts" +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org2.example.com | [17d0 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6f4f0 gate 1589998836464933300 evaluation succeeds +peer0.org2.example.com | [17e3 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040846f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [169e 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:39.109 UTC [cauthdsl] func2 -> DEBU 1a84 0xc000d229c0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org1.example.com | [18f4 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be82d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [17d1 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [169f 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:39.109 UTC [cauthdsl] func2 -> DEBU 1a85 0xc000d229c0 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [18f5 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be82d0 gate 1589998839944887500 evaluation succeeds +peer0.org2.example.com | [17e4 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040846f0 gate 1589998832319363300 evaluation succeeds +peer1.org2.example.com | [17d2 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [16a0 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.110 UTC [cauthdsl] func2 -> DEBU 1a86 0xc000d229c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org1.example.com | [18f6 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [17e5 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17d3 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [16a1 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.110 UTC [cauthdsl] func2 -> DEBU 1a87 0xc000d229c0 principal evaluation fails" +peer1.org1.example.com | [18f7 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [17e6 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17d4 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [16a2 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.111 UTC [cauthdsl] func1 -> DEBU 1a88 0xc000d229c0 gate 1589998899109074600 evaluation fails" +peer1.org1.example.com | [18f8 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [17e7 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [17d5 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | [16a3 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.111 UTC [policies] Evaluate -> DEBU 1a89 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [18f9 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [17e8 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [16a4 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.112 UTC [policies] Evaluate -> DEBU 1a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [18fa 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | [17e9 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | [17d6 05-20 18:20:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | [16a5 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.112 UTC [policies] Evaluate -> DEBU 1a8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | [16a6 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.112 UTC [cauthdsl] func1 -> DEBU 1a8c 0xc000d23200 gate 1589998899112846700 evaluation starts" +peer1.org1.example.com | [18fb 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | [17ea 05-20 18:20:32.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | [16a7 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.113 UTC [cauthdsl] func2 -> DEBU 1a8d 0xc000d23200 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [16a8 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.113 UTC [cauthdsl] func2 -> DEBU 1a8e 0xc000d23200 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:39.113 UTC [cauthdsl] func2 -> DEBU 1a8f 0xc000d23200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.113 UTC [cauthdsl] func2 -> DEBU 1a90 0xc000d23200 principal evaluation fails" +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | [16aa 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.114 UTC [cauthdsl] func1 -> DEBU 1a91 0xc000d23200 gate 1589998899112846700 evaluation fails" +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org2.example.com | [17d7 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | [16ab 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.114 UTC [policies] Evaluate -> DEBU 1a92 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [17eb 05-20 18:20:32.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [16ac 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.114 UTC [policies] Evaluate -> DEBU 1a93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [17ec 05-20 18:20:32.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17d8 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | [18fc 05-20 18:20:39.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16ad 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.115 UTC [policies] Evaluate -> DEBU 1a94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | [17ed 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [18fd 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [16ae 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.115 UTC [cauthdsl] func1 -> DEBU 1a95 0xc000d23a40 gate 1589998899115850700 evaluation starts" +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18fe 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [16af 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.116 UTC [cauthdsl] func2 -> DEBU 1a96 0xc000d23a40 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [17ef 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18ff 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16b0 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.116 UTC [cauthdsl] func2 -> DEBU 1a97 0xc000d23a40 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [17f0 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1900 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16b1 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.116 UTC [cauthdsl] func2 -> DEBU 1a98 0xc000d23a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org2.example.com | [17d9 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17f1 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1901 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16b2 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.116 UTC [cauthdsl] func2 -> DEBU 1a99 0xc000d23a40 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:39.117 UTC [cauthdsl] func1 -> DEBU 1a9a 0xc000d23a40 gate 1589998899115850700 evaluation fails" +peer1.org2.example.com | [17da 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1902 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16b3 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17db 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1903 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.117 UTC [policies] Evaluate -> DEBU 1a9b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [16b4 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [17f2 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [17dc 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1904 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.117 UTC [policies] Evaluate -> DEBU 1a9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [16b5 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [17f3 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085fe0 gate 1589998832443459000 evaluation starts +peer1.org2.example.com | [17dd 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1905 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.117 UTC [policies] func1 -> DEBU 1a9d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +peer0.org1.example.com | [16b6 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [17f4 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17de 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1906 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1a9e Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [16b7 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17f5 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085fe0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [17df 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1907 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1a9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [16b8 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17f6 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [17e0 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1908 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16b9 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17f7 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085fe0 principal evaluation fails +peer1.org2.example.com | [17e1 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1909 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [16ba 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17f8 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085fe0 gate 1589998832443459000 evaluation fails +peer1.org2.example.com | [17e2 05-20 18:20:36.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [190a 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [16bb 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17f9 05-20 18:20:32.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17e3 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:39.119 UTC [cauthdsl] func1 -> DEBU 1aa3 0xc000d56730 gate 1589998899119244600 evaluation starts" +peer1.org1.example.com | [190b 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [16bc 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17fa 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17e4 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85720 gate 1589998836480578900 evaluation starts +orderer0.example.com | "2020-05-20 18:21:39.119 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc000d56730 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [190c 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [16bd 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [17fb 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [17e5 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85720 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:39.119 UTC [cauthdsl] func2 -> DEBU 1aa5 0xc000d56730 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [190e 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16be 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17fc 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a550 gate 1589998832471678900 evaluation starts +peer1.org2.example.com | [17e6 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85720 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [190d 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.119 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000d56730 principal matched by identity 0" +peer0.org1.example.com | [16bf 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [17fd 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17e7 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [190f 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-05-20 18:21:39.120 UTC [msp.identity] Verify -> DEBU 1aa7 Verify: digest = 00000000 7f ab a1 74 a4 35 a1 e1 80 ac f8 a8 e6 60 48 ea |...t.5.......`H.| +peer0.org1.example.com | [16c0 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [17fe 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a550 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [17e8 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85720 principal evaluation fails +peer1.org1.example.com | [1910 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | 00000010 87 a3 5a c0 bc 23 66 6f f1 6f 5a 8f 47 f6 38 d2 |..Z..#fo.oZ.G.8.|" +peer0.org1.example.com | [16c1 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17ff 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a550 principal matched by identity 0 +peer1.org2.example.com | [17e9 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85720 gate 1589998836480578900 evaluation fails +peer1.org1.example.com | [1911 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.120 UTC [msp.identity] Verify -> DEBU 1aa8 Verify: sig = 00000000 30 44 02 20 55 71 03 de 31 05 bb 95 97 1a ee f8 |0D. Uq..1.......| +peer0.org1.example.com | [16c2 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1800 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [17ea 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1913 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 c8 f1 4a a7 7c cc 58 4e 84 40 35 cb ae 40 95 93 |..J.|.XN.@5..@..| +peer0.org1.example.com | [16c3 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [17eb 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1914 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 d4 f7 f9 71 02 20 4d 19 21 d3 e4 fc ca ed cc 33 |...q. M.!......3| +peer0.org1.example.com | [16c4 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1801 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | [17ec 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1915 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000030 1e b3 0e f8 4f 30 30 28 d2 57 71 42 52 cb e1 e5 |....O00(.WqBR...| +peer0.org1.example.com | [16c5 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | [17ed 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85c90 gate 1589998836484563600 evaluation starts +orderer0.example.com | 00000040 67 db 97 2d 0c 33 |g..-.3|" +peer0.org1.example.com | [16c6 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | [17ee 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85c90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1912 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000d56730 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [16c7 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1802 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a550 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1803 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a550 gate 1589998832471678900 evaluation succeeds +peer1.org1.example.com | [1916 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1917 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1918 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000d56730 gate 1589998899119244600 evaluation succeeds" +peer1.org1.example.com | [1919 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17ef 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85c90 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aab Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [16c8 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1804 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [191a 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17f0 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85c90 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [16c9 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1805 05-20 18:20:32.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [191b 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aad Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [17f1 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | [16ca 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1806 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [191c 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [16cb 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 gate 1589998828883038400 evaluation starts +peer0.org2.example.com | [1807 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aaf Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [191d 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17f2 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | [16cc 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1808 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1ab0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [191e 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | [16cd 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1809 05-20 18:20:32.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.121 UTC [common.deliver] deliverBlocks -> DEBU 1ab1 [channel: businesschannel] Received seekInfo (0xc000311f00) start: > stop: > from 172.18.0.9:53668" +peer1.org1.example.com | [191f 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | [16ce 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 principal matched by identity 0 +peer0.org2.example.com | [180a 05-20 18:20:32.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.122 UTC [fsblkstorage] Next -> DEBU 1ab2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org1.example.com | [1920 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | [16cf 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer0.org2.example.com | [180b 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.122 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ab3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +peer1.org1.example.com | [1921 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer0.org2.example.com | [180c 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab4 Remaining bytes=[41179], Going to peek [8] bytes" +peer1.org1.example.com | [1922 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [17f3 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85c90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [16d0 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +orderer0.example.com | "2020-05-20 18:21:39.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab5 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +peer0.org2.example.com | [180d 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1923 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17f4 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85c90 gate 1589998836484563600 evaluation succeeds +peer0.org1.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +orderer0.example.com | "2020-05-20 18:21:39.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab6 blockbytes [41176] read from file [0]" +peer0.org2.example.com | [180e 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1924 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17f5 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +orderer0.example.com | "2020-05-20 18:21:39.123 UTC [common.deliver] deliverBlocks -> DEBU 1ab7 [channel: businesschannel] Delivering block [6] for (0xc000311f00) for 172.18.0.9:53668" +peer0.org2.example.com | [180f 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1925 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [17f6 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +orderer0.example.com | "2020-05-20 18:21:39.123 UTC [common.deliver] deliverBlocks -> DEBU 1ab8 [channel: businesschannel] Done delivering to 172.18.0.9:53668 for (0xc000311f00)" +peer0.org2.example.com | [1810 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1926 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [17f7 05-20 18:20:36.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +orderer0.example.com | "2020-05-20 18:21:39.124 UTC [common.deliver] Handle -> DEBU 1ab9 Waiting for new SeekInfo from 172.18.0.9:53668" +peer0.org2.example.com | [1811 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1927 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f8 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [16d1 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:39.125 UTC [common.deliver] Handle -> DEBU 1aba Attempting to read seek info message from 172.18.0.9:53668" +peer0.org2.example.com | [1812 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1928 05-20 18:20:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [17f9 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16d2 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 gate 1589998828883038400 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:39.129 UTC [common.deliver] Handle -> WARN 1abb Error reading from 172.18.0.9:53668: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [1813 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409b9a0 gate 1589998832564645900 evaluation starts +peer1.org1.example.com | [1929 05-20 18:20:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [17fa 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16d3 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.129 UTC [orderer.common.server] func1 -> DEBU 1abc Closing Deliver stream" +peer0.org2.example.com | [1814 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409b9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [192a 05-20 18:20:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17fb 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [16d4 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.129 UTC [comm.grpc.server] 1 -> INFO 1abd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53668 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.4995ms +peer0.org2.example.com | [1815 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409b9a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [192b 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [17fc 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [16d5 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:39.130 UTC [grpc] infof -> DEBU 1abe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [1816 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409b9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [192c 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161025 +peer1.org2.example.com | [17fd 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [16d6 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:39.309 UTC [orderer.common.server] Deliver -> DEBU 1abf Starting new Deliver handler" +peer0.org2.example.com | [1817 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409b9a0 principal evaluation fails +peer1.org1.example.com | [192d 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6B4E312D285CC9A750E66302B39654D4C7371E8D0F057D97E80F93DF3219AAA4 +peer1.org2.example.com | [17fe 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [16d7 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16d8 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [16d9 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1818 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409b9a0 gate 1589998832564645900 evaluation fails +peer1.org2.example.com | [17ff 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:39.310 UTC [common.deliver] Handle -> DEBU 1ac0 Starting new deliver loop for 172.18.0.9:53670" +peer0.org2.example.com | [1819 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [192e 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1800 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1801 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa4e90 gate 1589998836497145800 evaluation starts +orderer0.example.com | "2020-05-20 18:21:39.310 UTC [common.deliver] Handle -> DEBU 1ac1 Attempting to read seek info message from 172.18.0.9:53670" +peer0.org2.example.com | [181a 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [192f 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [16da 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1802 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa4e90 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:39.312 UTC [policies] Evaluate -> DEBU 1ac2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [181b 05-20 18:20:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1930 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [16db 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1803 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa4e90 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:39.313 UTC [policies] Evaluate -> DEBU 1ac3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [181c 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bf10 gate 1589998832570366700 evaluation starts +peer1.org1.example.com | [1931 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [16dc 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1804 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa4e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-05-20 18:21:39.313 UTC [policies] Evaluate -> DEBU 1ac4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org2.example.com | [181d 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bf10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1932 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16dd 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1805 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa4e90 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:39.313 UTC [policies] Evaluate -> DEBU 1ac5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [181e 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bf10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1933 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [16de 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1806 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa4e90 gate 1589998836497145800 evaluation fails +orderer0.example.com | "2020-05-20 18:21:39.314 UTC [policies] Evaluate -> DEBU 1ac6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org2.example.com | [181f 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bf10 principal matched by identity 0 +peer1.org1.example.com | [1934 05-20 18:20:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16df 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [1807 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.314 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc000daff90 gate 1589998899314515900 evaluation starts" +peer0.org2.example.com | [1820 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | [1935 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e0 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1808 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.314 UTC [cauthdsl] func2 -> DEBU 1ac8 0xc000daff90 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1936 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e1 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1809 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:39.315 UTC [cauthdsl] func2 -> DEBU 1ac9 0xc000daff90 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [1821 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [1937 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [16e2 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [180a 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5400 gate 1589998836512064700 evaluation starts +orderer0.example.com | "2020-05-20 18:21:39.315 UTC [cauthdsl] func2 -> DEBU 1aca 0xc000daff90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | [1938 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e3 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [180b 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5400 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:39.316 UTC [cauthdsl] func2 -> DEBU 1acb 0xc000daff90 principal evaluation fails" +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | [1939 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e4 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [180c 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5400 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:39.316 UTC [cauthdsl] func1 -> DEBU 1acc 0xc000daff90 gate 1589998899314515900 evaluation fails" +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | [16e5 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [193a 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [180d 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5400 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:39.316 UTC [policies] Evaluate -> DEBU 1acd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [16e6 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [193b 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [180e 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:39.317 UTC [policies] Evaluate -> DEBU 1ace == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [1822 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bf10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [193c 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e7 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive: alive: alive: +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +orderer0.example.com | "2020-05-20 18:21:39.317 UTC [policies] Evaluate -> DEBU 1acf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org2.example.com | [1823 05-20 18:20:32.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bf10 gate 1589998832570366700 evaluation succeeds +peer1.org1.example.com | [193d 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e8 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [180f 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:39.317 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc000dc67d0 gate 1589998899317970200 evaluation starts" +peer0.org2.example.com | [1824 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [193e 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e9 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:39.318 UTC [cauthdsl] func2 -> DEBU 1ad1 0xc000dc67d0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1825 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [193f 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [16ea 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:21:39.318 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc000dc67d0 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [1826 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1940 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer0.org1.example.com | [16eb 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:39.319 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc000dc67d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org2.example.com | [1827 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer0.org1.example.com | [16ec 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | "2020-05-20 18:21:39.319 UTC [cauthdsl] func2 -> DEBU 1ad4 0xc000dc67d0 principal evaluation fails" +peer0.org2.example.com | [1828 05-20 18:20:32.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1942 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer0.org1.example.com | [16ed 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101C +peer1.org2.example.com | [1810 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5400 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:39.319 UTC [cauthdsl] func1 -> DEBU 1ad5 0xc000dc67d0 gate 1589998899317970200 evaluation fails" +peer0.org2.example.com | [1829 05-20 18:20:32.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer0.org1.example.com | [16ee 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 29540D67B2E81D744B7BCF63F269299A02D3DAF9670B301038F6325DDE44A9AD +peer1.org2.example.com | [1811 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5400 gate 1589998836512064700 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:39.319 UTC [policies] Evaluate -> DEBU 1ad6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [182a 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer0.org1.example.com | [16ef 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1812 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [182b 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.320 UTC [policies] Evaluate -> DEBU 1ad7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer0.org1.example.com | [16f0 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1813 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [182c 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.320 UTC [policies] Evaluate -> DEBU 1ad8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org1.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [1814 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [182d 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:39.320 UTC [cauthdsl] func1 -> DEBU 1ad9 0xc000dc7010 gate 1589998899320657500 evaluation starts" +peer1.org1.example.com | [1941 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [16f2 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1815 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [182e 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:39.320 UTC [cauthdsl] func2 -> DEBU 1ada 0xc000dc7010 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1943 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | [16f3 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1816 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +orderer0.example.com | "2020-05-20 18:21:39.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1adb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [182f 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [16f4 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +orderer0.example.com | "2020-05-20 18:21:39.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1adc Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +peer0.org2.example.com | [1830 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9110 gate 1589998832605820400 evaluation starts +peer1.org1.example.com | [1945 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa ee 9a c2 5f 24 c3 d5 92 db 2f |0E.!....._$..../| +peer0.org1.example.com | [16f5 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1817 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +orderer0.example.com | "2020-05-20 18:21:39.321 UTC [cauthdsl] func2 -> DEBU 1add 0xc000dc7010 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [1831 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 50 b1 52 89 87 ff db a2 24 9b 3c 7b fc 8c e8 8e |P.R.....$.<{....| +peer1.org1.example.com | 00000020 da d8 3a 56 2a 02 20 01 7b 8e 4f 67 dc f4 60 3e |..:V*. .{.Og..`>| +peer1.org1.example.com | 00000030 9a ed ab 48 d9 80 3a 68 f3 7a 59 17 f7 1c 98 77 |...H..:h.zY....w| +peer1.org1.example.com | 00000040 c7 bc cb ef f5 f3 9c |.......| +peer1.org1.example.com | [1946 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1947 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1948 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1949 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1944 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [194a 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [194b 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [194c 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [194d 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [194e 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [194f 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer1.org1.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer1.org1.example.com | [1950 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer1.org1.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer1.org1.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer1.org1.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer1.org1.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1952 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1953 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1954 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1955 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [16f6 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1956 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:21:39.322 UTC [cauthdsl] func2 -> DEBU 1ade 0xc000dc7010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | [1832 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9110 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [16f7 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1957 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +orderer0.example.com | "2020-05-20 18:21:39.322 UTC [cauthdsl] func2 -> DEBU 1adf 0xc000dc7010 principal evaluation fails" +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0040b9110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [16f8 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +orderer0.example.com | "2020-05-20 18:21:39.322 UTC [cauthdsl] func1 -> DEBU 1ae0 0xc000dc7010 gate 1589998899320657500 evaluation fails" +peer1.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [1834 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9110 principal evaluation fails +peer0.org2.example.com | [1835 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9110 gate 1589998832605820400 evaluation fails +peer0.org2.example.com | [1836 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [16f9 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1958 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer1.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [1837 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [16fa 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.322 UTC [policies] Evaluate -> DEBU 1ae1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer1.org2.example.com | [1818 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | [1838 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [16fb 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1839 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9680 gate 1589998832607043700 evaluation starts +peer0.org1.example.com | [16fc 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [policies] func1 -> DEBU 1ae3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer1.org1.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer1.org2.example.com | [1819 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | [183a 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [16fd 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae4 Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org1.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:....2...l.V...| +peer0.org2.example.com | [183b 05-20 18:20:32.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9680 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [16fe 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org1.example.com | [1959 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | [183c 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [16ff 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [195a 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | [183d 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1700 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [195c 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [183e 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1701 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1702 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [181a 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [183f 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1703 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [cauthdsl] func1 -> DEBU 1ae9 0xc000d97660 gate 1589998899323325400 evaluation starts" +peer1.org1.example.com | [195b 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [181b 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1840 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1704 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [cauthdsl] func2 -> DEBU 1aea 0xc000d97660 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [195d 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [181c 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [1841 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9680 principal matched by identity 0 +peer0.org1.example.com | [1705 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [cauthdsl] func2 -> DEBU 1aeb 0xc000d97660 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [195e 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1842 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1706 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:39.323 UTC [cauthdsl] func2 -> DEBU 1aec 0xc000d97660 principal matched by identity 0" +peer1.org1.example.com | [195f 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 27 f7 39 78 72 fe 7a dd 4a f1 9b 38 dd f3 60 |.'.9xr.z.J..8..`| +peer1.org2.example.com | [181d 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | [1843 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [1707 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:39.324 UTC [msp.identity] Verify -> DEBU 1aed Verify: digest = 00000000 35 32 a1 52 24 74 1a 15 92 bb 84 dd 57 a0 98 75 |52.R$t......W..u| +peer1.org1.example.com | 00000010 1d e5 45 e7 d5 96 63 e8 70 44 0d 8a 51 23 a7 30 |..E...c.pD..Q#.0| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | [1844 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1708 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | 00000010 5a 24 d7 08 3b bd 9b 42 4c 6f d8 a7 ae 3b 10 96 |Z$..;..BLo...;..|" +peer1.org1.example.com | [1960 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 3a ce db d3 ec 19 c5 74 b7 9a 90 |0D. .:......t...| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1709 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 gate 1589998828907295200 evaluation starts +orderer0.example.com | "2020-05-20 18:21:39.324 UTC [msp.identity] Verify -> DEBU 1aee Verify: sig = 00000000 30 45 02 21 00 ae 77 78 0f f6 4c 9c 3f 3b cd 87 |0E.!..wx..L.?;..| +peer1.org1.example.com | 00000010 01 31 8d ac 76 b6 2b 80 2e 05 fd fd 46 1b a6 2e |.1..v.+.....F...| +peer1.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [1846 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [170a 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000010 e1 56 de 88 3d 80 fa 08 61 9a 55 c5 48 de 16 84 |.V..=...a.U.H...| +peer1.org1.example.com | 00000020 4f 76 2f ad 02 20 09 b6 58 68 ae 61 e6 72 42 39 |Ov/.. ..Xh.a.rB9| +peer1.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [1847 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | [170b 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 processing identity 0 with bytes of 115a110 +orderer0.example.com | 00000020 c7 c3 ee 3a db 02 20 50 4d 18 83 30 c4 30 50 5d |...:.. PM..0.0P]| +peer1.org1.example.com | 00000030 71 02 9e 3f c0 e7 95 12 2f 6d ba f5 02 de 81 7b |q..?..../m.....{| +peer1.org2.example.com | [181e 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [170c 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 principal matched by identity 0 +orderer0.example.com | 00000030 60 37 d5 be 20 6e 4b c1 2c c0 d4 dc fe c9 f1 de |`7.. nK.,.......| +peer1.org1.example.com | 00000040 d5 99 78 6a a8 5a |..xj.Z| +peer1.org2.example.com | [181f 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1848 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [170d 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +orderer0.example.com | 00000040 36 26 f1 67 f0 f8 4a |6&.g..J|" +peer1.org1.example.com | [1961 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1820 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1849 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +orderer0.example.com | "2020-05-20 18:21:39.324 UTC [cauthdsl] func2 -> DEBU 1aef 0xc000d97660 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [1962 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1821 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [184a 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | [170e 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +orderer0.example.com | "2020-05-20 18:21:39.324 UTC [cauthdsl] func1 -> DEBU 1af0 0xc000d97660 gate 1589998899323325400 evaluation succeeds" +peer1.org1.example.com | [1963 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1822 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +orderer0.example.com | "2020-05-20 18:21:39.324 UTC [policies] Evaluate -> DEBU 1af1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1964 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org2.example.com | [1823 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1965 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1824 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af3 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1966 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1825 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1967 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1826 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc1c70 gate 1589998836524081100 evaluation starts +peer0.org2.example.com | [184b 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9680 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [170f 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af5 Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [1968 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1827 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc1c70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [184c 05-20 18:20:32.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b9680 gate 1589998832607043700 evaluation succeeds +peer0.org1.example.com | [1710 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 gate 1589998828907295200 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [1969 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1828 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc1c70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [184d 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1711 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [common.deliver] deliverBlocks -> DEBU 1af7 [channel: businesschannel] Received seekInfo (0xc000d9c580) start: > stop: > from 172.18.0.9:53670" +peer1.org1.example.com | [196a 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1829 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc1c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [184e 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1712 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [fsblkstorage] Next -> DEBU 1af8 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org1.example.com | [196b 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [182a 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc1c70 principal evaluation fails +peer0.org2.example.com | [184f 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1713 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [fsblkstorage] newBlockfileStream -> DEBU 1af9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +peer1.org1.example.com | [196c 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [182b 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc1c70 gate 1589998836524081100 evaluation fails +peer0.org2.example.com | [1850 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1714 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afa Remaining bytes=[41179], Going to peek [8] bytes" +peer1.org1.example.com | [196d 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [182c 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1851 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1715 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.325 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afb Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +peer1.org1.example.com | [196e 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [182d 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1852 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816101E +peer0.org1.example.com | [1716 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.326 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afc blockbytes [41176] read from file [0]" +peer1.org1.example.com | [196f 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [182e 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1853 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 46FA5E0C7CBAC548AAA77D17D00DC64A2FEE527388EC2F593D8F8B4E26C210E8 +peer0.org1.example.com | [1717 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:21:39.326 UTC [common.deliver] deliverBlocks -> DEBU 1afd [channel: businesschannel] Delivering block [6] for (0xc000d9c580) for 172.18.0.9:53670" +peer1.org1.example.com | [1970 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [182f 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdc1e0 gate 1589998836525965900 evaluation starts +peer0.org2.example.com | [1854 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1718 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +peer1.org1.example.com | [1971 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1830 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdc1e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1855 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +orderer0.example.com | "2020-05-20 18:21:39.326 UTC [common.deliver] deliverBlocks -> DEBU 1afe [channel: businesschannel] Done delivering to 172.18.0.9:53670 for (0xc000d9c580)" +peer1.org1.example.com | [1972 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1831 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdc1e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1719 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +orderer0.example.com | "2020-05-20 18:21:39.326 UTC [common.deliver] Handle -> DEBU 1aff Waiting for new SeekInfo from 172.18.0.9:53670" +peer1.org1.example.com | [1973 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1832 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdc1e0 principal matched by identity 0 +peer0.org2.example.com | [1857 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +orderer0.example.com | "2020-05-20 18:21:39.326 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b00 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +peer1.org1.example.com | [1974 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1833 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +orderer0.example.com | "2020-05-20 18:21:39.326 UTC [common.deliver] Handle -> DEBU 1b01 Attempting to read seek info message from 172.18.0.9:53670" +peer1.org1.example.com | [1975 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +orderer0.example.com | "2020-05-20 18:21:39.330 UTC [policies] Evaluate -> DEBU 1b02 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1834 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [1976 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +orderer0.example.com | "2020-05-20 18:21:39.330 UTC [policies] Evaluate -> DEBU 1b03 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | [1977 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [171a 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.330 UTC [policies] Evaluate -> DEBU 1b04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | [1978 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1856 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [171b 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [1979 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1858 05-20 18:20:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [171c 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [197a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1859 05-20 18:20:32.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [171d 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [cauthdsl] func1 -> DEBU 1b07 0xc000dc7dc0 gate 1589998899331261800 evaluation starts" +peer1.org2.example.com | [1835 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdc1e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [197b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [185a 05-20 18:20:32.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +peer1.org2.example.com | [1836 05-20 18:20:36.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdc1e0 gate 1589998836525965900 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [cauthdsl] func2 -> DEBU 1b08 0xc000dc7dc0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [197c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c849e0 gate 1589998840851418900 evaluation starts +peer0.org2.example.com | [185b 05-20 18:20:32.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\240\225\205\332\217\001\313<\226\327R\330\275\215\302\273" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1837 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [171e 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [cauthdsl] func2 -> DEBU 1b09 0xc000dc7dc0 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [197d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c849e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [185c 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1838 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [cauthdsl] func2 -> DEBU 1b0a 0xc000dc7dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org1.example.com | [197e 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c849e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [185d 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1839 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [cauthdsl] func2 -> DEBU 1b0b 0xc000dc7dc0 principal evaluation fails" +peer1.org1.example.com | [197f 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c849e0 principal matched by identity 0 +peer0.org2.example.com | [185e 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [183a 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [cauthdsl] func1 -> DEBU 1b0c 0xc000dc7dc0 gate 1589998899331261800 evaluation fails" +peer1.org1.example.com | [1980 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer0.org2.example.com | [185f 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [183b 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b0d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer0.org2.example.com | [1860 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [183c 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [171f 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [1981 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer1.org1.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer0.org2.example.com | [1861 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [183d 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1720 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org1.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer0.org2.example.com | [1862 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\240\225\205\332\217\001\313<\226\327R\330\275\215\302\273" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [183e 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1721 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.331 UTC [cauthdsl] func1 -> DEBU 1b10 0xc000e8c600 gate 1589998899331934900 evaluation starts" +peer1.org1.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU Exiting +peer1.org2.example.com | [183f 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1722 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b11 0xc000e8c600 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | 00000040 46 57 9c e1 a0 0f 54 |FW....T| +peer0.org2.example.com | [1864 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | [1840 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1723 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b12 0xc000e8c600 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [1982 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c849e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1841 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1724 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b13 0xc000e8c600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org1.example.com | [1983 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c849e0 gate 1589998840851418900 evaluation succeeds +peer0.org2.example.com | [1865 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | [1842 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1725 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b14 0xc000e8c600 principal evaluation fails" +peer1.org1.example.com | [1984 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | [1843 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd3e0 gate 1589998836538387300 evaluation starts +peer0.org1.example.com | [1726 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func1 -> DEBU 1b15 0xc000e8c600 gate 1589998899331934900 evaluation fails" +peer1.org1.example.com | [1985 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003fdd3e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1727 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [policies] Evaluate -> DEBU 1b16 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [1986 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org1.example.com | [1728 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [policies] Evaluate -> DEBU 1b17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [1987 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org2.example.com | [1845 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd3e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [policies] Evaluate -> DEBU 1b18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org1.example.com | [1988 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1866 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1846 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1729 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func1 -> DEBU 1b19 0xc000e8ce40 gate 1589998899332668400 evaluation starts" +peer1.org1.example.com | [1989 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1867 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1847 05-20 18:20:36.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd3e0 principal evaluation fails +peer0.org1.example.com | 00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b1a 0xc000e8ce40 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [198a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1868 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1848 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd3e0 gate 1589998836538387300 evaluation fails +peer0.org1.example.com | 00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b1b 0xc000e8ce40 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [198b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1869 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1849 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b1c 0xc000e8ce40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | [198c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [186a 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [184a 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b1d 0xc000e8ce40 principal evaluation fails" +peer1.org1.example.com | [198d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [186b 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [184b 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [172a 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +orderer0.example.com | "2020-05-20 18:21:39.332 UTC [cauthdsl] func1 -> DEBU 1b1e 0xc000e8ce40 gate 1589998899332668400 evaluation fails" +peer1.org1.example.com | [198e 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [184c 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd950 gate 1589998836542181100 evaluation starts +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +orderer0.example.com | "2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [198f 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [184d 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd950 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [186c 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [172b 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 18 64 fb 10 a0 b6 34 9c 5e 89 27 |0D. 7.d....4.^.'| +orderer0.example.com | "2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1990 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [184e 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd950 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [186d 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 72 54 20 9f 2f 2c fc 82 41 25 86 34 f8 b3 f9 73 |rT ./,..A%.4...s| +orderer0.example.com | "2020-05-20 18:21:39.333 UTC [policies] func1 -> DEBU 1b21 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer1.org1.example.com | [1991 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [184f 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd950 principal matched by identity 0 +peer0.org2.example.com | [186e 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 ef bd 05 ff 02 20 5f e0 6f 1c 1c a1 ee 7a e1 f6 |..... _.o....z..| +orderer0.example.com | "2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b22 Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org1.example.com | [1992 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1850 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | [186f 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 e1 dc 82 64 b9 1c a5 7b fb eb cc 63 92 67 72 88 |...d...{...c.gr.| +orderer0.example.com | "2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org1.example.com | [1993 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1870 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 8b 40 7e 46 1c 2c |.@~F.,| +orderer0.example.com | "2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1994 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1851 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | [1871 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [172d 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1995 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > alive: alive: alive: +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | [1872 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [172e 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b26 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [1996 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1873 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | [172c 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:39.334 UTC [cauthdsl] func1 -> DEBU 1b27 0xc000e8db30 gate 1589998899334088100 evaluation starts" +peer1.org1.example.com | [1997 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1874 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | [172f 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:39.334 UTC [cauthdsl] func2 -> DEBU 1b28 0xc000e8db30 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1998 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1875 05-20 18:20:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1730 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.334 UTC [cauthdsl] func2 -> DEBU 1b29 0xc000e8db30 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [1999 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1876 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1852 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd950 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1731 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.334 UTC [cauthdsl] func2 -> DEBU 1b2a 0xc000e8db30 principal matched by identity 0" +peer1.org1.example.com | [199a 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1877 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1853 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fdd950 gate 1589998836542181100 evaluation succeeds +peer0.org1.example.com | [1732 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.334 UTC [msp.identity] Verify -> DEBU 1b2b Verify: digest = 00000000 f2 0c a4 6f 25 f0 3b 77 1f f3 e8 f4 8e 76 66 bc |...o%.;w.....vf.| +peer1.org1.example.com | [199b 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1878 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041131c0 gate 1589998832943670700 evaluation starts +peer1.org2.example.com | [1854 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1733 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 50 9b c7 38 3b 76 6f 7f 69 4a e8 b3 ab 85 ed 93 |P..8;vo.iJ......|" +peer1.org1.example.com | [199c 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1879 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041131c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1855 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1734 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:21:39.334 UTC [msp.identity] Verify -> DEBU 1b2c Verify: sig = 00000000 30 45 02 21 00 de 75 00 94 27 3e b7 da c8 b8 1f |0E.!..u..'>.....| +peer1.org1.example.com | [199e 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [187a 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041131c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1856 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1735 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +orderer0.example.com | 00000010 d1 bc 7d 1b 33 b3 ae 9d e3 c2 7f 3d d1 f0 22 f0 |..}.3......=..".| +peer1.org1.example.com | [199f 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [187b 05-20 18:20:32.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041131c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1857 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +orderer0.example.com | 00000020 0b 8e d0 b9 91 02 20 4e 81 f4 3e ef c3 95 57 e6 |...... N..>...W.| +peer1.org1.example.com | [199d 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [187c 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041131c0 principal evaluation fails +peer1.org2.example.com | [1858 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | [1736 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +orderer0.example.com | 00000030 1c 87 87 c4 66 5f 01 79 b6 99 5e 09 92 ae 91 74 |....f_.y..^....t| +peer1.org1.example.com | [19a0 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +peer0.org2.example.com | [187d 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041131c0 gate 1589998832943670700 evaluation fails +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | 00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +orderer0.example.com | 00000040 d2 8c d8 e9 2a 68 43 |....*hC|" +peer1.org1.example.com | 00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +peer0.org2.example.com | [187e 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1859 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [cauthdsl] func2 -> DEBU 1b2d 0xc000e8db30 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [19a1 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +peer0.org2.example.com | [187f 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [cauthdsl] func1 -> DEBU 1b2e 0xc000e8db30 gate 1589998899334088100 evaluation succeeds" +peer1.org1.example.com | 00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +peer0.org2.example.com | [1880 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000040 3f 6e 14 09 c8 0c 87 |?n.....| +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b2f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | 00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +peer0.org2.example.com | [1881 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113730 gate 1589998832961529300 evaluation starts +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [1737 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b30 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | 00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +peer0.org2.example.com | [1882 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113730 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1738 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b31 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | 00000040 11 9d 80 32 33 39 28 |...239(| +peer0.org2.example.com | [1883 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113730 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [185a 05-20 18:20:36.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1739 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b32 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [19a2 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [1884 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113730 principal matched by identity 0 +peer1.org2.example.com | [185b 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [173a 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b33 Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [1885 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [185c 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b34 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [19a3 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 dc 60 27 14 79 f0 f5 b0 aa 6f |0E.!...`'.y....o| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [185d 05-20 18:20:36.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [173b 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [common.deliver] deliverBlocks -> DEBU 1b35 [channel: businesschannel] Received seekInfo (0xc000cfed40) start: > stop: > from 172.18.0.9:53670" +peer1.org1.example.com | 00000010 66 03 dc 40 7d 21 c0 46 ca 76 c2 8c 9d eb da a5 |f..@}!.F.v......| +peer0.org2.example.com | [1886 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | [185e 05-20 18:20:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [fsblkstorage] Next -> DEBU 1b36 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org1.example.com | 00000020 da 23 6a 69 eb 02 20 41 5e b0 6e 5a d3 74 c2 b7 |.#ji.. A^.nZ.t..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | [185f 05-20 18:20:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b37 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +peer1.org1.example.com | 00000030 08 cc ff af 59 bf c2 55 77 46 24 2c ff 76 8d de |....Y..UwF$,.v..| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | [1860 05-20 18:20:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b38 Remaining bytes=[41179], Going to peek [8] bytes" +peer0.org1.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +peer1.org1.example.com | 00000040 29 f9 0a ba f2 bc 82 |)......| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | [1861 05-20 18:20:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b39 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +peer0.org1.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +peer1.org1.example.com | [19a4 05-20 18:20:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1862 05-20 18:20:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [173c 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.335 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b3a blockbytes [41176] read from file [0]" +peer1.org1.example.com | [19a5 05-20 18:20:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1887 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113730 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1863 05-20 18:20:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [173d 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.336 UTC [common.deliver] deliverBlocks -> DEBU 1b3b [channel: businesschannel] Delivering block [6] for (0xc000cfed40) for 172.18.0.9:53670" +peer1.org1.example.com | [19a6 05-20 18:20:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1888 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113730 gate 1589998832961529300 evaluation succeeds +peer1.org2.example.com | [1864 05-20 18:20:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [173e 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.336 UTC [common.deliver] deliverBlocks -> DEBU 1b3c [channel: businesschannel] Done delivering to 172.18.0.9:53670 for (0xc000cfed40)" +peer1.org1.example.com | [19a7 05-20 18:20:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1889 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1865 05-20 18:20:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [173f 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.336 UTC [common.deliver] Handle -> DEBU 1b3d Waiting for new SeekInfo from 172.18.0.9:53670" +peer0.org2.example.com | [188a 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [19a8 05-20 18:20:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1866 05-20 18:20:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1740 05-20 18:20:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +orderer0.example.com | "2020-05-20 18:21:39.336 UTC [common.deliver] Handle -> DEBU 1b3e Attempting to read seek info message from 172.18.0.9:53670" +peer0.org2.example.com | [188b 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [19a9 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1867 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1741 05-20 18:20:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +orderer0.example.com | "2020-05-20 18:21:39.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3f Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +peer0.org2.example.com | [188c 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [19aa 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1868 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\371\222Z\035\036\335\347M)\225<\221?\035\321\311q\213\223\366\002 \032\363\251\353\0319\001\006W\2254\361b\372\223\250(ud\247\376\024\244\037\004\272x\265\241\274\370\317" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1742 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:21:39.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b40 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +peer0.org2.example.com | [188d 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19ab 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1869 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1743 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610071801 +orderer0.example.com | "2020-05-20 18:21:39.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " +peer0.org2.example.com | [188e 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19ac 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [186a 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1744 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82710F14E505C82501701AF2141718B5483EB65D3C473F52E9DC3E8C086694BF +orderer0.example.com | "2020-05-20 18:21:39.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.8µs " +peer1.org1.example.com | [19ad 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [188f 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [186b 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1745 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +orderer0.example.com | "2020-05-20 18:21:39.346 UTC [common.deliver] Handle -> WARN 1b43 Error reading from 172.18.0.9:53670: rpc error: code = Canceled desc = context canceled" +peer1.org1.example.com | [19ae 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1890 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [186c 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1746 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.347 UTC [orderer.common.server] func1 -> DEBU 1b44 Closing Deliver stream" +peer1.org1.example.com | [19af 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1891 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [186d 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1747 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.347 UTC [comm.grpc.server] 1 -> INFO 1b45 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53670 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.8256ms +peer1.org1.example.com | [19b0 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [19b1 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [1892 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [186e 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1748 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.348 UTC [grpc] infof -> DEBU 1b46 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | [19b2 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1893 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [186f 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1749 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b47 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [19b3 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1894 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1870 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [174a 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b48 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [19b4 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1895 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132930 gate 1589998832999311400 evaluation starts +peer1.org2.example.com | [1871 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [174b 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.485 UTC [orderer.common.server] Deliver -> DEBU 1b49 Starting new Deliver handler" +peer1.org1.example.com | [19b5 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1896 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1872 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [174c 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.485 UTC [common.deliver] Handle -> DEBU 1b4a Starting new deliver loop for 172.18.0.9:53672" +peer1.org1.example.com | [19b6 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1897 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132930 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1873 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fff5c0 gate 1589998836968792500 evaluation starts +peer0.org1.example.com | [174d 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.486 UTC [common.deliver] Handle -> DEBU 1b4b Attempting to read seek info message from 172.18.0.9:53672" +peer1.org1.example.com | [19b7 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1898 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1874 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fff5c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [174e 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.487 UTC [policies] Evaluate -> DEBU 1b4c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [19b8 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1899 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132930 principal evaluation fails +peer1.org2.example.com | [1875 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fff5c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [174f 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.488 UTC [policies] Evaluate -> DEBU 1b4d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [19b9 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [189a 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132930 gate 1589998832999311400 evaluation fails +peer1.org2.example.com | [1876 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fff5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1750 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.488 UTC [policies] Evaluate -> DEBU 1b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org1.example.com | [19ba 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [189b 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1877 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fff5c0 principal evaluation fails +peer0.org1.example.com | [1751 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +orderer0.example.com | "2020-05-20 18:21:39.488 UTC [policies] Evaluate -> DEBU 1b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [19bb 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [189c 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1878 05-20 18:20:36.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fff5c0 gate 1589998836968792500 evaluation fails +peer0.org1.example.com | [1752 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.488 UTC [policies] Evaluate -> DEBU 1b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | [19bc 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [189d 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1879 05-20 18:20:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1753 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.488 UTC [cauthdsl] func1 -> DEBU 1b51 0xc001082580 gate 1589998899488892000 evaluation starts" +peer1.org1.example.com | [19bd 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [189e 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132ea0 gate 1589998832999633600 evaluation starts +peer1.org2.example.com | [187a 05-20 18:20:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1754 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.489 UTC [cauthdsl] func2 -> DEBU 1b52 0xc001082580 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [19be 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [189f 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [187b 05-20 18:20:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1755 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.489 UTC [cauthdsl] func2 -> DEBU 1b53 0xc001082580 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [19bf 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [18a0 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132ea0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [187c 05-20 18:20:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fffb30 gate 1589998836972831100 evaluation starts +peer0.org1.example.com | [1756 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.489 UTC [cauthdsl] func2 -> DEBU 1b54 0xc001082580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org1.example.com | [19c0 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18a1 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132ea0 principal matched by identity 0 +peer1.org2.example.com | [187d 05-20 18:20:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fffb30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1757 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.489 UTC [cauthdsl] func2 -> DEBU 1b55 0xc001082580 principal evaluation fails" +peer1.org1.example.com | [19c1 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [18a2 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | [187e 05-20 18:20:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fffb30 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1758 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.490 UTC [cauthdsl] func1 -> DEBU 1b56 0xc001082580 gate 1589998899488892000 evaluation fails" +peer1.org1.example.com | [19c2 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [187f 05-20 18:20:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fffb30 principal matched by identity 0 +peer0.org1.example.com | [1759 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.490 UTC [policies] Evaluate -> DEBU 1b57 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [19c3 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18a3 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | [1880 05-20 18:20:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer0.org1.example.com | [175b 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.490 UTC [policies] Evaluate -> DEBU 1b58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [19c4 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +orderer0.example.com | "2020-05-20 18:21:39.490 UTC [policies] Evaluate -> DEBU 1b59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org1.example.com | [19c5 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | [175c 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.491 UTC [cauthdsl] func1 -> DEBU 1b5a 0xc001082dc0 gate 1589998899491072800 evaluation starts" +peer1.org1.example.com | [19c6 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | [1881 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [175a 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.491 UTC [cauthdsl] func2 -> DEBU 1b5b 0xc001082dc0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [19c7 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1882 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [175d 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.491 UTC [cauthdsl] func2 -> DEBU 1b5c 0xc001082dc0 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [19c8 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [18a4 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132ea0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1883 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [175e 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.491 UTC [cauthdsl] func2 -> DEBU 1b5d 0xc001082dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org1.example.com | [19c9 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [18a5 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132ea0 gate 1589998832999633600 evaluation succeeds +peer1.org2.example.com | [1884 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [175f 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:39.491 UTC [cauthdsl] func2 -> DEBU 1b5e 0xc001082dc0 principal evaluation fails" +peer1.org1.example.com | [19ca 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca53e0 gate 1589998841176411700 evaluation starts +peer0.org2.example.com | [18a6 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1885 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1760 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.492 UTC [cauthdsl] func1 -> DEBU 1b5f 0xc001082dc0 gate 1589998899491072800 evaluation fails" +peer1.org1.example.com | [19cb 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca53e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18a7 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1886 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1761 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.492 UTC [policies] Evaluate -> DEBU 1b60 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [19cc 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca53e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [18a8 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1887 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1762 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [19cd 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca53e0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:39.492 UTC [policies] Evaluate -> DEBU 1b61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [18a9 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1888 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1763 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [19ce 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c e5 cb 16 bd 61 d4 9b e5 2a 86 90 6a 45 97 1e |.....a...*..jE..| +orderer0.example.com | "2020-05-20 18:21:39.493 UTC [policies] Evaluate -> DEBU 1b62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org2.example.com | [18aa 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | [1889 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1764 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 05 a2 7b af 51 95 55 4f bc d1 f1 36 ac f2 d2 d8 |..{.Q.UO...6....| +orderer0.example.com | "2020-05-20 18:21:39.493 UTC [cauthdsl] func1 -> DEBU 1b63 0xc001083600 gate 1589998899493283300 evaluation starts" +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [188a 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1765 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 gate 1589998831613870600 evaluation starts +peer1.org1.example.com | [19cf 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d7 a5 c5 56 75 be 07 90 2c 38 |0E.!.....Vu...,8| +orderer0.example.com | "2020-05-20 18:21:39.493 UTC [cauthdsl] func2 -> DEBU 1b64 0xc001083600 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [18ab 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | [188b 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [1766 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 a1 91 ac 5e 14 93 6a b3 65 05 56 1d 81 c9 19 e3 |...^..j.e.V.....| +peer1.org1.example.com | 00000020 8a 92 6b 71 8a 02 20 6e 59 61 20 d6 93 0a 55 7c |..kq.. nYa ...U|| +orderer0.example.com | "2020-05-20 18:21:39.493 UTC [cauthdsl] func2 -> DEBU 1b65 0xc001083600 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [188c 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1767 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000030 38 62 e8 a8 81 23 9a 30 1e 10 31 70 24 ca 52 91 |8b...#.0..1p$.R.| +orderer0.example.com | "2020-05-20 18:21:39.493 UTC [cauthdsl] func2 -> DEBU 1b66 0xc001083600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | [188d 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1768 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 principal matched by identity 0 +peer1.org1.example.com | 00000040 e0 ac 9f 07 6e 10 21 |....n.!| +orderer0.example.com | "2020-05-20 18:21:39.494 UTC [cauthdsl] func2 -> DEBU 1b67 0xc001083600 principal evaluation fails" +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1769 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | [19d0 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca53e0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:39.494 UTC [cauthdsl] func1 -> DEBU 1b68 0xc001083600 gate 1589998899493283300 evaluation fails" +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org2.example.com | [188f 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [19d1 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca53e0 gate 1589998841176411700 evaluation succeeds +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org2.example.com | [1890 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [176a 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | [19d2 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18ac 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | [1891 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\371\222Z\035\036\335\347M)\225<\221?\035\321\311q\213\223\366\002 \032\363\251\353\0319\001\006W\2254\361b\372\223\250(ud\247\376\024\244\037\004\272x\265\241\274\370\317" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | [19d3 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +orderer0.example.com | "2020-05-20 18:21:39.495 UTC [policies] Evaluate -> DEBU 1b69 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [1892 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | [19d4 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [18ad 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +orderer0.example.com | "2020-05-20 18:21:39.495 UTC [policies] Evaluate -> DEBU 1b6a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | [19d5 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +orderer0.example.com | "2020-05-20 18:21:39.495 UTC [policies] func1 -> DEBU 1b6b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer1.org2.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [19d6 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +orderer0.example.com | "2020-05-20 18:21:39.495 UTC [policies] Evaluate -> DEBU 1b6c Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org2.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer0.org1.example.com | [176b 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [19d7 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +orderer0.example.com | "2020-05-20 18:21:39.496 UTC [policies] Evaluate -> DEBU 1b6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org2.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer0.org1.example.com | [176c 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 gate 1589998831613870600 evaluation succeeds +peer1.org1.example.com | [19d8 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +orderer0.example.com | "2020-05-20 18:21:39.496 UTC [policies] Evaluate -> DEBU 1b6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [1893 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fffb30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [176d 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19d9 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [18ae 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.496 UTC [policies] Evaluate -> DEBU 1b6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1894 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fffb30 gate 1589998836972831100 evaluation succeeds +peer0.org1.example.com | [176e 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19da 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [18af 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.496 UTC [policies] Evaluate -> DEBU 1b70 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [1895 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [176f 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [19db 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18b0 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.497 UTC [cauthdsl] func1 -> DEBU 1b71 0xc00109e2f0 gate 1589998899497029300 evaluation starts" +peer1.org2.example.com | [1896 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1770 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [19dc 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18b1 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.497 UTC [cauthdsl] func2 -> DEBU 1b72 0xc00109e2f0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1897 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1771 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | [19dd 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18b2 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.497 UTC [cauthdsl] func2 -> DEBU 1b73 0xc00109e2f0 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [1898 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [19de 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [18b3 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.497 UTC [cauthdsl] func2 -> DEBU 1b74 0xc00109e2f0 principal matched by identity 0" +peer1.org2.example.com | [1899 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1772 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [19df 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18b4 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.497 UTC [msp.identity] Verify -> DEBU 1b75 Verify: digest = 00000000 5d a7 40 50 ce df e1 7c c9 96 62 be 93 42 8d 30 |].@P...|..b..B.0| +peer1.org2.example.com | [189a 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | [19e0 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18b5 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 2e 04 f4 19 19 84 4f 11 97 f3 64 b7 db ed 4e 46 |......O...d...NF|" +peer1.org2.example.com | [189b 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | [19e1 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18b6 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.498 UTC [msp.identity] Verify -> DEBU 1b76 Verify: sig = 00000000 30 45 02 21 00 e8 63 5b 97 96 d0 1c 0a 37 ac d8 |0E.!..c[.....7..| +peer1.org2.example.com | [189c 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [19e2 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [18b7 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | 00000010 0a a3 6d f9 59 95 47 62 c8 c3 54 08 27 1c 30 96 |..m.Y.Gb..T.'.0.| +peer1.org2.example.com | [189d 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [19e3 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [18b8 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 50 96 6a f9 f1 02 20 3d 2a 3b d0 72 0f 83 17 dd |P.j... =*;.r....| +peer1.org2.example.com | [189e 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1773 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e4 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000030 70 6d ba 47 13 af fb 87 d7 d0 d5 49 03 b8 6e ae |pm.G.......I..n.| +peer0.org2.example.com | [18b9 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [189f 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1774 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e5 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +orderer0.example.com | 00000040 6e a8 05 03 3e b6 05 |n...>..|" +peer0.org2.example.com | [18ba 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [18a0 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1775 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [19e6 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:21:39.498 UTC [cauthdsl] func2 -> DEBU 1b77 0xc00109e2f0 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [18bb 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [18a1 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\371\222Z\035\036\335\347M)\225<\221?\035\321\311q\213\223\366\002 \032\363\251\353\0319\001\006W\2254\361b\372\223\250(ud\247\376\024\244\037\004\272x\265\241\274\370\317" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1776 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19e7 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161026 +orderer0.example.com | "2020-05-20 18:21:39.498 UTC [cauthdsl] func1 -> DEBU 1b78 0xc00109e2f0 gate 1589998899497029300 evaluation succeeds" +peer0.org2.example.com | [18bc 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a2 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1777 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19e8 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EC6F7F35857A0FBD66243D1F5EE1BB98BC518F42ABF4C78CF0F954EC7C00E30E +orderer0.example.com | "2020-05-20 18:21:39.498 UTC [policies] Evaluate -> DEBU 1b79 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [18bd 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [18a3 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer0.org1.example.com | [1778 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [19e9 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:21:39.498 UTC [policies] Evaluate -> DEBU 1b7a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [18be 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer0.org1.example.com | [1779 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [19ea 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-05-20 18:21:39.498 UTC [policies] Evaluate -> DEBU 1b7b Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [18bf 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [18a4 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer1.org1.example.com | [19eb 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [177a 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:39.499 UTC [policies] Evaluate -> DEBU 1b7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [18c0 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer1.org1.example.com | [19ec 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [177b 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 gate 1589998831621598800 evaluation starts +orderer0.example.com | "2020-05-20 18:21:39.499 UTC [policies] Evaluate -> DEBU 1b7d Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [18c1 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer1.org1.example.com | [19ed 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [177c 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:39.499 UTC [policies] Evaluate -> DEBU 1b7e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [18c2 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer1.org1.example.com | [19ee 05-20 18:20:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [177d 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:39.499 UTC [common.deliver] deliverBlocks -> DEBU 1b7f [channel: businesschannel] Received seekInfo (0xc000d9d680) start: > stop: > from 172.18.0.9:53672" +peer0.org2.example.com | [18c3 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer1.org2.example.com | [18a5 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [19ef 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.499 UTC [fsblkstorage] Next -> DEBU 1b80 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-05-20 18:21:39.500 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b81 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [18c4 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [177e 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 principal matched by identity 0 +peer1.org1.example.com | [19f0 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.500 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b82 Remaining bytes=[138572], Going to peek [8] bytes" +peer0.org2.example.com | [18c5 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [177f 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | [19f1 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.500 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b83 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org2.example.com | [18c6 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [18a6 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 78 65 91 89 61 7c e8 78 16 7a 3e |0D. Pxe..a|.x.z>| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [19f2 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:39.500 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b84 blockbytes [28471] read from file [0]" +peer0.org2.example.com | [18c7 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 f9 92 5a 1d 1e dd e7 4d 29 95 3c 91 3f 1d d1 c9 |..Z....M).<.?...| +peer0.org1.example.com | [1780 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | [19f3 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.500 UTC [common.deliver] deliverBlocks -> DEBU 1b85 [channel: businesschannel] Delivering block [0] for (0xc000d9d680) for 172.18.0.9:53672" +peer0.org2.example.com | [18c8 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 71 8b 93 f6 02 20 1a f3 a9 eb 19 39 01 06 57 95 |q.... .....9..W.| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | [19f4 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.501 UTC [common.deliver] deliverBlocks -> DEBU 1b86 [channel: businesschannel] Done delivering to 172.18.0.9:53672 for (0xc000d9d680)" +peer0.org2.example.com | [18c9 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 34 f1 62 fa 93 a8 28 75 64 a7 fe 14 a4 1f 04 ba |4.b...(ud.......| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:39.501 UTC [common.deliver] Handle -> DEBU 1b87 Waiting for new SeekInfo from 172.18.0.9:53672" +peer0.org2.example.com | [18ca 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 78 b5 a1 bc f8 cf |x.....| +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org1.example.com | [19f6 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.502 UTC [common.deliver] Handle -> DEBU 1b88 Attempting to read seek info message from 172.18.0.9:53672" +peer0.org2.example.com | [18cb 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18a7 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org1.example.com | [19f7 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.512 UTC [grpc] infof -> DEBU 1b89 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [18cc 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18a8 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1781 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [19f8 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:39.512 UTC [common.deliver] Handle -> WARN 1b8a Error reading from 172.18.0.9:53672: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [18cd 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [18a9 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1782 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 gate 1589998831621598800 evaluation succeeds +peer1.org1.example.com | [19f9 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.513 UTC [orderer.common.server] func1 -> DEBU 1b8b Closing Deliver stream" +peer0.org2.example.com | [18ce 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18aa 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1783 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19fa 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [18cf 05-20 18:20:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.514 UTC [comm.grpc.server] 1 -> INFO 1b8c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53672 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.5805ms +peer1.org2.example.com | [18ab 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1784 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19fb 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18d0 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.801 UTC [orderer.common.server] Deliver -> DEBU 1b8d Starting new Deliver handler" +peer1.org2.example.com | [18ac 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1785 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [19fc 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18d1 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:21:39.802 UTC [common.deliver] Handle -> DEBU 1b8e Starting new deliver loop for 172.18.0.9:53674" +peer1.org2.example.com | [18ad 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1786 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [19fd 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18d2 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.802 UTC [common.deliver] Handle -> DEBU 1b8f Attempting to read seek info message from 172.18.0.9:53674" +peer1.org2.example.com | [18ae 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1787 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | [19fe 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.802 UTC [policies] Evaluate -> DEBU 1b90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [18d3 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [18af 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [19ff 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.802 UTC [policies] Evaluate -> DEBU 1b91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [18d4 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18b0 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1788 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | [1a00 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.802 UTC [policies] Evaluate -> DEBU 1b92 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org2.example.com | [18d5 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18b1 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [1a01 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:39.802 UTC [policies] Evaluate -> DEBU 1b93 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [18d6 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [18b2 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [1a02 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-05-20 18:21:39.809 UTC [policies] Evaluate -> DEBU 1b94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org2.example.com | [18d7 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [18b3 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\371\222Z\035\036\335\347M)\225<\221?\035\321\311q\213\223\366\002 \032\363\251\353\0319\001\006W\2254\361b\372\223\250(ud\247\376\024\244\037\004\272x\265\241\274\370\317" > > alive: +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | [1a03 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.809 UTC [cauthdsl] func1 -> DEBU 1b95 0xc0010ee240 gate 1589998899809466700 evaluation starts" +peer0.org2.example.com | [18d8 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [18b4 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +orderer0.example.com | "2020-05-20 18:21:39.809 UTC [cauthdsl] func2 -> DEBU 1b96 0xc0010ee240 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1a04 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:39.810 UTC [cauthdsl] func2 -> DEBU 1b97 0xc0010ee240 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [18b5 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1789 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a05 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18d9 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170880 gate 1589998833114116800 evaluation starts +orderer0.example.com | "2020-05-20 18:21:39.810 UTC [cauthdsl] func2 -> DEBU 1b98 0xc0010ee240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | [18b6 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [178a 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a06 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18da 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170880 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:39.810 UTC [cauthdsl] func2 -> DEBU 1b99 0xc0010ee240 principal evaluation fails" +peer1.org2.example.com | [18b7 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [178b 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a07 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [18db 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170880 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:39.811 UTC [cauthdsl] func1 -> DEBU 1b9a 0xc0010ee240 gate 1589998899809466700 evaluation fails" +peer1.org2.example.com | [18b8 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [178c 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a08 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [18dc 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-05-20 18:21:39.811 UTC [policies] Evaluate -> DEBU 1b9b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [18b9 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [178d 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a09 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [18dd 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170880 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:39.811 UTC [policies] Evaluate -> DEBU 1b9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [18ba 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [178e 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a0a 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccbab0 gate 1589998843706223600 evaluation starts +peer0.org2.example.com | [18de 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170880 gate 1589998833114116800 evaluation fails +orderer0.example.com | "2020-05-20 18:21:39.811 UTC [policies] Evaluate -> DEBU 1b9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | [18bb 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer0.org1.example.com | [178f 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a0b 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccbab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18df 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.812 UTC [cauthdsl] func1 -> DEBU 1b9e 0xc0010eea80 gate 1589998899812015400 evaluation starts" +peer1.org2.example.com | [18bc 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1790 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a0c 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccbab0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [18e0 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.812 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc0010eea80 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [18bd 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1791 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a0d 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccbab0 principal matched by identity 0 +peer0.org2.example.com | [18e1 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:39.812 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc0010eea80 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [18be 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1792 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a0e 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b fa d0 07 0e 9d e6 c4 9a 2b 8f 44 cb 40 4e 3e |.........+.D.@N>| +peer0.org2.example.com | [18e2 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170df0 gate 1589998833114470700 evaluation starts +orderer0.example.com | "2020-05-20 18:21:39.812 UTC [cauthdsl] func2 -> DEBU 1ba1 0xc0010eea80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [18bf 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1793 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 89 3f ec ce 57 79 55 45 bc 39 73 a3 8c ba ec eb |.?..WyUE.9s.....| +peer0.org2.example.com | [18e3 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170df0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:39.814 UTC [cauthdsl] func2 -> DEBU 1ba2 0xc0010eea80 principal evaluation fails" +peer1.org2.example.com | [18c0 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1794 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 gate 1589998831627714100 evaluation starts +peer0.org2.example.com | [18e4 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170df0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:39.814 UTC [cauthdsl] func1 -> DEBU 1ba3 0xc0010eea80 gate 1589998899812015400 evaluation fails" +peer1.org2.example.com | [18c1 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1795 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18e5 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170df0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:39.814 UTC [policies] Evaluate -> DEBU 1ba4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [18c2 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 8846407952849447841, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [1796 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1a10 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 98 59 7a fe 80 99 02 b5 64 69 |0E.!...Yz.....di| +peer0.org2.example.com | [18e6 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +orderer0.example.com | "2020-05-20 18:21:39.814 UTC [policies] Evaluate -> DEBU 1ba5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [18c3 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1797 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 principal matched by identity 0 +peer1.org1.example.com | 00000010 e5 30 cc 6c 6a 13 a3 6e b6 c3 64 bf 0b 6f 3c e5 |.0.lj..n..d..o<.| +peer0.org2.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +orderer0.example.com | "2020-05-20 18:21:39.815 UTC [policies] Evaluate -> DEBU 1ba6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | [18c4 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1798 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000020 43 20 ed b0 16 02 20 46 4e 6e d7 3e c2 a8 1a aa |C .... FNn.>....| +peer0.org2.example.com | [18e7 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +orderer0.example.com | "2020-05-20 18:21:39.815 UTC [cauthdsl] func1 -> DEBU 1ba7 0xc0010ef2c0 gate 1589998899815666200 evaluation starts" +peer1.org2.example.com | [18c5 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8846407952849447841, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | 00000030 8f 0c b5 b3 1f ef 86 34 16 54 51 c7 b3 a2 0e 28 |.......4.TQ....(| +peer0.org2.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +orderer0.example.com | "2020-05-20 18:21:39.816 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc0010ef2c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [1799 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000040 5a a1 de a2 fa 8b 03 |Z......| +peer1.org1.example.com | [1a0f 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +orderer0.example.com | "2020-05-20 18:21:39.816 UTC [cauthdsl] func2 -> DEBU 1ba9 0xc0010ef2c0 processing identity 0 with bytes of fe0d40" +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | [1a11 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer1.org2.example.com | [18c6 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:21:39.816 UTC [cauthdsl] func2 -> DEBU 1baa 0xc0010ef2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003ccbab0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer1.org2.example.com | [18c7 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.816 UTC [cauthdsl] func2 -> DEBU 1bab 0xc0010ef2c0 principal evaluation fails" +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org1.example.com | [1a13 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccbab0 gate 1589998843706223600 evaluation succeeds +peer0.org2.example.com | [18e8 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170df0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [18c8 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-05-20 18:21:39.819 UTC [cauthdsl] func1 -> DEBU 1bac 0xc0010ef2c0 gate 1589998899815666200 evaluation fails" +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org1.example.com | [1a14 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18e9 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004170df0 gate 1589998833114470700 evaluation succeeds +peer1.org2.example.com | [18ca 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.819 UTC [policies] Evaluate -> DEBU 1bad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [179a 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a15 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18ea 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [18cb 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-05-20 18:21:39.819 UTC [policies] Evaluate -> DEBU 1bae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [179b 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 gate 1589998831627714100 evaluation succeeds +peer1.org1.example.com | [1a16 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [18eb 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [18cc 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.820 UTC [policies] func1 -> DEBU 1baf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer0.org1.example.com | [179c 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a17 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [18ec 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [18cd 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-05-20 18:21:39.820 UTC [policies] Evaluate -> DEBU 1bb0 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [179d 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a18 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18ed 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [18ce 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:39.820 UTC [policies] Evaluate -> DEBU 1bb1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [179e 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a19 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [18ee 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [18cf 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.821 UTC [policies] Evaluate -> DEBU 1bb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [179f 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a1a 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [18ef 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [18d0 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:39.821 UTC [policies] Evaluate -> DEBU 1bb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [17a0 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | [1a1b 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [18f0 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [18c9 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:39.821 UTC [policies] Evaluate -> DEBU 1bb4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1a1c 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [18f1 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [18d1 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.821 UTC [cauthdsl] func1 -> DEBU 1bb5 0xc0010effb0 gate 1589998899821658200 evaluation starts" +peer0.org1.example.com | [17a1 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [1a1d 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f2 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [18d2 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.821 UTC [cauthdsl] func2 -> DEBU 1bb6 0xc0010effb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | [1a1e 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f3 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18d3 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:39.822 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc0010effb0 processing identity 0 with bytes of fe0d40" +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | [1a1f 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f4 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18d6 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:39.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [1a20 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18f5 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18d4 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb9 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1a21 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f6 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [18d5 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.824 UTC [cauthdsl] func2 -> DEBU 1bba 0xc0010effb0 principal matched by identity 0" +peer0.org1.example.com | [17a2 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | [1a22 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18d7 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [18f7 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18f8 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.7µs " +peer1.org1.example.com | [1a23 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18d8 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f9 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.825 UTC [msp.identity] Verify -> DEBU 1bbc Verify: digest = 00000000 91 4a 7a e3 0e 8c 9e c9 d9 46 66 7b f5 ab 11 3a |.Jz......Ff{...:| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1a24 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18d9 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18fa 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | 00000010 f3 61 78 74 6d 15 04 9c 39 d6 f9 6e d3 1b 4f 02 |.axtm...9..n..O.|" +peer0.org1.example.com | [17a3 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | [1a25 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18da 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040820f0 gate 1589998837068382800 evaluation starts +peer0.org2.example.com | [18fb 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive: alive: +orderer0.example.com | "2020-05-20 18:21:39.825 UTC [msp.identity] Verify -> DEBU 1bbd Verify: sig = 00000000 30 45 02 21 00 92 9b 18 41 ae d5 df d2 4e 2d d3 |0E.!....A....N-.| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [1a26 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18db 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040820f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18fc 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 c6 39 99 dd 90 02 d4 ce 1f f5 45 0e 59 2f 77 dc |.9........E.Y/w.| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [1a27 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18dc 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040820f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [18fd 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 8d 64 18 50 b9 02 20 0a 04 3a a3 7f 3e bc 6a 6f |.d.P.. ..:..>.jo| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | [1a28 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18dd 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040820f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [18fe 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | 00000030 49 74 39 ed 35 15 5a 5a 82 10 ba ca 82 21 1b 4b |It9.5.ZZ.....!.K| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1a29 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [18de 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040820f0 principal evaluation fails +peer0.org2.example.com | [18ff 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 b7 7f 81 3a 65 0e d2 |...:e..|" +peer0.org1.example.com | [17a4 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a2a 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18df 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040820f0 gate 1589998837068382800 evaluation fails +peer0.org2.example.com | [1900 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.826 UTC [cauthdsl] func2 -> DEBU 1bbe 0xc0010effb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [17a5 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a2b 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18e0 05-20 18:20:37.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1901 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-05-20 18:21:39.826 UTC [cauthdsl] func1 -> DEBU 1bbf 0xc0010effb0 gate 1589998899821658200 evaluation succeeds" +peer0.org1.example.com | [17a6 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a2c 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [18e1 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1902 05-20 18:20:33.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:39.826 UTC [policies] Evaluate -> DEBU 1bc0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [17a7 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a2d 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [18e2 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1903 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:39.827 UTC [policies] Evaluate -> DEBU 1bc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [17a8 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a2e 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18e3 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082680 gate 1589998837072535700 evaluation starts +peer0.org2.example.com | [1904 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.827 UTC [policies] Evaluate -> DEBU 1bc2 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | [17a9 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a2f 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [18e4 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082680 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1905 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:39.827 UTC [policies] Evaluate -> DEBU 1bc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | [17aa 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a30 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18e5 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082680 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1906 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:39.827 UTC [policies] Evaluate -> DEBU 1bc4 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [17ab 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a31 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [18e6 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082680 principal matched by identity 0 +peer0.org2.example.com | [1907 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:39.828 UTC [policies] Evaluate -> DEBU 1bc5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | [17ac 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 gate 1589998831640491300 evaluation starts +peer1.org1.example.com | [1a32 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1908 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [18e7 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:39.829 UTC [common.deliver] deliverBlocks -> DEBU 1bc6 [channel: businesschannel] Received seekInfo (0xc000cff440) start: > stop: > from 172.18.0.9:53674" +peer0.org1.example.com | [17ad 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a33 05-20 18:20:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1909 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041985d0 gate 1589998833153283700 evaluation starts +peer1.org2.example.com | [18e8 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +orderer0.example.com | "2020-05-20 18:21:39.829 UTC [fsblkstorage] Next -> DEBU 1bc7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org1.example.com | [17ae 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1a34 05-20 18:20:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [190a 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041985d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +orderer0.example.com | "2020-05-20 18:21:39.830 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bc8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28474]" +peer0.org1.example.com | [17af 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 principal matched by identity 0 +peer1.org1.example.com | [1a35 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [190b 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041985d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [18e9 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +orderer0.example.com | "2020-05-20 18:21:39.830 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc9 Remaining bytes=[110098], Going to peek [8] bytes" +peer0.org1.example.com | [17b0 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | [1a36 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [190c 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041985d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +orderer0.example.com | "2020-05-20 18:21:39.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bca Returning blockbytes - length=[28167], placementInfo={fileNum=[0], startOffset=[28474], bytesOffset=[28477]}" +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1a37 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [190d 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041985d0 principal evaluation fails +peer1.org2.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +orderer0.example.com | "2020-05-20 18:21:39.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bcb blockbytes [28167] read from file [0]" +peer0.org1.example.com | [17b1 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | [1a38 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer0.org2.example.com | [190e 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041985d0 gate 1589998833153283700 evaluation fails +orderer0.example.com | "2020-05-20 18:21:39.831 UTC [common.deliver] deliverBlocks -> DEBU 1bcc [channel: businesschannel] Delivering block [1] for (0xc000cff440) for 172.18.0.9:53674" +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | [1a39 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer0.org2.example.com | [190f 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.832 UTC [common.deliver] deliverBlocks -> DEBU 1bcd [channel: businesschannel] Done delivering to 172.18.0.9:53674 for (0xc000cff440)" +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | [1a3a 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18ea 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082680 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1910 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-05-20 18:21:39.832 UTC [common.deliver] Handle -> DEBU 1bce Waiting for new SeekInfo from 172.18.0.9:53674" +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | [1a3b 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [18eb 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082680 gate 1589998837072535700 evaluation succeeds +peer0.org2.example.com | [1911 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:39.832 UTC [common.deliver] Handle -> DEBU 1bcf Attempting to read seek info message from 172.18.0.9:53674" +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1a3d 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [18ec 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1912 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198b40 gate 1589998833154908400 evaluation starts +orderer0.example.com | "2020-05-20 18:21:39.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +peer0.org1.example.com | [17b2 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a3c 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [18ed 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1913 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198b40 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:39.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd1 Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs" +peer0.org1.example.com | [17b3 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 gate 1589998831640491300 evaluation succeeds +peer1.org1.example.com | [1a3f 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18ee 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1914 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198b40 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:39.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.2µs " +peer0.org1.example.com | [17b4 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1915 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198b40 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:39.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 209.5µs " +peer0.org1.example.com | [17b5 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a3e 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [18ef 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1916 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +orderer0.example.com | "2020-05-20 18:21:39.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [17b6 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a40 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a41 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a42 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a43 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [18f0 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17b7 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a44 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b8 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17b9 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [17ba 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | [1a45 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +orderer0.example.com | "2020-05-20 18:21:39.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1a46 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18f1 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17bb 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | [1917 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +orderer0.example.com | "2020-05-20 18:21:39.852 UTC [common.deliver] Handle -> WARN 1bd6 Error reading from 172.18.0.9:53674: rpc error: code = Canceled desc = context canceled" +peer1.org1.example.com | [1a47 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18f2 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +orderer0.example.com | "2020-05-20 18:21:39.853 UTC [orderer.common.server] func1 -> DEBU 1bd7 Closing Deliver stream" +peer1.org2.example.com | [18f3 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer1.org1.example.com | [1a48 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +orderer0.example.com | "2020-05-20 18:21:39.854 UTC [comm.grpc.server] 1 -> INFO 1bd8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53674 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=52.5835ms +peer1.org2.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer1.org1.example.com | [1a49 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +orderer0.example.com | "2020-05-20 18:21:39.855 UTC [grpc] infof -> DEBU 1bd9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [18f4 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer1.org1.example.com | [1a4a 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +orderer0.example.com | "2020-05-20 18:21:40.043 UTC [orderer.common.server] Deliver -> DEBU 1bda Starting new Deliver handler" +peer1.org2.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer1.org1.example.com | [1a4b 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [17bc 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [1918 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198b40 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:40.044 UTC [common.deliver] Handle -> DEBU 1bdb Starting new deliver loop for 172.18.0.9:53676" +peer1.org2.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer1.org1.example.com | [1a4c 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1919 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198b40 gate 1589998833154908400 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:40.044 UTC [common.deliver] Handle -> DEBU 1bdc Attempting to read seek info message from 172.18.0.9:53676" +peer1.org2.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer1.org1.example.com | [1a4d 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [17bd 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | [191a 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:40.045 UTC [policies] Evaluate -> DEBU 1bdd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer1.org1.example.com | [1a4e 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c3e0 gate 1589998843884810400 evaluation starts +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | [191b 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:40.046 UTC [policies] Evaluate -> DEBU 1bde This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [18f5 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a4f 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c3e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | [191c 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:40.046 UTC [policies] Evaluate -> DEBU 1bdf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | [18f6 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a50 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c3e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | [191d 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:40.046 UTC [policies] Evaluate -> DEBU 1be0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [18f7 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1a51 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c3e0 principal matched by identity 0 +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [191e 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:40.046 UTC [policies] Evaluate -> DEBU 1be1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org2.example.com | [18f8 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 df 24 11 a4 32 62 18 97 72 4a 73 00 e0 3b 5d |8.$..2b..rJs..;]| +peer1.org1.example.com | [1a52 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | [17be 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [191f 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.046 UTC [cauthdsl] func1 -> DEBU 1be2 0xc000ae8ac0 gate 1589998900046978800 evaluation starts" +peer1.org2.example.com | 00000010 d4 e9 c7 ac d4 51 f0 d9 69 4b 06 d0 8a 16 d4 ff |.....Q..iK......| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [17bf 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1920 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-05-20 18:21:40.047 UTC [cauthdsl] func2 -> DEBU 1be3 0xc000ae8ac0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [18f9 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 57 8a 43 f9 8b 9e 3b 58 86 ab 11 |0D. MW.C...;X...| +peer1.org1.example.com | [1a53 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | [17c0 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1921 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +orderer0.example.com | "2020-05-20 18:21:40.047 UTC [cauthdsl] func2 -> DEBU 1be4 0xc000ae8ac0 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | 00000010 e6 aa 4f 20 88 b1 98 1f 02 ec 52 ab 7d 91 48 6b |..O ......R.}.Hk| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | [17c1 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +orderer0.example.com | "2020-05-20 18:21:40.047 UTC [cauthdsl] func2 -> DEBU 1be5 0xc000ae8ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | 00000020 b6 78 5b 93 02 20 31 52 31 51 f6 37 10 5e 17 9f |.x[.. 1R1Q.7.^..| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | [17c2 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1922 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +orderer0.example.com | "2020-05-20 18:21:40.047 UTC [cauthdsl] func2 -> DEBU 1be6 0xc000ae8ac0 principal evaluation fails" +peer1.org2.example.com | 00000030 9c 00 63 fc 5d ec 7a 00 5d 32 4c 73 23 6e fd d2 |..c.].z.]2Ls#n..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [17c3 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer0.org2.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +orderer0.example.com | "2020-05-20 18:21:40.048 UTC [cauthdsl] func1 -> DEBU 1be7 0xc000ae8ac0 gate 1589998900046978800 evaluation fails" +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [17c4 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +orderer0.example.com | "2020-05-20 18:21:40.048 UTC [policies] Evaluate -> DEBU 1be8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | 00000040 ab bd e1 98 8b 4d |.....M| +peer1.org1.example.com | [1a54 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c3e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [17c5 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [17c6 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 gate 1589998831648825100 evaluation starts +peer0.org2.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +orderer0.example.com | "2020-05-20 18:21:40.048 UTC [policies] Evaluate -> DEBU 1be9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [18fa 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1a55 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c3e0 gate 1589998843884810400 evaluation succeeds +peer0.org1.example.com | [17c7 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1923 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:40.048 UTC [policies] Evaluate -> DEBU 1bea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | [18fb 05-20 18:20:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1a56 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17c8 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1924 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:40.049 UTC [cauthdsl] func1 -> DEBU 1beb 0xc000ae9480 gate 1589998900049044900 evaluation starts" +peer1.org2.example.com | [18fc 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a57 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17c9 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 principal matched by identity 0 +peer0.org2.example.com | [1925 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.049 UTC [cauthdsl] func2 -> DEBU 1bec 0xc000ae9480 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [18fd 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a58 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [17ca 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [1926 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-05-20 18:21:40.049 UTC [cauthdsl] func2 -> DEBU 1bed 0xc000ae9480 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [18fe 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a59 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1927 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +orderer0.example.com | "2020-05-20 18:21:40.049 UTC [cauthdsl] func2 -> DEBU 1bee 0xc000ae9480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [18ff 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1a5a 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | [17cb 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | [1900 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.049 UTC [cauthdsl] func2 -> DEBU 1bef 0xc000ae9480 principal evaluation fails" +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1928 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:40.050 UTC [cauthdsl] func1 -> DEBU 1bf0 0xc000ae9480 gate 1589998900049044900 evaluation fails" +peer1.org1.example.com | [1a5b 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org2.example.com | [1902 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:40.050 UTC [policies] Evaluate -> DEBU 1bf1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org2.example.com | [1903 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:40.050 UTC [policies] Evaluate -> DEBU 1bf2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer0.org1.example.com | [17cc 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1904 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:40.050 UTC [policies] Evaluate -> DEBU 1bf3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer0.org1.example.com | [17cd 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 gate 1589998831648825100 evaluation succeeds +peer1.org2.example.com | [1905 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:40.050 UTC [cauthdsl] func1 -> DEBU 1bf4 0xc000ae9d80 gate 1589998900050941800 evaluation starts" +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1929 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [17ce 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1906 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.051 UTC [cauthdsl] func2 -> DEBU 1bf5 0xc000ae9d80 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1a5c 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192a 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17cf 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1908 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.051 UTC [cauthdsl] func2 -> DEBU 1bf6 0xc000ae9d80 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [1a5d 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192b 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d0 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1909 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.051 UTC [cauthdsl] func2 -> DEBU 1bf7 0xc000ae9d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | [1a5e 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [192c 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d1 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [190a 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.051 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc000ae9d80 principal evaluation fails" +peer1.org1.example.com | [1a5f 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [192d 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d2 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [190b 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.051 UTC [cauthdsl] func1 -> DEBU 1bf9 0xc000ae9d80 gate 1589998900050941800 evaluation fails" +peer1.org1.example.com | [1a60 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [192e 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d3 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [190c 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.052 UTC [policies] Evaluate -> DEBU 1bfa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1a61 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [192f 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [190d 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d4 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-05-20 18:21:40.052 UTC [policies] Evaluate -> DEBU 1bfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1a62 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1930 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [190e 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d5 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:40.052 UTC [policies] func1 -> DEBU 1bfc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer0.org2.example.com | [1931 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [190f 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d6 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:40.052 UTC [policies] Evaluate -> DEBU 1bfd Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org1.example.com | [1a63 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1932 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [1910 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d7 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:40.052 UTC [policies] Evaluate -> DEBU 1bfe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org1.example.com | [1a64 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4dcd0 gate 1589998843893227200 evaluation starts +peer0.org2.example.com | [1933 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1907 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [17d8 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-05-20 18:21:40.053 UTC [policies] Evaluate -> DEBU 1bff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1a65 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4dcd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1934 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1911 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a2d60 gate 1589998837098930900 evaluation starts +peer0.org1.example.com | [17d9 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-05-20 18:21:40.053 UTC [policies] Evaluate -> DEBU 1c00 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1a66 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4dcd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1935 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1912 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a2d60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [17da 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 gate 1589998831655930700 evaluation starts +orderer0.example.com | "2020-05-20 18:21:40.053 UTC [policies] Evaluate -> DEBU 1c01 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [1a67 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4dcd0 principal matched by identity 0 +peer0.org2.example.com | [1936 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1913 05-20 18:20:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a2d60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [17db 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:40.053 UTC [cauthdsl] func1 -> DEBU 1c02 0xc000daea70 gate 1589998900053767300 evaluation starts" +peer1.org1.example.com | [1a68 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [1937 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1914 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a2d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [17dc 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:40.053 UTC [cauthdsl] func2 -> DEBU 1c03 0xc000daea70 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1938 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1915 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a2d60 principal evaluation fails +peer0.org1.example.com | [17dd 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:40.054 UTC [cauthdsl] func2 -> DEBU 1c04 0xc000daea70 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [1a69 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | [1939 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1916 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a2d60 gate 1589998837098930900 evaluation fails +peer0.org1.example.com | [17de 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +orderer0.example.com | "2020-05-20 18:21:40.054 UTC [cauthdsl] func2 -> DEBU 1c05 0xc000daea70 principal matched by identity 0" +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | [193a 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1917 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +orderer0.example.com | "2020-05-20 18:21:40.054 UTC [msp.identity] Verify -> DEBU 1c06 Verify: digest = 00000000 a0 01 19 b1 65 db f8 5b 05 9b f8 52 51 48 6d 0a |....e..[...RQHm.| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1918 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17df 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +orderer0.example.com | 00000010 07 15 1b c3 17 88 9c 5c 2b 82 2d 97 91 d9 a9 dc |.......\+.-.....|" +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [193c 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1919 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +orderer0.example.com | "2020-05-20 18:21:40.055 UTC [msp.identity] Verify -> DEBU 1c07 Verify: sig = 00000000 30 44 02 20 45 f5 21 26 b9 b8 fc 39 a1 ba da 6c |0D. E.!&...9...l| +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [193d 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [191a 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a32d0 gate 1589998837103652100 evaluation starts +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +orderer0.example.com | 00000010 af a2 38 80 0d 56 b9 27 9f 76 b9 ab f3 37 7b 2e |..8..V.'.v...7{.| +peer1.org1.example.com | [1a6a 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4dcd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [193e 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5220 gate 1589998833175265900 evaluation starts +peer1.org2.example.com | [191b 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a32d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +orderer0.example.com | 00000020 d2 a0 6b d6 02 20 1f a9 38 6a f3 51 4b 6f 94 de |..k.. ..8j.QKo..| +peer1.org1.example.com | [1a6b 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4dcd0 gate 1589998843893227200 evaluation succeeds +peer0.org2.example.com | [193f 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [191c 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a32d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +orderer0.example.com | 00000030 87 6c fa 2d ef 4e 39 de 5f 92 e4 b6 d3 d6 11 ca |.l.-.N9._.......| +peer1.org1.example.com | [1a6c 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1940 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5220 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [17e0 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [191d 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a32d0 principal matched by identity 0 +orderer0.example.com | 00000040 79 8b 16 39 94 d1 |y..9..|" +peer1.org1.example.com | [1a6d 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1941 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [17e1 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 gate 1589998831655930700 evaluation succeeds +peer1.org2.example.com | [191e 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +orderer0.example.com | "2020-05-20 18:21:40.055 UTC [cauthdsl] func2 -> DEBU 1c08 0xc000daea70 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [1a6e 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1942 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5220 principal evaluation fails +peer0.org1.example.com | [17e2 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +orderer0.example.com | "2020-05-20 18:21:40.055 UTC [cauthdsl] func1 -> DEBU 1c09 0xc000daea70 gate 1589998900053767300 evaluation succeeds" +peer1.org1.example.com | [1a6f 05-20 18:20:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1943 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5220 gate 1589998833175265900 evaluation fails +peer0.org1.example.com | [17e3 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [191f 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +orderer0.example.com | "2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1a70 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | [1944 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17e4 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +orderer0.example.com | "2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1945 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17e5 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +orderer0.example.com | "2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0c Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1a71 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | [1946 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [17e6 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +orderer0.example.com | "2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | [1947 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5790 gate 1589998833179730100 evaluation starts +peer0.org1.example.com | [17e7 05-20 18:20:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 a6 d7 b2 26 29 cb |...&).| +orderer0.example.com | "2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0e Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | [1948 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5790 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [17e8 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1920 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a32d0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | [1949 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5790 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [17e9 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1921 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a32d0 gate 1589998837103652100 evaluation succeeds +orderer0.example.com | "2020-05-20 18:21:40.057 UTC [common.deliver] deliverBlocks -> DEBU 1c10 [channel: businesschannel] Received seekInfo (0xc000310300) start: > stop: > from 172.18.0.9:53676" +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [194a 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5790 principal matched by identity 0 +peer0.org1.example.com | [17ea 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1922 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:40.057 UTC [fsblkstorage] Next -> DEBU 1c11 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org1.example.com | [1a72 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [194b 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +peer0.org1.example.com | [17eb 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1923 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-05-20 18:21:40.057 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c12 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56644]" +peer1.org1.example.com | [1a73 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +peer0.org1.example.com | [17ec 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1924 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:40.057 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c13 Remaining bytes=[81928], Going to peek [8] bytes" +peer1.org1.example.com | [1a74 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [194c 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +peer0.org1.example.com | [17ed 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1925 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:40.058 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c14 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56644], bytesOffset=[56647]}" +peer1.org1.example.com | [1a75 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +peer0.org1.example.com | [17ee 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1926 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:40.058 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c15 blockbytes [28171] read from file [0]" +peer1.org1.example.com | [1a76 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17ef 05-20 18:20:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +peer1.org2.example.com | [1927 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-05-20 18:21:40.058 UTC [common.deliver] deliverBlocks -> DEBU 1c16 [channel: businesschannel] Delivering block [2] for (0xc000310300) for 172.18.0.9:53676" +peer1.org1.example.com | [1a77 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [17f0 05-20 18:20:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +peer1.org2.example.com | [1928 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:40.059 UTC [common.deliver] deliverBlocks -> DEBU 1c17 [channel: businesschannel] Done delivering to 172.18.0.9:53676 for (0xc000310300)" +peer1.org1.example.com | [1a78 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17f1 05-20 18:20:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 ea 2b 5a 57 a9 df |.+ZW..| +peer1.org2.example.com | [1929 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:40.060 UTC [common.deliver] Handle -> DEBU 1c18 Waiting for new SeekInfo from 172.18.0.9:53676" +peer1.org1.example.com | [1a79 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17f2 05-20 18:20:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [194d 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5790 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [192a 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-05-20 18:21:40.060 UTC [common.deliver] Handle -> DEBU 1c19 Attempting to read seek info message from 172.18.0.9:53676" +peer1.org1.example.com | [1a7a 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [17f3 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [194e 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b5790 gate 1589998833179730100 evaluation succeeds +peer1.org2.example.com | [192b 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.066 UTC [grpc] infof -> DEBU 1c1a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | [1a7b 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [17f4 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [194f 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [192c 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.066 UTC [common.deliver] Handle -> WARN 1c1b Error reading from 172.18.0.9:53676: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [17f5 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a7c 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1950 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [192d 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.067 UTC [orderer.common.server] func1 -> DEBU 1c1c Closing Deliver stream" +peer0.org1.example.com | [17f6 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a7d 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67810 gate 1589998843909068900 evaluation starts +peer0.org2.example.com | [1951 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [192e 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +orderer0.example.com | "2020-05-20 18:21:40.068 UTC [comm.grpc.server] 1 -> INFO 1c1d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53676 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.7134ms +peer0.org1.example.com | [17f7 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a7e 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1952 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [192f 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.271 UTC [orderer.common.server] Deliver -> DEBU 1c1e Starting new Deliver handler" +peer0.org1.example.com | [17f8 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a7f 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67810 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1953 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1930 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.271 UTC [common.deliver] Handle -> DEBU 1c1f Starting new deliver loop for 172.18.0.9:53678" +peer0.org1.example.com | [17f9 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a80 05-20 18:20:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67810 principal matched by identity 0 +peer0.org2.example.com | [1954 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1931 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17fa 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.271 UTC [common.deliver] Handle -> DEBU 1c20 Attempting to read seek info message from 172.18.0.9:53678" +peer1.org1.example.com | [1a81 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [1955 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1932 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17fb 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.274 UTC [policies] Evaluate -> DEBU 1c21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1956 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1933 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [17fc 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.275 UTC [policies] Evaluate -> DEBU 1c22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1a82 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | [1957 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1934 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17fd 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.275 UTC [policies] Evaluate -> DEBU 1c23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | [1958 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1935 05-20 18:20:37.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer0.org1.example.com | [17fe 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.275 UTC [policies] Evaluate -> DEBU 1c24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [1936 05-20 18:20:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [17ff 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.275 UTC [policies] Evaluate -> DEBU 1c25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [195a 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1937 05-20 18:20:37.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161022 +peer0.org1.example.com | [1800 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.276 UTC [cauthdsl] func1 -> DEBU 1c26 0xc0005be780 gate 1589998900276133700 evaluation starts" +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [195b 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1938 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F6DF8E7541283C92BDE8FD1C2ACAE1FFE23BDADB515CAB6D9F6AEF095547AE53 +peer0.org1.example.com | [1801 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.276 UTC [cauthdsl] func2 -> DEBU 1c27 0xc0005be780 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1a83 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [195c 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1939 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1802 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.276 UTC [cauthdsl] func2 -> DEBU 1c28 0xc0005be780 processing identity 0 with bytes of fe0d40" +peer1.org1.example.com | [1a84 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67810 gate 1589998843909068900 evaluation succeeds +peer0.org2.example.com | [195d 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [193a 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1803 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.276 UTC [cauthdsl] func2 -> DEBU 1c29 0xc0005be780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org1.example.com | [1a85 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [195e 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [195f 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive: alive: alive: +peer1.org2.example.com | [193b 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer0.example.com | "2020-05-20 18:21:40.276 UTC [cauthdsl] func2 -> DEBU 1c2a 0xc0005be780 principal evaluation fails" +peer1.org1.example.com | [1a86 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1960 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1804 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1961 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1805 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1962 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1963 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1964 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [193c 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\021\375\036\027\337P\373\r\002 j\331\303\333\270\334.N\263\022W\231\027\013\352wob>`\212P\345\017\344Dt5I/\3532" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1a87 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1806 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1965 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1966 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1967 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +peer0.org2.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +peer0.org1.example.com | [1807 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a88 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:40.277 UTC [cauthdsl] func1 -> DEBU 1c2b 0xc0005be780 gate 1589998900276133700 evaluation fails" +peer1.org2.example.com | [193d 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1968 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +peer0.org1.example.com | [1808 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a89 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +orderer0.example.com | "2020-05-20 18:21:40.277 UTC [policies] Evaluate -> DEBU 1c2c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [193e 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\021\375\036\027\337P\373\r\002 j\331\303\333\270\334.N\263\022W\231\027\013\352wob>`\212P\345\017\344Dt5I/\3532" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer0.org1.example.com | [1809 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1a8a 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:40.277 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +peer0.org1.example.com | [180a 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:40.278 UTC [policies] Evaluate -> DEBU 1c2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.278 UTC [cauthdsl] func1 -> DEBU 1c2f 0xc0005befc0 gate 1589998900278435000 evaluation starts" +peer1.org2.example.com | [193f 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [180b 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:21:40.278 UTC [cauthdsl] func2 -> DEBU 1c30 0xc0005befc0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1940 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +peer0.org1.example.com | [180c 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:40.278 UTC [cauthdsl] func2 -> DEBU 1c31 0xc0005befc0 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | [1941 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +peer0.org1.example.com | [180d 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | "2020-05-20 18:21:40.279 UTC [cauthdsl] func2 -> DEBU 1c32 0xc0005befc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:40.279 UTC [cauthdsl] func2 -> DEBU 1c33 0xc0005befc0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.279 UTC [cauthdsl] func1 -> DEBU 1c34 0xc0005befc0 gate 1589998900278435000 evaluation fails" +peer0.org1.example.com | [180e 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1969 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:40.279 UTC [policies] Evaluate -> DEBU 1c35 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1942 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [180f 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a8b 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | [196a 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:40.280 UTC [policies] Evaluate -> DEBU 1c36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1943 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1810 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1811 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1a8c 05-20 18:20:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1a8d 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a8e 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a8f 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1812 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1813 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +peer0.org1.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +peer0.org1.example.com | [1814 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +peer0.org1.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +peer0.org1.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +peer0.org1.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer0.org1.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer0.org1.example.com | [1815 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2020-05-20 18:21:40.280 UTC [policies] Evaluate -> DEBU 1c37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | [1816 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 75 e3 05 4a 52 2a d4 fc 22 77 e6 |0D. ~u..JR*.."w.| +orderer0.example.com | "2020-05-20 18:21:40.281 UTC [cauthdsl] func1 -> DEBU 1c38 0xc0005bf8d0 gate 1589998900281022300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:40.281 UTC [cauthdsl] func2 -> DEBU 1c39 0xc0005bf8d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:40.281 UTC [cauthdsl] func2 -> DEBU 1c3a 0xc0005bf8d0 processing identity 0 with bytes of fe0d40" +peer0.org1.example.com | 00000010 13 1e 53 ea 72 bc cb 53 9a 37 15 76 8b 1a 6d 9d |..S.r..S.7.v..m.| +peer0.org1.example.com | 00000020 05 c7 46 a3 02 20 73 ca c7 88 91 7f 05 da 5c f1 |..F.. s.......\.| +peer0.org1.example.com | 00000030 4e 03 0a 69 9c 9e 67 52 bd 84 54 5a ba 51 fa c1 |N..i..gR..TZ.Q..| +peer0.org1.example.com | 00000040 7f a4 ab aa 74 fd |....t.| +peer0.org1.example.com | [1817 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1818 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1819 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [181a 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [181b 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [181c 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [181d 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [181e 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [181f 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1820 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1821 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1822 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1823 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [1a90 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1824 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [1825 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1826 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1827 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1828 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1829 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [182a 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [182b 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [182c 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [182d 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [182e 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [182f 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1830 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.282 UTC [cauthdsl] func2 -> DEBU 1c3b 0xc0005bf8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | [1831 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1832 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:40.282 UTC [cauthdsl] func2 -> DEBU 1c3c 0xc0005bf8d0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.283 UTC [cauthdsl] func1 -> DEBU 1c3d 0xc0005bf8d0 gate 1589998900281022300 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.283 UTC [policies] Evaluate -> DEBU 1c3e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:40.283 UTC [policies] Evaluate -> DEBU 1c3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:40.283 UTC [policies] func1 -> DEBU 1c40 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c41 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c42 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c45 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.285 UTC [cauthdsl] func1 -> DEBU 1c46 0xc000d94730 gate 1589998900285043300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:40.285 UTC [cauthdsl] func2 -> DEBU 1c47 0xc000d94730 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:40.285 UTC [cauthdsl] func2 -> DEBU 1c48 0xc000d94730 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:40.285 UTC [cauthdsl] func2 -> DEBU 1c49 0xc000d94730 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:40.285 UTC [msp.identity] Verify -> DEBU 1c4a Verify: digest = 00000000 b6 8f 52 bb f0 47 f2 57 b5 2b 05 a2 5e 95 e9 99 |..R..G.W.+..^...| +peer1.org1.example.com | [1a91 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a92 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a93 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a94 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a95 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d837f0 gate 1589998843925846300 evaluation starts +peer1.org1.example.com | [1a96 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d837f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000010 98 ff 8f 65 83 7f ba ca 9a 2a 77 d0 a4 8b 8e ed |...e.....*w.....|" +peer1.org1.example.com | [1a97 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d837f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [196b 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1833 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1944 05-20 18:20:37.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.286 UTC [msp.identity] Verify -> DEBU 1c4b Verify: sig = 00000000 30 45 02 21 00 d0 17 68 e6 3f b3 2f ef 2d 1f 3c |0E.!...h.?./.-.<| +peer1.org1.example.com | [1a98 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d837f0 principal matched by identity 0 +peer0.org2.example.com | [196c 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [196d 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer0.org2.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer0.org2.example.com | [196e 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer0.org2.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer0.org2.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer0.org2.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer0.org2.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer0.org2.example.com | [196f 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1970 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1971 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1972 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1973 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1974 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1975 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1834 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1976 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1835 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [1945 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1977 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1836 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1837 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a99 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +orderer0.example.com | 00000010 6e 5a 1c bf c0 7b 1b fa fe 49 86 0b 82 1e 4c 39 |nZ...{...I....L9| +peer0.org1.example.com | [1838 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1839 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [183a 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [183b 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [183c 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [183d 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [183e 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [183f 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1840 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1841 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1842 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1843 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1844 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1845 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1846 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1847 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1848 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1849 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 gate 1589998832818011300 evaluation starts +peer0.org1.example.com | [184a 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [184b 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1946 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1947 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [184c 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 principal matched by identity 0 +peer0.org1.example.com | [184d 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +peer1.org2.example.com | [1948 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1978 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1979 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f01c0 gate 1589998833218399000 evaluation starts +peer1.org1.example.com | [1a9a 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +peer1.org2.example.com | [1949 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | 00000020 20 58 a3 1d 97 02 20 69 57 f3 31 be 0a 87 f1 13 | X.... iW.1.....| +orderer0.example.com | 00000030 2c b2 96 dc 95 94 15 da 8c 0d fc b8 38 93 28 9c |,...........8.(.| +peer0.org2.example.com | [197a 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f01c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [197b 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f01c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [197c 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f01c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +orderer0.example.com | 00000040 c8 77 08 5d b7 a2 75 |.w.]..u|" +orderer0.example.com | "2020-05-20 18:21:40.286 UTC [cauthdsl] func2 -> DEBU 1c4c 0xc000d94730 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:40.286 UTC [cauthdsl] func1 -> DEBU 1c4d 0xc000d94730 gate 1589998900285043300 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:40.286 UTC [policies] Evaluate -> DEBU 1c4e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:40.286 UTC [policies] Evaluate -> DEBU 1c4f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:40.287 UTC [policies] Evaluate -> DEBU 1c50 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:40.287 UTC [policies] Evaluate -> DEBU 1c51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:40.287 UTC [policies] Evaluate -> DEBU 1c52 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:40.287 UTC [policies] Evaluate -> DEBU 1c53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [1a9b 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-05-20 18:21:40.287 UTC [common.deliver] deliverBlocks -> DEBU 1c54 [channel: businesschannel] Received seekInfo (0xc000585180) start: > stop: > from 172.18.0.9:53678" +peer1.org1.example.com | [1a9c 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d837f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [184e 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +peer1.org2.example.com | [194a 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [197d 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f01c0 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:40.287 UTC [fsblkstorage] Next -> DEBU 1c55 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org1.example.com | [1a9d 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d837f0 gate 1589998843925846300 evaluation succeeds +peer0.org1.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer0.org1.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +peer0.org1.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +peer0.org1.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +peer0.org1.example.com | [184f 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [194b 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1850 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 gate 1589998832818011300 evaluation succeeds +peer0.org2.example.com | [197e 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f01c0 gate 1589998833218399000 evaluation fails +orderer0.example.com | "2020-05-20 18:21:40.291 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c56 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84818]" +peer0.org1.example.com | [1851 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [197f 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1980 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a9e 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a9f 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1aa0 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-05-20 18:21:40.293 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c57 Remaining bytes=[53754], Going to peek [8] bytes" +peer0.org2.example.com | [1981 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1aa1 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1aa2 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [194c 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1852 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1982 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0730 gate 1589998833222264100 evaluation starts +peer1.org1.example.com | [1aa3 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [194d 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:40.293 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c58 Returning blockbytes - length=[4549], placementInfo={fileNum=[0], startOffset=[84818], bytesOffset=[84820]}" +peer0.org1.example.com | [1853 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1983 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0730 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1aa4 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | [194e 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:40.293 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c59 blockbytes [4549] read from file [0]" +peer0.org1.example.com | [1854 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1984 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0730 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +orderer0.example.com | "2020-05-20 18:21:40.293 UTC [common.deliver] deliverBlocks -> DEBU 1c5a [channel: businesschannel] Delivering block [3] for (0xc000585180) for 172.18.0.9:53678" +peer1.org2.example.com | [194f 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1855 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1985 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0730 principal matched by identity 0 +peer1.org1.example.com | [1aa5 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +orderer0.example.com | "2020-05-20 18:21:40.294 UTC [common.deliver] deliverBlocks -> DEBU 1c5b [channel: businesschannel] Done delivering to 172.18.0.9:53678 for (0xc000585180)" +peer1.org2.example.com | [1950 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1856 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1986 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +orderer0.example.com | "2020-05-20 18:21:40.294 UTC [common.deliver] Handle -> DEBU 1c5c Waiting for new SeekInfo from 172.18.0.9:53678" +peer1.org2.example.com | [1951 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e1180 gate 1589998837179744100 evaluation starts +peer0.org1.example.com | [1857 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +orderer0.example.com | "2020-05-20 18:21:40.295 UTC [common.deliver] Handle -> DEBU 1c5d Attempting to read seek info message from 172.18.0.9:53678" +peer1.org2.example.com | [1952 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e1180 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1858 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1987 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +orderer0.example.com | "2020-05-20 18:21:40.304 UTC [common.deliver] Handle -> WARN 1c5e Error reading from 172.18.0.9:53678: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [1953 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e1180 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1859 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +orderer0.example.com | "2020-05-20 18:21:40.304 UTC [orderer.common.server] func1 -> DEBU 1c5f Closing Deliver stream" +peer1.org2.example.com | [1954 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e1180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1955 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e1180 principal evaluation fails +peer1.org2.example.com | [1956 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e1180 gate 1589998837179744100 evaluation fails +peer1.org1.example.com | [1aa6 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +peer1.org2.example.com | [1957 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [185a 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | 00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +orderer0.example.com | "2020-05-20 18:21:40.304 UTC [grpc] infof -> DEBU 1c60 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [1958 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [185b 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aa7 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +peer0.org2.example.com | [1988 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0730 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1959 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [185c 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | [1989 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0730 gate 1589998833222264100 evaluation succeeds +peer1.org2.example.com | [195a 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e16f0 gate 1589998837182565600 evaluation starts +orderer0.example.com | "2020-05-20 18:21:40.304 UTC [comm.grpc.server] 1 -> INFO 1c61 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53678 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5158ms +peer0.org1.example.com | [185d 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [198a 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [195b 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e16f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:40.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c62 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [185e 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | [198b 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [195c 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e16f0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:40.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c63 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +peer0.org1.example.com | [185f 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | [198c 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [195d 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e16f0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:40.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c64 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.9µs " +peer0.org1.example.com | [1860 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [198d 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [195e 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +orderer0.example.com | "2020-05-20 18:21:40.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c65 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +peer0.org1.example.com | [1861 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1aa8 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [198e 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +orderer0.example.com | "2020-05-20 18:21:40.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c66 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2020-05-20 18:21:40.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 275.5µs " +orderer0.example.com | "2020-05-20 18:21:40.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.1µs " +peer0.org1.example.com | [1862 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101D +peer0.org2.example.com | [198f 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1589998788834158300, 29 but got ts: inc_num:1589998788834158300 seq_num:28 +peer0.org2.example.com | [1990 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1991 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [195f 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +peer1.org1.example.com | [1aa9 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1992 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +peer0.org1.example.com | [1863 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4686D4B0023938706A1B7BE1225A58B98D22E3EAECE389D5A5A812D17C2E221F +orderer0.example.com | "2020-05-20 18:21:40.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c69 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1aaa 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1993 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +peer0.org1.example.com | [1864 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-05-20 18:21:40.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1aab 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1994 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +peer0.org1.example.com | [1865 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-05-20 18:21:40.551 UTC [orderer.common.server] Deliver -> DEBU 1c6b Starting new Deliver handler" +peer1.org1.example.com | [1aac 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1995 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | 00000040 a6 d7 b2 26 29 cb |...&).| +peer0.org1.example.com | [1866 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +orderer0.example.com | "2020-05-20 18:21:40.551 UTC [common.deliver] Handle -> DEBU 1c6c Starting new deliver loop for 172.18.0.9:53680" +peer1.org1.example.com | [1aad 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1996 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +peer1.org2.example.com | [1960 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e16f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1867 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-05-20 18:21:40.552 UTC [common.deliver] Handle -> DEBU 1c6d Attempting to read seek info message from 172.18.0.9:53680" +peer1.org1.example.com | [1aae 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1aaf 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +peer0.org1.example.com | [1868 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.553 UTC [policies] Evaluate -> DEBU 1c6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [1ab0 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1997 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +peer1.org2.example.com | [1961 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e16f0 gate 1589998837182565600 evaluation succeeds +peer0.org1.example.com | [1869 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.553 UTC [policies] Evaluate -> DEBU 1c6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1ab1 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3970 gate 1589998843971187300 evaluation starts +peer1.org2.example.com | [1962 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1963 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1ab2 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3970 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [186a 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive: +orderer0.example.com | "2020-05-20 18:21:40.553 UTC [policies] Evaluate -> DEBU 1c70 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | [1964 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer1.org1.example.com | [1ab3 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3970 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [186b 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.554 UTC [policies] Evaluate -> DEBU 1c71 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1965 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +peer0.org1.example.com | [186c 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [186d 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:40.554 UTC [policies] Evaluate -> DEBU 1c72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org2.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +orderer0.example.com | "2020-05-20 18:21:40.554 UTC [cauthdsl] func1 -> DEBU 1c73 0xc000d83280 gate 1589998900554393700 evaluation starts" +peer1.org2.example.com | [1966 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +peer0.org1.example.com | [186e 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [186f 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1870 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1967 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1998 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [1871 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [1872 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.554 UTC [cauthdsl] func2 -> DEBU 1c74 0xc000d83280 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1968 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1969 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer0.org2.example.com | [1999 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 91 98 4d 04 46 dd d4 85 1e 11 89 |0D. X..M.F......| +peer0.org1.example.com | [1873 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.554 UTC [cauthdsl] func2 -> DEBU 1c75 0xc000d83280 processing identity 0 with bytes of fe0d40" +peer1.org2.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer0.org2.example.com | 00000010 39 a2 f9 86 e4 f5 c8 f7 5f 74 be 28 d7 28 91 ba |9......._t.(.(..| +peer1.org1.example.com | [1ab4 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3970 principal matched by identity 0 +peer0.org1.example.com | [1874 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.554 UTC [cauthdsl] func2 -> DEBU 1c76 0xc000d83280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [cauthdsl] func2 -> DEBU 1c77 0xc000d83280 principal evaluation fails" +peer1.org2.example.com | [196a 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer1.org1.example.com | [1ab5 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | [1875 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [cauthdsl] func1 -> DEBU 1c78 0xc000d83280 gate 1589998900554393700 evaluation fails" +peer1.org2.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer0.org2.example.com | 00000020 f1 1e 4d 21 02 20 75 c0 4e 80 86 8d f9 33 b2 aa |..M!. u.N....3..| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1876 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [policies] Evaluate -> DEBU 1c79 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | 00000030 48 fb be f1 65 3e a0 95 85 da 8f 01 cb 3c 96 d7 |H...e>.......<..| +peer1.org1.example.com | [1ab6 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer0.org2.example.com | 00000040 52 d8 bd 8d c2 bb |R.....| +peer0.org2.example.com | [199a 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer1.org2.example.com | [196b 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [policies] Evaluate -> DEBU 1c7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [199b 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [1877 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [policies] Evaluate -> DEBU 1c7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [cauthdsl] func1 -> DEBU 1c7c 0xc000d83d00 gate 1589998900555581500 evaluation starts" +peer0.org2.example.com | [199c 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1878 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [196c 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [cauthdsl] func2 -> DEBU 1c7d 0xc000d83d00 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [199d 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ab7 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3970 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1879 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [196d 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [cauthdsl] func2 -> DEBU 1c7e 0xc000d83d00 processing identity 0 with bytes of fe0d40" +peer0.org2.example.com | [199e 05-20 18:20:33.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ab8 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da3970 gate 1589998843971187300 evaluation succeeds +peer0.org1.example.com | [187a 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [196e 05-20 18:20:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 df 8e 75 41 28 3c 92 bd e8 fd 1c 2a ca e1 ff |...uA(<.....*...| +orderer0.example.com | "2020-05-20 18:21:40.555 UTC [cauthdsl] func2 -> DEBU 1c7f 0xc000d83d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org2.example.com | [199f 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ab9 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [187b 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 e2 3b da db 51 5c ab 6d 9f 6a ef 09 55 47 ae 53 |.;..Q\.m.j..UG.S| +peer1.org2.example.com | [196f 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 2d 39 bd 82 9d 7e e7 78 8e ca |0D. V7-9...~.x..| +peer1.org2.example.com | 00000010 72 18 11 31 44 d3 9d 70 bb ab dd d9 2a 04 da 69 |r..1D..p....*..i| +peer1.org2.example.com | 00000020 21 82 ce 59 02 20 60 bd e8 cc f9 2a 63 95 fa a4 |!..Y. `....*c...| +peer1.org2.example.com | 00000030 22 eb b5 da 6b 84 0c ff 38 07 3f 03 6a 78 9e 5a |"...k...8.?.jx.Z| +peer1.org2.example.com | 00000040 72 b3 60 b0 47 92 |r.`.G.| +peer1.org2.example.com | [1970 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [19a0 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1971 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1972 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19a1 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 30 0b d1 02 88 00 a6 3f 0b b3 be 7a 4b 35 bc |.0......?...zK5.| +peer0.org1.example.com | [187c 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c80 0xc000d83d00 principal evaluation fails" +peer0.org2.example.com | 00000010 e2 d2 42 2f 17 2c e3 30 bf a0 03 b3 ea cf 36 50 |..B/.,.0......6P| +peer1.org1.example.com | [1aba 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [187d 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [cauthdsl] func1 -> DEBU 1c81 0xc000d83d00 gate 1589998900555581500 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [policies] Evaluate -> DEBU 1c82 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [19a2 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 26 ca 86 55 15 5c cb f4 a0 57 77 |0D. o&..U.\...Ww| +peer1.org1.example.com | [1abb 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [187e 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [policies] Evaluate -> DEBU 1c83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1973 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 f3 34 72 6b d5 21 fc a8 e4 e3 b0 04 34 0d 80 c5 |.4rk.!......4...| +peer1.org1.example.com | [1abc 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [187f 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [policies] Evaluate -> DEBU 1c84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | [1974 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1975 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 bd 25 0e 1b 02 20 2b d7 b2 e8 e0 43 60 56 cc 26 |.%... +....C`V.&| +peer0.org1.example.com | [1880 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1abd 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 da ae fd f7 ec a4 f7 82 12 50 e7 09 be 39 2f f5 |.........P...9/.| +peer0.org2.example.com | 00000040 1c 76 cc 3b 71 aa |.v.;q.| +peer1.org2.example.com | [1976 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [cauthdsl] func1 -> DEBU 1c85 0xc000cba540 gate 1589998900556538300 evaluation starts" +peer0.org1.example.com | [1881 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c86 0xc000cba540 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c87 0xc000cba540 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c88 0xc000cba540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | [1882 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1977 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c89 0xc000cba540 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [cauthdsl] func1 -> DEBU 1c8a 0xc000cba540 gate 1589998900556538300 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [19a3 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [1883 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1978 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [1abe 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1884 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1979 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [policies] func1 -> DEBU 1c8d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer0.org2.example.com | [19a4 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 8c f4 0e 73 6f d8 9e c8 55 02 |0E.!.....so...U.| +peer1.org1.example.com | [1abf 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1885 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [197a 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 df 8e 75 41 28 3c 92 bd e8 fd 1c 2a ca e1 ff |...uA(<.....*...| +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c8e Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org2.example.com | 00000010 18 fb 91 12 98 51 bc a1 18 8f 24 f0 5a a3 7c a6 |.....Q....$.Z.|.| +peer1.org1.example.com | [1ac0 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1886 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 e2 3b da db 51 5c ab 6d 9f 6a ef 09 55 47 ae 53 |.;..Q\.m.j..UG.S| +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org2.example.com | 00000020 03 cd 73 9e 70 02 20 55 b5 ab 4e bc b4 ef b4 47 |..s.p. U..N....G| +peer1.org1.example.com | [1ac1 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1887 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [197b 05-20 18:20:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 2d 39 bd 82 9d 7e e7 78 8e ca |0D. V7-9...~.x..| +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | 00000030 84 9f cb e6 a0 20 1c 3f 40 7a a3 ae 9c 5b b9 f9 |..... .?@z...[..| +peer1.org1.example.com | [1ac2 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1888 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 72 18 11 31 44 d3 9d 70 bb ab dd d9 2a 04 da 69 |r..1D..p....*..i| +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1ac3 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1889 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 21 82 ce 59 02 20 60 bd e8 cc f9 2a 63 95 fa a4 |!..Y. `....*c...| +orderer0.example.com | "2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c92 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | 00000040 e2 54 6d 7c 0a ad 4f |.Tm|..O| +peer1.org1.example.com | [1ac4 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000030 22 eb b5 da 6b 84 0c ff 38 07 3f 03 6a 78 9e 5a |"...k...8.?.jx.Z| +peer1.org1.example.com | [1ac5 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbab70 gate 1589998843979939500 evaluation starts +peer1.org1.example.com | [1ac6 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbab70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ac7 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbab70 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:40.558 UTC [cauthdsl] func1 -> DEBU 1c93 0xc000cbb350 gate 1589998900558077700 evaluation starts" +peer0.org2.example.com | [19a5 05-20 18:20:33.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [19a6 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | 00000040 72 b3 60 b0 47 92 |r.`.G.| +orderer0.example.com | "2020-05-20 18:21:40.558 UTC [cauthdsl] func2 -> DEBU 1c94 0xc000cbb350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [188a 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19a7 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [197c 05-20 18:20:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [1ac8 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbab70 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:40.558 UTC [cauthdsl] func2 -> DEBU 1c95 0xc000cbb350 processing identity 0 with bytes of fe0d40" +peer0.org1.example.com | [188b 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [19a8 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [197d 05-20 18:20:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 24 55 e7 e1 9c 89 94 e2 21 58 c6 |0D. Y$U......!X.| +peer1.org2.example.com | 00000010 a4 69 8f ca 18 36 8d 95 21 c9 1e 3e 11 fd 1e 17 |.i...6..!..>....| +peer1.org1.example.com | [1ac9 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | 00000020 df 50 fb 0d 02 20 6a d9 c3 db b8 dc 2e 4e b3 12 |.P... j......N..| +peer1.org1.example.com | [1aca 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +orderer0.example.com | "2020-05-20 18:21:40.558 UTC [cauthdsl] func2 -> DEBU 1c96 0xc000cbb350 principal matched by identity 0" +peer0.org1.example.com | [188c 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 57 99 17 0b ea 77 6f 62 3e 60 8a 50 e5 0f e4 44 |W....wob>`.P...D| +peer0.org2.example.com | [19a9 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +orderer0.example.com | "2020-05-20 18:21:40.558 UTC [msp.identity] Verify -> DEBU 1c97 Verify: digest = 00000000 8a a8 81 01 3d 5a bc 93 9f ed 87 75 cf 1d 5a a6 |....=Z.....u..Z.| +peer0.org1.example.com | [188d 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 74 35 49 2f eb 32 |t5I/.2| +peer1.org2.example.com | [197e 05-20 18:20:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [19aa 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19ab 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [188e 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [197f 05-20 18:20:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [188f 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 41 da a9 72 51 f6 0c 95 18 a5 45 7e f2 a5 ce 9f |A..rQ.....E~....|" +peer1.org2.example.com | [1980 05-20 18:20:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1981 05-20 18:20:37.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org1.example.com | [1890 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-05-20 18:21:40.558 UTC [msp.identity] Verify -> DEBU 1c98 Verify: sig = 00000000 30 45 02 21 00 e5 ee d6 bb ea 52 49 8e c8 76 85 |0E.!......RI..v.| +peer1.org2.example.com | [1982 05-20 18:20:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [19ad 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1891 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | 00000010 86 0c 8e 9a 53 63 ee 14 9b c0 85 dd 26 dd 00 c8 |....Sc......&...| +peer1.org2.example.com | [1983 05-20 18:20:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1acb 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbab70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [19ae 05-20 18:20:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1892 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 cf d3 f7 86 84 02 20 29 a5 59 9c 67 ae d5 1f 04 |...... ).Y.g....| +peer1.org2.example.com | [1984 05-20 18:20:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1acc 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbab70 gate 1589998843979939500 evaluation succeeds +peer0.org2.example.com | [19af 05-20 18:20:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1893 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 00000030 c9 e1 59 95 0c 17 da 24 3b 20 4d fe ba 4f da 98 |..Y....$; M..O..| +peer1.org2.example.com | [1985 05-20 18:20:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1acd 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1894 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 00000040 a8 97 31 bb 82 83 60 |..1...`|" +peer1.org2.example.com | [1986 05-20 18:20:37.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ace 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19b0 05-20 18:20:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | "2020-05-20 18:21:40.559 UTC [cauthdsl] func2 -> DEBU 1c99 0xc000cbb350 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [19b1 05-20 18:20:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1895 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-05-20 18:21:40.559 UTC [cauthdsl] func1 -> DEBU 1c9a 0xc000cbb350 gate 1589998900558077700 evaluation succeeds" +peer1.org2.example.com | [1987 05-20 18:20:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1acf 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [19b2 05-20 18:20:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1896 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1988 05-20 18:20:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ad0 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [19b3 05-20 18:20:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1897 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1989 05-20 18:20:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ad1 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19b4 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1898 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ad2 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [19b5 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1899 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 gate 1589998833152963500 evaluation starts +orderer0.example.com | "2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [198a 05-20 18:20:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ad3 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19b6 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [189a 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9d Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [198b 05-20 18:20:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ad4 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [189b 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 processing identity 0 with bytes of 115a110 +orderer0.example.com | "2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:40.560 UTC [policies] Evaluate -> DEBU 1ca0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [198c 05-20 18:20:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ad5 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [189c 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 principal matched by identity 0 +orderer0.example.com | "2020-05-20 18:21:40.560 UTC [common.deliver] deliverBlocks -> DEBU 1ca1 [channel: businesschannel] Received seekInfo (0xc000585980) start: > stop: > from 172.18.0.9:53680" +peer1.org2.example.com | [198d 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ffdf0 gate 1589998837280322900 evaluation starts +peer0.org2.example.com | [19b7 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1ad6 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [189d 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 30 0b d1 02 88 00 a6 3f 0b b3 be 7a 4b 35 bc |.0......?...zK5.| +orderer0.example.com | "2020-05-20 18:21:40.560 UTC [fsblkstorage] Next -> DEBU 1ca2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-05-20 18:21:40.560 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ca3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89369]" +peer1.org2.example.com | [198e 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ffdf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ad7 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e2 d2 42 2f 17 2c e3 30 bf a0 03 b3 ea cf 36 50 |..B/.,.0......6P| +orderer0.example.com | "2020-05-20 18:21:40.560 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ca4 Remaining bytes=[49203], Going to peek [8] bytes" +peer1.org2.example.com | [198f 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ffdf0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [19b8 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ad8 05-20 18:20:43.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [189e 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 26 ca 86 55 15 5c cb f4 a0 57 77 |0D. o&..U.\...Ww| +orderer0.example.com | "2020-05-20 18:21:40.561 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ca5 Returning blockbytes - length=[4011], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +peer0.org2.example.com | [19b9 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [19ba 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1990 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ffdf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1991 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ffdf0 principal evaluation fails +orderer0.example.com | "2020-05-20 18:21:40.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ca6 blockbytes [4011] read from file [0]" +peer0.org2.example.com | [19bb 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1992 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ffdf0 gate 1589998837280322900 evaluation fails +peer1.org1.example.com | [1ad9 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 f3 34 72 6b d5 21 fc a8 e4 e3 b0 04 34 0d 80 c5 |.4rk.!......4...| +orderer0.example.com | "2020-05-20 18:21:40.563 UTC [common.deliver] deliverBlocks -> DEBU 1ca7 [channel: businesschannel] Delivering block [4] for (0xc000585980) for 172.18.0.9:53680" +peer0.org2.example.com | [19bc 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1993 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ada 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 bd 25 0e 1b 02 20 2b d7 b2 e8 e0 43 60 56 cc 26 |.%... +....C`V.&| +orderer0.example.com | "2020-05-20 18:21:40.564 UTC [common.deliver] deliverBlocks -> DEBU 1ca8 [channel: businesschannel] Done delivering to 172.18.0.9:53680 for (0xc000585980)" +peer0.org2.example.com | [19bd 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1994 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1adb 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 da ae fd f7 ec a4 f7 82 12 50 e7 09 be 39 2f f5 |.........P...9/.| +orderer0.example.com | "2020-05-20 18:21:40.565 UTC [common.deliver] Handle -> DEBU 1ca9 Waiting for new SeekInfo from 172.18.0.9:53680" +peer0.org2.example.com | [19be 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1995 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000040 1c 76 cc 3b 71 aa |.v.;q.| +orderer0.example.com | "2020-05-20 18:21:40.565 UTC [common.deliver] Handle -> DEBU 1caa Attempting to read seek info message from 172.18.0.9:53680" +peer0.org2.example.com | [19bf 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dd9d0 gate 1589998833376088600 evaluation starts +peer0.org2.example.com | [19c0 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dd9d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [19c1 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dd9d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [19c2 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dd9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [19c3 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dd9d0 principal evaluation fails +peer0.org2.example.com | [19c4 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dd9d0 gate 1589998833376088600 evaluation fails +peer0.org2.example.com | [19c5 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19c6 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19c7 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [19c8 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ddf40 gate 1589998833376686300 evaluation starts +peer0.org2.example.com | [19c9 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ddf40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [19ca 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ddf40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [19cb 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ddf40 principal matched by identity 0 +peer0.org2.example.com | [19cc 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 3b 8b 5b aa 3c 23 45 fc e5 83 b7 ad 24 dc 53 |.;.[.<#E.....$.S| +peer0.org2.example.com | 00000010 73 05 cc e8 23 0f fb 19 48 a4 8c d6 4f 13 46 4a |s...#...H...O.FJ| +peer0.org2.example.com | [19cd 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 3c 33 0a 7b a6 e7 5c fa bb 07 18 |0D. %<3.{..\....| +peer0.org2.example.com | 00000010 9a f7 bc 3f 05 97 ae f5 d2 ec 49 8d 47 84 5b 8e |...?......I.G.[.| +peer0.org2.example.com | 00000020 b4 ac cc 95 02 20 78 62 92 53 65 53 2d 0e 03 84 |..... xb.SeS-...| +peer0.org2.example.com | 00000030 ce 0f 74 ae 71 04 06 4b b1 85 80 f5 bb af 6f c4 |..t.q..K......o.| +peer0.org2.example.com | 00000040 95 7a 23 62 e6 a2 |.z#b..| +peer0.org2.example.com | [19ce 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ddf40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [19cf 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ddf40 gate 1589998833376686300 evaluation succeeds +peer0.org2.example.com | [19d0 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [19d1 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [19d3 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [19d4 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [19d5 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1996 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128360 gate 1589998837284435600 evaluation starts +peer0.org2.example.com | [19d2 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1997 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128360 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1998 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128360 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1999 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128360 principal matched by identity 0 +peer1.org2.example.com | [199a 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer1.org2.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer1.org2.example.com | [199b 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer1.org2.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer1.org2.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer1.org2.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer1.org2.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer1.org2.example.com | [199c 05-20 18:20:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128360 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [199d 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004128360 gate 1589998837284435600 evaluation succeeds +peer1.org2.example.com | [199e 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [199f 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [19a0 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [19a1 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [19a2 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19a3 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19a4 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [19a5 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer1.org2.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer1.org2.example.com | [19a6 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer1.org2.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer1.org2.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer1.org2.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer1.org2.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer1.org2.example.com | [19a7 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19a8 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19a9 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [19aa 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 df 8e 75 41 28 3c 92 bd e8 fd 1c 2a ca e1 ff |...uA(<.....*...| +peer1.org2.example.com | 00000010 e2 3b da db 51 5c ab 6d 9f 6a ef 09 55 47 ae 53 |.;..Q\.m.j..UG.S| +peer1.org2.example.com | [19ab 05-20 18:20:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 2d 39 bd 82 9d 7e e7 78 8e ca |0D. V7-9...~.x..| +peer1.org2.example.com | 00000010 72 18 11 31 44 d3 9d 70 bb ab dd d9 2a 04 da 69 |r..1D..p....*..i| +peer1.org2.example.com | 00000020 21 82 ce 59 02 20 60 bd e8 cc f9 2a 63 95 fa a4 |!..Y. `....*c...| +peer1.org2.example.com | 00000030 22 eb b5 da 6b 84 0c ff 38 07 3f 03 6a 78 9e 5a |"...k...8.?.jx.Z| +peer1.org2.example.com | 00000040 72 b3 60 b0 47 92 |r.`.G.| +peer1.org2.example.com | [19ac 05-20 18:20:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19ad 05-20 18:20:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19ae 05-20 18:20:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19af 05-20 18:20:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19b0 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19b1 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19b2 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19b3 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [19b4 05-20 18:20:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [189f 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [18a0 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 gate 1589998833152963500 evaluation succeeds +peer0.org1.example.com | [18a1 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18a2 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18a3 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [18a4 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [18a5 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18a6 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [18a7 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [18a8 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [18a9 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [18aa 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18ab 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18ac 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18ad 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [18ae 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18af 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18b0 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18b1 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [18b2 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [18b3 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1adc 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1add 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ade 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbbf80 gate 1589998843992558700 evaluation starts +peer1.org1.example.com | [1adf 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbbf80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ae0 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbbf80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1ae1 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbbf80 principal matched by identity 0 +peer1.org1.example.com | [1ae2 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 b0 5c c2 e3 83 1e 58 ad 3c a4 47 df 79 56 0a |..\....X.<.G.yV.| +peer1.org1.example.com | 00000010 6a cb e2 89 a5 79 3d 0c 4d 6e 08 a0 3a 8b 8f 01 |j....y=.Mn..:...| +peer1.org1.example.com | [1ae3 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e d9 ae d2 ca ac 52 8f 5c fa e0 66 |0D. ~.....R.\..f| +peer1.org1.example.com | 00000010 64 8f 5a 79 19 cb bb 16 e0 72 db cc 26 01 9b 2a |d.Zy.....r..&..*| +peer1.org1.example.com | 00000020 8d 11 d5 a3 02 20 5d be 9b 01 2a ce a8 9e 05 5e |..... ]...*....^| +peer1.org1.example.com | 00000030 23 6f b0 b2 99 59 67 ba df c9 f5 3e 4d 19 4e db |#o...Yg....>M.N.| +peer1.org1.example.com | 00000040 a2 ca 5e 89 4f 84 |..^.O.| +peer1.org1.example.com | [1ae4 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbbf80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ae5 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbbf80 gate 1589998843992558700 evaluation succeeds +peer1.org1.example.com | [1ae6 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ae7 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ae8 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ae9 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1aea 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1aeb 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1aec 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1aed 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-05-20 18:21:40.575 UTC [grpc] warningf -> DEBU 1cab transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:53680: read: connection reset by peer" +orderer0.example.com | "2020-05-20 18:21:40.575 UTC [grpc] infof -> DEBU 1cac transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:40.575 UTC [common.deliver] Handle -> WARN 1cad Error reading from 172.18.0.9:53680: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:40.576 UTC [orderer.common.server] func1 -> DEBU 1cae Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:40.578 UTC [comm.grpc.server] 1 -> INFO 1caf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53680 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1164ms +orderer0.example.com | "2020-05-20 18:21:40.795 UTC [orderer.common.server] Deliver -> DEBU 1cb0 Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:40.795 UTC [common.deliver] Handle -> DEBU 1cb1 Starting new deliver loop for 172.18.0.9:53682" +orderer0.example.com | "2020-05-20 18:21:40.796 UTC [common.deliver] Handle -> DEBU 1cb2 Attempting to read seek info message from 172.18.0.9:53682" +orderer0.example.com | "2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.798 UTC [cauthdsl] func1 -> DEBU 1cb8 0xc000c8b680 gate 1589998900798750200 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:40.798 UTC [cauthdsl] func2 -> DEBU 1cb9 0xc000c8b680 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:40.799 UTC [cauthdsl] func2 -> DEBU 1cba 0xc000c8b680 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:40.799 UTC [cauthdsl] func2 -> DEBU 1cbb 0xc000c8b680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:40.799 UTC [cauthdsl] func2 -> DEBU 1cbc 0xc000c8b680 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.799 UTC [cauthdsl] func1 -> DEBU 1cbd 0xc000c8b680 gate 1589998900798750200 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.799 UTC [policies] Evaluate -> DEBU 1cbe Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:40.799 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:40.799 UTC [policies] Evaluate -> DEBU 1cc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.799 UTC [cauthdsl] func1 -> DEBU 1cc1 0xc000c8bf40 gate 1589998900799979100 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:40.800 UTC [cauthdsl] func2 -> DEBU 1cc2 0xc000c8bf40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:40.800 UTC [cauthdsl] func2 -> DEBU 1cc3 0xc000c8bf40 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:40.800 UTC [cauthdsl] func2 -> DEBU 1cc4 0xc000c8bf40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:40.800 UTC [cauthdsl] func2 -> DEBU 1cc5 0xc000c8bf40 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.800 UTC [cauthdsl] func1 -> DEBU 1cc6 0xc000c8bf40 gate 1589998900799979100 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.800 UTC [policies] Evaluate -> DEBU 1cc7 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:40.800 UTC [policies] Evaluate -> DEBU 1cc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:40.800 UTC [policies] Evaluate -> DEBU 1cc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [cauthdsl] func1 -> DEBU 1cca 0xc00004e7c0 gate 1589998900801281500 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [cauthdsl] func2 -> DEBU 1ccb 0xc00004e7c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [cauthdsl] func2 -> DEBU 1ccc 0xc00004e7c0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [cauthdsl] func2 -> DEBU 1ccd 0xc00004e7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [cauthdsl] func2 -> DEBU 1cce 0xc00004e7c0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [cauthdsl] func1 -> DEBU 1ccf 0xc00004e7c0 gate 1589998900801281500 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [policies] Evaluate -> DEBU 1cd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [policies] Evaluate -> DEBU 1cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:40.801 UTC [policies] func1 -> DEBU 1cd2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd3 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [cauthdsl] func1 -> DEBU 1cd8 0xc00004f610 gate 1589998900802289500 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [cauthdsl] func2 -> DEBU 1cd9 0xc00004f610 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [cauthdsl] func2 -> DEBU 1cda 0xc00004f610 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:40.802 UTC [cauthdsl] func2 -> DEBU 1cdb 0xc00004f610 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:40.803 UTC [msp.identity] Verify -> DEBU 1cdc Verify: digest = 00000000 f1 4c 0e f0 58 25 ae 53 15 9c 6f 84 84 26 29 e3 |.L..X%.S..o..&).| +orderer0.example.com | 00000010 b8 6f 4c 55 c2 25 2e 0a dd bd 1e e6 23 2b 3c 16 |.oLU.%......#+<.|" +orderer0.example.com | "2020-05-20 18:21:40.803 UTC [msp.identity] Verify -> DEBU 1cdd Verify: sig = 00000000 30 45 02 21 00 bd bd 73 1b 26 6a c3 7d 29 f1 c9 |0E.!...s.&j.})..| +orderer0.example.com | 00000010 c1 40 c8 94 84 ea db 89 5c 50 64 e4 0c 07 a5 21 |.@......\Pd....!| +orderer0.example.com | 00000020 d5 90 60 7e 66 02 20 13 4e 22 ac 7e 64 f3 b9 ab |..`~f. .N".~d...| +orderer0.example.com | 00000030 8c 82 af 89 d0 8e 01 98 42 59 6e cc e5 d4 17 ac |........BYn.....| +orderer0.example.com | 00000040 80 79 ab a9 55 34 b3 |.y..U4.|" +orderer0.example.com | "2020-05-20 18:21:40.803 UTC [cauthdsl] func2 -> DEBU 1cde 0xc00004f610 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:40.803 UTC [cauthdsl] func1 -> DEBU 1cdf 0xc00004f610 gate 1589998900802289500 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:40.803 UTC [policies] Evaluate -> DEBU 1ce0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:40.803 UTC [policies] Evaluate -> DEBU 1ce1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:40.803 UTC [policies] Evaluate -> DEBU 1ce2 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:40.804 UTC [policies] Evaluate -> DEBU 1ce3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:40.804 UTC [policies] Evaluate -> DEBU 1ce4 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:40.804 UTC [policies] Evaluate -> DEBU 1ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:40.804 UTC [common.deliver] deliverBlocks -> DEBU 1ce6 [channel: businesschannel] Received seekInfo (0xc000585f40) start: > stop: > from 172.18.0.9:53682" +orderer0.example.com | "2020-05-20 18:21:40.804 UTC [fsblkstorage] Next -> DEBU 1ce7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-05-20 18:21:40.805 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ce8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93382]" +orderer0.example.com | "2020-05-20 18:21:40.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ce9 Remaining bytes=[45190], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:40.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cea Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93382], bytesOffset=[93384]}" +orderer0.example.com | "2020-05-20 18:21:40.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ceb blockbytes [4009] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:40.805 UTC [common.deliver] deliverBlocks -> DEBU 1cec [channel: businesschannel] Delivering block [5] for (0xc000585f40) for 172.18.0.9:53682" +orderer0.example.com | "2020-05-20 18:21:40.806 UTC [common.deliver] deliverBlocks -> DEBU 1ced [channel: businesschannel] Done delivering to 172.18.0.9:53682 for (0xc000585f40)" +orderer0.example.com | "2020-05-20 18:21:40.806 UTC [common.deliver] Handle -> DEBU 1cee Waiting for new SeekInfo from 172.18.0.9:53682" +orderer0.example.com | "2020-05-20 18:21:40.806 UTC [common.deliver] Handle -> DEBU 1cef Attempting to read seek info message from 172.18.0.9:53682" +orderer0.example.com | "2020-05-20 18:21:40.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:40.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf1 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2020-05-20 18:21:40.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.4µs " +orderer0.example.com | "2020-05-20 18:21:40.823 UTC [common.deliver] Handle -> WARN 1cf3 Error reading from 172.18.0.9:53682: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:40.824 UTC [orderer.common.server] func1 -> DEBU 1cf4 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:40.825 UTC [comm.grpc.server] 1 -> INFO 1cf5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53682 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.6377ms +orderer0.example.com | "2020-05-20 18:21:40.826 UTC [grpc] infof -> DEBU 1cf6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:40.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf7 Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +orderer0.example.com | "2020-05-20 18:21:40.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.2µs " +orderer0.example.com | "2020-05-20 18:21:40.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64µs " +orderer0.example.com | "2020-05-20 18:21:40.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:40.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:40.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfc Sending msg of 28 bytes to 3 on channel businesschannel took 340.4µs" +orderer0.example.com | "2020-05-20 18:21:41.140 UTC [orderer.common.server] Deliver -> DEBU 1cfd Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:41.140 UTC [common.deliver] Handle -> DEBU 1cfe Starting new deliver loop for 172.18.0.9:53684" +orderer0.example.com | "2020-05-20 18:21:41.141 UTC [common.deliver] Handle -> DEBU 1cff Attempting to read seek info message from 172.18.0.9:53684" +orderer0.example.com | "2020-05-20 18:21:41.142 UTC [policies] Evaluate -> DEBU 1d00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.142 UTC [policies] Evaluate -> DEBU 1d01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.143 UTC [policies] Evaluate -> DEBU 1d02 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.143 UTC [policies] Evaluate -> DEBU 1d03 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.143 UTC [policies] Evaluate -> DEBU 1d04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.143 UTC [cauthdsl] func1 -> DEBU 1d05 0xc000282120 gate 1589998901143697500 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:41.144 UTC [cauthdsl] func2 -> DEBU 1d06 0xc000282120 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:41.144 UTC [cauthdsl] func2 -> DEBU 1d07 0xc000282120 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:41.144 UTC [cauthdsl] func2 -> DEBU 1d08 0xc000282120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:41.144 UTC [cauthdsl] func2 -> DEBU 1d09 0xc000282120 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:41.145 UTC [cauthdsl] func1 -> DEBU 1d0a 0xc000282120 gate 1589998901143697500 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:41.145 UTC [policies] Evaluate -> DEBU 1d0b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [1aee 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1aef 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1af0 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1af1 05-20 18:20:43.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1af2 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af3 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af6 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af7 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af8 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af9 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af5 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1afa 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1afb 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1afc 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1afd 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1aff 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b00 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1af4 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b01 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1afe 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b02 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b03 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b04 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b05 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b06 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b07 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b08 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b09 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b0a 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1b0b 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b0c 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b0d 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 0e 94 40 b7 11 bf fc 4b b9 ed 83 41 dd c0 ad |...@....K...A...| +peer1.org1.example.com | 00000010 48 68 a0 ee b2 c5 52 cb f2 7d b6 f7 bc 1c 5c 12 |Hh....R..}....\.| +peer1.org1.example.com | [1b0e 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b0f 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 bf e1 e6 27 ae c7 e2 4c 53 1b |0E.!.....'...LS.| +peer1.org1.example.com | 00000010 92 37 51 73 19 64 65 6e 68 3a ee d9 8a c6 d2 5f |.7Qs.denh:....._| +peer1.org1.example.com | 00000020 88 d7 35 90 4f 02 20 58 ca 4b d0 94 be c9 50 98 |..5.O. X.K....P.| +peer1.org1.example.com | 00000030 ff b6 f9 c0 ef 0d 3f 0e 6d df 70 e6 1c d1 6b f0 |......?.m.p...k.| +peer1.org1.example.com | 00000040 ad 76 8d 01 b2 1c b1 |.v.....| +peer1.org1.example.com | [1b10 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b11 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1b12 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1b13 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1b14 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1b15 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b16 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b17 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b18 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b19 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b1a 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b1b 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b1c 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b1d 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b1e 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b1f 05-20 18:20:44.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b20 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b21 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b22 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1b23 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b24 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1b25 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b26 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b28 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b27 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b29 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b2a 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b2b 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b2c 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b2d 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b2e 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b2f 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b30 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b31 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b32 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b33 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b34 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b35 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1b36 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b37 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1b38 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b39 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b3a 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b3b 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1b3c 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b3e 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b3d 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b3f 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b40 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b41 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b42 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b43 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b44 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b45 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b46 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b47 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b48 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b49 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [19b5 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [19b6 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [19b7 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [19b8 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [19b9 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [19ba 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [19bb 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004140bb0 gate 1589998838381209800 evaluation starts +peer1.org2.example.com | [19bc 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004140bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [19bd 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004140bb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [19be 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004140bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [19bf 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004140bb0 principal evaluation fails +peer1.org2.example.com | [19c0 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004140bb0 gate 1589998838381209800 evaluation fails +peer1.org2.example.com | [19c1 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19c2 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19c3 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [19c4 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141120 gate 1589998838381772300 evaluation starts +peer1.org2.example.com | [19c5 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [19c6 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141120 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [19c7 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141120 principal matched by identity 0 +peer1.org2.example.com | [19c8 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c d1 ee 27 18 66 b5 4e bf 41 4f 60 c1 af e1 be ||..'.f.N.AO`....| +peer1.org2.example.com | 00000010 bf d2 ac 60 2b 84 14 f7 2b 76 24 b5 d5 05 f0 d6 |...`+...+v$.....| +peer1.org2.example.com | [19c9 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 85 11 f5 d9 91 17 b5 ea a8 b4 |0E.!............| +peer1.org2.example.com | 00000010 0f 77 2e 11 89 7b 3f 5a ce 89 70 8e bf ce 72 11 |.w...{?Z..p...r.| +peer1.org2.example.com | 00000020 1d 2e 5e b0 e8 02 20 54 09 75 69 c8 73 64 cd 91 |..^... T.ui.sd..| +peer1.org2.example.com | 00000030 83 5a 8c 52 03 22 1a b8 ed 36 76 fd 32 cd c0 21 |.Z.R."...6v.2..!| +peer1.org2.example.com | 00000040 0d d3 81 3a 39 f5 ca |...:9..| +peer1.org2.example.com | [19ca 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [19cb 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141120 gate 1589998838381772300 evaluation succeeds +peer1.org2.example.com | [19cc 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [19cd 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [19ce 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [19cf 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [19d0 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19d1 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [19d2 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [19d3 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19d4 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19d5 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [19d6 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [19d7 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19d8 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19d9 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19da 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19db 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19dc 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19dd 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19de 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19df 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19e0 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19e1 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19e2 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19e3 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [19e4 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19e6 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19e7 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [19e8 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19e9 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19e5 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19ea 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19eb 05-20 18:20:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19ec 05-20 18:20:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19ed 05-20 18:20:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19ee 05-20 18:20:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19ef 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19f0 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19f1 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f2 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19f3 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [19f4 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 a3 07 42 10 8f 78 e7 04 b0 14 b3 8c ed a6 26 |...B..x........&| +peer1.org2.example.com | 00000010 8e b3 fd e0 b4 3a 86 f5 92 5d 42 54 63 5e d9 0d |.....:...]BTc^..| +peer1.org2.example.com | [19f5 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 27 17 18 11 8b 44 4d 7d 3c a5 |0E.!..'....DM}<.| +peer1.org2.example.com | 00000010 1e 6a c3 10 82 fb d2 2c 82 b4 3b 2d b5 90 93 f8 |.j.....,..;-....| +peer1.org2.example.com | 00000020 73 de 82 5b 64 02 20 69 21 63 02 3c 8a 27 0f 3a |s..[d. i!c.<.'.:| +peer1.org2.example.com | 00000030 f2 69 a8 f3 bc 66 6e 6f a2 6f af ff 79 eb 0e 25 |.i...fno.o..y..%| +peer1.org2.example.com | 00000040 f7 8e 05 a4 10 d8 f4 |.......| +peer0.org2.example.com | [19d6 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [19d7 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [19d8 05-20 18:20:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [19d9 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [19da 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19db 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19dc 05-20 18:20:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19dd 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19de 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [19df 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19e0 05-20 18:20:33.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18b4 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [18b5 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18b6 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18b7 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18b8 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18b9 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [18ba 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18bb 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [18bc 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18bd 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18be 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [18bf 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [18c0 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [18c1 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 gate 1589998833201379000 evaluation starts +peer0.org1.example.com | [18c2 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [18c3 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [18c4 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 principal matched by identity 0 +peer0.org1.example.com | [18c5 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +peer0.org1.example.com | 00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +peer0.org1.example.com | [18c6 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +peer0.org1.example.com | 00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +peer0.org1.example.com | 00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +peer0.org1.example.com | 00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +peer0.org1.example.com | 00000040 d7 3c bb f3 1c bf d5 |.<.....| +peer0.org1.example.com | [18c7 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [18c8 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 gate 1589998833201379000 evaluation succeeds +peer0.org1.example.com | [18c9 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18ca 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18cb 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [18cc 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [18cd 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [18ce 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1589998788850055200, 32 but got ts: inc_num:1589998788850055200 seq_num:31 +peer0.org1.example.com | [18cf 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18d0 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [18d1 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +peer0.org1.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +peer0.org1.example.com | [18d2 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +peer0.org1.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +peer0.org1.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +peer0.org1.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer0.org1.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer0.org1.example.com | [18d3 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [18d4 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18d5 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [18d6 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +peer0.org1.example.com | 00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +peer0.org1.example.com | [18d7 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +peer0.org1.example.com | 00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +peer0.org1.example.com | 00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +peer0.org1.example.com | 00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +peer0.org1.example.com | 00000040 ea 2b 5a 57 a9 df |.+ZW..| +peer0.org1.example.com | [18d8 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18d9 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18da 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18db 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18dc 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [19f6 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19f7 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [19f8 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [19f9 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [19fa 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [19fb 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19fc 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19fd 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19fe 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19ff 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a00 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a01 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1a02 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a03 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1a04 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a05 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a06 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a07 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a08 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a09 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a0a 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a0b 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a0c 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a0d 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a0e 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a0f 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a10 05-20 18:20:38.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [1a11 05-20 18:20:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1a12 05-20 18:20:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161023 +peer1.org2.example.com | [1a13 05-20 18:20:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2496FC2D67A40FF472CE8AE473F36243683B4E743820A9145D48483A5E60CAEE +peer1.org2.example.com | [1a14 05-20 18:20:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1a15 05-20 18:20:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1a16 05-20 18:20:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1a17 05-20 18:20:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1a18 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a19 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a1a 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:41.145 UTC [policies] Evaluate -> DEBU 1d0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:41.145 UTC [policies] Evaluate -> DEBU 1d0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.145 UTC [cauthdsl] func1 -> DEBU 1d0e 0xc000282ae0 gate 1589998901145887200 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:41.146 UTC [cauthdsl] func2 -> DEBU 1d0f 0xc000282ae0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:41.146 UTC [cauthdsl] func2 -> DEBU 1d10 0xc000282ae0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:41.146 UTC [cauthdsl] func2 -> DEBU 1d11 0xc000282ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:41.146 UTC [cauthdsl] func2 -> DEBU 1d12 0xc000282ae0 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:41.147 UTC [cauthdsl] func1 -> DEBU 1d13 0xc000282ae0 gate 1589998901145887200 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:41.147 UTC [policies] Evaluate -> DEBU 1d14 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:41.147 UTC [policies] Evaluate -> DEBU 1d15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:41.147 UTC [policies] Evaluate -> DEBU 1d16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.147 UTC [cauthdsl] func1 -> DEBU 1d17 0xc000283910 gate 1589998901147973100 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:41.148 UTC [cauthdsl] func2 -> DEBU 1d18 0xc000283910 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:41.148 UTC [cauthdsl] func2 -> DEBU 1d19 0xc000283910 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:41.148 UTC [cauthdsl] func2 -> DEBU 1d1a 0xc000283910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-05-20 18:21:41.149 UTC [cauthdsl] func2 -> DEBU 1d1b 0xc000283910 principal evaluation fails" +orderer0.example.com | "2020-05-20 18:21:41.149 UTC [cauthdsl] func1 -> DEBU 1d1c 0xc000283910 gate 1589998901147973100 evaluation fails" +orderer0.example.com | "2020-05-20 18:21:41.149 UTC [policies] Evaluate -> DEBU 1d1d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:41.149 UTC [policies] Evaluate -> DEBU 1d1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-05-20 18:21:41.149 UTC [policies] func1 -> DEBU 1d1f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-05-20 18:21:41.150 UTC [policies] Evaluate -> DEBU 1d20 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:41.150 UTC [policies] Evaluate -> DEBU 1d21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-05-20 18:21:41.150 UTC [policies] Evaluate -> DEBU 1d22 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.150 UTC [policies] Evaluate -> DEBU 1d23 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.151 UTC [policies] Evaluate -> DEBU 1d24 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.151 UTC [cauthdsl] func1 -> DEBU 1d25 0xc00023c900 gate 1589998901151228100 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:41.151 UTC [cauthdsl] func2 -> DEBU 1d26 0xc00023c900 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:41.151 UTC [cauthdsl] func2 -> DEBU 1d27 0xc00023c900 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:41.153 UTC [cauthdsl] func2 -> DEBU 1d28 0xc00023c900 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:41.153 UTC [msp.identity] Verify -> DEBU 1d29 Verify: digest = 00000000 ed 29 c6 e5 ac a1 c6 c7 52 6e c3 f9 3c 35 c3 50 |.)......Rn..<5.P| +orderer0.example.com | 00000010 a0 3b 69 13 b7 7c df b4 dc 4a a0 4c c4 da a1 59 |.;i..|...J.L...Y|" +orderer0.example.com | "2020-05-20 18:21:41.153 UTC [msp.identity] Verify -> DEBU 1d2a Verify: sig = 00000000 30 44 02 20 3a 08 72 9a aa d9 a0 5a 69 e0 9b d7 |0D. :.r....Zi...| +orderer0.example.com | 00000010 58 bc 2f 66 ba 7f d8 58 20 9a b5 96 28 58 c4 99 |X./f...X ...(X..| +orderer0.example.com | 00000020 9b ae 13 fe 02 20 1b 02 86 00 d6 b4 41 73 06 65 |..... ......As.e| +orderer0.example.com | 00000030 4b 98 4a 81 27 78 fe 36 ed d1 cc d5 01 9c 6e 4a |K.J.'x.6......nJ| +orderer0.example.com | 00000040 e1 4d 2b 8c f2 51 |.M+..Q|" +orderer0.example.com | "2020-05-20 18:21:41.154 UTC [cauthdsl] func2 -> DEBU 1d2b 0xc00023c900 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:41.154 UTC [cauthdsl] func1 -> DEBU 1d2c 0xc00023c900 gate 1589998901151228100 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:41.154 UTC [policies] Evaluate -> DEBU 1d2d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d2e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d2f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d31 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d32 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.155 UTC [common.deliver] deliverBlocks -> DEBU 1d33 [channel: businesschannel] Received seekInfo (0xc0013d12c0) start: > stop: > from 172.18.0.9:53684" +orderer0.example.com | "2020-05-20 18:21:41.156 UTC [fsblkstorage] Next -> DEBU 1d34 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-05-20 18:21:41.156 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d35 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +orderer0.example.com | "2020-05-20 18:21:41.156 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d36 Remaining bytes=[41179], Going to peek [8] bytes" +peer1.org1.example.com | [1b4a 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b4b 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b4c 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4d 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4e 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1b4f 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b50 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b51 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b52 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b53 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b54 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b55 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b56 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b57 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b58 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161027 +peer1.org1.example.com | [1b59 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84780F347680E20EA56C0C38E0640258603ABB29B62F56DC616CE41A80335F8E +peer1.org1.example.com | [1b5a 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b5b 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1b5c 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1b5d 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b5e 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b5f 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b61 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b62 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b63 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b64 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b60 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b65 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b66 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b67 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b68 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b69 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b6a 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b6b 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a1b 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a1c 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a1d 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a1e 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a1f 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a20 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a21 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a22 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a23 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a24 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a25 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a26 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a27 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a28 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a29 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a2a 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1a2b 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a2c 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1a2d 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a2e 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a2f 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1a30 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1a31 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1a32 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004185450 gate 1589998839038519000 evaluation starts +peer0.org2.example.com | [19e1 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e2 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e3 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e4 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e5 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e6 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e7 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [19e8 05-20 18:20:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e9 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [19ea 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [19eb 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19ec 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [19ed 05-20 18:20:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19ee 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [19ef 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [19f0 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19f1 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19f2 05-20 18:20:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [19f3 05-20 18:20:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816101F +peer0.org2.example.com | [19f4 05-20 18:20:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FBA07E49C8BD4B9E8A70527BB110C2A3B7F04DB5215B9FD645994B15A925372C +peer0.org2.example.com | [19f5 05-20 18:20:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [19f6 05-20 18:20:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [19f7 05-20 18:20:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [19f8 05-20 18:20:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [19f9 05-20 18:20:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19fa 05-20 18:20:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19fb 05-20 18:20:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [19fc 05-20 18:20:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19fd 05-20 18:20:33.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [19fe 05-20 18:20:33.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19ff 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a00 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a01 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a02 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1a03 05-20 18:20:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 df 24 11 a4 32 62 18 97 72 4a 73 00 e0 3b 5d |8.$..2b..rJs..;]| +peer0.org2.example.com | 00000010 d4 e9 c7 ac d4 51 f0 d9 69 4b 06 d0 8a 16 d4 ff |.....Q..iK......| +peer0.org2.example.com | [1a06 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 57 8a 43 f9 8b 9e 3b 58 86 ab 11 |0D. MW.C...;X...| +peer0.org2.example.com | 00000010 e6 aa 4f 20 88 b1 98 1f 02 ec 52 ab 7d 91 48 6b |..O ......R.}.Hk| +peer0.org2.example.com | 00000020 b6 78 5b 93 02 20 31 52 31 51 f6 37 10 5e 17 9f |.x[.. 1R1Q.7.^..| +peer0.org2.example.com | 00000030 9c 00 63 fc 5d ec 7a 00 5d 32 4c 73 23 6e fd d2 |..c.].z.]2Ls#n..| +peer0.org2.example.com | 00000040 ab bd e1 98 8b 4d |.....M| +peer0.org2.example.com | [1a07 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a08 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1a09 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1a0a 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1a0b 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1a0c 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a0d 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a04 05-20 18:20:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1a0e 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a0f 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1a10 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a05 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a11 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a12 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a13 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a14 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a15 05-20 18:20:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a16 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a17 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a18 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a19 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a1a 05-20 18:20:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a1b 05-20 18:20:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1a1c 05-20 18:20:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a1d 05-20 18:20:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a1e 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a1f 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a20 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a21 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1a22 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb a0 7e 49 c8 bd 4b 9e 8a 70 52 7b b1 10 c2 a3 |..~I..K..pR{....| +peer0.org2.example.com | 00000010 b7 f0 4d b5 21 5b 9f d6 45 99 4b 15 a9 25 37 2c |..M.![..E.K..%7,| +peer0.org2.example.com | [1a23 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 0a d0 c1 d4 96 4a ed c0 db 47 58 |0D. C.....J...GX| +peer0.org2.example.com | 00000010 03 ee 34 79 83 82 7a 2a 46 e8 6e 87 fe da fd 64 |..4y..z*F.n....d| +peer0.org2.example.com | 00000020 18 08 2f 7d 02 20 57 73 7b 3a 7f 38 48 33 c0 8b |../}. Ws{:.8H3..| +peer0.org2.example.com | 00000030 2f ff a7 c1 44 f4 ed a6 8a 3e 1d b7 73 83 7d 9a |/...D....>..s.}.| +peer0.org2.example.com | 00000040 dc cc 0a ab bb bc |......| +peer1.org2.example.com | [1a33 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004185450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a34 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004185450 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1a35 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004185450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1a36 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004185450 principal evaluation fails +peer1.org2.example.com | [1a37 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004185450 gate 1589998839038519000 evaluation fails +peer1.org2.example.com | [1a38 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a39 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a3a 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1a3b 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041859c0 gate 1589998839038845900 evaluation starts +peer1.org2.example.com | [1a3c 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041859c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a3d 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041859c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1a3e 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041859c0 principal matched by identity 0 +peer1.org2.example.com | [1a3f 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 37 5c 42 81 31 10 b3 8f 44 f4 30 03 93 cb 5e |m7\B.1...D.0...^| +peer1.org2.example.com | 00000010 99 b8 7b 8b 4e 5f 31 d3 87 a6 8c 6d d3 4c 84 cc |..{.N_1....m.L..| +peer1.org2.example.com | [1a40 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 5b 5a 43 23 ff ef 1f 75 75 6c |0E.!..[ZC#...uul| +peer1.org2.example.com | 00000010 b7 22 f3 e2 7f bc f1 8b 7b e3 93 73 f9 83 3e f5 |."......{..s..>.| +peer1.org2.example.com | 00000020 70 2a b1 d4 79 02 20 6e 4f d6 33 3a 21 87 f5 ac |p*..y. nO.3:!...| +peer1.org2.example.com | 00000030 51 10 af 61 a4 e4 9f 3a 4f b3 70 14 cb 57 f5 4b |Q..a...:O.p..W.K| +peer1.org2.example.com | 00000040 15 71 49 ed 71 c4 78 |.qI.q.x| +peer1.org2.example.com | [1a41 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041859c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1a42 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041859c0 gate 1589998839038845900 evaluation succeeds +peer1.org2.example.com | [1a43 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1a44 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1a45 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1a46 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1a47 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a48 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1a49 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1a4a 05-20 18:20:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1a4b 05-20 18:20:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1a4c 05-20 18:20:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a4d 05-20 18:20:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a4e 05-20 18:20:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a4f 05-20 18:20:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a50 05-20 18:20:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a51 05-20 18:20:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a52 05-20 18:20:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a53 05-20 18:20:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a54 05-20 18:20:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a55 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a56 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a57 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a58 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1a59 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a5a 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a5b 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1a5c 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a5d 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18dd 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [18de 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18df 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e0 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [18e1 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +peer0.org1.example.com | 00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +peer0.org1.example.com | [18e2 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +peer0.org1.example.com | 00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +peer0.org1.example.com | 00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +peer0.org1.example.com | 00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +peer0.org1.example.com | 00000040 ea 2b 5a 57 a9 df |.+ZW..| +peer0.org1.example.com | [18e3 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [18e4 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e ba 8f a3 5e a6 01 27 c8 75 60 14 |0D. N...^..'.u`.| +peer0.org1.example.com | 00000010 54 ba 12 aa 12 6f 61 d3 28 08 30 5d 78 8a ba fa |T....oa.(.0]x...| +peer0.org1.example.com | 00000020 a7 b8 21 1a 02 20 0d 3a 19 68 fc 03 05 99 f6 60 |..!.. .:.h.....`| +peer0.org1.example.com | 00000030 1b c4 ef 42 16 39 a0 60 4a fd d9 21 22 12 2f 8a |...B.9.`J..!"./.| +peer0.org1.example.com | 00000040 9b d2 08 72 70 44 |...rpD| +peer0.org1.example.com | [18e5 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [18e6 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [18e7 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18e8 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18e9 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18ea 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18eb 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18ec 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18ed 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [18ee 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18ef 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [18f0 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18f1 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18f2 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [18f3 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [18f4 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [18f5 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 gate 1589998833327008400 evaluation starts +peer0.org1.example.com | [18f6 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [18f7 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [18f8 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 principal matched by identity 0 +peer0.org1.example.com | [18f9 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +peer0.org1.example.com | 00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +peer0.org1.example.com | [18fa 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +peer0.org1.example.com | 00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +peer0.org1.example.com | 00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +peer0.org1.example.com | 00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +peer0.org1.example.com | 00000040 35 7d 56 8e 1f d6 |5}V...| +peer0.org1.example.com | [18fb 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [18fc 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 gate 1589998833327008400 evaluation succeeds +peer0.org1.example.com | [18fd 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18fe 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18ff 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1900 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1901 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1902 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1903 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1904 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +peer0.org1.example.com | 00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +peer0.org1.example.com | [1905 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +peer0.org1.example.com | 00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +peer0.org1.example.com | 00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +peer0.org1.example.com | 00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +peer0.org1.example.com | 00000040 ea 2b 5a 57 a9 df |.+ZW..| +peer0.org1.example.com | [1906 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1907 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1908 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a5e 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a5f 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a60 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a61 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a62 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a63 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a64 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a65 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a66 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a67 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a68 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a69 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a6a 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a6b 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a6c 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a6d 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a6e 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a6f 05-20 18:20:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a70 05-20 18:20:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a71 05-20 18:20:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a72 05-20 18:20:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1a73 05-20 18:20:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a74 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a75 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a76 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1a77 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a78 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a79 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a7a 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a7b 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a7d 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a7c 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a7f 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a80 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a7e 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a81 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b6c 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1b6d 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer1.org1.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer1.org1.example.com | [1b6e 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer1.org1.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer1.org1.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer1.org1.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer1.org1.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer1.org1.example.com | [1b6f 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b70 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b71 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b72 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b73 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b74 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b75 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1b76 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer1.org1.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer1.org1.example.com | [1b77 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer1.org1.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer1.org1.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer1.org1.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer1.org1.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer1.org1.example.com | [1b78 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b79 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1b7a 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 52 89 35 2a 71 4b 02 a9 8c a5 a6 |0D. /R.5*qK.....| +peer1.org1.example.com | 00000010 7d a5 e1 69 46 e8 15 8b 63 2a 3f 9f be d0 17 32 |}..iF...c*?....2| +peer1.org1.example.com | 00000020 8a 04 d8 7c 02 20 76 ac d8 a8 9d e7 cd 44 9f 47 |...|. v......D.G| +peer1.org1.example.com | 00000030 1e 8b 11 f0 97 a4 bc a5 84 03 32 bf ee 58 e5 f7 |..........2..X..| +peer1.org1.example.com | 00000040 35 58 8c 6e a3 f1 |5X.n..| +peer1.org1.example.com | [1b7b 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1b7c 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1b7d 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b7e 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b7f 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b80 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b81 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b82 05-20 18:20:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b83 05-20 18:20:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1b84 05-20 18:20:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer1.org1.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer1.org1.example.com | [1b85 05-20 18:20:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer1.org1.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer1.org1.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer1.org1.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer1.org1.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer1.org1.example.com | [1b86 05-20 18:20:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b87 05-20 18:20:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b88 05-20 18:20:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b89 05-20 18:20:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1909 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [190a 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +peer0.org1.example.com | 00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +peer0.org1.example.com | [190b 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +peer0.org1.example.com | 00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +peer0.org1.example.com | 00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +peer0.org1.example.com | 00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +peer0.org1.example.com | 00000040 ca 73 24 a5 8e 95 b2 |.s$....| +peer0.org1.example.com | [190c 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [190d 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [190e 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [190f 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1910 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1911 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1912 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1913 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1914 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 3b 8b 5b aa 3c 23 45 fc e5 83 b7 ad 24 dc 53 |.;.[.<#E.....$.S| +peer0.org1.example.com | 00000010 73 05 cc e8 23 0f fb 19 48 a4 8c d6 4f 13 46 4a |s...#...H...O.FJ| +peer0.org1.example.com | [1915 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 3c 33 0a 7b a6 e7 5c fa bb 07 18 |0D. %<3.{..\....| +peer0.org1.example.com | 00000010 9a f7 bc 3f 05 97 ae f5 d2 ec 49 8d 47 84 5b 8e |...?......I.G.[.| +peer0.org1.example.com | 00000020 b4 ac cc 95 02 20 78 62 92 53 65 53 2d 0e 03 84 |..... xb.SeS-...| +peer0.org1.example.com | 00000030 ce 0f 74 ae 71 04 06 4b b1 85 80 f5 bb af 6f c4 |..t.q..K......o.| +peer0.org1.example.com | 00000040 95 7a 23 62 e6 a2 |.z#b..| +peer0.org1.example.com | [1916 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1917 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1918 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1919 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [191a 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [191b 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [191c 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [191d 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [191e 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [191f 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1920 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1921 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1922 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1923 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1924 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1925 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1926 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1927 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a24 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a25 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a26 05-20 18:20:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a27 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1a28 05-20 18:20:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1a29 05-20 18:20:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a2a 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a2b 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a2c 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a2d 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1a2e 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a2f 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a30 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a31 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a32 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a33 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a34 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1a35 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429c9b0 gate 1589998834034236700 evaluation starts +peer0.org2.example.com | [1a36 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429c9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a37 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429c9b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1a38 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429c9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1a39 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429c9b0 principal evaluation fails +peer0.org2.example.com | [1a3a 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429c9b0 gate 1589998834034236700 evaluation fails +peer0.org2.example.com | [1a3b 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a3c 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a3d 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1a3e 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429cf20 gate 1589998834035500600 evaluation starts +peer0.org2.example.com | [1a3f 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429cf20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a40 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429cf20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1a41 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429cf20 principal matched by identity 0 +peer0.org2.example.com | [1a42 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a 2b 3d 47 11 96 b1 62 d3 5e c5 7b f9 5f 03 ff |.+=G...b.^.{._..| +peer0.org2.example.com | 00000010 43 0f f2 13 5e f8 90 41 0a b4 55 9f bc 02 3e 47 |C...^..A..U...>G| +peer0.org2.example.com | [1a43 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 42 25 cb 5b db 62 05 dc b4 96 |0E.!..B%.[.b....| +peer0.org2.example.com | 00000010 8e 52 e6 cc 79 10 2a c1 56 68 a1 41 0f 7b d5 ed |.R..y.*.Vh.A.{..| +peer0.org2.example.com | 00000020 62 02 8e cc 42 02 20 08 67 2b d0 be 33 4b 70 72 |b...B. .g+..3Kpr| +peer0.org2.example.com | 00000030 55 5b 00 22 0b f0 9a ef 0f b1 70 19 4c 7b 85 ff |U[."......p.L{..| +peer0.org2.example.com | 00000040 74 45 07 b7 ef a9 73 |tE....s| +peer0.org2.example.com | [1a44 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429cf20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a45 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429cf20 gate 1589998834035500600 evaluation succeeds +peer0.org2.example.com | [1a46 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a47 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a48 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a49 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a4a 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a4b 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1a4c 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1a4d 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1a4e 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1a4f 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a50 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a51 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a52 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a53 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a54 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:41.156 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d37 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +orderer0.example.com | "2020-05-20 18:21:41.157 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d38 blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:41.157 UTC [common.deliver] deliverBlocks -> DEBU 1d39 [channel: businesschannel] Delivering block [6] for (0xc0013d12c0) for 172.18.0.9:53684" +orderer0.example.com | "2020-05-20 18:21:41.158 UTC [common.deliver] deliverBlocks -> DEBU 1d3a [channel: businesschannel] Done delivering to 172.18.0.9:53684 for (0xc0013d12c0)" +orderer0.example.com | "2020-05-20 18:21:41.158 UTC [common.deliver] Handle -> DEBU 1d3b Waiting for new SeekInfo from 172.18.0.9:53684" +orderer0.example.com | "2020-05-20 18:21:41.159 UTC [common.deliver] Handle -> DEBU 1d3c Attempting to read seek info message from 172.18.0.9:53684" +orderer0.example.com | "2020-05-20 18:21:41.169 UTC [common.deliver] Handle -> WARN 1d3d Error reading from 172.18.0.9:53684: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:41.171 UTC [orderer.common.server] func1 -> DEBU 1d3e Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:41.172 UTC [comm.grpc.server] 1 -> INFO 1d3f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53684 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.0842ms +orderer0.example.com | "2020-05-20 18:21:41.173 UTC [grpc] infof -> DEBU 1d40 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:41.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d41 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:41.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d42 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2020-05-20 18:21:41.323 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d43 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.8µs " +orderer0.example.com | "2020-05-20 18:21:41.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d44 Sending msg of 28 bytes to 2 on channel businesschannel took 16.6µs" +orderer0.example.com | "2020-05-20 18:21:41.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d45 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +orderer0.example.com | "2020-05-20 18:21:41.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.1µs " +orderer0.example.com | "2020-05-20 18:21:41.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.5µs " +orderer0.example.com | "2020-05-20 18:21:41.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d48 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:41.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d49 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:41.444 UTC [orderer.common.server] Deliver -> DEBU 1d4a Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:41.445 UTC [common.deliver] Handle -> DEBU 1d4b Starting new deliver loop for 172.18.0.9:53686" +orderer0.example.com | "2020-05-20 18:21:41.445 UTC [common.deliver] Handle -> DEBU 1d4c Attempting to read seek info message from 172.18.0.9:53686" +orderer0.example.com | "2020-05-20 18:21:41.446 UTC [policies] Evaluate -> DEBU 1d4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.447 UTC [policies] Evaluate -> DEBU 1d4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.447 UTC [policies] Evaluate -> DEBU 1d4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.447 UTC [policies] Evaluate -> DEBU 1d50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.447 UTC [policies] Evaluate -> DEBU 1d51 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.447 UTC [cauthdsl] func1 -> DEBU 1d52 0xc0002f7bf0 gate 1589998901447986200 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:41.448 UTC [cauthdsl] func2 -> DEBU 1d53 0xc0002f7bf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:41.448 UTC [cauthdsl] func2 -> DEBU 1d54 0xc0002f7bf0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:41.448 UTC [cauthdsl] func2 -> DEBU 1d55 0xc0002f7bf0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:41.448 UTC [msp.identity] Verify -> DEBU 1d56 Verify: digest = 00000000 c7 76 17 12 f8 64 71 64 b1 59 59 1e 66 18 a3 fc |.v...dqd.YY.f...| +orderer0.example.com | 00000010 a1 6d c7 3b 02 39 1d 80 ca 8b 33 82 9a a6 57 f5 |.m.;.9....3...W.|" +orderer0.example.com | "2020-05-20 18:21:41.449 UTC [msp.identity] Verify -> DEBU 1d57 Verify: sig = 00000000 30 45 02 21 00 8f 73 f8 9c 6b d2 ec 79 10 b6 e7 |0E.!..s..k..y...| +orderer0.example.com | 00000010 fa 89 3c a3 59 74 92 93 67 97 4d fc e7 19 43 73 |..<.Yt..g.M...Cs| +orderer0.example.com | 00000020 0c 50 2d ab 26 02 20 11 2b 43 07 ad b4 0a 2c 8c |.P-.&. .+C....,.| +orderer0.example.com | 00000030 c1 04 75 da 36 c4 f8 4a 9a a8 3e b0 0d 8c b6 24 |..u.6..J..>....$| +orderer0.example.com | 00000040 2b 87 81 a3 a7 6b 15 |+....k.|" +orderer0.example.com | "2020-05-20 18:21:41.449 UTC [cauthdsl] func2 -> DEBU 1d58 0xc0002f7bf0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:41.450 UTC [cauthdsl] func1 -> DEBU 1d59 0xc0002f7bf0 gate 1589998901447986200 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:41.450 UTC [policies] Evaluate -> DEBU 1d5a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.450 UTC [policies] Evaluate -> DEBU 1d5b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.450 UTC [policies] Evaluate -> DEBU 1d5c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.451 UTC [policies] Evaluate -> DEBU 1d5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.451 UTC [policies] Evaluate -> DEBU 1d5e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.451 UTC [policies] Evaluate -> DEBU 1d5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.451 UTC [common.deliver] deliverBlocks -> DEBU 1d60 [channel: testchainid] Received seekInfo (0xc0013d1c00) start: > stop: > from 172.18.0.9:53686" +orderer0.example.com | "2020-05-20 18:21:41.451 UTC [fsblkstorage] Next -> DEBU 1d61 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-05-20 18:21:41.452 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d62 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer1.org2.example.com | [1a82 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1a83 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a84 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a85 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1a86 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1a87 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1a88 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc370 gate 1589998840457426900 evaluation starts +peer1.org2.example.com | [1a89 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc370 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a8a 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc370 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1a8b 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1a8c 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc370 principal evaluation fails +peer1.org2.example.com | [1a8d 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc370 gate 1589998840457426900 evaluation fails +peer1.org2.example.com | [1a8e 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a8f 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a90 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1a91 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc8e0 gate 1589998840473821500 evaluation starts +peer1.org2.example.com | [1a92 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc8e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a93 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc8e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1a94 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc8e0 principal matched by identity 0 +peer1.org2.example.com | [1a95 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1a96 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1a97 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc8e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1a98 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fc8e0 gate 1589998840473821500 evaluation succeeds +peer1.org2.example.com | [1a99 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1a9a 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1a9b 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1a9c 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1a9d 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a9e 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1928 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1929 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [192a 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [192b 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [192c 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [192d 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [192e 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [192f 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1930 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1931 05-20 18:20:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1932 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1933 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101E +peer0.org1.example.com | [1934 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8A2B3D471196B162D35EC57BF95F03FF430FF2135EF890410AB4559FBC023E47 +peer0.org1.example.com | [1935 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1936 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1937 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1938 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1939 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193a 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193b 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193c 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [193d 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193e 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193f 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1940 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a55 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a56 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a57 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a58 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a59 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1a5a 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a5b 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1a5c 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a5d 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a5e 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a5f 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a60 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a61 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a62 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a63 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a64 05-20 18:20:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a65 05-20 18:20:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a66 05-20 18:20:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a67 05-20 18:20:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a68 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b8a 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b8b 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b8c 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b8d 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b8e 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b8f 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b90 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b91 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b92 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b93 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1b94 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b95 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b96 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b97 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1b98 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b99 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b9a 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b9b 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b9c 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b9d 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1b9e 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b9f 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ba0 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ba1 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ba2 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ba3 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ba4 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ba5 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69e60 gate 1589998844885963700 evaluation starts +peer1.org1.example.com | [1ba6 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69e60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ba7 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69e60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1ba8 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69e60 principal matched by identity 0 +peer1.org1.example.com | [1ba9 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer1.org1.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer1.org1.example.com | [1baa 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer1.org1.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer1.org1.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer1.org1.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer1.org1.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer1.org1.example.com | [1bab 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69e60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1bac 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69e60 gate 1589998844885963700 evaluation succeeds +peer1.org1.example.com | [1bad 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bae 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1baf 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1bb0 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1bb1 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bb2 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1bb3 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1bb4 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1bb5 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1bb6 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb7 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb8 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb9 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1bba 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbb 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbc 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbd 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1bbe 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:M\031N\333\242\312^\211O\204" > alive: alive: alive: +peer1.org1.example.com | [1bbf 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bc0 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bc1 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bc2 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bc3 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bc4 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1bc5 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer1.org1.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer1.org1.example.com | [1bc6 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer1.org1.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer1.org1.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1bc8 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 ec 46 a0 7a 2b cd d9 0a c0 a2 b1 |0D. ..F.z+......| +peer1.org1.example.com | 00000010 82 cb c1 e8 f9 5b 19 90 23 f2 f0 d4 aa 91 fc c7 |.....[..#.......| +peer1.org1.example.com | 00000020 9e a1 d7 7d 02 20 43 0b 08 7c dd d7 6b da 3c db |...}. C..|..k.<.| +peer1.org1.example.com | 00000030 c3 74 b3 7c 2a 7c 07 ea a7 2f 05 13 55 43 98 46 |.t.|*|.../..UC.F| +peer1.org1.example.com | 00000040 c9 a1 31 27 93 7a |..1'.z| +peer1.org1.example.com | [1bc9 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1bca 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1bcb 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1bcc 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1bcd 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1bce 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bcf 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bd0 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1bd1 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bd2 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bd3 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1bd4 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [1bd5 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bd6 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bd7 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bd8 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bd9 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bda 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bdb 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bdc 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bdd 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:41.452 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d63 Remaining bytes=[30409], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:41.452 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d64 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-05-20 18:21:41.452 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d65 blockbytes [30406] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:41.453 UTC [common.deliver] deliverBlocks -> DEBU 1d66 [channel: testchainid] Delivering block [1] for (0xc0013d1c00) for 172.18.0.9:53686" +orderer0.example.com | "2020-05-20 18:21:41.453 UTC [common.deliver] deliverBlocks -> DEBU 1d67 [channel: testchainid] Done delivering to 172.18.0.9:53686 for (0xc0013d1c00)" +orderer0.example.com | "2020-05-20 18:21:41.454 UTC [common.deliver] Handle -> DEBU 1d68 Waiting for new SeekInfo from 172.18.0.9:53686" +orderer0.example.com | "2020-05-20 18:21:41.454 UTC [common.deliver] Handle -> DEBU 1d69 Attempting to read seek info message from 172.18.0.9:53686" +orderer0.example.com | "2020-05-20 18:21:41.460 UTC [common.deliver] Handle -> WARN 1d6a Error reading from 172.18.0.9:53686: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:41.461 UTC [orderer.common.server] func1 -> DEBU 1d6b Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:41.461 UTC [comm.grpc.server] 1 -> INFO 1d6c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53686 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.0797ms +orderer0.example.com | "2020-05-20 18:21:41.462 UTC [grpc] infof -> DEBU 1d6d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:41.618 UTC [orderer.common.server] Deliver -> DEBU 1d6e Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:41.618 UTC [common.deliver] Handle -> DEBU 1d6f Starting new deliver loop for 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.619 UTC [common.deliver] Handle -> DEBU 1d70 Attempting to read seek info message from 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.620 UTC [policies] Evaluate -> DEBU 1d71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.620 UTC [policies] Evaluate -> DEBU 1d72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.620 UTC [policies] Evaluate -> DEBU 1d73 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.621 UTC [policies] Evaluate -> DEBU 1d74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.621 UTC [policies] Evaluate -> DEBU 1d75 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.621 UTC [cauthdsl] func1 -> DEBU 1d76 0xc00056e040 gate 1589998901621409900 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:41.621 UTC [cauthdsl] func2 -> DEBU 1d77 0xc00056e040 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:41.621 UTC [cauthdsl] func2 -> DEBU 1d78 0xc00056e040 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:41.622 UTC [cauthdsl] func2 -> DEBU 1d79 0xc00056e040 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:41.622 UTC [msp.identity] Verify -> DEBU 1d7a Verify: digest = 00000000 09 5a 94 5a 24 d0 5d 6f c1 99 22 4b 84 5c 29 ad |.Z.Z$.]o.."K.\).| +orderer0.example.com | 00000010 a9 be 1d eb 26 b0 c0 2f a0 f6 79 f1 5a f7 61 e4 |....&../..y.Z.a.|" +orderer0.example.com | "2020-05-20 18:21:41.622 UTC [msp.identity] Verify -> DEBU 1d7b Verify: sig = 00000000 30 44 02 20 79 7b 72 01 a8 82 7f bf 98 d0 b4 ca |0D. y{r.........| +orderer0.example.com | 00000010 19 b1 90 e7 ca 22 1c 5a e6 02 65 62 74 92 3e ae |.....".Z..ebt.>.| +orderer0.example.com | 00000020 95 5b 8e bc 02 20 32 f7 cc 64 5f cb 7e 91 56 a6 |.[... 2..d_.~.V.| +orderer0.example.com | 00000030 f1 2d 16 c7 23 59 b0 3d 8b 07 60 9a 65 1a fb 8f |.-..#Y.=..`.e...| +orderer0.example.com | 00000040 25 a3 cc db 87 52 |%....R|" +orderer0.example.com | "2020-05-20 18:21:41.623 UTC [cauthdsl] func2 -> DEBU 1d7c 0xc00056e040 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:41.623 UTC [cauthdsl] func1 -> DEBU 1d7d 0xc00056e040 gate 1589998901621409900 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:41.623 UTC [policies] Evaluate -> DEBU 1d7e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.623 UTC [policies] Evaluate -> DEBU 1d7f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.623 UTC [policies] Evaluate -> DEBU 1d80 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.623 UTC [policies] Evaluate -> DEBU 1d81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.624 UTC [policies] Evaluate -> DEBU 1d82 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.624 UTC [policies] Evaluate -> DEBU 1d83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.624 UTC [common.deliver] deliverBlocks -> DEBU 1d84 [channel: testchainid] Received seekInfo (0xc001112240) start: > stop: > from 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.624 UTC [fsblkstorage] Next -> DEBU 1d85 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-05-20 18:21:41.625 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d86 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +orderer0.example.com | "2020-05-20 18:21:41.625 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d87 Remaining bytes=[30409], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:41.625 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d88 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-05-20 18:21:41.626 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d89 blockbytes [30406] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:41.626 UTC [common.deliver] deliverBlocks -> DEBU 1d8a [channel: testchainid] Delivering block [1] for (0xc001112240) for 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.626 UTC [common.deliver] deliverBlocks -> DEBU 1d8b [channel: testchainid] Done delivering to 172.18.0.9:53688 for (0xc001112240)" +orderer0.example.com | "2020-05-20 18:21:41.626 UTC [common.deliver] Handle -> DEBU 1d8c Waiting for new SeekInfo from 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.627 UTC [common.deliver] Handle -> DEBU 1d8d Attempting to read seek info message from 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.632 UTC [policies] Evaluate -> DEBU 1d8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.632 UTC [policies] Evaluate -> DEBU 1d8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.633 UTC [policies] Evaluate -> DEBU 1d90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.633 UTC [policies] Evaluate -> DEBU 1d91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.633 UTC [policies] Evaluate -> DEBU 1d92 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.633 UTC [cauthdsl] func1 -> DEBU 1d93 0xc00059e4a0 gate 1589998901633819300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:41.634 UTC [cauthdsl] func2 -> DEBU 1d94 0xc00059e4a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:41.634 UTC [cauthdsl] func2 -> DEBU 1d95 0xc00059e4a0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:41.634 UTC [cauthdsl] func2 -> DEBU 1d96 0xc00059e4a0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:41.634 UTC [msp.identity] Verify -> DEBU 1d97 Verify: digest = 00000000 9e 17 23 1b a7 ed 91 6b 07 77 34 73 90 e4 92 2e |..#....k.w4s....| +orderer0.example.com | 00000010 c4 5a 79 e5 38 71 8e 40 37 2e e9 12 a4 09 13 0a |.Zy.8q.@7.......|" +orderer0.example.com | "2020-05-20 18:21:41.635 UTC [msp.identity] Verify -> DEBU 1d98 Verify: sig = 00000000 30 45 02 21 00 87 af f8 28 16 26 b7 8b 87 19 55 |0E.!....(.&....U| +orderer0.example.com | 00000010 7d 65 33 36 f9 9c bb 10 6d 98 7e f0 66 2a ad 44 |}e36....m.~.f*.D| +orderer0.example.com | 00000020 86 8b 28 ae 4e 02 20 61 43 f5 48 f9 32 17 b6 ac |..(.N. aC.H.2...| +orderer0.example.com | 00000030 fc b7 5d 45 82 4e 92 a7 47 83 61 c1 97 29 aa b4 |..]E.N..G.a..)..| +orderer0.example.com | 00000040 1c 2c 56 6a e5 37 4f |.,Vj.7O|" +orderer0.example.com | "2020-05-20 18:21:41.635 UTC [cauthdsl] func2 -> DEBU 1d99 0xc00059e4a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:41.636 UTC [cauthdsl] func1 -> DEBU 1d9a 0xc00059e4a0 gate 1589998901633819300 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:41.636 UTC [policies] Evaluate -> DEBU 1d9b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.636 UTC [policies] Evaluate -> DEBU 1d9c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.636 UTC [policies] Evaluate -> DEBU 1d9d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.637 UTC [policies] Evaluate -> DEBU 1d9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.637 UTC [policies] Evaluate -> DEBU 1d9f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.637 UTC [policies] Evaluate -> DEBU 1da0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.638 UTC [common.deliver] deliverBlocks -> DEBU 1da1 [channel: testchainid] Received seekInfo (0xc001112640) start: > stop: > from 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.638 UTC [fsblkstorage] Next -> DEBU 1da2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-05-20 18:21:41.638 UTC [fsblkstorage] newBlockfileStream -> DEBU 1da3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-05-20 18:21:41.638 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1da4 Remaining bytes=[53339], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:41.639 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1da5 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-05-20 18:21:41.639 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1da6 blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:41.639 UTC [common.deliver] deliverBlocks -> DEBU 1da7 [channel: testchainid] Delivering block [0] for (0xc001112640) for 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.639 UTC [common.deliver] deliverBlocks -> DEBU 1da8 [channel: testchainid] Done delivering to 172.18.0.9:53688 for (0xc001112640)" +orderer0.example.com | "2020-05-20 18:21:41.640 UTC [common.deliver] Handle -> DEBU 1da9 Waiting for new SeekInfo from 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.640 UTC [common.deliver] Handle -> DEBU 1daa Attempting to read seek info message from 172.18.0.9:53688" +orderer0.example.com | "2020-05-20 18:21:41.645 UTC [common.deliver] Handle -> WARN 1dab Error reading from 172.18.0.9:53688: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:41.645 UTC [orderer.common.server] func1 -> DEBU 1dac Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:41.646 UTC [comm.grpc.server] 1 -> INFO 1dad streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53688 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.6382ms +orderer0.example.com | "2020-05-20 18:21:41.646 UTC [grpc] infof -> DEBU 1dae transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:41.789 UTC [orderer.common.server] Deliver -> DEBU 1daf Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:41.790 UTC [common.deliver] Handle -> DEBU 1db0 Starting new deliver loop for 172.18.0.9:53690" +orderer0.example.com | "2020-05-20 18:21:41.791 UTC [common.deliver] Handle -> DEBU 1db1 Attempting to read seek info message from 172.18.0.9:53690" +orderer0.example.com | "2020-05-20 18:21:41.793 UTC [policies] Evaluate -> DEBU 1db2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.794 UTC [policies] Evaluate -> DEBU 1db3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.795 UTC [policies] Evaluate -> DEBU 1db4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.795 UTC [policies] Evaluate -> DEBU 1db5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.796 UTC [policies] Evaluate -> DEBU 1db6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.796 UTC [cauthdsl] func1 -> DEBU 1db7 0xc0009d8f70 gate 1589998901796896300 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:41.797 UTC [cauthdsl] func2 -> DEBU 1db8 0xc0009d8f70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:41.797 UTC [cauthdsl] func2 -> DEBU 1db9 0xc0009d8f70 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:41.798 UTC [cauthdsl] func2 -> DEBU 1dba 0xc0009d8f70 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:41.799 UTC [msp.identity] Verify -> DEBU 1dbb Verify: digest = 00000000 fb 7c ef a1 7a d7 27 8a a6 3b f1 b2 c1 7f e0 4c |.|..z.'..;.....L| +orderer0.example.com | 00000010 7a a4 3a c9 3f c6 1e c6 d5 e9 79 63 cd a5 c7 bc |z.:.?.....yc....|" +orderer0.example.com | "2020-05-20 18:21:41.799 UTC [msp.identity] Verify -> DEBU 1dbc Verify: sig = 00000000 30 45 02 21 00 fe d7 b4 83 19 f4 8c 8d 27 10 8d |0E.!.........'..| +orderer0.example.com | 00000010 d0 03 60 c1 2a 89 aa 5e 7f 4c f1 41 8c a4 c1 84 |..`.*..^.L.A....| +orderer0.example.com | 00000020 35 eb 13 18 a9 02 20 19 69 89 94 73 e0 8c f6 d2 |5..... .i..s....| +orderer0.example.com | 00000030 ec a0 79 74 de 52 40 eb a9 a9 60 41 62 b1 6d 02 |..yt.R@...`Ab.m.| +orderer0.example.com | 00000040 ff e8 0f ec b0 db 35 |......5|" +orderer0.example.com | "2020-05-20 18:21:41.800 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc0009d8f70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:41.801 UTC [cauthdsl] func1 -> DEBU 1dbe 0xc0009d8f70 gate 1589998901796896300 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:41.801 UTC [policies] Evaluate -> DEBU 1dbf Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.802 UTC [policies] Evaluate -> DEBU 1dc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:41.802 UTC [policies] Evaluate -> DEBU 1dc1 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1bde 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bdf 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1be0 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1be1 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1be2 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1be3 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1be4 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1be5 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1be6 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1be7 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1be8 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1be9 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1bea 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1bec 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1bed 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1beb 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bee 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1bef 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebb010 gate 1589998845174475100 evaluation starts +peer1.org1.example.com | [1bf0 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebb010 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1bf1 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebb010 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1bf2 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebb010 principal matched by identity 0 +peer1.org1.example.com | [1bf3 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer1.org1.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer1.org1.example.com | [1bf4 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer1.org1.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer1.org1.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer1.org1.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer1.org1.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer1.org1.example.com | [1bf5 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebb010 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1bf6 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebb010 gate 1589998845174475100 evaluation succeeds +peer1.org1.example.com | [1bf7 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bf8 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bf9 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1bfa 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1bfb 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1bfc 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1bfd 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1bfe 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1bff 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1c00 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c01 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c02 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1c03 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c04 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c05 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c06 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1c07 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1c08 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c09 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c0a 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c0b 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [1c0c 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [1c0d 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1c0e 05-20 18:20:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1c0f 05-20 18:20:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 41 cd cc 6d be 0f 3d 17 18 8a 5d 33 79 fd c0 |zA..m..=...]3y..| +peer1.org1.example.com | 00000010 c4 f0 b3 bf 50 39 d7 1e 42 29 05 ce 2d 9f 36 e8 |....P9..B)..-.6.| +peer1.org1.example.com | [1c10 05-20 18:20:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 6e 97 87 82 69 fd c8 6f 08 76 |0E.!..n...i..o.v| +peer1.org1.example.com | 00000010 11 4d 0a da ce 64 a5 ad 65 48 7b 66 ed c0 56 7e |.M...d..eH{f..V~| +peer1.org1.example.com | 00000020 b2 e5 c5 f0 c2 02 20 2a 23 dd 91 4c c4 10 cc 57 |...... *#..L...W| +peer1.org1.example.com | 00000030 b5 f9 4e 56 d3 22 e2 59 31 86 d8 c4 4d 81 a5 42 |..NV.".Y1...M..B| +peer1.org1.example.com | 00000040 78 86 bf d9 7b 9b e8 |x...{..| +peer1.org1.example.com | [1c11 05-20 18:20:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c12 05-20 18:20:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c13 05-20 18:20:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c14 05-20 18:20:45.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +orderer0.example.com | "2020-05-20 18:21:41.802 UTC [policies] Evaluate -> DEBU 1dc2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:41.802 UTC [policies] Evaluate -> DEBU 1dc3 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.803 UTC [policies] Evaluate -> DEBU 1dc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:41.803 UTC [common.deliver] deliverBlocks -> DEBU 1dc5 [channel: testchainid] Received seekInfo (0xc001113000) start: > stop: > from 172.18.0.9:53690" +orderer0.example.com | "2020-05-20 18:21:41.803 UTC [fsblkstorage] Next -> DEBU 1dc6 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-05-20 18:21:41.803 UTC [fsblkstorage] newBlockfileStream -> DEBU 1dc7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-05-20 18:21:41.804 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc8 Remaining bytes=[53339], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:41.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc9 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-05-20 18:21:41.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dca blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:41.805 UTC [common.deliver] deliverBlocks -> DEBU 1dcb [channel: testchainid] Delivering block [0] for (0xc001113000) for 172.18.0.9:53690" +orderer0.example.com | "2020-05-20 18:21:41.806 UTC [common.deliver] deliverBlocks -> DEBU 1dcc [channel: testchainid] Done delivering to 172.18.0.9:53690 for (0xc001113000)" +orderer0.example.com | "2020-05-20 18:21:41.807 UTC [common.deliver] Handle -> DEBU 1dcd Waiting for new SeekInfo from 172.18.0.9:53690" +orderer0.example.com | "2020-05-20 18:21:41.807 UTC [common.deliver] Handle -> DEBU 1dce Attempting to read seek info message from 172.18.0.9:53690" +orderer0.example.com | "2020-05-20 18:21:41.814 UTC [common.deliver] Handle -> WARN 1dcf Error reading from 172.18.0.9:53690: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:41.816 UTC [orderer.common.server] func1 -> DEBU 1dd0 Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:41.816 UTC [comm.grpc.server] 1 -> INFO 1dd1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53690 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1479ms +orderer0.example.com | "2020-05-20 18:21:41.817 UTC [grpc] infof -> DEBU 1dd2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:41.824 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dd3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:41.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dd4 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2020-05-20 18:21:41.825 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 407.5µs " +orderer0.example.com | "2020-05-20 18:21:41.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dd6 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2020-05-20 18:21:41.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dd7 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +orderer0.example.com | "2020-05-20 18:21:41.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +orderer0.example.com | "2020-05-20 18:21:41.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 423.9µs " +orderer0.example.com | "2020-05-20 18:21:41.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dda Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:41.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ddb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:41.997 UTC [orderer.common.server] Deliver -> DEBU 1ddc Starting new Deliver handler" +orderer0.example.com | "2020-05-20 18:21:41.998 UTC [common.deliver] Handle -> DEBU 1ddd Starting new deliver loop for 172.18.0.9:53692" +orderer0.example.com | "2020-05-20 18:21:41.998 UTC [common.deliver] Handle -> DEBU 1dde Attempting to read seek info message from 172.18.0.9:53692" +orderer0.example.com | "2020-05-20 18:21:41.999 UTC [policies] Evaluate -> DEBU 1ddf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.999 UTC [policies] Evaluate -> DEBU 1de0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:41.999 UTC [policies] Evaluate -> DEBU 1de1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-05-20 18:21:41.999 UTC [policies] Evaluate -> DEBU 1de2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-05-20 18:21:42.000 UTC [policies] Evaluate -> DEBU 1de3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-05-20 18:21:42.000 UTC [cauthdsl] func1 -> DEBU 1de4 0xc0009f9ed0 gate 1589998902000496700 evaluation starts" +orderer0.example.com | "2020-05-20 18:21:42.000 UTC [cauthdsl] func2 -> DEBU 1de5 0xc0009f9ed0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-05-20 18:21:42.000 UTC [cauthdsl] func2 -> DEBU 1de6 0xc0009f9ed0 processing identity 0 with bytes of fe0d40" +orderer0.example.com | "2020-05-20 18:21:42.001 UTC [cauthdsl] func2 -> DEBU 1de7 0xc0009f9ed0 principal matched by identity 0" +orderer0.example.com | "2020-05-20 18:21:42.001 UTC [msp.identity] Verify -> DEBU 1de8 Verify: digest = 00000000 27 b5 fd 25 3f d1 2e b2 a6 d4 e9 61 a8 24 1c 47 |'..%?......a.$.G| +orderer0.example.com | 00000010 5c dd d4 c9 ad 15 2d 7c 11 6a 7b e0 43 89 34 1b |\.....-|.j{.C.4.|" +orderer0.example.com | "2020-05-20 18:21:42.001 UTC [msp.identity] Verify -> DEBU 1de9 Verify: sig = 00000000 30 45 02 21 00 e4 c0 78 9e f4 fe b0 b3 b9 90 61 |0E.!...x.......a| +orderer0.example.com | 00000010 1a 45 c4 58 f6 10 b2 ec 98 b6 5b d5 6d 1d 46 7f |.E.X......[.m.F.| +orderer0.example.com | 00000020 e9 20 99 a2 03 02 20 4b 5f 9f d7 42 e5 1b a0 e0 |. .... K_..B....| +orderer0.example.com | 00000030 3f 0c 0c a0 ac a5 cb 23 34 42 a7 48 ab 81 b3 8b |?......#4B.H....| +orderer0.example.com | 00000040 ba dd 84 ec eb 18 d4 |.......|" +peer0.org1.example.com | [1941 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1942 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1943 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1944 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1945 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1946 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1947 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 gate 1589998834000121000 evaluation starts +peer0.org1.example.com | [1948 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1949 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [194a 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 principal matched by identity 0 +peer0.org1.example.com | [194b 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb a0 7e 49 c8 bd 4b 9e 8a 70 52 7b b1 10 c2 a3 |..~I..K..pR{....| +peer0.org1.example.com | 00000010 b7 f0 4d b5 21 5b 9f d6 45 99 4b 15 a9 25 37 2c |..M.![..E.K..%7,| +peer0.org1.example.com | [194c 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 0a d0 c1 d4 96 4a ed c0 db 47 58 |0D. C.....J...GX| +peer0.org1.example.com | 00000010 03 ee 34 79 83 82 7a 2a 46 e8 6e 87 fe da fd 64 |..4y..z*F.n....d| +peer0.org1.example.com | 00000020 18 08 2f 7d 02 20 57 73 7b 3a 7f 38 48 33 c0 8b |../}. Ws{:.8H3..| +peer0.org1.example.com | 00000030 2f ff a7 c1 44 f4 ed a6 8a 3e 1d b7 73 83 7d 9a |/...D....>..s.}.| +peer0.org1.example.com | 00000040 dc cc 0a ab bb bc |......| +peer0.org1.example.com | [194d 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [194e 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 gate 1589998834000121000 evaluation succeeds +peer0.org1.example.com | [194f 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1950 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1951 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1952 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1953 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1954 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1955 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1956 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1957 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1958 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [195a 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1959 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [195b 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [195c 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [195d 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [195e 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1960 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [195f 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1963 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1961 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a69 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a6a 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a6b 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a6c 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a6d 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a6e 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a6f 05-20 18:20:35.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a70 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a71 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a72 05-20 18:20:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a73 05-20 18:20:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a74 05-20 18:20:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1a75 05-20 18:20:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a76 05-20 18:20:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a77 05-20 18:20:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a79 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a78 05-20 18:20:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a7a 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a7b 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a7c 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1a7d 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1a7e 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a7f 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a80 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a81 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a82 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a83 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a84 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a85 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1a86 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8310 gate 1589998836157538000 evaluation starts +peer0.org2.example.com | [1a87 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8310 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a88 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8310 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1a89 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1a8a 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8310 principal evaluation fails +peer0.org2.example.com | [1a8b 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8310 gate 1589998836157538000 evaluation fails +peer0.org2.example.com | [1a8c 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a8d 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a8e 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1a8f 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8880 gate 1589998836159168000 evaluation starts +peer0.org2.example.com | [1a90 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8880 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a91 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8880 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1a92 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8880 principal matched by identity 0 +peer0.org2.example.com | [1a93 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1a94 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1a95 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8880 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a96 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f8880 gate 1589998836159168000 evaluation succeeds +peer0.org2.example.com | [1a97 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a98 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a99 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a9a 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a9b 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1a9c 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [1a9e 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a9f 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1aa0 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1aa1 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1aa2 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1aa3 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1aa4 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1aa5 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310170 gate 1589998836167343500 evaluation starts +peer0.org2.example.com | [1aa6 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1aa7 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310170 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1aa8 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1aa9 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310170 principal evaluation fails +peer0.org2.example.com | [1aaa 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004310170 gate 1589998836167343500 evaluation fails +peer0.org2.example.com | [1aab 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1aac 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1aad 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1aae 05-20 18:20:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043106e0 gate 1589998836169946800 evaluation starts +peer0.org2.example.com | [1aaf 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043106e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ab0 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043106e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1ab1 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043106e0 principal matched by identity 0 +peer0.org2.example.com | [1ab2 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1ab3 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1ab4 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043106e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ab5 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043106e0 gate 1589998836169946800 evaluation succeeds +peer0.org2.example.com | [1ab6 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ab7 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ab8 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ab9 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1aba 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1abb 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1abc 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1abd 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1abe 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1abf 05-20 18:20:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ac0 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ac1 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ac2 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ac3 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ac4 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ac5 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311b30 gate 1589998836180935300 evaluation starts +peer0.org2.example.com | [1ac6 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311b30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ac7 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311b30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1ac8 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1ac9 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311b30 principal evaluation fails +peer0.org2.example.com | [1aca 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004311b30 gate 1589998836180935300 evaluation fails +peer0.org2.example.com | [1acb 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1acc 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1acd 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1c15 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c16 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c17 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c18 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c19 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c1a 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c1b 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1c1c 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c1d 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c1e 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c1f 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1c20 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c21 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c22 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c23 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c24 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c25 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c26 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c27 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c28 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c29 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c2a 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c2b 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c2c 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c2d 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c2e 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c2f 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c30 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c31 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c32 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f24230 gate 1589998847882678800 evaluation starts +peer1.org1.example.com | [1c33 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f24230 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c34 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f24230 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1c35 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f24230 principal matched by identity 0 +peer1.org1.example.com | [1c36 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1c37 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1c38 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f24230 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c39 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f24230 gate 1589998847882678800 evaluation succeeds +peer1.org1.example.com | [1c3a 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c3b 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c3c 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c3d 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c3e 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1c3f 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1c40 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c41 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c42 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c43 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c44 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c45 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c46 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c47 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c48 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f25b20 gate 1589998847889186300 evaluation starts +peer1.org1.example.com | [1c49 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f25b20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c4a 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f25b20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1c4b 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f25b20 principal matched by identity 0 +peer1.org1.example.com | [1c4c 05-20 18:20:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1c4d 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003f25b20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c4f 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f25b20 gate 1589998847889186300 evaluation succeeds +peer1.org1.example.com | [1c50 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c51 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1964 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1965 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1966 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1967 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1968 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1962 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1969 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [196a 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196b 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [196c 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [196d 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [196e 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [196f 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1970 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1972 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1971 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1973 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1974 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1975 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1976 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1977 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 gate 1589998834068981000 evaluation starts +peer0.org1.example.com | [1978 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1979 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [197a 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 principal matched by identity 0 +peer0.org1.example.com | [197b 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 df 24 11 a4 32 62 18 97 72 4a 73 00 e0 3b 5d |8.$..2b..rJs..;]| +peer0.org1.example.com | 00000010 d4 e9 c7 ac d4 51 f0 d9 69 4b 06 d0 8a 16 d4 ff |.....Q..iK......| +peer0.org1.example.com | [197c 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 57 8a 43 f9 8b 9e 3b 58 86 ab 11 |0D. MW.C...;X...| +peer0.org1.example.com | 00000010 e6 aa 4f 20 88 b1 98 1f 02 ec 52 ab 7d 91 48 6b |..O ......R.}.Hk| +peer0.org1.example.com | 00000020 b6 78 5b 93 02 20 31 52 31 51 f6 37 10 5e 17 9f |.x[.. 1R1Q.7.^..| +peer0.org1.example.com | 00000030 9c 00 63 fc 5d ec 7a 00 5d 32 4c 73 23 6e fd d2 |..c.].z.]2Ls#n..| +peer0.org1.example.com | 00000040 ab bd e1 98 8b 4d |.....M| +peer1.org2.example.com | [1a9f 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1aa0 05-20 18:20:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1aa1 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1aa2 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1aa3 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1aa4 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1aa5 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fdae0 gate 1589998840481800900 evaluation starts +peer1.org2.example.com | [1aa6 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fdae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1aa7 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fdae0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1aa8 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fdae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1aa9 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fdae0 principal evaluation fails +peer1.org2.example.com | [1aaa 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041fdae0 gate 1589998840481800900 evaluation fails +peer1.org2.example.com | [1aab 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1aac 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1aad 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1aae 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004214050 gate 1589998840484633200 evaluation starts +peer1.org2.example.com | [1aaf 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004214050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ab0 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004214050 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1ab1 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004214050 principal matched by identity 0 +peer1.org2.example.com | [1ab2 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1ab3 05-20 18:20:40.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1ab4 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004214050 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ab5 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004214050 gate 1589998840484633200 evaluation succeeds +peer1.org2.example.com | [1ab6 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ab7 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ab8 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1ab9 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1aba 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1abb 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1abc 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1abd 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [1abf 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ac0 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1ac1 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [1ac3 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac4 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1ac5 05-20 18:20:40.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ac6 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ac7 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ac8 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ac9 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1aca 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042308c0 gate 1589998840503526600 evaluation starts +peer1.org2.example.com | [1acb 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042308c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1acc 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042308c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1acd 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042308c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1ace 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042308c0 principal evaluation fails +peer1.org2.example.com | [1acf 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042308c0 gate 1589998840503526600 evaluation fails +peer1.org2.example.com | [1ad0 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ad1 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ad2 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ad3 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004230e30 gate 1589998840506975200 evaluation starts +peer1.org2.example.com | [1ad4 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004230e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ad5 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004230e30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1ad6 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004230e30 principal matched by identity 0 +peer1.org2.example.com | [1ad7 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1ad8 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1ad9 05-20 18:20:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004230e30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ada 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004230e30 gate 1589998840506975200 evaluation succeeds +peer1.org2.example.com | [1adb 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1adc 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1add 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1ade 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1adf 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ae0 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [197d 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [197e 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 gate 1589998834068981000 evaluation succeeds +peer0.org1.example.com | [197f 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1980 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1981 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1982 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1983 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1984 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1985 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1986 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1987 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1988 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1989 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [198a 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [198b 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [198c 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [198d 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [198e 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [198f 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1990 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1991 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1992 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1993 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1994 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1995 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1996 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1997 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1998 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1999 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [199a 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [199b 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [199c 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [199d 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [199e 05-20 18:20:34.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [199f 05-20 18:20:34.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19a0 05-20 18:20:34.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19a1 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19a2 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:42.002 UTC [cauthdsl] func2 -> DEBU 1dea 0xc0009f9ed0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-05-20 18:21:42.002 UTC [cauthdsl] func1 -> DEBU 1deb 0xc0009f9ed0 gate 1589998902000496700 evaluation succeeds" +orderer0.example.com | "2020-05-20 18:21:42.002 UTC [policies] Evaluate -> DEBU 1dec Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:42.002 UTC [policies] Evaluate -> DEBU 1ded == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-05-20 18:21:42.002 UTC [policies] Evaluate -> DEBU 1dee Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:42.002 UTC [policies] Evaluate -> DEBU 1def == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-05-20 18:21:42.003 UTC [policies] Evaluate -> DEBU 1df0 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:42.003 UTC [policies] Evaluate -> DEBU 1df1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-05-20 18:21:42.003 UTC [common.deliver] deliverBlocks -> DEBU 1df2 [channel: testchainid] Received seekInfo (0xc001113cc0) start: > stop: > from 172.18.0.9:53692" +orderer0.example.com | "2020-05-20 18:21:42.003 UTC [fsblkstorage] Next -> DEBU 1df3 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-05-20 18:21:42.003 UTC [fsblkstorage] newBlockfileStream -> DEBU 1df4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +orderer0.example.com | "2020-05-20 18:21:42.003 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1df5 Remaining bytes=[30409], Going to peek [8] bytes" +orderer0.example.com | "2020-05-20 18:21:42.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1df6 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-05-20 18:21:42.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1df7 blockbytes [30406] read from file [0]" +orderer0.example.com | "2020-05-20 18:21:42.004 UTC [common.deliver] deliverBlocks -> DEBU 1df8 [channel: testchainid] Delivering block [1] for (0xc001113cc0) for 172.18.0.9:53692" +orderer0.example.com | "2020-05-20 18:21:42.004 UTC [common.deliver] deliverBlocks -> DEBU 1df9 [channel: testchainid] Done delivering to 172.18.0.9:53692 for (0xc001113cc0)" +orderer0.example.com | "2020-05-20 18:21:42.004 UTC [common.deliver] Handle -> DEBU 1dfa Waiting for new SeekInfo from 172.18.0.9:53692" +orderer0.example.com | "2020-05-20 18:21:42.004 UTC [common.deliver] Handle -> DEBU 1dfb Attempting to read seek info message from 172.18.0.9:53692" +orderer0.example.com | "2020-05-20 18:21:42.013 UTC [common.deliver] Handle -> WARN 1dfc Error reading from 172.18.0.9:53692: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-05-20 18:21:42.014 UTC [orderer.common.server] func1 -> DEBU 1dfd Closing Deliver stream" +orderer0.example.com | "2020-05-20 18:21:42.015 UTC [comm.grpc.server] 1 -> INFO 1dff streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53692 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.936ms +orderer0.example.com | "2020-05-20 18:21:42.014 UTC [grpc] infof -> DEBU 1dfe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-05-20 18:21:42.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e00 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:42.321 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e01 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2020-05-20 18:21:42.321 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.7µs " +orderer0.example.com | "2020-05-20 18:21:42.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e03 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +orderer0.example.com | "2020-05-20 18:21:42.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e04 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2020-05-20 18:21:42.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.9µs " +orderer0.example.com | "2020-05-20 18:21:42.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.3µs " +orderer0.example.com | "2020-05-20 18:21:42.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e07 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:42.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e08 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:42.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e09 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:42.822 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e0a Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-05-20 18:21:42.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.9µs " +orderer0.example.com | "2020-05-20 18:21:42.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e0c Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +orderer0.example.com | "2020-05-20 18:21:42.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e0d Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +orderer0.example.com | "2020-05-20 18:21:42.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +orderer0.example.com | "2020-05-20 18:21:42.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.1µs " +orderer0.example.com | "2020-05-20 18:21:42.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e10 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:42.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e11 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:43.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e12 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:43.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e13 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +orderer0.example.com | "2020-05-20 18:21:43.323 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 321.4µs " +peer1.org2.example.com | [1ae1 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1ae2 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ae3 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ae4 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ae5 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ae6 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ae7 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248030 gate 1589998840516439500 evaluation starts +peer1.org2.example.com | [1ae8 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ae9 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248030 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1aea 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1aeb 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248030 principal evaluation fails +peer1.org2.example.com | [1aec 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248030 gate 1589998840516439500 evaluation fails +peer1.org2.example.com | [1aed 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1aee 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1aef 05-20 18:20:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1af0 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042485a0 gate 1589998840520234000 evaluation starts +peer1.org2.example.com | [1af1 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042485a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1af2 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042485a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1af3 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042485a0 principal matched by identity 0 +peer1.org2.example.com | [1af4 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1af5 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1af6 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042485a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1af7 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042485a0 gate 1589998840520234000 evaluation succeeds +peer1.org2.example.com | [1af8 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1af9 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1afa 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1afb 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1afc 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1afd 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1afe 05-20 18:20:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aff 05-20 18:20:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b00 05-20 18:20:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b01 05-20 18:20:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b02 05-20 18:20:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b03 05-20 18:20:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b04 05-20 18:20:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b05 05-20 18:20:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b06 05-20 18:20:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b07 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b08 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b09 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042600e0 gate 1589998840551103900 evaluation starts +peer1.org2.example.com | [1b0a 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042600e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b0b 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042600e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1b0c 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042600e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b0d 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042600e0 principal evaluation fails +peer1.org2.example.com | [1b0e 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042600e0 gate 1589998840551103900 evaluation fails +peer1.org2.example.com | [1b0f 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b10 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b11 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b12 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004260650 gate 1589998840557543600 evaluation starts +peer1.org2.example.com | [1b13 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004260650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b14 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004260650 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1b15 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004260650 principal matched by identity 0 +peer1.org2.example.com | [1b16 05-20 18:20:40.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1b17 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1b18 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004260650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b19 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004260650 gate 1589998840557543600 evaluation succeeds +peer1.org2.example.com | [1b1a 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b1b 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b1c 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1b1d 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b1e 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b1f 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b20 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b21 05-20 18:20:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b22 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b23 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b24 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b25 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b26 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261850 gate 1589998840571383000 evaluation starts +peer1.org2.example.com | [1b27 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b28 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261850 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1b29 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b2a 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261850 principal evaluation fails +peer1.org2.example.com | [1b2b 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261850 gate 1589998840571383000 evaluation fails +peer1.org2.example.com | [1b2c 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b2d 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b2e 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b2f 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261dc0 gate 1589998840571837200 evaluation starts +peer1.org2.example.com | [1b30 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b31 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261dc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1b32 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261dc0 principal matched by identity 0 +peer1.org2.example.com | [1b33 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1b34 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1b35 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261dc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b36 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261dc0 gate 1589998840571837200 evaluation succeeds +peer1.org2.example.com | [1b37 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b38 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b39 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1b3a 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b3b 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1ace 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043260a0 gate 1589998836185293900 evaluation starts +peer0.org2.example.com | [1acf 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043260a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ad0 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043260a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1ad1 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043260a0 principal matched by identity 0 +peer0.org2.example.com | [1ad2 05-20 18:20:36.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1ad3 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1ad4 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043260a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ad5 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043260a0 gate 1589998836185293900 evaluation succeeds +peer0.org2.example.com | [1ad6 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ad7 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ad8 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ad9 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ada 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1adb 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1adc 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1add 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ade 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1adf 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ae0 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ae1 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ae2 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043272a0 gate 1589998836197050500 evaluation starts +peer0.org2.example.com | [1ae3 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043272a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ae4 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043272a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1ae5 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043272a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1ae6 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043272a0 principal evaluation fails +peer0.org2.example.com | [1ae7 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043272a0 gate 1589998836197050500 evaluation fails +peer0.org2.example.com | [1ae8 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ae9 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1aea 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1aeb 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004327810 gate 1589998836198140700 evaluation starts +peer0.org2.example.com | [1aec 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004327810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1aed 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004327810 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1aee 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004327810 principal matched by identity 0 +peer0.org2.example.com | [1aef 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1af0 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | [19a3 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19a4 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a5 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19a6 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19a7 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a8 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19a9 05-20 18:20:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19aa 05-20 18:20:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ab 05-20 18:20:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ac 05-20 18:20:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ad 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19ae 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19af 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19b0 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19b1 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b2 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19b3 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b4 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19b5 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19b6 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [19b7 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [19b9 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19ba 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [19bb 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b8 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [19bc 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19bd 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [19be 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [19bf 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19c0 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19c1 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c52 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c53 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c54 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1c55 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1c56 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c57 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c58 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1c59 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1c5a 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1c5b 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1c5c 05-20 18:20:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c5d 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c5e 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c5f 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c60 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c61 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c62 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c63 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c64 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5e390 gate 1589998847901600800 evaluation starts +peer1.org1.example.com | [1c65 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5e390 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c66 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5e390 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1c67 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5e390 principal matched by identity 0 +peer1.org1.example.com | [1c68 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1c69 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1c6a 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5e390 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c6b 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5e390 gate 1589998847901600800 evaluation succeeds +peer0.org1.example.com | [19c2 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [19c3 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19c4 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19c5 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [19c6 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [19c7 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [19c8 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 gate 1589998835616878700 evaluation starts +peer0.org1.example.com | [19c9 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [19ca 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [19cc 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [19cb 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 principal matched by identity 0 +peer0.org1.example.com | [19cd 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [19ce 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [19d0 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [19d1 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 gate 1589998835616878700 evaluation succeeds +peer0.org1.example.com | [19d2 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19d3 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19d4 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [19d5 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [19d6 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [19d7 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [19d8 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [19d9 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [19da 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19db 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1af1 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004327810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1af2 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004327810 gate 1589998836198140700 evaluation succeeds +peer0.org2.example.com | [1af3 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1af4 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1af5 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1af6 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1af7 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1af8 05-20 18:20:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1af9 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1afa 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [1afc 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1afd 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1afe 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aff 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b00 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b01 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b02 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b03 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1b04 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b05 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1b06 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434ba40 gate 1589998836206205100 evaluation starts +peer0.org2.example.com | [1b07 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434ba40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b08 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434ba40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1b09 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434ba40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1b0a 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434ba40 principal evaluation fails +peer0.org2.example.com | [1b0b 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434ba40 gate 1589998836206205100 evaluation fails +peer0.org2.example.com | [1b0c 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b0d 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b0e 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1b0f 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434bfb0 gate 1589998836207078300 evaluation starts +peer0.org2.example.com | [1b10 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434bfb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b11 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434bfb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1b12 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434bfb0 principal matched by identity 0 +peer0.org2.example.com | [1b13 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1b14 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1b15 05-20 18:20:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434bfb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1b16 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434bfb0 gate 1589998836207078300 evaluation succeeds +peer0.org2.example.com | [1b17 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b18 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b19 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b1a 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b1b 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b1c 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b1d 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b1e 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b1f 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b20 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1b21 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b22 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1b23 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043691b0 gate 1589998836213058600 evaluation starts +peer0.org2.example.com | [1b24 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043691b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b25 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043691b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1b26 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043691b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1b27 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043691b0 principal evaluation fails +peer0.org2.example.com | [1b28 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043691b0 gate 1589998836213058600 evaluation fails +peer0.org2.example.com | [1b29 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b2a 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b2b 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1b2c 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369720 gate 1589998836213677000 evaluation starts +peer0.org2.example.com | [1b2d 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369720 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b2e 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369720 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1b2f 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369720 principal matched by identity 0 +peer0.org2.example.com | [1b30 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1b31 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1b32 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369720 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1b33 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369720 gate 1589998836213677000 evaluation succeeds +peer0.org2.example.com | [1b34 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b35 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b36 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b37 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b38 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1b39 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | [1b3c 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1b3e 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1b3f 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b40 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b41 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b42 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b43 05-20 18:20:40.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b44 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b45 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b46 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b47 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b48 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1b49 05-20 18:20:40.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b4a 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b4b 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b4c 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b4d 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1b4e 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b4f 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b50 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b51 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b52 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b53 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b54 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b55 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa710 gate 1589998840642866600 evaluation starts +peer1.org2.example.com | [1b56 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa710 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b57 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa710 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1b58 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b59 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa710 principal evaluation fails +peer1.org2.example.com | [1b5a 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa710 gate 1589998840642866600 evaluation fails +peer1.org2.example.com | [1b5b 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b5c 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b5d 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b5e 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aac80 gate 1589998840654572600 evaluation starts +peer1.org2.example.com | [1b5f 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aac80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b60 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aac80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1b61 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aac80 principal matched by identity 0 +peer1.org2.example.com | [1b62 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer1.org2.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer1.org2.example.com | [1b63 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer1.org2.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer1.org2.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer1.org2.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer1.org2.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU 1e15 Sending msg of 28 bytes to 2 on channel businesschannel took 48.4µs" +orderer0.example.com | "2020-05-20 18:21:43.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e16 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2020-05-20 18:21:43.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.2µs " +orderer0.example.com | "2020-05-20 18:21:43.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.5µs " +orderer0.example.com | "2020-05-20 18:21:43.355 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e19 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:43.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e1a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:43.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e1b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:43.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e1c Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +orderer0.example.com | "2020-05-20 18:21:43.821 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.1µs " +orderer0.example.com | "2020-05-20 18:21:43.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e1e Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +orderer0.example.com | "2020-05-20 18:21:43.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e1f Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +orderer0.example.com | "2020-05-20 18:21:43.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.7µs " +orderer0.example.com | "2020-05-20 18:21:43.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.8µs " +orderer0.example.com | "2020-05-20 18:21:43.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e22 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:43.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e23 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:44.323 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e24 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:44.324 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e25 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +orderer0.example.com | "2020-05-20 18:21:44.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e26 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 359.4µs " +orderer0.example.com | "2020-05-20 18:21:44.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e27 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +orderer0.example.com | "2020-05-20 18:21:44.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e28 Sending msg of 28 bytes to 3 on channel businesschannel took 29.1µs" +orderer0.example.com | "2020-05-20 18:21:44.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 344.4µs " +orderer0.example.com | "2020-05-20 18:21:44.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 907.3µs " +orderer0.example.com | "2020-05-20 18:21:44.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e2b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:44.346 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e2c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:44.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e2d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:44.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e2e Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2020-05-20 18:21:44.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.5µs " +orderer0.example.com | "2020-05-20 18:21:44.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e30 Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +orderer0.example.com | "2020-05-20 18:21:44.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e32 Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" +orderer0.example.com | "2020-05-20 18:21:44.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e33 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:44.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 324.2µs " +orderer0.example.com | "2020-05-20 18:21:44.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs " +orderer0.example.com | "2020-05-20 18:21:44.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e35 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:45.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e36 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:45.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e37 Sending msg of 28 bytes to 3 on channel testchainid took 67.3µs" +orderer0.example.com | "2020-05-20 18:21:45.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.8µs " +orderer0.example.com | "2020-05-20 18:21:45.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e39 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +orderer0.example.com | "2020-05-20 18:21:45.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e3a Sending msg of 28 bytes to 3 on channel businesschannel took 34.7µs" +orderer0.example.com | "2020-05-20 18:21:45.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.1µs " +orderer0.example.com | "2020-05-20 18:21:45.343 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.366ms " +orderer0.example.com | "2020-05-20 18:21:45.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e3d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:45.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e3e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:45.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e3f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:45.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e40 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +orderer0.example.com | "2020-05-20 18:21:45.821 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +orderer0.example.com | "2020-05-20 18:21:45.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e42 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2020-05-20 18:21:45.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e43 Sending msg of 28 bytes to 2 on channel businesschannel took 123µs" +orderer0.example.com | "2020-05-20 18:21:45.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " +orderer0.example.com | "2020-05-20 18:21:45.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.7µs " +orderer0.example.com | "2020-05-20 18:21:45.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e46 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:45.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e47 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:46.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e48 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:46.321 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e49 Sending msg of 28 bytes to 3 on channel testchainid took 35.6µs" +orderer0.example.com | "2020-05-20 18:21:46.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.1µs " +orderer0.example.com | "2020-05-20 18:21:46.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e4b Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:21:46.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e4c Sending msg of 28 bytes to 3 on channel businesschannel took 10.5µs" +orderer0.example.com | "2020-05-20 18:21:46.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.9µs " +orderer0.example.com | "2020-05-20 18:21:46.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.5µs " +orderer0.example.com | "2020-05-20 18:21:46.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e4f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:46.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e50 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:46.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e51 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:46.822 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e52 Sending msg of 28 bytes to 3 on channel testchainid took 9µs" +orderer0.example.com | "2020-05-20 18:21:46.828 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e53 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.6055ms " +orderer0.example.com | "2020-05-20 18:21:46.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e54 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +orderer0.example.com | "2020-05-20 18:21:46.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e55 Sending msg of 28 bytes to 3 on channel businesschannel took 7.1µs" +orderer0.example.com | "2020-05-20 18:21:46.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.4µs " +orderer0.example.com | "2020-05-20 18:21:46.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.4µs " +orderer0.example.com | "2020-05-20 18:21:46.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e58 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:46.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e59 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:47.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e5a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:47.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5b Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2020-05-20 18:21:47.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e5c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +orderer0.example.com | "2020-05-20 18:21:47.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5d Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +orderer0.example.com | "2020-05-20 18:21:47.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5e Sending msg of 28 bytes to 3 on channel businesschannel took 31.3µs" +orderer0.example.com | "2020-05-20 18:21:47.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.9µs " +orderer0.example.com | "2020-05-20 18:21:47.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.3µs " +peer1.org2.example.com | [1b64 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aac80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b65 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aac80 gate 1589998840654572600 evaluation succeeds +peer1.org2.example.com | [1b66 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b67 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b68 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1b69 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b6a 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b6b 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1b6c 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1b6d 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1b6e 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1b6f 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b70 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b71 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b72 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1b73 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b74 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b75 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b76 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1b77 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b78 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b79 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > alive: alive: +peer1.org2.example.com | [1b7a 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b7b 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b7c 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b7d 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b7e 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b7f 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b80 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b81 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b82 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1b83 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b84 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [19dc 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [19dd 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19de 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19df 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [19e0 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [19e1 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [19e2 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 gate 1589998835627451100 evaluation starts +peer0.org1.example.com | [19e3 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [19e4 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [19e5 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 principal matched by identity 0 +peer0.org1.example.com | [19e6 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [19e7 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [19e8 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [19e9 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 gate 1589998835627451100 evaluation succeeds +peer0.org1.example.com | [19ea 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19eb 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19ec 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [19ed 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [19ee 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19ef 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [19f0 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19f1 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19f2 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19f3 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [19f4 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19f5 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19f6 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [19f7 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [19f8 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [19f9 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 gate 1589998835636452200 evaluation starts +peer0.org1.example.com | [19fa 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [19fb 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [19fc 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 principal matched by identity 0 +peer0.org1.example.com | [19fd 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [19fe 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | [1c6c 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c6d 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c6e 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c6f 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c70 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c71 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c72 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c73 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c74 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c75 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c76 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c77 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c78 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5f590 gate 1589998847906902400 evaluation starts +peer1.org1.example.com | [1c79 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5f590 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c7a 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5f590 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1c7b 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5f590 principal matched by identity 0 +peer1.org1.example.com | [1c7c 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1c7d 05-20 18:20:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003f5f590 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c7f 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5f590 gate 1589998847906902400 evaluation succeeds +peer1.org1.example.com | [1c80 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c81 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c82 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c83 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c84 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c85 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c86 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c87 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c88 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b85 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b86 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b87 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b88 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1b89 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b8a 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b8b 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b8c 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b8d 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1b8e 05-20 18:20:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer1.org2.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer1.org2.example.com | [1b90 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer1.org2.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer1.org2.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer1.org2.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU Obtaining identity +peer1.org2.example.com | [1b91 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b92 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1b93 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1b94 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 0c 82 c0 f0 ee 80 35 0d 72 73 |0E.!........5.rs| +peer1.org2.example.com | 00000010 a9 de 3d 2b 8b 39 ea 99 5f 1a cd 7b da c0 b4 12 |..=+.9.._..{....| +peer1.org2.example.com | 00000020 64 dc 15 1f 9f 02 20 51 45 6a 89 54 63 b5 f5 6f |d..... QEj.Tc..o| +peer1.org2.example.com | 00000030 b2 33 53 8d a7 e7 8f 02 c1 1f ab 6b 66 e0 dd 51 |.3S........kf..Q| +peer1.org2.example.com | 00000040 af 1f b2 79 f9 8e 86 |...y...| +peer1.org2.example.com | [1b95 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1b96 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [1b97 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1b98 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1b99 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1b9a 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b9b 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b9c 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b9d 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b9e 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [19ff 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a00 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 gate 1589998835636452200 evaluation succeeds +peer0.org1.example.com | [1a01 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a02 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a03 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a04 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a05 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1a06 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1a07 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a08 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a09 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a0a 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a0b 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a0c 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a0d 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a0e 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a0f 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 gate 1589998835650231500 evaluation starts +peer0.org1.example.com | [1a10 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a11 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1a12 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 principal matched by identity 0 +peer0.org1.example.com | [1a13 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1a14 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003800530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a16 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 gate 1589998835650231500 evaluation succeeds +peer0.org1.example.com | [1a17 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a18 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a19 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a1a 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a1b 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1a1c 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1b3b 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1b3c 05-20 18:20:36.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b3d 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b3e 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 ed 63 66 ff 08 97 31 39 d2 e3 1f 70 ea f8 c7 |..cf...19...p...| +peer0.org2.example.com | 00000010 43 8f 62 3a 4f 2b 18 55 75 87 73 82 33 48 0b 71 |C.b:O+.Uu.s.3H.q| +peer0.org2.example.com | [1b3f 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 15 3a 64 9e 66 ed 1f 1c 44 1b bf |0D. ..:d.f...D..| +peer0.org2.example.com | 00000010 5a fa a3 b4 e9 09 c0 ac 87 68 ed 3a 3b 69 9f a1 |Z........h.:;i..| +peer0.org2.example.com | 00000020 ce c0 0f e5 02 20 05 80 8d 99 c3 57 50 91 92 44 |..... .....WP..D| +peer0.org2.example.com | 00000030 33 43 6d cf 36 66 ef f4 6e c2 50 02 19 7c fd 29 |3Cm.6f..n.P..|.)| +peer0.org2.example.com | 00000040 ce 3a 08 e1 80 f9 |.:....| +peer0.org2.example.com | [1b40 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b41 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b42 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b43 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [1b44 05-20 18:20:36.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1b45 05-20 18:20:36.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b46 05-20 18:20:36.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b47 05-20 18:20:36.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1b48 05-20 18:20:36.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b49 05-20 18:20:36.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b4a 05-20 18:20:36.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b4b 05-20 18:20:36.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b4c 05-20 18:20:36.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b4d 05-20 18:20:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b4e 05-20 18:20:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b4f 05-20 18:20:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b50 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b51 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b52 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b53 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b54 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b55 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b56 05-20 18:20:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b57 05-20 18:20:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b58 05-20 18:20:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1b59 05-20 18:20:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5a 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b5b 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b5c 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b5d 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5e 05-20 18:20:36.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b5f 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b60 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b61 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b62 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 3017408182641646088, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b63 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b64 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 3017408182641646088, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b65 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1b66 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb a0 7e 49 c8 bd 4b 9e 8a 70 52 7b b1 10 c2 a3 |..~I..K..pR{....| +peer0.org2.example.com | 00000010 b7 f0 4d b5 21 5b 9f d6 45 99 4b 15 a9 25 37 2c |..M.![..E.K..%7,| +peer0.org2.example.com | [1b67 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 0a d0 c1 d4 96 4a ed c0 db 47 58 |0D. C.....J...GX| +peer0.org2.example.com | 00000010 03 ee 34 79 83 82 7a 2a 46 e8 6e 87 fe da fd 64 |..4y..z*F.n....d| +peer0.org2.example.com | 00000020 18 08 2f 7d 02 20 57 73 7b 3a 7f 38 48 33 c0 8b |../}. Ws{:.8H3..| +peer0.org2.example.com | 00000030 2f ff a7 c1 44 f4 ed a6 8a 3e 1d b7 73 83 7d 9a |/...D....>..s.}.| +peer0.org2.example.com | 00000040 dc cc 0a ab bb bc |......| +peer0.org2.example.com | [1b68 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b69 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b6a 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b6b 05-20 18:20:36.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b6c 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b6d 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b6e 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b6f 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1a1d 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a1e 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a1f 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1a20 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1a21 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1a22 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1a23 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a24 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a25 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a26 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a27 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a28 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a29 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a2a 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a2b 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 gate 1589998835658794700 evaluation starts +peer0.org1.example.com | [1a2c 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a2d 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1a2e 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 principal matched by identity 0 +peer0.org1.example.com | [1a2f 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1a30 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003826da0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a32 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 gate 1589998835658794700 evaluation succeeds +peer0.org1.example.com | [1a33 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a34 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a35 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a36 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a37 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a38 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:47.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e61 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:47.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e62 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:47.824 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e63 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:47.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e64 Sending msg of 28 bytes to 3 on channel testchainid took 22µs" +orderer0.example.com | "2020-05-20 18:21:47.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.9µs " +orderer0.example.com | "2020-05-20 18:21:47.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e66 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +orderer0.example.com | "2020-05-20 18:21:47.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e67 Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" +orderer0.example.com | "2020-05-20 18:21:47.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.1µs " +orderer0.example.com | "2020-05-20 18:21:47.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 997.6µs " +orderer0.example.com | "2020-05-20 18:21:47.862 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:47.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:48.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:48.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e6d Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +orderer0.example.com | "2020-05-20 18:21:48.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 400.3µs " +orderer0.example.com | "2020-05-20 18:21:48.371 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e6f Sending msg of 28 bytes to 2 on channel businesschannel took 209.6µs" +orderer0.example.com | "2020-05-20 18:21:48.371 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e70 Sending msg of 28 bytes to 3 on channel businesschannel took 26.4µs" +orderer0.example.com | "2020-05-20 18:21:48.372 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.6µs " +orderer0.example.com | "2020-05-20 18:21:48.372 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 574.9µs " +orderer0.example.com | "2020-05-20 18:21:48.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e73 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:48.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e74 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:48.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e75 Sending msg of 28 bytes to 2 on channel businesschannel took 46µs" +orderer0.example.com | "2020-05-20 18:21:48.843 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e76 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2020-05-20 18:21:48.844 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1972ms " +orderer0.example.com | "2020-05-20 18:21:48.845 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2264ms " +orderer0.example.com | "2020-05-20 18:21:48.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e79 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:48.893 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:48.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e7b Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +orderer0.example.com | "2020-05-20 18:21:48.897 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0379ms " +orderer0.example.com | "2020-05-20 18:21:48.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:49.324 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:49.326 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e7f Sending msg of 28 bytes to 3 on channel testchainid took 202.9µs" +orderer0.example.com | "2020-05-20 18:21:49.326 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.5µs " +orderer0.example.com | "2020-05-20 18:21:49.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e81 Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +orderer0.example.com | "2020-05-20 18:21:49.442 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e82 Sending msg of 28 bytes to 3 on channel businesschannel took 47.9µs" +orderer0.example.com | "2020-05-20 18:21:49.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " +orderer0.example.com | "2020-05-20 18:21:49.461 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.2091ms " +orderer0.example.com | "2020-05-20 18:21:49.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e85 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:49.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e86 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1b9f 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ba0 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ba1 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ba2 05-20 18:20:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [1ba3 05-20 18:20:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ba4 05-20 18:20:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ba5 05-20 18:20:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ba6 05-20 18:20:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ba7 05-20 18:20:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ba8 05-20 18:20:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [1ba9 05-20 18:20:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1baa 05-20 18:20:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bab 05-20 18:20:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bac 05-20 18:20:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bad 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bae 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1baf 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bb0 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1bb1 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bb2 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1bb3 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b70 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b71 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b72 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b73 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b74 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1b75 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b76 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1b77 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4030 gate 1589998836633858500 evaluation starts +peer0.org2.example.com | [1b78 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4030 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b79 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4030 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1b7a 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1b7b 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4030 principal evaluation fails +peer0.org2.example.com | [1b7c 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4030 gate 1589998836633858500 evaluation fails +peer0.org2.example.com | [1b7d 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b7e 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b7f 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1b80 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c45a0 gate 1589998836634515100 evaluation starts +peer0.org2.example.com | [1b81 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c45a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b82 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c45a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1b83 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c45a0 principal matched by identity 0 +peer0.org2.example.com | [1b84 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer0.org2.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer0.org2.example.com | [1b85 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer0.org2.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer0.org2.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer0.org2.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer0.org2.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer0.org2.example.com | [1b86 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c45a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1b87 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c45a0 gate 1589998836634515100 evaluation succeeds +peer0.org2.example.com | [1b88 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b89 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b8a 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b8b 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b8c 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b8d 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1b8e 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1a39 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a3a 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a3b 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a3c 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a3d 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a3e 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a3f 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 gate 1589998835666729100 evaluation starts +peer0.org1.example.com | [1a40 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a41 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1a42 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 principal matched by identity 0 +peer0.org1.example.com | [1a43 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1a44 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1a45 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a46 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 gate 1589998835666729100 evaluation succeeds +peer0.org1.example.com | [1a47 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a48 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a49 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a4b 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a4a 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [1a4c 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [1a4e 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1a4f 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610081801 +peer0.org1.example.com | [1a50 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F63FED5919F6E1CAEDC7D877E9052B154456C1ABD68984E57696241405921F22 +peer0.org1.example.com | [1a51 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [1a4d 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a52 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a53 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a54 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a55 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a56 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1a57 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a58 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a59 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a5a 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a5b 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:49.913 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e87 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +orderer0.example.com | "2020-05-20 18:21:49.913 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e88 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +orderer0.example.com | "2020-05-20 18:21:49.914 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.7µs " +orderer0.example.com | "2020-05-20 18:21:49.914 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.5µs " +orderer0.example.com | "2020-05-20 18:21:49.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e8b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:49.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 298.4µs " +orderer0.example.com | "2020-05-20 18:21:49.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e8d Sending msg of 28 bytes to 3 on channel testchainid took 113.9µs" +orderer0.example.com | "2020-05-20 18:21:49.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e8e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:49.930 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e8f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:50.333 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e90 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:50.336 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e91 Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +orderer0.example.com | "2020-05-20 18:21:50.338 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1249ms " +orderer0.example.com | "2020-05-20 18:21:50.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e93 Sending msg of 28 bytes to 2 on channel businesschannel took 38µs" +orderer0.example.com | "2020-05-20 18:21:50.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e94 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +orderer0.example.com | "2020-05-20 18:21:50.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.1µs " +orderer0.example.com | "2020-05-20 18:21:50.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.4µs " +orderer0.example.com | "2020-05-20 18:21:50.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e97 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:50.354 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e98 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:50.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e99 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:50.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e9a Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +orderer0.example.com | "2020-05-20 18:21:50.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 246µs " +orderer0.example.com | "2020-05-20 18:21:50.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e9c Sending msg of 28 bytes to 2 on channel businesschannel took 24.1µs" +orderer0.example.com | "2020-05-20 18:21:50.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e9d Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2020-05-20 18:21:50.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.6µs " +orderer0.example.com | "2020-05-20 18:21:50.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 242.5µs " +orderer0.example.com | "2020-05-20 18:21:50.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ea0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:50.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ea1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:51.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ea2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:51.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ea3 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +orderer0.example.com | "2020-05-20 18:21:51.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ea4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.5µs " +orderer0.example.com | "2020-05-20 18:21:51.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ea5 Sending msg of 28 bytes to 2 on channel businesschannel took 28.8µs" +orderer0.example.com | "2020-05-20 18:21:51.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ea6 Sending msg of 28 bytes to 3 on channel businesschannel took 52.8µs" +orderer0.example.com | "2020-05-20 18:21:51.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ea7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.4µs " +orderer0.example.com | "2020-05-20 18:21:51.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.5µs " +orderer0.example.com | "2020-05-20 18:21:51.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ea9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:51.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1eaa Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:51.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1eab Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:51.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1eac Sending msg of 28 bytes to 3 on channel testchainid took 7.6µs" +orderer0.example.com | "2020-05-20 18:21:51.821 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ead Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.8µs " +orderer0.example.com | "2020-05-20 18:21:51.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1eae Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +orderer0.example.com | "2020-05-20 18:21:51.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1eaf Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-05-20 18:21:51.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1eb0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.4µs " +orderer0.example.com | "2020-05-20 18:21:51.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1eb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.2µs " +orderer0.example.com | "2020-05-20 18:21:51.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1eb2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:51.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1eb3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:52.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1eb4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:52.324 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1eb5 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2020-05-20 18:21:52.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1eb6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.3µs " +orderer0.example.com | "2020-05-20 18:21:52.345 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1eb7 Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +orderer0.example.com | "2020-05-20 18:21:52.346 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1eb8 Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +orderer0.example.com | "2020-05-20 18:21:52.346 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1eb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.2µs " +orderer0.example.com | "2020-05-20 18:21:52.347 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1eba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.2µs " +orderer0.example.com | "2020-05-20 18:21:52.498 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ebb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:52.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ebc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:52.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ebd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:52.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ebe Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +orderer0.example.com | "2020-05-20 18:21:52.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ebf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 503.4µs " +orderer0.example.com | "2020-05-20 18:21:52.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ec0 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2020-05-20 18:21:52.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ec1 Sending msg of 28 bytes to 3 on channel businesschannel took 29.6µs" +orderer0.example.com | "2020-05-20 18:21:52.849 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ec2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.5876ms " +orderer0.example.com | "2020-05-20 18:21:52.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ec3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.5µs " +orderer0.example.com | "2020-05-20 18:21:52.852 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ec4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:52.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ec5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:53.325 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ec6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:53.325 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ec7 Sending msg of 28 bytes to 3 on channel testchainid took 34.8µs" +orderer0.example.com | "2020-05-20 18:21:53.326 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ec8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 541.5µs " +orderer0.example.com | "2020-05-20 18:21:53.349 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1eca Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +orderer0.example.com | "2020-05-20 18:21:53.349 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ec9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.7µs " +orderer0.example.com | "2020-05-20 18:21:53.351 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ecb Sending msg of 28 bytes to 2 on channel businesschannel took 1.6832ms" +orderer0.example.com | "2020-05-20 18:21:53.382 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ecc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:53.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ecd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 14.1489ms " +orderer0.example.com | "2020-05-20 18:21:53.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ece Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:53.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ecf Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:53.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ed0 Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +orderer0.example.com | "2020-05-20 18:21:53.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ed1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.1µs " +orderer0.example.com | "2020-05-20 18:21:53.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ed2 Sending msg of 28 bytes to 2 on channel businesschannel took 58.9µs" +peer0.org1.example.com | [1a5c 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a5d 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1a5e 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a5f 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a60 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a61 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a62 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a63 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a64 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a65 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a66 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a67 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a68 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a69 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a6a 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a6b 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1a6c 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 47 3e 64 5c e5 76 eb c0 8e 79 a5 0a bb 2d 36 |.G>d\.v...y...-6| +peer0.org1.example.com | 00000010 79 ce 45 16 82 d3 c5 c3 72 dd b3 1f 62 65 30 56 |y.E.....r...be0V| +peer0.org1.example.com | [1a6d 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 6a 8e aa 45 e4 e2 32 78 16 22 ca |0D. xj..E..2x.".| +peer0.org1.example.com | 00000010 ae ee 9e 98 3b ad 47 7f f6 e5 15 e7 bc 9f 22 12 |....;.G.......".| +peer0.org1.example.com | 00000020 a6 99 ee 31 02 20 4b ac ab 25 f5 d9 7b a4 c4 71 |...1. K..%..{..q| +peer0.org1.example.com | 00000030 62 b0 dc c3 81 27 cf 9f b1 d4 d5 62 06 47 a7 b6 |b....'.....b.G..| +peer0.org1.example.com | 00000040 15 9d 35 e7 fd 1c |..5...| +peer0.org1.example.com | [1a6e 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1a6f 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e e9 84 33 ff 23 ba 2b 68 f5 b5 c9 |0D. ...3.#.+h...| +peer0.org1.example.com | 00000010 4a 99 2f 5c 88 b6 35 38 43 43 c2 61 b6 9a c3 ac |J./\..58CC.a....| +peer0.org1.example.com | 00000020 9a 37 9a b5 02 20 3f ef e2 f4 9c 27 42 ea ff 1a |.7... ?....'B...| +peer0.org1.example.com | 00000030 7a 3b ac 6c fc 0f d2 90 5f 85 6a 97 2d 88 85 d4 |z;.l...._.j.-...| +peer0.org1.example.com | 00000040 37 7a 14 ba 8a 23 |7z...#| +peer0.org1.example.com | [1a70 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a71 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1a72 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a73 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a74 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1835904277815662645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a75 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1835904277815662645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a77 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a76 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: +peer0.org1.example.com | [1a78 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a79 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a7a 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a7b 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a7c 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a7d 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a7e 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a7f 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a80 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a81 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1a82 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 1b 2b 06 43 17 a1 52 16 81 a2 dd 43 99 8f 9d |..+.C..R....C...| +peer0.org1.example.com | 00000010 c8 33 9f 16 b1 32 61 c8 97 b9 58 26 80 b1 4a 87 |.3...2a...X&..J.| +peer0.org1.example.com | [1a83 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 83 9d 33 67 eb 26 94 a8 69 f8 |0E.!....3g.&..i.| +peer0.org1.example.com | 00000010 b0 49 1b 77 86 a6 ff 65 0b 61 4c 98 a1 8b 48 18 |.I.w...e.aL...H.| +peer0.org1.example.com | 00000020 48 6e 07 7d 9c 02 20 2b 63 d6 a5 d4 84 73 c4 3a |Hn.}.. +c....s.:| +peer0.org1.example.com | 00000030 e4 9b fc b0 6a 90 84 74 32 96 2c 10 f8 cb c0 51 |....j..t2.,....Q| +peer0.org1.example.com | 00000040 a4 c3 91 c6 0f 7c 0f |.....|.| +peer0.org1.example.com | [1a84 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1a85 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 93 98 e4 50 9e de 37 c4 5c de 47 |0D.!....P..7.\.G| +peer0.org1.example.com | 00000010 b7 db 55 cf 4d c6 f3 47 d2 f1 29 3e 4d bd 8f d2 |..U.M..G..)>M...| +peer0.org1.example.com | 00000020 63 07 fe de a3 02 1f 6e 96 ae 88 03 3c 78 d0 41 |c......n.... DEBU Exiting +peer0.org1.example.com | [1a87 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1a88 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a89 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a8a 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12575490344503309973, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1c89 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c8a 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c8b 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c8c 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c8d 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c8e 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c8f 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9e0 gate 1589998847917081600 evaluation starts +peer1.org1.example.com | [1c90 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c91 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1c92 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9e0 principal matched by identity 0 +peer1.org1.example.com | [1c93 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1c94 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003f7c9e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c96 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9e0 gate 1589998847917081600 evaluation succeeds +peer1.org1.example.com | [1c97 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c98 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c99 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c9a 05-20 18:20:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c9b 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1c9c 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1c9d 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1c9e 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1c9f 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ca0 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-05-20 18:21:53.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ed3 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2020-05-20 18:21:53.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ed4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.4µs " +orderer0.example.com | "2020-05-20 18:21:53.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ed5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.4µs " +orderer0.example.com | "2020-05-20 18:21:53.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ed6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:53.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ed7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-05-20 18:21:54.347 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ed8 Sending msg of 28 bytes to 2 on channel businesschannel took 444.9µs" +orderer0.example.com | "2020-05-20 18:21:54.373 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ed9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 17.5372ms " +orderer0.example.com | "2020-05-20 18:21:54.378 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1eda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3232ms " +orderer0.example.com | "2020-05-20 18:21:54.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1edb Sending msg of 28 bytes to 3 on channel businesschannel took 8.0772ms" +peer0.org1.example.com | [1a8b 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12575490344503309973, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a8c 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bb4 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bb5 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1bb6 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1bb7 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1bb8 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef1b0 gate 1589998841033405500 evaluation starts +peer1.org2.example.com | [1bb9 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef1b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bba 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef1b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1bbb 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1bbc 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef1b0 principal evaluation fails +peer1.org2.example.com | [1bbd 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef1b0 gate 1589998841033405500 evaluation fails +peer1.org2.example.com | [1bbe 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bbf 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bc0 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1bc1 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef720 gate 1589998841033894000 evaluation starts +peer1.org2.example.com | [1bc2 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bc3 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef720 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1bc4 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef720 principal matched by identity 0 +peer1.org2.example.com | [1bc5 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +peer1.org2.example.com | 00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +peer1.org2.example.com | [1bc6 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +peer1.org2.example.com | 00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +peer1.org2.example.com | 00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +peer1.org2.example.com | 00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +peer1.org2.example.com | 00000040 11 9d 80 32 33 39 28 |...239(| +peer1.org2.example.com | [1bc7 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1bc8 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ef720 gate 1589998841033894000 evaluation succeeds +peer1.org2.example.com | [1bc9 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1bca 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1bcb 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1bcc 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1bcd 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1bce 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1bcf 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1bd0 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1bd1 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1bd2 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bd3 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bd4 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bd5 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1bd6 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bd7 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bd8 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bd9 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1bda 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1bdb 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bdc 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bdd 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1bde 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1bdf 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1be0 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1be1 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1be2 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1be3 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1be4 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1be5 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1be6 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1be7 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1be8 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1be9 05-20 18:20:41.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bea 05-20 18:20:41.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1beb 05-20 18:20:41.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bec 05-20 18:20:41.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bed 05-20 18:20:41.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bee 05-20 18:20:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bef 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bf0 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bf1 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bf2 05-20 18:20:41.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b8f 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1b90 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1b91 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b92 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b93 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b94 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1b95 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b96 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b97 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b98 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b99 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\035\267s\203}\232\334\314\n\253\273\274" > +peer0.org2.example.com | [1b9a 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b9b 05-20 18:20:36.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b9c 05-20 18:20:36.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1b9d 05-20 18:20:36.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b9e 05-20 18:20:36.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1b9f 05-20 18:20:36.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba0 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba1 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1ba2 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1ba3 05-20 18:20:36.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1ba4 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba5 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba6 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba7 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba8 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1ba9 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161020 +peer0.org2.example.com | [1baa 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 22B043447A3350458955B1CA350F067997461AFA0EA80269213D5764D172B1DC +peer0.org2.example.com | [1bab 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1bac 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1bad 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1bae 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1baf 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\371\222Z\035\036\335\347M)\225<\221?\035\321\311q\213\223\366\002 \032\363\251\353\0319\001\006W\2254\361b\372\223\250(ud\247\376\024\244\037\004\272x\265\241\274\370\317" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1bb1 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bb2 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\371\222Z\035\036\335\347M)\225<\221?\035\321\311q\213\223\366\002 \032\363\251\353\0319\001\006W\2254\361b\372\223\250(ud\247\376\024\244\037\004\272x\265\241\274\370\317" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bb9 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bb8 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bba 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bbb 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bbc 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bbd 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bbe 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bbf 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bc0 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bc1 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bc2 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bc3 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bc4 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1bc5 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bc6 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bc7 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a8d 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: +peer0.org1.example.com | [1a8e 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a8f 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a90 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a91 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a92 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a93 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a94 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a95 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a96 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a97 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1a98 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a99 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a9a 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a9b 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a9c 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a9d 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a9e 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a9f 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [1aa0 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [1aa1 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1aa2 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [1aa3 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1aa4 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aa5 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1aa6 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1aa7 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1aa8 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1aa9 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1aaa 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1aab 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 gate 1589998836503521900 evaluation starts +peer0.org1.example.com | [1aac 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1aad 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1aae 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 principal matched by identity 0 +peer0.org1.example.com | [1aaf 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 0e 2b b5 72 27 3e 05 24 03 11 6f 63 15 5f da |..+.r'>.$..oc._.| +peer0.org1.example.com | 00000010 7e 4e d0 66 26 b9 e0 48 86 68 67 d7 64 f5 1b 6d |~N.f&..H.hg.d..m| +peer0.org1.example.com | [1ab0 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 96 d4 b3 1c bb 48 83 9a cd aa |0E.!.......H....| +peer0.org1.example.com | 00000010 4a 6e 5d 71 a2 06 4e 12 dd b9 63 5d bd d5 0b f1 |Jn]q..N...c]....| +peer0.org1.example.com | 00000020 61 c9 4c 56 7b 02 20 12 24 5b 70 ba 9c 8a 3a 70 |a.LV{. .$[p...:p| +peer0.org1.example.com | 00000030 9b ac 45 40 4c fd b7 7b 1f 11 d3 0d 09 f7 ad d6 |..E@L..{........| +peer0.org1.example.com | 00000040 87 0d c4 0b 25 9b 95 |....%..| +peer0.org1.example.com | [1ab1 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ab2 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 gate 1589998836503521900 evaluation succeeds +peer0.org1.example.com | [1ab3 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ab4 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ab5 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ab6 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ab7 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ab8 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1ab9 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aba 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1abb 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1abc 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 3017408182641646088, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1abd 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3017408182641646088, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes +peer0.org1.example.com | [1abe 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1abf 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\035\267s\203}\232\334\314\n\253\273\274" > alive: alive: +peer0.org1.example.com | [1ac0 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac1 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac2 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac3 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1ac4 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ca1 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ca2 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ca3 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ca4 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ca5 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ca6 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ca7 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f949c0 gate 1589998847926119200 evaluation starts +peer1.org1.example.com | [1ca8 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f949c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ca9 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f949c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1caa 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f949c0 principal matched by identity 0 +peer1.org1.example.com | [1cab 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1cac 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1cad 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f949c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1cae 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f949c0 gate 1589998847926119200 evaluation succeeds +peer1.org1.example.com | [1caf 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1cb0 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1cb1 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1cb2 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1cb3 05-20 18:20:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cb4 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cb5 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cb6 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb7 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb8 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb9 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cba 05-20 18:20:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1cbb 05-20 18:20:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161028 +peer1.org1.example.com | [1cbc 05-20 18:20:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F4BC7DFAE6D7BC8620F34A80D337ED3310302FB81EB724C56279D19EB8B850AC +peer1.org1.example.com | [1cbd 05-20 18:20:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1cbe 05-20 18:20:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1cbf 05-20 18:20:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1cc0 05-20 18:20:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1cc1 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc2 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc3 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc4 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1cc5 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1cc6 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc7 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1cc9 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1cca 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ccb 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1bf3 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1bf4 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161024 +peer1.org2.example.com | [1bf5 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CE5CB16BD61D49BE52A86906A45971E05A27BAF5195554FBCD1F136ACF2D2D8 +peer1.org2.example.com | [1bf6 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1bf7 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1bf8 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1bf9 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1bfa 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bfc 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1bfd 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bfe 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1bff 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c00 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bfb 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c01 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c02 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c03 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c04 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [1c05 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [1c06 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1c07 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610091801 +peer1.org2.example.com | [1c08 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2429684870A39BBC8F349C7D77E7DE06A7124233B4EC8D64516A77869E2D6C31 +peer1.org2.example.com | [1c09 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [1c0a 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c0b 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c0c 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c0d 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c0e 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1c0f 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c10 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c11 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c12 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ac5 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac6 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac7 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ac8 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac9 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1aca 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer0.org1.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer0.org1.example.com | [1acb 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer0.org1.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer0.org1.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer0.org1.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer0.org1.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer0.org1.example.com | [1acc 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1acd 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 9f da 3a 58 39 b8 aa 7e 71 df 45 |0D. ...:X9..~q.E| +peer0.org1.example.com | 00000010 38 e3 61 22 6f 00 b1 0a 45 c2 63 35 3c 70 93 f5 |8.a"o...E.c5 DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1acf 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1ad0 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ad1 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1ad2 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1ad3 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ad4 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ad5 05-20 18:20:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ad6 05-20 18:20:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1ad7 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ad8 05-20 18:20:36.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ad9 05-20 18:20:36.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1ada 05-20 18:20:36.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1adb 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1adc 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1add 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1ade 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1adf 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1ae0 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1ae1 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1ae2 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ae3 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ae4 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ae5 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ae6 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ae7 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ae8 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ae9 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1aea 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1aeb 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aec 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aed 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aee 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aef 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1af0 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1af1 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1af2 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1af3 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > alive: +peer0.org1.example.com | [1af6 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1af7 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer0.org1.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer0.org1.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer0.org1.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer0.org1.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer0.org1.example.com | [1b08 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003924420 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b09 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003924420 gate 1589998836869692400 evaluation succeeds +peer0.org1.example.com | [1b0a 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b0b 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b0c 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b0d 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b0e 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1b0f 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1b10 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1b11 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1b12 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1b13 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b14 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b15 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b16 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1b17 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b18 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b19 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b1a 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1afd 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c13 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c14 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c15 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c16 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1c17 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c e5 cb 16 bd 61 d4 9b e5 2a 86 90 6a 45 97 1e |.....a...*..jE..| +peer1.org2.example.com | 00000010 05 a2 7b af 51 95 55 4f bc d1 f1 36 ac f2 d2 d8 |..{.Q.UO...6....| +peer1.org2.example.com | [1c18 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d7 a5 c5 56 75 be 07 90 2c 38 |0E.!.....Vu...,8| +peer1.org2.example.com | 00000010 a1 91 ac 5e 14 93 6a b3 65 05 56 1d 81 c9 19 e3 |...^..j.e.V.....| +peer1.org2.example.com | 00000020 8a 92 6b 71 8a 02 20 6e 59 61 20 d6 93 0a 55 7c |..kq.. nYa ...U|| +peer1.org2.example.com | 00000030 38 62 e8 a8 81 23 9a 30 1e 10 31 70 24 ca 52 91 |8b...#.0..1p$.R.| +peer1.org2.example.com | 00000040 e0 ac 9f 07 6e 10 21 |....n.!| +peer1.org2.example.com | [1c19 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c1a 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c1b 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c1c 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1c1d 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c1e 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c1f 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c20 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c21 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c22 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c23 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c24 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343e10 gate 1589998841232324100 evaluation starts +peer1.org2.example.com | [1c25 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343e10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c26 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343e10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1c27 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c28 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343e10 principal evaluation fails +peer1.org2.example.com | [1c29 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343e10 gate 1589998841232324100 evaluation fails +peer1.org2.example.com | [1c2a 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c2b 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c2c 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c2e 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c2d 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004372380 gate 1589998841234927800 evaluation starts +peer1.org2.example.com | [1c2f 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004372380 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c30 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004372380 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1b1b 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b1c 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b1d 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1afe 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b1e 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer0.org1.example.com | [1b1f 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b20 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b21 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b22 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b23 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b24 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b25 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b26 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b27 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b28 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1b29 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b2a 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b2b 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b2c 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b2d 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b2e 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b2f 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b30 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 gate 1589998836954075400 evaluation starts +peer0.org1.example.com | [1b31 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b32 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1b33 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 principal matched by identity 0 +peer0.org1.example.com | [1b34 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 42 f3 d7 64 55 fc b2 58 5a 09 38 4b db ce 02 |.B..dU..XZ.8K...| +peer0.org1.example.com | 00000010 c4 37 a5 c1 5b 66 2e d6 b9 14 9d 36 d8 d1 e3 3c |.7..[f.....6...<| +peer0.org1.example.com | [1b35 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 8e 92 67 d3 19 14 f8 7b ec 66 6c |0D. h..g....{.fl| +peer0.org1.example.com | 00000010 c2 f4 3f c6 7f ce ed 3b 36 a6 31 50 4c 93 6c ae |..?....;6.1PL.l.| +peer0.org1.example.com | 00000020 d0 0b 11 56 02 20 6b 08 4f 73 76 d5 02 a7 a9 9c |...V. k.Osv.....| +peer0.org1.example.com | 00000030 71 08 27 81 66 b7 64 e5 e8 0d 99 96 da 89 0a d8 |q.'.f.d.........| +peer0.org1.example.com | 00000040 ee 64 f6 56 b8 68 |.d.V.h| +peer0.org1.example.com | [1b36 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b37 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 gate 1589998836954075400 evaluation succeeds +peer0.org1.example.com | [1b38 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b39 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b3a 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b3b 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b3c 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b3d 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1b3e 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b3f 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b40 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b41 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 8846407952849447841, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b42 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer0.org1.example.com | [1b43 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8846407952849447841, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b44 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b45 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1c31 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004372380 principal matched by identity 0 +peer1.org2.example.com | [1c32 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c33 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer1.org2.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer1.org2.example.com | [1c34 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer1.org2.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer1.org2.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer1.org2.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer1.org2.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU 0xc004372380 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c36 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004372380 gate 1589998841234927800 evaluation succeeds +peer1.org2.example.com | [1c37 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c38 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c39 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c3a 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c3b 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c3c 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c3d 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1c3e 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer1.org2.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer1.org2.example.com | [1c3f 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer1.org2.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer1.org2.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer1.org2.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c41 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c42 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c43 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c44 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c45 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c46 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1c47 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c48 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c49 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c4a 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c4b 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c4c 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c4d 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c4e 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388110 gate 1589998841254272800 evaluation starts +peer1.org2.example.com | [1c4f 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388110 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c50 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388110 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1c51 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c52 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388110 principal evaluation fails +peer1.org2.example.com | [1c53 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388110 gate 1589998841254272800 evaluation fails +peer1.org2.example.com | [1c54 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c55 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c56 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c57 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388680 gate 1589998841260666500 evaluation starts +peer1.org2.example.com | [1c58 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388680 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c59 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388680 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1c5a 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388680 principal matched by identity 0 +peer1.org2.example.com | [1c5b 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +peer1.org2.example.com | 00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +peer1.org2.example.com | [1c5c 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +peer1.org2.example.com | 00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +peer1.org2.example.com | 00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +peer1.org2.example.com | 00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +peer1.org2.example.com | 00000040 11 9d 80 32 33 39 28 |...239(| +peer1.org2.example.com | [1c5d 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388680 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c5e 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004388680 gate 1589998841260666500 evaluation succeeds +peer1.org2.example.com | [1c5f 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c60 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c61 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c62 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c63 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c64 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c65 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1c66 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer1.org2.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer1.org2.example.com | [1c67 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer1.org2.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer1.org2.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer1.org2.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c69 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c6a 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1c6b 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c e5 cb 16 bd 61 d4 9b e5 2a 86 90 6a 45 97 1e |.....a...*..jE..| +peer1.org2.example.com | 00000010 05 a2 7b af 51 95 55 4f bc d1 f1 36 ac f2 d2 d8 |..{.Q.UO...6....| +peer1.org2.example.com | [1c6c 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d7 a5 c5 56 75 be 07 90 2c 38 |0E.!.....Vu...,8| +peer1.org2.example.com | 00000010 a1 91 ac 5e 14 93 6a b3 65 05 56 1d 81 c9 19 e3 |...^..j.e.V.....| +peer1.org2.example.com | 00000020 8a 92 6b 71 8a 02 20 6e 59 61 20 d6 93 0a 55 7c |..kq.. nYa ...U|| +peer1.org2.example.com | 00000030 38 62 e8 a8 81 23 9a 30 1e 10 31 70 24 ca 52 91 |8b...#.0..1p$.R.| +peer1.org2.example.com | 00000040 e0 ac 9f 07 6e 10 21 |....n.!| +peer1.org2.example.com | [1c6d 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c6e 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c6f 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c70 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c71 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c72 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c73 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1b46 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101F +peer0.org1.example.com | [1b47 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B0F76BE3DA85DA11E9AEF97C4D21F800C085618247C636BD49E8C8B39652F0E9 +peer0.org1.example.com | [1b48 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1b49 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1b4a 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1b4b 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\030\221\247\375Kz\002 \023\\\207\201\207\213\206\365#\343\241t\r\350\2631\362\303\310\376\305\347\340\367\003H\244\261\365 \243=" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b4c 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b4d 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b4e 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b4f 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b50 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b51 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b52 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b53 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b54 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\030\221\247\375Kz\002 \023\\\207\201\207\213\206\365#\343\241t\r\350\2631\362\303\310\376\305\347\340\367\003H\244\261\365 \243=" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b55 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b56 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b57 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b58 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b59 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b5a 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1b5b 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +peer0.org1.example.com | 00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +peer0.org1.example.com | [1b5c 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +peer0.org1.example.com | 00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +peer0.org1.example.com | 00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +peer0.org1.example.com | 00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +peer0.org1.example.com | 00000040 a6 d7 b2 26 29 cb |...&).| +peer0.org1.example.com | [1b5d 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1b5e 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 e1 ca 30 06 bf 00 cc 8a eb 63 |0E.!....0......c| +peer0.org1.example.com | 00000010 0c c5 1c 7e fb 13 9e 54 12 67 64 b4 64 fe 3e 18 |...~...T.gd.d.>.| +peer0.org1.example.com | 00000020 91 a7 fd 4b 7a 02 20 13 5c 87 81 87 8b 86 f5 23 |...Kz. .\......#| +peer0.org1.example.com | 00000030 e3 a1 74 0d e8 b3 31 f2 c3 c8 fe c5 e7 e0 f7 03 |..t...1.........| +peer0.org1.example.com | 00000040 48 a4 b1 f5 20 a3 3d |H... .=| +peer0.org2.example.com | [1bc8 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bc9 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bca 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bcb 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bcc 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1bcd 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bce 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer0.org2.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer0.org2.example.com | [1bcf 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer0.org2.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer0.org2.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer0.org2.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer0.org2.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer0.org2.example.com | [1bd0 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1bd1 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1bd2 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bd3 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bd4 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd5 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1bd6 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bd7 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bd8 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1bd9 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bda 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bdb 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1bdc 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bdd 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bde 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bdf 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1be0 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1be1 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1be2 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e3bc0 gate 1589998836988476500 evaluation starts +peer0.org2.example.com | [1be3 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e3bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1be4 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e3bc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1be5 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e3bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1be6 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e3bc0 principal evaluation fails +peer0.org2.example.com | [1be7 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e3bc0 gate 1589998836988476500 evaluation fails +peer0.org2.example.com | [1be8 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1be9 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bea 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1beb 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004428130 gate 1589998836988879200 evaluation starts +peer0.org2.example.com | [1bec 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004428130 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1bed 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004428130 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1bee 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004428130 principal matched by identity 0 +peer0.org2.example.com | [1bef 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer0.org2.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer0.org2.example.com | [1bf0 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer0.org2.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer0.org2.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer0.org2.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer0.org2.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer0.org2.example.com | [1bf1 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004428130 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1bf2 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004428130 gate 1589998836988879200 evaluation succeeds +peer0.org2.example.com | [1bf3 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1bf4 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1bf5 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1bf6 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1bf7 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1bf8 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bf9 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1bfa 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer0.org2.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer0.org2.example.com | [1bfb 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer0.org2.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer0.org2.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer0.org2.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer0.org2.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer0.org2.example.com | [1bfc 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1bfd 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1bfe 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bff 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c00 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c01 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c02 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c03 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1c04 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b5f 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1b60 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1b61 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b62 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b63 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b64 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b65 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b66 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b67 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1b68 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer0.org1.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer0.org1.example.com | [1b69 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer0.org1.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer0.org1.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer0.org1.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer0.org1.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer0.org1.example.com | [1b6a 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1b6b 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b6c 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1b6d 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +peer0.org1.example.com | 00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +peer0.org1.example.com | [1b6e 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +peer0.org1.example.com | 00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +peer0.org1.example.com | 00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +peer0.org1.example.com | 00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +peer0.org1.example.com | 00000040 a6 d7 b2 26 29 cb |...&).| +peer0.org1.example.com | [1b6f 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1b70 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1b71 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b72 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b73 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b74 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b75 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b76 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b77 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b78 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b79 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b7a 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b7b 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ccc 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cc8 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ccd 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cce 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ccf 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cd0 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cd1 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cd2 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cd3 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cd4 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1cd5 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1cd6 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1cd7 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1cd8 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1cd9 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cdb 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cda 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1cdc 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cde 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cdd 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cdf 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce0 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce1 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ce2 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ce3 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce4 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce5 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce6 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ce7 05-20 18:20:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce8 05-20 18:20:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce9 05-20 18:20:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cea 05-20 18:20:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ceb 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cec 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ced 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1cee 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cef 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf0 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1cf1 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cf2 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cf3 05-20 18:20:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cf4 05-20 18:20:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cf5 05-20 18:20:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cf6 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1cf7 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161029 +peer1.org1.example.com | [1cf8 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 333E4BE08D401756D13A1B2F95C7F75B4841D99C571A3037194A5CDA79662EAC +peer1.org1.example.com | [1cf9 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1cfa 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1cfb 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1cfc 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1cfd 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cfe 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1cff 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d00 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d01 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d02 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d04 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d05 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c05 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c06 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c07 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c08 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c09 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c0a 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c0b 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a0e0 gate 1589998837004784500 evaluation starts +peer0.org2.example.com | [1c0c 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a0e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c0d 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a0e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1c0e 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c0f 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a0e0 principal evaluation fails +peer0.org2.example.com | [1c10 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a0e0 gate 1589998837004784500 evaluation fails +peer0.org2.example.com | [1c11 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c12 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c13 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c14 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a650 gate 1589998837009546700 evaluation starts +peer0.org2.example.com | [1c15 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c16 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a650 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1c17 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a650 principal matched by identity 0 +peer0.org2.example.com | [1c18 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +peer0.org2.example.com | 00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +peer0.org2.example.com | [1c19 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +peer0.org2.example.com | 00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +peer0.org2.example.com | 00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +peer0.org2.example.com | 00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +peer0.org2.example.com | 00000040 a6 d7 b2 26 29 cb |...&).| +peer0.org2.example.com | [1c1a 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a650 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c1b 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443a650 gate 1589998837009546700 evaluation succeeds +peer0.org2.example.com | [1c1c 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c1d 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c1e 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c1f 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c20 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1c21 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1c22 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1c23 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1d03 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d06 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d07 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d08 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d09 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d0a 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d0b 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1d0c 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d0d 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d0e 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d0f 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d10 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d11 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d12 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1d13 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa7f0 gate 1589998848651715600 evaluation starts +peer1.org1.example.com | [1d14 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa7f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d15 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa7f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1d16 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa7f0 principal matched by identity 0 +peer1.org1.example.com | [1d18 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer1.org1.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer0.org1.example.com | [1b7c 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b7d 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b7e 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b7f 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b80 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1b81 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b82 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b83 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b84 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b85 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b86 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1b87 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b88 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b89 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b8a 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b8b 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b8c 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b8d 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b8e 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 gate 1589998837115093300 evaluation starts +peer0.org1.example.com | [1b8f 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b90 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1b91 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 principal matched by identity 0 +peer0.org1.example.com | [1b92 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer0.org1.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer0.org1.example.com | [1b93 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer0.org1.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer0.org1.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer0.org1.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer0.org1.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer0.org1.example.com | [1b94 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b95 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 gate 1589998837115093300 evaluation succeeds +peer0.org1.example.com | [1b96 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b97 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b98 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b99 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b9a 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1b9b 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d17 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d19 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d1a 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer1.org1.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer1.org1.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer1.org1.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer1.org1.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer1.org1.example.com | [1d1b 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa7f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d1c 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa7f0 gate 1589998848651715600 evaluation succeeds +peer1.org1.example.com | [1d1d 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d1e 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d1f 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d20 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1d21 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d22 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d23 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1d24 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer1.org1.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer1.org1.example.com | [1d25 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer1.org1.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer1.org1.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d27 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d28 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1d29 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer1.org1.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer1.org1.example.com | [1d2a 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer1.org1.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer1.org1.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer1.org1.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer1.org1.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer1.org1.example.com | [1d2b 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d2c 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d2d 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d2e 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d2f 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d30 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d31 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d32 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1d33 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer1.org1.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer1.org1.example.com | [1d34 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer1.org1.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer1.org1.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer1.org1.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer1.org1.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer1.org1.example.com | [1d35 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1d36 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 83 e2 9b 56 0f d6 46 69 be 86 75 |0D. +...V..Fi..u| +peer1.org1.example.com | 00000010 8a 59 bc c6 c8 9e 08 86 48 4b 9d 4b a1 8a 3a 6d |.Y......HK.K..:m| +peer1.org1.example.com | 00000020 2e de c4 29 02 20 6d 05 aa 5f ea 13 30 2c a8 f8 |...). m.._..0,..| +peer1.org1.example.com | 00000030 fd 30 36 c8 4c ca ec 9f 2f 13 41 a3 39 9a e0 67 |.06.L.../.A.9..g| +peer1.org1.example.com | 00000040 cc 0d ea b5 5f 5d |...._]| +peer1.org2.example.com | [1c74 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c e5 cb 16 bd 61 d4 9b e5 2a 86 90 6a 45 97 1e |.....a...*..jE..| +peer1.org2.example.com | 00000010 05 a2 7b af 51 95 55 4f bc d1 f1 36 ac f2 d2 d8 |..{.Q.UO...6....| +peer1.org2.example.com | [1c75 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d7 a5 c5 56 75 be 07 90 2c 38 |0E.!.....Vu...,8| +peer1.org2.example.com | 00000010 a1 91 ac 5e 14 93 6a b3 65 05 56 1d 81 c9 19 e3 |...^..j.e.V.....| +peer1.org2.example.com | 00000020 8a 92 6b 71 8a 02 20 6e 59 61 20 d6 93 0a 55 7c |..kq.. nYa ...U|| +peer1.org2.example.com | 00000030 38 62 e8 a8 81 23 9a 30 1e 10 31 70 24 ca 52 91 |8b...#.0..1p$.R.| +peer1.org2.example.com | 00000040 e0 ac 9f 07 6e 10 21 |....n.!| +peer1.org2.example.com | [1c76 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1c77 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 2e 09 e5 35 16 2a 1d fa e7 fa |0E.!.....5.*....| +peer1.org2.example.com | 00000010 7c da 2b 00 8b e4 25 1d 6b a0 26 99 b0 9f d9 9b ||.+...%.k.&.....| +peer1.org2.example.com | 00000020 37 22 85 78 dc 02 20 4c e3 ac 2b f5 3c 81 d3 cf |7".x.. L..+.<...| +peer1.org2.example.com | 00000030 bb 94 0e 18 77 0d b0 8e f3 b0 fb 6f 74 71 48 ee |....w......otqH.| +peer1.org2.example.com | 00000040 20 ee 90 94 0d 40 ae | ....@.| +peer1.org2.example.com | [1c78 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1c79 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1c7a 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c7b 05-20 18:20:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c7c 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c7d 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c7e 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c7f 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1c80 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c81 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c82 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c83 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c84 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c85 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c86 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c87 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9fa0 gate 1589998843386196200 evaluation starts +peer1.org2.example.com | [1c88 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9fa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c89 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9fa0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1c8a 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c8b 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9fa0 principal evaluation fails +peer1.org2.example.com | [1c8c 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a9fa0 gate 1589998843386196200 evaluation fails +peer0.org2.example.com | [1c24 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1c25 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c26 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c27 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c28 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1c29 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c2a 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c2b 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c2c 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1c2d 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\035\267s\203}\232\334\314\n\253\273\274" > +peer0.org2.example.com | [1c2e 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c2f 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c30 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c31 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c32 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c33 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c34 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c35 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c36 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1c37 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +peer0.org2.example.com | 00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +peer0.org2.example.com | [1c38 05-20 18:20:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +peer0.org2.example.com | 00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +peer0.org2.example.com | 00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +peer0.org2.example.com | 00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +peer0.org2.example.com | 00000040 db 83 fc d7 53 f3 3d |....S.=| +peer0.org2.example.com | [1c39 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1c3a 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 78 65 91 89 61 7c e8 78 16 7a 3e |0D. Pxe..a|.x.z>| +peer0.org2.example.com | 00000010 f9 92 5a 1d 1e dd e7 4d 29 95 3c 91 3f 1d d1 c9 |..Z....M).<.?...| +peer0.org2.example.com | 00000020 71 8b 93 f6 02 20 1a f3 a9 eb 19 39 01 06 57 95 |q.... .....9..W.| +peer0.org2.example.com | 00000030 34 f1 62 fa 93 a8 28 75 64 a7 fe 14 a4 1f 04 ba |4.b...(ud.......| +peer0.org2.example.com | 00000040 78 b5 a1 bc f8 cf |x.....| +peer0.org2.example.com | [1c3b 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1c8d 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c8e 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c8f 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c90 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4510 gate 1589998843400432000 evaluation starts +peer1.org2.example.com | [1c91 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4510 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c92 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4510 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1c93 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4510 principal matched by identity 0 +peer1.org2.example.com | [1c94 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 6f 7f 35 85 7a 0f bd 66 24 3d 1f 5e e1 bb 98 |.o.5.z..f$=.^...| +peer1.org2.example.com | 00000010 bc 51 8f 42 ab f4 c7 8c f0 f9 54 ec 7c 00 e3 0e |.Q.B......T.|...| +peer1.org2.example.com | [1c95 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 2b 05 f5 27 8c 2b 74 2a 45 8b 68 |0D. 2+..'.+t*E.h| +peer1.org2.example.com | 00000010 b3 e5 3c 2e 12 ee 1d d1 70 18 5d e4 bd 87 7f 3c |..<.....p.]....<| +peer1.org2.example.com | 00000020 22 6f 54 93 02 20 6d 9b 96 2c dd 2c 93 e1 43 a9 |"oT.. m..,.,..C.| +peer1.org2.example.com | 00000030 02 8d 2d 00 95 1f 87 67 52 fc f8 94 1b 4a 97 8a |..-....gR....J..| +peer1.org2.example.com | 00000040 e6 61 09 95 52 e0 |.a..R.| +peer1.org2.example.com | [1c96 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4510 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c97 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4510 gate 1589998843400432000 evaluation succeeds +peer1.org2.example.com | [1c98 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c99 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c9a 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c9b 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c9c 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c9d 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1c9e 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1c9f 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1ca0 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1ca1 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca2 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca3 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca4 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ca5 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ca6 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca7 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca8 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ca9 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cab 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1caa 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cac 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cad 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cae 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cb0 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cb2 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cb1 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cb3 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1caf 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b9c 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1b9d 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +peer0.org1.example.com | 00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +peer0.org1.example.com | [1b9e 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +peer0.org1.example.com | 00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +peer0.org1.example.com | 00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +peer0.org1.example.com | 00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +peer0.org1.example.com | 00000040 a6 d7 b2 26 29 cb |...&).| +peer0.org1.example.com | [1b9f 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ba0 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ba1 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ba2 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1ba3 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +peer0.org1.example.com | 00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +peer0.org1.example.com | [1ba4 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +peer0.org1.example.com | 00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +peer0.org1.example.com | 00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +peer0.org1.example.com | 00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +peer0.org1.example.com | 00000040 8f 8f b3 24 c4 46 |...$.F| +peer0.org1.example.com | [1ba5 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ba6 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ba7 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ba8 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ba9 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1baa 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bab 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bac 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1bad 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bae 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1baf 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bb0 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bb1 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1bb2 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1bb3 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1bb4 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 gate 1589998837197565400 evaluation starts +peer0.org1.example.com | [1bb5 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1bb6 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1bb7 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 principal matched by identity 0 +peer0.org1.example.com | [1bb8 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 df 8e 75 41 28 3c 92 bd e8 fd 1c 2a ca e1 ff |...uA(<.....*...| +peer0.org1.example.com | 00000010 e2 3b da db 51 5c ab 6d 9f 6a ef 09 55 47 ae 53 |.;..Q\.m.j..UG.S| +peer0.org1.example.com | [1bb9 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 2d 39 bd 82 9d 7e e7 78 8e ca |0D. V7-9...~.x..| +peer0.org1.example.com | 00000010 72 18 11 31 44 d3 9d 70 bb ab dd d9 2a 04 da 69 |r..1D..p....*..i| +peer0.org1.example.com | 00000020 21 82 ce 59 02 20 60 bd e8 cc f9 2a 63 95 fa a4 |!..Y. `....*c...| +peer0.org1.example.com | 00000030 22 eb b5 da 6b 84 0c ff 38 07 3f 03 6a 78 9e 5a |"...k...8.?.jx.Z| +peer0.org1.example.com | 00000040 72 b3 60 b0 47 92 |r.`.G.| +peer0.org1.example.com | [1bba 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1bbb 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 gate 1589998837197565400 evaluation succeeds +peer0.org1.example.com | [1bbc 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bbd 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bbe 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1bbf 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1bc0 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bc1 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1bc2 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1bc3 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1bc4 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1bc5 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bc6 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bc7 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bc8 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1bc9 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bca 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bcb 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bcc 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1bcd 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer0.org1.example.com | [1bce 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bcf 05-20 18:20:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cb4 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1cb5 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cb7 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1cb6 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cb8 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cb9 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cba 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cbb 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cbc 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cbd 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cbe 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cbf 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cc0 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cc1 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cc2 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cc3 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cc4 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1cc5 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b fa d0 07 0e 9d e6 c4 9a 2b 8f 44 cb 40 4e 3e |.........+.D.@N>| +peer1.org2.example.com | 00000010 89 3f ec ce 57 79 55 45 bc 39 73 a3 8c ba ec eb |.?..WyUE.9s.....| +peer1.org2.example.com | [1cc6 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 98 59 7a fe 80 99 02 b5 64 69 |0E.!...Yz.....di| +peer1.org2.example.com | 00000010 e5 30 cc 6c 6a 13 a3 6e b6 c3 64 bf 0b 6f 3c e5 |.0.lj..n..d..o<.| +peer1.org2.example.com | 00000020 43 20 ed b0 16 02 20 46 4e 6e d7 3e c2 a8 1a aa |C .... FNn.>....| +peer1.org2.example.com | 00000030 8f 0c b5 b3 1f ef 86 34 16 54 51 c7 b3 a2 0e 28 |.......4.TQ....(| +peer1.org2.example.com | 00000040 5a a1 de a2 fa 8b 03 |Z......| +peer1.org2.example.com | [1cc7 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cc8 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1cc9 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1cca 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1ccb 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1ccc 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ccd 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cce 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ccf 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd0 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd1 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd2 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1cd3 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd4 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cd5 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1cd6 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd7 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cd8 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd9 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cda 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cdb 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cdc 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cdd 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cde 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cdf 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ce0 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ce1 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ce2 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce3 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c3c 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1c3d 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c3e 05-20 18:20:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c3f 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c40 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c41 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1c42 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c43 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\021\375\036\027\337P\373\r\002 j\331\303\333\270\334.N\263\022W\231\027\013\352wob>`\212P\345\017\344Dt5I/\3532" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c44 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c45 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\021\375\036\027\337P\373\r\002 j\331\303\333\270\334.N\263\022W\231\027\013\352wob>`\212P\345\017\344Dt5I/\3532" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c46 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1c47 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 df 8e 75 41 28 3c 92 bd e8 fd 1c 2a ca e1 ff |...uA(<.....*...| +peer0.org2.example.com | 00000010 e2 3b da db 51 5c ab 6d 9f 6a ef 09 55 47 ae 53 |.;..Q\.m.j..UG.S| +peer0.org2.example.com | [1c48 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 2d 39 bd 82 9d 7e e7 78 8e ca |0D. V7-9...~.x..| +peer0.org2.example.com | 00000010 72 18 11 31 44 d3 9d 70 bb ab dd d9 2a 04 da 69 |r..1D..p....*..i| +peer0.org2.example.com | 00000020 21 82 ce 59 02 20 60 bd e8 cc f9 2a 63 95 fa a4 |!..Y. `....*c...| +peer0.org2.example.com | 00000030 22 eb b5 da 6b 84 0c ff 38 07 3f 03 6a 78 9e 5a |"...k...8.?.jx.Z| +peer0.org2.example.com | 00000040 72 b3 60 b0 47 92 |r.`.G.| +peer0.org2.example.com | [1c49 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1c4a 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 24 55 e7 e1 9c 89 94 e2 21 58 c6 |0D. Y$U......!X.| +peer0.org2.example.com | 00000010 a4 69 8f ca 18 36 8d 95 21 c9 1e 3e 11 fd 1e 17 |.i...6..!..>....| +peer0.org2.example.com | 00000020 df 50 fb 0d 02 20 6a d9 c3 db b8 dc 2e 4e b3 12 |.P... j......N..| +peer0.org2.example.com | 00000030 57 99 17 0b ea 77 6f 62 3e 60 8a 50 e5 0f e4 44 |W....wob>`.P...D| +peer0.org2.example.com | 00000040 74 35 49 2f eb 32 |t5I/.2| +peer0.org2.example.com | [1c4b 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1c4c 05-20 18:20:37.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [1c4d 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1c4e 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1c4f 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1c50 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c51 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c52 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c53 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [1c54 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c55 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c56 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1bd0 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bd1 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bd2 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd3 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bd4 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1bd5 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c d1 ee 27 18 66 b5 4e bf 41 4f 60 c1 af e1 be ||..'.f.N.AO`....| +peer0.org1.example.com | 00000010 bf d2 ac 60 2b 84 14 f7 2b 76 24 b5 d5 05 f0 d6 |...`+...+v$.....| +peer0.org1.example.com | [1bd6 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 85 11 f5 d9 91 17 b5 ea a8 b4 |0E.!............| +peer0.org1.example.com | 00000010 0f 77 2e 11 89 7b 3f 5a ce 89 70 8e bf ce 72 11 |.w...{?Z..p...r.| +peer0.org1.example.com | 00000020 1d 2e 5e b0 e8 02 20 54 09 75 69 c8 73 64 cd 91 |..^... T.ui.sd..| +peer0.org1.example.com | 00000030 83 5a 8c 52 03 22 1a b8 ed 36 76 fd 32 cd c0 21 |.Z.R."...6v.2..!| +peer0.org1.example.com | 00000040 0d d3 81 3a 39 f5 ca |...:9..| +peer0.org1.example.com | [1bd7 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bd8 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1bd9 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1bda 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1bdb 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bdc 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bdd 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1bde 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bdf 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be0 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be1 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be2 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1be3 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be4 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1be5 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1be6 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be7 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1be8 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be9 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bea 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1beb 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bec 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1bed 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce4 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce5 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ce6 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1ce7 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161025 +peer1.org2.example.com | [1ce8 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 86B05CC2E3831E58AD3CA447DF79560A6ACBE289A5793D0C4D6E08A03A8B8F01 +peer1.org2.example.com | [1ce9 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1cea 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1ceb 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1cec 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1ced 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cee 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cef 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cf0 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1cf1 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cf2 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1cf3 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1cf4 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cf5 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cf6 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cf7 05-20 18:20:43.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cf8 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d37 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1d38 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1d39 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d3a 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d3b 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d3c 05-20 18:20:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d3d 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1d3e 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer1.org1.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer1.org1.example.com | [1d3f 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer1.org1.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer1.org1.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d41 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d42 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1d43 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d44 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d45 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d46 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d47 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c57 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\021\375\036\027\337P\373\r\002 j\331\303\333\270\334.N\263\022W\231\027\013\352wob>`\212P\345\017\344Dt5I/\3532" > > alive:\035\267s\203}\232\334\314\n\253\273\274" > +peer0.org2.example.com | [1c58 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c59 05-20 18:20:37.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c5a 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c5b 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c5c 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c5d 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1c5e 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c5f 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c60 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c61 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c62 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c63 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c64 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c65 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004477f80 gate 1589998838386095400 evaluation starts +peer0.org2.example.com | [1c66 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004477f80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c67 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004477f80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1c68 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004477f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c69 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004477f80 principal evaluation fails +peer0.org2.example.com | [1c6a 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004477f80 gate 1589998838386095400 evaluation fails +peer0.org2.example.com | [1c6b 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c6c 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bee 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1bef 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bf0 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf1 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bf2 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf3 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bf4 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bf5 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf6 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bf7 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1bf8 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bf9 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1bfa 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bfb 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bfc 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1bfd 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1bfe 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1bff 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 gate 1589998838708401500 evaluation starts +peer0.org1.example.com | [1c00 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c01 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1c02 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 principal matched by identity 0 +peer0.org1.example.com | [1c03 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 a3 07 42 10 8f 78 e7 04 b0 14 b3 8c ed a6 26 |...B..x........&| +peer0.org1.example.com | 00000010 8e b3 fd e0 b4 3a 86 f5 92 5d 42 54 63 5e d9 0d |.....:...]BTc^..| +peer0.org1.example.com | [1c04 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 27 17 18 11 8b 44 4d 7d 3c a5 |0E.!..'....DM}<.| +peer0.org1.example.com | 00000010 1e 6a c3 10 82 fb d2 2c 82 b4 3b 2d b5 90 93 f8 |.j.....,..;-....| +peer0.org1.example.com | 00000020 73 de 82 5b 64 02 20 69 21 63 02 3c 8a 27 0f 3a |s..[d. i!c.<.'.:| +peer0.org1.example.com | 00000030 f2 69 a8 f3 bc 66 6e 6f a2 6f af ff 79 eb 0e 25 |.i...fno.o..y..%| +peer0.org1.example.com | 00000040 f7 8e 05 a4 10 d8 f4 |.......| +peer0.org1.example.com | [1c05 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c06 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 gate 1589998838708401500 evaluation succeeds +peer0.org1.example.com | [1c07 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c08 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c09 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c0a 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1c0b 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c0c 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1c0d 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c0e 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c0f 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1c10 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c11 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c12 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c13 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c14 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c15 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c16 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c17 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c18 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c19 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c1a 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c1b 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c1c 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c1d 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c1e 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c1f 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c20 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c21 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c22 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c23 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c24 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c25 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c26 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c27 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c28 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c29 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c2a 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c2b 05-20 18:20:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [1c6d 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c6e 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044984f0 gate 1589998838386430600 evaluation starts +peer0.org2.example.com | [1c6f 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044984f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c70 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044984f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1c71 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044984f0 principal matched by identity 0 +peer0.org2.example.com | [1c72 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c d1 ee 27 18 66 b5 4e bf 41 4f 60 c1 af e1 be ||..'.f.N.AO`....| +peer0.org2.example.com | 00000010 bf d2 ac 60 2b 84 14 f7 2b 76 24 b5 d5 05 f0 d6 |...`+...+v$.....| +peer0.org2.example.com | [1c73 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 85 11 f5 d9 91 17 b5 ea a8 b4 |0E.!............| +peer0.org2.example.com | 00000010 0f 77 2e 11 89 7b 3f 5a ce 89 70 8e bf ce 72 11 |.w...{?Z..p...r.| +peer0.org2.example.com | 00000020 1d 2e 5e b0 e8 02 20 54 09 75 69 c8 73 64 cd 91 |..^... T.ui.sd..| +peer0.org2.example.com | 00000030 83 5a 8c 52 03 22 1a b8 ed 36 76 fd 32 cd c0 21 |.Z.R."...6v.2..!| +peer0.org2.example.com | 00000040 0d d3 81 3a 39 f5 ca |...:9..| +peer0.org2.example.com | [1c74 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044984f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c75 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044984f0 gate 1589998838386430600 evaluation succeeds +peer0.org2.example.com | [1c76 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c77 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c78 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c79 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c7a 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c7b 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1c7c 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1c7d 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1c7e 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1c7f 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c80 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c81 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c82 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c83 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c84 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c85 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c86 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c87 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c88 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1c8a 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c8b 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c89 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c8c 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c8d 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1c8e 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c8f 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c90 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c91 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c92 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cf9 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cfa 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cfb 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cfc 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cfd 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1cfe 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cff 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d00 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d01 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d02 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d03 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d04 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d05 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004424f20 gate 1589998844014136200 evaluation starts +peer1.org2.example.com | [1d06 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004424f20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d07 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004424f20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1d08 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004424f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1d09 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004424f20 principal evaluation fails +peer1.org2.example.com | [1d0a 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004424f20 gate 1589998844014136200 evaluation fails +peer1.org2.example.com | [1d0b 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d0c 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d0d 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1d0e 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004425490 gate 1589998844019440500 evaluation starts +peer1.org2.example.com | [1d0f 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004425490 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d10 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004425490 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1d11 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004425490 principal matched by identity 0 +peer1.org2.example.com | [1d12 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 0e 94 40 b7 11 bf fc 4b b9 ed 83 41 dd c0 ad |...@....K...A...| +peer1.org2.example.com | 00000010 48 68 a0 ee b2 c5 52 cb f2 7d b6 f7 bc 1c 5c 12 |Hh....R..}....\.| +peer1.org2.example.com | [1d13 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 bf e1 e6 27 ae c7 e2 4c 53 1b |0E.!.....'...LS.| +peer1.org2.example.com | 00000010 92 37 51 73 19 64 65 6e 68 3a ee d9 8a c6 d2 5f |.7Qs.denh:....._| +peer1.org2.example.com | 00000020 88 d7 35 90 4f 02 20 58 ca 4b d0 94 be c9 50 98 |..5.O. X.K....P.| +peer1.org2.example.com | 00000030 ff b6 f9 c0 ef 0d 3f 0e 6d df 70 e6 1c d1 6b f0 |......?.m.p...k.| +peer1.org2.example.com | 00000040 ad 76 8d 01 b2 1c b1 |.v.....| +peer1.org2.example.com | [1d14 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004425490 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1d15 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004425490 gate 1589998844019440500 evaluation succeeds +peer1.org2.example.com | [1d16 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d17 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d18 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c2c 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c2e 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c2f 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c30 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c2d 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c31 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1c33 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c32 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c34 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1c35 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c36 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c37 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c38 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c39 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c3a 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 gate 1589998838951780800 evaluation starts +peer0.org1.example.com | [1c3b 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c3c 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1c3d 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 principal matched by identity 0 +peer0.org1.example.com | [1c3e 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 96 fc 2d 67 a4 0f f4 72 ce 8a e4 73 f3 62 43 |$..-g...r...s.bC| +peer0.org1.example.com | 00000010 68 3b 4e 74 38 20 a9 14 5d 48 48 3a 5e 60 ca ee |h;Nt8 ..]HH:^`..| +peer0.org1.example.com | [1c3f 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 08 bc b7 84 09 73 fb 85 4c 06 5b |0D. E.....s..L.[| +peer0.org1.example.com | 00000010 ff b8 b5 ca 69 e1 bb 46 4a cf d1 f4 67 9a 22 c3 |....i..FJ...g.".| +peer0.org1.example.com | 00000020 f9 a8 24 ef 02 20 33 77 44 ec db 96 9d d7 e3 80 |..$.. 3wD.......| +peer0.org1.example.com | 00000030 0c f8 26 9f 43 49 b1 b4 5f 3d 26 b0 df 52 34 8e |..&.CI.._=&..R4.| +peer0.org1.example.com | 00000040 f3 1a 3b 62 3b 6c |..;b;l| +peer0.org1.example.com | [1c40 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c41 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 gate 1589998838951780800 evaluation succeeds +peer0.org1.example.com | [1c42 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c43 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c44 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c45 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1c46 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c47 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1c48 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c49 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c4a 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1c4b 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c4c 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c4d 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c4e 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c4f 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c50 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c93 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c94 05-20 18:20:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c95 05-20 18:20:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c96 05-20 18:20:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c97 05-20 18:20:38.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c98 05-20 18:20:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [1c99 05-20 18:20:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1c9a 05-20 18:20:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161021 +peer0.org2.example.com | [1c9b 05-20 18:20:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 94A30742108F78E704B014B38CEDA6268EB3FDE0B43A86F5925D4254635ED90D +peer0.org2.example.com | [1c9c 05-20 18:20:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1c9d 05-20 18:20:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1c9e 05-20 18:20:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1c9f 05-20 18:20:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1ca0 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ca1 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ca2 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ca3 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1ca4 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1ca5 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ca6 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1ca7 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ca8 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ca9 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cab 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1caa 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cac 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cad 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cae 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1caf 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cb0 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1cb1 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 96 fc 2d 67 a4 0f f4 72 ce 8a e4 73 f3 62 43 |$..-g...r...s.bC| +peer0.org2.example.com | 00000010 68 3b 4e 74 38 20 a9 14 5d 48 48 3a 5e 60 ca ee |h;Nt8 ..]HH:^`..| +peer0.org2.example.com | [1cb2 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 08 bc b7 84 09 73 fb 85 4c 06 5b |0D. E.....s..L.[| +peer0.org2.example.com | 00000010 ff b8 b5 ca 69 e1 bb 46 4a cf d1 f4 67 9a 22 c3 |....i..FJ...g.".| +peer0.org2.example.com | 00000020 f9 a8 24 ef 02 20 33 77 44 ec db 96 9d d7 e3 80 |..$.. 3wD.......| +peer0.org2.example.com | 00000030 0c f8 26 9f 43 49 b1 b4 5f 3d 26 b0 df 52 34 8e |..&.CI.._=&..R4.| +peer0.org2.example.com | 00000040 f3 1a 3b 62 3b 6c |..;b;l| +peer0.org2.example.com | [1cb3 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cb4 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1d48 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d49 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1d4a 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403c4d0 gate 1589998848674385700 evaluation starts +peer1.org1.example.com | [1d4b 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403c4d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d4c 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403c4d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1d4d 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403c4d0 principal matched by identity 0 +peer1.org1.example.com | [1d4e 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer1.org1.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer1.org1.example.com | [1d4f 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer1.org1.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer1.org1.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer1.org1.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer1.org1.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer1.org1.example.com | [1d50 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403c4d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d51 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403c4d0 gate 1589998848674385700 evaluation succeeds +peer1.org1.example.com | [1d52 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d53 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d54 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d55 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1d56 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d57 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d58 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1d59 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer1.org1.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer1.org1.example.com | [1d5a 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer1.org1.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer1.org1.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer1.org1.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer0.org1.example.com | [1c51 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c52 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c53 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c54 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c55 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c56 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c57 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c58 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c59 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c5a 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c5b 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c5c 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c5d 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c5e 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c5f 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c60 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161020 +peer0.org1.example.com | [1c61 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6D375C42813110B38F44F4300393CB5E99B87B8B4E5F31D387A68C6DD34C84CC +peer0.org1.example.com | [1c62 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c63 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1c64 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1c65 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1c66 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c67 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c68 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c69 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c6a 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c6b 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c6c 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c6d 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c6e 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cb5 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1cb6 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1cb7 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1cb8 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cb9 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cba 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cbb 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cbc 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cbd 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cbe 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1cbf 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cc0 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1cc1 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc2 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc3 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc4 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc5 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc6 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc7 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc8 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc9 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cca 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ccb 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ccc 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1ccd 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer1.org1.example.com | [1d5b 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d5c 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d5d 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d5e 05-20 18:20:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d5f 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d60 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d61 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d62 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1d63 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d19 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1d1a 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d1b 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1d1c 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1d1d 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1d1e 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1d1f 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d20 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d21 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d22 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d24 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d25 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d26 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d27 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d23 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d28 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d29 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d2a 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d2b 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d2c 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d2d 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d2e 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1d2f 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d30 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1d31 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d32 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d33 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d34 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d35 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d36 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d37 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d38 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d39 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d3a 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d3b 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d3c 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d3d 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c6f 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c70 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c71 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c72 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c73 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c74 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c75 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c76 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c77 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c78 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c79 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c7a 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c7b 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c7c 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1c7d 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 37 5c 42 81 31 10 b3 8f 44 f4 30 03 93 cb 5e |m7\B.1...D.0...^| +peer0.org1.example.com | 00000010 99 b8 7b 8b 4e 5f 31 d3 87 a6 8c 6d d3 4c 84 cc |..{.N_1....m.L..| +peer0.org1.example.com | [1c7e 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 5b 5a 43 23 ff ef 1f 75 75 6c |0E.!..[ZC#...uul| +peer0.org1.example.com | 00000010 b7 22 f3 e2 7f bc f1 8b 7b e3 93 73 f9 83 3e f5 |."......{..s..>.| +peer0.org1.example.com | 00000020 70 2a b1 d4 79 02 20 6e 4f d6 33 3a 21 87 f5 ac |p*..y. nO.3:!...| +peer0.org1.example.com | 00000030 51 10 af 61 a4 e4 9f 3a 4f b3 70 14 cb 57 f5 4b |Q..a...:O.p..W.K| +peer0.org1.example.com | 00000040 15 71 49 ed 71 c4 78 |.qI.q.x| +peer0.org1.example.com | [1c7f 05-20 18:20:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c80 05-20 18:20:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c81 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c82 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c83 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1c84 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c87 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c85 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c86 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c89 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c88 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c8a 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c8b 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c8c 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c8d 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cce 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ccf 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1cd0 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1cd1 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1cd2 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1cd3 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1cd4 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eca10 gate 1589998839014283600 evaluation starts +peer0.org2.example.com | [1cd5 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eca10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1cd6 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eca10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1cd7 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eca10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1cd8 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eca10 principal evaluation fails +peer0.org2.example.com | [1cd9 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eca10 gate 1589998839014283600 evaluation fails +peer0.org2.example.com | [1cda 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1cdb 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1cdc 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1cdd 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ecf80 gate 1589998839014676900 evaluation starts +peer0.org2.example.com | [1cde 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ecf80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1cdf 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ecf80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1ce0 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ecf80 principal matched by identity 0 +peer0.org2.example.com | [1ce1 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 37 5c 42 81 31 10 b3 8f 44 f4 30 03 93 cb 5e |m7\B.1...D.0...^| +peer0.org2.example.com | 00000010 99 b8 7b 8b 4e 5f 31 d3 87 a6 8c 6d d3 4c 84 cc |..{.N_1....m.L..| +peer0.org2.example.com | [1ce2 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 5b 5a 43 23 ff ef 1f 75 75 6c |0E.!..[ZC#...uul| +peer0.org2.example.com | 00000010 b7 22 f3 e2 7f bc f1 8b 7b e3 93 73 f9 83 3e f5 |."......{..s..>.| +peer0.org2.example.com | 00000020 70 2a b1 d4 79 02 20 6e 4f d6 33 3a 21 87 f5 ac |p*..y. nO.3:!...| +peer0.org2.example.com | 00000030 51 10 af 61 a4 e4 9f 3a 4f b3 70 14 cb 57 f5 4b |Q..a...:O.p..W.K| +peer0.org2.example.com | 00000040 15 71 49 ed 71 c4 78 |.qI.q.x| +peer0.org2.example.com | [1ce3 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ecf80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ce4 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ecf80 gate 1589998839014676900 evaluation succeeds +peer0.org2.example.com | [1ce5 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ce6 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ce7 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ce8 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ce9 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cea 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1ceb 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1cec 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1ced 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1cee 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cef 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cf0 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cf1 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cf2 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cf3 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cf4 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cf5 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cf6 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cf7 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1cf8 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cf9 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cfa 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1cfb 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cfc 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cfd 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cfe 05-20 18:20:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cff 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d00 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d01 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d02 05-20 18:20:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d03 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d04 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d05 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d06 05-20 18:20:39.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d07 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d08 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d09 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d0a 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d0b 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d0c 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0d 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0e 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0f 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d10 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d3e 05-20 18:20:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d3f 05-20 18:20:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d40 05-20 18:20:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d41 05-20 18:20:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1d42 05-20 18:20:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d43 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d44 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d45 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1d46 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d47 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d48 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d49 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4a 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d4b 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4c 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d4d 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d4e 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d4f 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d50 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d51 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d52 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d53 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d54 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d55 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d56 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446cb30 gate 1589998844453331100 evaluation starts +peer1.org2.example.com | [1d57 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446cb30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d58 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446cb30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1d59 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446cb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1d5a 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446cb30 principal evaluation fails +peer1.org2.example.com | [1d5b 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446cb30 gate 1589998844453331100 evaluation fails +peer1.org2.example.com | [1d5c 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d5d 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d5e 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1d5f 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446d0a0 gate 1589998844454454100 evaluation starts +peer1.org2.example.com | [1d60 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446d0a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d61 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446d0a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1d62 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446d0a0 principal matched by identity 0 +peer1.org2.example.com | [1d63 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1d64 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1d65 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446d0a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1d66 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446d0a0 gate 1589998844454454100 evaluation succeeds +peer1.org2.example.com | [1d67 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d68 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d69 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1d6a 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1d6b 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d6c 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d6d 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d6e 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d6f 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d70 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d71 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d72 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d73 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044882a0 gate 1589998844457467600 evaluation starts +peer1.org2.example.com | [1d74 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044882a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d75 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044882a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1d76 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044882a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1d77 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044882a0 principal evaluation fails +peer1.org2.example.com | [1d78 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044882a0 gate 1589998844457467600 evaluation fails +peer1.org2.example.com | [1d79 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d7a 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d7b 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1d7c 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488810 gate 1589998844459050900 evaluation starts +peer1.org1.example.com | [1d64 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d65 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d66 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d67 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d68 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d69 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1d6a 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009400 gate 1589998848712901600 evaluation starts +peer1.org1.example.com | [1d6b 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d6c 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d6d 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009400 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1d6e 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009400 principal matched by identity 0 +peer1.org1.example.com | [1d6f 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 0e dd a6 56 1e 33 8c 33 07 b2 7a 2f 48 df 21 |....V.3.3..z/H.!| +peer1.org1.example.com | 00000010 43 b0 83 26 19 b6 bd 8b a0 f4 64 a9 a2 55 3f 1d |C..&......d..U?.| +peer1.org1.example.com | [1d70 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c5 bb 02 1c 00 96 e2 f1 3a b7 21 |0D. =........:.!| +peer1.org1.example.com | 00000010 c8 f0 e1 da 60 d2 fa a9 08 03 da d6 9b 56 be 3a |....`........V.:| +peer1.org1.example.com | 00000020 44 69 b8 9f 02 20 57 d6 1b 15 c4 f9 7a 32 05 1d |Di... W.....z2..| +peer1.org1.example.com | 00000030 d4 2b e2 a9 17 9f 00 6b bd 25 70 40 e2 b3 1c e8 |.+.....k.%p@....| +peer1.org1.example.com | 00000040 47 ee 39 68 42 d1 |G.9hB.| +peer1.org1.example.com | [1d71 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009400 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d72 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004009400 gate 1589998848712901600 evaluation succeeds +peer1.org1.example.com | [1d73 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d74 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d75 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d76 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1d77 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d78 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1d79 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1d7a 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1d7b 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1d7c 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d7d 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d7e 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d7f 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d80 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d81 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d82 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d83 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d84 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d85 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d86 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1d87 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d88 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d89 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d8b 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d8c 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d8a 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d8e 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1d8f 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d90 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d8d 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d91 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d92 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d93 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d94 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d95 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d96 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d97 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d98 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d99 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d9a 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d9b 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d9c 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d9d 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d9e 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d9f 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1da0 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1da1 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1da2 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1da3 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1da4 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1da5 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1da6 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1da7 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1da8 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1da9 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1d11 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d12 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d13 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d14 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d15 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d16 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d17 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1d18 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d1a 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d19 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d1b 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d1c 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d1d 05-20 18:20:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d1e 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d1f 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1d20 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | [1c8e 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1c8f 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c90 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c91 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c92 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c93 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c94 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 gate 1589998839614147800 evaluation starts +peer0.org1.example.com | [1c95 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c96 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1c97 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 principal matched by identity 0 +peer0.org1.example.com | [1c98 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1c99 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003b2abf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c9b 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 gate 1589998839614147800 evaluation succeeds +peer0.org1.example.com | [1c9c 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c9d 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c9e 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c9f 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ca0 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1ca1 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1ca2 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1ca3 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1ca4 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ca5 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ca6 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca7 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca8 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1d21 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d22 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d23 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d24 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d25 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d26 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d27 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1d28 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1d29 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045568a0 gate 1589998840164417100 evaluation starts +peer0.org2.example.com | [1d2a 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045568a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d2b 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045568a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1d2c 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045568a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1d2d 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045568a0 principal evaluation fails +peer0.org2.example.com | [1d2e 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045568a0 gate 1589998840164417100 evaluation fails +peer0.org2.example.com | [1d2f 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d30 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d31 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1d32 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004556e10 gate 1589998840165356500 evaluation starts +peer0.org2.example.com | [1d33 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004556e10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d34 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004556e10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1d35 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004556e10 principal matched by identity 0 +peer0.org2.example.com | [1d36 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1d37 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1d38 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004556e10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d39 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004556e10 gate 1589998840165356500 evaluation succeeds +peer0.org2.example.com | [1d3a 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d3b 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d3c 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d3d 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d3e 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1d3f 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [1d41 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d42 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d43 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d44 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d45 05-20 18:20:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d46 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1d47 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1d48 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570700 gate 1589998840171561000 evaluation starts +peer0.org2.example.com | [1d49 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d4a 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570700 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1d4b 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1d4c 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570700 principal evaluation fails +peer0.org2.example.com | [1d4d 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570700 gate 1589998840171561000 evaluation fails +peer0.org2.example.com | [1d4e 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d4f 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d50 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1d51 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570c70 gate 1589998840173470800 evaluation starts +peer0.org2.example.com | [1d52 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570c70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d53 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570c70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1d54 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570c70 principal matched by identity 0 +peer0.org2.example.com | [1d55 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1d56 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1d57 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570c70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d58 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004570c70 gate 1589998840173470800 evaluation succeeds +peer0.org2.example.com | [1d59 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d5a 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d5b 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d5c 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d5d 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d5e 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d5f 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d60 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d61 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d62 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d63 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d64 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d65 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d66 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1d67 05-20 18:20:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1d68 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c0c0 gate 1589998840181075600 evaluation starts +peer0.org2.example.com | [1d69 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d6a 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c0c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1d6b 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1d6c 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c0c0 principal evaluation fails +peer0.org2.example.com | [1d6d 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c0c0 gate 1589998840181075600 evaluation fails +peer0.org2.example.com | [1d6e 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d6f 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d70 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1d71 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c630 gate 1589998840182618300 evaluation starts +peer0.org2.example.com | [1d72 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c630 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d73 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c630 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1d74 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c630 principal matched by identity 0 +peer0.org2.example.com | [1d75 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1d76 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1d77 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c630 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d78 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c630 gate 1589998840182618300 evaluation succeeds +peer0.org2.example.com | [1d79 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d7a 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d7b 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d7c 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d7d 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d7e 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d7d 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d7e 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488810 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1d7f 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488810 principal matched by identity 0 +peer1.org2.example.com | [1d80 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1d81 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1d82 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488810 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1d83 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488810 gate 1589998844459050900 evaluation succeeds +peer1.org2.example.com | [1d84 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d85 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d86 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1d87 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1d88 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1d89 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1d8a 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d8b 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1d8c 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [1d8e 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d8f 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d90 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d91 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d92 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d93 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d94 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d95 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d96 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d97 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d98 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4a40 gate 1589998844475387600 evaluation starts +peer0.org1.example.com | [1ca9 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1caa 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cab 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cac 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1cad 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1cae 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1caf 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 gate 1589998839623192400 evaluation starts +peer0.org1.example.com | [1cb0 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1cb1 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1cb2 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 principal matched by identity 0 +peer0.org1.example.com | [1cb3 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1cb4 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1cb5 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1cb6 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 gate 1589998839623192400 evaluation succeeds +peer0.org1.example.com | [1cb7 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cb8 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cb9 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1cba 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1cbb 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cbc 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cbd 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1cbe 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1cbf 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1cc0 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1cc1 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cc2 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1daa 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dab 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1dac 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dad 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dae 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1daf 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1db0 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1db1 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040962d0 gate 1589998848901625000 evaluation starts +peer1.org1.example.com | [1db2 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040962d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1db3 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040962d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1db4 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040962d0 principal matched by identity 0 +peer1.org1.example.com | [1db5 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer1.org1.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer1.org1.example.com | [1db6 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer1.org1.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer1.org1.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer1.org1.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer1.org1.example.com | 00000040 89 09 92 92 88 98 |......| +peer1.org1.example.com | [1db7 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040962d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1db8 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040962d0 gate 1589998848901625000 evaluation succeeds +peer1.org1.example.com | [1db9 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1dba 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1dbb 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1dbc 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1dbd 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dbe 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1dbf 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1dc0 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1dc1 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1dc2 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc3 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc4 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc5 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1dc6 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc7 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d99 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4a40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d9a 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4a40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1d9b 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1d9c 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4a40 principal evaluation fails +peer1.org2.example.com | [1d9d 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4a40 gate 1589998844475387600 evaluation fails +peer1.org2.example.com | [1d9e 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d9f 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1da0 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1da1 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4fb0 gate 1589998844481559100 evaluation starts +peer1.org2.example.com | [1da2 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1da3 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4fb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1da4 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4fb0 principal matched by identity 0 +peer1.org2.example.com | [1da5 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1da6 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1da7 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4fb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1da8 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4fb0 gate 1589998844481559100 evaluation succeeds +peer1.org2.example.com | [1da9 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1daa 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1dab 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1dac 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1dad 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dae 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1daf 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1db0 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1db1 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1db2 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1db3 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1db4 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1db5 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c41b0 gate 1589998844487838100 evaluation starts +peer1.org2.example.com | [1db6 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c41b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1db7 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c41b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1db8 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c41b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1db9 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c41b0 principal evaluation fails +peer1.org2.example.com | [1dba 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c41b0 gate 1589998844487838100 evaluation fails +peer1.org2.example.com | [1dbb 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1dbc 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1dbd 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1cc3 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1cc4 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cc5 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cc6 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1cc7 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1cc8 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1cc9 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 gate 1589998839639461800 evaluation starts +peer0.org1.example.com | [1cca 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ccb 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1ccc 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 principal matched by identity 0 +peer0.org1.example.com | [1ccd 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1cce 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003b86d50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1cd0 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 gate 1589998839639461800 evaluation succeeds +peer0.org1.example.com | [1cd1 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cd2 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cd3 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1cd4 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1cd5 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cd6 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cd7 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1cd8 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cd9 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cda 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1cdb 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1cdc 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1cdd 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 gate 1589998839642570500 evaluation starts +peer0.org1.example.com | [1cde 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1cdf 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1dc8 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc9 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1dca 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1dcb 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dcc 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dcd 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dce 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dcf 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dd0 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dd1 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1dd2 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dd3 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1dd4 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dd5 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dd6 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1dd7 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1dd8 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1dd9 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004097c90 gate 1589998848939878400 evaluation starts +peer1.org1.example.com | [1dda 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004097c90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ddb 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004097c90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1ddc 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004097c90 principal matched by identity 0 +peer0.org2.example.com | [1d7f 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d80 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d81 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d82 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d83 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1d84 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1d85 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d830 gate 1589998840185859600 evaluation starts +peer0.org2.example.com | [1d86 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d87 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d830 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1d88 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1d89 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d830 principal evaluation fails +peer0.org2.example.com | [1d8a 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d830 gate 1589998840185859600 evaluation fails +peer0.org2.example.com | [1d8b 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d8c 05-20 18:20:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d8d 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1d8e 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458dda0 gate 1589998840193497400 evaluation starts +peer0.org2.example.com | [1d8f 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458dda0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d90 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458dda0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1d91 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458dda0 principal matched by identity 0 +peer0.org2.example.com | [1d92 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1d93 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1d94 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458dda0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d95 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458dda0 gate 1589998840193497400 evaluation succeeds +peer0.org2.example.com | [1d96 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d97 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d98 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d99 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d9a 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1d9b 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1d9c 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1d9d 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [1d9f 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1da0 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1da1 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1da2 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dbe 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4720 gate 1589998844488727300 evaluation starts +peer1.org2.example.com | [1dbf 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1dc0 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4720 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1dc1 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4720 principal matched by identity 0 +peer1.org2.example.com | [1dc2 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1dc3 05-20 18:20:44.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1dc4 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1dc5 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4720 gate 1589998844488727300 evaluation succeeds +peer1.org2.example.com | [1dc6 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1dc7 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1dc8 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1dc9 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1dca 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1dcb 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1dcd 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1dce 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dcf 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dd0 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1dd1 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [1dd3 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dd4 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1dd5 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1dd6 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1dd7 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1da3 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1da4 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1da5 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1da6 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1da7 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1da8 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1da9 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a9fd0 gate 1589998840197742000 evaluation starts +peer0.org2.example.com | [1daa 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a9fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1dab 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a9fd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1dac 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a9fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1dad 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a9fd0 principal evaluation fails +peer0.org2.example.com | [1dae 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a9fd0 gate 1589998840197742000 evaluation fails +peer0.org2.example.com | [1daf 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1db0 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1db1 05-20 18:20:40.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1db2 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0540 gate 1589998840200286800 evaluation starts +peer0.org2.example.com | [1db3 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0540 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1db4 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0540 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1db5 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0540 principal matched by identity 0 +peer0.org2.example.com | [1db6 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1db7 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1db8 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0540 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1db9 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0540 gate 1589998840200286800 evaluation succeeds +peer0.org2.example.com | [1dba 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1dbb 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1dbc 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1dbd 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1dbe 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dbf 05-20 18:20:40.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ce0 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 principal matched by identity 0 +peer0.org1.example.com | [1ce1 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1ce2 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1ce3 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ce4 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 gate 1589998839642570500 evaluation succeeds +peer0.org1.example.com | [1ce5 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ce6 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ce7 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ce8 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ce9 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cea 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ceb 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cec 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ced 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cee 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1cef 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cf0 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cf1 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1cf2 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1cf3 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1cf4 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 gate 1589998839656149500 evaluation starts +peer0.org1.example.com | [1cf5 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1cf6 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1cf7 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 principal matched by identity 0 +peer0.org1.example.com | [1cf8 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1cf9 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1cfa 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1cfb 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 gate 1589998839656149500 evaluation succeeds +peer0.org1.example.com | [1cfc 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cfd 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cfe 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1cff 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d00 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | [1ddd 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 84 b7 05 0e 5f 05 e1 de 17 51 80 b6 87 3c af | ...._....Q...<.| +peer1.org1.example.com | 00000010 f2 59 4e 93 ea d1 42 e2 f4 ab fb 8f 3c 75 1f 47 |.YN...B..... DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 54 18 8a 70 ef a2 dd 21 73 |0E.!...T..p...!s| +peer1.org1.example.com | 00000010 5a 3d 3b aa 4b 47 ac 6e e8 3f c7 84 3a 72 e9 10 |Z=;.KG.n.?..:r..| +peer1.org1.example.com | 00000020 74 71 94 62 0f 02 20 06 bf 32 71 81 42 80 25 a4 |tq.b.. ..2q.B.%.| +peer1.org1.example.com | 00000030 cd b7 1a a9 8a 88 10 71 d0 99 52 97 cd d0 7c 9b |.......q..R...|.| +peer1.org1.example.com | 00000040 b3 75 80 f1 f2 e9 9b |.u.....| +peer1.org1.example.com | [1ddf 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004097c90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1de0 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004097c90 gate 1589998848939878400 evaluation succeeds +peer1.org1.example.com | [1de1 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1de2 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1de3 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1de4 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1de5 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1de6 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1de7 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1de8 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1de9 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1dea 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1deb 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dec 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ded 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dee 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1def 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1df0 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1df1 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1df2 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df3 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df4 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df5 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df6 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df7 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df8 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df9 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1dfa 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dfb 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1d01 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1d02 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d03 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d04 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d05 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d06 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d07 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d08 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d09 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d0a 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 gate 1589998839670046700 evaluation starts +peer0.org1.example.com | [1d0b 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d0c 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1d0d 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 principal matched by identity 0 +peer0.org1.example.com | [1d0e 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1d0f 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003be6c90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d11 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 gate 1589998839670046700 evaluation succeeds +peer0.org1.example.com | [1d12 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d13 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d14 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d15 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d16 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1d17 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1d18 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d19 05-20 18:20:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d1a 05-20 18:20:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d1b 05-20 18:20:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1d1c 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d1d 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d1e 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1dd8 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1dd9 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1dda 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e4f90 gate 1589998844499127900 evaluation starts +peer1.org2.example.com | [1ddb 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e4f90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ddc 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e4f90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1ddd 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e4f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1dde 05-20 18:20:44.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e4f90 principal evaluation fails +peer1.org2.example.com | [1ddf 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e4f90 gate 1589998844499127900 evaluation fails +peer1.org2.example.com | [1de0 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1de1 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1de2 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1de3 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e5500 gate 1589998844500851100 evaluation starts +peer1.org2.example.com | [1de4 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e5500 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1de5 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e5500 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1de6 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e5500 principal matched by identity 0 +peer1.org2.example.com | [1de7 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1de8 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1de9 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e5500 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1dea 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e5500 gate 1589998844500851100 evaluation succeeds +peer1.org2.example.com | [1deb 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1dec 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ded 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1dee 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1def 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1df0 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1df1 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1df2 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1df3 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1df4 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1df5 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1df6 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1df7 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc700 gate 1589998844503528900 evaluation starts +peer1.org2.example.com | [1df8 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1df9 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc700 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1dfa 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1dfb 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc700 principal evaluation fails +peer1.org2.example.com | [1dfc 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc700 gate 1589998844503528900 evaluation fails +peer1.org2.example.com | [1dfd 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1dfe 05-20 18:20:44.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1dff 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e00 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fcc70 gate 1589998844513404300 evaluation starts +peer1.org2.example.com | [1e01 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fcc70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e02 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fcc70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1e03 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fcc70 principal matched by identity 0 +peer1.org2.example.com | [1e04 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1e05 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1e06 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fcc70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e07 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fcc70 gate 1589998844513404300 evaluation succeeds +peer1.org2.example.com | [1e08 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e09 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e0a 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e0b 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e0c 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1e0d 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1e0e 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e0f 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e10 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e11 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e12 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e13 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e14 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e15 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e16 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e17 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1e18 05-20 18:20:44.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e19 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e1a 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e1b 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e1c 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1e1d 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dc0 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1dc1 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1dc2 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1dc3 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1dc4 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1dc5 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1dc6 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1740 gate 1589998840210987100 evaluation starts +peer0.org2.example.com | [1dc7 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1dc8 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1740 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1dc9 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1dca 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1740 principal evaluation fails +peer0.org2.example.com | [1dcb 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1740 gate 1589998840210987100 evaluation fails +peer0.org2.example.com | [1dcc 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1dcd 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1dce 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1dcf 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1cb0 gate 1589998840213313200 evaluation starts +peer0.org2.example.com | [1dd0 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1dd1 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1cb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1dd2 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1cb0 principal matched by identity 0 +peer0.org2.example.com | [1dd3 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1dd4 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1dd5 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1cb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1dd6 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1cb0 gate 1589998840213313200 evaluation succeeds +peer0.org2.example.com | [1dd7 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1dd8 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1dd9 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1dda 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ddb 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1ddc 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1dde 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1ddf 05-20 18:20:40.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1de0 05-20 18:20:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1de1 05-20 18:20:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1de2 05-20 18:20:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1de3 05-20 18:20:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1de4 05-20 18:20:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1de5 05-20 18:20:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1de6 05-20 18:20:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1de7 05-20 18:20:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d1f 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d20 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d21 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d22 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d23 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d24 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d25 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d26 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d27 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d28 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d29 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d2a 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d2b 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d2c 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d2d 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d2e 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d2f 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d30 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d31 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d32 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d33 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d34 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d35 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d36 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d37 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d38 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d39 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1d3a 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d3b 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d3c 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d3d 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d3e 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1d3f 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d40 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d41 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d42 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d43 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d44 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1d45 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer0.org1.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer0.org1.example.com | [1d46 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer0.org1.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer0.org1.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer0.org1.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer0.org1.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1d48 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa ee 9a c2 5f 24 c3 d5 92 db 2f |0E.!....._$..../| +peer0.org1.example.com | 00000010 50 b1 52 89 87 ff db a2 24 9b 3c 7b fc 8c e8 8e |P.R.....$.<{....| +peer0.org1.example.com | 00000020 da d8 3a 56 2a 02 20 01 7b 8e 4f 67 dc f4 60 3e |..:V*. .{.Og..`>| +peer0.org1.example.com | 00000030 9a ed ab 48 d9 80 3a 68 f3 7a 59 17 f7 1c 98 77 |...H..:h.zY....w| +peer0.org1.example.com | 00000040 c7 bc cb ef f5 f3 9c |.......| +peer0.org1.example.com | [1d49 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1d4a 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [1d4b 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1d4c 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1d4d 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1d4e 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d4f 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d51 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1d52 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d53 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d54 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1d55 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > +peer0.org1.example.com | [1d56 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d57 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d50 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d58 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [1d59 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [1d5a 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1d5b 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610091801 +peer0.org1.example.com | [1d5c 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC27F7397872FE7ADD4AF19B38DDF3601DE545E7D59663E870440D8A5123A730 +peer0.org2.example.com | [1de8 05-20 18:20:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1de9 05-20 18:20:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dea 05-20 18:20:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1deb 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dec 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ded 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dee 05-20 18:20:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1def 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1df0 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1df1 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df2 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df3 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df4 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df5 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df6 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df7 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1df8 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1df9 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dfa 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dfb 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dfc 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1dfd 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dfe 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1dff 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e00 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e01 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e02 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e03 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1e04 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046147d0 gate 1589998840642168200 evaluation starts +peer1.org2.example.com | [1e1e 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e1f 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e20 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e21 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e22 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e23 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e24 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452c650 gate 1589998844639520700 evaluation starts +peer1.org2.example.com | [1e25 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452c650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e26 05-20 18:20:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452c650 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1e27 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452c650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e28 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452c650 principal evaluation fails +peer1.org2.example.com | [1e29 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452c650 gate 1589998844639520700 evaluation fails +peer1.org2.example.com | [1e2a 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e2b 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e2c 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e2d 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452cbc0 gate 1589998844656095100 evaluation starts +peer1.org2.example.com | [1e2e 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452cbc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e2f 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452cbc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1e30 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452cbc0 principal matched by identity 0 +peer1.org2.example.com | [1e31 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer1.org2.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer1.org2.example.com | [1e32 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer1.org2.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer1.org2.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer1.org2.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer1.org2.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer1.org2.example.com | [1e33 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452cbc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e34 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00452cbc0 gate 1589998844656095100 evaluation succeeds +peer1.org2.example.com | [1e35 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e36 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e37 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e38 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e39 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1e3a 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1e3b 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1e3c 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1dfd 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dfe 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dfc 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1dff 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e00 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e01 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e02 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e03 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e04 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e05 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e06 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e07 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1e08 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 e7 b0 c9 80 97 dd f2 20 09 c0 e0 f9 63 dc 2f |........ ....c./| +peer1.org1.example.com | 00000010 f6 9d 79 a6 fc 08 c5 ba 2a 16 3d d2 a9 e9 90 83 |..y.....*.=.....| +peer1.org1.example.com | [1e09 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 e1 46 e7 30 4c b8 38 dd 25 0e 6f |0D. 1.F.0L.8.%.o| +peer1.org1.example.com | 00000010 24 5c a8 7c 54 7b a0 7c 0d 3c e6 7c a4 8e 3a fe |$\.|T{.|.<.|..:.| +peer1.org1.example.com | 00000020 3c 9d c6 42 02 20 6b 2e 49 ca fb d2 cf fb 44 aa |<..B. k.I.....D.| +peer1.org1.example.com | 00000030 26 ad de b4 a9 30 8c 16 54 54 85 a1 1b 0a 27 93 |&....0..TT....'.| +peer1.org1.example.com | 00000040 d3 0d e9 73 10 ee |...s..| +peer1.org1.example.com | [1e0a 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e0b 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e0c 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e0d 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1e0e 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e0f 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1e10 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1e11 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e12 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e13 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d5d 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [1d5e 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d5f 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d60 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d61 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d62 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1d63 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d64 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d65 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [1d66 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d67 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1d68 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1d69 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1d6a 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1d6b 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1d6c 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1d6d 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d6e 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d6f 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d70 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d71 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d72 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d73 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d74 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d75 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d76 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d77 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d78 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d79 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1d7c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d7d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d7e 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d7f 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d80 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1d81 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e05 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046147d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e06 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046147d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1e07 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046147d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1e08 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046147d0 principal evaluation fails +peer0.org2.example.com | [1e09 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046147d0 gate 1589998840642168200 evaluation fails +peer0.org2.example.com | [1e0a 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e0b 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e0c 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e0d 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614d40 gate 1589998840648982000 evaluation starts +peer0.org2.example.com | [1e0e 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614d40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e0f 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614d40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1e10 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614d40 principal matched by identity 0 +peer0.org2.example.com | [1e11 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer0.org2.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer0.org2.example.com | [1e12 05-20 18:20:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer0.org2.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer0.org2.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer0.org2.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer0.org2.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU 0xc004614d40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e14 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614d40 gate 1589998840648982000 evaluation succeeds +peer0.org2.example.com | [1e15 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e16 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e17 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e18 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e19 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e1a 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1e1b 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1e1c 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1e1d 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1e1e 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e1f 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e20 05-20 18:20:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1e21 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e22 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e23 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e24 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e14 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e15 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1e16 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer1.org1.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer1.org1.example.com | [1e17 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer1.org1.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer1.org1.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer1.org1.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer1.org1.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer1.org1.example.com | [1e18 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e19 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1e1a 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 9c 79 ea 71 19 fa 17 f3 ab 16 |0E.!...y.q......| +peer1.org1.example.com | 00000010 28 cd a5 6a ed 8f 9b 82 72 86 ec e3 f6 ac e3 57 |(..j....r......W| +peer1.org1.example.com | 00000020 79 ab 3a aa 63 02 20 36 e3 3d 49 f5 82 af 2e 24 |y.:.c. 6.=I....$| +peer1.org1.example.com | 00000030 80 a0 67 75 ca a0 45 ff f9 e7 92 d3 4f 6d 7a 09 |..gu..E.....Omz.| +peer1.org1.example.com | 00000040 24 37 1b 80 97 3b 28 |$7...;(| +peer1.org1.example.com | [1e1b 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e1c 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1e1d 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1e1e 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e1f 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1e20 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1e21 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e22 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e23 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e24 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e25 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e26 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e27 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e28 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e29 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1e2a 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e2b 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e2c 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e2d 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [1e2e 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e30 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e2f 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e31 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1e32 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e33 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1e34 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e35 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e36 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e37 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e38 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e39 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e3a 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e3b 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e3c 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e3d 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e3e 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e3f 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e40 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e41 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e42 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e43 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e44 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e45 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e46 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1e47 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e48 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e49 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e4a 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e4b 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e4c 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1e4d 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d82 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d83 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d84 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d85 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d86 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d87 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d88 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 gate 1589998840855841300 evaluation starts +peer0.org1.example.com | [1d89 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d8a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1d8b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 principal matched by identity 0 +peer0.org1.example.com | [1d8c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer0.org1.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer0.org1.example.com | [1d8d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer0.org1.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer0.org1.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer0.org1.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU 0xc003ccaa60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d8f 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 gate 1589998840855841300 evaluation succeeds +peer0.org1.example.com | [1d90 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d91 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d92 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d93 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d94 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1d95 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1d96 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1d97 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1d98 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1d99 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d9a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d9b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d9c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1d9d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d9e 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d9f 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1da0 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1da1 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > +peer0.org1.example.com | [1da2 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1da3 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1da4 05-20 18:20:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1da5 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1da6 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1da7 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1da8 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1da9 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1daa 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dab 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dac 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dad 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dae 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e3d 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1e3e 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e3f 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e40 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e41 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1e42 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e43 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e44 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e45 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1e46 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e47 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\302\250\032\252\217\014\265\263\037\357\2064\026TQ\307\263\242\016(Z\241\336\242\372\213\003" > alive: alive: alive:M\031N\333\242\312^\211O\204" > +peer1.org2.example.com | [1e48 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e49 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e4a 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e4b 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e4c 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1e4d 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e4e 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e4f 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e50 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e51 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e52 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e53 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e54 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e55 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e56 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1e57 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e58 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e59 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e5a 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e5b 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e5c 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1e5d 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer1.org2.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer1.org2.example.com | [1e5e 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer1.org2.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer1.org2.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer1.org2.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer1.org2.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer1.org2.example.com | [1e5f 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1e60 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a ca 78 12 82 16 f7 5e 54 82 cc |0E.!...x....^T..| +peer1.org2.example.com | 00000010 7e 5a 61 ad 90 a9 fb c7 84 eb 27 41 50 a2 7d c7 |~Za.......'AP.}.| +peer1.org2.example.com | 00000020 8f 3d 82 e1 ae 02 20 5c de 5e 83 8a 2e 81 1d 11 |.=.... \.^......| +peer1.org2.example.com | 00000030 87 22 29 f1 c6 d5 90 32 cd cd 8f 28 4b c5 26 33 |.")....2...(K.&3| +peer1.org2.example.com | 00000040 8f aa 8c 00 11 97 7d |......}| +peer1.org2.example.com | [1e61 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1e62 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [1e63 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1e64 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1e65 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1e66 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e67 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e68 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e69 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [1e6a 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e6b 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e6c 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1e6d 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:M\031N\333\242\312^\211O\204" > +peer1.org2.example.com | [1e6e 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e6f 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e70 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e71 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e72 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1e73 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e74 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e75 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e4e 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e4f 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e50 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e51 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e52 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e53 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e54 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041305f0 gate 1589998849181813600 evaluation starts +peer1.org1.example.com | [1e55 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041305f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e56 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041305f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1e57 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041305f0 principal matched by identity 0 +peer1.org1.example.com | [1e58 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer1.org1.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer1.org1.example.com | [1e59 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer1.org1.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer1.org1.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer1.org1.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer1.org1.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer1.org1.example.com | [1e5a 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041305f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1e5b 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041305f0 gate 1589998849181813600 evaluation succeeds +peer1.org1.example.com | [1e5c 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e5d 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e5e 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e5f 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e60 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e61 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1e62 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e63 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1e64 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1e65 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e66 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e67 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1e68 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e69 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e6a 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e6b 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e6c 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1e76 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e77 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e78 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e79 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e7a 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e7b 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e7c 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e7d 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e7e 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e7f 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1e80 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e81 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e82 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e83 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e84 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e85 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e86 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e87 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045730f0 gate 1589998845025895000 evaluation starts +peer1.org2.example.com | [1e88 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045730f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e89 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045730f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1e8a 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045730f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e8b 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045730f0 principal evaluation fails +peer1.org2.example.com | [1e8c 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045730f0 gate 1589998845025895000 evaluation fails +peer1.org2.example.com | [1e8d 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e8e 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e8f 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e90 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004573660 gate 1589998845027428500 evaluation starts +peer1.org2.example.com | [1e91 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004573660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e92 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004573660 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1e93 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004573660 principal matched by identity 0 +peer1.org2.example.com | [1e94 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer1.org2.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer1.org2.example.com | [1e95 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer1.org2.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer1.org2.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU 0xc004573660 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e97 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004573660 gate 1589998845027428500 evaluation succeeds +peer1.org2.example.com | [1e98 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e99 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e9a 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e9b 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e9c 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1e9d 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1e9e 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1e9f 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1ea0 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1ea1 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ea2 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ea3 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ea4 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1ea5 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ea6 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ea7 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ea8 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ea9 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:M\031N\333\242\312^\211O\204" > +peer1.org2.example.com | [1eaa 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eab 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eac 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1ead 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1eae 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1eaf 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1eb0 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1eb2 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1eb3 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e25 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > alive: +peer0.org2.example.com | [1e26 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e27 05-20 18:20:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e28 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e29 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1e2a 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e2b 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1e2c 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e2d 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1e2e 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e2f 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e30 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e31 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e32 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e33 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e34 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e35 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e36 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e37 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e38 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1e39 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161022 +peer0.org2.example.com | [1e3a 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A305915ECFE8D6F19FF0BADD0A6A6C89C825EFC4B778CF7A3617F59A7EB07C98 +peer0.org2.example.com | [1e3b 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1e3c 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1e3d 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1e3e 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e3f 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e40 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e41 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e6d 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > alive: +peer1.org1.example.com | [1e6e 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e6f 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e70 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e71 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 52 31 62 a5 e6 b9 d6 f6 25 47 f5 da 4a bc dd |.R1b.....%G..J..| +peer1.org1.example.com | 00000010 1f a0 3f 73 13 48 b9 fd 27 7a d6 42 4f d4 3e 2a |..?s.H..'z.BO.>*| +peer1.org1.example.com | [1e72 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 0a f8 39 a4 3b 1d 1c 5f bf be |0E.!....9.;.._..| +peer1.org1.example.com | 00000010 3a 55 cf 0e af 04 7d e9 e7 3b 82 da 9a 83 3b 1c |:U....}..;....;.| +peer1.org1.example.com | 00000020 43 2e 6a 85 17 02 20 60 b7 53 5f 2f c1 9d 00 d6 |C.j... `.S_/....| +peer1.org1.example.com | 00000030 85 a2 ee 09 41 1d 6e 6f 61 b9 e9 ea 10 a4 bf 34 |....A.noa......4| +peer1.org1.example.com | 00000040 cf d1 4a e5 ba c5 26 |..J...&| +peer1.org1.example.com | [1e73 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e74 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e75 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e76 05-20 18:20:50.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [1e77 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e78 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e79 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e7a 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e7b 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e7c 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e7d 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1e7e 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e7f 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e80 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e81 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1e82 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e83 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e84 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e85 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e86 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e87 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e88 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e89 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e8a 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e8b 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e8c 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eb4 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eb5 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eb6 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eb1 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eb7 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eb8 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eb9 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eba 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ebb 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ebc 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ebd 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ebe 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ebf 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ec0 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ec1 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ec2 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1ec3 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161026 +peer1.org2.example.com | [1ec4 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0492A46A04FCBA490DDFC10BDE1F0D44D7897EE9E57F357908BFA0236994934E +peer1.org2.example.com | [1ec5 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1ec6 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1ec7 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1ec8 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ec9 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eca 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ecb 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ecc 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ecd 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ece 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ecf 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ed1 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ed0 05-20 18:20:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ed2 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ed3 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ed4 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ed5 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ed6 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ed7 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1ed8 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer1.org2.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer1.org2.example.com | [1ed9 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer1.org2.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer1.org2.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer1.org2.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer1.org2.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer1.org2.example.com | [1eda 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1edb 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 82 33 8a 9c bc 5b 41 cf 67 e4 2f |0D. ~.3...[A.g./| +peer1.org2.example.com | 00000010 51 e0 64 06 df 93 44 9b be 80 cb e0 80 73 5a c5 |Q.d...D......sZ.| +peer1.org2.example.com | 00000020 3f 33 9a e7 02 20 7c 5e 9a 1d e8 53 03 59 77 de |?3... |^...S.Yw.| +peer1.org2.example.com | 00000030 e7 a3 ea b2 0c ab aa 47 fb ea 04 89 95 a8 53 03 |.......G......S.| +peer1.org2.example.com | 00000040 f1 57 69 e3 14 d2 |.Wi...| +peer1.org2.example.com | [1edc 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1edd 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1ede 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1edf 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ee0 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ee1 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ee2 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ee3 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1ee4 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1daf 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db0 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db1 05-20 18:20:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1db2 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1db3 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161021 +peer0.org1.example.com | [1db4 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2B1CAD36E5E1909BF3DDEF8510B2BEE5F1CBE663E6266212D2F0E31FE49BED63 +peer0.org1.example.com | [1db5 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1db6 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1db7 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1db8 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1db9 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dba 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1dbb 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dbc 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1dbd 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dbe 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dbf 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dc0 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dc1 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dc2 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dc3 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dc4 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dc5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dc6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dc7 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1dc8 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +peer0.org1.example.com | 00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +peer0.org1.example.com | [1dc9 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +peer0.org1.example.com | 00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +peer0.org1.example.com | 00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +peer0.org1.example.com | 00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +peer0.org1.example.com | 00000040 11 9d 80 32 33 39 28 |...239(| +peer0.org1.example.com | [1dca 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1dcb 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 dc 60 27 14 79 f0 f5 b0 aa 6f |0E.!...`'.y....o| +peer0.org1.example.com | 00000010 66 03 dc 40 7d 21 c0 46 ca 76 c2 8c 9d eb da a5 |f..@}!.F.v......| +peer0.org1.example.com | 00000020 da 23 6a 69 eb 02 20 41 5e b0 6e 5a d3 74 c2 b7 |.#ji.. A^.nZ.t..| +peer0.org1.example.com | 00000030 08 cc ff af 59 bf c2 55 77 46 24 2c ff 76 8d de |....Y..UwF$,.v..| +peer0.org1.example.com | 00000040 29 f9 0a ba f2 bc 82 |)......| +peer0.org1.example.com | [1dcc 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1dcd 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1dce 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dcf 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dd0 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dd1 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dd2 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dd3 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dd4 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1dd5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer0.org1.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer0.org1.example.com | [1dd6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer0.org1.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer0.org1.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer0.org1.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer0.org1.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1dd8 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dd9 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1dda 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +peer0.org1.example.com | 00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +peer0.org1.example.com | [1ddb 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +peer0.org1.example.com | 00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +peer0.org1.example.com | 00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +peer0.org1.example.com | 00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +peer0.org1.example.com | 00000040 11 9d 80 32 33 39 28 |...239(| +peer0.org1.example.com | [1ddc 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ddd 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1dde 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ddf 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1de0 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1de1 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1de2 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1de3 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1de4 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1de5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1de6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1de7 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1de8 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1de9 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1dea 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1deb 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1dec 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 gate 1589998841104467000 evaluation starts +peer0.org1.example.com | [1ded 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1dee 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1def 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 principal matched by identity 0 +peer0.org1.example.com | [1df0 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer0.org1.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer0.org1.example.com | [1df1 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer0.org1.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer0.org1.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer0.org1.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e8e 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e8f 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e90 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e91 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e92 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e93 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004131ff0 gate 1589998851883881300 evaluation starts +peer1.org1.example.com | [1e94 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004131ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e95 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004131ff0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1e96 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004131ff0 principal matched by identity 0 +peer1.org1.example.com | [1e97 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1e98 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004131ff0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1e9a 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004131ff0 gate 1589998851883881300 evaluation succeeds +peer1.org1.example.com | [1e9b 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e9c 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e9d 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e9e 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e9f 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ea0 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1ea1 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1ea2 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1ea3 05-20 18:20:51.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1ea4 05-20 18:20:51.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ea5 05-20 18:20:51.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ea6 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ea7 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ea8 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ea9 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1eaa 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1eab 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1eac 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415b840 gate 1589998851901612700 evaluation starts +peer1.org1.example.com | [1ead 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415b840 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1eae 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415b840 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1eaf 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415b840 principal matched by identity 0 +peer1.org1.example.com | [1eb0 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1eb1 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1eb2 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415b840 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1eb3 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415b840 gate 1589998851901612700 evaluation succeeds +peer1.org1.example.com | [1eb4 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1eb5 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1eb6 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1eb7 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1eb8 05-20 18:20:51.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1eb9 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eba 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ebb 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ebc 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ebd 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ebe 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ebf 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ec0 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ec1 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ee5 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1ee6 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ee7 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ee8 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ee9 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1eea 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1eeb 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f26d0 gate 1589998845204112600 evaluation starts +peer1.org2.example.com | [1eec 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f26d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1eed 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f26d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1eee 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f26d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1eef 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f26d0 principal evaluation fails +peer1.org2.example.com | [1ef0 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f26d0 gate 1589998845204112600 evaluation fails +peer1.org2.example.com | [1ef1 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ef2 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ef3 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ef4 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f2c40 gate 1589998845206230000 evaluation starts +peer1.org2.example.com | [1ef5 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f2c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ef6 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f2c40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1ef7 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f2c40 principal matched by identity 0 +peer1.org2.example.com | [1ef8 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer1.org2.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer1.org2.example.com | [1ef9 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer1.org2.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer1.org2.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU 0xc0045f2c40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1efb 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f2c40 gate 1589998845206230000 evaluation succeeds +peer1.org2.example.com | [1efc 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1efd 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1efe 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1eff 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f00 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f01 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f02 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1f03 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer1.org2.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer1.org2.example.com | [1f04 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer1.org2.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer1.org2.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer1.org2.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer1.org2.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer0.org1.example.com | [1df2 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1df3 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 gate 1589998841104467000 evaluation succeeds +peer0.org1.example.com | [1df4 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1df5 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1df6 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1df7 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1df8 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1df9 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dfa 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1dfb 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +peer0.org1.example.com | 00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +peer0.org1.example.com | [1dfc 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +peer0.org1.example.com | 00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +peer0.org1.example.com | 00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +peer0.org1.example.com | 00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +peer0.org1.example.com | 00000040 11 9d 80 32 33 39 28 |...239(| +peer0.org1.example.com | [1dfd 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1dfe 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1dff 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e00 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1e01 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer0.org1.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer0.org1.example.com | [1e02 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer0.org2.example.com | [1e42 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e43 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e44 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e45 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e46 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e47 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e48 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e49 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e4a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e4b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e4c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1e4d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer0.org2.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer0.org2.example.com | [1e4e 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer0.org2.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer0.org2.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer0.org2.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e50 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e51 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e52 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e53 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e54 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e55 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e56 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e57 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e58 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e59 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e5a 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e5b 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1e5c 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e5d 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e5e 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e5f 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e60 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e61 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e62 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e63 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e64 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e65 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e66 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1e67 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e68 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e69 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e6a 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e6b 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e6c 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e6d 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1e6e 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a000 gate 1589998840904297200 evaluation starts +peer0.org2.example.com | [1e6f 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e70 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a000 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1e71 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1e72 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a000 principal evaluation fails +peer0.org2.example.com | [1e73 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a000 gate 1589998840904297200 evaluation fails +peer0.org2.example.com | [1e74 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e75 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e76 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e77 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a570 gate 1589998840907347100 evaluation starts +peer0.org2.example.com | [1e78 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a570 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e79 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a570 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1e7a 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a570 principal matched by identity 0 +peer0.org2.example.com | [1e7b 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +peer1.org2.example.com | [1f05 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f06 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f07 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1f08 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer1.org2.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer1.org2.example.com | [1f09 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer1.org2.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer1.org2.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer1.org2.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer1.org2.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer1.org2.example.com | [1f0a 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f0b 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f0c 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f0d 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f0e 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f0f 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f10 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f11 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1f12 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f13 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1f14 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f15 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f16 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1f17 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1f18 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1f19 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460b510 gate 1589998845216185500 evaluation starts +peer1.org2.example.com | [1f1a 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460b510 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f1b 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460b510 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1f1c 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460b510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1f1d 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460b510 principal evaluation fails +peer1.org2.example.com | [1f1e 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460b510 gate 1589998845216185500 evaluation fails +peer1.org2.example.com | [1f1f 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f20 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f21 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1f22 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ba80 gate 1589998845217265200 evaluation starts +peer1.org2.example.com | [1f23 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ba80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ec2 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ec3 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c90 gate 1589998851917885400 evaluation starts +peer1.org1.example.com | [1ec4 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ec5 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1ec6 05-20 18:20:51.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c90 principal matched by identity 0 +peer1.org1.example.com | [1ec7 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1ec8 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1ec9 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1eca 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c90 gate 1589998851917885400 evaluation succeeds +peer1.org1.example.com | [1ecb 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ecc 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ecd 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ece 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ecf 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1ed0 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1ed1 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ed2 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ed3 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ed4 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ed5 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ed6 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ed7 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ed8 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ed9 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a6580 gate 1589998851928835800 evaluation starts +peer1.org1.example.com | [1eda 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a6580 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1edb 05-20 18:20:51.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a6580 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1edc 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a6580 principal matched by identity 0 +peer1.org1.example.com | [1edd 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1ede 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0041a6580 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ee0 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a6580 gate 1589998851928835800 evaluation succeeds +peer1.org1.example.com | [1ee1 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ee2 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer0.org1.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer0.org1.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer0.org1.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e04 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e05 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e06 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e07 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e08 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e09 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e0a 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e0b 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e0c 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e0d 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e0e 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e0f 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1e10 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e11 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e12 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e13 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e14 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e15 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1e16 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e17 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e18 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e19 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e1a 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +peer0.org2.example.com | [1e7c 05-20 18:20:40.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +peer0.org2.example.com | 00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +peer0.org2.example.com | 00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +peer0.org2.example.com | 00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +peer0.org2.example.com | 00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU 0xc00467a570 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e7e 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467a570 gate 1589998840907347100 evaluation succeeds +peer0.org2.example.com | [1e7f 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e80 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e81 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e82 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e83 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e84 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e85 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1e86 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer0.org2.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer0.org2.example.com | [1e87 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer0.org2.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer0.org2.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer0.org2.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e89 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e8a 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e8b 05-20 18:20:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e8c 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e8d 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e8e 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1e8f 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e90 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e91 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e92 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e93 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1e94 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +peer0.org2.example.com | 00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +peer0.org2.example.com | [1e95 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +peer0.org2.example.com | 00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +peer0.org2.example.com | 00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +peer0.org2.example.com | 00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1e97 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 0c 82 c0 f0 ee 80 35 0d 72 73 |0E.!........5.rs| +peer0.org2.example.com | 00000010 a9 de 3d 2b 8b 39 ea 99 5f 1a cd 7b da c0 b4 12 |..=+.9.._..{....| +peer0.org2.example.com | 00000020 64 dc 15 1f 9f 02 20 51 45 6a 89 54 63 b5 f5 6f |d..... QEj.Tc..o| +peer0.org2.example.com | 00000030 b2 33 53 8d a7 e7 8f 02 c1 1f ab 6b 66 e0 dd 51 |.3S........kf..Q| +peer0.org2.example.com | 00000040 af 1f b2 79 f9 8e 86 |...y...| +peer0.org2.example.com | [1e98 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1e99 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1e9a 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ee3 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ee4 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ee5 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1ee6 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1ee7 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ee8 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ee9 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [1eea 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [1eeb 05-20 18:20:51.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [1eec 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [1eed 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eee 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eef 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ef0 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ef1 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ef2 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ef3 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ef4 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ef5 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bedf0 gate 1589998851943828000 evaluation starts +peer1.org1.example.com | [1ef6 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bedf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ef7 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bedf0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1ef8 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bedf0 principal matched by identity 0 +peer1.org1.example.com | [1ef9 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [1efa 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [1efb 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bedf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1efc 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bedf0 gate 1589998851943828000 evaluation succeeds +peer1.org1.example.com | [1efd 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1efe 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1eff 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f00 05-20 18:20:51.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f01 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f02 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f03 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f04 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f05 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f06 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f07 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f08 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f09 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bfff0 gate 1589998851953410400 evaluation starts +peer1.org1.example.com | [1f0a 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bfff0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f0b 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bfff0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1f0c 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bfff0 principal matched by identity 0 +peer1.org1.example.com | [1f0d 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [1f0e 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0041bfff0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f10 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bfff0 gate 1589998851953410400 evaluation succeeds +peer1.org1.example.com | [1f11 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f12 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f13 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f14 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e9b 05-20 18:20:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e9c 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e9d 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e9e 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e9f 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1ea0 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ea1 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ea2 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ea3 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ea4 05-20 18:20:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ea5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ea6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ea7 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697420 gate 1589998841053697000 evaluation starts +peer0.org2.example.com | [1ea8 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ea9 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697420 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1eaa 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1eab 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697420 principal evaluation fails +peer0.org2.example.com | [1eac 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697420 gate 1589998841053697000 evaluation fails +peer0.org2.example.com | [1ead 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1eae 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1eaf 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1eb0 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697990 gate 1589998841054055700 evaluation starts +peer0.org2.example.com | [1eb1 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697990 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1eb2 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697990 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1eb3 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697990 principal matched by identity 0 +peer0.org2.example.com | [1eb4 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +peer0.org2.example.com | 00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +peer0.org2.example.com | [1eb5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +peer0.org2.example.com | 00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +peer0.org2.example.com | 00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +peer0.org2.example.com | 00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +peer0.org2.example.com | 00000040 11 9d 80 32 33 39 28 |...239(| +peer0.org2.example.com | [1eb6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697990 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1eb7 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004697990 gate 1589998841054055700 evaluation succeeds +peer0.org2.example.com | [1eb8 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1e1b 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e1c 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e1d 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 gate 1589998841181692500 evaluation starts +peer0.org1.example.com | [1e1e 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e1f 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1e20 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 principal matched by identity 0 +peer0.org1.example.com | [1e21 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c e5 cb 16 bd 61 d4 9b e5 2a 86 90 6a 45 97 1e |.....a...*..jE..| +peer0.org1.example.com | 00000010 05 a2 7b af 51 95 55 4f bc d1 f1 36 ac f2 d2 d8 |..{.Q.UO...6....| +peer0.org1.example.com | [1e22 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d7 a5 c5 56 75 be 07 90 2c 38 |0E.!.....Vu...,8| +peer0.org1.example.com | 00000010 a1 91 ac 5e 14 93 6a b3 65 05 56 1d 81 c9 19 e3 |...^..j.e.V.....| +peer0.org1.example.com | 00000020 8a 92 6b 71 8a 02 20 6e 59 61 20 d6 93 0a 55 7c |..kq.. nYa ...U|| +peer0.org1.example.com | 00000030 38 62 e8 a8 81 23 9a 30 1e 10 31 70 24 ca 52 91 |8b...#.0..1p$.R.| +peer0.org1.example.com | 00000040 e0 ac 9f 07 6e 10 21 |....n.!| +peer0.org1.example.com | [1e23 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e24 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 gate 1589998841181692500 evaluation succeeds +peer0.org1.example.com | [1e25 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e26 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e27 05-20 18:20:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e28 05-20 18:20:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e29 05-20 18:20:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e2a 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1e2b 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1e2c 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1e2d 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1e2e 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e2f 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e30 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e31 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1e32 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e33 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e34 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e35 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1e36 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e37 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e38 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > +peer0.org1.example.com | [1e39 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f24 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ba80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1f25 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ba80 principal matched by identity 0 +peer1.org2.example.com | [1f26 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer1.org2.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer1.org2.example.com | [1f27 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer1.org2.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer1.org2.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer1.org2.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer1.org2.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer1.org2.example.com | [1f28 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ba80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1f29 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ba80 gate 1589998845217265200 evaluation succeeds +peer1.org2.example.com | [1f2a 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f2b 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f2c 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1f2d 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f2e 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f2f 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f30 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1f31 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer1.org2.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer1.org2.example.com | [1f32 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer1.org2.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer1.org2.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer1.org2.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer1.org2.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer1.org2.example.com | [1f33 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f34 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f35 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1f36 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer1.org2.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer1.org2.example.com | [1f37 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer1.org2.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer1.org2.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer1.org2.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer1.org2.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer1.org2.example.com | [1f38 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f39 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f3a 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f3b 05-20 18:20:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f3c 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [1f3d 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [1f3e 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f3f 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB38816100A1801 +peer1.org2.example.com | [1f40 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1AA84A4EAB068D31A2C3812F2BCB1CD1B7A62D0A405E54DBA3444AE83372E0FF +peer1.org2.example.com | [1f41 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [1f42 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f43 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f44 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f45 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f46 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1f47 05-20 18:20:46.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f48 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f49 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e3a 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e3b 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e3c 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e3d 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1e3e 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 6f 7f 35 85 7a 0f bd 66 24 3d 1f 5e e1 bb 98 |.o.5.z..f$=.^...| +peer0.org1.example.com | 00000010 bc 51 8f 42 ab f4 c7 8c f0 f9 54 ec 7c 00 e3 0e |.Q.B......T.|...| +peer0.org1.example.com | [1e3f 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 2b 05 f5 27 8c 2b 74 2a 45 8b 68 |0D. 2+..'.+t*E.h| +peer0.org1.example.com | 00000010 b3 e5 3c 2e 12 ee 1d d1 70 18 5d e4 bd 87 7f 3c |..<.....p.]....<| +peer0.org1.example.com | 00000020 22 6f 54 93 02 20 6d 9b 96 2c dd 2c 93 e1 43 a9 |"oT.. m..,.,..C.| +peer0.org1.example.com | 00000030 02 8d 2d 00 95 1f 87 67 52 fc f8 94 1b 4a 97 8a |..-....gR....J..| +peer0.org1.example.com | 00000040 e6 61 09 95 52 e0 |.a..R.| +peer0.org1.example.com | [1e40 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e41 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1e42 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1e43 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1e44 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1e45 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e46 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e47 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e48 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e49 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e4a 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e4b 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1e4c 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e4e 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e4f 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e4d 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1e50 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e51 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e52 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e53 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e54 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e55 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e56 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e57 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e58 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f15 05-20 18:20:51.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f16 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f17 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f18 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f19 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f1a 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f1b 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f1c 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f1d 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1eb9 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1eba 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ebb 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ebc 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ebd 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1ebe 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1ebf 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1ec0 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1ec1 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ec2 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ec3 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ec4 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1ec5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ec6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ec7 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ec8 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1ec9 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1eca 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ecb 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ecc 05-20 18:20:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ecd 05-20 18:20:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ece 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1ecf 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ed0 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ed1 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f4a 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f4b 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f4c 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f4d 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f4e 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f4f 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f50 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f51 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f52 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f53 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f54 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f55 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f56 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f57 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f58 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f59 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f5a 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f5b 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f5c 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f5d 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1f5e 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f5f 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f60 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f61 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f62 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1f63 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f64 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1f65 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f66 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f67 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1f68 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f1e 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f1f 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f20 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f21 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f22 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1f23 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f24 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1f25 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f26 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f27 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f28 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1f29 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f2b 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f2c 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f2a 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f2d 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f2e 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f2f 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f31 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f30 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f32 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f33 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f34 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f35 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f36 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f37 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f38 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ed2 05-20 18:20:41.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ed3 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1ed4 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c e5 cb 16 bd 61 d4 9b e5 2a 86 90 6a 45 97 1e |.....a...*..jE..| +peer0.org2.example.com | 00000010 05 a2 7b af 51 95 55 4f bc d1 f1 36 ac f2 d2 d8 |..{.Q.UO...6....| +peer0.org2.example.com | [1ed5 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d7 a5 c5 56 75 be 07 90 2c 38 |0E.!.....Vu...,8| +peer0.org2.example.com | 00000010 a1 91 ac 5e 14 93 6a b3 65 05 56 1d 81 c9 19 e3 |...^..j.e.V.....| +peer0.org2.example.com | 00000020 8a 92 6b 71 8a 02 20 6e 59 61 20 d6 93 0a 55 7c |..kq.. nYa ...U|| +peer0.org2.example.com | 00000030 38 62 e8 a8 81 23 9a 30 1e 10 31 70 24 ca 52 91 |8b...#.0..1p$.R.| +peer0.org2.example.com | 00000040 e0 ac 9f 07 6e 10 21 |....n.!| +peer0.org2.example.com | [1ed6 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1ed7 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 2e 09 e5 35 16 2a 1d fa e7 fa |0E.!.....5.*....| +peer0.org2.example.com | 00000010 7c da 2b 00 8b e4 25 1d 6b a0 26 99 b0 9f d9 9b ||.+...%.k.&.....| +peer0.org2.example.com | 00000020 37 22 85 78 dc 02 20 4c e3 ac 2b f5 3c 81 d3 cf |7".x.. L..+.<...| +peer0.org2.example.com | 00000030 bb 94 0e 18 77 0d b0 8e f3 b0 fb 6f 74 71 48 ee |....w......otqH.| +peer0.org2.example.com | 00000040 20 ee 90 94 0d 40 ae | ....@.| +peer0.org2.example.com | [1ed8 05-20 18:20:41.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1ed9 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1eda 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1edb 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1edc 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1edd 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ede 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1edf 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ee0 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [1ee1 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ee2 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ee3 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1ee4 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1ee5 05-20 18:20:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ee6 05-20 18:20:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ee7 05-20 18:20:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [1ee8 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 29 68 48 70 a3 9b bc 8f 34 9c 7d 77 e7 de 06 |$)hHp....4.}w...| +peer0.org2.example.com | 00000010 a7 12 42 33 b4 ec 8d 64 51 6a 77 86 9e 2d 6c 31 |..B3...dQjw..-l1| +peer0.org2.example.com | [1ee9 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 8d e1 52 9d 30 bb e9 80 f6 42 |0E.!....R.0....B| +peer0.org2.example.com | 00000010 e3 03 b0 99 5f 6f a5 69 1d 89 91 d9 c5 aa 79 fd |...._o.i......y.| +peer0.org2.example.com | 00000020 8a f4 dc 40 8a 02 20 05 fb 82 70 84 ba f4 c7 54 |...@.. ...p....T| +peer0.org2.example.com | 00000030 64 79 96 4d c0 a0 87 d3 6d 67 3e 09 b3 ef 37 f6 |dy.M....mg>...7.| +peer0.org2.example.com | 00000040 2c 81 38 d0 ed b2 c2 |,.8....| +peer0.org2.example.com | [1eea 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1eec 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1eeb 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1eed 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [1eee 05-20 18:20:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1eef 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [1ef0 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1ef1 05-20 18:20:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [1ef2 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1ef3 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ef4 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1ef5 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1ef6 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ef7 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ef8 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ef9 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1efa 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1efb 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1efc 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1efd 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb260 gate 1589998843381196800 evaluation starts +peer0.org2.example.com | [1efe 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb260 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1eff 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb260 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1f00 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1e59 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e5a 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e5b 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e5c 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e5d 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e5e 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1e5f 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e60 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e61 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e63 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e62 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e64 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e65 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e66 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e67 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e68 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e69 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e6a 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e6b 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e6d 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e6e 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e6f 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e70 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e71 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e72 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 gate 1589998843619209500 evaluation starts +peer0.org1.example.com | [1e6c 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e73 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e74 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1e75 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 principal matched by identity 0 +peer0.org1.example.com | [1e76 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1e77 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1f6a 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652c10 gate 1589998848387914200 evaluation starts +peer1.org2.example.com | [1f6b 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652c10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f6c 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652c10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1f6d 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1f6e 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652c10 principal evaluation fails +peer1.org2.example.com | [1f6f 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652c10 gate 1589998848387914200 evaluation fails +peer1.org2.example.com | [1f70 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f71 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f72 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1f73 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004653180 gate 1589998848390496100 evaluation starts +peer1.org2.example.com | [1f74 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004653180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f75 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004653180 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1f76 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004653180 principal matched by identity 0 +peer1.org2.example.com | [1f77 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 bc 7d fa e6 d7 bc 86 20 f3 4a 80 d3 37 ed 33 |..}..... .J..7.3| +peer1.org2.example.com | 00000010 10 30 2f b8 1e b7 24 c5 62 79 d1 9e b8 b8 50 ac |.0/...$.by....P.| +peer1.org2.example.com | [1f78 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 56 eb 8c f1 e0 38 a8 e4 33 8f |0E.!..V....8..3.| +peer1.org2.example.com | 00000010 24 ab 01 5a ba 89 fb 31 da d7 71 f9 14 af 83 40 |$..Z...1..q....@| +peer1.org2.example.com | 00000020 7f d3 b8 c0 26 02 20 25 a0 64 d9 c9 29 20 9a 76 |....&. %.d..) .v| +peer1.org2.example.com | 00000030 06 b6 7b 30 31 47 1e ff 51 b1 3c 2d 90 61 ec f5 |..{01G..Q.<-.a..| +peer1.org2.example.com | 00000040 ad 76 0b 27 f5 52 ce |.v.'.R.| +peer1.org2.example.com | [1f79 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004653180 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1f7a 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004653180 gate 1589998848390496100 evaluation succeeds +peer1.org2.example.com | [1f7b 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f7c 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f7d 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1f7e 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f7f 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f80 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f81 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1f82 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1f83 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1f84 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1f85 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f86 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f87 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f88 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f8a 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f89 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f8b 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f8c 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f8d 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f8e 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f8f 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f90 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f91 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f92 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f93 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f94 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f95 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f96 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1f97 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f98 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f99 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1f9a 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f9b 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f9c 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f9d 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f9e 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f9f 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fa0 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1fa1 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fa2 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fa3 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fa4 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fa5 05-20 18:20:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fa6 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fa7 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fa8 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fa9 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1faa 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fab 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fac 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1fad 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1fae 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1faf 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466f940 gate 1589998848451205100 evaluation starts +peer1.org2.example.com | [1fb0 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466f940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fb1 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466f940 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1fb2 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466f940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1fb3 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466f940 principal evaluation fails +peer1.org2.example.com | [1fb4 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466f940 gate 1589998848451205100 evaluation fails +peer1.org2.example.com | [1fb5 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fb6 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fb7 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1fb8 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466feb0 gate 1589998848452413900 evaluation starts +peer1.org2.example.com | [1fb9 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466feb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fba 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466feb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1fbb 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466feb0 principal matched by identity 0 +peer1.org2.example.com | [1fbc 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [1fbd 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [1fbe 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466feb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1fbf 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466feb0 gate 1589998848452413900 evaluation succeeds +peer1.org2.example.com | [1fc0 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fc1 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fc2 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1fc3 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1fc4 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f39 05-20 18:20:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f3a 05-20 18:20:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f3b 05-20 18:20:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1f3c 05-20 18:20:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f3d 05-20 18:20:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f3e 05-20 18:20:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f3f 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f40 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f41 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f42 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f43 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f44 05-20 18:20:52.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f45 05-20 18:20:52.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816102A +peer1.org1.example.com | [1f46 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A2C6A43DCE1A10F288F6AB618F7D1201EBFDE1E3AF6C6AF9DE6EFB9DA51280BF +peer1.org1.example.com | [1f47 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f48 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1f49 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1f4a 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f4b 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f4c 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f4e 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f4f 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f4d 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f50 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f51 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f52 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f53 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f54 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f55 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f56 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f57 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org1.example.com | [1e78 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e79 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 gate 1589998843619209500 evaluation succeeds +peer0.org1.example.com | [1e7a 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e7b 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e7c 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e7d 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e7e 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1e7f 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1e80 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1e81 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1e82 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e83 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e84 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e85 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e86 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e87 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e88 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e89 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e8a 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 gate 1589998843628189600 evaluation starts +peer0.org1.example.com | [1e8b 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e8c 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1e8d 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 principal matched by identity 0 +peer0.org1.example.com | [1e8e 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1e8f 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1e90 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e91 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 gate 1589998843628189600 evaluation succeeds +peer0.org1.example.com | [1e92 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e93 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e94 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e95 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e96 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e97 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e98 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1e99 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1e9a 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1e9b 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1e9c 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e9d 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fc5 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fc6 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1fc7 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fc8 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fc9 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f01 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb260 principal evaluation fails +peer0.org2.example.com | [1f02 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb260 gate 1589998843381196800 evaluation fails +peer0.org2.example.com | [1f03 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f04 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f05 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1f06 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb7d0 gate 1589998843381816000 evaluation starts +peer0.org2.example.com | [1f07 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb7d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f08 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb7d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1f09 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb7d0 principal matched by identity 0 +peer0.org2.example.com | [1f0a 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 6f 7f 35 85 7a 0f bd 66 24 3d 1f 5e e1 bb 98 |.o.5.z..f$=.^...| +peer0.org2.example.com | 00000010 bc 51 8f 42 ab f4 c7 8c f0 f9 54 ec 7c 00 e3 0e |.Q.B......T.|...| +peer0.org2.example.com | [1f0b 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 2b 05 f5 27 8c 2b 74 2a 45 8b 68 |0D. 2+..'.+t*E.h| +peer0.org2.example.com | 00000010 b3 e5 3c 2e 12 ee 1d d1 70 18 5d e4 bd 87 7f 3c |..<.....p.]....<| +peer0.org2.example.com | 00000020 22 6f 54 93 02 20 6d 9b 96 2c dd 2c 93 e1 43 a9 |"oT.. m..,.,..C.| +peer0.org2.example.com | 00000030 02 8d 2d 00 95 1f 87 67 52 fc f8 94 1b 4a 97 8a |..-....gR....J..| +peer0.org2.example.com | 00000040 e6 61 09 95 52 e0 |.a..R.| +peer0.org2.example.com | [1f0c 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb7d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f58 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1f59 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer1.org1.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer1.org1.example.com | [1f5a 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer1.org1.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer1.org1.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer1.org1.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer1.org1.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer1.org1.example.com | [1f5b 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1f5c 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c a2 01 ff ed 1d 4b e4 d6 a9 74 34 |0D. <.....K...t4| +peer1.org1.example.com | 00000010 36 97 c9 0b 7d 18 f8 af cc 02 46 16 11 41 b7 5d |6...}.....F..A.]| +peer1.org1.example.com | 00000020 de fa fe 28 02 20 7c 5a 69 f4 0f a9 f8 21 7c cd |...(. |Zi....!|.| +peer1.org1.example.com | 00000030 be 28 16 f8 1b 81 76 4a ac ac 62 14 a1 7c 72 99 |.(....vJ..b..|r.| +peer1.org1.example.com | 00000040 d4 43 f6 67 c6 d4 |.C.g..| +peer1.org1.example.com | [1f5d 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1f5e 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1f5f 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f60 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f61 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f62 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f63 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f64 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f65 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1f66 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer1.org1.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer1.org1.example.com | [1f67 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer1.org1.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer1.org1.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer1.org1.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer1.org1.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer1.org1.example.com | [1f68 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f69 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f6a 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1f6b 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer1.org1.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer1.org1.example.com | [1f6c 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer1.org1.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer1.org1.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer1.org1.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer1.org1.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer1.org1.example.com | [1f6d 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f6e 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f6f 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f70 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1f71 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e9e 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e9f 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ea0 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ea1 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ea2 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ea3 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ea4 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 gate 1589998843647657800 evaluation starts +peer0.org1.example.com | [1ea5 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ea6 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1ea7 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 principal matched by identity 0 +peer0.org1.example.com | [1ea8 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1ea9 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0040c73a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1eab 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 gate 1589998843647657800 evaluation succeeds +peer0.org1.example.com | [1eac 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ead 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1eae 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1eaf 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1eb0 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1eb1 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fca 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1fcb 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1fcc 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d0b0 gate 1589998848457962900 evaluation starts +peer1.org2.example.com | [1fcd 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d0b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fce 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d0b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1fcf 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1fd0 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d0b0 principal evaluation fails +peer1.org2.example.com | [1fd1 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d0b0 gate 1589998848457962900 evaluation fails +peer1.org2.example.com | [1fd2 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fd3 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fd4 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1fd5 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d620 gate 1589998848459193400 evaluation starts +peer1.org2.example.com | [1fd6 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fd7 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d620 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1fd8 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d620 principal matched by identity 0 +peer1.org2.example.com | [1fd9 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [1fda 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [1fdb 05-20 18:20:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d620 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1fdc 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469d620 gate 1589998848459193400 evaluation succeeds +peer1.org2.example.com | [1fdd 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fde 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fdf 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1fe0 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1fe1 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fe2 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fe3 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [1fe4 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [1fe6 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [1fe7 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fe8 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fe9 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fea 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1feb 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fec 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1eb2 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1eb3 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1eb4 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1eb5 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1eb6 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1eb7 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1eb8 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 gate 1589998843655596600 evaluation starts +peer0.org1.example.com | [1eb9 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1eba 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1ebb 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 principal matched by identity 0 +peer0.org1.example.com | [1ebc 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1ebd 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1ebe 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ebf 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 gate 1589998843655596600 evaluation succeeds +peer0.org1.example.com | [1ec0 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ec1 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ec2 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ec3 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ec4 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ec5 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ec6 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec7 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec8 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f0d 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb7d0 gate 1589998843381816000 evaluation succeeds +peer0.org2.example.com | [1f0e 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f0f 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f10 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f11 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f12 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f13 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1f14 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1f15 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1f16 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1f17 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f18 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f19 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f1a 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f1b 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f1c 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f1d 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f1e 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f1f 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f20 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1f21 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f22 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f23 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1f24 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f25 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f26 05-20 18:20:43.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f27 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f28 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f29 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f2a 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f2b 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f2c 05-20 18:20:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f2e 05-20 18:20:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f2f 05-20 18:20:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f2d 05-20 18:20:43.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f30 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f31 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f32 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f33 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f34 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fed 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1fee 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fef 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ff0 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ff1 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ff2 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ff3 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675d40 gate 1589998848468741400 evaluation starts +peer1.org2.example.com | [1ff4 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675d40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ff5 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675d40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1ff6 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1ff7 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675d40 principal evaluation fails +peer1.org2.example.com | [1ff8 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004675d40 gate 1589998848468741400 evaluation fails +peer1.org2.example.com | [1ff9 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ffa 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ffb 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ffc 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d82b0 gate 1589998848473904400 evaluation starts +peer1.org2.example.com | [1ffd 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d82b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ffe 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d82b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [1fff 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d82b0 principal matched by identity 0 +peer1.org2.example.com | [2000 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2001 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2002 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d82b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2003 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d82b0 gate 1589998848473904400 evaluation succeeds +peer1.org2.example.com | [2004 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2005 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2006 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2007 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2008 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2009 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec9 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1eca 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ecb 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ecc 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ecd 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ece 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ecf 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 gate 1589998843668321200 evaluation starts +peer0.org1.example.com | [1ed0 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ed1 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1ed2 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 principal matched by identity 0 +peer0.org1.example.com | [1ed3 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [1ed4 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [1ed5 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ed6 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 gate 1589998843668321200 evaluation succeeds +peer0.org1.example.com | [1ed7 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ed8 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ed9 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1eda 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1edb 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [1edc 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [1edd 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ede 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1edf 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ee0 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ee1 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ee2 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ee3 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ee4 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ee5 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 gate 1589998843674012000 evaluation starts +peer0.org1.example.com | [1ee6 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [200a 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [200b 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [200c 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [200d 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [200e 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [200f 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2010 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d94b0 gate 1589998848482035200 evaluation starts +peer1.org2.example.com | [2011 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d94b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2012 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d94b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2013 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d94b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2014 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d94b0 principal evaluation fails +peer1.org2.example.com | [2015 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d94b0 gate 1589998848482035200 evaluation fails +peer1.org2.example.com | [2016 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2017 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2018 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2019 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 gate 1589998848483855100 evaluation starts +peer1.org2.example.com | [201a 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [201b 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [201c 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 principal matched by identity 0 +peer1.org2.example.com | [201d 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [201e 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [201f 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2020 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 gate 1589998848483855100 evaluation succeeds +peer1.org2.example.com | [2021 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2022 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2023 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2024 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2025 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2026 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2027 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2028 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [202a 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [202b 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [202c 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [202e 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f35 05-20 18:20:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1f36 05-20 18:20:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161023 +peer0.org2.example.com | [1f37 05-20 18:20:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0BFAD0070E9DE6C49A2B8F44CB404E3E893FECCE57795545BC3973A38CBAECEB +peer0.org2.example.com | [1f38 05-20 18:20:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1f39 05-20 18:20:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1f3a 05-20 18:20:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1f3b 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1f3c 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f3d 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f3e 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f3f 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1f40 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f41 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f42 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f43 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1f44 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1f45 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f46 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f47 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f48 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f49 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f4a 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f4b 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f4c 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f4d 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f4e 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f4f 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f50 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f51 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1f52 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 b0 5c c2 e3 83 1e 58 ad 3c a4 47 df 79 56 0a |..\....X.<.G.yV.| +peer0.org2.example.com | 00000010 6a cb e2 89 a5 79 3d 0c 4d 6e 08 a0 3a 8b 8f 01 |j....y=.Mn..:...| +peer0.org2.example.com | [1f53 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e d9 ae d2 ca ac 52 8f 5c fa e0 66 |0D. ~.....R.\..f| +peer0.org2.example.com | 00000010 64 8f 5a 79 19 cb bb 16 e0 72 db cc 26 01 9b 2a |d.Zy.....r..&..*| +peer0.org2.example.com | 00000020 8d 11 d5 a3 02 20 5d be 9b 01 2a ce a8 9e 05 5e |..... ]...*....^| +peer0.org2.example.com | 00000030 23 6f b0 b2 99 59 67 ba df c9 f5 3e 4d 19 4e db |#o...Yg....>M.N.| +peer0.org2.example.com | 00000040 a2 ca 5e 89 4f 84 |..^.O.| +peer0.org2.example.com | [1f54 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f55 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1f56 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ee7 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1ee8 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 principal matched by identity 0 +peer0.org1.example.com | [1ee9 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [1eea 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0041052e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1eec 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 gate 1589998843674012000 evaluation succeeds +peer0.org1.example.com | [1eed 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1eee 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1eef 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ef0 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ef1 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [1ef2 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [1ef3 05-20 18:20:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ef4 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ef5 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ef6 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ef7 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ef8 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1ef9 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1efa 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [202f 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2030 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2031 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2032 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2033 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2034 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2035 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710290 gate 1589998848485893200 evaluation starts +peer1.org2.example.com | [2036 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710290 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2037 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710290 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2038 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2039 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710290 principal evaluation fails +peer1.org2.example.com | [203a 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710290 gate 1589998848485893200 evaluation fails +peer1.org2.example.com | [203b 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [203c 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [203d 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [203e 05-20 18:20:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710800 gate 1589998848486138900 evaluation starts +peer1.org2.example.com | [203f 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710800 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2040 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710800 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2041 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710800 principal matched by identity 0 +peer1.org2.example.com | [2042 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2043 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2044 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710800 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2045 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004710800 gate 1589998848486138900 evaluation succeeds +peer1.org2.example.com | [2046 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2047 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2048 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2049 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [204a 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [204b 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f57 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1f58 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1f59 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f5a 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f5b 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f5c 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f5d 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f5e 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f5f 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1f60 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f61 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1f62 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f63 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f64 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f65 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f66 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f67 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f68 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f69 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f6a 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f6b 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f6c 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f6d 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f6e 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f6f 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f70 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f71 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1f72 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f73 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f74 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f75 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f76 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f77 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f78 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1f79 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774090 gate 1589998844018255900 evaluation starts +peer0.org2.example.com | [1f7a 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f7b 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774090 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1f7c 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1f7d 05-20 18:20:44.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774090 principal evaluation fails +peer0.org2.example.com | [1f7e 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774090 gate 1589998844018255900 evaluation fails +peer0.org2.example.com | [1f7f 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f80 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f81 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1f82 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774600 gate 1589998844021838300 evaluation starts +peer0.org2.example.com | [1f83 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f84 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774600 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1f85 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774600 principal matched by identity 0 +peer0.org2.example.com | [1f86 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 0e 94 40 b7 11 bf fc 4b b9 ed 83 41 dd c0 ad |...@....K...A...| +peer0.org2.example.com | 00000010 48 68 a0 ee b2 c5 52 cb f2 7d b6 f7 bc 1c 5c 12 |Hh....R..}....\.| +peer0.org2.example.com | [1f87 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 bf e1 e6 27 ae c7 e2 4c 53 1b |0E.!.....'...LS.| +peer0.org2.example.com | 00000010 92 37 51 73 19 64 65 6e 68 3a ee d9 8a c6 d2 5f |.7Qs.denh:....._| +peer0.org2.example.com | 00000020 88 d7 35 90 4f 02 20 58 ca 4b d0 94 be c9 50 98 |..5.O. X.K....P.| +peer0.org2.example.com | 00000030 ff b6 f9 c0 ef 0d 3f 0e 6d df 70 e6 1c d1 6b f0 |......?.m.p...k.| +peer0.org2.example.com | 00000040 ad 76 8d 01 b2 1c b1 |.v.....| +peer0.org2.example.com | [1f88 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f89 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004774600 gate 1589998844021838300 evaluation succeeds +peer0.org2.example.com | [1f8a 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f8b 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f8c 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f8d 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f8e 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f8f 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1f90 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1f91 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1f92 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1f93 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f94 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f95 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f96 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f97 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f98 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f99 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f9a 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f9b 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f9c 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1f9d 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f9e 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f72 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f73 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f74 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f75 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f76 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f77 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f78 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424cd80 gate 1589998852679381200 evaluation starts +peer1.org1.example.com | [1f79 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424cd80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f7a 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424cd80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1f7b 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424cd80 principal matched by identity 0 +peer1.org1.example.com | [1f7c 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer1.org1.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer1.org1.example.com | [1f7d 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer1.org1.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer1.org1.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer1.org1.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer1.org1.example.com | 00000040 89 09 92 92 88 98 |......| +peer1.org1.example.com | [1f7e 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424cd80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f7f 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f80 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424cd80 gate 1589998852679381200 evaluation succeeds +peer1.org1.example.com | [1f81 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f82 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f83 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f84 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f85 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f86 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f87 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f88 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f89 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f8a 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1f8b 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [204c 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [204d 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [204e 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [204f 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2050 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2051 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2052 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711a00 gate 1589998848498972300 evaluation starts +peer1.org2.example.com | [2053 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711a00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2054 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711a00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2055 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2056 05-20 18:20:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711a00 principal evaluation fails +peer1.org2.example.com | [2057 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711a00 gate 1589998848498972300 evaluation fails +peer1.org2.example.com | [2058 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2059 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [205a 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [205b 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711f70 gate 1589998848501302100 evaluation starts +peer1.org2.example.com | [205c 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711f70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [205d 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711f70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [205e 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711f70 principal matched by identity 0 +peer1.org2.example.com | [205f 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2060 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [2061 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711f70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2062 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004711f70 gate 1589998848501302100 evaluation succeeds +peer1.org2.example.com | [2063 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2064 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2065 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2066 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2067 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2068 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2069 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [206a 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [206b 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [206c 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [206d 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [206e 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [206f 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2070 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2071 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f9f 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1fa0 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fa1 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa2 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fa3 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa4 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fa5 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa6 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fa7 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa8 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fa9 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1faa 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fab 05-20 18:20:44.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fac 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fad 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fae 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1faf 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fb1 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fb2 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fb3 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fb0 05-20 18:20:44.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fb4 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fb5 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fb6 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fb7 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fb8 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f8c 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f8d 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f8e 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f8f 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f91 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f92 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f93 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004262240 gate 1589998852683046600 evaluation starts +peer1.org1.example.com | [1f94 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004262240 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f95 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004262240 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1f96 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004262240 principal matched by identity 0 +peer1.org1.example.com | [1f97 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer1.org1.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer1.org1.example.com | [1f98 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer1.org1.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer1.org1.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer1.org1.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer1.org1.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer1.org1.example.com | [1f90 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f99 05-20 18:20:52.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004262240 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f9a 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004262240 gate 1589998852683046600 evaluation succeeds +peer1.org1.example.com | [1f9b 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f9c 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f9d 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f9e 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f9f 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fa0 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fa1 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1fa2 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer1.org1.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer1.org1.example.com | [1fa3 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer1.org1.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer1.org1.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer1.org1.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer1.org1.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer1.org1.example.com | [1fa4 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fa5 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fa6 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fa7 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1fa8 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer1.org1.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer1.org1.example.com | [1fa9 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer1.org1.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer1.org1.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer1.org1.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer1.org1.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer1.org1.example.com | [1faa 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fab 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fac 05-20 18:20:52.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fad 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fae 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1efb 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1efc 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1efd 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1efe 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1eff 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f00 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 gate 1589998843706288600 evaluation starts +peer0.org1.example.com | [1f01 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f02 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1f03 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 principal matched by identity 0 +peer0.org1.example.com | [1f04 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b fa d0 07 0e 9d e6 c4 9a 2b 8f 44 cb 40 4e 3e |.........+.D.@N>| +peer0.org1.example.com | 00000010 89 3f ec ce 57 79 55 45 bc 39 73 a3 8c ba ec eb |.?..WyUE.9s.....| +peer0.org1.example.com | [1f05 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 98 59 7a fe 80 99 02 b5 64 69 |0E.!...Yz.....di| +peer0.org1.example.com | 00000010 e5 30 cc 6c 6a 13 a3 6e b6 c3 64 bf 0b 6f 3c e5 |.0.lj..n..d..o<.| +peer0.org1.example.com | 00000020 43 20 ed b0 16 02 20 46 4e 6e d7 3e c2 a8 1a aa |C .... FNn.>....| +peer0.org1.example.com | 00000030 8f 0c b5 b3 1f ef 86 34 16 54 51 c7 b3 a2 0e 28 |.......4.TQ....(| +peer0.org1.example.com | 00000040 5a a1 de a2 fa 8b 03 |Z......| +peer0.org1.example.com | [1f06 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f07 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 gate 1589998843706288600 evaluation succeeds +peer0.org1.example.com | [1f08 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f09 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f0a 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f0b 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f0c 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f0d 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1f0e 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1f0f 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1f10 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f11 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1f12 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f13 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f14 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f15 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f16 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f17 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f18 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f19 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f1a 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f1b 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f1c 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f1d 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f1e 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f1f 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f20 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1f21 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f22 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1faf 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fb0 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fb1 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fb2 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fb3 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fb4 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fb5 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fb6 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1fb7 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fb8 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fb9 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fba 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1fbb 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fbc 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fbd 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fbe 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fbf 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fc0 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1fc1 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fc2 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1fc3 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fc4 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fc5 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1fc6 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1fc7 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1fc8 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421fd00 gate 1589998852901100800 evaluation starts +peer1.org2.example.com | [2072 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2073 05-20 18:20:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2074 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2075 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2076 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2077 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2078 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2079 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [207a 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [207b 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [207c 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [207d 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [207e 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [207f 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e270 gate 1589998848646217100 evaluation starts +peer1.org2.example.com | [2080 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e270 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2081 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e270 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2082 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2083 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e270 principal evaluation fails +peer1.org2.example.com | [2084 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e270 gate 1589998848646217100 evaluation fails +peer1.org2.example.com | [2085 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2086 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2087 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2088 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e7e0 gate 1589998848646493400 evaluation starts +peer1.org2.example.com | [2089 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e7e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [208a 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e7e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [208b 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e7e0 principal matched by identity 0 +peer1.org2.example.com | [208c 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer1.org2.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer1.org2.example.com | [208d 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer1.org2.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer1.org2.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer1.org2.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer0.org1.example.com | [1f23 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f24 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1f25 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f26 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f27 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f28 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f29 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f2a 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f2b 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f2c 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f2d 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f2e 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1f2f 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f30 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f31 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f32 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f33 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f34 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f35 05-20 18:20:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f36 05-20 18:20:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f37 05-20 18:20:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f38 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f39 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f3a 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f3b 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f3c 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f3d 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f3e 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f3f 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f40 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f41 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1f42 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fc9 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421fd00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1fca 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421fd00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [1fcb 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421fd00 principal matched by identity 0 +peer1.org1.example.com | [1fcc 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer1.org1.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer1.org1.example.com | [1fcd 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer1.org1.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer1.org1.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer1.org1.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer1.org1.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer1.org1.example.com | [1fce 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421fd00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1fcf 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421fd00 gate 1589998852901100800 evaluation succeeds +peer1.org1.example.com | [1fd0 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fd1 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fd2 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1fd3 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1fd4 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fd5 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1fd6 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1fd7 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1fd8 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1fd9 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fda 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fdb 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fdc 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1fdd 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fde 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fdf 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe0 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1fe1 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > alive: alive: alive: +peer1.org1.example.com | [1fe2 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fe3 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fe4 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O`\323k\274\257\002 \\\322G<#\314\005\316\327V|\010\226u\347\253]a\260\373\205\031\270\371z\224\031\0105\016\207\n" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fe5 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fb9 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1fba 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1fbb 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1fbc 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1fbd 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1fbe 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1fbf 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f0a0 gate 1589998844155527100 evaluation starts +peer0.org2.example.com | [1fc0 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f0a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1fc1 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f0a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1fc2 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1fc3 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f0a0 principal evaluation fails +peer0.org2.example.com | [1fc4 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f0a0 gate 1589998844155527100 evaluation fails +peer0.org2.example.com | [1fc5 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1fc6 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1fc7 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1fc8 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f610 gate 1589998844156164900 evaluation starts +peer0.org2.example.com | [1fc9 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1fca 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f610 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1fcb 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f610 principal matched by identity 0 +peer0.org2.example.com | [1fcc 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [1fcd 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [1fce 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f610 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1fcf 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478f610 gate 1589998844156164900 evaluation succeeds +peer0.org2.example.com | [1fd0 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1fd1 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1fd2 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1fd3 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1fd4 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fd5 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fd6 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1fd7 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1fd8 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1fd9 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1fda 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1fdb 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1fdc 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6810 gate 1589998844158610700 evaluation starts +peer0.org2.example.com | [1fdd 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1fde 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6810 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1fdf 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1fe0 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6810 principal evaluation fails +peer0.org2.example.com | [1fe1 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6810 gate 1589998844158610700 evaluation fails +peer0.org2.example.com | [1fe2 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1fe3 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1fe4 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1fe5 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6d80 gate 1589998844162258400 evaluation starts +peer0.org2.example.com | [1fe6 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6d80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1fe7 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6d80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [1fe8 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6d80 principal matched by identity 0 +peer0.org2.example.com | [1fe9 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [1fea 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [1feb 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6d80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1fec 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b6d80 gate 1589998844162258400 evaluation succeeds +peer0.org2.example.com | [1fed 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1fee 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1fef 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ff0 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ff1 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [1ff2 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [1ff4 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [1ff5 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ff6 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ff7 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ff8 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ff9 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ffa 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ffb 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ffc 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ffd 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ffe 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1fff 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2000 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dafb0 gate 1589998844168363100 evaluation starts +peer0.org2.example.com | [2001 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dafb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2002 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dafb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2003 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dafb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2004 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dafb0 principal evaluation fails +peer0.org2.example.com | [2005 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dafb0 gate 1589998844168363100 evaluation fails +peer0.org2.example.com | [2006 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2007 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2008 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2009 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db520 gate 1589998844169334300 evaluation starts +peer0.org2.example.com | [200a 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db520 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f43 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f44 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f45 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f46 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f47 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f48 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f49 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 gate 1589998843932511000 evaluation starts +peer0.org1.example.com | [1f4a 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f4b 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1f4c 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 principal matched by identity 0 +peer0.org1.example.com | [1f4d 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 b0 5c c2 e3 83 1e 58 ad 3c a4 47 df 79 56 0a |..\....X.<.G.yV.| +peer0.org1.example.com | 00000010 6a cb e2 89 a5 79 3d 0c 4d 6e 08 a0 3a 8b 8f 01 |j....y=.Mn..:...| +peer0.org1.example.com | [1f4e 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e d9 ae d2 ca ac 52 8f 5c fa e0 66 |0D. ~.....R.\..f| +peer0.org1.example.com | 00000010 64 8f 5a 79 19 cb bb 16 e0 72 db cc 26 01 9b 2a |d.Zy.....r..&..*| +peer0.org1.example.com | 00000020 8d 11 d5 a3 02 20 5d be 9b 01 2a ce a8 9e 05 5e |..... ]...*....^| +peer0.org1.example.com | 00000030 23 6f b0 b2 99 59 67 ba df c9 f5 3e 4d 19 4e db |#o...Yg....>M.N.| +peer0.org1.example.com | 00000040 a2 ca 5e 89 4f 84 |..^.O.| +peer0.org1.example.com | [1f4f 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f50 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 gate 1589998843932511000 evaluation succeeds +peer0.org1.example.com | [1f51 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f52 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f53 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f54 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f55 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f56 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1f57 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1f58 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1f59 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1f5a 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f5b 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f5c 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f5d 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f5e 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f5f 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f60 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f61 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f62 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f63 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1f64 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f65 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fe6 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O`\323k\274\257\002 \\\322G<#\314\005\316\327V|\010\226u\347\253]a\260\373\205\031\270\371z\224\031\0105\016\207\n" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fe7 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1fe8 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +peer1.org1.example.com | 00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +peer1.org1.example.com | [1fe9 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +peer1.org1.example.com | 00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +peer1.org1.example.com | 00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +peer1.org1.example.com | 00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1feb 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 06 47 a5 e6 30 2b d3 9c e2 29 |0E.!...G..0+...)| +peer1.org1.example.com | 00000010 b8 72 db a8 dc 03 ba f4 a5 fd 7a 1f 65 ee 23 3e |.r........z.e.#>| +peer1.org1.example.com | 00000020 60 d3 6b bc af 02 20 5c d2 47 3c 23 cc 05 ce d7 |`.k... \.G<#....| +peer1.org1.example.com | 00000030 56 7c 08 96 75 e7 ab 5d 61 b0 fb 85 19 b8 f9 7a |V|..u..]a......z| +peer1.org1.example.com | 00000040 94 19 08 35 0e 87 0a |...5...| +peer1.org1.example.com | [1fec 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1fed 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1fee 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1fef 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1ff0 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1ff1 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ff2 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ff3 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ff4 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1ff5 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ff6 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ff7 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ff8 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\001\270+\303\220\002 \036\236/A\302Joc\244O`\323k\274\257\002 \\\322G<#\314\005\316\327V|\010\226u\347\253]a\260\373\205\031\270\371z\224\031\0105\016\207\n" > > alive: +peer1.org1.example.com | [1ff9 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ffa 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ffb 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ffc 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ffd 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ffe 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fff 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2000 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2001 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f66 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f67 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f68 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1f69 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f6a 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f6b 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f6c 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f6d 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f6e 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f6f 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f70 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1f71 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161022 +peer0.org1.example.com | [1f72 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 070E9440B711BFFC4BB9ED8341DDC0AD4868A0EEB2C552CBF27DB6F7BC1C5C12 +peer0.org1.example.com | [1f73 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1f74 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1f75 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1f76 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1f77 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f78 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f79 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f7a 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1f7b 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1f7c 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f7d 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1f7e 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f7f 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f82 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f80 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f83 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f81 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f84 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f85 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f86 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f87 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f88 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2002 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2003 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2004 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2005 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2006 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2007 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2008 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2009 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [200a 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [200b 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [200c 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [200d 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [200e 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [200f 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2010 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2011 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2012 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cbac0 gate 1589998853181535900 evaluation starts +peer1.org1.example.com | [2013 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cbac0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2014 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cbac0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2015 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cbac0 principal matched by identity 0 +peer1.org1.example.com | [2016 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d6 90 3e f2 aa bc 5b a6 80 fb fc 9b 45 69 7a |...>...[.....Eiz| +peer1.org1.example.com | 00000010 f7 6c ea 99 c0 59 1f 09 96 bf 9e ca 2b 1e 53 b6 |.l...Y......+.S.| +peer1.org1.example.com | [2017 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 f4 7d 30 51 9c 1a 5f 60 e6 ff |0E.!...}0Q.._`..| +peer1.org1.example.com | 00000010 52 ea cf 2e 54 fe e3 61 d3 fc f1 1c ec de dc 83 |R...T..a........| +peer1.org1.example.com | 00000020 9a e6 80 0d 8a 02 20 3e 07 57 d4 28 98 87 8e 7e |...... >.W.(...~| +peer1.org1.example.com | 00000030 64 88 3a 7a 4c dc dd 28 27 97 d6 5f bc 23 d4 64 |d.:zL..('.._.#.d| +peer1.org1.example.com | 00000040 e7 a7 61 f9 1d fe 41 |..a...A| +peer1.org1.example.com | [2018 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cbac0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2019 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cbac0 gate 1589998853181535900 evaluation succeeds +peer1.org1.example.com | [201a 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [200b 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db520 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [200c 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db520 principal matched by identity 0 +peer0.org2.example.com | [200d 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [200e 05-20 18:20:44.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [200f 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db520 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2010 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db520 gate 1589998844169334300 evaluation succeeds +peer0.org2.example.com | [2011 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2012 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2013 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2014 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2015 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2016 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2017 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2018 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2019 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [201a 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [201b 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [201c 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [201d 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4720 gate 1589998844174634300 evaluation starts +peer0.org2.example.com | [201e 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4720 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [201f 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4720 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2020 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2021 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4720 principal evaluation fails +peer0.org2.example.com | [2022 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4720 gate 1589998844174634300 evaluation fails +peer0.org2.example.com | [2023 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2024 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2025 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2026 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4c90 gate 1589998844177915900 evaluation starts +peer0.org2.example.com | [2027 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4c90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2028 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4c90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2029 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4c90 principal matched by identity 0 +peer0.org2.example.com | [202a 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [202b 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [202c 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4c90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [202d 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f4c90 gate 1589998844177915900 evaluation succeeds +peer0.org2.example.com | [202e 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [202f 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2030 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2031 05-20 18:20:44.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2032 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2033 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2034 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2035 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [2037 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2038 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2039 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [203a 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [203b 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer1.org2.example.com | [208e 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e7e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [208f 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e7e0 gate 1589998848646493400 evaluation succeeds +peer1.org2.example.com | [2090 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2091 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2092 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2093 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2094 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2095 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2096 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2097 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2098 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2099 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [209a 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [209b 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [209c 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [209d 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [209e 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [209f 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20a0 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [20a1 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:M\031N\333\242\312^\211O\204" > +peer1.org2.example.com | [20a2 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [20a3 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20a4 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20a5 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20a6 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20a7 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [20a8 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 0e dd a6 56 1e 33 8c 33 07 b2 7a 2f 48 df 21 |....V.3.3..z/H.!| +peer1.org2.example.com | 00000010 43 b0 83 26 19 b6 bd 8b a0 f4 64 a9 a2 55 3f 1d |C..&......d..U?.| +peer1.org2.example.com | [20a9 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c5 bb 02 1c 00 96 e2 f1 3a b7 21 |0D. =........:.!| +peer1.org2.example.com | 00000010 c8 f0 e1 da 60 d2 fa a9 08 03 da d6 9b 56 be 3a |....`........V.:| +peer1.org2.example.com | 00000020 44 69 b8 9f 02 20 57 d6 1b 15 c4 f9 7a 32 05 1d |Di... W.....z2..| +peer1.org2.example.com | 00000030 d4 2b e2 a9 17 9f 00 6b bd 25 70 40 e2 b3 1c e8 |.+.....k.%p@....| +peer1.org2.example.com | 00000040 47 ee 39 68 42 d1 |G.9hB.| +peer1.org2.example.com | [20aa 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20ab 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [20ac 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [20ad 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [20ae 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [20af 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20b0 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20b1 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20b2 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b3 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b4 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b5 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [20b6 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b7 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [20b8 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20b9 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20ba 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20bb 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20bc 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20bd 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20be 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20bf 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20c0 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c1 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20c2 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c3 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20c4 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c5 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [20c6 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [20c7 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [20c8 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [20c9 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20ca 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f89 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f8a 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f8b 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f8c 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f8d 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f8e 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f8f 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f90 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f91 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f92 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f93 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f94 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f95 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f96 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f97 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f98 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1f99 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f9a 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f9b 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f9c 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f9d 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1f9e 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f9f 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fa0 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fa1 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fa2 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fa3 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1fa4 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer0.org1.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer0.org1.example.com | [1fa5 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer0.org1.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer0.org1.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer0.org1.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer0.org1.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer0.org1.example.com | [1fa6 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1fa7 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 52 89 35 2a 71 4b 02 a9 8c a5 a6 |0D. /R.5*qK.....| +peer0.org1.example.com | 00000010 7d a5 e1 69 46 e8 15 8b 63 2a 3f 9f be d0 17 32 |}..iF...c*?....2| +peer0.org1.example.com | 00000020 8a 04 d8 7c 02 20 76 ac d8 a8 9d e7 cd 44 9f 47 |...|. v......D.G| +peer0.org1.example.com | 00000030 1e 8b 11 f0 97 a4 bc a5 84 03 32 bf ee 58 e5 f7 |..........2..X..| +peer0.org1.example.com | 00000040 35 58 8c 6e a3 f1 |5X.n..| +peer0.org1.example.com | [1fa8 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1fa9 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1faa 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1fab 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1fac 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1fad 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fae 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1faf 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fb0 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1fb1 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fb2 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fb3 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1fb4 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fb5 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fb6 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [1fb8 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fb7 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1fb9 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fbb 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fbc 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fbd 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fba 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1fbe 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fc0 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [201b 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [201c 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [201d 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [201e 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [201f 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2020 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2021 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2022 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2023 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2024 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2025 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2026 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2027 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2028 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2029 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [202a 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [202b 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\001\270+\303\220\002 \036\236/A\302Joc\244O alive: alive:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > alive: +peer1.org1.example.com | [202c 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [202d 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [202e 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [202f 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816102B +peer1.org1.example.com | [2030 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D4ADB6DB1E04E2430ACF7592D2078CC84D26127CB9761545227A090F2DED63C0 +peer1.org1.example.com | [2031 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2032 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2033 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2034 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2035 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2036 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2037 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2038 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2039 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [203b 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [203a 05-20 18:20:53.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [203c 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [203d 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [203e 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [203f 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2040 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2041 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2042 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2043 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2044 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2045 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2046 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2047 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2048 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2049 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [204a 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [204b 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [204c 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [204d 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [204e 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7f90 gate 1589998853714784700 evaluation starts +peer1.org1.example.com | [204f 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7f90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2050 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7f90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2051 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7f90 principal matched by identity 0 +peer1.org1.example.com | [2052 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c f1 57 d9 a7 7f 43 35 30 72 01 71 fe 97 6a 3f |,.W...C50r.q..j?| +peer1.org1.example.com | 00000010 90 a4 86 4c 1d 5f 21 9b 1e 65 db 17 ad 07 b0 48 |...L._!..e.....H| +peer1.org1.example.com | [2053 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 43 b8 68 ef 6b 30 f5 07 d1 d2 |0E.!..C.h.k0....| +peer1.org1.example.com | 00000010 5a 43 40 36 72 6f 84 1b 19 25 a3 86 b5 56 94 34 |ZC@6ro...%...V.4| +peer1.org1.example.com | 00000020 bf f8 2d eb 5b 02 20 4c e3 e3 0f f6 6b dc fa 44 |..-.[. L....k..D| +peer1.org1.example.com | 00000030 15 9e e3 49 f0 d8 3e 20 e4 e6 d8 07 59 d5 0d e1 |...I..> ....Y...| +peer1.org1.example.com | 00000040 f4 51 ed 10 c1 82 b0 |.Q.....| +peer1.org1.example.com | [2054 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7f90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2055 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7f90 gate 1589998853714784700 evaluation succeeds +peer1.org1.example.com | [2056 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20cb 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [20cc 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20cd 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20ce 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20cf 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20d0 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20d1 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20d2 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [20d3 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20d4 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [20d5 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [20d6 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20d7 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [20d8 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [20d9 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer1.org2.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer1.org2.example.com | [20da 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer1.org2.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer1.org2.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer1.org2.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer1.org2.example.com | 00000040 89 09 92 92 88 98 |......| +peer1.org2.example.com | [20db 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [20dc 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb a0 10 bf 6b 55 05 7e aa dd 0a |0E.!.....kU.~...| +peer1.org2.example.com | 00000010 b2 aa 91 dc d0 c9 20 5a 37 48 2c 48 e2 11 2e 36 |...... Z7H,H...6| +peer1.org2.example.com | 00000020 7f 98 1c a9 d7 02 20 79 56 2c f9 40 b9 e9 01 94 |...... yV,.@....| +peer1.org2.example.com | 00000030 a4 e2 8c 0f aa bd 07 5e 4e d1 6e ad 99 56 6c 6b |.......^N.n..Vlk| +peer1.org2.example.com | 00000040 c3 af 45 8a ad 45 13 |..E..E.| +peer1.org2.example.com | [20dd 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [20de 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [20df 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [20e0 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [20e1 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [20e2 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20e3 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20e4 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fc1 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fc2 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fc3 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fbf 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1fc4 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1fc5 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fc6 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1fc7 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fc8 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1fc9 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1fca 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fcb 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fcc 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fcd 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fce 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fcf 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fd0 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fd1 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fd2 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fd3 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fd4 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fd5 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fd6 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fd7 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fd8 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fd9 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fda 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1fdb 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fdc 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fdd 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fde 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fdf 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fe0 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1fe1 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fe2 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fe3 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1fe4 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1fe5 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1fe6 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 gate 1589998844908975500 evaluation starts +peer0.org1.example.com | [1fe7 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1fe8 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [1fe9 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 principal matched by identity 0 +peer0.org1.example.com | [1fea 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer0.org1.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer0.org1.example.com | [1feb 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer0.org1.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer0.org1.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer0.org1.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer0.org1.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer0.org1.example.com | [1fec 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1fed 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 gate 1589998844908975500 evaluation succeeds +peer0.org1.example.com | [1fee 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fef 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ff0 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ff1 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ff2 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ff3 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1ff4 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ff5 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1ff6 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1ff7 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ff8 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ff9 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ffa 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1ffb 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ffc 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ffd 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ffe 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1fff 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:M\031N\333\242\312^\211O\204" > alive: +peer0.org1.example.com | [2000 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2001 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2002 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2003 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161023 +peer0.org1.example.com | [2004 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0ED3069D6411A75ADC559E49089D2D23A4539C8BEA26AC05D2EAF8FED5779FA1 +peer0.org1.example.com | [2005 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2006 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2007 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2008 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2009 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [200a 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [200b 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [200c 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [200d 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [200f 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [200e 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2010 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2011 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2012 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2013 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2014 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2015 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2016 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2017 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2018 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer0.org1.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer0.org1.example.com | [2019 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer0.org1.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer0.org1.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [203c 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [203d 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [203e 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [203f 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2040 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2041 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2042 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815500 gate 1589998844189691800 evaluation starts +peer0.org2.example.com | [2043 05-20 18:20:44.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815500 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2044 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815500 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2045 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2046 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815500 principal evaluation fails +peer0.org2.example.com | [2047 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815500 gate 1589998844189691800 evaluation fails +peer0.org2.example.com | [2048 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2049 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [204a 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [204b 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815a70 gate 1589998844190641500 evaluation starts +peer0.org2.example.com | [204c 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815a70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [204d 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815a70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [204e 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815a70 principal matched by identity 0 +peer0.org2.example.com | [204f 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2050 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2051 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815a70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2052 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004815a70 gate 1589998844190641500 evaluation succeeds +peer0.org2.example.com | [2053 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2054 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2055 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2056 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2057 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2058 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [205a 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [201b 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 ec 46 a0 7a 2b cd d9 0a c0 a2 b1 |0D. ..F.z+......| +peer0.org1.example.com | 00000010 82 cb c1 e8 f9 5b 19 90 23 f2 f0 d4 aa 91 fc c7 |.....[..#.......| +peer0.org1.example.com | 00000020 9e a1 d7 7d 02 20 43 0b 08 7c dd d7 6b da 3c db |...}. C..|..k.<.| +peer0.org1.example.com | 00000030 c3 74 b3 7c 2a 7c 07 ea a7 2f 05 13 55 43 98 46 |.t.|*|.../..UC.F| +peer0.org1.example.com | 00000040 c9 a1 31 27 93 7a |..1'.z| +peer0.org1.example.com | [201c 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [201d 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [201e 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [201f 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2020 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2021 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2022 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2023 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2024 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2025 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer0.org1.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer0.org1.example.com | [2026 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer1.org1.example.com | [2057 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2058 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2059 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [205a 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [205b 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [205c 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [205d 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [205e 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [205f 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2060 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2061 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2062 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2063 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2064 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2065 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2066 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2067 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2068 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2069 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [206a 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [206b 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [206c 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [206d 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [206e 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [206f 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2070 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2071 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2072 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2073 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2074 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2075 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2076 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2077 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2078 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2079 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [207a 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [207b 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [207c 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [207d 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [207e 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [207f 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2080 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2081 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2082 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2083 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2084 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2085 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433cc00 gate 1589998853945613700 evaluation starts +peer1.org1.example.com | [2086 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433cc00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2087 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433cc00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2088 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433cc00 principal matched by identity 0 +peer1.org1.example.com | [2089 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 73 65 da f1 da 2f b4 3f 71 1b 7e 99 fe 9f 4c |Sse.../.?q.~...L| +peer1.org1.example.com | 00000010 6f 9d f2 a6 60 43 ba 41 9d b5 df 10 15 e3 52 24 |o...`C.A......R$| +peer1.org1.example.com | [208a 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 a2 4d e0 c2 01 63 32 e0 d5 55 ac |0D. b.M...c2..U.| +peer1.org1.example.com | 00000010 f0 9b d4 e5 64 82 74 86 6e 5e fb bb df 75 d8 bf |....d.t.n^...u..| +peer1.org1.example.com | 00000020 bd 73 b5 1e 02 20 7b 52 4b e1 38 a6 ec 59 18 42 |.s... {RK.8..Y.B| +peer1.org1.example.com | 00000030 07 ec 13 e9 59 8d 8e 2b a3 97 6f a0 f8 78 91 d8 |....Y..+..o..x..| +peer1.org1.example.com | 00000040 fb 04 ed 3e 10 28 |...>.(| +peer1.org1.example.com | [208b 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433cc00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [208c 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433cc00 gate 1589998853945613700 evaluation succeeds +peer1.org1.example.com | [208d 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [208e 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [208f 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2090 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2091 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2092 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2093 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2094 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [205b 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [205c 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [205d 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [205e 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [205f 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2060 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2061 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004831360 gate 1589998844195959100 evaluation starts +peer0.org2.example.com | [2062 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004831360 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2063 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004831360 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2064 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004831360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2065 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004831360 principal evaluation fails +peer0.org2.example.com | [2066 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004831360 gate 1589998844195959100 evaluation fails +peer0.org2.example.com | [2067 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2068 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2069 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [206a 05-20 18:20:44.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048318d0 gate 1589998844199946900 evaluation starts +peer0.org2.example.com | [206b 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048318d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [206c 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048318d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [206d 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048318d0 principal matched by identity 0 +peer0.org2.example.com | [206e 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [206f 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [2070 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048318d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2071 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048318d0 gate 1589998844199946900 evaluation succeeds +peer0.org2.example.com | [2072 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2073 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2074 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2075 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2076 05-20 18:20:44.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2077 05-20 18:20:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2078 05-20 18:20:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2079 05-20 18:20:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [207a 05-20 18:20:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [207b 05-20 18:20:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [207c 05-20 18:20:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [207d 05-20 18:20:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [207e 05-20 18:20:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [207f 05-20 18:20:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2080 05-20 18:20:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [20e5 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [20e6 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20e7 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20e8 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [20e9 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [20ea 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20eb 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:M\031N\333\242\312^\211O\204" > +peer1.org2.example.com | [20ec 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [20ed 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161027 +peer1.org2.example.com | [20ee 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2084B7050E5F05E1DE175180B6873CAFF2594E93EAD142E2F4ABFB8F3C751F47 +peer1.org2.example.com | [20ef 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [20f0 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [20f1 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [20f2 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [20f3 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20f4 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20f5 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20f6 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [20f7 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20f8 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [20f9 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20fa 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [20fb 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [20fc 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [20fd 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [20fe 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20ff 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2100 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2101 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2102 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2103 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2104 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2105 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2106 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2107 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2108 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2109 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [210a 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [210b 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [210c 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [210d 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [210e 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [210f 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2110 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2111 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2112 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2113 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2114 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2115 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2116 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2117 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bf810 gate 1589998849015521800 evaluation starts +peer1.org2.example.com | [2118 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bf810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2119 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bf810 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [211a 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bf810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [211b 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bf810 principal evaluation fails +peer1.org2.example.com | [211c 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bf810 gate 1589998849015521800 evaluation fails +peer1.org2.example.com | [211d 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [211e 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [211f 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2120 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bfd80 gate 1589998849021247500 evaluation starts +peer1.org2.example.com | [2121 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bfd80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2122 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bfd80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2123 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bfd80 principal matched by identity 0 +peer1.org2.example.com | [2124 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 e7 b0 c9 80 97 dd f2 20 09 c0 e0 f9 63 dc 2f |........ ....c./| +peer1.org2.example.com | 00000010 f6 9d 79 a6 fc 08 c5 ba 2a 16 3d d2 a9 e9 90 83 |..y.....*.=.....| +peer1.org2.example.com | [2125 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 e1 46 e7 30 4c b8 38 dd 25 0e 6f |0D. 1.F.0L.8.%.o| +peer1.org2.example.com | 00000010 24 5c a8 7c 54 7b a0 7c 0d 3c e6 7c a4 8e 3a fe |$\.|T{.|.<.|..:.| +peer1.org2.example.com | 00000020 3c 9d c6 42 02 20 6b 2e 49 ca fb d2 cf fb 44 aa |<..B. k.I.....D.| +peer1.org2.example.com | 00000030 26 ad de b4 a9 30 8c 16 54 54 85 a1 1b 0a 27 93 |&....0..TT....'.| +peer1.org2.example.com | 00000040 d3 0d e9 73 10 ee |...s..| +peer1.org2.example.com | [2126 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bfd80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2127 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bfd80 gate 1589998849021247500 evaluation succeeds +peer1.org2.example.com | [2128 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2081 05-20 18:20:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2082 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2083 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2084 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2085 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2086 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2087 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2088 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2089 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [208a 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [208b 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [208c 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [208d 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [208e 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [208f 05-20 18:20:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2090 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2091 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2092 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2093 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2094 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2095 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2096 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2097 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2098 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2099 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [209a 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [209b 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048470d0 gate 1589998844644844900 evaluation starts +peer0.org2.example.com | [209c 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048470d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [209d 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048470d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [209e 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048470d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [209f 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048470d0 principal evaluation fails +peer1.org2.example.com | [2129 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [212a 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [212b 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [212c 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [212d 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [212e 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [212f 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2130 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2131 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2132 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2133 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2134 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2135 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2136 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2137 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2138 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2139 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [213a 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [213b 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [213c 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [213d 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [213e 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [213f 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2140 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2141 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2142 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2143 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2144 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer0.org1.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer0.org1.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer0.org1.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer0.org1.example.com | [2027 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2028 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2029 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [202a 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer0.org1.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer0.org1.example.com | [202b 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer0.org1.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer0.org1.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [202d 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [202e 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [202f 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2030 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2031 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2032 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2033 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2034 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2035 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2036 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2037 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2038 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2039 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [203a 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [203b 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [203c 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 gate 1589998845061600200 evaluation starts +peer0.org1.example.com | [203d 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [203e 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [203f 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 principal matched by identity 0 +peer0.org1.example.com | [2040 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer0.org1.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer0.org2.example.com | [20a0 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048470d0 gate 1589998844644844900 evaluation fails +peer0.org2.example.com | [20a1 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [20a2 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [20a3 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [20a4 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847640 gate 1589998844646777600 evaluation starts +peer0.org2.example.com | [20a5 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20a6 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847640 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [20a7 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847640 principal matched by identity 0 +peer0.org2.example.com | [20a8 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer0.org2.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer0.org2.example.com | [20a9 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer0.org2.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer0.org2.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer0.org2.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer0.org2.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer0.org2.example.com | [20aa 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [20ab 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004847640 gate 1589998844646777600 evaluation succeeds +peer0.org2.example.com | [20ac 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20ad 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20ae 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [20af 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [20b0 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20b1 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [20b2 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [20b3 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [20b4 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [20b5 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20b6 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20b7 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20b8 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [20b9 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20ba 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20bb 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20bc 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [20bd 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:M\031N\333\242\312^\211O\204" > alive: alive: alive:\302\250\032\252\217\014\265\263\037\357\2064\026TQ\307\263\242\016(Z\241\336\242\372\213\003" > +peer0.org2.example.com | [20be 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [20bf 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20c0 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [20c1 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2145 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2146 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2147 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2148 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2149 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [214a 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478fcb0 gate 1589998849025397500 evaluation starts +peer1.org2.example.com | [214b 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [214c 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478fcb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [214d 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478fcb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [214e 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478fcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [214f 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478fcb0 principal evaluation fails +peer1.org2.example.com | [2151 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2150 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478fcb0 gate 1589998849025397500 evaluation fails +peer1.org2.example.com | [2152 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2153 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2154 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2155 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2156 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004816220 gate 1589998849025702800 evaluation starts +peer1.org2.example.com | [2157 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004816220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2158 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004816220 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2159 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004816220 principal matched by identity 0 +peer1.org2.example.com | [215a 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer1.org2.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer1.org2.example.com | [215b 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer1.org2.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer1.org2.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer1.org2.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer1.org2.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer1.org2.example.com | [215c 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004816220 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [215d 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004816220 gate 1589998849025702800 evaluation succeeds +peer1.org2.example.com | [215e 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [215f 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2160 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2161 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2162 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2163 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2164 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2165 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2166 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2167 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2168 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2169 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [216a 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [216b 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [216c 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [216d 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [216e 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [216f 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2170 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2171 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2172 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2173 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2174 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2175 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2176 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2177 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2178 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2179 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [217a 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [217b 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [217c 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [217d 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [217e 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [217f 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2180 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2181 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2182 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2183 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2184 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2185 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2186 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2187 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2188 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2189 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [218a 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [218b 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [218c 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [218d 05-20 18:20:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [218e 05-20 18:20:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [218f 05-20 18:20:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2190 05-20 18:20:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2191 05-20 18:20:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2192 05-20 18:20:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161028 +peer1.org2.example.com | [2193 05-20 18:20:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2808DABABA821AD6BFF582590CB9CBC1D91A3D5840C020AEE93298029871ABBE +peer1.org2.example.com | [2194 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2195 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2196 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2197 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2198 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2199 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [219a 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [219b 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [219c 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [219e 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20c2 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [20c3 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [20c4 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [20c5 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [20c6 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [20c7 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20c8 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [20c9 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20ca 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [20cb 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20cc 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [20cd 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [20ce 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20cf 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [20d0 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161024 +peer0.org2.example.com | [20d1 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7B76AABFAFC9802469F015D895B9F899BDA5ED90235639B240093331A3734AE5 +peer0.org2.example.com | [20d2 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [20d3 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [20d5 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20d4 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [20d6 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [20d7 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [20d8 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [20d9 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20dc 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [20da 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2095 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2096 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2097 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2098 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2099 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [209a 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [209b 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [209c 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [209d 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [209e 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [209f 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [20a0 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20a1 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [20a3 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20a2 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20a4 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [20a5 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [20a6 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20a7 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [20a8 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [20a9 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20aa 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [20ab 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20ac 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [20ad 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20ae 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [20af 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20b0 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20b1 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20b2 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20b3 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [20b4 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 59 30 46 a7 c9 92 e4 b2 30 c8 9a e7 8a e1 b4 |.Y0F.....0......| +peer1.org1.example.com | 00000010 7f 89 7f 93 73 56 d4 d9 12 e8 bf 65 5e b7 7b ce |....sV.....e^.{.| +peer1.org1.example.com | [20b5 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 e5 7e bf 58 8c 24 71 31 a6 32 |0E.!...~.X.$q1.2| +peer1.org1.example.com | 00000010 29 1e 4c 65 40 5c d8 e5 d4 f6 a5 2b 09 35 e2 7a |).Le@\.....+.5.z| +peer1.org1.example.com | 00000020 2d 03 6f ae d6 02 20 06 ad c0 58 2e a6 eb 0e 71 |-.o... ...X....q| +peer1.org1.example.com | 00000030 27 ec 5c 5a 66 78 be 46 8f eb 87 14 0e 63 02 c4 |'.\Zfx.F.....c..| +peer1.org1.example.com | 00000040 33 52 74 56 cd 76 37 |3RtV.v7| +peer1.org1.example.com | [20b6 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20b7 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [20b8 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [20b9 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [20ba 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [20bb 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20bc 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20bd 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20be 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20bf 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20c0 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20c1 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20c2 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20c3 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c4 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c5 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c6 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [20c7 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c8 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20c9 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [20ca 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20cc 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20cb 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20cd 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20ce 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20cf 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20d0 05-20 18:20:54.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20d1 05-20 18:20:54.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20d2 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20d3 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20d4 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20d5 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20d6 05-20 18:20:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [20d7 05-20 18:20:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [20d8 05-20 18:20:55.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [20d9 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [20da 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 89 31 90 02 61 a8 e1 5d 1d cd e2 85 eb a3 44 |{.1..a..]......D| +peer1.org1.example.com | 00000010 07 08 3a 04 7a 94 da ca f0 a0 e3 5f e9 25 d4 23 |..:.z......_.%.#| +peer1.org1.example.com | [20db 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 ae 65 56 57 80 6c f6 47 58 11 |0E.!...eVW.l.GX.| +peer1.org1.example.com | 00000010 a3 3d 2e 0f ae a1 0c 46 0d 84 7a 19 87 13 85 4a |.=.....F..z....J| +peer1.org1.example.com | 00000020 8e 6a 51 17 f1 02 20 05 b5 a4 33 14 bc 58 48 34 |.jQ... ...3..XH4| +peer1.org1.example.com | 00000030 c6 6b 25 a4 ca 79 a7 19 a6 36 ec b9 07 90 24 e7 |.k%..y...6....$.| +peer1.org1.example.com | 00000040 a4 92 28 7b 58 55 19 |..({XU.| +peer1.org1.example.com | [20dc 05-20 18:20:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20dd 05-20 18:20:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20de 05-20 18:20:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20df 05-20 18:20:55.69 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [20e0 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [20e1 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [20e2 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [20e3 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20e4 05-20 18:20:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20e5 05-20 18:20:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20e6 05-20 18:20:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [20e8 05-20 18:20:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20e7 05-20 18:20:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20ea 05-20 18:20:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20e9 05-20 18:20:55.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20eb 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20ec 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20ed 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [20ee 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [20ef 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | [2041 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer0.org1.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer0.org1.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer0.org1.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer0.org1.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer0.org1.example.com | [2042 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2044 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2045 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2046 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2043 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2047 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2048 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 gate 1589998845061600200 evaluation succeeds +peer0.org1.example.com | [204a 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2049 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [204b 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [204d 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [204c 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [204e 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [204f 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2050 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [2051 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2052 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2053 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2054 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2055 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2056 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer0.org1.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer0.org1.example.com | [2057 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer0.org1.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer0.org1.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2059 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [205a 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [205b 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [205c 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer0.org1.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer0.org1.example.com | [205d 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer0.org1.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer0.org1.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer0.org1.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer0.org1.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer0.org1.example.com | [205e 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [205f 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2060 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2061 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [219d 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [219f 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21a0 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [21a1 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [21a2 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21a3 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [21a4 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [21a5 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer1.org2.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer1.org2.example.com | [21a6 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer1.org2.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer1.org2.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer1.org2.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer1.org2.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer1.org2.example.com | [21a7 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [21a8 05-20 18:20:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 58 65 62 0d 78 64 b8 0d 1c f7 |0E.!..Xeb.xd....| +peer1.org2.example.com | 00000010 24 2b 3f f6 d6 63 0e e2 74 28 e5 04 2b fa 42 36 |$+?..c..t(..+.B6| +peer1.org2.example.com | 00000020 2b d2 2d 3c 7f 02 20 51 97 bc 19 fb 3c 16 53 10 |+.-<.. Q....<.S.| +peer1.org2.example.com | 00000030 d8 81 5b 9f 8b 2c 43 51 4f 0c 23 86 ec ef dc bd |..[..,CQO.#.....| +peer1.org2.example.com | 00000040 71 3d b8 be ae e2 b3 |q=.....| +peer1.org2.example.com | [21a9 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [21aa 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [21ab 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21ac 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21ad 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [21ae 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21af 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [21b0 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [21b1 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21b2 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [21b3 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21b4 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21b5 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [21b6 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [20f0 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [20f1 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [20f2 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [20f3 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [20f4 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20f5 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20f6 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [20f7 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20f8 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20f9 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [20fa 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [20fb 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [20fc 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc240 gate 1589998855906147600 evaluation starts +peer1.org1.example.com | [20fd 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc240 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [20fe 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc240 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [20ff 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc240 principal matched by identity 0 +peer1.org1.example.com | [2100 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2101 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2102 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc240 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2103 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cc240 gate 1589998855906147600 evaluation succeeds +peer1.org1.example.com | [2104 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2105 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2106 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2107 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2108 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2109 05-20 18:20:55.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [210a 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [210b 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [210c 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [210d 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [210e 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [210f 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2110 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd440 gate 1589998855912751200 evaluation starts +peer1.org1.example.com | [2111 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd440 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2112 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd440 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2113 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd440 principal matched by identity 0 +peer1.org1.example.com | [2114 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2115 05-20 18:20:55.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | [2062 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2063 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2064 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2065 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2066 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2067 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2068 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2069 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [206a 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [206b 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [206c 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [206d 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 gate 1589998845188569400 evaluation starts +peer0.org1.example.com | [206e 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [206f 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2070 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 principal matched by identity 0 +peer0.org1.example.com | [2071 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer0.org1.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer0.org1.example.com | [2072 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer0.org1.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer0.org1.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer0.org1.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer0.org1.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer0.org1.example.com | [2073 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2074 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 gate 1589998845188569400 evaluation succeeds +peer0.org1.example.com | [2075 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2076 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2077 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2078 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2079 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [207a 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [207b 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [207c 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [207d 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [207e 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [207f 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2080 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [2081 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2082 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2083 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2084 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2085 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2086 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2087 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2088 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2089 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [208a 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [208b 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [208c 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100A1801 +peer0.org1.example.com | [208d 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7A41CDCC6DBE0F3D17188A5D3379FDC0C4F0B3BF5039D71E422905CE2D9F36E8 +peer1.org2.example.com | [21b7 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [21b8 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868600 gate 1589998849198130400 evaluation starts +peer1.org2.example.com | [21b9 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21ba 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868600 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [21bb 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [21bc 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868600 principal evaluation fails +peer1.org2.example.com | [21bd 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868600 gate 1589998849198130400 evaluation fails +peer1.org2.example.com | [21be 05-20 18:20:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21bf 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21c0 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [21c1 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868b70 gate 1589998849200565000 evaluation starts +peer1.org2.example.com | [21c2 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21c3 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868b70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [21c4 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868b70 principal matched by identity 0 +peer1.org2.example.com | [21c5 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer1.org2.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer1.org2.example.com | [21c6 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer1.org2.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer1.org2.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer1.org2.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer1.org2.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer1.org2.example.com | [21c7 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868b70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [21c8 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004868b70 gate 1589998849200565000 evaluation succeeds +peer1.org2.example.com | [21c9 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21ca 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21cb 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [21cc 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [21cd 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [21ce 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21cf 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [21d0 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer1.org2.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer1.org2.example.com | [21d1 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer1.org2.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer1.org2.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer1.org2.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer1.org2.example.com | 00000040 89 09 92 92 88 98 |......| +peer1.org2.example.com | [21d2 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [21d3 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21d4 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [21d5 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer1.org2.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer1.org2.example.com | [21d6 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer1.org2.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer1.org2.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer1.org2.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer1.org2.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer1.org2.example.com | [21d7 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [21d8 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [21d9 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21da 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0043cd440 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2117 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd440 gate 1589998855912751200 evaluation succeeds +peer1.org1.example.com | [2118 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2119 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [211a 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [211b 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [211c 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [211d 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [211e 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [211f 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2120 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2121 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2122 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2123 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2124 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2125 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2126 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2127 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6890 gate 1589998855925063500 evaluation starts +peer1.org1.example.com | [2128 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6890 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2129 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6890 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [212a 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6890 principal matched by identity 0 +peer1.org1.example.com | [212b 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [212c 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0043e6890 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [212e 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6890 gate 1589998855925063500 evaluation succeeds +peer1.org1.example.com | [212f 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2130 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2131 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2132 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2133 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2134 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | [20db 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [20dd 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20de 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20e0 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [20e1 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [20e2 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20df 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [20e3 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20e4 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [20e5 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [20e6 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20e7 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20e8 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20e9 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20ea 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20eb 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [20ec 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20ed 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20ee 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [20ef 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20f0 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [20f1 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20f2 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [20f3 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [20f4 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer0.org2.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer0.org2.example.com | [20f5 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer0.org2.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer0.org2.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer0.org2.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer0.org2.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer0.org2.example.com | [20f6 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [20f7 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20f8 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20f9 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20fa 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20fb 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [20fc 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [20fd 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20fe 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer0.org2.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer0.org2.example.com | [20ff 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer0.org2.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer0.org2.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer0.org2.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer0.org2.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer0.org2.example.com | [2100 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [2101 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a ca 78 12 82 16 f7 5e 54 82 cc |0E.!...x....^T..| +peer0.org2.example.com | 00000010 7e 5a 61 ad 90 a9 fb c7 84 eb 27 41 50 a2 7d c7 |~Za.......'AP.}.| +peer0.org2.example.com | 00000020 8f 3d 82 e1 ae 02 20 5c de 5e 83 8a 2e 81 1d 11 |.=.... \.^......| +peer0.org2.example.com | 00000030 87 22 29 f1 c6 d5 90 32 cd cd 8f 28 4b c5 26 33 |.")....2...(K.&3| +peer0.org2.example.com | 00000040 8f aa 8c 00 11 97 7d |......}| +peer0.org2.example.com | [2102 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2103 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2104 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2105 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2106 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2107 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2108 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2109 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [210a 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [210b 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [210c 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [210d 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [210e 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [210f 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2110 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2111 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd320 gate 1589998844939956400 evaluation starts +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2135 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2136 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2137 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2138 05-20 18:20:55.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2139 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [213a 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [213b 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [213c 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [213d 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [213e 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [213f 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004402870 gate 1589998855930937700 evaluation starts +peer1.org1.example.com | [2140 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004402870 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2141 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004402870 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2142 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004402870 principal matched by identity 0 +peer1.org1.example.com | [2143 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2144 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2145 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004402870 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2146 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004402870 gate 1589998855930937700 evaluation succeeds +peer1.org1.example.com | [2147 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2148 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2149 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [214a 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [214b 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [214c 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [214d 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [214e 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [214f 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21db 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [21dc 05-20 18:20:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21dd 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [21de 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21df 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [21e0 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [21e1 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer1.org2.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer1.org2.example.com | [21e2 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer1.org2.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer1.org2.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer1.org2.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer1.org2.example.com | 00000040 89 09 92 92 88 98 |......| +peer1.org2.example.com | [21e3 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [21e4 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21e5 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [21e6 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer1.org2.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer1.org2.example.com | [21e7 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer1.org2.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer1.org2.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer1.org2.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer1.org2.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer1.org2.example.com | [21e8 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [21e9 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [21ea 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21eb 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [21ec 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21ed 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [21ee 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21ef 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21f0 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [21f1 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [21f2 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [21f3 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a06b0 gate 1589998849232972600 evaluation starts +peer1.org2.example.com | [21f4 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a06b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21f5 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a06b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [21f6 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a06b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [21f7 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a06b0 principal evaluation fails +peer1.org2.example.com | [21f8 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a06b0 gate 1589998849232972600 evaluation fails +peer1.org2.example.com | [21f9 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21fa 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21fb 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [21fc 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a0c20 gate 1589998849234793900 evaluation starts +peer1.org2.example.com | [21fd 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a0c20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21fe 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a0c20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [21ff 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a0c20 principal matched by identity 0 +peer1.org2.example.com | [2200 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer1.org2.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer1.org2.example.com | [2201 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer1.org2.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer1.org2.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer1.org2.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer1.org2.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer1.org2.example.com | [2202 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a0c20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2203 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a0c20 gate 1589998849234793900 evaluation succeeds +peer1.org2.example.com | [2204 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2205 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2206 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2207 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2208 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2209 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [220a 05-20 18:20:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [220b 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [220c 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [220d 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [220e 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB38816100B1801 +peer1.org2.example.com | [220f 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 56A52C3CC6CD86E403DDF72FDE17C1A3EC8DE0AFDA5AB3B5FFAC30ADB89298F3 +peer1.org2.example.com | [2210 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2211 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2212 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2213 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2214 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2215 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2216 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2217 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2218 05-20 18:20:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2219 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2150 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2151 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2152 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2153 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2154 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2155 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2156 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004403cc0 gate 1589998855935137000 evaluation starts +peer1.org1.example.com | [2157 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004403cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2158 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004403cc0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2159 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004403cc0 principal matched by identity 0 +peer1.org1.example.com | [215a 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [215b 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [215c 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004403cc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [215d 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004403cc0 gate 1589998855935137000 evaluation succeeds +peer1.org1.example.com | [215e 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [215f 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2160 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2161 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2162 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2163 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2164 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2165 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2166 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2167 05-20 18:20:55.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2168 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2169 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [216a 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [216b 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [216c 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441d5b0 gate 1589998855940741900 evaluation starts +peer1.org1.example.com | [216d 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441d5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [216e 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441d5b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [216f 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441d5b0 principal matched by identity 0 +peer1.org1.example.com | [2170 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2171 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00441d5b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2173 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441d5b0 gate 1589998855940741900 evaluation succeeds +peer1.org1.example.com | [2174 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2175 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2176 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2177 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2178 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2179 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [217a 05-20 18:20:55.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [217b 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [217c 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [217d 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [217e 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [217f 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2180 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2181 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2182 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2183 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2184 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2185 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2186 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2187 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2188 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2189 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [2112 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd320 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2113 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd320 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2114 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2115 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd320 principal evaluation fails +peer0.org2.example.com | [2116 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd320 gate 1589998844939956400 evaluation fails +peer0.org2.example.com | [2117 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2118 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2119 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [211a 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd890 gate 1589998844945178400 evaluation starts +peer0.org2.example.com | [211b 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [211c 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd890 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [211d 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd890 principal matched by identity 0 +peer0.org2.example.com | [211e 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +peer0.org2.example.com | 00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +peer0.org2.example.com | [211f 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +peer0.org2.example.com | 00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +peer0.org2.example.com | 00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +peer0.org2.example.com | 00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +peer0.org2.example.com | 00000040 39 4a 2b 6c 50 54 |9J+lPT| +peer0.org2.example.com | [2120 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2121 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd890 gate 1589998844945178400 evaluation succeeds +peer0.org2.example.com | [2122 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2123 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2124 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2125 05-20 18:20:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2126 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2127 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2128 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2129 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +peer0.org2.example.com | 00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +peer0.org2.example.com | [212a 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +peer0.org2.example.com | 00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +peer0.org2.example.com | 00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +peer0.org2.example.com | 00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +peer0.org2.example.com | 00000040 8b cf ff 7c a3 dd |...|..| +peer0.org2.example.com | [212b 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [212c 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [212d 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [212e 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [212f 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2130 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2131 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2132 05-20 18:20:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2133 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2134 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2135 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [208e 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [208f 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2090 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2091 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2092 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2093 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2094 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2095 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2096 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [2097 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2098 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2099 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [209a 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [209b 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [209e 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [209c 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [209f 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [209d 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [20a0 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [218b 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [218c 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [218d 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [218a 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [218e 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2190 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [218f 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2191 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2192 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2193 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2194 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2195 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2196 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2197 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2198 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2199 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [219a 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [219b 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [219c 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [219d 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [219e 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [219f 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [21a0 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21a1 05-20 18:20:56.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21a2 05-20 18:20:56.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21a3 05-20 18:20:56.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21a4 05-20 18:20:56.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21a5 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [221a 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [221b 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [221c 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [221d 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [221e 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [221f 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2220 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2221 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2222 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2223 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2224 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2225 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2226 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2227 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2228 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2229 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [222a 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [222b 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [222c 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [222d 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [222e 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [222f 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2230 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2231 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2232 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2233 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2234 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2235 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2236 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2237 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2238 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [223b 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [223a 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [223c 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20a1 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [20a2 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [20a3 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [20a4 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [20a5 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [20a6 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [20a7 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [20a8 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [20a9 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20aa 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20ab 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [20ac 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20ad 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20ae 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [20af 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [20b0 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20b1 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 gate 1589998847615145500 evaluation starts +peer0.org1.example.com | [20b2 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20b3 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [20b4 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 principal matched by identity 0 +peer0.org1.example.com | [20b5 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [20b6 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0042937d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20b8 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 gate 1589998847615145500 evaluation succeeds +peer0.org1.example.com | [20b9 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20ba 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20bb 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2136 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2137 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2138 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2139 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [213a 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [213b 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [213c 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [213d 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [213e 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049125f0 gate 1589998845033930200 evaluation starts +peer0.org2.example.com | [213f 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049125f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2140 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049125f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2141 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049125f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2142 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049125f0 principal evaluation fails +peer0.org2.example.com | [2143 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049125f0 gate 1589998845033930200 evaluation fails +peer0.org2.example.com | [2144 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2145 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2146 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2147 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912b60 gate 1589998845041896500 evaluation starts +peer0.org2.example.com | [2148 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912b60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2149 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912b60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [214a 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912b60 principal matched by identity 0 +peer0.org2.example.com | [214b 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer0.org2.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer0.org2.example.com | [214c 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer0.org2.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer0.org2.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU 0xc004912b60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [214e 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912b60 gate 1589998845041896500 evaluation succeeds +peer0.org2.example.com | [214f 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2150 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2151 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2152 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2153 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2154 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [20bc 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20bd 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20be 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20bf 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [20c0 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20c1 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20c2 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [20c3 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [20c4 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20c5 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 gate 1589998847619263000 evaluation starts +peer0.org1.example.com | [20c6 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20c7 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [20c8 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 principal matched by identity 0 +peer0.org1.example.com | [20c9 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [20ca 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [20cb 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20cc 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 gate 1589998847619263000 evaluation succeeds +peer0.org1.example.com | [20cd 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20ce 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20cf 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20d0 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20d1 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20d2 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [20d3 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20d4 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20d5 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20d6 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [20d7 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20d8 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20d9 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [20da 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [20db 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20dc 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 gate 1589998847624665500 evaluation starts +peer0.org1.example.com | [20dd 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20de 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [20df 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 principal matched by identity 0 +peer0.org1.example.com | [20e0 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [20e1 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [20e2 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20e3 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 gate 1589998847624665500 evaluation succeeds +peer0.org1.example.com | [20e4 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20e5 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20e6 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20e7 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20e8 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [20e9 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | [223d 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [223e 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [223f 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2240 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2241 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2242 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2243 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f0e30 gate 1589998852459798900 evaluation starts +peer1.org2.example.com | [2244 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f0e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2245 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f0e30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2246 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f0e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2247 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f0e30 principal evaluation fails +peer1.org2.example.com | [2248 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f0e30 gate 1589998852459798900 evaluation fails +peer1.org2.example.com | [2249 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [224a 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [224b 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [224c 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f13a0 gate 1589998852463557900 evaluation starts +peer1.org2.example.com | [224d 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f13a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [224e 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f13a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [224f 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f13a0 principal matched by identity 0 +peer1.org2.example.com | [2250 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2251 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2252 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f13a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2253 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f13a0 gate 1589998852463557900 evaluation succeeds +peer1.org2.example.com | [2254 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2255 05-20 18:20:52.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2256 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2257 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2258 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2259 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21a6 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [21a7 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [21a8 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21a9 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [21aa 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816102C +peer1.org1.example.com | [21ab 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 274E5ADB7E6C4203B81A324923CDCB152124364DB4D8E5862F6EAC25C42E2AE7 +peer1.org1.example.com | [21ac 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [21ad 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [21ae 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [21af 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21b0 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21b1 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21b2 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [21b3 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21b4 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21b5 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21b6 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [21b7 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21b8 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [21b9 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ba 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [21bb 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21bc 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [21bd 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [21be 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer1.org1.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer1.org1.example.com | [21bf 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer1.org1.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer1.org1.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer1.org1.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer1.org2.example.com | [225a 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [225b 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [225c 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [225d 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [225e 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [225f 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2260 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d6e90 gate 1589998852489696300 evaluation starts +peer1.org2.example.com | [2261 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d6e90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2262 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d6e90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2263 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d6e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2264 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d6e90 principal evaluation fails +peer1.org2.example.com | [2265 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d6e90 gate 1589998852489696300 evaluation fails +peer1.org2.example.com | [2266 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2267 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2268 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2269 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1c70 gate 1589998852496141800 evaluation starts +peer1.org2.example.com | [226a 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1c70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [226b 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1c70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [226c 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1c70 principal matched by identity 0 +peer1.org2.example.com | [226d 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [226e 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [226f 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1c70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2270 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1c70 gate 1589998852496141800 evaluation succeeds +peer1.org2.example.com | [2271 05-20 18:20:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2272 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2273 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2274 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2275 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2276 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2277 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2278 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2279 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [227a 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [227b 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer1.org1.example.com | [21c0 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [21c1 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 1d 22 8a a0 61 fa 16 4d 9d d3 ce |0D. v."..a..M...| +peer1.org1.example.com | 00000010 5f 07 1d 5c fa 1c b9 5e 24 f1 7b 66 53 c7 59 81 |_..\...^$.{fS.Y.| +peer1.org1.example.com | 00000020 64 93 fa 64 02 20 29 c9 27 17 5e e6 16 37 6f 12 |d..d. ).'.^..7o.| +peer1.org1.example.com | 00000030 95 59 06 6e 50 44 a8 f0 b1 8e e2 b9 66 89 84 5e |.Y.nPD......f..^| +peer1.org1.example.com | 00000040 e1 23 87 0f ab e9 |.#....| +peer1.org1.example.com | [21c2 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [21c3 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [21c4 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21c5 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21c6 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c7 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c8 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21c9 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [21ca 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [21cb 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer1.org1.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer1.org1.example.com | [21cc 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer1.org1.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer1.org1.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer1.org1.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer1.org1.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer1.org1.example.com | [21cd 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [21ce 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [21cf 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21d0 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21d1 05-20 18:20:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [21d2 05-20 18:20:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [21d3 05-20 18:20:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21d4 05-20 18:20:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [21d5 05-20 18:20:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [21d6 05-20 18:20:56.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer1.org1.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer1.org1.example.com | [21d7 05-20 18:20:56.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer1.org1.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer1.org1.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer1.org1.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer1.org1.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer1.org1.example.com | [21d8 05-20 18:20:56.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [21d9 05-20 18:20:56.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [21da 05-20 18:20:56.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21db 05-20 18:20:56.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21dc 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [21dd 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [21de 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2155 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2156 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2157 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2158 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2159 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [215a 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [215b 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [215c 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [215d 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [215e 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [215f 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2160 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:M\031N\333\242\312^\211O\204" > alive: alive: alive:\302\250\032\252\217\014\265\263\037\357\2064\026TQ\307\263\242\016(Z\241\336\242\372\213\003" > +peer0.org2.example.com | [2161 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2162 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2163 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2164 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2165 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2166 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2167 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2168 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2169 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [216a 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [216b 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer0.org2.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer0.org2.example.com | [216c 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer0.org2.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer0.org2.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer0.org2.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer0.org2.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer0.org2.example.com | [216d 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [20ea 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20eb 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20ec 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [20ed 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20ee 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20ef 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [20f0 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [216e 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 82 33 8a 9c bc 5b 41 cf 67 e4 2f |0D. ~.3...[A.g./| +peer0.org2.example.com | 00000010 51 e0 64 06 df 93 44 9b be 80 cb e0 80 73 5a c5 |Q.d...D......sZ.| +peer0.org2.example.com | 00000020 3f 33 9a e7 02 20 7c 5e 9a 1d e8 53 03 59 77 de |?3... |^...S.Yw.| +peer0.org2.example.com | 00000030 e7 a3 ea b2 0c ab aa 47 fb ea 04 89 95 a8 53 03 |.......G......S.| +peer0.org2.example.com | 00000040 f1 57 69 e3 14 d2 |.Wi...| +peer0.org2.example.com | [216f 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2170 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2171 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2172 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2173 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2174 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2175 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2176 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2177 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2178 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2179 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [217a 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [217b 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [217c 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [217d 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\302\250\032\252\217\014\265\263\037\357\2064\026TQ\307\263\242\016(Z\241\336\242\372\213\003" > +peer0.org2.example.com | [217e 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [217f 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a a8 4a 4e ab 06 8d 31 a2 c3 81 2f 2b cb 1c d1 |..JN...1.../+...| +peer0.org2.example.com | 00000010 b7 a6 2d 0a 40 5e 54 db a3 44 4a e8 33 72 e0 ff |..-.@^T..DJ.3r..| +peer0.org2.example.com | [2180 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 92 be 1a 69 70 fa 83 d7 d9 cb |0E.!.....ip.....| +peer0.org2.example.com | 00000010 78 79 85 f7 7e c8 0e a3 f2 a0 ae 97 64 96 4e 35 |xy..~.......d.N5| +peer0.org2.example.com | 00000020 b9 0a c4 8f 0a 02 20 7f 0f d9 4f 7a c5 0d 7a 0b |...... ...Oz..z.| +peer0.org2.example.com | 00000030 ac 16 94 3b 97 56 b8 3b eb 5b a8 aa af e2 b9 5d |...;.V.;.[.....]| +peer0.org2.example.com | 00000040 3a 5e 42 84 14 49 17 |:^B..I.| +peer0.org2.example.com | [2181 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2182 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2183 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2184 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [2185 05-20 18:20:46.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2186 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2187 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2188 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2189 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [218a 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [218b 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [218c 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21df 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21e0 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21e1 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21e2 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21e3 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21e4 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21e5 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [21e6 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21e7 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [21e8 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [21e9 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [21ea 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21eb 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [21ec 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [21ed 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ee 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [21ef 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [21f0 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21f1 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [21f2 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21f3 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21f4 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [21f5 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [21f6 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [21f7 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc880 gate 1589998856899790100 evaluation starts +peer1.org1.example.com | [21f8 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc880 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [21f9 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc880 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [21fa 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc880 principal matched by identity 0 +peer1.org1.example.com | [21fb 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer1.org1.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer1.org1.example.com | [21fc 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer1.org1.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer1.org1.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer1.org1.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer1.org1.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer1.org1.example.com | [21fd 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc880 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [21fe 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bc880 gate 1589998856899790100 evaluation succeeds +peer1.org1.example.com | [21ff 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2200 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2201 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2202 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2203 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2204 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2205 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2206 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2207 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2208 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2209 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [220a 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [220b 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [220c 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [220d 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [220e 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [220f 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2210 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2211 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2212 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\020(" > alive: +peer1.org1.example.com | [2213 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" secret_envelope:\277\220\210\236" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2214 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [218d 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [218e 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [218f 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2190 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2191 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2192 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2193 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2194 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2195 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2196 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2197 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2198 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2199 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [219a 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [219b 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [219c 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [219d 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [219e 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [219f 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21a0 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [21a1 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [21a2 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [21a3 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c280 gate 1589998848161357100 evaluation starts +peer0.org2.example.com | [21a4 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c280 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21a5 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c280 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [21a6 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [21a7 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c280 principal evaluation fails +peer0.org2.example.com | [21a8 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c280 gate 1589998848161357100 evaluation fails +peer0.org2.example.com | [21a9 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21aa 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21ab 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [21ac 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c7f0 gate 1589998848162888300 evaluation starts +peer0.org2.example.com | [21ad 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c7f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21ae 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c7f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [21af 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c7f0 principal matched by identity 0 +peer0.org2.example.com | [21b0 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [227c 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [227d 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [227e 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [227f 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2280 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2281 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2282 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491b7b0 gate 1589998852508331700 evaluation starts +peer1.org2.example.com | [2283 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491b7b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2284 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491b7b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2285 05-20 18:20:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491b7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2286 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491b7b0 principal evaluation fails +peer1.org2.example.com | [2287 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491b7b0 gate 1589998852508331700 evaluation fails +peer1.org2.example.com | [2288 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2289 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [228a 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [228b 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491bd20 gate 1589998852512170800 evaluation starts +peer1.org2.example.com | [228c 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491bd20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [228d 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491bd20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [228e 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491bd20 principal matched by identity 0 +peer1.org2.example.com | [228f 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2290 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2291 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491bd20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2292 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491bd20 gate 1589998852512170800 evaluation succeeds +peer1.org2.example.com | [2293 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2294 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2295 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2296 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2297 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2298 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2299 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [229a 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [229b 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [229c 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [229d 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [229e 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [229f 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004932f20 gate 1589998852517518000 evaluation starts +peer1.org2.example.com | [22a0 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004932f20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22a1 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004932f20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [22a2 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004932f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [22a3 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004932f20 principal evaluation fails +peer1.org2.example.com | [22a4 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004932f20 gate 1589998852517518000 evaluation fails +peer1.org2.example.com | [22a5 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22a6 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22a7 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [22a8 05-20 18:20:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004933490 gate 1589998852519624300 evaluation starts +peer1.org2.example.com | [22a9 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004933490 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22aa 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004933490 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [22ab 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004933490 principal matched by identity 0 +peer1.org2.example.com | [22ac 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [22ad 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [22ae 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004933490 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [22af 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004933490 gate 1589998852519624300 evaluation succeeds +peer1.org2.example.com | [22b0 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22b1 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22b2 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [22b3 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22b4 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [22b5 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [22b6 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [22b7 05-20 18:20:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [22b9 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [22ba 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22bb 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22bc 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21b1 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [21b2 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c7f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21b3 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496c7f0 gate 1589998848162888300 evaluation succeeds +peer0.org2.example.com | [21b4 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21b5 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21b6 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [21b7 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21b8 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21b9 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21ba 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21bb 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21bc 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21bd 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [21be 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [21bf 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [21c0 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496d9f0 gate 1589998848166827000 evaluation starts +peer0.org2.example.com | [21c1 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496d9f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21c2 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496d9f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [21c3 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496d9f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [21c4 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496d9f0 principal evaluation fails +peer0.org2.example.com | [21c5 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496d9f0 gate 1589998848166827000 evaluation fails +peer0.org2.example.com | [21c6 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21c7 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21c8 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [21c9 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496df60 gate 1589998848168621300 evaluation starts +peer0.org2.example.com | [21ca 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496df60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21cb 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496df60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [21cc 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496df60 principal matched by identity 0 +peer0.org2.example.com | [21cd 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [21ce 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [21cf 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496df60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21d0 05-20 18:20:48.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00496df60 gate 1589998848168621300 evaluation succeeds +peer0.org2.example.com | [21d1 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21d2 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [20f1 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20f2 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 gate 1589998847630675800 evaluation starts +peer0.org1.example.com | [20f3 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20f4 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [20f5 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 principal matched by identity 0 +peer0.org1.example.com | [20f6 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [20f7 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0042f5710 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20f9 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 gate 1589998847630675800 evaluation succeeds +peer0.org1.example.com | [20fa 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20fb 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20fc 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20fd 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20fe 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [20ff 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2100 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2101 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2102 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2103 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2104 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2105 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2106 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2107 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2108 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2109 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [210a 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [210b 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 gate 1589998847636192100 evaluation starts +peer0.org1.example.com | [210c 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [210d 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [210e 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 principal matched by identity 0 +peer0.org1.example.com | [210f 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2110 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004313250 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2112 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 gate 1589998847636192100 evaluation succeeds +peer0.org1.example.com | [2113 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2114 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2115 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2116 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2117 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2118 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2119 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [211a 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [211b 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [211c 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [211d 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [211e 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [211f 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2120 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2121 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2122 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2123 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 gate 1589998847646631600 evaluation starts +peer0.org1.example.com | [2124 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2125 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2126 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 principal matched by identity 0 +peer0.org1.example.com | [2127 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2128 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2129 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [212a 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 gate 1589998847646631600 evaluation succeeds +peer0.org1.example.com | [212b 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [212c 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [212d 05-20 18:20:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [212e 05-20 18:20:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [212f 05-20 18:20:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2130 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2131 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2132 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2133 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2134 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2135 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2136 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2137 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2138 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2139 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [213a 05-20 18:20:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [213b 05-20 18:20:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [213c 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [213d 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [213e 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [213f 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2140 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2141 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2142 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2143 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2144 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2215 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" secret_envelope:\277\220\210\236" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2216 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2217 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +peer1.org1.example.com | 00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +peer1.org1.example.com | [2218 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +peer1.org1.example.com | 00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +peer1.org1.example.com | 00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +peer1.org1.example.com | 00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +peer1.org1.example.com | 00000040 45 83 34 c8 b3 15 |E.4...| +peer1.org1.example.com | [2219 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [221a 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 3a a0 90 ad 38 79 cd 7e 49 3c c7 |0D. .:...8y.~I<.| +peer1.org1.example.com | 00000010 59 a0 3c 7c f6 f9 56 4e 65 68 78 a9 29 45 63 36 |Y.<|..VNehx.)Ec6| +peer1.org1.example.com | 00000020 3a 11 26 7c 02 20 0c 6f 91 5e 38 c3 4f 7c 6e 70 |:.&|. .o.^8.O|np| +peer1.org1.example.com | 00000030 b6 c0 40 c3 c0 67 c0 7c 69 70 02 0a b9 c6 92 2e |..@..g.|ip......| +peer1.org1.example.com | 00000040 99 3e bf 90 88 9e |.>....| +peer1.org1.example.com | [221b 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [221c 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [221d 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [221e 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [221f 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2220 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2221 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2222 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2223 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2224 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2225 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2226 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2227 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" secret_envelope:\277\220\210\236" > > alive: +peer1.org1.example.com | [2228 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2229 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [222a 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [222b 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [222c 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [222d 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [222e 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [222f 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2230 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2231 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21d3 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [21d4 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21d5 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [21d6 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [21d7 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [21d8 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [21da 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [21db 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [21dc 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [21dd 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21de 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21df 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21e0 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21e1 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21e2 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [21e3 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [21e4 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [21e5 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a47d0 gate 1589998848176499700 evaluation starts +peer0.org2.example.com | [21e6 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a47d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21e7 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a47d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [21e8 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a47d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [21e9 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a47d0 principal evaluation fails +peer0.org2.example.com | [21ea 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a47d0 gate 1589998848176499700 evaluation fails +peer0.org2.example.com | [21eb 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21ec 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21ed 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [21ee 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4d40 gate 1589998848178616300 evaluation starts +peer1.org1.example.com | [2232 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2233 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2234 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2235 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2236 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2237 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2238 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2239 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [223a 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [223b 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [223c 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [223d 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [223e 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [223f 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2240 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2241 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8eb0 gate 1589998857196808800 evaluation starts +peer1.org1.example.com | [2242 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2243 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8eb0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2244 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8eb0 principal matched by identity 0 +peer1.org1.example.com | [2245 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 1c db c9 74 93 b8 4c e8 82 0a 49 dc 15 91 |.X...t..L...I...| +peer1.org1.example.com | 00000010 7f 2e 44 0c 38 2f 84 e5 90 4b c9 78 fe cd 3b 83 |..D.8/...K.x..;.| +peer1.org1.example.com | [2246 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 1d f6 f9 ce 95 89 bc 1d ea 08 |0E.!............| +peer1.org1.example.com | 00000010 ad 89 66 54 97 b1 c1 e8 c1 19 5a 44 5b a8 5a 8d |..fT......ZD[.Z.| +peer1.org1.example.com | 00000020 5e 6b a5 91 98 02 20 72 b3 d0 3c 6c 56 ab 6b 7d |^k.... r.. DEBU 0xc0044f8eb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2248 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8eb0 gate 1589998857196808800 evaluation succeeds +peer1.org1.example.com | [2249 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [224a 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [224b 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [224c 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [224d 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [224e 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [224f 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2250 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2251 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2252 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2253 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2254 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2255 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2256 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2257 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2258 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2259 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [225a 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > alive: alive: +peer1.org1.example.com | [225b 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [225c 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [225d 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [225e 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816102D +peer1.org1.example.com | [225f 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AD066EF05D5A1A16B7CD74724150DB79D8E868BFE78D16C37A9DEB987EB9AFF5 +peer1.org1.example.com | [2260 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2261 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2262 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2263 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2264 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2265 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2266 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2267 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2268 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2269 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [226a 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [21ef 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4d40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21f0 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4d40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [21f1 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4d40 principal matched by identity 0 +peer0.org2.example.com | [21f2 05-20 18:20:48.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [21f3 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [21f4 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4d40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21f5 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4d40 gate 1589998848178616300 evaluation succeeds +peer0.org2.example.com | [21f6 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21f7 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21f8 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [21f9 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21fa 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [21fb 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [21fd 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21fe 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21ff 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2200 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2201 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2202 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2203 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2204 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4630 gate 1589998848186263400 evaluation starts +peer0.org2.example.com | [2205 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4630 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2206 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4630 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2207 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2208 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4630 principal evaluation fails +peer0.org2.example.com | [2209 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4630 gate 1589998848186263400 evaluation fails +peer0.org2.example.com | [220a 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [220b 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [220c 05-20 18:20:48.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [220d 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4ba0 gate 1589998848190016600 evaluation starts +peer0.org2.example.com | [220e 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4ba0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [220f 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4ba0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2210 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4ba0 principal matched by identity 0 +peer1.org2.example.com | [22bd 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [22be 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22bf 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22c0 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [22c1 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [22c2 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [22c3 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049476c0 gate 1589998852532750900 evaluation starts +peer1.org2.example.com | [22c4 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049476c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22c5 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049476c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [22c6 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049476c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [22c7 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049476c0 principal evaluation fails +peer1.org2.example.com | [22c8 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049476c0 gate 1589998852532750900 evaluation fails +peer1.org2.example.com | [22c9 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22ca 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22cb 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [22cc 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004947c30 gate 1589998852534706400 evaluation starts +peer1.org2.example.com | [22cd 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004947c30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22ce 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004947c30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [22cf 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004947c30 principal matched by identity 0 +peer1.org2.example.com | [22d0 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [22d1 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [22d2 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004947c30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [22d3 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004947c30 gate 1589998852534706400 evaluation succeeds +peer1.org2.example.com | [22d4 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22d5 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22d6 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [22d7 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22d8 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22d9 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22da 05-20 18:20:52.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [22db 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22dc 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22dd 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [22de 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [22df 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [22e0 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004966e30 gate 1589998852545594300 evaluation starts +peer1.org2.example.com | [22e1 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004966e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22e2 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004966e30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [22e3 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004966e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [22e4 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004966e30 principal evaluation fails +peer1.org2.example.com | [22e5 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004966e30 gate 1589998852545594300 evaluation fails +peer1.org2.example.com | [22e6 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22e7 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22e8 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [22e9 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049673a0 gate 1589998852547860200 evaluation starts +peer1.org2.example.com | [22ea 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049673a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22eb 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049673a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [22ec 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049673a0 principal matched by identity 0 +peer1.org2.example.com | [22ed 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [226b 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [226c 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [226d 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [226e 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [226f 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2270 05-20 18:20:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2271 05-20 18:20:58.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2272 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2273 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2274 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2275 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2276 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2277 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2278 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2279 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [227a 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [227b 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [227c 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [227d 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [227e 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [227f 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045215b0 gate 1589998858715053900 evaluation starts +peer1.org1.example.com | [2280 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045215b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2281 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045215b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2282 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045215b0 principal matched by identity 0 +peer1.org1.example.com | [2283 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 e2 95 d2 b0 95 a4 91 7b 7c 73 6f 04 e7 42 86 |........{|so..B.| +peer1.org1.example.com | 00000010 4b 34 1c 03 4d 62 24 de a3 f2 13 30 73 2a aa 85 |K4..Mb$....0s*..| +peer1.org1.example.com | [2284 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 7d 4d 4e fc d8 96 fe 27 b7 27 |0E.!..}MN....'.'| +peer1.org2.example.com | [22ee 05-20 18:20:52.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [22ef 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049673a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [22f0 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049673a0 gate 1589998852547860200 evaluation succeeds +peer1.org2.example.com | [22f1 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22f2 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22f3 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [22f4 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22f5 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [22f6 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [22f8 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [22f9 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22fa 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [22fb 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [22fc 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fd 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fe 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22ff 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2300 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2301 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2302 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2303 05-20 18:20:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2304 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2305 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2306 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2307 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2308 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2309 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [230a 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [230b 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [230c 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [230d 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [230e 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [230f 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498bd90 gate 1589998852653635600 evaluation starts +peer1.org2.example.com | [2310 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498bd90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2311 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498bd90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2312 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498bd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2313 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498bd90 principal evaluation fails +peer1.org2.example.com | [2314 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498bd90 gate 1589998852653635600 evaluation fails +peer0.org1.example.com | [2145 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2146 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2147 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2148 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2149 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [214a 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [214b 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [214c 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 bc 7d fa e6 d7 bc 86 20 f3 4a 80 d3 37 ed 33 |..}..... .J..7.3| +peer0.org1.example.com | 00000010 10 30 2f b8 1e b7 24 c5 62 79 d1 9e b8 b8 50 ac |.0/...$.by....P.| +peer0.org1.example.com | [214d 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 56 eb 8c f1 e0 38 a8 e4 33 8f |0E.!..V....8..3.| +peer1.org1.example.com | 00000010 93 ca c7 40 04 af 4f c4 52 0c d7 2c 4d b1 b6 da |...@..O.R..,M...| +peer1.org1.example.com | 00000020 68 84 c4 fc c2 02 20 1e df 06 61 02 f2 08 4f 52 |h..... ...a...OR| +peer1.org1.example.com | 00000030 cc 1f fc 75 9e d0 8d 25 78 1e d4 72 1d f6 71 fe |...u...%x..r..q.| +peer1.org1.example.com | 00000040 81 f0 4c e3 78 dd 29 |..L.x.)| +peer1.org1.example.com | [2285 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045215b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2286 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045215b0 gate 1589998858715053900 evaluation succeeds +peer1.org1.example.com | [2287 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2288 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2289 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [228a 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [228b 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [228c 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [228d 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [228e 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [228f 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2290 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2291 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2292 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2293 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2294 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2295 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2296 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2297 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2298 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2299 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [229a 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [229b 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [229c 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [229d 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [229e 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [229f 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [22a0 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22a1 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22a2 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22a3 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22a4 05-20 18:20:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22a5 05-20 18:20:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22a6 05-20 18:20:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22a7 05-20 18:20:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22a8 05-20 18:20:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22a9 05-20 18:20:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22aa 05-20 18:20:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22ab 05-20 18:20:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22ac 05-20 18:20:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [22ad 05-20 18:20:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22ae 05-20 18:20:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2211 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [2315 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 24 ab 01 5a ba 89 fb 31 da d7 71 f9 14 af 83 40 |$..Z...1..q....@| +peer1.org1.example.com | [22af 05-20 18:20:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2316 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2317 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [22b0 05-20 18:20:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2318 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a8300 gate 1589998852656754400 evaluation starts +peer1.org1.example.com | [22b1 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [22b2 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2319 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a8300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [231a 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a8300 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [231b 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a8300 principal matched by identity 0 +peer0.org1.example.com | 00000020 7f d3 b8 c0 26 02 20 25 a0 64 d9 c9 29 20 9a 76 |....&. %.d..) .v| +peer0.org1.example.com | 00000030 06 b6 7b 30 31 47 1e ff 51 b1 3c 2d 90 61 ec f5 |..{01G..Q.<-.a..| +peer0.org2.example.com | [2212 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [22b3 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [22b4 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454fd00 gate 1589998858968059900 evaluation starts +peer1.org1.example.com | [22b5 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454fd00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2213 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4ba0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2214 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4ba0 gate 1589998848190016600 evaluation succeeds +peer0.org2.example.com | [2215 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2216 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2217 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2218 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2219 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [221a 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [221b 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [221c 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [221d 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [221e 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [221f 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2220 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2221 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2222 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2223 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2224 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c5ff0 gate 1589998848194126700 evaluation starts +peer0.org2.example.com | [2225 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c5ff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2226 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c5ff0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2227 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c5ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2228 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c5ff0 principal evaluation fails +peer0.org2.example.com | [2229 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c5ff0 gate 1589998848194126700 evaluation fails +peer0.org2.example.com | [222a 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [222b 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [222c 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [222d 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e0560 gate 1589998848198837700 evaluation starts +peer0.org2.example.com | [222e 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e0560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [222f 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e0560 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2230 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e0560 principal matched by identity 0 +peer0.org2.example.com | [2231 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [2232 05-20 18:20:48.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | [231c 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer1.org2.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer1.org2.example.com | [231d 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer1.org2.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer1.org2.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer1.org2.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer1.org2.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer1.org2.example.com | [231e 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a8300 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [231f 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a8300 gate 1589998852656754400 evaluation succeeds +peer1.org2.example.com | [2320 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2321 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2322 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2323 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2324 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2325 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2326 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2327 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2328 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2329 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [232a 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [232b 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [232c 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [232d 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [232e 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [232f 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2330 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2331 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > alive: alive: +peer1.org2.example.com | [2332 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2333 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2334 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2335 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2336 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2337 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2338 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2339 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [233a 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [233b 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [233c 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [233d 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [233e 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [2233 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e0560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2234 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e0560 gate 1589998848198837700 evaluation succeeds +peer0.org2.example.com | [2235 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2236 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2237 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2238 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2239 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223a 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223b 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [223c 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [223d 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [223e 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [223f 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2240 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2241 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1760 gate 1589998848203692800 evaluation starts +peer0.org2.example.com | [2242 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1760 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2243 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1760 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2244 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2245 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1760 principal evaluation fails +peer0.org2.example.com | [2246 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1760 gate 1589998848203692800 evaluation fails +peer0.org2.example.com | [2247 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2248 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2249 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [224a 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1cd0 gate 1589998848205681300 evaluation starts +peer0.org2.example.com | [224b 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1cd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [224c 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1cd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [224d 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1cd0 principal matched by identity 0 +peer0.org2.example.com | [224e 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [224f 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | [22b6 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454fd00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [22b7 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454fd00 principal matched by identity 0 +peer1.org1.example.com | [22b8 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 6b 24 2a 5a a9 0e fc 2c 35 44 de 2d ba 08 b4 |.k$*Z...,5D.-...| +peer1.org1.example.com | 00000010 5d a5 6a 28 ee bd 61 d8 4a d2 e8 d3 a9 eb 6b 02 |].j(..a.J.....k.| +peer1.org1.example.com | [22b9 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf c0 75 b3 f3 7f 8f f4 5d 3b 9b |0E.!...u.....];.| +peer1.org1.example.com | 00000010 e1 3e ce fb b3 a9 50 11 a4 20 dd 41 e2 c9 ef 1a |.>....P.. .A....| +peer1.org1.example.com | 00000020 2b 78 43 79 d8 02 20 12 73 5b f2 9f d1 f8 4b 85 |+xCy.. .s[....K.| +peer1.org1.example.com | 00000030 23 91 28 1f 7f 95 14 09 93 83 92 1d 0d 7f 54 0c |#.(...........T.| +peer1.org1.example.com | 00000040 1f de 4c 17 d0 eb 93 |..L....| +peer1.org1.example.com | [22ba 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454fd00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22bb 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454fd00 gate 1589998858968059900 evaluation succeeds +peer1.org1.example.com | [22bc 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22bd 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22be 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [22bf 05-20 18:20:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22c0 05-20 18:20:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22c1 05-20 18:20:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [22c2 05-20 18:20:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [22c3 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [22c4 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [22c5 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22c6 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22c7 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22c8 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22c9 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22ca 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22cb 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22cc 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22cd 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22ce 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22cf 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d0 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d1 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d2 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d3 05-20 18:20:59.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d4 05-20 18:20:59.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [22d5 05-20 18:20:59.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d6 05-20 18:20:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [22d7 05-20 18:20:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22d8 05-20 18:20:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22d9 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22da 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22db 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22dc 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22dd 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22de 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22df 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22e0 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22e1 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [22e2 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 15 58 9d f8 7d 89 60 dd 94 db 47 24 b1 16 3b |..X..}.`...G$..;| +peer1.org1.example.com | 00000010 6e 4b ae c7 1e db de 4e 6f d7 1e 59 23 1d 5d 02 |nK.....No..Y#.].| +peer1.org1.example.com | [22e3 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 85 0e 74 ba bb a2 a2 f1 66 17 db |0D. M..t.....f..| +peer1.org1.example.com | 00000010 4e 03 b1 fa d3 41 4c 12 39 76 b3 5a 7f 74 dc 09 |N....AL.9v.Z.t..| +peer1.org1.example.com | 00000020 c4 1b 78 44 02 20 52 d1 f5 87 ed 9e 1a ec 7c d5 |..xD. R.......|.| +peer1.org1.example.com | 00000030 47 c2 6d af b9 2d 9c 87 0c 83 ff 21 65 1b 66 82 |G.m..-.....!e.f.| +peer1.org1.example.com | 00000040 84 9c 7c cf 9b 71 |..|..q| +peer1.org1.example.com | [22e5 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 ad 76 0b 27 f5 52 ce |.v.'.R.| +peer0.org1.example.com | [214e 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [214f 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2150 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2151 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2152 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2153 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2154 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2155 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2156 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2157 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2158 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2159 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [215a 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215b 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [233f 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2340 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2341 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2342 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2343 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2344 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2345 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2346 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2347 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2348 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer1.org2.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer1.org2.example.com | [2349 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer1.org2.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer1.org2.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer1.org2.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer1.org2.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer1.org2.example.com | [234a 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [234b 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f cb 88 1a 03 26 d1 53 d6 00 aa 60 |0D. o....&.S...`| +peer1.org2.example.com | 00000010 72 74 06 4d a3 5f 2a 21 1a 0f 63 e5 b1 dd 08 74 |rt.M._*!..c....t| +peer1.org2.example.com | 00000020 ce 6f 91 66 02 20 5f d1 3d 1a ec 58 d8 b6 27 71 |.o.f. _.=..X..'q| +peer1.org2.example.com | 00000030 00 ce b0 29 7b 6f 32 51 b9 46 cf 31 52 83 cd 5f |...){o2Q.F.1R.._| +peer1.org2.example.com | 00000040 6d 9d 8d 68 c7 5e |m..h.^| +peer1.org2.example.com | [234c 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [234d 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [234e 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [234f 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2350 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2351 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2352 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2353 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [2354 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2355 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2356 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2357 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2358 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2359 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [235a 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [235b 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [235c 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22e6 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [22e7 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [22e8 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [22e9 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [22ea 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22eb 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22ec 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22e4 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22ed 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22ee 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22ef 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22f0 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [22f1 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22f2 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [22f3 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22f4 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22f5 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22f6 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22f7 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22f8 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22fa 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22f9 05-20 18:20:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22fb 05-20 18:20:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22fc 05-20 18:20:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22fd 05-20 18:20:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22fe 05-20 18:20:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22ff 05-20 18:20:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2300 05-20 18:20:59.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2301 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2302 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2303 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215c 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [215d 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [215e 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [215f 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2160 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2161 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2162 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2163 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2164 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2165 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2166 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2167 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2168 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2169 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [216a 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [216b 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [216c 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [216d 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [216e 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [216f 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2170 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2171 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2172 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2173 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2174 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2175 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2176 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2177 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2178 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2179 05-20 18:20:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [217a 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [217b 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [217c 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [217d 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [217e 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [217f 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer0.org1.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer0.org1.example.com | [2180 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer0.org1.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer0.org1.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer0.org1.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer0.org1.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer0.org1.example.com | [2181 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2182 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 83 e2 9b 56 0f d6 46 69 be 86 75 |0D. +...V..Fi..u| +peer0.org1.example.com | 00000010 8a 59 bc c6 c8 9e 08 86 48 4b 9d 4b a1 8a 3a 6d |.Y......HK.K..:m| +peer0.org1.example.com | 00000020 2e de c4 29 02 20 6d 05 aa 5f ea 13 30 2c a8 f8 |...). m.._..0,..| +peer0.org1.example.com | 00000030 fd 30 36 c8 4c ca ec 9f 2f 13 41 a3 39 9a e0 67 |.06.L.../.A.9..g| +peer0.org1.example.com | 00000040 cc 0d ea b5 5f 5d |...._]| +peer0.org1.example.com | [2183 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [2184 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [2185 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2186 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2187 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2188 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2189 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [218a 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [218b 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [218c 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [218d 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [218e 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [218f 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [2190 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2191 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2192 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2193 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2194 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2195 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2196 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2197 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2198 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2199 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [219a 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [219b 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [219c 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [219d 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [219e 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 gate 1589998848713660700 evaluation starts +peer0.org1.example.com | [219f 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [21a0 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [21a1 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 principal matched by identity 0 +peer0.org1.example.com | [21a2 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 0e dd a6 56 1e 33 8c 33 07 b2 7a 2f 48 df 21 |....V.3.3..z/H.!| +peer0.org1.example.com | 00000010 43 b0 83 26 19 b6 bd 8b a0 f4 64 a9 a2 55 3f 1d |C..&......d..U?.| +peer0.org1.example.com | [21a3 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c5 bb 02 1c 00 96 e2 f1 3a b7 21 |0D. =........:.!| +peer0.org1.example.com | 00000010 c8 f0 e1 da 60 d2 fa a9 08 03 da d6 9b 56 be 3a |....`........V.:| +peer0.org1.example.com | 00000020 44 69 b8 9f 02 20 57 d6 1b 15 c4 f9 7a 32 05 1d |Di... W.....z2..| +peer0.org1.example.com | 00000030 d4 2b e2 a9 17 9f 00 6b bd 25 70 40 e2 b3 1c e8 |.+.....k.%p@....| +peer0.org1.example.com | 00000040 47 ee 39 68 42 d1 |G.9hB.| +peer0.org1.example.com | [21a4 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [21a5 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 gate 1589998848713660700 evaluation succeeds +peer0.org1.example.com | [21a6 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21a7 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21a8 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [21a9 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [21aa 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21ab 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [21ac 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [21ad 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [21ae 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [21af 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21b0 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b2 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b3 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b1 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21b4 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b5 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21b6 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b7 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21b8 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21b9 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21ba 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21bb 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21bc 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21bd 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21be 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21bf 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21c0 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21c1 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21c2 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21c3 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21c4 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21c5 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21c6 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21c7 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21c8 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21c9 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ca 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21cb 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21cc 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21cd 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21ce 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21cf 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d0 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d1 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d2 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d3 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [21d4 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21d5 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [21d6 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21d7 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [21d8 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21d9 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [21da 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21db 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21dc 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21dd 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21df 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21de 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [21e0 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21e1 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [21e4 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [21e2 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21e3 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21e5 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [21e6 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21e7 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21e8 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21e9 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ea 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2304 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2305 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2306 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2307 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2308 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2309 05-20 18:20:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [230a 05-20 18:20:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [230b 05-20 18:20:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [230c 05-20 18:20:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [230d 05-20 18:20:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [230e 05-20 18:20:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [230f 05-20 18:20:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2310 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2311 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2312 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2313 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2314 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2315 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2316 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2317 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2318 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2319 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [231a 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [231b 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [231c 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [231d 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [231e 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [231f 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org1.example.com | [2320 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2322 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2321 05-20 18:20:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org1.example.com | [2323 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c3250 gate 1589998859863936500 evaluation starts +peer1.org1.example.com | [2325 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c3250 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2326 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c3250 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2327 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c3250 principal matched by identity 0 +peer1.org1.example.com | [2328 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2329 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2324 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer1.org1.example.com | [232a 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c3250 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [232b 05-20 18:20:59.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c3250 gate 1589998859863936500 evaluation succeeds +peer1.org1.example.com | [232c 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [232d 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [232e 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [232f 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2330 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2331 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2332 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2333 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2334 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2335 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2336 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2337 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2338 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6510 gate 1589998859872259800 evaluation starts +peer1.org1.example.com | [2339 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [233a 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6510 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [233b 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6510 principal matched by identity 0 +peer1.org1.example.com | [233c 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [233d 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [235e 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [235f 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2360 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2361 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2362 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2363 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2364 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2365 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2366 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2367 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2368 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2369 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [236a 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [236b 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [236c 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [236d 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [236e 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [236f 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2370 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2371 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2372 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db9d0 gate 1589998853032871800 evaluation starts +peer1.org2.example.com | [2373 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db9d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2374 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db9d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2375 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2376 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db9d0 principal evaluation fails +peer1.org2.example.com | [2377 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db9d0 gate 1589998853032871800 evaluation fails +peer1.org2.example.com | [2378 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2379 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [237a 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [237b 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbf40 gate 1589998853041163300 evaluation starts +peer1.org2.example.com | [237c 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbf40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [237d 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbf40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [237e 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbf40 principal matched by identity 0 +peer1.org2.example.com | [237f 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +peer1.org2.example.com | 00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +peer1.org2.example.com | [2380 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +peer1.org2.example.com | 00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +peer1.org2.example.com | 00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +peer1.org2.example.com | 00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU 0xc0049dbf40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2382 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dbf40 gate 1589998853041163300 evaluation succeeds +peer1.org2.example.com | [2383 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2384 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2385 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2386 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2387 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2388 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2389 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [238a 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [238b 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [238c 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [238d 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [238e 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [238f 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [233e 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6510 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [233f 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6510 gate 1589998859872259800 evaluation succeeds +peer1.org1.example.com | [2340 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2341 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2342 05-20 18:20:59.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2343 05-20 18:20:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2344 05-20 18:20:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2345 05-20 18:20:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2346 05-20 18:20:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2347 05-20 18:20:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2348 05-20 18:20:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2349 05-20 18:20:59.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [234a 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [234b 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [234c 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [234d 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [234e 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [234f 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e7960 gate 1589998859892168000 evaluation starts +peer1.org1.example.com | [2350 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e7960 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2351 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e7960 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2352 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e7960 principal matched by identity 0 +peer1.org1.example.com | [2353 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2354 05-20 18:20:59.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0045e7960 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2356 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e7960 gate 1589998859892168000 evaluation succeeds +peer1.org1.example.com | [2357 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2358 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2359 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [235a 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [235b 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [235c 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [235d 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [235e 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [235f 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2360 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2361 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2362 05-20 18:20:59.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2363 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2364 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2365 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2366 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2367 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004601940 gate 1589998859910331600 evaluation starts +peer1.org1.example.com | [2368 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004601940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2369 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004601940 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [236a 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004601940 principal matched by identity 0 +peer1.org1.example.com | [236b 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [236c 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [236d 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004601940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [236e 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004601940 gate 1589998859910331600 evaluation succeeds +peer1.org1.example.com | [236f 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2370 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2371 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2372 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2373 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2374 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2375 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2376 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2377 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2390 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2391 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2392 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2393 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\001\270+\303\220\002 \036\236/A\302Joc\244O alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > alive: +peer1.org2.example.com | [2394 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2395 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2396 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2397 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2398 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2399 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [239a 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [239b 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [239c 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [239d 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [239e 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [239f 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a0 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23a1 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a2 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23a3 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a4 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a5 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a6 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23a7 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [21eb 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21ec 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ed 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [21ee 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [21ef 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21f0 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [21f1 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [21f2 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21f3 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [21f4 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [21f5 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [21f6 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [21f7 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [21f8 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [21f9 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 gate 1589998848891110000 evaluation starts +peer0.org1.example.com | [21fa 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [21fb 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [21fc 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 principal matched by identity 0 +peer0.org1.example.com | [21fd 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer0.org1.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer0.org1.example.com | [21fe 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer0.org1.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer0.org1.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer0.org1.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer0.org1.example.com | 00000040 89 09 92 92 88 98 |......| +peer0.org1.example.com | [21ff 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2200 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 gate 1589998848891110000 evaluation succeeds +peer0.org1.example.com | [2201 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2202 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2203 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2204 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2205 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2206 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2207 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2208 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2209 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [220a 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [220b 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [220c 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [220d 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [220e 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [220f 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2210 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2211 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2212 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2213 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2214 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2215 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2216 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2217 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2218 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2219 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [221a 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [221b 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [221c 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [221d 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [221e 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [221f 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2220 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2221 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 gate 1589998848938202100 evaluation starts +peer0.org1.example.com | [2222 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2223 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2224 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 principal matched by identity 0 +peer0.org1.example.com | [2225 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 84 b7 05 0e 5f 05 e1 de 17 51 80 b6 87 3c af | ...._....Q...<.| +peer0.org1.example.com | 00000010 f2 59 4e 93 ea d1 42 e2 f4 ab fb 8f 3c 75 1f 47 |.YN...B..... DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 54 18 8a 70 ef a2 dd 21 73 |0E.!...T..p...!s| +peer0.org1.example.com | 00000010 5a 3d 3b aa 4b 47 ac 6e e8 3f c7 84 3a 72 e9 10 |Z=;.KG.n.?..:r..| +peer0.org1.example.com | 00000020 74 71 94 62 0f 02 20 06 bf 32 71 81 42 80 25 a4 |tq.b.. ..2q.B.%.| +peer0.org1.example.com | 00000030 cd b7 1a a9 8a 88 10 71 d0 99 52 97 cd d0 7c 9b |.......q..R...|.| +peer0.org1.example.com | 00000040 b3 75 80 f1 f2 e9 9b |.u.....| +peer0.org1.example.com | [2227 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2228 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 gate 1589998848938202100 evaluation succeeds +peer0.org1.example.com | [2229 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2250 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1cd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2251 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1cd0 gate 1589998848205681300 evaluation succeeds +peer0.org2.example.com | [2252 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2253 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2254 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2378 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2379 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [237a 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [237b 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [237c 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [237d 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [237e 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cd90 gate 1589998859916693600 evaluation starts +peer1.org1.example.com | [237f 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cd90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2380 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cd90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2381 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cd90 principal matched by identity 0 +peer1.org1.example.com | [2382 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2383 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2384 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cd90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2385 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461cd90 gate 1589998859916693600 evaluation succeeds +peer1.org1.example.com | [2386 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2387 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2388 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2389 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [238a 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [238b 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [238c 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [238d 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [238e 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [238f 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2390 05-20 18:20:59.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2391 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2392 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2393 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2394 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463e680 gate 1589998859920252600 evaluation starts +peer1.org1.example.com | [2395 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463e680 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2396 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463e680 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2397 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463e680 principal matched by identity 0 +peer1.org1.example.com | [2398 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2399 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00463e680 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [239b 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463e680 gate 1589998859920252600 evaluation succeeds +peer1.org1.example.com | [239c 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [239d 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [239e 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [239f 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23a0 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [23a1 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [23a2 05-20 18:20:59.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23a3 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [23a4 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [23a5 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a6 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a7 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a8 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23a9 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [23aa 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [23ab 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23ac 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23ad 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23ae 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23af 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [23b0 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [23b1 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [23b3 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [23b2 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [23b4 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23b5 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [23b6 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [23b7 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [23b8 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [23b9 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ba 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23bb 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [23bc 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [23bd 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23be 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [23bf 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [23c0 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [23c1 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23c2 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [23c3 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [23c4 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [23c5 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23c6 05-20 18:21:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23c7 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23c8 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [23c9 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23ca 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23cb 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [23cc 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [23cd 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ce 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a8 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a9 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23aa 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [23ab 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [23ac 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23ad 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [23ae 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161029 +peer1.org2.example.com | [23af 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E6D6903EF2AABC5BA680FBFC9B45697AF76CEA99C0591F0996BF9ECA2B1E53B6 +peer1.org2.example.com | [23b0 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [23b1 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [23b2 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [23b3 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [23b4 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23b5 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [23b6 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23b7 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [23b8 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [23b9 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23ba 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [23bb 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23bc 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [23bd 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23be 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [222a 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [222b 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2255 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2256 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2257 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2259 05-20 18:20:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [225a 05-20 18:20:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [225b 05-20 18:20:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [225c 05-20 18:20:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [225d 05-20 18:20:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [225e 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [225f 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2260 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2261 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2262 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2263 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2264 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2265 05-20 18:20:48.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2266 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2267 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2268 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2269 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [226a 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [226b 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [226c 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23cf 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [23d0 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23d1 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [23d2 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816102E +peer1.org1.example.com | [23d3 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F14C9B0B9DC06AC367FBA572D6C98992C5F449A14B3572EA8460ECDD6377095 +peer1.org1.example.com | [23d4 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [23d5 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [23d6 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [23d7 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23d8 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [23d9 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [23da 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23db 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [23dc 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [23dd 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23de 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [23df 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23e0 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [23e1 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23e2 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [23e3 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [23e4 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23e5 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [23e6 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [23e7 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer1.org1.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer1.org1.example.com | [23e8 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer1.org1.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer1.org1.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer1.org1.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer1.org1.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer1.org1.example.com | [23e9 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23ea 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23eb 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ec 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ed 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [23ee 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ef 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [23f0 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [23f1 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [23f2 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [23f3 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer1.org1.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer1.org1.example.com | [23f4 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer1.org1.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer1.org1.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer1.org1.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer1.org1.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer1.org1.example.com | [23f5 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [23f6 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 7b 40 97 64 c9 7c fc 4f 4f 59 90 |0D. 6{@.d.|.OOY.| +peer1.org1.example.com | 00000010 27 0c f2 46 a3 cf 27 a5 92 5b 0c 9e 10 77 95 45 |'..F..'..[...w.E| +peer1.org1.example.com | 00000020 c8 c3 a7 69 02 20 70 0e 7f b5 8a d2 af e9 89 55 |...i. p........U| +peer1.org1.example.com | 00000030 cb 00 f8 67 6c d2 f3 f7 ee e9 86 ba d7 e9 17 47 |...gl..........G| +peer1.org1.example.com | 00000040 a5 59 55 ab 85 9b |.YU...| +peer1.org1.example.com | [23f7 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [23f8 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [23f9 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23fa 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23fb 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [23fc 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23fd 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [23fe 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer1.org1.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer1.org1.example.com | [23ff 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer1.org1.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer1.org1.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer1.org1.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer1.org1.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer1.org1.example.com | [2400 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2401 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2402 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2403 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2404 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [2405 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 ff 35 63 e9 ac 6a 31 21 b1 8e 54 3a f5 2d 95 |..5c..j1!..T:.-.| +peer1.org1.example.com | 00000010 12 99 3b c6 f0 b7 d2 4d 23 68 ce 5b e6 02 ab 51 |..;....M#h.[...Q| +peer1.org1.example.com | [2406 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 7e 30 25 95 5b 2d 48 1b 33 1f 56 |0D. f~0%.[-H.3.V| +peer1.org1.example.com | 00000010 44 02 5e 50 67 63 1d 17 70 06 9b bc 9c 0d 9d ab |D.^Pgc..p.......| +peer1.org1.example.com | 00000020 63 37 15 5d 02 20 62 0e 37 85 df 58 b4 58 8f 40 |c7.]. b.7..X.X.@| +peer1.org1.example.com | 00000030 06 19 df a6 ac ad 62 73 be e7 80 89 ce 0f 5c b2 |......bs......\.| +peer1.org1.example.com | 00000040 70 f5 d3 1d b9 a2 |p.....| +peer1.org1.example.com | [2407 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2408 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2409 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [240a 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer0.org2.example.com | [226d 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [226e 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [226f 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2270 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2271 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a226c0 gate 1589998848385111700 evaluation starts +peer0.org2.example.com | [2272 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a226c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2273 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a226c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2274 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a226c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2275 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a226c0 principal evaluation fails +peer0.org2.example.com | [2276 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a226c0 gate 1589998848385111700 evaluation fails +peer0.org2.example.com | [2277 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2278 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2279 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [227a 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a22c30 gate 1589998848385796400 evaluation starts +peer0.org2.example.com | [227b 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a22c30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [227c 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a22c30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [227d 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a22c30 principal matched by identity 0 +peer0.org2.example.com | [227e 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 bc 7d fa e6 d7 bc 86 20 f3 4a 80 d3 37 ed 33 |..}..... .J..7.3| +peer0.org2.example.com | 00000010 10 30 2f b8 1e b7 24 c5 62 79 d1 9e b8 b8 50 ac |.0/...$.by....P.| +peer0.org2.example.com | [227f 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 56 eb 8c f1 e0 38 a8 e4 33 8f |0E.!..V....8..3.| +peer0.org2.example.com | 00000010 24 ab 01 5a ba 89 fb 31 da d7 71 f9 14 af 83 40 |$..Z...1..q....@| +peer0.org2.example.com | 00000020 7f d3 b8 c0 26 02 20 25 a0 64 d9 c9 29 20 9a 76 |....&. %.d..) .v| +peer0.org2.example.com | 00000030 06 b6 7b 30 31 47 1e ff 51 b1 3c 2d 90 61 ec f5 |..{01G..Q.<-.a..| +peer0.org2.example.com | 00000040 ad 76 0b 27 f5 52 ce |.v.'.R.| +peer0.org2.example.com | [2280 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a22c30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2281 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a22c30 gate 1589998848385796400 evaluation succeeds +peer0.org2.example.com | [2282 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2283 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2284 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2285 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2286 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2287 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2288 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2289 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [228a 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [228b 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [228c 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [228d 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [228e 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [228f 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2290 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2291 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2293 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2292 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2294 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2295 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2296 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2297 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2298 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2299 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [229a 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [229b 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [229c 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [229d 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [229e 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [229f 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a0 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [22a1 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a2 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [22a3 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a4 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [22a5 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22a6 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22a7 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a8 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [22a9 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [22aa 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ab 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ac 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ad 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ae 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22af 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22b0 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [22b1 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22b2 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [22b3 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22b4 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [22b5 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [22b6 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22b7 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [22b8 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22b9 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22ba 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [22bb 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [22bc 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [22bd 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a498a0 gate 1589998848644977500 evaluation starts +peer0.org2.example.com | [22be 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a498a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [22bf 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a498a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [22c0 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a498a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [22c1 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a498a0 principal evaluation fails +peer0.org1.example.com | [222c 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [222d 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [222e 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [222f 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2230 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2231 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2232 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2233 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2234 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2235 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2236 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2237 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2238 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2239 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223a 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223b 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223c 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [223d 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223e 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [223f 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2240 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2241 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2244 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2242 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2243 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2245 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2246 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2247 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2248 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2249 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [224a 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [224b 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [224c 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [224d 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [224e 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161024 +peer0.org1.example.com | [224f 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 10E7B0C98097DDF22009C0E0F963DC2FF69D79A6FC08C5BA2A163DD2A9E99083 +peer0.org1.example.com | [2250 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2251 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2252 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2253 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [2254 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2255 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2256 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2257 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2258 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2259 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [225a 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [225b 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [225c 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [225d 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [225e 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [225f 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2260 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2261 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2262 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161025 +peer0.org1.example.com | [2263 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 990324FFBEC5521A42F8C777AF2264939F1481A442D61F2C0597A0541E841E53 +peer0.org1.example.com | [2264 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2265 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2266 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2267 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2268 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2269 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [226a 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [226b 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [226c 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [226d 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [226e 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [226f 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2270 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2271 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2272 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [2273 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [2274 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2275 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [2276 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2277 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer0.org1.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer0.org1.example.com | [2278 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer0.org1.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer0.org1.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer0.org1.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer0.org1.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer0.org1.example.com | [2279 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [227a 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 9c 79 ea 71 19 fa 17 f3 ab 16 |0E.!...y.q......| +peer0.org1.example.com | 00000010 28 cd a5 6a ed 8f 9b 82 72 86 ec e3 f6 ac e3 57 |(..j....r......W| +peer0.org1.example.com | 00000020 79 ab 3a aa 63 02 20 36 e3 3d 49 f5 82 af 2e 24 |y.:.c. 6.=I....$| +peer0.org1.example.com | 00000030 80 a0 67 75 ca a0 45 ff f9 e7 92 d3 4f 6d 7a 09 |..gu..E.....Omz.| +peer0.org1.example.com | 00000040 24 37 1b 80 97 3b 28 |$7...;(| +peer0.org1.example.com | [227b 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [227c 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [227d 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [227e 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [227f 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2280 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2281 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23bf 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [23c0 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23c1 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [23c2 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [23c3 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [23c4 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23c5 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [23c6 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23c7 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23c8 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [23c9 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [23ca 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23cb 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fa80 gate 1589998853190646700 evaluation starts +peer1.org2.example.com | [23cc 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fa80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23cd 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fa80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [23ce 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fa80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [23cf 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fa80 principal evaluation fails +peer1.org2.example.com | [23d0 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fa80 gate 1589998853190646700 evaluation fails +peer1.org2.example.com | [23d1 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23d2 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23d3 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [23d4 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fff0 gate 1589998853192772700 evaluation starts +peer1.org2.example.com | [23d5 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23d6 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fff0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [23d7 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fff0 principal matched by identity 0 +peer1.org2.example.com | [23d8 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +peer1.org2.example.com | 00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +peer1.org2.example.com | [23d9 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +peer1.org2.example.com | 00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +peer1.org2.example.com | 00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +peer1.org2.example.com | 00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU 0xc004a2fff0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [23db 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a2fff0 gate 1589998853192772700 evaluation succeeds +peer1.org2.example.com | [23dc 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23dd 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23de 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23df 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [23e0 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [23e1 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23e2 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [23e3 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer1.org2.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer1.org2.example.com | [23e4 05-20 18:20:53.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer1.org2.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer1.org2.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer1.org2.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer1.org2.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer1.org2.example.com | [23e5 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [23e6 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23e7 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [23e8 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d6 90 3e f2 aa bc 5b a6 80 fb fc 9b 45 69 7a |...>...[.....Eiz| +peer1.org2.example.com | 00000010 f7 6c ea 99 c0 59 1f 09 96 bf 9e ca 2b 1e 53 b6 |.l...Y......+.S.| +peer1.org2.example.com | [23e9 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 f4 7d 30 51 9c 1a 5f 60 e6 ff |0E.!...}0Q.._`..| +peer1.org2.example.com | 00000010 52 ea cf 2e 54 fe e3 61 d3 fc f1 1c ec de dc 83 |R...T..a........| +peer1.org2.example.com | 00000020 9a e6 80 0d 8a 02 20 3e 07 57 d4 28 98 87 8e 7e |...... >.W.(...~| +peer1.org2.example.com | 00000030 64 88 3a 7a 4c dc dd 28 27 97 d6 5f bc 23 d4 64 |d.:zL..('.._.#.d| +peer1.org2.example.com | 00000040 e7 a7 61 f9 1d fe 41 |..a...A| +peer1.org2.example.com | [23ea 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [23eb 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [23ec 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23ed 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23ee 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23ef 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [23f0 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [23f1 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [23f2 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d6 90 3e f2 aa bc 5b a6 80 fb fc 9b 45 69 7a |...>...[.....Eiz| +peer1.org2.example.com | 00000010 f7 6c ea 99 c0 59 1f 09 96 bf 9e ca 2b 1e 53 b6 |.l...Y......+.S.| +peer1.org2.example.com | [23f3 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 f4 7d 30 51 9c 1a 5f 60 e6 ff |0E.!...}0Q.._`..| +peer1.org2.example.com | 00000010 52 ea cf 2e 54 fe e3 61 d3 fc f1 1c ec de dc 83 |R...T..a........| +peer1.org2.example.com | 00000020 9a e6 80 0d 8a 02 20 3e 07 57 d4 28 98 87 8e 7e |...... >.W.(...~| +peer1.org2.example.com | 00000030 64 88 3a 7a 4c dc dd 28 27 97 d6 5f bc 23 d4 64 |d.:zL..('.._.#.d| +peer1.org2.example.com | 00000040 e7 a7 61 f9 1d fe 41 |..a...A| +peer1.org2.example.com | [23f4 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [23f5 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 90 95 69 ba b0 2c 51 46 2f 07 65 |0D. u..i..,QF/.e| +peer1.org2.example.com | 00000010 55 ec 66 47 c3 bb 66 33 fb f0 61 02 2b 6d 8e 08 |U.fG..f3..a.+m..| +peer1.org2.example.com | 00000020 a6 b1 b4 f2 02 20 62 71 69 b9 ed 4a 20 69 f4 52 |..... bqi..J i.R| +peer1.org2.example.com | 00000030 f2 b7 84 a0 35 16 1b 45 16 ac e9 c0 1e 82 1b 4a |....5..E.......J| +peer1.org2.example.com | 00000040 af 25 87 e4 20 b0 |.%.. .| +peer1.org2.example.com | [23f6 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [23f7 05-20 18:20:53.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [23f8 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23f9 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23fa 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [23fb 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23fc 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [23fd 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d6 90 3e f2 aa bc 5b a6 80 fb fc 9b 45 69 7a |...>...[.....Eiz| +peer1.org2.example.com | 00000010 f7 6c ea 99 c0 59 1f 09 96 bf 9e ca 2b 1e 53 b6 |.l...Y......+.S.| +peer1.org2.example.com | [23fe 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 f4 7d 30 51 9c 1a 5f 60 e6 ff |0E.!...}0Q.._`..| +peer1.org2.example.com | 00000010 52 ea cf 2e 54 fe e3 61 d3 fc f1 1c ec de dc 83 |R...T..a........| +peer1.org2.example.com | 00000020 9a e6 80 0d 8a 02 20 3e 07 57 d4 28 98 87 8e 7e |...... >.W.(...~| +peer1.org2.example.com | 00000030 64 88 3a 7a 4c dc dd 28 27 97 d6 5f bc 23 d4 64 |d.:zL..('.._.#.d| +peer1.org2.example.com | 00000040 e7 a7 61 f9 1d fe 41 |..a...A| +peer1.org2.example.com | [23ff 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2400 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2401 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2402 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2403 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2404 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2405 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2406 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2407 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2408 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2409 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [240a 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a822b0 gate 1589998853216643600 evaluation starts +peer1.org2.example.com | [240b 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a822b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [240c 05-20 18:20:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a822b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [240d 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a822b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [240e 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a822b0 principal evaluation fails +peer1.org2.example.com | [240f 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a822b0 gate 1589998853216643600 evaluation fails +peer1.org2.example.com | [2410 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2411 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2412 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2413 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82820 gate 1589998853221351400 evaluation starts +peer1.org2.example.com | [2414 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82820 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2415 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82820 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2416 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82820 principal matched by identity 0 +peer1.org2.example.com | [2417 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer1.org2.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer1.org2.example.com | [2418 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer1.org2.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer1.org2.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer1.org2.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer1.org2.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer1.org2.example.com | [2419 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82820 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [241a 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a82820 gate 1589998853221351400 evaluation succeeds +peer1.org2.example.com | [241b 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [241c 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [241d 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [241e 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [241f 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2420 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2421 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2422 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer1.org2.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer1.org2.example.com | [2423 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer1.org2.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer1.org2.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer1.org2.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer1.org2.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer1.org2.example.com | [2424 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2425 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2426 05-20 18:20:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2427 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2428 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2429 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [242a 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [242b 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [242c 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [242d 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [242e 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [242f 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2430 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2431 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2432 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a09ea0 gate 1589998853394616300 evaluation starts +peer1.org2.example.com | [2433 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a09ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [240b 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [240c 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [240d 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [240e 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [240f 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22c2 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a498a0 gate 1589998848644977500 evaluation fails +peer0.org2.example.com | [22c3 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [22c4 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [22c5 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [22c6 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49e10 gate 1589998848650141900 evaluation starts +peer0.org2.example.com | [22c7 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49e10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [22c8 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49e10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [22c9 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49e10 principal matched by identity 0 +peer0.org2.example.com | [22ca 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer0.org2.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer0.org2.example.com | [22cb 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer0.org2.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer0.org2.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer0.org2.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer0.org2.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer0.org2.example.com | [22cc 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49e10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [22cd 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a49e10 gate 1589998848650141900 evaluation succeeds +peer0.org2.example.com | [22ce 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22cf 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22d0 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [22d1 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [22d2 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22d3 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [22d4 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [22d5 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [22d6 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [22d7 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22d8 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22d9 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22da 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [22db 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22dc 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22dd 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2282 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2283 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2284 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2285 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2286 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2287 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2288 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2289 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [228a 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [228b 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 gate 1589998849072819500 evaluation starts +peer0.org1.example.com | [228c 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [228d 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [228e 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 principal matched by identity 0 +peer0.org1.example.com | [228f 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer0.org1.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer0.org1.example.com | [2290 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer0.org1.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer0.org1.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer0.org1.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer0.org1.example.com | 00000040 89 09 92 92 88 98 |......| +peer0.org1.example.com | [2291 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2292 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 gate 1589998849072819500 evaluation succeeds +peer0.org1.example.com | [2293 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2294 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2295 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2296 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2297 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2298 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2299 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [229a 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer0.org1.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer0.org1.example.com | [229b 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer0.org1.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer0.org1.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer0.org1.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer0.org1.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer0.org1.example.com | [229c 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [229d 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [229e 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2410 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2411 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2412 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2413 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2414 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2415 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2416 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2417 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2418 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2419 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [241a 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [241b 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [241c 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [241d 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [241e 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [241f 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2420 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2421 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2422 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2423 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2424 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2425 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2426 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd1a0 gate 1589998860885227300 evaluation starts +peer1.org1.example.com | [2427 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd1a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2428 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd1a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2429 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd1a0 principal matched by identity 0 +peer1.org1.example.com | [242a 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer1.org1.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer1.org1.example.com | [242b 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer1.org1.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer1.org1.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer1.org1.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer1.org1.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer1.org1.example.com | [242c 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd1a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [242d 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd1a0 gate 1589998860885227300 evaluation succeeds +peer1.org1.example.com | [242e 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [242f 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2430 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2431 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2432 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2433 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2434 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2435 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2436 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2437 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2438 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2439 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [243a 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [243b 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [243c 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [243d 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [243e 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [243f 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2440 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2441 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\316\373\263\251P\021\244 \335A\342\311\357\032+xCy\330\002 \022s[\362\237\321\370K\205#\221(\037\177\225\024\t\223\203\222\035\r\177T\014\037\336L\027\320\353\223" > alive: +peer1.org1.example.com | [2442 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2434 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a09ea0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2435 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a09ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2436 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a09ea0 principal evaluation fails +peer1.org2.example.com | [2437 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a09ea0 gate 1589998853394616300 evaluation fails +peer1.org2.example.com | [2438 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2439 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [243a 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [243b 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa8410 gate 1589998853398172100 evaluation starts +peer1.org2.example.com | [243c 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa8410 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [243d 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa8410 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [243e 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa8410 principal matched by identity 0 +peer1.org2.example.com | [243f 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 ad b6 db 1e 04 e2 43 0a cf 75 92 d2 07 8c c8 |.......C..u.....| +peer1.org2.example.com | 00000010 4d 26 12 7c b9 76 15 45 22 7a 09 0f 2d ed 63 c0 |M&.|.v.E"z..-.c.| +peer1.org2.example.com | [2440 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 21 60 77 7b b8 cf a6 dd 05 c4 71 |0D. .!`w{......q| +peer1.org2.example.com | 00000010 bf ae f5 e4 1d 85 3c da 32 97 97 cd 27 c0 68 63 |......<.2...'.hc| +peer1.org2.example.com | 00000020 c8 b7 59 4b 02 20 2b 73 e0 7a 00 f3 eb 66 9a 3d |..YK. +s.z...f.=| +peer1.org2.example.com | 00000030 60 b4 a0 67 87 b2 c2 8f b9 ca d0 38 cb b0 c6 76 |`..g.......8...v| +peer1.org2.example.com | 00000040 eb 44 14 d3 1d 41 |.D...A| +peer1.org2.example.com | [2441 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2442 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa8410 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2443 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa8410 gate 1589998853398172100 evaluation succeeds +peer1.org2.example.com | [2444 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2445 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2446 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2447 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2448 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2449 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [244a 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [244b 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [244c 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [244d 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [244e 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [244f 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2450 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2451 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2452 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2453 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2454 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2455 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2456 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2457 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2458 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2459 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [245a 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [245b 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [245c 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [245d 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [245e 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2460 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [245f 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2461 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2462 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2463 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2464 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2465 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2466 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2467 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2468 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2469 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [246a 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [246b 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c f1 57 d9 a7 7f 43 35 30 72 01 71 fe 97 6a 3f |,.W...C50r.q..j?| +peer1.org2.example.com | 00000010 90 a4 86 4c 1d 5f 21 9b 1e 65 db 17 ad 07 b0 48 |...L._!..e.....H| +peer1.org2.example.com | [246c 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 43 b8 68 ef 6b 30 f5 07 d1 d2 |0E.!..C.h.k0....| +peer1.org2.example.com | 00000010 5a 43 40 36 72 6f 84 1b 19 25 a3 86 b5 56 94 34 |ZC@6ro...%...V.4| +peer1.org2.example.com | 00000020 bf f8 2d eb 5b 02 20 4c e3 e3 0f f6 6b dc fa 44 |..-.[. L....k..D| +peer1.org2.example.com | 00000030 15 9e e3 49 f0 d8 3e 20 e4 e6 d8 07 59 d5 0d e1 |...I..> ....Y...| +peer1.org2.example.com | 00000040 f4 51 ed 10 c1 82 b0 |.Q.....| +peer1.org2.example.com | [246d 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [246e 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [246f 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2470 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2471 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2472 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2473 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2474 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2475 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2476 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2477 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2478 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2479 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [247a 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [247b 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22de 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22df 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\302\250\032\252\217\014\265\263\037\357\2064\026TQ\307\263\242\016(Z\241\336\242\372\213\003" > +peer0.org2.example.com | [22e0 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [22e1 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e2 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [22e3 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161025 +peer0.org2.example.com | [22e4 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AC0EDDA6561E338C3307B27A2F48DF2143B0832619B6BD8BA0F464A9A2553F1D +peer0.org2.example.com | [22e5 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [22e6 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [22e7 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [22e8 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [22e9 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ea 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22eb 05-20 18:20:48.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ec 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [22ed 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [22ef 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22f1 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [22ee 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22f0 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22f2 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22f5 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f3 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f4 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f6 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [22f7 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22f8 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [22f9 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22fa 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [22fb 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22fc 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [22fd 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22fe 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [247c 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [247d 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [247e 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [247f 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2480 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2481 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2482 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2483 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2484 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2485 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2486 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2487 05-20 18:20:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2488 05-20 18:20:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816102A +peer1.org2.example.com | [2489 05-20 18:20:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 537365DAF1DA2FB43F711B7E99FE9F4C6F9DF2A66043BA419DB5DF1015E35224 +peer1.org2.example.com | [248a 05-20 18:20:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [248b 05-20 18:20:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [248c 05-20 18:20:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [248d 05-20 18:20:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [248e 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [248f 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2490 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2491 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2492 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2493 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2494 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2495 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2496 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2497 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2498 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2499 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [249a 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [249b 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [249c 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [249d 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [249e 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [249f 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24a0 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [24a1 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [24a2 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [24a3 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [24a4 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [24a5 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [24a6 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd4d0 gate 1589998854019009100 evaluation starts +peer1.org2.example.com | [24a7 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd4d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [24a8 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd4d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [24a9 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [24aa 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd4d0 principal evaluation fails +peer1.org2.example.com | [24ab 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd4d0 gate 1589998854019009100 evaluation fails +peer1.org2.example.com | [24ac 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [24ad 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [24ae 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [24af 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afda40 gate 1589998854019433100 evaluation starts +peer1.org2.example.com | [24b0 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afda40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [24b1 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afda40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [24b2 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afda40 principal matched by identity 0 +peer1.org2.example.com | [24b3 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 59 30 46 a7 c9 92 e4 b2 30 c8 9a e7 8a e1 b4 |.Y0F.....0......| +peer1.org2.example.com | 00000010 7f 89 7f 93 73 56 d4 d9 12 e8 bf 65 5e b7 7b ce |....sV.....e^.{.| +peer1.org2.example.com | [24b4 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 e5 7e bf 58 8c 24 71 31 a6 32 |0E.!...~.X.$q1.2| +peer1.org2.example.com | 00000010 29 1e 4c 65 40 5c d8 e5 d4 f6 a5 2b 09 35 e2 7a |).Le@\.....+.5.z| +peer1.org2.example.com | 00000020 2d 03 6f ae d6 02 20 06 ad c0 58 2e a6 eb 0e 71 |-.o... ...X....q| +peer1.org2.example.com | 00000030 27 ec 5c 5a 66 78 be 46 8f eb 87 14 0e 63 02 c4 |'.\Zfx.F.....c..| +peer1.org2.example.com | 00000040 33 52 74 56 cd 76 37 |3RtV.v7| +peer1.org2.example.com | [24b5 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afda40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [24b6 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afda40 gate 1589998854019433100 evaluation succeeds +peer1.org2.example.com | [24b7 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [24b8 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [24b9 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [24ba 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [24bb 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24bc 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [24bd 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2443 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2444 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2445 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2446 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +peer1.org1.example.com | 00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +peer1.org1.example.com | [2447 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +peer1.org1.example.com | 00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +peer1.org1.example.com | 00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +peer1.org1.example.com | 00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +peer1.org1.example.com | 00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +peer1.org1.example.com | [2448 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [2449 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce e9 ae cf 71 86 0b 98 40 b1 2a |0E.!.....q...@.*| +peer1.org1.example.com | 00000010 5b 89 df 24 63 ac 05 12 53 2e de 2a 71 0a 76 d2 |[..$c...S..*q.v.| +peer1.org1.example.com | 00000020 89 4c 0e 94 5c 02 20 11 59 c3 d3 b9 f1 16 1b af |.L..\. .Y.......| +peer1.org1.example.com | 00000030 ae 05 20 65 f5 cc e1 02 10 53 1f 53 0f 97 24 6f |.. e.....S.S..$o| +peer1.org1.example.com | 00000040 49 d8 42 f3 e6 ed 6e |I.B...n| +peer1.org1.example.com | [244a 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [244b 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [244c 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [244d 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [244e 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [244f 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2450 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2451 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2452 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2453 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2454 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2455 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [2456 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2457 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2458 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2459 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [245a 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [245b 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [245c 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [245d 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [245e 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [229f 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [22a0 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a1 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a2 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a3 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a4 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a5 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a6 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [22a7 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22a8 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22a9 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22aa 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [22ab 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer0.org1.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer0.org1.example.com | [22ac 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer0.org1.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer0.org1.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer0.org1.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer0.org1.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer0.org1.example.com | [22ad 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [22ae 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22af 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22b0 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [22b1 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [22b2 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22b3 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [22b4 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [22b5 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer0.org1.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer0.org1.example.com | [22b6 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer0.org1.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer0.org1.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer0.org1.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer0.org1.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer0.org1.example.com | [22b7 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [22b8 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22b9 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [22ba 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer0.org1.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer0.org1.example.com | [22bb 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer0.org1.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer0.org1.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer0.org1.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer0.org1.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer0.org1.example.com | [22bc 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22bd 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22be 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22bf 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22c0 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [22c1 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [22c2 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22c3 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [22c4 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [22c5 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22c6 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [22c7 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22c8 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22c9 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [22ca 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [22cb 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22cc 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 gate 1589998849216112700 evaluation starts +peer0.org1.example.com | [22cd 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [22ce 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [22cf 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 principal matched by identity 0 +peer0.org1.example.com | [22d0 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer0.org1.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer0.org1.example.com | [22d1 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer0.org1.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer0.org1.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer0.org1.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer0.org1.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer0.org1.example.com | [22d2 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [22d3 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 gate 1589998849216112700 evaluation succeeds +peer0.org1.example.com | [22d4 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22d5 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22d6 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [22d7 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [22d8 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22d9 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [245f 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2460 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2461 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2462 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2463 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2464 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2465 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2466 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2467 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2468 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2469 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [246a 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [246b 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [246c 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [246d 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [246e 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [246f 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2470 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472a050 gate 1589998861192957400 evaluation starts +peer1.org1.example.com | [2471 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472a050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2472 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472a050 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2473 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472a050 principal matched by identity 0 +peer1.org1.example.com | [2474 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 49 b4 94 19 ac 01 e0 9c bf d9 ad 7f 6b dc 81 |.I...........k..| +peer1.org1.example.com | 00000010 91 0f 1a eb 2d d4 8c df 09 9a b6 5a 12 b8 59 e8 |....-......Z..Y.| +peer1.org1.example.com | [2475 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 70 e7 1e d9 c9 83 30 29 6e 49 42 |0D. p.....0)nIB| +peer1.org1.example.com | 00000010 af 5d 2b 71 c7 6f 15 fc ce 10 50 15 7f e2 1b 67 |.]+q.o....P....g| +peer1.org1.example.com | 00000020 f3 04 ae e0 02 20 44 78 31 d6 0d 50 0c ea 5a b2 |..... Dx1..P..Z.| +peer1.org1.example.com | 00000030 b2 90 45 f0 b3 a6 de 01 67 fe 77 95 b2 80 d3 4a |..E.....g.w....J| +peer1.org1.example.com | 00000040 ed b4 ac cf 07 b5 |......| +peer1.org1.example.com | [2476 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472a050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2477 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472a050 gate 1589998861192957400 evaluation succeeds +peer1.org1.example.com | [2478 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2479 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [247a 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [247b 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [247c 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [247d 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [247e 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [247f 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2480 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2481 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2482 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2483 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2484 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2485 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2486 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2487 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2488 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2489 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [248a 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [248b 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [248c 05-20 18:21:03.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [248d 05-20 18:21:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [248e 05-20 18:21:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816102F +peer1.org1.example.com | [248f 05-20 18:21:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4BAB6601C3504D84F5DEF4138B08C074CBB3C521226C2F8086ADF21C0F029E28 +peer1.org1.example.com | [2490 05-20 18:21:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2491 05-20 18:21:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2492 05-20 18:21:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2493 05-20 18:21:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2494 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2495 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2496 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2497 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2498 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2499 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [249a 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [249b 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [249d 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [249c 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [249e 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [249f 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a0 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a1 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [24a2 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24a3 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24a4 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a5 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24a6 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24a7 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a8 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24a9 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [24aa 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ab 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [24ac 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24ad 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24ae 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [24af 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [24b0 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [24b1 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762260 gate 1589998863681942100 evaluation starts +peer1.org1.example.com | [24b2 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [24b3 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762260 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [24b4 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762260 principal matched by identity 0 +peer1.org1.example.com | [24b5 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 79 dd 11 27 ae a5 5c d3 41 99 e1 2d 78 96 fc |dy..'..\.A..-x..| +peer1.org1.example.com | 00000010 02 92 52 d8 37 b0 04 7e c8 20 48 5b 3b e7 01 90 |..R.7..~. H[;...| +peer0.org2.example.com | [22ff 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2300 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2301 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2302 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2303 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2304 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2305 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2306 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2307 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2308 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2309 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [230a 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [230b 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [230c 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [230d 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [230e 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [230f 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2310 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2311 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2312 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2313 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2314 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2315 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2316 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161026 +peer0.org2.example.com | [2317 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 73E896E27F6DD117D78160D891815BDD4E3251CD9BEF13606FEDFD5C4A3C966B +peer0.org2.example.com | [2318 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2319 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [231a 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [231b 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [22da 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [22db 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [22dc 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [22dd 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22de 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22df 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [22e0 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22e1 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22e2 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22e3 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [22e4 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > alive: alive: +peer0.org1.example.com | [22e5 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [22e6 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22e7 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22e8 05-20 18:20:50.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [22e9 05-20 18:20:50.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [22ea 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [22eb 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100B1801 +peer0.org1.example.com | [22ec 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1E523162A5E6B9D6F62547F5DA4ABCDD1FA03F731348B9FD277AD6424FD43E2A +peer0.org1.example.com | [22ed 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [22ee 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22ef 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22f0 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22f1 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22f2 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [22f3 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22f4 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22f5 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [22f6 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22f7 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22f8 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22f9 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [22fa 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [22fc 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22fb 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [22fd 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [231c 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [231d 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [231e 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [231f 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2320 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2321 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2323 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2324 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2322 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2325 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2326 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2327 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2329 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2328 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [232a 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer0.org2.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer0.org2.example.com | [232b 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer0.org2.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer0.org2.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer0.org2.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer0.org2.example.com | 00000040 89 09 92 92 88 98 |......| +peer0.org2.example.com | [232c 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [232d 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb a0 10 bf 6b 55 05 7e aa dd 0a |0E.!.....kU.~...| +peer0.org2.example.com | 00000010 b2 aa 91 dc d0 c9 20 5a 37 48 2c 48 e2 11 2e 36 |...... Z7H,H...6| +peer0.org2.example.com | 00000020 7f 98 1c a9 d7 02 20 79 56 2c f9 40 b9 e9 01 94 |...... yV,.@....| +peer0.org2.example.com | 00000030 a4 e2 8c 0f aa bd 07 5e 4e d1 6e ad 99 56 6c 6b |.......^N.n..Vlk| +peer0.org2.example.com | 00000040 c3 af 45 8a ad 45 13 |..E..E.| +peer0.org2.example.com | [232e 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [232f 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2330 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2331 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2332 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2333 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2334 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [24be 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [24bf 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [24c0 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24c1 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24c2 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24c3 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c4 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c5 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c6 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c7 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c8 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c9 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24ca 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [24cb 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24cc 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24cd 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24ce 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [24cf 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d0 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d1 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d2 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d3 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d4 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d5 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d6 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d7 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d8 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d9 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24da 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [24db 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24dc 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24dd 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24de 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24df 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e0 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e1 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e2 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b6 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a3 40 f1 8c 72 2c 60 aa 44 24 30 |0D. '.@..r,`.D$0| +peer1.org1.example.com | 00000010 92 b2 85 f0 87 e3 d4 91 5f 8a 45 8e d1 26 fa 2f |........_.E..&./| +peer1.org1.example.com | 00000020 ef f6 20 83 02 20 0a 30 d1 82 2e 34 4b 1a 49 27 |.. .. .0...4K.I'| +peer1.org1.example.com | 00000030 db d2 ea c0 a7 d9 c8 c5 5f be 71 cb b7 6d 8a 55 |........_.q..m.U| +peer1.org1.example.com | 00000040 fc 7c bf 1c df c6 |.|....| +peer1.org1.example.com | [24b7 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [24b8 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762260 gate 1589998863681942100 evaluation succeeds +peer1.org1.example.com | [24b9 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24ba 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24bb 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [24bc 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [24bd 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24be 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [24bf 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [24c0 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [24c1 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [24c2 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24c3 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24c4 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24c5 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24c6 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24c7 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24c8 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24c9 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ca 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24cb 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24cc 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [24cd 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ce 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24cf 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d0 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [24d1 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d2 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d3 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d4 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d5 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d6 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d7 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d8 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d9 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22fe 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [22ff 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2300 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2301 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2302 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2303 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2304 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2305 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2306 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2307 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2308 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2309 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [230a 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [230b 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [230c 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [230d 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [230e 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [230f 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2310 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 gate 1589998851617537800 evaluation starts +peer0.org1.example.com | [2311 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2312 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2313 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 principal matched by identity 0 +peer0.org1.example.com | [2314 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2315 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004502490 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2317 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 gate 1589998851617537800 evaluation succeeds +peer0.org1.example.com | [2318 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2319 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [231a 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [231b 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [231c 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [231d 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [231e 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [231f 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2320 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2321 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2322 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2323 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2324 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 gate 1589998851624934600 evaluation starts +peer0.org1.example.com | [2325 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2326 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2327 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 principal matched by identity 0 +peer0.org1.example.com | [2328 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2329 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [232a 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [232b 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 gate 1589998851624934600 evaluation succeeds +peer0.org1.example.com | [232c 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [232d 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [232e 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [232f 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2330 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2331 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2332 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2333 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2334 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24da 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24db 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24dc 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [24dd 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [24de 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [24df 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24e0 05-20 18:21:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24e1 05-20 18:21:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24e2 05-20 18:21:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [24e3 05-20 18:21:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [24e4 05-20 18:21:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24e5 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [24e7 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24e8 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [24e9 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [24ea 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24eb 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ec 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24e6 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [24ed 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24ee 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [24ef 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [24f0 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24f1 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24f2 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [24f3 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [24f4 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [24f5 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a720 gate 1589998863851616000 evaluation starts +peer1.org1.example.com | [24f6 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [24f7 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a720 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [24f8 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a720 principal matched by identity 0 +peer1.org1.example.com | [24f9 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [2335 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2336 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer0.org2.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer0.org2.example.com | [2337 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer0.org2.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer0.org2.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer0.org2.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer0.org2.example.com | 00000040 89 09 92 92 88 98 |......| +peer0.org2.example.com | [2338 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2339 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [233a 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [233b 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [233c 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer0.org2.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer0.org2.example.com | [233d 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer0.org2.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer0.org2.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer0.org2.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer0.org2.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer0.org2.example.com | [233e 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [233f 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2340 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2341 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2342 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2343 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2344 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2345 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2346 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2347 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2348 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb7d0 gate 1589998848908333000 evaluation starts +peer0.org2.example.com | [2349 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb7d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [234a 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb7d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [234b 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [234c 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb7d0 principal evaluation fails +peer0.org2.example.com | [234d 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb7d0 gate 1589998848908333000 evaluation fails +peer0.org2.example.com | [234e 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [234f 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2350 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2351 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbd40 gate 1589998848909927700 evaluation starts +peer0.org2.example.com | [2352 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbd40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2353 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbd40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2354 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbd40 principal matched by identity 0 +peer0.org2.example.com | [2355 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +peer0.org2.example.com | 00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +peer0.org2.example.com | [2356 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +peer0.org2.example.com | 00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +peer0.org2.example.com | 00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU 0xc004adbd40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2358 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbd40 gate 1589998848909927700 evaluation succeeds +peer0.org2.example.com | [2359 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [235a 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [235b 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [235c 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [235d 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [235e 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [235f 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2360 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2361 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2362 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2363 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2364 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2365 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2366 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2367 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2368 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2369 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [236a 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [236b 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00650 gate 1589998848919727800 evaluation starts +peer0.org2.example.com | [236c 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [236d 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00650 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [236e 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [236f 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00650 principal evaluation fails +peer0.org2.example.com | [2370 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00650 gate 1589998848919727800 evaluation fails +peer0.org1.example.com | [2335 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2336 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2337 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2338 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2339 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [233a 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [233b 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 gate 1589998851631591300 evaluation starts +peer0.org1.example.com | [233c 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [233d 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [233e 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 principal matched by identity 0 +peer0.org1.example.com | [233f 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2340 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2341 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2342 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 gate 1589998851631591300 evaluation succeeds +peer0.org1.example.com | [2343 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2344 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2345 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2346 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2347 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2348 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2349 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [234a 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e3 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e4 05-20 18:20:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e5 05-20 18:20:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e6 05-20 18:20:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e7 05-20 18:20:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e8 05-20 18:20:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e9 05-20 18:20:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [24ea 05-20 18:20:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [24eb 05-20 18:20:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24ec 05-20 18:20:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB38816100C1801 +peer1.org2.example.com | [24ed 05-20 18:20:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FED14B12E6BA2A2BB4DD793D47DC080BA5A69E90BB2068E9949F60A0631E7A1B +peer1.org2.example.com | [24ee 05-20 18:20:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [24ef 05-20 18:20:56.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24f0 05-20 18:20:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24f1 05-20 18:20:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24f2 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24f3 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [24f4 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24f5 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [24f7 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24f6 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f8 05-20 18:20:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f9 05-20 18:20:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [24fa 05-20 18:20:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [24fb 05-20 18:20:56.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24fc 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24fd 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24fe 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24ff 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2500 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2501 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2502 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2503 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2504 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2505 05-20 18:20:56.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2506 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2507 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2508 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2509 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [24fa 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00479a720 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [24fc 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a720 gate 1589998863851616000 evaluation succeeds +peer1.org1.example.com | [24fd 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24fe 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24ff 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2500 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2501 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2502 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2503 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2504 05-20 18:21:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2505 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2506 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2507 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2508 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2509 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [250a 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [250b 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [250c 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [250d 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc700 gate 1589998863862572500 evaluation starts +peer1.org1.example.com | [250e 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc700 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [250f 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc700 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2510 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc700 principal matched by identity 0 +peer1.org1.example.com | [2511 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2512 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2513 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc700 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2514 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc700 gate 1589998863862572500 evaluation succeeds +peer0.org1.example.com | [234b 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [234c 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [234d 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [234e 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [234f 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2350 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2351 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 gate 1589998851639869000 evaluation starts +peer0.org1.example.com | [2352 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2353 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2354 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 principal matched by identity 0 +peer0.org1.example.com | [2355 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2356 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00453e3d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2358 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 gate 1589998851639869000 evaluation succeeds +peer0.org1.example.com | [2359 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [235a 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [235b 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [235c 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [235d 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [235e 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [235f 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2360 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2361 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2362 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2363 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2364 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2365 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2366 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2367 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2368 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2369 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [236a 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 gate 1589998851650842300 evaluation starts +peer0.org1.example.com | [236b 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [236c 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [236d 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 principal matched by identity 0 +peer0.org1.example.com | [236e 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [236f 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00453ff10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2371 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 gate 1589998851650842300 evaluation succeeds +peer0.org1.example.com | [2372 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2373 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2374 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2375 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2376 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2377 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2378 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2379 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [237a 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [237b 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [237c 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [237d 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [237e 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [237f 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2380 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2381 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2382 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 gate 1589998851656452100 evaluation starts +peer0.org1.example.com | [2383 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2515 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2516 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2517 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2518 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2519 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [251a 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [251b 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [251c 05-20 18:21:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [251d 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [251e 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [251f 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2520 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2521 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2522 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2523 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2524 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2525 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2526 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2527 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d4880 gate 1589998863877346600 evaluation starts +peer1.org1.example.com | [2528 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d4880 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2529 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d4880 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [252a 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d4880 principal matched by identity 0 +peer1.org1.example.com | [252b 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [252c 05-20 18:21:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [252d 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d4880 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [252e 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d4880 gate 1589998863877346600 evaluation succeeds +peer1.org1.example.com | [252f 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2530 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2531 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2371 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2372 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2373 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2374 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00bc0 gate 1589998848924308800 evaluation starts +peer0.org2.example.com | [2375 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2376 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00bc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2377 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00bc0 principal matched by identity 0 +peer0.org2.example.com | [2378 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +peer0.org2.example.com | 00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +peer0.org2.example.com | [2379 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +peer0.org2.example.com | 00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +peer0.org2.example.com | 00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +peer0.org2.example.com | 00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +peer0.org2.example.com | 00000040 25 6b a6 b5 b0 54 |%k...T| +peer0.org2.example.com | [237a 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00bc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [237b 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00bc0 gate 1589998848924308800 evaluation succeeds +peer0.org2.example.com | [237c 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [237d 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [237e 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [237f 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2380 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2381 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2382 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2383 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +peer0.org2.example.com | 00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +peer0.org2.example.com | [2384 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +peer0.org2.example.com | 00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +peer0.org2.example.com | 00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +peer0.org2.example.com | 00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +peer0.org2.example.com | 00000040 89 09 92 92 88 98 |......| +peer0.org2.example.com | [2385 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2386 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2387 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2388 05-20 18:20:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2389 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +peer0.org2.example.com | 00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +peer0.org2.example.com | [238a 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +peer0.org2.example.com | 00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +peer0.org2.example.com | 00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +peer0.org2.example.com | 00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +peer0.org2.example.com | 00000040 bb a2 00 d5 f6 25 77 |.....%w| +peer0.org2.example.com | [238b 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [238c 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [238d 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [238e 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [238f 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2390 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2391 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2392 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 84 b7 05 0e 5f 05 e1 de 17 51 80 b6 87 3c af | ...._....Q...<.| +peer0.org2.example.com | 00000010 f2 59 4e 93 ea d1 42 e2 f4 ab fb 8f 3c 75 1f 47 |.YN...B..... DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 54 18 8a 70 ef a2 dd 21 73 |0E.!...T..p...!s| +peer0.org2.example.com | 00000010 5a 3d 3b aa 4b 47 ac 6e e8 3f c7 84 3a 72 e9 10 |Z=;.KG.n.?..:r..| +peer1.org2.example.com | [250a 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [250b 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [250c 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [250d 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [250e 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [250f 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2510 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b64fe0 gate 1589998856510798900 evaluation starts +peer1.org2.example.com | [2511 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b64fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2512 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b64fe0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2513 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b64fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2514 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b64fe0 principal evaluation fails +peer1.org2.example.com | [2515 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b64fe0 gate 1589998856510798900 evaluation fails +peer1.org2.example.com | [2516 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2517 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2518 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2519 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65550 gate 1589998856531417300 evaluation starts +peer1.org2.example.com | [251a 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [251b 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65550 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [251c 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65550 principal matched by identity 0 +peer1.org2.example.com | [251d 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [251e 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [251f 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65550 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2520 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65550 gate 1589998856531417300 evaluation succeeds +peer1.org2.example.com | [2521 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2522 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2523 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2524 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2525 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2526 05-20 18:20:56.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2532 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2533 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2534 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2535 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2536 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2537 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2538 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2539 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [253a 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [253b 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d5a80 gate 1589998863884297600 evaluation starts +peer1.org1.example.com | [253c 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d5a80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [253d 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d5a80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [253e 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d5a80 principal matched by identity 0 +peer1.org1.example.com | [253f 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2540 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0047d5a80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2542 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d5a80 gate 1589998863884297600 evaluation succeeds +peer1.org1.example.com | [2543 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2544 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2545 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2546 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2547 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2548 05-20 18:21:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2549 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [254a 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [254b 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [254c 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [254d 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [254e 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [254f 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2550 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2551 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2552 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2553 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eeed0 gate 1589998863901354900 evaluation starts +peer1.org1.example.com | [2554 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eeed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2555 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2556 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eeed0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2557 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eeed0 principal matched by identity 0 +peer1.org1.example.com | [2558 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2559 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [255a 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eeed0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [255b 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eeed0 gate 1589998863901354900 evaluation succeeds +peer1.org1.example.com | [255c 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [255d 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [255e 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [255f 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2560 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2561 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2562 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2563 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2564 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2565 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2566 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2567 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2568 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2569 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [256a 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048167c0 gate 1589998863926593300 evaluation starts +peer1.org1.example.com | [256b 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048167c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [256c 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048167c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [256d 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048167c0 principal matched by identity 0 +peer1.org1.example.com | [256e 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [256f 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0048167c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2571 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048167c0 gate 1589998863926593300 evaluation succeeds +peer1.org1.example.com | [2572 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2573 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2574 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2575 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2576 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2577 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2578 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2579 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [257a 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [257b 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [257c 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [257d 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [257e 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 74 71 94 62 0f 02 20 06 bf 32 71 81 42 80 25 a4 |tq.b.. ..2q.B.%.| +peer0.org2.example.com | 00000030 cd b7 1a a9 8a 88 10 71 d0 99 52 97 cd d0 7c 9b |.......q..R...|.| +peer0.org2.example.com | 00000040 b3 75 80 f1 f2 e9 9b |.u.....| +peer0.org2.example.com | [2394 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2395 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2396 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2397 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2398 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2399 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [239a 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [239b 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [239c 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [239d 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [239e 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [239f 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [23a0 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23a1 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [23a2 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [23a3 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23a4 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [23a5 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23a6 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [23a7 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23a8 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [23a9 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23aa 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [23ab 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [23ac 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [23ad 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23ae 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [23af 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23b0 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [23b1 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23b2 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [23b3 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2384 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2385 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 principal matched by identity 0 +peer0.org1.example.com | [2386 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2387 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2388 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2389 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 gate 1589998851656452100 evaluation succeeds +peer0.org1.example.com | [238a 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [238b 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [238c 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [238d 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [238e 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [238f 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2390 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2391 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2392 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2393 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2394 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2395 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2396 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2397 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [2398 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [2399 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [239a 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [239b 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [239c 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [239d 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [239e 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [239f 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23a0 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [23a1 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [23a2 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a3 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a4 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a5 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23a6 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [23a7 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [23a8 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23a9 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23aa 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23ab 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23ac 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [23ad 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [23ae 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [23af 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [23b0 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23b1 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [23b2 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [23b3 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [23b4 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [23b5 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23b6 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [23b7 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [23b8 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23b9 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [23ba 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [23bb 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer0.org1.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer0.org1.example.com | [23bc 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer0.org1.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer0.org1.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer0.org1.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer0.org1.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer0.org1.example.com | [23bd 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [23be 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c a2 01 ff ed 1d 4b e4 d6 a9 74 34 |0D. <.....K...t4| +peer0.org1.example.com | 00000010 36 97 c9 0b 7d 18 f8 af cc 02 46 16 11 41 b7 5d |6...}.....F..A.]| +peer0.org1.example.com | 00000020 de fa fe 28 02 20 7c 5a 69 f4 0f a9 f8 21 7c cd |...(. |Zi....!|.| +peer0.org1.example.com | 00000030 be 28 16 f8 1b 81 76 4a ac ac 62 14 a1 7c 72 99 |.(....vJ..b..|r.| +peer0.org1.example.com | 00000040 d4 43 f6 67 c6 d4 |.C.g..| +peer0.org1.example.com | [23bf 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [23c0 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [23c1 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [23c2 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [23c3 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [23c4 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23c5 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23c6 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23b4 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [23b5 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [23b6 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23b7 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [23b8 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [23b9 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [23ba 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [23bb 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [23bc 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [23bd 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b412b0 gate 1589998849017869300 evaluation starts +peer0.org2.example.com | [23be 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b412b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23bf 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b412b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [23c1 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b412b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [23c2 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b412b0 principal evaluation fails +peer0.org2.example.com | [23c3 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b412b0 gate 1589998849017869300 evaluation fails +peer0.org2.example.com | [23c4 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23c0 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [23c5 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23c6 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [23c7 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b41820 gate 1589998849031636800 evaluation starts +peer0.org2.example.com | [23c8 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b41820 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23c9 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b41820 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [23ca 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b41820 principal matched by identity 0 +peer0.org2.example.com | [23cb 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 e7 b0 c9 80 97 dd f2 20 09 c0 e0 f9 63 dc 2f |........ ....c./| +peer0.org2.example.com | 00000010 f6 9d 79 a6 fc 08 c5 ba 2a 16 3d d2 a9 e9 90 83 |..y.....*.=.....| +peer0.org2.example.com | [23cc 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 e1 46 e7 30 4c b8 38 dd 25 0e 6f |0D. 1.F.0L.8.%.o| +peer0.org2.example.com | 00000010 24 5c a8 7c 54 7b a0 7c 0d 3c e6 7c a4 8e 3a fe |$\.|T{.|.<.|..:.| +peer0.org2.example.com | 00000020 3c 9d c6 42 02 20 6b 2e 49 ca fb d2 cf fb 44 aa |<..B. k.I.....D.| +peer0.org2.example.com | 00000030 26 ad de b4 a9 30 8c 16 54 54 85 a1 1b 0a 27 93 |&....0..TT....'.| +peer0.org2.example.com | 00000040 d3 0d e9 73 10 ee |...s..| +peer0.org2.example.com | [23cd 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b41820 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [23ce 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b41820 gate 1589998849031636800 evaluation succeeds +peer0.org2.example.com | [23cf 05-20 18:20:49.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [23d0 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [23d1 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [23d2 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2527 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2528 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2529 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [252a 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [252b 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [252c 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [252d 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82750 gate 1589998856547896100 evaluation starts +peer1.org2.example.com | [252e 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [252f 05-20 18:20:56.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82750 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2530 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2531 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82750 principal evaluation fails +peer1.org2.example.com | [2532 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82750 gate 1589998856547896100 evaluation fails +peer1.org2.example.com | [2533 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2534 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2535 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2536 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82cc0 gate 1589998856601879500 evaluation starts +peer1.org2.example.com | [2537 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2538 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82cc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2539 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82cc0 principal matched by identity 0 +peer1.org2.example.com | [253a 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [253b 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [253c 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82cc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [253d 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b82cc0 gate 1589998856601879500 evaluation succeeds +peer1.org2.example.com | [253e 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [253f 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2540 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2541 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2542 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2543 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2545 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2546 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2547 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2548 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2549 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [254a 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [257f 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2580 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2581 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2582 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2583 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2584 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2585 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482c400 gate 1589998863928079200 evaluation starts +peer1.org1.example.com | [2586 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482c400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2587 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482c400 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2588 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482c400 principal matched by identity 0 +peer1.org1.example.com | [2589 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 44 a6 09 a1 27 0f 76 20 b2 32 88 4a b0 60 a4 |.D...'.v .2.J.`.| +peer1.org1.example.com | 00000010 d2 e8 ab 8c 95 60 43 3c 59 d9 cd b5 39 af 00 5e |.....`C DEBU Verify: sig = 00000000 30 45 02 21 00 f1 82 df af 16 73 79 86 19 f5 ae |0E.!......sy....| +peer1.org1.example.com | 00000010 b6 f1 66 55 44 7c 0e 65 50 6e 8f 35 30 de 70 df |..fUD|.ePn.50.p.| +peer1.org1.example.com | 00000020 89 2b e0 a1 15 02 20 36 6c 17 a1 4e 3f 96 2e fe |.+.... 6l..N?...| +peer1.org1.example.com | 00000030 63 04 d4 e2 c3 ac 4f d2 db 35 e1 41 46 74 e6 7b |c.....O..5.AFt.{| +peer1.org1.example.com | 00000040 ab bb 5a bd c6 9e dc |..Z....| +peer1.org1.example.com | [258b 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482c400 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [258c 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482c400 gate 1589998863928079200 evaluation succeeds +peer1.org1.example.com | [258d 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [258e 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [258f 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2590 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2591 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2592 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2593 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2594 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2595 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2596 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2597 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2598 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2599 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [259b 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [259a 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [259c 05-20 18:21:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [259d 05-20 18:21:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [259e 05-20 18:21:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [259f 05-20 18:21:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25a0 05-20 18:21:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a1 05-20 18:21:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a2 05-20 18:21:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a3 05-20 18:21:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a4 05-20 18:21:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a5 05-20 18:21:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a6 05-20 18:21:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [23c7 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [23c8 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23c9 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23ca 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [23cb 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [23cc 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23cd 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > alive: +peer0.org1.example.com | [23ce 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [23cf 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [23d0 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [23d1 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23d2 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23d3 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23d4 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23d5 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23d6 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23d7 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [23d8 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23d9 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [23da 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [23db 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [23dc 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [23dd 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23de 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [23df 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [23e0 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [23e1 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [23e2 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23e3 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [23e4 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [23e5 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [23e6 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [254b 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [254c 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [254d 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [254e 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [254f 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2550 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2551 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9cef0 gate 1589998856615616800 evaluation starts +peer1.org2.example.com | [2552 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9cef0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2553 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9cef0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2554 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9cef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2555 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9cef0 principal evaluation fails +peer1.org2.example.com | [2556 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9cef0 gate 1589998856615616800 evaluation fails +peer1.org2.example.com | [2557 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2558 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2559 05-20 18:20:56.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [255a 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9d460 gate 1589998856620166600 evaluation starts +peer1.org2.example.com | [255b 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9d460 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [255c 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9d460 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [255d 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9d460 principal matched by identity 0 +peer1.org2.example.com | [255e 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [255f 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2560 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9d460 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2561 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9d460 gate 1589998856620166600 evaluation succeeds +peer1.org2.example.com | [2562 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2563 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2564 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2565 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2566 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2567 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a7 05-20 18:21:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a8 05-20 18:21:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23d3 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [23d4 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [23d5 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [23d6 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [23d7 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [23d8 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23d9 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23da 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23db 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [23dc 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [23dd 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23de 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23df 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [23e0 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [23e1 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [23e2 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [23e3 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [23e4 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [23e5 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [23e6 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9670 gate 1589998849067078100 evaluation starts +peer0.org2.example.com | [23e7 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9670 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23e8 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9670 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [23e9 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [23ea 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9670 principal evaluation fails +peer0.org2.example.com | [23eb 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9670 gate 1589998849067078100 evaluation fails +peer0.org2.example.com | [23ec 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23ed 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23ee 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23ef 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23e7 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [23e8 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [23e9 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [23ea 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [23eb 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23ec 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23ed 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [23ee 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [23ef 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [23f0 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23f1 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [23f2 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [23f3 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23f4 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [23f5 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [23f6 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23f7 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23f8 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23f9 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23fa 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23fb 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23fc 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23fd 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 gate 1589998852898930900 evaluation starts +peer0.org1.example.com | [23fe 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23ff 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2400 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 principal matched by identity 0 +peer0.org1.example.com | [2401 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer0.org1.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer0.org1.example.com | [2402 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer0.org1.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer0.org1.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer0.org1.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer0.org1.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer0.org1.example.com | [2403 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2404 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 gate 1589998852898930900 evaluation succeeds +peer0.org1.example.com | [2405 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2406 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2407 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2408 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2409 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [240a 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [240b 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [240c 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [240d 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [240e 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [240f 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2410 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2411 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2412 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2413 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2414 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2568 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2569 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [256a 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [256b 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [256c 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [256d 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [256e 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bba660 gate 1589998856621510400 evaluation starts +peer1.org2.example.com | [256f 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bba660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2570 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bba660 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2571 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bba660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2572 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bba660 principal evaluation fails +peer1.org2.example.com | [2573 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bba660 gate 1589998856621510400 evaluation fails +peer1.org2.example.com | [2574 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2575 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2576 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2577 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbabd0 gate 1589998856622434200 evaluation starts +peer1.org2.example.com | [2578 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbabd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2579 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbabd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [257a 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbabd0 principal matched by identity 0 +peer1.org2.example.com | [257b 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [257c 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [257d 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbabd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [257e 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbabd0 gate 1589998856622434200 evaluation succeeds +peer1.org2.example.com | [257f 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2580 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2581 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2582 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2583 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2584 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2585 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2586 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [2588 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2589 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [258a 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [258b 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [258c 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [258d 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [258e 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [258f 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2590 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2591 05-20 18:20:56.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2592 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2593 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2594 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2595 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2596 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2597 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2598 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2599 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [259a 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [259b 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [259c 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [259d 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [259e 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [259f 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [25a1 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25a2 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25a3 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2b740 gate 1589998856669639400 evaluation starts +peer0.org1.example.com | [2415 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > alive: +peer0.org1.example.com | [2416 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2417 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2418 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2419 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [241a 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161026 +peer0.org1.example.com | [241b 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E0E872408F610EA36EC189974CA5AE1CC044DD8DC73735AC852AAC8A115C57C9 +peer0.org1.example.com | [241c 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [241d 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [241e 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [241f 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2420 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2421 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2422 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2423 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O`\323k\274\257\002 \\\322G<#\314\005\316\327V|\010\226u\347\253]a\260\373\205\031\270\371z\224\031\0105\016\207\n" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2424 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O`\323k\274\257\002 \\\322G<#\314\005\316\327V|\010\226u\347\253]a\260\373\205\031\270\371z\224\031\0105\016\207\n" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2425 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2426 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2427 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2428 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2429 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25a9 05-20 18:21:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [25aa 05-20 18:21:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [25ab 05-20 18:21:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25ac 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [25ad 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25ae 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25af 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25b0 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25b1 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [25b2 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 99 74 be 00 23 99 e7 43 0e 63 30 a3 45 ad da |..t..#..C.c0.E..| +peer1.org1.example.com | 00000010 64 c1 69 6e 6c d5 db b7 41 dc 87 ae cb ec 80 dd |d.inl...A.......| +peer1.org1.example.com | [25b3 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 45 3b 7f 19 bc 1d ee 99 87 ab 76 |0D. RE;........v| +peer1.org1.example.com | 00000010 b6 a5 e7 d4 c8 88 44 1a f1 19 70 26 e0 55 aa 75 |......D...p&.U.u| +peer1.org1.example.com | 00000020 4d c8 e2 bc 02 20 0c 6e be 50 04 b8 a6 02 f6 5b |M.... .n.P.....[| +peer1.org1.example.com | 00000030 3a e2 97 4a 8c 80 73 92 86 e9 14 6d 4c f6 fd 29 |:..J..s....mL..)| +peer1.org1.example.com | 00000040 c8 88 51 48 90 ed |..QH..| +peer1.org1.example.com | [25b4 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25b5 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [25b6 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [25b7 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25b8 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25b9 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [25ba 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [25bb 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25bc 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25bd 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25be 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25bf 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25c0 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25c1 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25c2 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25c3 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25c4 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [25c5 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25c7 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25c6 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25c8 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [23f0 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23f1 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23f2 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23f3 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [23f4 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23f5 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [23f6 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [23f7 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23f8 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [23f9 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23fa 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23fb 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23fc 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [23fd 05-20 18:20:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9be0 gate 1589998849100007000 evaluation starts +peer0.org2.example.com | [23fe 05-20 18:20:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9be0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23ff 05-20 18:20:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9be0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2400 05-20 18:20:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9be0 principal matched by identity 0 +peer0.org2.example.com | [2401 05-20 18:20:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer0.org2.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer0.org2.example.com | [2402 05-20 18:20:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer0.org2.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer0.org2.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer0.org2.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer0.org2.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer0.org2.example.com | [2403 05-20 18:20:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9be0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2404 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af9be0 gate 1589998849100007000 evaluation succeeds +peer0.org2.example.com | [2405 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2406 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2407 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2408 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2409 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [240a 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [240b 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [240c 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [240d 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [240e 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [240f 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2410 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2411 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [25a4 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2b740 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25a5 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2b740 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [25a6 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [25a7 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2b740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [25a8 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2b740 principal evaluation fails +peer1.org2.example.com | [25a9 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25aa 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25ab 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [25ac 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [25ad 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [25ae 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe5b0 gate 1589998856671147600 evaluation starts +peer1.org2.example.com | [25af 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25b0 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe5b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [25b1 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [25b2 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe5b0 principal evaluation fails +peer1.org2.example.com | [25b3 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe5b0 gate 1589998856671147600 evaluation fails +peer1.org2.example.com | [25b4 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25b5 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25b6 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [25b7 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfeb20 gate 1589998856672707600 evaluation starts +peer1.org2.example.com | [25b8 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfeb20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25b9 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfeb20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [25ba 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfeb20 principal matched by identity 0 +peer1.org2.example.com | [25bb 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [25bc 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [25bd 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2b740 gate 1589998856669639400 evaluation fails +peer1.org2.example.com | [25be 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfeb20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [25bf 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfeb20 gate 1589998856672707600 evaluation succeeds +peer1.org2.example.com | [25c0 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25c1 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25c2 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25c3 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25c4 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [25c5 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2bcb0 gate 1589998856676279600 evaluation starts +peer1.org2.example.com | [25c6 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2bcb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25c7 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2bcb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [25c8 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2bcb0 principal matched by identity 0 +peer1.org2.example.com | [25c9 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer1.org2.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer1.org2.example.com | [25ca 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer1.org2.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer1.org2.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer1.org2.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer1.org2.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer1.org2.example.com | [25cb 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2bcb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [25cc 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b2bcb0 gate 1589998856676279600 evaluation succeeds +peer1.org2.example.com | [25cd 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25ce 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25cf 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [25d0 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [25d1 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25d2 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [25d3 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [25d4 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [25d5 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [25d6 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [25d7 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [25d8 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25d9 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25da 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25db 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [25dc 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25dd 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25de 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25df 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [25e0 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: \344\346\330\007Y\325\r\341\364Q\355\020\301\202\260" > alive: alive: alive:\020(" > +peer1.org2.example.com | [25e1 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [25e2 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25e3 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25e4 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2412 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2413 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2414 05-20 18:20:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2415 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2417 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2418 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2419 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [241a 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [241b 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2416 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [241c 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [241d 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [241f 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [241e 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2421 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2420 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2422 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2423 05-20 18:20:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2424 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2425 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2426 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2427 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2428 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer0.org2.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer0.org2.example.com | [2429 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer0.org2.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer0.org2.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer0.org2.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer0.org1.example.com | [242a 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [242b 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [242c 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [242d 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [242e 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [242f 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +peer0.org1.example.com | 00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +peer0.org1.example.com | [2430 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +peer0.org1.example.com | 00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +peer0.org1.example.com | 00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +peer0.org1.example.com | 00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [2432 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 06 47 a5 e6 30 2b d3 9c e2 29 |0E.!...G..0+...)| +peer0.org1.example.com | 00000010 b8 72 db a8 dc 03 ba f4 a5 fd 7a 1f 65 ee 23 3e |.r........z.e.#>| +peer0.org1.example.com | 00000020 60 d3 6b bc af 02 20 5c d2 47 3c 23 cc 05 ce d7 |`.k... \.G<#....| +peer0.org1.example.com | 00000030 56 7c 08 96 75 e7 ab 5d 61 b0 fb 85 19 b8 f9 7a |V|..u..]a......z| +peer0.org1.example.com | 00000040 94 19 08 35 0e 87 0a |...5...| +peer0.org1.example.com | [2433 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2434 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2435 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2436 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2437 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2438 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2439 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [243a 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [243b 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [243c 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [243d 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [243e 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [243f 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2440 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2441 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [25c9 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25ca 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25cb 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25cc 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25cd 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25ce 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25cf 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25d0 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [25d1 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [25d2 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25d3 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25d4 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25d5 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25d6 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [25d7 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [25d8 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25d9 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25da 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25db 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25dc 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [25dd 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [25de 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [25df 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [25e1 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [25e2 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25e0 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [25e3 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [25e4 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [25e5 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25e6 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [25e7 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25e9 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [25e8 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [25ea 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [25e5 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [25e6 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25e7 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25e8 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [25e9 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [25ea 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [25eb 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0b9b0 gate 1589998856692890500 evaluation starts +peer1.org2.example.com | [25ec 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0b9b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25ed 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0b9b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [25ee 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0b9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [25ef 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0b9b0 principal evaluation fails +peer1.org2.example.com | [25f0 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0b9b0 gate 1589998856692890500 evaluation fails +peer1.org2.example.com | [25f1 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25f2 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25f3 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [25f4 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bf20 gate 1589998856701968400 evaluation starts +peer1.org2.example.com | [25f5 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bf20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25f6 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bf20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [25f7 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bf20 principal matched by identity 0 +peer1.org2.example.com | [25f8 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [25f9 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [25fa 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bf20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [25fb 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bf20 gate 1589998856701968400 evaluation succeeds +peer1.org2.example.com | [25fc 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25fd 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25fe 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [25ff 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2600 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2601 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2602 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2603 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2604 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2605 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2606 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2607 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2608 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2609 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [260a 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [260b 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [260c 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [260d 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [260e 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [260f 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2610 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2611 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2612 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2613 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2614 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2615 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2616 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2617 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer1.org2.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer1.org2.example.com | [2618 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer1.org2.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer1.org2.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer1.org2.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer1.org2.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer1.org2.example.com | [2619 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [261a 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 4e c7 19 c2 2b f2 51 71 08 ea ef |0D. .N...+.Qq...| +peer1.org2.example.com | 00000010 1e 5a 6b e8 4e 7d b2 7f ab 75 9e 1a da 09 79 ef |.Zk.N}...u....y.| +peer1.org2.example.com | 00000020 7a ae bf 33 02 20 34 b1 46 b9 ee bc 77 bb 30 62 |z..3. 4.F...w.0b| +peer1.org2.example.com | 00000030 8d 47 86 4f 26 6f c2 cd b1 c8 46 6e 45 c0 6b a6 |.G.O&o....FnE.k.| +peer1.org2.example.com | 00000040 da e3 04 6e 08 e6 |...n..| +peer1.org2.example.com | [261b 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [261c 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [261d 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [261e 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [261f 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [25eb 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [25ec 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25ed 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [25ee 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [25ef 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25f0 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [25f1 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [25f2 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25f3 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25f4 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25f5 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [25f6 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25f7 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25f8 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [25f9 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [25fa 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25fb 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [25fc 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [25fd 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25fe 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [25ff 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161030 +peer1.org1.example.com | [2600 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F111DC30A16FE60C75E77862D23B27BCC6C5DD213D68963F732DBDCD03120495 +peer1.org1.example.com | [2601 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2602 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2603 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2604 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2605 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2606 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2607 05-20 18:21:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2608 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2609 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [260a 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [260b 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [260c 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [260d 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [260e 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [260f 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2610 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2611 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2612 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2613 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2614 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer1.org1.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer1.org1.example.com | [2615 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer1.org1.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer1.org1.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer1.org1.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer1.org1.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer1.org1.example.com | [2616 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2617 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2618 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2619 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [261a 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [261b 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [261c 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [261d 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [261e 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [261f 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer1.org1.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer1.org1.example.com | [2620 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer1.org1.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer1.org1.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer1.org1.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer1.org1.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer1.org1.example.com | [2621 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2442 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2443 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 gate 1589998853054534900 evaluation starts +peer0.org1.example.com | [2444 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2445 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2446 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 principal matched by identity 0 +peer0.org1.example.com | [2447 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer0.org1.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer0.org1.example.com | [2448 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer0.org1.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer0.org1.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer0.org1.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer0.org1.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer0.org1.example.com | [2449 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [244a 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 gate 1589998853054534900 evaluation succeeds +peer0.org1.example.com | [244b 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [244c 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [244d 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [244e 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [244f 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2450 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2451 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2452 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +peer0.org1.example.com | 00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +peer0.org1.example.com | [2453 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +peer0.org1.example.com | 00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +peer0.org1.example.com | 00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +peer0.org1.example.com | 00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2455 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2456 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2457 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2458 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer0.org1.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer0.org1.example.com | [2459 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer0.org1.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer0.org1.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer0.org1.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer0.org1.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer0.org1.example.com | [245a 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [245b 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [245c 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [245d 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [245e 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [245f 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2460 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2461 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2462 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2622 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2623 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2624 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2625 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2626 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2627 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2628 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2629 05-20 18:21:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer1.org1.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer1.org1.example.com | [262a 05-20 18:21:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer1.org1.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer1.org1.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer1.org1.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer1.org1.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer1.org1.example.com | [262b 05-20 18:21:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [262c 05-20 18:21:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 8c 2c 1a fe 0e a5 35 3e f7 a6 8f |0D. ..,....5>...| +peer1.org1.example.com | 00000010 b9 d9 d1 5e 28 f6 00 d3 bb fb 14 62 67 97 6a b6 |...^(......bg.j.| +peer1.org1.example.com | 00000020 4f b5 f5 4a 02 20 64 2b 43 19 96 04 38 c7 5c 10 |O..J. d+C...8.\.| +peer1.org1.example.com | 00000030 23 23 b8 f0 b8 a5 21 25 25 b7 2a e4 f6 32 5b f2 |##....!%%.*..2[.| +peer1.org1.example.com | 00000040 da c7 77 a5 67 c9 |..w.g.| +peer1.org1.example.com | [262d 05-20 18:21:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [262e 05-20 18:21:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [262f 05-20 18:21:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2630 05-20 18:21:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2631 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2632 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2633 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2634 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2635 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2636 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2637 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2638 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2639 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [263a 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [263b 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [263c 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [263d 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048bb440 gate 1589998864887291400 evaluation starts +peer1.org1.example.com | [263e 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048bb440 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [263f 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048bb440 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2640 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048bb440 principal matched by identity 0 +peer1.org1.example.com | [2641 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer1.org1.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer1.org1.example.com | [2642 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer1.org1.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer1.org1.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer1.org1.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer1.org1.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer1.org1.example.com | [2643 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048bb440 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2644 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048bb440 gate 1589998864887291400 evaluation succeeds +peer1.org1.example.com | [2645 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2646 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2647 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2648 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2649 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [264a 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [264b 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [264c 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [264d 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [264e 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [264f 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2650 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2651 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [2652 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2653 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2654 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2655 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2656 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2657 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2658 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2659 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [265a 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [265b 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [265c 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [265d 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [265e 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [265f 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\267\240\025\200/\370\206iWG*\211\375(l\254gn\247\342>\232\246\200u\316N\357\002 \031\017I\027\263\222\250M\245z<\340\205\027\342\231\250\364\3136\257\367?V\344\215\t\203\017\237>T" > +peer1.org1.example.com | [2660 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2661 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2662 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2663 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2664 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2665 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2666 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2667 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2668 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2669 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [266a 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [266b 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [266c 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer1.org1.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer1.org1.example.com | [266d 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer1.org1.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer1.org1.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer1.org1.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer1.org1.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer1.org1.example.com | [266e 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [266f 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee c7 f2 87 fc b1 5c 59 0c 33 98 |0E.!.......\Y.3.| +peer1.org1.example.com | 00000010 c2 4d 5a 5f 83 40 bc fc e3 5e a8 4c 1b bc 72 32 |.MZ_.@...^.L..r2| +peer1.org1.example.com | 00000020 05 dc 1e 50 3f 02 20 2e 3f 1d a4 87 df df ba c6 |...P?. .?.......| +peer1.org1.example.com | 00000030 a3 32 d9 63 cb 69 9d 73 91 c8 b6 b5 3c 03 a8 d6 |.2.c.i.s....<...| +peer1.org1.example.com | 00000040 d9 7e 28 4c f5 9d b1 |.~(L...| +peer1.org1.example.com | [2670 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2671 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [2672 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer0.org2.example.com | [242a 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [242b 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 58 65 62 0d 78 64 b8 0d 1c f7 |0E.!..Xeb.xd....| +peer0.org2.example.com | 00000010 24 2b 3f f6 d6 63 0e e2 74 28 e5 04 2b fa 42 36 |$+?..c..t(..+.B6| +peer0.org2.example.com | 00000020 2b d2 2d 3c 7f 02 20 51 97 bc 19 fb 3c 16 53 10 |+.-<.. Q....<.S.| +peer0.org2.example.com | 00000030 d8 81 5b 9f 8b 2c 43 51 4f 0c 23 86 ec ef dc bd |..[..,CQO.#.....| +peer0.org2.example.com | 00000040 71 3d b8 be ae e2 b3 |q=.....| +peer0.org2.example.com | [242c 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [242d 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [242e 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [242f 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2430 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2431 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2432 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2433 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2434 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2435 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2436 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2437 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2438 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" secret_envelope: > alive: +peer0.org2.example.com | [2439 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [243a 05-20 18:20:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [243b 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [243c 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 a5 2c 3c c6 cd 86 e4 03 dd f7 2f de 17 c1 a3 |V.,<......./....| +peer0.org2.example.com | 00000010 ec 8d e0 af da 5a b3 b5 ff ac 30 ad b8 92 98 f3 |.....Z....0.....| +peer0.org2.example.com | [243d 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 77 eb 16 cd c7 9e 71 8a c0 ea de |0D. Rw.....q....| +peer0.org2.example.com | 00000010 a7 a8 d4 6f 69 0b 4e 2a 65 9e ab cc d2 52 c4 82 |...oi.N*e....R..| +peer0.org2.example.com | 00000020 3f e0 07 ba 02 20 3d 1f d1 7e a3 1b 7b 87 26 ab |?.... =..~..{.&.| +peer0.org2.example.com | 00000030 1f df 09 be a2 d2 02 77 73 0c 3b f5 e2 b6 95 dd |.......ws.;.....| +peer0.org2.example.com | 00000040 13 0d e1 4b ae 5c |...K.\| +peer0.org2.example.com | [243e 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [243f 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2440 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2441 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [2442 05-20 18:20:51.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2443 05-20 18:20:51.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [2444 05-20 18:20:51.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2445 05-20 18:20:51.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [2446 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2447 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2620 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2621 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2622 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2623 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [2624 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2625 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2626 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2627 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\020(" > +peer1.org2.example.com | [2628 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2629 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [262a 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [262b 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [262c 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [262d 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [262e 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [262f 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2630 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2631 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2632 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2633 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2634 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2635 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2636 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2637 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2638 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2639 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [263a 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2448 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2449 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [244a 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [244b 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [244c 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [244d 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [244e 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [244f 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2450 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2451 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2452 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2453 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2454 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2455 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2456 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2457 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2458 05-20 18:20:52.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2459 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [245a 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [245b 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [245c 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [245d 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [245e 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [245f 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2460 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2461 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2462 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2463 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2464 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004becfe0 gate 1589998852155649500 evaluation starts +peer0.org2.example.com | [2465 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004becfe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2466 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004becfe0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2467 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004becfe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2468 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004becfe0 principal evaluation fails +peer0.org2.example.com | [2469 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004becfe0 gate 1589998852155649500 evaluation fails +peer0.org2.example.com | [246a 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [246b 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [246c 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [246d 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bed550 gate 1589998852156916500 evaluation starts +peer0.org2.example.com | [246e 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bed550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [246f 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bed550 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2470 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bed550 principal matched by identity 0 +peer0.org2.example.com | [2471 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2472 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2473 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bed550 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2474 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bed550 gate 1589998852156916500 evaluation succeeds +peer0.org2.example.com | [2475 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2476 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2477 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2478 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2479 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [247a 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org1.example.com | [2463 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2464 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2465 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2466 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2467 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2468 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2469 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 gate 1589998853061770800 evaluation starts +peer0.org1.example.com | [246a 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [246b 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [246c 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 principal matched by identity 0 +peer0.org1.example.com | [246d 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer0.org1.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer0.org1.example.com | [246e 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer0.org1.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer0.org1.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer0.org1.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer0.org1.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer0.org1.example.com | [246f 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2470 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 gate 1589998853061770800 evaluation succeeds +peer0.org1.example.com | [2471 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2472 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2473 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2474 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2475 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2476 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2477 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2478 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer0.org1.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer0.org1.example.com | [2479 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer0.org1.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer0.org1.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer0.org1.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer0.org1.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer0.org1.example.com | [247a 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [247b 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [247c 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [247d 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +peer0.org1.example.com | 00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +peer0.org1.example.com | [247e 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +peer0.org1.example.com | 00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +peer0.org1.example.com | 00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +peer0.org1.example.com | 00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [263b 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [263c 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [263d 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [263e 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [263f 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2640 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2641 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78cc0 gate 1589998857030748300 evaluation starts +peer1.org2.example.com | [2642 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2643 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78cc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2644 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2645 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78cc0 principal evaluation fails +peer1.org2.example.com | [2646 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78cc0 gate 1589998857030748300 evaluation fails +peer1.org2.example.com | [2647 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2648 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2649 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [264a 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79230 gate 1589998857033121900 evaluation starts +peer1.org2.example.com | [264b 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [264c 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79230 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [264d 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79230 principal matched by identity 0 +peer1.org2.example.com | [264e 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +peer1.org2.example.com | 00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +peer1.org2.example.com | [264f 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +peer1.org2.example.com | 00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +peer1.org2.example.com | 00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +peer1.org2.example.com | 00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +peer1.org2.example.com | 00000040 45 83 34 c8 b3 15 |E.4...| +peer1.org2.example.com | [2650 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79230 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2651 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79230 gate 1589998857033121900 evaluation succeeds +peer1.org2.example.com | [2652 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2653 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2654 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2655 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2656 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2657 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2658 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2659 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [265a 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [265b 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [265c 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [265d 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [265e 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [265f 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2480 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2481 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2482 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2483 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2484 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2485 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2486 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2487 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2488 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2489 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [248a 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [248b 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [248c 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [248d 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [248e 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [248f 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2490 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2491 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2492 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2493 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2494 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2495 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2496 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2497 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2498 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2499 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [249a 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 gate 1589998853180605600 evaluation starts +peer0.org1.example.com | [249b 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [249c 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [249d 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 principal matched by identity 0 +peer0.org1.example.com | [249e 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d6 90 3e f2 aa bc 5b a6 80 fb fc 9b 45 69 7a |...>...[.....Eiz| +peer0.org1.example.com | 00000010 f7 6c ea 99 c0 59 1f 09 96 bf 9e ca 2b 1e 53 b6 |.l...Y......+.S.| +peer0.org1.example.com | [249f 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 f4 7d 30 51 9c 1a 5f 60 e6 ff |0E.!...}0Q.._`..| +peer0.org1.example.com | 00000010 52 ea cf 2e 54 fe e3 61 d3 fc f1 1c ec de dc 83 |R...T..a........| +peer0.org1.example.com | 00000020 9a e6 80 0d 8a 02 20 3e 07 57 d4 28 98 87 8e 7e |...... >.W.(...~| +peer0.org1.example.com | 00000030 64 88 3a 7a 4c dc dd 28 27 97 d6 5f bc 23 d4 64 |d.:zL..('.._.#.d| +peer0.org1.example.com | 00000040 e7 a7 61 f9 1d fe 41 |..a...A| +peer0.org1.example.com | [24a0 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [24a1 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 gate 1589998853180605600 evaluation succeeds +peer0.org1.example.com | [24a2 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24a3 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24a4 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [24a5 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [24a6 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24a7 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [24a8 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [24a9 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [24aa 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [24ab 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ac 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ad 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ae 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [24af 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24b0 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2673 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2674 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2675 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2676 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2677 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2678 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2679 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [267a 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [267b 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [267c 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\267\240\025\200/\370\206iWG*\211\375(l\254gn\247\342>\232\246\200u\316N\357\002 \031\017I\027\263\222\250M\245z<\340\205\027\342\231\250\364\3136\257\367?V\344\215\t\203\017\237>T" > +peer1.org1.example.com | [267d 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [267e 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [267f 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2680 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2681 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2682 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2683 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2684 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2685 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2686 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2687 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2688 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2689 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [268a 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [268b 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [268c 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [268d 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [268e 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [268f 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2690 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2691 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2692 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2693 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2694 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2695 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2696 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493c040 gate 1589998865197782900 evaluation starts +peer1.org1.example.com | [2697 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493c040 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2698 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493c040 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2699 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493c040 principal matched by identity 0 +peer1.org1.example.com | [269a 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer1.org1.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer1.org1.example.com | [269b 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer1.org1.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer1.org1.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer1.org1.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer1.org1.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer1.org1.example.com | [269c 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493c040 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [269d 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00493c040 gate 1589998865197782900 evaluation succeeds +peer1.org1.example.com | [269e 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [269f 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26a0 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [26a1 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [26a2 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26a3 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [26a4 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [26a5 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [26a6 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [26a7 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26a8 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26a9 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26aa 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [26ab 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26ac 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26ad 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26ae 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [247c 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [247d 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [247e 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [247f 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2480 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2481 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2482 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2483 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0ee40 gate 1589998852161892700 evaluation starts +peer0.org2.example.com | [2484 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0ee40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2485 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0ee40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2486 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0ee40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2487 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0ee40 principal evaluation fails +peer0.org2.example.com | [2488 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0ee40 gate 1589998852161892700 evaluation fails +peer0.org2.example.com | [2489 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [248a 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [248b 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [248c 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f3b0 gate 1589998852164807100 evaluation starts +peer0.org2.example.com | [248d 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f3b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [248e 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f3b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [248f 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f3b0 principal matched by identity 0 +peer0.org2.example.com | [2490 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [2491 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [2492 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f3b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2493 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0f3b0 gate 1589998852164807100 evaluation succeeds +peer0.org2.example.com | [2494 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2495 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2496 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2497 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2498 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2499 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [249a 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [249b 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [249c 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [249d 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2660 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2661 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2662 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2663 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > alive: alive:\020(" > +peer1.org2.example.com | [2664 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2665 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2666 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2667 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2668 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2669 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [266a 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [266b 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [266c 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [266d 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [266e 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [266f 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2670 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2671 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2672 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2673 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2674 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2675 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2676 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2677 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24b1 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24b2 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [24b3 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > alive: alive: +peer0.org1.example.com | [24b4 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [24b5 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24b6 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24b7 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24b8 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2678 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2679 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [267a 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [267b 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [267c 05-20 18:20:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [267d 05-20 18:20:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816102B +peer1.org2.example.com | [267e 05-20 18:20:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C9581CDBC97493B84CE8820A49DC15917F2E440C382F84E5904BC978FECD3B83 +peer1.org2.example.com | [267f 05-20 18:20:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2680 05-20 18:20:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2681 05-20 18:20:57.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2682 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2683 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2685 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2684 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2686 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2687 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2688 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2689 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [268b 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [268c 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [268a 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [268e 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [268d 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [268f 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24b9 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24ba 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [24bb 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 ad b6 db 1e 04 e2 43 0a cf 75 92 d2 07 8c c8 |.......C..u.....| +peer0.org1.example.com | 00000010 4d 26 12 7c b9 76 15 45 22 7a 09 0f 2d ed 63 c0 |M&.|.v.E"z..-.c.| +peer0.org1.example.com | [24bc 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 21 60 77 7b b8 cf a6 dd 05 c4 71 |0D. .!`w{......q| +peer0.org1.example.com | 00000010 bf ae f5 e4 1d 85 3c da 32 97 97 cd 27 c0 68 63 |......<.2...'.hc| +peer0.org1.example.com | 00000020 c8 b7 59 4b 02 20 2b 73 e0 7a 00 f3 eb 66 9a 3d |..YK. +s.z...f.=| +peer0.org1.example.com | 00000030 60 b4 a0 67 87 b2 c2 8f b9 ca d0 38 cb b0 c6 76 |`..g.......8...v| +peer0.org1.example.com | 00000040 eb 44 14 d3 1d 41 |.D...A| +peer0.org1.example.com | [24bd 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24be 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [24bf 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [24c0 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [24c1 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [24c2 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24c3 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24c4 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24c5 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24c6 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24c7 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24c8 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24c9 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ca 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24cb 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24cc 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24cd 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [24ce 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24d0 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [24d1 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24d2 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24cf 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24d3 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24d4 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24d5 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24d6 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24d7 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24d8 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24d9 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24da 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24db 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24dc 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24dd 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [24de 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24df 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [24e0 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [24e1 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [24e2 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [24e3 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [24e4 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [24e5 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 gate 1589998853715869500 evaluation starts +peer0.org1.example.com | [24e6 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [24e7 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [24e8 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 principal matched by identity 0 +peer0.org1.example.com | [24e9 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c f1 57 d9 a7 7f 43 35 30 72 01 71 fe 97 6a 3f |,.W...C50r.q..j?| +peer0.org1.example.com | 00000010 90 a4 86 4c 1d 5f 21 9b 1e 65 db 17 ad 07 b0 48 |...L._!..e.....H| +peer0.org1.example.com | [24ea 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 43 b8 68 ef 6b 30 f5 07 d1 d2 |0E.!..C.h.k0....| +peer0.org1.example.com | 00000010 5a 43 40 36 72 6f 84 1b 19 25 a3 86 b5 56 94 34 |ZC@6ro...%...V.4| +peer0.org1.example.com | 00000020 bf f8 2d eb 5b 02 20 4c e3 e3 0f f6 6b dc fa 44 |..-.[. L....k..D| +peer0.org1.example.com | 00000030 15 9e e3 49 f0 d8 3e 20 e4 e6 d8 07 59 d5 0d e1 |...I..> ....Y...| +peer0.org1.example.com | 00000040 f4 51 ed 10 c1 82 b0 |.Q.....| +peer0.org1.example.com | [24eb 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [24ec 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 gate 1589998853715869500 evaluation succeeds +peer0.org1.example.com | [24ed 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24ee 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24ef 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [24f0 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [24f1 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24f2 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [24f3 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [24f4 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [24f5 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [24f6 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24f7 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24f8 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24f9 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24fa 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24fb 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24fc 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24fd 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24fe 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24ff 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2500 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2501 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2502 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2503 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2504 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2505 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2506 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2507 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2508 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2509 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [250a 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [250b 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [250c 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [250d 05-20 18:20:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [250e 05-20 18:20:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [250f 05-20 18:20:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2510 05-20 18:20:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2511 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2512 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2513 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2514 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2690 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [2691 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2692 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2693 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 1c db c9 74 93 b8 4c e8 82 0a 49 dc 15 91 |.X...t..L...I...| +peer1.org2.example.com | 00000010 7f 2e 44 0c 38 2f 84 e5 90 4b c9 78 fe cd 3b 83 |..D.8/...K.x..;.| +peer1.org2.example.com | [2694 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 1d f6 f9 ce 95 89 bc 1d ea 08 |0E.!............| +peer1.org2.example.com | 00000010 ad 89 66 54 97 b1 c1 e8 c1 19 5a 44 5b a8 5a 8d |..fT......ZD[.Z.| +peer1.org2.example.com | 00000020 5e 6b a5 91 98 02 20 72 b3 d0 3c 6c 56 ab 6b 7d |^k.... r.. DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [2696 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 f1 70 69 84 90 a9 04 a9 f8 1a |0E.!...pi.......| +peer1.org2.example.com | 00000010 d8 4e 5b a6 04 fc 41 42 2e 52 63 fa 25 79 f1 5c |.N[...AB.Rc.%y.\| +peer1.org2.example.com | 00000020 dc 6f d1 08 f9 02 20 6d 8c 84 6d da 5c 9b ff 2b |.o.... m..m.\..+| +peer1.org2.example.com | 00000030 a5 cf f6 bc cb ac de 4d 0a 6a 87 2f 4f 18 a4 0c |.......M.j./O...| +peer1.org2.example.com | 00000040 f9 b3 23 22 d5 b1 2d |..#"..-| +peer1.org2.example.com | [2697 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2698 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2699 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [269a 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [269b 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [269c 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [269d 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [269e 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [269f 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 1c db c9 74 93 b8 4c e8 82 0a 49 dc 15 91 |.X...t..L...I...| +peer1.org2.example.com | 00000010 7f 2e 44 0c 38 2f 84 e5 90 4b c9 78 fe cd 3b 83 |..D.8/...K.x..;.| +peer1.org2.example.com | [26a0 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 1d f6 f9 ce 95 89 bc 1d ea 08 |0E.!............| +peer1.org2.example.com | 00000010 ad 89 66 54 97 b1 c1 e8 c1 19 5a 44 5b a8 5a 8d |..fT......ZD[.Z.| +peer1.org2.example.com | 00000020 5e 6b a5 91 98 02 20 72 b3 d0 3c 6c 56 ab 6b 7d |^k.... r.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26a2 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26a3 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26a4 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [26a5 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26af 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\267\240\025\200/\370\206iWG*\211\375(l\254gn\247\342>\232\246\200u\316N\357\002 \031\017I\027\263\222\250M\245z<\340\205\027\342\231\250\364\3136\257\367?V\344\215\t\203\017\237>T" > +peer1.org1.example.com | [26b0 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [26b1 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26b2 05-20 18:21:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [26b3 05-20 18:21:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [26b4 05-20 18:21:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [26b5 05-20 18:21:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [26b6 05-20 18:21:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 32 d5 1b 7a e0 df 02 8c bd 59 83 2d c6 70 88 |.2..z.....Y.-.p.| +peer1.org1.example.com | 00000010 a7 a3 56 09 b9 61 05 ce 09 52 bc b0 ca 5f b8 00 |..V..a...R..._..| +peer1.org1.example.com | [26b7 05-20 18:21:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 a7 e5 2c 8f 0a 6f 1c 00 88 af 7f |0D. 6..,..o.....| +peer1.org1.example.com | 00000010 68 9e 4d 2a 65 6f d9 b4 be 96 ea 23 f1 98 31 06 |h.M*eo.....#..1.| +peer1.org1.example.com | 00000020 e4 70 59 dd 02 20 20 db 42 5f a7 0f 45 f4 91 3c |.pY.. .B_..E..<| +peer1.org1.example.com | 00000030 b9 96 43 5a 06 9a 9e 76 57 ae 66 75 76 4c bb 32 |..CZ...vW.fuvL.2| +peer1.org1.example.com | 00000040 d8 4f a8 ae ad 3b |.O...;| +peer1.org1.example.com | [26b8 05-20 18:21:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26b9 05-20 18:21:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26ba 05-20 18:21:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26bb 05-20 18:21:05.66 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [26bc 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [26bd 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26be 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26bf 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c0 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [26c1 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [26c2 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [26c3 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c4 05-20 18:21:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26c5 05-20 18:21:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26c6 05-20 18:21:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [26c7 05-20 18:21:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [26c8 05-20 18:21:07.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c9 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [26cb 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ca 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [26cc 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26cd 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [26ce 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [26cf 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [26d0 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2515 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2516 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2517 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2518 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2519 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [251a 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [251b 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [251c 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [251d 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 gate 1589998853947226400 evaluation starts +peer0.org1.example.com | [251e 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [251f 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2520 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 principal matched by identity 0 +peer0.org1.example.com | [2521 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 73 65 da f1 da 2f b4 3f 71 1b 7e 99 fe 9f 4c |Sse.../.?q.~...L| +peer0.org1.example.com | 00000010 6f 9d f2 a6 60 43 ba 41 9d b5 df 10 15 e3 52 24 |o...`C.A......R$| +peer0.org1.example.com | [2522 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 a2 4d e0 c2 01 63 32 e0 d5 55 ac |0D. b.M...c2..U.| +peer0.org1.example.com | 00000010 f0 9b d4 e5 64 82 74 86 6e 5e fb bb df 75 d8 bf |....d.t.n^...u..| +peer0.org1.example.com | 00000020 bd 73 b5 1e 02 20 7b 52 4b e1 38 a6 ec 59 18 42 |.s... {RK.8..Y.B| +peer0.org1.example.com | 00000030 07 ec 13 e9 59 8d 8e 2b a3 97 6f a0 f8 78 91 d8 |....Y..+..o..x..| +peer0.org1.example.com | 00000040 fb 04 ed 3e 10 28 |...>.(| +peer0.org1.example.com | [2523 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2524 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 gate 1589998853947226400 evaluation succeeds +peer0.org1.example.com | [2526 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2527 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2525 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2528 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2529 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [252a 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [252b 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [252c 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [252d 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [252e 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [252f 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2530 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2531 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2532 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2533 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2534 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2535 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2536 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2537 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2538 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2539 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [253a 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [253b 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [253c 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [253d 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [253e 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [253f 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2540 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2541 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2542 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2543 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2544 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2545 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2547 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2546 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2548 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2549 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [254a 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161027 +peer0.org1.example.com | [254b 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CD593046A7C992E4B230C89AE78AE1B47F897F937356D4D912E8BF655EB77BCE +peer0.org1.example.com | [254c 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [254d 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [254e 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [254f 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [2550 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2551 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2552 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2553 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2554 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2555 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2556 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [249e 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [249f 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24a0 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [24a1 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [24a2 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [24a3 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2e800 gate 1589998852172488000 evaluation starts +peer0.org2.example.com | [24a4 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2e800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24a5 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2e800 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [24a6 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2e800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [24a7 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2e800 principal evaluation fails +peer0.org2.example.com | [24a8 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2e800 gate 1589998852172488000 evaluation fails +peer0.org2.example.com | [24a9 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [24aa 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [24ab 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [24ac 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ed70 gate 1589998852173828900 evaluation starts +peer1.org1.example.com | [26d1 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d2 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d3 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [26d4 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26d5 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26d6 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [26d7 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [26d8 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [26d9 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049671b0 gate 1589998867850608900 evaluation starts +peer1.org1.example.com | [26da 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049671b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [26db 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049671b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [26dc 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049671b0 principal matched by identity 0 +peer1.org1.example.com | [26dd 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [26de 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [26df 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049671b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [26e0 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049671b0 gate 1589998867850608900 evaluation succeeds +peer1.org1.example.com | [26e1 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26e2 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26e3 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [26e4 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [26e5 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [26e6 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [26e7 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26e8 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26a6 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [26a7 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26a8 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26a9 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [26aa 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [26ab 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [26ac 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd3b80 gate 1589998857214328300 evaluation starts +peer1.org2.example.com | [26ad 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd3b80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26ae 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd3b80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [26af 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd3b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [26b0 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd3b80 principal evaluation fails +peer1.org2.example.com | [26b1 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd3b80 gate 1589998857214328300 evaluation fails +peer1.org2.example.com | [26b2 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26b3 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26b4 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [26b5 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf00f0 gate 1589998857218337600 evaluation starts +peer1.org2.example.com | [26b6 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf00f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26b7 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf00f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [26b8 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf00f0 principal matched by identity 0 +peer1.org2.example.com | [26b9 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +peer1.org2.example.com | 00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +peer1.org2.example.com | [26ba 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +peer1.org2.example.com | 00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +peer1.org2.example.com | 00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +peer1.org2.example.com | 00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +peer1.org2.example.com | 00000040 45 83 34 c8 b3 15 |E.4...| +peer1.org2.example.com | [26bb 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf00f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [26bc 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf00f0 gate 1589998857218337600 evaluation succeeds +peer1.org2.example.com | [26bd 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [26be 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [26bf 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [26c0 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [26c1 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [26c2 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26c3 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [26c4 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer1.org2.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer1.org2.example.com | [26c5 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer1.org2.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer1.org2.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer1.org2.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer1.org2.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer1.org2.example.com | [26c6 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26c7 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26c8 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26c9 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [26ca 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [26cb 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26cc 05-20 18:20:57.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2557 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2558 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2559 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [255a 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [255b 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [255c 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [255d 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [255e 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [255f 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2560 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2561 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2562 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2563 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2564 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2565 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2566 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2567 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2569 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [256a 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [256b 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [256c 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [256d 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2568 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [256e 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [256f 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2570 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2571 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2572 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2573 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 gate 1589998855612660000 evaluation starts +peer0.org1.example.com | [2574 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [26e9 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [26ea 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26eb 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26ec 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [26ed 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [26ee 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [26ef 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498aaa0 gate 1589998867859412500 evaluation starts +peer1.org1.example.com | [26f0 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498aaa0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [26f1 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498aaa0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [26f2 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498aaa0 principal matched by identity 0 +peer1.org1.example.com | [26f3 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [26f4 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00498aaa0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [26f6 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00498aaa0 gate 1589998867859412500 evaluation succeeds +peer1.org1.example.com | [26f7 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26f8 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26f9 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [26fa 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [26fb 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [26fc 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [26fd 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26fe 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [26ff 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2700 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2701 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2702 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2703 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2704 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2705 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2706 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2707 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2708 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b05e0 gate 1589998867862989600 evaluation starts +peer1.org1.example.com | [2709 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b05e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [270a 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b05e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [270b 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b05e0 principal matched by identity 0 +peer1.org1.example.com | [270c 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [270d 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0049b05e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [270f 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b05e0 gate 1589998867862989600 evaluation succeeds +peer1.org1.example.com | [2710 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2711 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2712 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2713 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2714 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2715 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2716 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2717 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2718 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2719 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24ad 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ed70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24ae 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ed70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [24af 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ed70 principal matched by identity 0 +peer0.org2.example.com | [24b0 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [24b1 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [24b2 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ed70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [24b3 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ed70 gate 1589998852173828900 evaluation succeeds +peer0.org2.example.com | [24b4 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24b5 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24b6 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [24b7 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [24b8 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24b9 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24ba 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [24bb 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24bc 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24bd 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [24be 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [24bf 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [24c0 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ff70 gate 1589998852177269300 evaluation starts +peer0.org2.example.com | [24c1 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ff70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24c2 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ff70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [24c3 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ff70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [24c4 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ff70 principal evaluation fails +peer0.org2.example.com | [24c5 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2ff70 gate 1589998852177269300 evaluation fails +peer0.org2.example.com | [24c6 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [24c7 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [24c8 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [24c9 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c4a4e0 gate 1589998852178604100 evaluation starts +peer0.org2.example.com | [24ca 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c4a4e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24cb 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c4a4e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [24cc 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c4a4e0 principal matched by identity 0 +peer0.org2.example.com | [24cd 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [24ce 05-20 18:20:52.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [24cf 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c4a4e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [24d0 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c4a4e0 gate 1589998852178604100 evaluation succeeds +peer0.org2.example.com | [24d1 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24d2 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24d3 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [24d4 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [24d5 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [24d6 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [24d8 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [24d9 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24da 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [24db 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24dc 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24dd 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24de 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [24df 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24e0 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24e1 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [24e2 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [24e3 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [24e4 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70710 gate 1589998852185445100 evaluation starts +peer0.org2.example.com | [24e5 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70710 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24e6 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70710 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [24e7 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [24e8 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70710 principal evaluation fails +peer0.org2.example.com | [24e9 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70710 gate 1589998852185445100 evaluation fails +peer0.org2.example.com | [24ea 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [24eb 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [24ec 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [24ed 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70c80 gate 1589998852189561500 evaluation starts +peer0.org2.example.com | [24ee 05-20 18:20:52.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70c80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24ef 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70c80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [24f0 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70c80 principal matched by identity 0 +peer0.org2.example.com | [24f1 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [24f2 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [24f3 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70c80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [24f4 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c70c80 gate 1589998852189561500 evaluation succeeds +peer0.org2.example.com | [24f5 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24f6 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24f7 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [24f8 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [24f9 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24fa 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24fb 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [24fc 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24fd 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24fe 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [24ff 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2500 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2501 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c71e80 gate 1589998852193891000 evaluation starts +peer0.org2.example.com | [2502 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c71e80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2503 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c71e80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2504 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c71e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2505 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c71e80 principal evaluation fails +peer0.org2.example.com | [2506 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c71e80 gate 1589998852193891000 evaluation fails +peer0.org1.example.com | [2575 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2576 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 principal matched by identity 0 +peer0.org1.example.com | [2577 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2578 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2579 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [257a 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 gate 1589998855612660000 evaluation succeeds +peer0.org1.example.com | [257b 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [257c 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [257d 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [257e 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [257f 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2580 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2581 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2582 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2583 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2584 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2585 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2586 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2587 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2588 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2589 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 gate 1589998855615234500 evaluation starts +peer0.org1.example.com | [258a 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [258b 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [258c 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 principal matched by identity 0 +peer0.org1.example.com | [258d 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [258e 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004745130 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2590 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 gate 1589998855615234500 evaluation succeeds +peer0.org1.example.com | [2591 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2592 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26cd 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [26ce 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26cf 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26d0 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [26d1 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [26d2 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [26d3 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf1e80 gate 1589998857226376500 evaluation starts +peer1.org2.example.com | [26d4 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf1e80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26d5 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf1e80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [26d6 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf1e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [26d7 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf1e80 principal evaluation fails +peer1.org2.example.com | [26d8 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf1e80 gate 1589998857226376500 evaluation fails +peer1.org2.example.com | [26d9 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26da 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26db 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [26dc 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d063f0 gate 1589998857226841800 evaluation starts +peer1.org2.example.com | [26dd 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d063f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26de 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d063f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [26df 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d063f0 principal matched by identity 0 +peer1.org2.example.com | [26e0 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer1.org2.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer1.org2.example.com | [26e1 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer1.org2.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer1.org2.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer1.org2.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer1.org2.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer1.org2.example.com | [26e2 05-20 18:20:57.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d063f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [26e3 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d063f0 gate 1589998857226841800 evaluation succeeds +peer1.org2.example.com | [26e4 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [26e5 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [26e6 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [26e7 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [26e8 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26e9 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26ea 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [26eb 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer1.org2.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer1.org2.example.com | [26ec 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer1.org2.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer1.org2.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer1.org2.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer1.org2.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer1.org2.example.com | [26ed 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26ee 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [271a 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [271b 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [271c 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [271d 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [271e 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [271f 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2720 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ce5c0 gate 1589998867865733300 evaluation starts +peer1.org1.example.com | [2721 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ce5c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2722 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ce5c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2723 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ce5c0 principal matched by identity 0 +peer1.org1.example.com | [2724 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2725 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2726 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ce5c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2727 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ce5c0 gate 1589998867865733300 evaluation succeeds +peer1.org1.example.com | [2728 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2729 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [272a 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [272b 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [272c 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [272d 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [272e 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [272f 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2730 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2731 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2732 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2733 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2593 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2594 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2595 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2596 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2597 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2598 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2599 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [259a 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [259b 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [259c 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [259d 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [259e 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [259f 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25a0 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25a1 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25a2 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 gate 1589998855618307600 evaluation starts +peer0.org1.example.com | [25a3 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25a4 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [25a5 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 principal matched by identity 0 +peer0.org1.example.com | [25a6 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [25a7 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004762c70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25a9 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 gate 1589998855618307600 evaluation succeeds +peer0.org1.example.com | [25aa 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ab 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ac 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25ad 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25ae 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [25af 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [26ef 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [26f0 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 1c db c9 74 93 b8 4c e8 82 0a 49 dc 15 91 |.X...t..L...I...| +peer1.org2.example.com | 00000010 7f 2e 44 0c 38 2f 84 e5 90 4b c9 78 fe cd 3b 83 |..D.8/...K.x..;.| +peer1.org2.example.com | [26f1 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 1d f6 f9 ce 95 89 bc 1d ea 08 |0E.!............| +peer1.org2.example.com | 00000010 ad 89 66 54 97 b1 c1 e8 c1 19 5a 44 5b a8 5a 8d |..fT......ZD[.Z.| +peer1.org2.example.com | 00000020 5e 6b a5 91 98 02 20 72 b3 d0 3c 6c 56 ab 6b 7d |^k.... r.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26f3 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26f4 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26f5 05-20 18:20:57.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26f6 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [26f7 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26f8 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [26f9 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [26fa 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26fb 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [26fc 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26fd 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26fe 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [26ff 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2700 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2701 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1cc50 gate 1589998858352253600 evaluation starts +peer1.org2.example.com | [2702 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1cc50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2703 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1cc50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2704 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1cc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2705 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1cc50 principal evaluation fails +peer1.org2.example.com | [2706 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1cc50 gate 1589998858352253600 evaluation fails +peer1.org2.example.com | [2707 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2708 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2709 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [270a 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1d1c0 gate 1589998858353022800 evaluation starts +peer1.org2.example.com | [270b 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1d1c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2507 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2508 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2509 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [250a 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c843f0 gate 1589998852195584500 evaluation starts +peer0.org2.example.com | [250b 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c843f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [250c 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c843f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [250d 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c843f0 principal matched by identity 0 +peer0.org2.example.com | [250e 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [250f 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2734 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2735 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2736 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2737 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2738 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2739 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [273a 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e4740 gate 1589998867869225900 evaluation starts +peer1.org1.example.com | [273b 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e4740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [273c 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e4740 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [273d 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e4740 principal matched by identity 0 +peer1.org1.example.com | [273e 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [273f 05-20 18:21:07.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2740 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e4740 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2741 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e4740 gate 1589998867869225900 evaluation succeeds +peer1.org1.example.com | [2742 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2743 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2744 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2745 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2746 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2747 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2748 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2749 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [274a 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [274b 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [274c 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [274d 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [274e 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e5940 gate 1589998867871940400 evaluation starts +peer1.org1.example.com | [274f 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e5940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2750 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e5940 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2751 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e5940 principal matched by identity 0 +peer1.org1.example.com | [2752 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2753 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [25b1 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [25b2 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25b3 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25b4 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [25b5 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25b6 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25b7 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25b8 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25b9 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25ba 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 gate 1589998855621455600 evaluation starts +peer0.org1.example.com | [25bb 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25bc 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [25bd 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 principal matched by identity 0 +peer0.org1.example.com | [25be 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [25bf 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [25c0 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25c1 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 gate 1589998855621455600 evaluation succeeds +peer0.org1.example.com | [25c2 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25c3 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25c4 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25c5 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25c6 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25c7 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [25c8 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [25c9 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [25ca 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [25cb 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [25cc 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25cd 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25ce 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [25cf 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25d0 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25d1 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25d2 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25d3 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25d4 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 gate 1589998855627111300 evaluation starts +peer0.org1.example.com | [25d5 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25d6 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [25d7 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 principal matched by identity 0 +peer0.org1.example.com | [25d8 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [25d9 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0047a0dd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25db 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 gate 1589998855627111300 evaluation succeeds +peer0.org1.example.com | [25dc 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25dd 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25de 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25df 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25e0 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25e1 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25e2 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [25e3 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25e4 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25e5 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25e6 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25e7 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25e8 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 gate 1589998855629765800 evaluation starts +peer0.org1.example.com | [25e9 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25ea 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [25eb 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 principal matched by identity 0 +peer0.org1.example.com | [25ec 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [25ed 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [25ee 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25ef 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 gate 1589998855629765800 evaluation succeeds +peer0.org1.example.com | [25f0 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25f1 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25f2 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25f3 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25f4 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25f5 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [25f6 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [25f7 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [25f8 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100C1801 +peer0.org1.example.com | [25f9 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7B8931900261A8E15D1DCDE285EBA34407083A047A94DACAF0A0E35FE925D423 +peer0.org1.example.com | [25fa 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [25fb 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25fc 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25fd 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25fe 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25ff 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2600 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2601 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2602 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [2603 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2604 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2605 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2606 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2607 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2608 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2609 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [260a 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [260b 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [260c 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [260d 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [260e 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [260f 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [270c 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1d1c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [270d 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1d1c0 principal matched by identity 0 +peer1.org2.example.com | [270e 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 06 6e f0 5d 5a 1a 16 b7 cd 74 72 41 50 db 79 |..n.]Z....trAP.y| +peer1.org2.example.com | 00000010 d8 e8 68 bf e7 8d 16 c3 7a 9d eb 98 7e b9 af f5 |..h.....z...~...| +peer1.org2.example.com | [270f 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 cd 7c 8c 79 45 5b bb cc 4b 91 78 |0D. B.|.yE[..K.x| +peer1.org2.example.com | 00000010 f3 6f e2 9a 3a 0b cc cf 06 57 76 61 65 59 05 68 |.o..:....WvaeY.h| +peer1.org2.example.com | 00000020 f9 11 1c f7 02 20 23 d9 dc 2d 16 6b 7d ef 6a 56 |..... #..-.k}.jV| +peer1.org2.example.com | 00000030 7e d1 bb e2 b2 c9 83 af 33 48 f3 b0 ac fe d5 69 |~.......3H.....i| +peer1.org2.example.com | 00000040 aa 02 04 ae da 0f |......| +peer1.org2.example.com | [2710 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1d1c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2711 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1d1c0 gate 1589998858353022800 evaluation succeeds +peer1.org2.example.com | [2712 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2713 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2714 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2715 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2716 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2717 05-20 18:20:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2718 05-20 18:20:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2719 05-20 18:20:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [271a 05-20 18:20:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [271b 05-20 18:20:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [271c 05-20 18:20:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [271d 05-20 18:20:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [271e 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [271f 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2720 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2721 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2722 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2723 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2724 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2725 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2726 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2727 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2728 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2729 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [272a 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [272b 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [272c 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [272d 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [272e 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [272f 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2730 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2731 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2510 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c843f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2511 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c843f0 gate 1589998852195584500 evaluation succeeds +peer0.org2.example.com | [2512 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2513 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2514 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2515 05-20 18:20:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2516 05-20 18:20:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2517 05-20 18:20:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2518 05-20 18:20:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2519 05-20 18:20:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [251b 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [251c 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [251d 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [251e 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [251f 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2520 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2521 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2522 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2523 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [2524 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [2525 05-20 18:20:52.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2526 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2527 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2528 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2529 05-20 18:20:52.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [252a 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [252b 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [252c 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [252d 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [252e 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [252f 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2530 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2531 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2532 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [2533 05-20 18:20:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2534 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2535 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2536 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2537 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2754 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e5940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2755 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e5940 gate 1589998867871940400 evaluation succeeds +peer1.org1.example.com | [2756 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2757 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2758 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2759 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [275a 05-20 18:21:07.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [275b 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [275c 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [275d 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [275e 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [275f 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2760 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2761 05-20 18:21:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2762 05-20 18:21:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161031 +peer1.org1.example.com | [2763 05-20 18:21:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 665E6C7C2FD744B1CC2CAB28A1AC7667A72F23B33E980778816F9B259B989386 +peer1.org1.example.com | [2764 05-20 18:21:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2765 05-20 18:21:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2766 05-20 18:21:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2767 05-20 18:21:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2768 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2769 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [276a 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [276b 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [276c 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [276d 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [276e 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [276f 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2770 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2771 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2772 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2773 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2774 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2775 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2776 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2777 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2778 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2779 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [277a 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [277b 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [277c 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [277d 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [277e 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [277f 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2780 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2781 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2782 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2783 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2784 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2785 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2786 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2787 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2788 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2789 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [278a 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [278b 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [278c 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [278d 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [278e 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [278f 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2790 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2791 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2792 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2793 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2794 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2795 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2796 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2797 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2798 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2799 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [279a 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [2538 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2539 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [253a 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [253b 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [253c 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [253d 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [253e 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [253f 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9f990 gate 1589998852653382000 evaluation starts +peer0.org2.example.com | [2540 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9f990 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2541 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9f990 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2542 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9f990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2543 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9f990 principal evaluation fails +peer0.org2.example.com | [2544 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9f990 gate 1589998852653382000 evaluation fails +peer0.org2.example.com | [2545 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2546 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2547 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2548 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ff00 gate 1589998852657125100 evaluation starts +peer0.org2.example.com | [2549 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ff00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [254a 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ff00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [254b 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ff00 principal matched by identity 0 +peer0.org2.example.com | [254c 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer0.org2.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer0.org2.example.com | [254d 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer0.org2.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer0.org2.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer0.org2.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer0.org2.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer0.org2.example.com | [254e 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ff00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [254f 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9ff00 gate 1589998852657125100 evaluation succeeds +peer0.org2.example.com | [2550 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2551 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2552 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2553 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2554 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2555 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2556 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2557 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2558 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2559 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [255a 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [255b 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [255c 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [255d 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [255e 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [255f 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2560 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2561 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2562 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2563 05-20 18:20:52.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > alive: alive: +peer0.org2.example.com | [2564 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2565 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2566 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2567 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2568 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2569 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [256a 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [256b 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [256c 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [256d 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [256e 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [256f 05-20 18:20:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2570 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2571 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2572 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2573 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2610 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2611 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2612 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2613 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2614 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2615 05-20 18:20:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2616 05-20 18:20:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2617 05-20 18:20:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2618 05-20 18:20:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2619 05-20 18:20:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [261a 05-20 18:20:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [261b 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [261c 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [261d 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [261e 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [261f 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2620 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2621 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2622 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2623 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2624 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2625 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2626 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2627 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2628 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2629 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [262a 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [262b 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [262c 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [262d 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [279b 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [279c 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [279d 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [279e 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161032 +peer1.org1.example.com | [279f 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 93ECD9EBD3B30C1EA16D8ACC72193B1697F0F162C7119F03211ED23EBC29D153 +peer1.org1.example.com | [27a0 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [27a1 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [27a2 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [27a3 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [27a4 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27a5 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [27a6 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [27a7 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27a8 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27a9 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [27aa 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [27ab 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ac 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [27ad 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ae 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [27af 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [27b0 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer1.org1.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer1.org1.example.com | [27b1 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer1.org1.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer1.org1.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer1.org1.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer1.org1.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer1.org1.example.com | [27b2 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [27b3 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 61 9f 42 4c 38 47 4f 62 bc 24 |0E.!..a.BL8GOb.$| +peer1.org1.example.com | 00000010 96 2f fa b1 21 34 f8 fd bc 85 94 9f d1 20 8d e6 |./..!4....... ..| +peer1.org1.example.com | 00000020 ba b4 74 ba 99 02 20 7c 9c 3a 2b c8 17 05 0e 48 |..t... |.:+....H| +peer1.org1.example.com | 00000030 54 95 b8 76 f4 d7 f6 7b 84 dc 07 65 0e 39 c2 ec |T..v...{...e.9..| +peer1.org1.example.com | 00000040 b6 30 70 ce fb a5 0c |.0p....| +peer1.org1.example.com | [27b4 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2574 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2575 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2576 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2577 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2578 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2579 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [257a 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [257b 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [257c 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [257d 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [257e 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [257f 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2580 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2581 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2582 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2583 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2584 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161027 +peer0.org2.example.com | [2585 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DB111D5B883ACCD475EA53B10C9DD8A71A382D841434ACC78404A3FDF713A534 +peer0.org2.example.com | [2586 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2587 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2588 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2589 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [258a 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [258b 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [258c 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [258d 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [258e 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [258f 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2590 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2591 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2592 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2593 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2594 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2595 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2596 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2597 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2598 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer0.org2.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer0.org2.example.com | [2599 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer0.org2.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer0.org2.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer0.org2.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer0.org2.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer0.org2.example.com | [259a 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [259b 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f cb 88 1a 03 26 d1 53 d6 00 aa 60 |0D. o....&.S...`| +peer0.org2.example.com | 00000010 72 74 06 4d a3 5f 2a 21 1a 0f 63 e5 b1 dd 08 74 |rt.M._*!..c....t| +peer0.org2.example.com | 00000020 ce 6f 91 66 02 20 5f d1 3d 1a ec 58 d8 b6 27 71 |.o.f. _.=..X..'q| +peer0.org2.example.com | 00000030 00 ce b0 29 7b 6f 32 51 b9 46 cf 31 52 83 cd 5f |...){o2Q.F.1R.._| +peer0.org2.example.com | 00000040 6d 9d 8d 68 c7 5e |m..h.^| +peer0.org2.example.com | [259c 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [259d 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [259e 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [259f 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a0 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a1 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [25a2 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a3 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [25a4 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [25a5 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer0.org2.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer0.org2.example.com | [25a6 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer0.org2.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer0.org2.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer0.org2.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer0.org2.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer0.org2.example.com | [25a7 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [25a8 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [25a9 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25aa 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [25ab 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer0.org2.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer1.org1.example.com | [27b5 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [27b6 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27b7 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27b8 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [27b9 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ba 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [27bb 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [27bc 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27bd 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [27be 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [27bf 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27c0 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [27c1 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27c2 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27c3 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [27c4 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [27c5 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [27c6 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a373e0 gate 1589998868629312400 evaluation starts +peer1.org1.example.com | [27c7 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a373e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27c8 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a373e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [27c9 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a373e0 principal matched by identity 0 +peer1.org1.example.com | [27ca 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer1.org1.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer1.org1.example.com | [27cb 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer1.org1.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer1.org1.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer1.org1.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer1.org1.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer1.org1.example.com | [27cc 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a373e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [27cd 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a373e0 gate 1589998868629312400 evaluation succeeds +peer1.org1.example.com | [27ce 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27cf 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27d0 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [27d1 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [27d2 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d3 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d4 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [27d5 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer1.org1.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer1.org1.example.com | [27d6 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer1.org1.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer1.org1.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer1.org1.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer1.org1.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer1.org1.example.com | [27d7 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d8 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d9 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27da 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [27db 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer1.org1.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer1.org1.example.com | [27dc 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer1.org1.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer1.org1.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer1.org1.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer1.org1.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer1.org1.example.com | [27dd 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [27de 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27df 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27e0 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [27e1 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [27e2 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27e3 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [27e4 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [27e5 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27e6 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [27e7 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27e8 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27e9 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [27ea 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25ac 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer0.org2.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer0.org2.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer0.org2.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer0.org2.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer0.org2.example.com | [25ad 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25ae 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25af 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [25b0 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25b1 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25b2 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25b3 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25b4 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25b5 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25b6 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [25b7 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d368d0 gate 1589998852927260100 evaluation starts +peer0.org2.example.com | [25b8 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d368d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25b9 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d368d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [25ba 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d368d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [25bb 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d368d0 principal evaluation fails +peer0.org2.example.com | [25bc 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d368d0 gate 1589998852927260100 evaluation fails +peer0.org2.example.com | [25bd 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [25be 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [25bf 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [25c0 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d36e40 gate 1589998852929380600 evaluation starts +peer0.org2.example.com | [25c1 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d36e40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25c2 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d36e40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [25c3 05-20 18:20:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d36e40 principal matched by identity 0 +peer0.org2.example.com | [25c4 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +peer0.org2.example.com | 00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +peer0.org2.example.com | [25c5 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +peer0.org2.example.com | 00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +peer0.org2.example.com | 00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +peer0.org2.example.com | 00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +peer0.org2.example.com | 00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +peer0.org2.example.com | [25c6 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d36e40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25c7 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d36e40 gate 1589998852929380600 evaluation succeeds +peer0.org2.example.com | [25c8 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25c9 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25ca 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25cb 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [27eb 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [27ec 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6fd80 gate 1589998868634504000 evaluation starts +peer1.org1.example.com | [27ed 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6fd80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27ee 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6fd80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [27ef 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6fd80 principal matched by identity 0 +peer1.org1.example.com | [27f0 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer1.org1.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer1.org1.example.com | [27f1 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer1.org1.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer1.org1.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer1.org1.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer1.org1.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer1.org1.example.com | [27f2 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6fd80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [27f3 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6fd80 gate 1589998868634504000 evaluation succeeds +peer1.org1.example.com | [27f4 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27f5 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27f6 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [27f7 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [27f8 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27f9 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27fa 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [27fb 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer1.org1.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer1.org1.example.com | [27fc 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer1.org1.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer1.org1.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer1.org1.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer1.org1.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer1.org1.example.com | [27fd 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [27fe 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ff 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2800 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer1.org1.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer1.org1.example.com | [2801 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer1.org1.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer1.org1.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer1.org1.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer1.org1.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer1.org1.example.com | [2802 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2803 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2804 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2805 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2806 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2807 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2808 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2809 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [280a 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [280b 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2732 05-20 18:20:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2733 05-20 18:20:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2734 05-20 18:20:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2735 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2736 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2737 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2738 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2739 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [273a 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 e2 95 d2 b0 95 a4 91 7b 7c 73 6f 04 e7 42 86 |........{|so..B.| +peer1.org2.example.com | 00000010 4b 34 1c 03 4d 62 24 de a3 f2 13 30 73 2a aa 85 |K4..Mb$....0s*..| +peer1.org2.example.com | [273b 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 7d 4d 4e fc d8 96 fe 27 b7 27 |0E.!..}MN....'.'| +peer1.org2.example.com | 00000010 93 ca c7 40 04 af 4f c4 52 0c d7 2c 4d b1 b6 da |...@..O.R..,M...| +peer1.org2.example.com | 00000020 68 84 c4 fc c2 02 20 1e df 06 61 02 f2 08 4f 52 |h..... ...a...OR| +peer1.org2.example.com | 00000030 cc 1f fc 75 9e d0 8d 25 78 1e d4 72 1d f6 71 fe |...u...%x..r..q.| +peer1.org2.example.com | 00000040 81 f0 4c e3 78 dd 29 |..L.x.)| +peer1.org2.example.com | [273c 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [273d 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [273e 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [273f 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2740 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2741 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2742 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2743 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2744 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2745 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2746 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2747 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2748 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2749 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [274a 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [274b 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [274c 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [274d 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [274e 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [274f 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25cc 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25cd 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25ce 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25cf 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [25d0 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25d1 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [25d2 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +peer0.org2.example.com | 00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +peer0.org2.example.com | [25d3 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +peer0.org2.example.com | 00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +peer0.org2.example.com | 00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +peer0.org2.example.com | 00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +peer0.org2.example.com | 00000040 e7 1b f2 46 8c 8a 80 |...F...| +peer0.org2.example.com | [25d4 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25d5 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25d6 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [25d7 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25d8 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25d9 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25da 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25db 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25dc 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25dd 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [25de 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d213d0 gate 1589998852939567200 evaluation starts +peer0.org2.example.com | [25df 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d213d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25e0 05-20 18:20:52.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d213d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [25e1 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d213d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [25e2 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d213d0 principal evaluation fails +peer0.org2.example.com | [25e3 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d213d0 gate 1589998852939567200 evaluation fails +peer0.org2.example.com | [25e4 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [25e5 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [25e6 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [25e7 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d21940 gate 1589998852941068100 evaluation starts +peer0.org2.example.com | [25e8 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d21940 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25e9 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d21940 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [25ea 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d21940 principal matched by identity 0 +peer0.org2.example.com | [25eb 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +peer0.org2.example.com | 00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +peer0.org2.example.com | [25ec 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +peer0.org2.example.com | 00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +peer0.org2.example.com | 00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +peer0.org2.example.com | 00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +peer0.org2.example.com | 00000040 4c 13 5c 32 79 9e bf |L.\2y..| +peer0.org2.example.com | [25ed 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d21940 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25ee 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d21940 gate 1589998852941068100 evaluation succeeds +peer0.org2.example.com | [25ef 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25f0 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25f1 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25f2 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [25f3 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25f4 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25f5 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [25f6 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +peer0.org2.example.com | 00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +peer0.org2.example.com | [25f7 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +peer0.org2.example.com | 00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +peer0.org2.example.com | 00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +peer0.org2.example.com | 00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +peer0.org2.example.com | 00000040 91 06 28 1a bc 4f |..(..O| +peer0.org2.example.com | [25f8 05-20 18:20:52.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [25f9 05-20 18:20:52.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [25fa 05-20 18:20:52.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25fb 05-20 18:20:52.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25fc 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [25fd 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [25fe 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [25ff 05-20 18:20:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2600 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2601 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2602 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2603 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [280c 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [280d 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [280e 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [280f 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2810 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2811 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2812 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a57130 gate 1589998868685811000 evaluation starts +peer1.org1.example.com | [2813 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a57130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2814 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a57130 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2815 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a57130 principal matched by identity 0 +peer1.org1.example.com | [2816 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 41 ce eb 92 77 7b 35 6e 91 56 13 55 2b c8 ec |.A...w{5n.V.U+..| +peer1.org1.example.com | 00000010 ee be 04 d3 2d db 61 f8 37 23 08 40 98 4a ec df |....-.a.7#.@.J..| +peer1.org1.example.com | [2817 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d 20 39 e5 9a a4 2d 7f 71 ac 45 19 |0D. - 9...-.q.E.| +peer1.org1.example.com | 00000010 04 4f 7f f9 3b 84 8a 8a 8b c4 e1 ab e3 3c 57 f6 |.O..;........ DEBU 0xc004a57130 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2819 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a57130 gate 1589998868685811000 evaluation succeeds +peer1.org1.example.com | [281a 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [281b 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [281c 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [281d 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [281e 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [281f 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2820 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2821 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2822 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2823 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2824 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2825 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2826 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2827 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [262e 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [262f 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2630 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer0.org1.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer0.org1.example.com | [2631 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer0.org1.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer0.org1.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer0.org1.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer0.org1.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer0.org1.example.com | [2632 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2633 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 1d 22 8a a0 61 fa 16 4d 9d d3 ce |0D. v."..a..M...| +peer0.org1.example.com | 00000010 5f 07 1d 5c fa 1c b9 5e 24 f1 7b 66 53 c7 59 81 |_..\...^$.{fS.Y.| +peer0.org1.example.com | 00000020 64 93 fa 64 02 20 29 c9 27 17 5e e6 16 37 6f 12 |d..d. ).'.^..7o.| +peer0.org1.example.com | 00000030 95 59 06 6e 50 44 a8 f0 b1 8e e2 b9 66 89 84 5e |.Y.nPD......f..^| +peer0.org1.example.com | 00000040 e1 23 87 0f ab e9 |.#....| +peer0.org1.example.com | [2634 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [2635 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [2636 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2637 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2638 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2639 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [263a 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [263b 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [263c 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [263d 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [263e 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [263f 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2640 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [2641 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2642 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2643 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2644 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2645 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2646 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2647 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2648 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2649 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [264a 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [264b 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [264c 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [264d 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [264e 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [2828 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2829 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [282a 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [282b 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [282c 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [282d 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [282e 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [282f 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2830 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2831 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2832 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2833 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2834 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2835 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2836 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2837 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2838 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2839 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [283a 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [283b 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [283c 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [283d 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [283e 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [283f 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2840 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2841 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2842 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2843 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2844 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2845 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2846 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2847 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2848 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2849 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [284a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [284b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2750 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2751 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2752 05-20 18:20:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2753 05-20 18:20:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2754 05-20 18:20:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2755 05-20 18:20:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2756 05-20 18:20:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2757 05-20 18:20:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816102C +peer1.org2.example.com | [2758 05-20 18:20:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B76B242A5AA90EFC2C3544DE2DBA08B45DA56A28EEBD61D84AD2E8D3A9EB6B02 +peer1.org2.example.com | [2759 05-20 18:20:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [275a 05-20 18:20:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [275b 05-20 18:20:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [275c 05-20 18:20:58.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [275d 05-20 18:20:58.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [275e 05-20 18:20:58.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [275f 05-20 18:20:58.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2760 05-20 18:20:58.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2761 05-20 18:20:58.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2762 05-20 18:20:58.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2763 05-20 18:20:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2764 05-20 18:20:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2765 05-20 18:20:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2766 05-20 18:20:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2767 05-20 18:20:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2768 05-20 18:20:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2769 05-20 18:20:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [276a 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [276b 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [276c 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [276d 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [276e 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2604 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [264f 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2650 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2652 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2653 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2655 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2651 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2657 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2654 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2658 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2656 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2659 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [265a 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [265b 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [265c 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [265d 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [265e 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [265f 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2660 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2661 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2662 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2663 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [276f 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2770 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2771 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2772 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2773 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2774 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2775 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8eb70 gate 1589998859104021600 evaluation starts +peer1.org2.example.com | [2776 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8eb70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2777 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8eb70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2778 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8eb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2779 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8eb70 principal evaluation fails +peer1.org2.example.com | [277a 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8eb70 gate 1589998859104021600 evaluation fails +peer1.org2.example.com | [277b 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [277c 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [277d 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [277e 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f0e0 gate 1589998859105523300 evaluation starts +peer1.org2.example.com | [277f 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f0e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2780 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f0e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2781 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f0e0 principal matched by identity 0 +peer1.org2.example.com | [2782 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 15 58 9d f8 7d 89 60 dd 94 db 47 24 b1 16 3b |..X..}.`...G$..;| +peer1.org2.example.com | 00000010 6e 4b ae c7 1e db de 4e 6f d7 1e 59 23 1d 5d 02 |nK.....No..Y#.].| +peer1.org2.example.com | [2783 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 85 0e 74 ba bb a2 a2 f1 66 17 db |0D. M..t.....f..| +peer1.org2.example.com | 00000010 4e 03 b1 fa d3 41 4c 12 39 76 b3 5a 7f 74 dc 09 |N....AL.9v.Z.t..| +peer1.org2.example.com | 00000020 c4 1b 78 44 02 20 52 d1 f5 87 ed 9e 1a ec 7c d5 |..xD. R.......|.| +peer1.org2.example.com | 00000030 47 c2 6d af b9 2d 9c 87 0c 83 ff 21 65 1b 66 82 |G.m..-.....!e.f.| +peer1.org2.example.com | 00000040 84 9c 7c cf 9b 71 |..|..q| +peer1.org2.example.com | [2784 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f0e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2785 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f0e0 gate 1589998859105523300 evaluation succeeds +peer1.org2.example.com | [2786 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2787 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2788 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2789 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [278a 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [278b 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [278c 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [278d 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [278e 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [278f 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2790 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2791 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2792 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2793 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2794 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2795 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2796 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2797 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2798 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2799 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [279a 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [279b 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [279c 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [279d 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [279e 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [279f 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [27a0 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [27a1 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a2 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [27a3 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a4 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [27a5 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [27a6 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a7 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [27a8 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a9 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27aa 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27ab 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27ac 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27ad 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27ae 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27af 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b0 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b1 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b2 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27b3 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27b4 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27b5 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b6 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b7 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27b8 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [27b9 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [27ba 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [27bb 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [27bc 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27bd 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27be 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2605 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2606 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2607 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2608 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2609 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [260a 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [260b 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d55c60 gate 1589998853034175300 evaluation starts +peer0.org2.example.com | [260c 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d55c60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [260d 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d55c60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [260e 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d55c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [260f 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d55c60 principal evaluation fails +peer0.org2.example.com | [2610 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d55c60 gate 1589998853034175300 evaluation fails +peer0.org2.example.com | [2611 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2612 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2613 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2614 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d761d0 gate 1589998853040982000 evaluation starts +peer0.org2.example.com | [2615 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d761d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2616 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d761d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2617 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d761d0 principal matched by identity 0 +peer0.org2.example.com | [2618 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +peer0.org2.example.com | 00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +peer0.org2.example.com | [2619 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +peer0.org2.example.com | 00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +peer0.org2.example.com | 00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +peer0.org2.example.com | 00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU 0xc004d761d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [261b 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d761d0 gate 1589998853040982000 evaluation succeeds +peer0.org2.example.com | [261c 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [261d 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [261e 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [261f 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2620 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2621 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2622 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2623 05-20 18:20:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2624 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2625 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2626 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2627 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2628 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [2629 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [262a 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [262b 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [262c 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [262d 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [262e 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [262f 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > alive:\001\270+\303\220\002 \036\236/A\302Joc\244O alive: +peer0.org2.example.com | [2630 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2631 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2632 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2633 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2634 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2635 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2636 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2637 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2638 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d6 90 3e f2 aa bc 5b a6 80 fb fc 9b 45 69 7a |...>...[.....Eiz| +peer0.org2.example.com | 00000010 f7 6c ea 99 c0 59 1f 09 96 bf 9e ca 2b 1e 53 b6 |.l...Y......+.S.| +peer0.org2.example.com | [2639 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 f4 7d 30 51 9c 1a 5f 60 e6 ff |0E.!...}0Q.._`..| +peer0.org2.example.com | 00000010 52 ea cf 2e 54 fe e3 61 d3 fc f1 1c ec de dc 83 |R...T..a........| +peer0.org2.example.com | 00000020 9a e6 80 0d 8a 02 20 3e 07 57 d4 28 98 87 8e 7e |...... >.W.(...~| +peer0.org2.example.com | 00000030 64 88 3a 7a 4c dc dd 28 27 97 d6 5f bc 23 d4 64 |d.:zL..('.._.#.d| +peer0.org2.example.com | 00000040 e7 a7 61 f9 1d fe 41 |..a...A| +peer0.org2.example.com | [263a 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [263b 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 90 95 69 ba b0 2c 51 46 2f 07 65 |0D. u..i..,QF/.e| +peer0.org2.example.com | 00000010 55 ec 66 47 c3 bb 66 33 fb f0 61 02 2b 6d 8e 08 |U.fG..f3..a.+m..| +peer0.org2.example.com | 00000020 a6 b1 b4 f2 02 20 62 71 69 b9 ed 4a 20 69 f4 52 |..... bqi..J i.R| +peer0.org2.example.com | 00000030 f2 b7 84 a0 35 16 1b 45 16 ac e9 c0 1e 82 1b 4a |....5..E.......J| +peer0.org2.example.com | 00000040 af 25 87 e4 20 b0 |.%.. .| +peer0.org2.example.com | [263c 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [263d 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [263e 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [263f 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2640 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2641 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2642 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2643 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2644 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2645 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2646 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2647 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" secret_envelope: > alive: +peer0.org2.example.com | [2648 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2649 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [264a 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [264b 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [264c 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [264d 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [264e 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2664 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2665 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2666 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2667 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2668 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2669 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [266a 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [266b 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [266c 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [266d 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [266e 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [266f 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2670 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2671 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2672 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 gate 1589998856919188600 evaluation starts +peer0.org1.example.com | [2673 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2674 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2675 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 principal matched by identity 0 +peer0.org1.example.com | [2676 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer0.org1.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer0.org1.example.com | [2677 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer0.org1.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer0.org1.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer0.org1.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer0.org1.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer0.org1.example.com | [2678 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2679 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 gate 1589998856919188600 evaluation succeeds +peer0.org1.example.com | [267a 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [267b 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [267c 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [267d 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [267e 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [267f 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2680 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2681 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2682 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2683 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2684 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2685 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2686 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2687 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2688 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2689 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [268a 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [268b 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020(" > alive: alive: alive: +peer0.org1.example.com | [268c 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [268d 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [268e 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [268f 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161028 +peer0.org1.example.com | [2690 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F7DE2BA309707656379692C3265849ECE16CF82FCFD3F8ABFEB7DB6F3FCE17AF +peer0.org1.example.com | [2691 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2692 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2693 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2694 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2695 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2696 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2697 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2698 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" secret_envelope:\277\220\210\236" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [284c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [284d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [284e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [284f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2850 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2851 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2852 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2853 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2854 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad5340 gate 1589998868887616100 evaluation starts +peer1.org1.example.com | [2855 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad5340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2856 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad5340 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2857 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad5340 principal matched by identity 0 +peer1.org1.example.com | [2858 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2859 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [285a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [285b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [285c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer1.org1.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer1.org1.example.com | [285d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org1.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer1.org1.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org1.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org1.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org1.example.com | [285e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad5340 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [285f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad5340 gate 1589998868887616100 evaluation succeeds +peer1.org1.example.com | [2860 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2861 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2862 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2863 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2864 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2865 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2866 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [27bf 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [27c0 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c1 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27c2 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c3 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27c4 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c5 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27c6 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c7 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27c8 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27c9 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27ca 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [27cb 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27cc 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27cd 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [27ce 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [27cf 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [27d0 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7b00 gate 1589998860419844800 evaluation starts +peer1.org2.example.com | [27d1 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7b00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27d2 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7b00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [27d3 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [27d4 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7b00 principal evaluation fails +peer1.org2.example.com | [27d5 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7b00 gate 1589998860419844800 evaluation fails +peer1.org2.example.com | [27d6 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [27d7 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [27d8 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [27d9 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dee070 gate 1589998860422387000 evaluation starts +peer1.org2.example.com | [27da 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dee070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27db 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dee070 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [27dc 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dee070 principal matched by identity 0 +peer1.org2.example.com | [27dd 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [27de 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | [2699 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" secret_envelope:\277\220\210\236" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [269a 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [269b 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [269c 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [269d 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [269e 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [269f 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [26a0 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [26a1 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26a2 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [26a3 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [26a4 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +peer0.org1.example.com | 00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +peer0.org1.example.com | [26a5 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +peer0.org1.example.com | 00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +peer0.org1.example.com | 00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +peer0.org1.example.com | 00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +peer0.org1.example.com | 00000040 45 83 34 c8 b3 15 |E.4...| +peer0.org1.example.com | [26a6 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [26a7 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 3a a0 90 ad 38 79 cd 7e 49 3c c7 |0D. .:...8y.~I<.| +peer0.org1.example.com | 00000010 59 a0 3c 7c f6 f9 56 4e 65 68 78 a9 29 45 63 36 |Y.<|..VNehx.)Ec6| +peer0.org1.example.com | 00000020 3a 11 26 7c 02 20 0c 6f 91 5e 38 c3 4f 7c 6e 70 |:.&|. .o.^8.O|np| +peer0.org1.example.com | 00000030 b6 c0 40 c3 c0 67 c0 7c 69 70 02 0a b9 c6 92 2e |..@..g.|ip......| +peer0.org1.example.com | 00000040 99 3e bf 90 88 9e |.>....| +peer0.org1.example.com | [26a8 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [26a9 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [26aa 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26ab 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26ac 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [264f 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2650 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2651 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2652 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2653 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2654 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2655 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2656 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7030 gate 1589998853382286600 evaluation starts +peer0.org2.example.com | [2657 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7030 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2658 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7030 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2659 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2867 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2868 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2869 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [286a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [286b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [286c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [286d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [286e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [286f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2870 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2871 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\300\215_8pQ\253" > alive: alive: +peer1.org1.example.com | [2872 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2873 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2874 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2875 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2876 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2877 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2878 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2879 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [287a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [27df 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dee070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [27e0 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dee070 gate 1589998860422387000 evaluation succeeds +peer1.org2.example.com | [27e1 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [27e2 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [27e3 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [27e4 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [27e5 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27e6 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27e7 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [27e8 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27e9 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27ea 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [27eb 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [27ec 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [27ed 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def270 gate 1589998860427762800 evaluation starts +peer1.org2.example.com | [27ee 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def270 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27ef 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def270 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [27f0 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [27f1 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def270 principal evaluation fails +peer1.org2.example.com | [27f2 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def270 gate 1589998860427762800 evaluation fails +peer1.org2.example.com | [27f3 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [27f4 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [27f5 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [27f6 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def7e0 gate 1589998860428134400 evaluation starts +peer1.org2.example.com | [27f7 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def7e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27f8 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def7e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [27f9 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def7e0 principal matched by identity 0 +peer1.org2.example.com | [27fa 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [27fb 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [27fc 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def7e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [27fd 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004def7e0 gate 1589998860428134400 evaluation succeeds +peer1.org2.example.com | [27fe 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [27ff 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2800 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [26ad 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [26ae 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26af 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [26b0 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [26b1 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer0.org1.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer0.org1.example.com | [26b2 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer0.org1.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer0.org1.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer0.org1.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer0.org1.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer0.org1.example.com | [26b3 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26b4 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26b5 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [26b6 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +peer0.org1.example.com | 00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +peer0.org1.example.com | [26b7 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +peer0.org1.example.com | 00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +peer0.org1.example.com | 00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +peer0.org1.example.com | 00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +peer0.org1.example.com | 00000040 45 83 34 c8 b3 15 |E.4...| +peer0.org1.example.com | [26b8 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26b9 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26ba 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26bb 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26bc 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [26bd 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [26be 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26bf 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [26c0 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [26c1 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26c2 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [26c3 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26c4 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26c5 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2801 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2802 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2803 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2805 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2806 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2807 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2808 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2809 05-20 18:21:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [280a 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [280b 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [280c 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [280d 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [280e 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [280f 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2810 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2811 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2812 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0fa10 gate 1589998860434915000 evaluation starts +peer1.org2.example.com | [2813 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0fa10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2814 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0fa10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2815 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0fa10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2816 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0fa10 principal evaluation fails +peer1.org2.example.com | [2817 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0fa10 gate 1589998860434915000 evaluation fails +peer1.org2.example.com | [2818 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2819 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [281a 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [281b 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0ff80 gate 1589998860437574000 evaluation starts +peer1.org2.example.com | [281c 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0ff80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [281d 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0ff80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [281e 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0ff80 principal matched by identity 0 +peer1.org2.example.com | [281f 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [265a 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7030 principal evaluation fails +peer0.org2.example.com | [265b 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7030 gate 1589998853382286600 evaluation fails +peer0.org2.example.com | [265c 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [265d 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [265e 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [265f 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da75a0 gate 1589998853386092900 evaluation starts +peer0.org2.example.com | [2660 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da75a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2661 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da75a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2662 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da75a0 principal matched by identity 0 +peer0.org2.example.com | [2663 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 ad b6 db 1e 04 e2 43 0a cf 75 92 d2 07 8c c8 |.......C..u.....| +peer0.org2.example.com | 00000010 4d 26 12 7c b9 76 15 45 22 7a 09 0f 2d ed 63 c0 |M&.|.v.E"z..-.c.| +peer0.org2.example.com | [2664 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 21 60 77 7b b8 cf a6 dd 05 c4 71 |0D. .!`w{......q| +peer0.org2.example.com | 00000010 bf ae f5 e4 1d 85 3c da 32 97 97 cd 27 c0 68 63 |......<.2...'.hc| +peer0.org2.example.com | 00000020 c8 b7 59 4b 02 20 2b 73 e0 7a 00 f3 eb 66 9a 3d |..YK. +s.z...f.=| +peer0.org2.example.com | 00000030 60 b4 a0 67 87 b2 c2 8f b9 ca d0 38 cb b0 c6 76 |`..g.......8...v| +peer0.org2.example.com | 00000040 eb 44 14 d3 1d 41 |.D...A| +peer0.org2.example.com | [2665 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da75a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2666 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da75a0 gate 1589998853386092900 evaluation succeeds +peer0.org2.example.com | [2667 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2668 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2669 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [266a 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [266b 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [266c 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [266d 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [266e 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [266f 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2670 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2671 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2672 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2673 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2674 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2675 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2676 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2677 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2678 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2679 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [267a 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [267b 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [267c 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [267e 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [267d 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [267f 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2680 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2681 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2682 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2683 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2684 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2685 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2686 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2687 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2688 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2689 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [268a 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161028 +peer0.org2.example.com | [268b 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2CF157D9A77F433530720171FE976A3F90A4864C1D5F219B1E65DB17AD07B048 +peer0.org2.example.com | [268c 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [268d 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [268e 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [268f 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2690 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2691 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2692 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2693 05-20 18:20:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2694 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2695 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2696 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2697 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2698 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2699 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [269a 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [269b 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [269c 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [269d 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [269e 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [269f 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2820 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2821 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0ff80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2822 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0ff80 gate 1589998860437574000 evaluation succeeds +peer1.org2.example.com | [2823 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2824 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2825 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2826 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2827 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2828 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2829 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [282a 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [282b 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [282c 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [282d 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [282e 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [282f 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29180 gate 1589998860446621800 evaluation starts +peer1.org2.example.com | [2830 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2831 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29180 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2833 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2834 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29180 principal evaluation fails +peer1.org2.example.com | [2835 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29180 gate 1589998860446621800 evaluation fails +peer1.org2.example.com | [2832 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org2.example.com | [2836 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2837 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2838 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2839 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9910 gate 1589998860450394400 evaluation starts +peer1.org2.example.com | [283a 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [283b 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9910 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [283c 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9910 principal matched by identity 0 +peer1.org2.example.com | [283d 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [283e 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [287b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [287c 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [287d 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [287e 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [287f 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2880 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abfa50 gate 1589998868907481600 evaluation starts +peer1.org1.example.com | [2881 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abfa50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2882 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abfa50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2883 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abfa50 principal matched by identity 0 +peer1.org1.example.com | [2884 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad ad 2b 75 1e ad 78 e0 e3 62 e3 f2 d3 83 b7 66 |..+u..x..b.....f| +peer1.org1.example.com | 00000010 2d 27 c3 08 fb 78 71 67 31 56 65 d7 50 c6 99 c8 |-'...xqg1Ve.P...| +peer1.org1.example.com | [2885 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 0e 74 ab 02 3d e2 f5 2c ff d9 |0E.!...t..=..,..| +peer1.org1.example.com | 00000010 7a c7 ea 8e bb 0f fe c6 e3 74 6f b3 55 a8 f4 22 |z........to.U.."| +peer1.org1.example.com | 00000020 46 c4 6a 09 05 02 20 30 66 93 fb 65 cf e7 b0 cf |F.j... 0f..e....| +peer1.org1.example.com | 00000030 7c 9e a1 cd f2 d6 77 2c e0 8a fd ad 73 5c e6 68 ||.....w,....s\.h| +peer1.org1.example.com | 00000040 04 28 2e ed 6a 3c c6 |.(..j<.| +peer1.org1.example.com | [2886 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abfa50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2887 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abfa50 gate 1589998868907481600 evaluation succeeds +peer1.org1.example.com | [2888 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2889 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [288a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [288b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [288c 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [288d 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [288e 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [288f 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2890 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2891 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2892 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2893 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2894 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2895 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2896 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2897 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2898 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2899 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [289a 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [289b 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [289c 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [289d 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [289e 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [289f 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28a0 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28a1 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [28a2 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28a3 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26c6 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [26c7 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [26c8 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 gate 1589998857058615500 evaluation starts +peer0.org1.example.com | [26c9 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [26ca 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [26cb 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 principal matched by identity 0 +peer0.org1.example.com | [26cc 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer0.org1.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer0.org1.example.com | [26cd 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer0.org1.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer0.org1.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer0.org1.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer0.org1.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer0.org1.example.com | [26ce 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [26cf 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 gate 1589998857058615500 evaluation succeeds +peer0.org1.example.com | [26d0 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [26d1 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [26d2 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [26d3 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [26d4 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26d5 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26d6 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [26d7 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +peer0.org1.example.com | 00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +peer0.org1.example.com | [26d8 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +peer0.org1.example.com | 00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +peer0.org1.example.com | 00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +peer0.org1.example.com | 00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +peer0.org1.example.com | 00000040 45 83 34 c8 b3 15 |E.4...| +peer0.org1.example.com | [26d9 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26da 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26db 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26dc 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [26dd 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer0.org1.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer0.org1.example.com | [26de 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer0.org1.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer0.org1.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer0.org1.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer0.org1.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer0.org1.example.com | [26df 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26e0 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26e1 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26e2 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [26e3 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [26e4 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [26e5 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e6 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e7 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e8 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e9 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26ea 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26eb 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [26ec 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28a4 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28a5 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28a6 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28a7 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28a8 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28a9 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28aa 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28ab 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [28ac 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28ad 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [28ae 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [28af 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +peer1.org1.example.com | 00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +peer1.org1.example.com | 00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +peer1.org1.example.com | 00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +peer1.org1.example.com | 00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +peer1.org1.example.com | 00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +peer1.org1.example.com | [28b1 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [28b2 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 79 47 74 6e 24 a6 15 c9 cc dd 6e |0D. NyGtn$.....n| +peer1.org1.example.com | 00000010 e9 9e f4 bb 7e 37 d5 f2 48 7a 19 af ba 33 c3 e5 |....~7..Hz...3..| +peer1.org1.example.com | 00000020 ec 83 25 4e 02 20 37 80 00 eb 8d 1a 89 28 15 f4 |..%N. 7......(..| +peer1.org1.example.com | 00000030 40 dc 84 a9 3b eb 46 71 e1 d9 56 a4 33 56 4b 6a |@...;.Fq..V.3VKj| +peer1.org1.example.com | 00000040 dc 69 9f cd 4d 61 |.i..Ma| +peer1.org1.example.com | [28b3 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [28b4 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [28b5 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [28b6 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [28b7 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [28b8 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28b9 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28ba 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28bb 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [28bc 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28bd 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28be 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [28bf 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [28c0 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [28c1 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28c2 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28c3 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28c4 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28c5 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [28c6 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 c6 90 00 a5 4e 5e 59 f0 f3 bd 2b ad ea 9a a8 |E....N^Y...+....| +peer1.org1.example.com | 00000010 1e d3 87 b1 03 17 29 bb b9 47 05 3e ec f3 d8 a3 |......)..G.>....| +peer1.org1.example.com | [28c7 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 cf 26 a9 2f 1d ec e8 6e 1a 71 |0E.!...&./...n.q| +peer1.org1.example.com | 00000010 56 01 37 76 3c f0 12 9e b7 1c d4 c6 59 38 f1 30 |V.7v<.......Y8.0| +peer1.org1.example.com | 00000020 7c 8e 86 b6 ec 02 20 1f 41 a0 37 72 9c e0 0e 9d ||..... .A.7r....| +peer1.org1.example.com | 00000030 ac 1c 6c f9 e3 5c d1 19 4b ca 45 bc 11 a6 2b 3b |..l..\..K.E...+;| +peer1.org1.example.com | 00000040 2d c7 33 17 09 38 36 |-.3..86| +peer1.org1.example.com | [28c8 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28c9 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [28ca 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [28cb 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [28cc 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [28cd 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28ce 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28cf 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28d0 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28d1 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [283f 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9910 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2840 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9910 gate 1589998860450394400 evaluation succeeds +peer1.org2.example.com | [2841 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2842 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2843 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2844 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2845 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2846 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2847 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2848 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [284a 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [284b 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [284c 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [284e 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [284f 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2850 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2851 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2852 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2853 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2854 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2855 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e180 gate 1589998860458468200 evaluation starts +peer1.org2.example.com | [2856 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2857 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e180 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2858 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2859 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e180 principal evaluation fails +peer0.org2.example.com | [26a0 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [26a1 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 73 65 da f1 da 2f b4 3f 71 1b 7e 99 fe 9f 4c |Sse.../.?q.~...L| +peer0.org2.example.com | 00000010 6f 9d f2 a6 60 43 ba 41 9d b5 df 10 15 e3 52 24 |o...`C.A......R$| +peer0.org2.example.com | [26a2 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 a2 4d e0 c2 01 63 32 e0 d5 55 ac |0D. b.M...c2..U.| +peer0.org2.example.com | 00000010 f0 9b d4 e5 64 82 74 86 6e 5e fb bb df 75 d8 bf |....d.t.n^...u..| +peer0.org2.example.com | 00000020 bd 73 b5 1e 02 20 7b 52 4b e1 38 a6 ec 59 18 42 |.s... {RK.8..Y.B| +peer0.org2.example.com | 00000030 07 ec 13 e9 59 8d 8e 2b a3 97 6f a0 f8 78 91 d8 |....Y..+..o..x..| +peer0.org2.example.com | 00000040 fb 04 ed 3e 10 28 |...>.(| +peer0.org2.example.com | [26a3 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26a4 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [26a5 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [26a6 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [26a7 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [26a8 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26a9 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26aa 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26ab 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26ac 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26ad 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26ae 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26af 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26b0 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26b1 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26b2 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [26b3 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26b4 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [26b5 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26b6 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26b8 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26b7 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26b9 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26ba 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26bb 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26bc 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26bd 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26be 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26bf 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26c0 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [26c1 05-20 18:20:54.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26c2 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [26c3 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [26c4 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [26c5 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [26c6 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [26c7 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [26c8 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c7f0 gate 1589998854031210800 evaluation starts +peer0.org2.example.com | [26c9 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c7f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26ca 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c7f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [26cb 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [26cc 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c7f0 principal evaluation fails +peer0.org2.example.com | [26cd 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c7f0 gate 1589998854031210800 evaluation fails +peer0.org2.example.com | [26ce 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [26cf 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26d0 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [26d1 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [26d2 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df4b70 gate 1589998854036811400 evaluation starts +peer0.org2.example.com | [26d3 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df4b70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26d4 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df4b70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [26d5 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df4b70 principal matched by identity 0 +peer0.org2.example.com | [26d6 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cd 59 30 46 a7 c9 92 e4 b2 30 c8 9a e7 8a e1 b4 |.Y0F.....0......| +peer0.org2.example.com | 00000010 7f 89 7f 93 73 56 d4 d9 12 e8 bf 65 5e b7 7b ce |....sV.....e^.{.| +peer0.org2.example.com | [26d7 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 e5 7e bf 58 8c 24 71 31 a6 32 |0E.!...~.X.$q1.2| +peer0.org2.example.com | 00000010 29 1e 4c 65 40 5c d8 e5 d4 f6 a5 2b 09 35 e2 7a |).Le@\.....+.5.z| +peer0.org2.example.com | 00000020 2d 03 6f ae d6 02 20 06 ad c0 58 2e a6 eb 0e 71 |-.o... ...X....q| +peer0.org2.example.com | 00000030 27 ec 5c 5a 66 78 be 46 8f eb 87 14 0e 63 02 c4 |'.\Zfx.F.....c..| +peer0.org2.example.com | 00000040 33 52 74 56 cd 76 37 |3RtV.v7| +peer0.org2.example.com | [26d8 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df4b70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [26d9 05-20 18:20:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df4b70 gate 1589998854036811400 evaluation succeeds +peer0.org2.example.com | [26da 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26db 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [285a 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e180 gate 1589998860458468200 evaluation fails +peer1.org2.example.com | [285b 05-20 18:21:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [285c 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [285d 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [285e 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e6f0 gate 1589998860460489500 evaluation starts +peer1.org2.example.com | [285f 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e6f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2860 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e6f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2861 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e6f0 principal matched by identity 0 +peer1.org2.example.com | [2862 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2863 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2864 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e6f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2865 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5e6f0 gate 1589998860460489500 evaluation succeeds +peer1.org2.example.com | [2866 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2867 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2868 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2869 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [286a 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [286b 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [286c 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [286d 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [286e 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [286f 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2870 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2871 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2872 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5f8f0 gate 1589998860467395200 evaluation starts +peer1.org2.example.com | [2873 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5f8f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2874 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5f8f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2875 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5f8f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2876 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5f8f0 principal evaluation fails +peer1.org2.example.com | [2877 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5f8f0 gate 1589998860467395200 evaluation fails +peer1.org2.example.com | [2878 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2879 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [287a 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [287b 05-20 18:21:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5fe60 gate 1589998860469957400 evaluation starts +peer1.org2.example.com | [287c 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5fe60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [287e 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5fe60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [28d2 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [28d3 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28d4 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [28d5 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28d6 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28d7 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28d8 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28d9 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26dc 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [26dd 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [26de 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26df 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [26e0 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [26e1 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [26e2 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [26e3 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e4 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e5 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e6 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26e7 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e8 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26e9 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26ea 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26eb 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26ec 05-20 18:20:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26ed 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26ee 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26ef 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f0 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f1 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f2 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f3 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f4 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [26f5 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f6 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [26f8 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26f7 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [26f9 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26fa 05-20 18:20:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26fb 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [26fc 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26fd 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26fe 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26ff 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2700 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2701 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2702 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2703 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2704 05-20 18:20:55.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2705 05-20 18:20:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2706 05-20 18:20:56.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2707 05-20 18:20:56.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2708 05-20 18:20:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2709 05-20 18:20:56.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [270a 05-20 18:20:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [270c 05-20 18:20:56.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [270d 05-20 18:20:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [270e 05-20 18:20:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [270f 05-20 18:20:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2710 05-20 18:20:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2711 05-20 18:20:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2712 05-20 18:20:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2713 05-20 18:20:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2714 05-20 18:20:56.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [270b 05-20 18:20:56.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2717 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2716 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2718 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2719 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [271a 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e608c0 gate 1589998856295084700 evaluation starts +peer0.org2.example.com | [271b 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e608c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [271c 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e608c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [271d 05-20 18:20:56.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e608c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [271e 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e608c0 principal evaluation fails +peer0.org2.example.com | [271f 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e608c0 gate 1589998856295084700 evaluation fails +peer0.org2.example.com | [2720 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2721 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2722 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2715 05-20 18:20:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2724 05-20 18:20:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2725 05-20 18:20:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2726 05-20 18:20:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2727 05-20 18:20:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [287d 05-20 18:21:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org2.example.com | [287f 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer1.org2.example.com | [2880 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5fe60 principal matched by identity 0 +peer1.org2.example.com | [2881 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2882 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [2883 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5fe60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2884 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5fe60 gate 1589998860469957400 evaluation succeeds +peer1.org2.example.com | [2885 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2886 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2887 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2888 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2889 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [288a 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [288b 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [288c 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [288d 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [288e 05-20 18:21:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [288f 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2890 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2891 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2892 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2893 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2894 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2895 05-20 18:21:00.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2896 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2897 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2898 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2899 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [289a 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28da 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28db 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28dc 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28dd 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28de 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28df 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28e0 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28e1 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e2 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28e3 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e4 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [28e5 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [28e6 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [28e7 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28e8 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28e9 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ea 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28eb 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ec 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ed 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [28ee 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28ef 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f0 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f1 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28f2 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [28f3 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [28f4 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26ed 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [26ee 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [26ef 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f0 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [26f1 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [26f2 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26f3 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [26f4 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26f5 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26f6 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [26f7 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [26f8 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [26f9 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 gate 1589998857199528500 evaluation starts +peer0.org1.example.com | [26fa 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [26fb 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [26fc 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 principal matched by identity 0 +peer0.org1.example.com | [26fd 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 1c db c9 74 93 b8 4c e8 82 0a 49 dc 15 91 |.X...t..L...I...| +peer0.org1.example.com | 00000010 7f 2e 44 0c 38 2f 84 e5 90 4b c9 78 fe cd 3b 83 |..D.8/...K.x..;.| +peer0.org1.example.com | [26fe 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 1d f6 f9 ce 95 89 bc 1d ea 08 |0E.!............| +peer0.org1.example.com | 00000010 ad 89 66 54 97 b1 c1 e8 c1 19 5a 44 5b a8 5a 8d |..fT......ZD[.Z.| +peer0.org1.example.com | 00000020 5e 6b a5 91 98 02 20 72 b3 d0 3c 6c 56 ab 6b 7d |^k.... r.. DEBU 0xc0048b1290 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2700 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 gate 1589998857199528500 evaluation succeeds +peer0.org1.example.com | [2701 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2702 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2703 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2704 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2728 05-20 18:20:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2729 05-20 18:20:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [272a 05-20 18:20:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2723 05-20 18:20:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e60e30 gate 1589998856308633900 evaluation starts +peer0.org2.example.com | [272b 05-20 18:20:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e60e30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [272c 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e60e30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [272d 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e60e30 principal matched by identity 0 +peer0.org2.example.com | [272e 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [272f 05-20 18:20:56.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2730 05-20 18:20:56.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e60e30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2731 05-20 18:20:56.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e60e30 gate 1589998856308633900 evaluation succeeds +peer0.org2.example.com | [2732 05-20 18:20:56.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2733 05-20 18:20:56.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2734 05-20 18:20:56.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2735 05-20 18:20:56.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2736 05-20 18:20:56.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2737 05-20 18:20:56.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [2739 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [273a 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [273b 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [273c 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [273d 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [273e 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [273f 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2740 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c3c0 gate 1589998856393345100 evaluation starts +peer0.org2.example.com | [2741 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c3c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2742 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c3c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2743 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2744 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c3c0 principal evaluation fails +peer0.org2.example.com | [2745 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c3c0 gate 1589998856393345100 evaluation fails +peer0.org2.example.com | [2746 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [289b 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [289c 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [289d 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [289e 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [289f 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28a0 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [28a1 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e250 gate 1589998860623800100 evaluation starts +peer1.org2.example.com | [28a2 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28a3 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e250 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [28a4 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [28a5 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e250 principal evaluation fails +peer1.org2.example.com | [28a6 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e250 gate 1589998860623800100 evaluation fails +peer1.org2.example.com | [28a7 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28a8 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28a9 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [28aa 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e7c0 gate 1589998860626213100 evaluation starts +peer1.org2.example.com | [28ab 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e7c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28ac 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e7c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [28ad 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e7c0 principal matched by identity 0 +peer1.org2.example.com | [28ae 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer1.org2.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer1.org2.example.com | [28af 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer1.org2.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer1.org2.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer1.org2.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer1.org2.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer1.org2.example.com | [28b0 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e7c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [28b1 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e9e7c0 gate 1589998860626213100 evaluation succeeds +peer1.org2.example.com | [28b2 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28b3 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28b4 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [28b5 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [28b6 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [28b7 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [28b8 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [28b9 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [28ba 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [28bb 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28bc 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28bd 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28be 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [28bf 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28c0 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28c1 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28c2 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [28c3 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\316\373\263\251P\021\244 \335A\342\311\357\032+xCy\330\002 \022s[\362\237\321\370K\205#\221(\037\177\225\024\t\223\203\222\035\r\177T\014\037\336L\027\320\353\223" > +peer1.org2.example.com | [28c4 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [28c5 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28c6 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [28c7 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [28c8 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [28c9 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [28ca 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28cb 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [28cc 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [28cd 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ce 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28cf 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28d0 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28d1 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28d2 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28d3 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [28d4 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28d5 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [28d6 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [28d7 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28d8 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [28d9 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [28da 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer1.org2.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer1.org2.example.com | [28db 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer1.org2.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer1.org2.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer1.org2.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer1.org2.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer1.org2.example.com | [28dc 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [28dd 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 fa db 69 70 33 32 cf a3 50 07 26 |0D. B..ip32..P.&| +peer1.org2.example.com | 00000010 4b f5 0c 56 74 db e9 4e 64 a8 93 34 9c 92 c7 5e |K..Vt..Nd..4...^| +peer1.org2.example.com | 00000020 12 94 cb f0 02 20 03 fe 8f 12 d5 e4 ac 5a 0b 10 |..... .......Z..| +peer1.org2.example.com | 00000030 62 fd 67 85 80 c7 e0 7b eb 84 8b 73 87 60 82 5b |b.g....{...s.`.[| +peer1.org2.example.com | 00000040 c1 42 df 5b 5f 5e |.B.[_^| +peer1.org2.example.com | [28de 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [28df 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [28e0 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [28e1 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [28e2 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [28e3 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28e4 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28e5 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28e6 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [28e7 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28e8 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28e9 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [28ea 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\316\373\263\251P\021\244 \335A\342\311\357\032+xCy\330\002 \022s[\362\237\321\370K\205#\221(\037\177\225\024\t\223\203\222\035\r\177T\014\037\336L\027\320\353\223" > +peer1.org2.example.com | [28eb 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [28ec 05-20 18:21:00.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28ed 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ee 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ef 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [28f0 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28f1 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28f2 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [28f3 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [28f4 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28f5 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [28f6 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [28f7 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [28f8 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28f9 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [28fa 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28fb 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [28fc 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [28fd 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28fe 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [28ff 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2900 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2901 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2902 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2903 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2904 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eeeaf0 gate 1589998861003256800 evaluation starts +peer1.org2.example.com | [2905 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eeeaf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2906 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eeeaf0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2907 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eeeaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2908 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eeeaf0 principal evaluation fails +peer1.org2.example.com | [2909 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eeeaf0 gate 1589998861003256800 evaluation fails +peer1.org2.example.com | [290a 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [290b 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [290c 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [290d 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eef060 gate 1589998861011759000 evaluation starts +peer1.org2.example.com | [290e 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eef060 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [290f 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eef060 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2910 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eef060 principal matched by identity 0 +peer1.org2.example.com | [2911 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +peer1.org2.example.com | 00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +peer1.org2.example.com | [2912 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +peer0.org1.example.com | [2705 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2706 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2707 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2708 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2709 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [270a 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [270b 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [270c 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [270d 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [270e 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [270f 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2710 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2711 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2712 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2713 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [2714 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2715 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2716 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2717 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2718 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2719 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [271a 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 06 6e f0 5d 5a 1a 16 b7 cd 74 72 41 50 db 79 |..n.]Z....trAP.y| +peer0.org1.example.com | 00000010 d8 e8 68 bf e7 8d 16 c3 7a 9d eb 98 7e b9 af f5 |..h.....z...~...| +peer0.org1.example.com | [271b 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 cd 7c 8c 79 45 5b bb cc 4b 91 78 |0D. B.|.yE[..K.x| +peer0.org1.example.com | 00000010 f3 6f e2 9a 3a 0b cc cf 06 57 76 61 65 59 05 68 |.o..:....WvaeY.h| +peer0.org1.example.com | 00000020 f9 11 1c f7 02 20 23 d9 dc 2d 16 6b 7d ef 6a 56 |..... #..-.k}.jV| +peer0.org1.example.com | 00000030 7e d1 bb e2 b2 c9 83 af 33 48 f3 b0 ac fe d5 69 |~.......3H.....i| +peer0.org1.example.com | 00000040 aa 02 04 ae da 0f |......| +peer0.org1.example.com | [271c 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [271d 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [271e 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [28f5 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [28f6 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28f7 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28f8 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [28f9 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [28fa 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [28fb 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6f2e0 gate 1589998869201032400 evaluation starts +peer1.org1.example.com | [28fc 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6f2e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [28fd 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6f2e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [28fe 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6f2e0 principal matched by identity 0 +peer1.org1.example.com | [28ff 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer1.org1.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer1.org1.example.com | [2900 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer1.org1.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer1.org1.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer1.org1.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer1.org1.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer1.org1.example.com | [2901 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6f2e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2902 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6f2e0 gate 1589998869201032400 evaluation succeeds +peer1.org1.example.com | [2903 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2904 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2905 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2906 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2907 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2908 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2909 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [290a 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [290b 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [290c 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [290d 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [290e 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [290f 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2910 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2911 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2912 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2913 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2914 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2915 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +peer1.org2.example.com | 00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +peer1.org2.example.com | 00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +peer1.org2.example.com | 00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +peer1.org2.example.com | [2913 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eef060 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2914 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eef060 gate 1589998861011759000 evaluation succeeds +peer1.org2.example.com | [2915 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2916 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2917 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2747 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2748 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2749 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c930 gate 1589998856394005700 evaluation starts +peer0.org2.example.com | [274a 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [274b 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c930 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [274c 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c930 principal matched by identity 0 +peer0.org2.example.com | [274d 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [274e 05-20 18:20:56.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [274f 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c930 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2750 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8c930 gate 1589998856394005700 evaluation succeeds +peer0.org2.example.com | [2751 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2752 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2753 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2754 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2755 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2756 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2757 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2758 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2759 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275a 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [275b 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [275c 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [275d 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [275e 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [275f 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2760 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8dd80 gate 1589998856402164200 evaluation starts +peer0.org2.example.com | [2761 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8dd80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2762 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8dd80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2763 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8dd80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2764 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8dd80 principal evaluation fails +peer0.org2.example.com | [2765 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8dd80 gate 1589998856402164200 evaluation fails +peer0.org2.example.com | [2766 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2767 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2768 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2769 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea62f0 gate 1589998856402562000 evaluation starts +peer0.org2.example.com | [276a 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea62f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2916 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\300\215_8pQ\253" > alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > alive: alive: +peer1.org1.example.com | [2917 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [2918 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 11 47 70 76 bb 00 74 a9 12 77 da 29 00 83 b9 |".Gpv..t..w.)...| +peer1.org1.example.com | 00000010 18 91 bd e1 43 3e 02 73 d3 0a 58 8e d0 be 46 ba |....C>.s..X...F.| +peer1.org1.example.com | [2919 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 06 64 6d bd 80 d7 ff 52 f3 48 |0E.!...dm....R.H| +peer1.org1.example.com | 00000010 c3 fe e0 be 81 a9 fa 34 32 8f cc 40 c7 be 43 b7 |.......42..@..C.| +peer1.org1.example.com | 00000020 bc db 16 67 50 02 20 32 66 dc 1b 6e 75 f5 74 cb |...gP. 2f..nu.t.| +peer1.org1.example.com | 00000030 59 b9 22 fb d5 48 ff 0f 77 40 26 ae 51 f7 e3 23 |Y."..H..w@&.Q..#| +peer1.org1.example.com | 00000040 65 90 63 e4 35 de 44 |e.c.5.D| +peer1.org1.example.com | [291a 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [291b 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [291c 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [291d 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [291e 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [291f 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2920 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2921 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2922 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2923 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2924 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2925 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2926 05-20 18:21:11.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2927 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2928 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2929 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [292a 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [292b 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [292c 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [292d 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [292e 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2930 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2931 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2932 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2933 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2934 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2935 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2936 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [271f 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2720 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2721 05-20 18:20:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2722 05-20 18:20:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2723 05-20 18:20:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2724 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2725 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2726 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2727 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2728 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2729 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [272a 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [272b 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [272c 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [272d 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [272e 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [272f 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2730 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2731 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2732 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2733 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2734 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2735 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2736 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2737 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2738 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2739 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [273a 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [273b 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [273c 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [273d 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [273e 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [273f 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2740 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2741 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2742 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2743 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2745 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 gate 1589998858710576300 evaluation starts +peer0.org1.example.com | [2746 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2747 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2748 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 principal matched by identity 0 +peer0.org1.example.com | [2744 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [274a 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2749 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 e2 95 d2 b0 95 a4 91 7b 7c 73 6f 04 e7 42 86 |........{|so..B.| +peer0.org1.example.com | 00000010 4b 34 1c 03 4d 62 24 de a3 f2 13 30 73 2a aa 85 |K4..Mb$....0s*..| +peer0.org1.example.com | [274b 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 7d 4d 4e fc d8 96 fe 27 b7 27 |0E.!..}MN....'.'| +peer0.org1.example.com | 00000010 93 ca c7 40 04 af 4f c4 52 0c d7 2c 4d b1 b6 da |...@..O.R..,M...| +peer0.org1.example.com | 00000020 68 84 c4 fc c2 02 20 1e df 06 61 02 f2 08 4f 52 |h..... ...a...OR| +peer0.org1.example.com | 00000030 cc 1f fc 75 9e d0 8d 25 78 1e d4 72 1d f6 71 fe |...u...%x..r..q.| +peer0.org1.example.com | 00000040 81 f0 4c e3 78 dd 29 |..L.x.)| +peer0.org1.example.com | [274c 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [274d 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 gate 1589998858710576300 evaluation succeeds +peer0.org1.example.com | [274e 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [274f 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2750 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2751 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2752 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2753 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2754 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2755 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2756 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2757 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2918 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2919 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [291a 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [291b 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [291c 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [291d 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [291e 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [291f 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2920 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2921 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [2922 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2923 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2924 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2925 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2926 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\316\373\263\251P\021\244 \335A\342\311\357\032+xCy\330\002 \022s[\362\237\321\370K\205#\221(\037\177\225\024\t\223\203\222\035\r\177T\014\037\336L\027\320\353\223" > +peer1.org2.example.com | [2927 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2928 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2929 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [292a 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [292b 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [292c 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [292d 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [292f 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2930 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2931 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2932 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2933 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [292e 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2934 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2935 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2936 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2937 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2938 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2939 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [293a 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [293b 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [293c 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [293d 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [293e 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [293f 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2940 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816102D +peer1.org2.example.com | [2941 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C249B49419AC01E09CBFD9AD7F6BDC81910F1AEB2DD48CDF099AB65A12B859E8 +peer1.org2.example.com | [2942 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2943 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2944 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2945 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2946 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2947 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2948 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2949 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [294a 05-20 18:21:01.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [294c 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2758 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2759 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [275a 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [275b 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [275c 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [275d 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [275e 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [275f 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2760 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2761 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2762 05-20 18:20:58.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2763 05-20 18:20:58.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2764 05-20 18:20:58.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2765 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2766 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2767 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2768 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2769 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [276a 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [276b 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [276c 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [276d 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [276e 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [276f 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2770 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2771 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2772 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161029 +peer0.org1.example.com | [2773 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D615589DF87D8960DD94DB4724B1163B6E4BAEC71EDBDE4E6FD71E59231D5D02 +peer0.org1.example.com | [2774 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2775 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2776 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2777 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [2778 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2779 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [277a 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [277b 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2937 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2938 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2939 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [293a 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [293b 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [293c 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [293d 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be43d0 gate 1589998871906732000 evaluation starts +peer1.org1.example.com | [293e 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be43d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [293f 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be43d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2940 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be43d0 principal matched by identity 0 +peer1.org1.example.com | [2941 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2942 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2943 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be43d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2944 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be43d0 gate 1589998871906732000 evaluation succeeds +peer1.org1.example.com | [2945 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2946 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2947 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2948 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2949 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [294b 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [292f 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [294a 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [294c 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [294d 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [294e 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [294f 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2950 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2951 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2952 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3090 gate 1589998871916357300 evaluation starts +peer1.org1.example.com | [2953 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3090 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2954 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3090 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2955 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3090 principal matched by identity 0 +peer1.org1.example.com | [2956 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2957 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004bb3090 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2959 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3090 gate 1589998871916357300 evaluation succeeds +peer1.org1.example.com | [295a 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [295b 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [295c 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [295d 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [295e 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [295f 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2960 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2961 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2962 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2963 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2964 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2965 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2966 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2967 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2968 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2969 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c004e0 gate 1589998871926095300 evaluation starts +peer1.org1.example.com | [296a 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c004e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [296b 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c004e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [296c 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c004e0 principal matched by identity 0 +peer0.org2.example.com | [276b 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea62f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [276c 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea62f0 principal matched by identity 0 +peer0.org2.example.com | [276d 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [276e 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [276f 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea62f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2770 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea62f0 gate 1589998856402562000 evaluation succeeds +peer0.org2.example.com | [2771 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2772 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2773 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2774 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2775 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2776 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2777 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2778 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2779 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [277a 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [277b 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [277c 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [277d 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea74f0 gate 1589998856406480300 evaluation starts +peer0.org2.example.com | [277e 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea74f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [277f 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea74f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2780 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea74f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2781 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea74f0 principal evaluation fails +peer0.org2.example.com | [2782 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea74f0 gate 1589998856406480300 evaluation fails +peer0.org2.example.com | [2783 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2784 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2785 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2786 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7a60 gate 1589998856407537800 evaluation starts +peer0.org2.example.com | [2787 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7a60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2788 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7a60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2789 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7a60 principal matched by identity 0 +peer0.org2.example.com | [278a 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [278b 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [278c 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7a60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [278d 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea7a60 gate 1589998856407537800 evaluation succeeds +peer0.org2.example.com | [278e 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [278f 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2790 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2791 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2792 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2793 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2794 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2795 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [2797 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2798 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2799 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [279a 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [279b 05-20 18:20:56.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [279c 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [279d 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [279e 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [279f 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27a0 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [27a1 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec7c90 gate 1589998856410202800 evaluation starts +peer0.org2.example.com | [27a2 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec7c90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27a3 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec7c90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [277c 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [277d 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [277e 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [277f 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2780 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2781 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2782 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 gate 1589998859021118100 evaluation starts +peer0.org1.example.com | [2783 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2784 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2785 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 principal matched by identity 0 +peer0.org1.example.com | [2786 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 6b 24 2a 5a a9 0e fc 2c 35 44 de 2d ba 08 b4 |.k$*Z...,5D.-...| +peer0.org1.example.com | 00000010 5d a5 6a 28 ee bd 61 d8 4a d2 e8 d3 a9 eb 6b 02 |].j(..a.J.....k.| +peer0.org1.example.com | [2787 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf c0 75 b3 f3 7f 8f f4 5d 3b 9b |0E.!...u.....];.| +peer0.org1.example.com | 00000010 e1 3e ce fb b3 a9 50 11 a4 20 dd 41 e2 c9 ef 1a |.>....P.. .A....| +peer0.org1.example.com | 00000020 2b 78 43 79 d8 02 20 12 73 5b f2 9f d1 f8 4b 85 |+xCy.. .s[....K.| +peer0.org1.example.com | 00000030 23 91 28 1f 7f 95 14 09 93 83 92 1d 0d 7f 54 0c |#.(...........T.| +peer0.org1.example.com | 00000040 1f de 4c 17 d0 eb 93 |..L....| +peer0.org1.example.com | [2788 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2789 05-20 18:20:59.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [278a 05-20 18:20:59.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [278b 05-20 18:20:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [278c 05-20 18:20:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 gate 1589998859021118100 evaluation succeeds +peer0.org1.example.com | [278d 05-20 18:20:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [278e 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [278f 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2790 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2791 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2792 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2793 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2794 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2795 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2796 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2797 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2798 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2799 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [294d 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [294e 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [294b 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [294f 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2950 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2951 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2952 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 49 b4 94 19 ac 01 e0 9c bf d9 ad 7f 6b dc 81 |.I...........k..| +peer1.org2.example.com | 00000010 91 0f 1a eb 2d d4 8c df 09 9a b6 5a 12 b8 59 e8 |....-......Z..Y.| +peer1.org2.example.com | [2953 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 70 e7 1e d9 c9 83 30 29 6e 49 42 |0D. p.....0)nIB| +peer1.org2.example.com | 00000010 af 5d 2b 71 c7 6f 15 fc ce 10 50 15 7f e2 1b 67 |.]+q.o....P....g| +peer1.org2.example.com | 00000020 f3 04 ae e0 02 20 44 78 31 d6 0d 50 0c ea 5a b2 |..... Dx1..P..Z.| +peer1.org2.example.com | 00000030 b2 90 45 f0 b3 a6 de 01 67 fe 77 95 b2 80 d3 4a |..E.....g.w....J| +peer1.org2.example.com | 00000040 ed b4 ac cf 07 b5 |......| +peer1.org2.example.com | [2954 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2955 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2956 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2957 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2958 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2959 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [296d 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [296e 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004c004e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2970 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c004e0 gate 1589998871926095300 evaluation succeeds +peer1.org1.example.com | [2971 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2972 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2973 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2974 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2975 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2976 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2977 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2978 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2979 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [297a 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [297b 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [297c 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [297d 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [297e 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [297f 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2980 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2981 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c184c0 gate 1589998871934772300 evaluation starts +peer1.org1.example.com | [2982 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c184c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2983 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c184c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2984 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c184c0 principal matched by identity 0 +peer1.org1.example.com | [2985 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2986 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2987 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c184c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [279a 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [279b 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [279c 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [279d 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [279e 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [279f 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [27a0 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27a1 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [27a2 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [27a3 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27a4 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27a5 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27a6 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27a7 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27a8 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [27a9 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27aa 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [27ab 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [27ac 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27ad 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [27ae 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27af 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [27b0 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27b1 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [27b2 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27b3 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [27b4 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27b5 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [27b6 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [27b7 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27b8 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [27b9 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27ba 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27bb 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27bc 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [27bd 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [27be 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [295a 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [295b 05-20 18:21:01.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [295c 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [295d 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [295e 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2960 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6120 gate 1589998861187585400 evaluation starts +peer1.org2.example.com | [2961 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2962 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6120 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2963 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2964 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6120 principal evaluation fails +peer1.org2.example.com | [2965 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6120 gate 1589998861187585400 evaluation fails +peer1.org2.example.com | [2966 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2967 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2968 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2969 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6690 gate 1589998861189581000 evaluation starts +peer1.org2.example.com | [296a 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [296b 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [296c 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [295f 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [296d 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [296e 05-20 18:21:01.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6690 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [296f 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6690 principal matched by identity 0 +peer1.org2.example.com | [2970 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer1.org2.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer1.org2.example.com | [2971 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer1.org2.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer1.org2.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer1.org2.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer1.org2.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer1.org2.example.com | [2972 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6690 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2973 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6690 gate 1589998861189581000 evaluation succeeds +peer1.org2.example.com | [2974 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2975 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2976 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2977 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2978 05-20 18:21:01.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2979 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [297a 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [297b 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer1.org2.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer1.org2.example.com | [297c 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer1.org2.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer1.org2.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer1.org2.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer1.org2.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer1.org2.example.com | [297d 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [297e 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [297f 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2981 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2983 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2980 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer0.org2.example.com | [27a4 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec7c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [27a5 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec7c90 principal evaluation fails +peer0.org2.example.com | [27a6 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec7c90 gate 1589998856410202800 evaluation fails +peer0.org2.example.com | [27a7 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [27a8 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [27a9 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [27aa 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee2200 gate 1589998856410574400 evaluation starts +peer0.org2.example.com | [27ab 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee2200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27ac 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee2200 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2988 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c184c0 gate 1589998871934772300 evaluation succeeds +peer1.org1.example.com | [2989 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [298a 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [298b 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [298c 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [298d 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [298e 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [298f 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2990 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2991 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2992 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2993 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2994 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2995 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2996 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2997 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2998 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c19910 gate 1589998871939937400 evaluation starts +peer1.org1.example.com | [2999 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c19910 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [299a 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c19910 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [299b 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c19910 principal matched by identity 0 +peer1.org1.example.com | [299c 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [299d 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [299e 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c19910 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [299f 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c19910 gate 1589998871939937400 evaluation succeeds +peer1.org1.example.com | [29a0 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [29a1 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [29a2 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [29a3 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [29a4 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [29a5 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [29a6 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29a7 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29a8 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [29a9 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29aa 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29ab 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [29ac 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [29ad 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [29ae 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c41200 gate 1589998871948173600 evaluation starts +peer1.org1.example.com | [29af 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c41200 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [29b0 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c41200 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [29b1 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c41200 principal matched by identity 0 +peer1.org1.example.com | [29b2 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [29b3 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004c41200 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [29b5 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c41200 gate 1589998871948173600 evaluation succeeds +peer1.org1.example.com | [29b6 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [29b7 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [29b8 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [29b9 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [29ba 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [29bb 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [29bc 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29bd 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [29be 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [29bf 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29c0 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29c1 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29c2 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c3 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [29c4 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [29c5 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29c6 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29c7 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27ad 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee2200 principal matched by identity 0 +peer0.org2.example.com | [27ae 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [27af 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [27b0 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee2200 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [27b1 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee2200 gate 1589998856410574400 evaluation succeeds +peer0.org2.example.com | [27b2 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27b3 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27b4 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [27b5 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [27b6 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27b7 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27b8 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27b9 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27ba 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27bb 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [27bc 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27bd 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [27be 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3400 gate 1589998856411897000 evaluation starts +peer0.org2.example.com | [27bf 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27c0 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3400 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [27c1 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [27c2 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3400 principal evaluation fails +peer0.org2.example.com | [27c3 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3400 gate 1589998856411897000 evaluation fails +peer0.org2.example.com | [27c4 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [27c5 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [27c6 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [27c7 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3970 gate 1589998856412350900 evaluation starts +peer0.org2.example.com | [27c8 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27c9 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3970 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [27ca 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3970 principal matched by identity 0 +peer0.org2.example.com | [27cb 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [27cc 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [27cd 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3970 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27bf 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [27c0 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27c1 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [27c2 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27c3 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [27c5 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [27c4 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [27c6 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [27c7 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [27c8 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [27c9 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [27ca 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [27cb 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27cc 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27cd 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27ce 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27cf 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27d0 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27d1 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27d2 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27d3 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 gate 1589998859592512600 evaluation starts +peer0.org1.example.com | [27d4 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27d5 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [27d6 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 principal matched by identity 0 +peer0.org1.example.com | [27d7 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [27d8 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [2984 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [2986 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2987 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB38816100D1801 +peer1.org2.example.com | [2988 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F6B41377E902DCA9B41B1B5784665101DEFB63D072DBCE0148E70424A1A2B400 +peer1.org2.example.com | [2989 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2985 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [298a 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [298b 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [298c 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [298d 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [298e 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [298f 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2990 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2991 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [2992 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2993 05-20 18:21:01.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2994 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2995 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2996 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2997 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2998 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2999 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [299a 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b840 gate 1589998861230001400 evaluation starts +peer1.org2.example.com | [299b 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b840 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [299c 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b840 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [299d 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [299e 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b840 principal evaluation fails +peer1.org2.example.com | [299f 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335b840 gate 1589998861230001400 evaluation fails +peer1.org2.example.com | [29a0 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29a1 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29a2 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [29a3 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335bdb0 gate 1589998861231343900 evaluation starts +peer1.org2.example.com | [29a4 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335bdb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29a5 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335bdb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [29a6 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335bdb0 principal matched by identity 0 +peer1.org2.example.com | [29a7 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +peer1.org2.example.com | 00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +peer1.org2.example.com | [29a8 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +peer1.org2.example.com | 00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +peer1.org2.example.com | 00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +peer1.org2.example.com | 00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +peer1.org2.example.com | 00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +peer1.org2.example.com | [29a9 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335bdb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29aa 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335bdb0 gate 1589998861231343900 evaluation succeeds +peer1.org2.example.com | [29ab 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [29ac 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [29ad 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29ae 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [29af 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [29b0 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29b1 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [29b2 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer1.org2.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer1.org2.example.com | [29b3 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer1.org2.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer1.org2.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer1.org2.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer1.org2.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer1.org2.example.com | [29b4 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [29b5 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29b6 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [29b7 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 49 b4 94 19 ac 01 e0 9c bf d9 ad 7f 6b dc 81 |.I...........k..| +peer1.org2.example.com | 00000010 91 0f 1a eb 2d d4 8c df 09 9a b6 5a 12 b8 59 e8 |....-......Z..Y.| +peer1.org2.example.com | [29b8 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 70 e7 1e d9 c9 83 30 29 6e 49 42 |0D. p.....0)nIB| +peer1.org2.example.com | 00000010 af 5d 2b 71 c7 6f 15 fc ce 10 50 15 7f e2 1b 67 |.]+q.o....P....g| +peer1.org2.example.com | 00000020 f3 04 ae e0 02 20 44 78 31 d6 0d 50 0c ea 5a b2 |..... Dx1..P..Z.| +peer1.org2.example.com | 00000030 b2 90 45 f0 b3 a6 de 01 67 fe 77 95 b2 80 d3 4a |..E.....g.w....J| +peer1.org2.example.com | 00000040 ed b4 ac cf 07 b5 |......| +peer1.org2.example.com | [29b9 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [29ba 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [29bb 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29bc 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29bd 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [29be 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [29bf 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 49 b4 94 19 ac 01 e0 9c bf d9 ad 7f 6b dc 81 |.I...........k..| +peer1.org2.example.com | 00000010 91 0f 1a eb 2d d4 8c df 09 9a b6 5a 12 b8 59 e8 |....-......Z..Y.| +peer1.org2.example.com | [29c1 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 70 e7 1e d9 c9 83 30 29 6e 49 42 |0D. p.....0)nIB| +peer1.org2.example.com | 00000010 af 5d 2b 71 c7 6f 15 fc ce 10 50 15 7f e2 1b 67 |.]+q.o....P....g| +peer1.org2.example.com | 00000020 f3 04 ae e0 02 20 44 78 31 d6 0d 50 0c ea 5a b2 |..... Dx1..P..Z.| +peer1.org2.example.com | 00000030 b2 90 45 f0 b3 a6 de 01 67 fe 77 95 b2 80 d3 4a |..E.....g.w....J| +peer1.org2.example.com | 00000040 ed b4 ac cf 07 b5 |......| +peer1.org2.example.com | [29c2 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [29c3 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 67 0a 71 77 bf 7b a9 fa c8 95 |0E.!..g.qw.{....| +peer1.org2.example.com | 00000010 0a 72 f4 11 ef 85 72 9a 85 5b d2 b3 1d 21 51 90 |.r....r..[...!Q.| +peer1.org2.example.com | 00000020 c3 8f 91 5a 86 02 20 01 72 24 f7 13 cc 6d b0 fb |...Z.. .r$...m..| +peer1.org2.example.com | 00000030 24 be c9 64 21 2e 95 b2 84 2f fa 2f f1 8d 98 e5 |$..d!...././....| +peer1.org2.example.com | 00000040 6f 36 6f eb 48 62 e9 |o6o.Hb.| +peer1.org2.example.com | [29c0 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c8 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c9 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [29ca 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29cb 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [29cc 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29cd 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [29ce 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29cf 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d0 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29d1 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d2 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29d3 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d4 05-20 18:21:12.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29d5 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d6 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d7 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29d8 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d9 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [29da 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [29db 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29dc 05-20 18:21:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [29dd 05-20 18:21:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [29de 05-20 18:21:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [29df 05-20 18:21:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29e0 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29e1 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27d9 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27da 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 gate 1589998859592512600 evaluation succeeds +peer0.org1.example.com | [27db 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27dc 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27dd 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [27de 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27df 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27e0 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27e1 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27e2 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27e3 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27e5 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27e6 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27e4 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer0.org1.example.com | [27e7 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer0.org1.example.com | [27e8 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer0.org1.example.com | [27e9 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27ea 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 gate 1589998859602589000 evaluation starts +peer0.org1.example.com | [27eb 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27ec 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [27ed 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 principal matched by identity 0 +peer0.org1.example.com | [27ee 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [27ef 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [27f0 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27f1 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 gate 1589998859602589000 evaluation succeeds +peer0.org1.example.com | [27f2 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27f3 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27f4 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [27f5 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27f6 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27f7 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [27f8 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27f9 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27fa 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27fb 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27fc 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27fd 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27fe 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27ff 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2800 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2801 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 gate 1589998859623465100 evaluation starts +peer0.org1.example.com | [2802 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2803 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2804 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 principal matched by identity 0 +peer0.org1.example.com | [2805 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2806 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2807 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2808 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 gate 1589998859623465100 evaluation succeeds +peer0.org1.example.com | [2809 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [280a 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [280b 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [280c 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [280d 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [280e 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | [29c4 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [29c5 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [29c6 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29c7 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29c8 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [29c9 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29ca 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [29cb 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [29cc 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29cd 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [29ce 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29cf 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29d0 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [29d1 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [29d2 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [29d3 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1860 gate 1589998863354423800 evaluation starts +peer1.org2.example.com | [29d4 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29d5 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1860 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [29d6 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [29d7 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1860 principal evaluation fails +peer1.org2.example.com | [29d8 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1860 gate 1589998863354423800 evaluation fails +peer1.org2.example.com | [29d9 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29da 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29db 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [29dc 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1dd0 gate 1589998863354705400 evaluation starts +peer1.org2.example.com | [29dd 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1dd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29de 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1dd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [29df 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1dd0 principal matched by identity 0 +peer1.org2.example.com | [29e0 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b ab 66 01 c3 50 4d 84 f5 de f4 13 8b 08 c0 74 |K.f..PM........t| +peer1.org2.example.com | 00000010 cb b3 c5 21 22 6c 2f 80 86 ad f2 1c 0f 02 9e 28 |...!"l/........(| +peer1.org2.example.com | [29e1 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 21 7b 3e b7 a0 15 80 2f f8 86 69 |0D. [!{>..../..i| +peer1.org2.example.com | 00000010 57 47 2a 89 fd 28 6c ac 67 6e a7 e2 3e 9a a6 80 |WG*..(l.gn..>...| +peer1.org2.example.com | 00000020 75 ce 4e ef 02 20 19 0f 49 17 b3 92 a8 4d a5 7a |u.N.. ..I....M.z| +peer1.org2.example.com | 00000030 3c e0 85 17 e2 99 a8 f4 cb 36 af f7 3f 56 e4 8d |<........6..?V..| +peer1.org2.example.com | 00000040 09 83 0f 9f 3e 54 |....>T| +peer1.org2.example.com | [29e2 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1dd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29e3 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a1dd0 gate 1589998863354705400 evaluation succeeds +peer1.org2.example.com | [29e4 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27ce 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3970 gate 1589998856412350900 evaluation succeeds +peer0.org2.example.com | [27cf 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27d0 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27d1 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [27d2 05-20 18:20:56.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [27d3 05-20 18:20:56.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [27d4 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [27d6 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [27d7 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27d8 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [27d9 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe d1 4b 12 e6 ba 2a 2b b4 dd 79 3d 47 dc 08 0b |..K...*+..y=G...| +peer0.org2.example.com | 00000010 a5 a6 9e 90 bb 20 68 e9 94 9f 60 a0 63 1e 7a 1b |..... h...`.c.z.| +peer0.org2.example.com | [27da 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 34 6c 54 47 bf b6 7a 56 3e f7 d4 |0D. y4lTG..zV>..| +peer0.org2.example.com | 00000010 11 55 02 eb 26 4a 0a c1 d2 5e 91 44 f0 1e 59 d5 |.U..&J...^.D..Y.| +peer0.org2.example.com | 00000020 6b ba e9 e1 02 20 38 41 48 e6 03 78 fb c4 5b 03 |k.... 8AH..x..[.| +peer0.org2.example.com | 00000030 de ae de 83 c0 30 40 40 f6 db a0 11 f7 70 a6 50 |.....0@@.....p.P| +peer0.org2.example.com | 00000040 a9 e9 2c 70 23 eb |..,p#.| +peer0.org2.example.com | [27db 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27dc 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [27dd 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [27de 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27df 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [27e0 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [27e1 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e2 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e3 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e4 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e5 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e6 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e7 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [27e8 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27e9 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [27ea 05-20 18:20:56.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27eb 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27ed 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27ec 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27ee 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27ef 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [27f0 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [27f1 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [27f2 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27f3 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [27f4 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [27f5 05-20 18:20:56.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27f6 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27f7 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27f8 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27f9 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [27fa 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27fb 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [27fc 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3e0 gate 1589998856696116500 evaluation starts +peer0.org2.example.com | [27fd 05-20 18:20:56.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27fe 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [27ff 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2800 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3e0 principal evaluation fails +peer0.org2.example.com | [2801 05-20 18:20:56.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3e0 gate 1589998856696116500 evaluation fails +peer0.org2.example.com | [2802 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2803 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2804 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2805 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b950 gate 1589998856712606200 evaluation starts +peer0.org2.example.com | [2806 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b950 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2807 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b950 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2808 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b950 principal matched by identity 0 +peer0.org2.example.com | [2809 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer0.org2.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer0.org2.example.com | [280a 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer0.org2.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer0.org2.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer0.org2.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer0.org2.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer0.org2.example.com | [280b 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b950 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [280c 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b950 gate 1589998856712606200 evaluation succeeds +peer0.org2.example.com | [280d 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [280e 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [280f 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2810 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2811 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2812 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2813 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2814 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2815 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2816 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2817 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2818 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2819 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [281a 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [281b 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [281c 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [281d 05-20 18:20:56.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [281e 05-20 18:20:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2820 05-20 18:20:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [281f 05-20 18:20:56.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020(" > alive: alive: alive: \344\346\330\007Y\325\r\341\364Q\355\020\301\202\260" > +peer0.org2.example.com | [2821 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2822 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2823 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2824 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2825 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2826 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2827 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2828 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2829 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [282a 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [282b 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [282c 05-20 18:20:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [282d 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [282e 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [282f 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2830 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2831 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2832 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2833 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2834 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2835 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2836 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2837 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2838 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2839 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [283a 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [283b 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [283c 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [283d 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [283e 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [283f 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2840 05-20 18:20:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2841 05-20 18:20:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161029 +peer0.org2.example.com | [2842 05-20 18:20:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6826F1D3F4BBD7D3787D01449391F58B2B81E418A4042248A35469D7D412DD10 +peer0.org2.example.com | [2843 05-20 18:20:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2844 05-20 18:20:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2845 05-20 18:20:56.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [29e2 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [29e3 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29e4 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29e5 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29e6 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [29e7 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29e8 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [29e9 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [29ea 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29eb 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [29ec 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161033 +peer1.org1.example.com | [29ed 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E744A9F46CE2825060AE3E0FB2CE690A8594674C8B903497C8223A591785B74 +peer1.org1.example.com | [29ee 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [29ef 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [29f0 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [29f1 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29f2 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29f3 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29f5 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29f4 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [29f7 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29f6 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29f8 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [29f9 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29fa 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [29fb 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29fc 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [29fd 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [29fe 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29ff 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [280f 05-20 18:20:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2810 05-20 18:20:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2811 05-20 18:20:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2812 05-20 18:20:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2813 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2814 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2815 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2816 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2817 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 gate 1589998859652184300 evaluation starts +peer0.org1.example.com | [2818 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2819 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [281a 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 principal matched by identity 0 +peer0.org1.example.com | [281b 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [281c 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0049bf990 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [281e 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 gate 1589998859652184300 evaluation succeeds +peer0.org1.example.com | [281f 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2820 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2821 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2822 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2823 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2824 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2825 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2826 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2827 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2828 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2829 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [282a 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [282b 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [282c 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [282d 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2846 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2847 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2848 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2849 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [284a 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [284b 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [284c 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [284d 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [284e 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [284f 05-20 18:20:56.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2851 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2850 05-20 18:20:56.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2852 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2853 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2854 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2855 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer0.org2.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer0.org2.example.com | [2856 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer0.org2.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer0.org2.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer0.org2.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer0.org2.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer0.org2.example.com | [2857 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2858 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2859 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [285a 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [285b 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [285c 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [285d 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [285e 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [285f 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2860 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2861 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2862 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2863 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2864 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2865 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2866 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa460 gate 1589998856922912200 evaluation starts +peer0.org2.example.com | [2867 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2868 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa460 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2869 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [286a 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa460 principal evaluation fails +peer0.org2.example.com | [286b 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa460 gate 1589998856922912200 evaluation fails +peer0.org2.example.com | [286c 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [286d 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [286e 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [286f 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa9d0 gate 1589998856923346400 evaluation starts +peer0.org2.example.com | [2870 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa9d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2871 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa9d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2872 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa9d0 principal matched by identity 0 +peer0.org2.example.com | [2873 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +peer0.org2.example.com | 00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +peer0.org2.example.com | [2874 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +peer0.org2.example.com | 00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +peer0.org2.example.com | 00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +peer0.org2.example.com | 00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +peer0.org2.example.com | 00000040 7d 0f 08 fd 0a 01 1e |}......| +peer0.org2.example.com | [2875 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa9d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2876 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa9d0 gate 1589998856923346400 evaluation succeeds +peer0.org2.example.com | [2877 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2878 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2879 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [287a 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [287b 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [287c 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [287d 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [287e 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer0.org2.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer0.org2.example.com | [287f 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer0.org2.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer0.org2.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer0.org2.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer0.org2.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer0.org2.example.com | [2880 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2881 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2882 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2883 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2884 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2885 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2886 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2887 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2888 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +peer0.org2.example.com | 00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +peer0.org2.example.com | [2889 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +peer0.org2.example.com | 00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +peer0.org2.example.com | 00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +peer0.org2.example.com | 00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +peer0.org2.example.com | 00000040 84 7f 49 97 a7 8c 2a |..I...*| +peer0.org2.example.com | [288a 05-20 18:20:56.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [288b 05-20 18:20:56.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 4e c7 19 c2 2b f2 51 71 08 ea ef |0D. .N...+.Qq...| +peer0.org2.example.com | 00000010 1e 5a 6b e8 4e 7d b2 7f ab 75 9e 1a da 09 79 ef |.Zk.N}...u....y.| +peer0.org2.example.com | 00000020 7a ae bf 33 02 20 34 b1 46 b9 ee bc 77 bb 30 62 |z..3. 4.F...w.0b| +peer0.org2.example.com | 00000030 8d 47 86 4f 26 6f c2 cd b1 c8 46 6e 45 c0 6b a6 |.G.O&o....FnE.k.| +peer0.org2.example.com | 00000040 da e3 04 6e 08 e6 |...n..| +peer0.org2.example.com | [288c 05-20 18:20:56.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [288d 05-20 18:20:56.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [288e 05-20 18:20:56.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [288f 05-20 18:20:56.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2890 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2891 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2892 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2893 05-20 18:20:56.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2894 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2895 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2896 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2897 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2898 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2899 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [289a 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [289b 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [289c 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [289d 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [289e 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [289f 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bf20 gate 1589998857040130300 evaluation starts +peer0.org2.example.com | [28a0 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bf20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28a1 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bf20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [28a2 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [28a3 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bf20 principal evaluation fails +peer0.org2.example.com | [28a4 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bf20 gate 1589998857040130300 evaluation fails +peer0.org2.example.com | [28a5 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28a6 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28a7 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28a8 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e04d0 gate 1589998857040483300 evaluation starts +peer0.org2.example.com | [28a9 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e04d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28aa 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e04d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [28ab 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e04d0 principal matched by identity 0 +peer0.org2.example.com | [28ac 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +peer0.org2.example.com | 00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +peer0.org2.example.com | [28ad 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +peer0.org2.example.com | 00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +peer0.org2.example.com | 00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +peer0.org2.example.com | 00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +peer0.org2.example.com | 00000040 45 83 34 c8 b3 15 |E.4...| +peer0.org2.example.com | [28ae 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e04d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28af 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e04d0 gate 1589998857040483300 evaluation succeeds +peer0.org2.example.com | [28b0 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28b1 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28b2 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28b3 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28b4 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [28b5 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [28b6 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [28b7 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [28b8 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [28b9 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28ba 05-20 18:20:57.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28bb 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28bc 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [28bd 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28be 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28bf 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28c0 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [28c1 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020(" > alive: alive:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > alive: \344\346\330\007Y\325\r\341\364Q\355\020\301\202\260" > +peer0.org2.example.com | [28c2 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [28c3 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28c4 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [28c5 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [28c6 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [28c7 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28c8 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [28c9 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28ca 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [28cb 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [28cc 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 1c db c9 74 93 b8 4c e8 82 0a 49 dc 15 91 |.X...t..L...I...| +peer0.org2.example.com | 00000010 7f 2e 44 0c 38 2f 84 e5 90 4b c9 78 fe cd 3b 83 |..D.8/...K.x..;.| +peer0.org2.example.com | [28cd 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 1d f6 f9 ce 95 89 bc 1d ea 08 |0E.!............| +peer0.org2.example.com | 00000010 ad 89 66 54 97 b1 c1 e8 c1 19 5a 44 5b a8 5a 8d |..fT......ZD[.Z.| +peer0.org2.example.com | 00000020 5e 6b a5 91 98 02 20 72 b3 d0 3c 6c 56 ab 6b 7d |^k.... r.. DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [28cf 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 f1 70 69 84 90 a9 04 a9 f8 1a |0E.!...pi.......| +peer0.org2.example.com | 00000010 d8 4e 5b a6 04 fc 41 42 2e 52 63 fa 25 79 f1 5c |.N[...AB.Rc.%y.\| +peer0.org2.example.com | 00000020 dc 6f d1 08 f9 02 20 6d 8c 84 6d da 5c 9b ff 2b |.o.... m..m.\..+| +peer0.org2.example.com | 00000030 a5 cf f6 bc cb ac de 4d 0a 6a 87 2f 4f 18 a4 0c |.......M.j./O...| +peer0.org2.example.com | 00000040 f9 b3 23 22 d5 b1 2d |..#"..-| +peer0.org2.example.com | [28d0 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [28d1 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [28d2 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [28d3 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [28d4 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [28d5 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28d6 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28d7 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28d8 05-20 18:20:57.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [28d9 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28da 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28db 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [28dc 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: \344\346\330\007Y\325\r\341\364Q\355\020\301\202\260" > +peer0.org2.example.com | [28dd 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [28de 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28df 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [28e0 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28e1 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [28e2 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [28e3 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28e4 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [28e5 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28e6 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28e7 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [28e8 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [28e9 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [28ea 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1130 gate 1589998858355901000 evaluation starts +peer0.org2.example.com | [28eb 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1130 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28ec 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1130 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [28ed 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [28ee 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1130 principal evaluation fails +peer0.org2.example.com | [28ef 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1130 gate 1589998858355901000 evaluation fails +peer0.org2.example.com | [28f0 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28f1 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28f2 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28f3 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c17c0 gate 1589998858356594300 evaluation starts +peer0.org2.example.com | [28f4 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c17c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28f5 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c17c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [28f6 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c17c0 principal matched by identity 0 +peer0.org2.example.com | [28f7 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 06 6e f0 5d 5a 1a 16 b7 cd 74 72 41 50 db 79 |..n.]Z....trAP.y| +peer0.org2.example.com | 00000010 d8 e8 68 bf e7 8d 16 c3 7a 9d eb 98 7e b9 af f5 |..h.....z...~...| +peer0.org2.example.com | [28f8 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 cd 7c 8c 79 45 5b bb cc 4b 91 78 |0D. B.|.yE[..K.x| +peer0.org2.example.com | 00000010 f3 6f e2 9a 3a 0b cc cf 06 57 76 61 65 59 05 68 |.o..:....WvaeY.h| +peer0.org2.example.com | 00000020 f9 11 1c f7 02 20 23 d9 dc 2d 16 6b 7d ef 6a 56 |..... #..-.k}.jV| +peer0.org2.example.com | 00000030 7e d1 bb e2 b2 c9 83 af 33 48 f3 b0 ac fe d5 69 |~.......3H.....i| +peer0.org2.example.com | 00000040 aa 02 04 ae da 0f |......| +peer0.org2.example.com | [28f9 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c17c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28fa 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c17c0 gate 1589998858356594300 evaluation succeeds +peer0.org2.example.com | [28fb 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28fc 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28fd 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28fe 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28ff 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2900 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2901 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2902 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2903 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2904 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2905 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2906 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a00 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2a01 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a02 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a03 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a04 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a05 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a06 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a07 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a08 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a09 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9c9f0 gate 1589998872641821200 evaluation starts +peer1.org1.example.com | [2a0a 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9c9f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a0b 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9c9f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2a0c 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9c9f0 principal matched by identity 0 +peer1.org1.example.com | [2a0d 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer1.org1.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer1.org1.example.com | [2a0e 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer1.org1.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer1.org1.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer1.org1.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer1.org1.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer1.org1.example.com | [2a0f 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9c9f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a10 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c9c9f0 gate 1589998872641821200 evaluation succeeds +peer1.org1.example.com | [2a11 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a12 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a13 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a14 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a15 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a16 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a17 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a18 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2a19 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer1.org1.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer1.org1.example.com | [2a1a 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer1.org1.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer1.org1.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer1.org1.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer1.org1.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer1.org1.example.com | [2a1b 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a1c 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a1d 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a1e 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a1f 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a20 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2a21 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer1.org1.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer1.org1.example.com | [2a22 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer1.org1.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer1.org1.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer1.org1.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer1.org1.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer1.org1.example.com | [2a23 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2a24 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 7a bc 5a 65 7a 98 1f 6d 7b bd |0E.!..z.Zez..m{.| +peer1.org1.example.com | 00000010 8d 4d 6c db f1 02 71 ec 95 b1 b2 ff 4e 19 3c 6f |.Ml...q.....N. DEBU Exiting +peer1.org1.example.com | [2a26 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a27 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2a28 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2a29 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a2a 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a2b 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a2c 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2a2d 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a2e 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer1.org1.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer1.org1.example.com | [2a2f 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer1.org1.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer1.org1.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer1.org1.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer1.org1.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer1.org1.example.com | [2a30 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a31 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a32 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a33 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2a34 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29e5 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [29e6 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29e7 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [29e8 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [29e9 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [29ea 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [29eb 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [29ec 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [29ed 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29ee 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29ef 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29f0 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f1 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f2 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f3 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f4 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f5 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f6 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f7 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [29f8 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f9 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [29fa 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [29fb 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29fc 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [29fd 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29fe 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [29ff 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a00 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a01 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a02 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a03 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a04 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a05 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a06 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a07 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a08 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a09 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a0a 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a0b 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [282e 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [282f 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2830 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 gate 1589998859664832700 evaluation starts +peer0.org1.example.com | [2831 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2832 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2833 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 principal matched by identity 0 +peer0.org1.example.com | [2834 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2835 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0049dd4d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2837 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 gate 1589998859664832700 evaluation succeeds +peer0.org1.example.com | [2838 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2839 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [283a 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [283b 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [283c 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [283d 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [283e 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [283f 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2840 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2841 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2842 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2843 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2844 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2845 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2846 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2847 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2848 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 gate 1589998859683448600 evaluation starts +peer0.org1.example.com | [2849 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [284a 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [284b 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 principal matched by identity 0 +peer0.org1.example.com | [284c 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [284d 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [284e 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [284f 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 gate 1589998859683448600 evaluation succeeds +peer0.org1.example.com | [2850 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2851 05-20 18:20:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2852 05-20 18:20:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2853 05-20 18:20:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2854 05-20 18:20:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2855 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2856 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2857 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2858 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2859 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [285a 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [285b 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [285c 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [285d 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [285e 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [285f 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [2860 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2861 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2862 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2863 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2864 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2865 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2866 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2867 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2868 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2869 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [286a 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [286b 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [286c 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [286d 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [286e 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [286f 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2870 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2871 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2872 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2873 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2874 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2875 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2876 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0c 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a0d 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a0e 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0f 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a10 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2a11 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 79 dd 11 27 ae a5 5c d3 41 99 e1 2d 78 96 fc |dy..'..\.A..-x..| +peer1.org2.example.com | 00000010 02 92 52 d8 37 b0 04 7e c8 20 48 5b 3b e7 01 90 |..R.7..~. H[;...| +peer1.org2.example.com | [2a12 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a3 40 f1 8c 72 2c 60 aa 44 24 30 |0D. '.@..r,`.D$0| +peer1.org2.example.com | 00000010 92 b2 85 f0 87 e3 d4 91 5f 8a 45 8e d1 26 fa 2f |........_.E..&./| +peer1.org2.example.com | 00000020 ef f6 20 83 02 20 0a 30 d1 82 2e 34 4b 1a 49 27 |.. .. .0...4K.I'| +peer1.org2.example.com | 00000030 db d2 ea c0 a7 d9 c8 c5 5f be 71 cb b7 6d 8a 55 |........_.q..m.U| +peer1.org2.example.com | 00000040 fc 7c bf 1c df c6 |.|....| +peer1.org2.example.com | [2a13 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a14 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2a15 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2a16 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a17 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2a18 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a19 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a1a 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a1b 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1c 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1d 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1e 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2a1f 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a20 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a21 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a22 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2a23 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a24 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a25 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a27 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a28 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a26 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a35 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a36 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a37 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a38 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a39 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a3a 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a3b 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd4400 gate 1589998872651862300 evaluation starts +peer1.org1.example.com | [2a3c 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd4400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a3d 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd4400 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2a3e 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd4400 principal matched by identity 0 +peer1.org1.example.com | [2a3f 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer1.org1.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer1.org1.example.com | [2a40 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org1.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer1.org1.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org1.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org1.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org1.example.com | [2a41 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd4400 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a42 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd4400 gate 1589998872651862300 evaluation succeeds +peer1.org1.example.com | [2a43 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a44 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a45 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a46 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a47 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2a48 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a49 05-20 18:21:12.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a4a 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a4b 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a4c 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a4d 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a4e 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a4f 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a50 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a51 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a52 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a53 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2a54 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a55 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a56 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a57 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a58 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2877 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2878 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2879 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [287a 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [287b 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [287c 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [287d 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [287e 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [287f 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [2880 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2881 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer0.org1.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer0.org1.example.com | [2882 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer0.org1.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer0.org1.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer0.org1.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer0.org1.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer0.org1.example.com | [2883 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2884 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 7b 40 97 64 c9 7c fc 4f 4f 59 90 |0D. 6{@.d.|.OOY.| +peer0.org1.example.com | 00000010 27 0c f2 46 a3 cf 27 a5 92 5b 0c 9e 10 77 95 45 |'..F..'..[...w.E| +peer0.org1.example.com | 00000020 c8 c3 a7 69 02 20 70 0e 7f b5 8a d2 af e9 89 55 |...i. p........U| +peer0.org1.example.com | 00000030 cb 00 f8 67 6c d2 f3 f7 ee e9 86 ba d7 e9 17 47 |...gl..........G| +peer0.org1.example.com | 00000040 a5 59 55 ab 85 9b |.YU...| +peer0.org1.example.com | [2885 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [2886 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [2887 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2888 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2889 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [288a 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [288b 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [288c 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [288d 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [288e 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [288f 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2890 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2891 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [2892 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [2893 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2894 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [2895 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [2896 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2897 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100D1801 +peer0.org1.example.com | [2898 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 94FF3563E9AC6A3121B18E543AF52D9512993BC6F0B7D24D2368CE5BE602AB51 +peer0.org1.example.com | [2899 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [289a 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [289b 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [289c 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [289d 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [289e 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [289f 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28a0 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [28a1 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28a2 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28a3 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [28a4 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [28a5 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [28a6 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28a7 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28a8 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28a9 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28aa 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28ab 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28ac 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [28ad 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28ae 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [28af 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [28b0 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [28b1 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [28b2 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [28b3 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [28b4 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [28b7 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28b5 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [28b8 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28b6 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [28b9 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28ba 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [28bb 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [28bc 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [28bd 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28be 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [28bf 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [28c0 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [28c1 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28c2 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [28c3 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a59 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a5a 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2a5b 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a5c 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a5d 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2a5e 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a5f 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a60 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a61 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a62 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a63 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a64 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a65 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd58b0 gate 1589998872914359000 evaluation starts +peer1.org1.example.com | [2a66 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd58b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a67 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd58b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2a68 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd58b0 principal matched by identity 0 +peer1.org1.example.com | [2a69 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer1.org1.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer1.org1.example.com | [2a6a 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer1.org1.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer1.org1.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer1.org1.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer1.org1.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer1.org1.example.com | [2a6b 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd58b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a6c 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd58b0 gate 1589998872914359000 evaluation succeeds +peer1.org1.example.com | [2a6d 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a6e 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a6f 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a70 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a71 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a72 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2a73 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2907 05-20 18:20:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2908 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2909 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [290a 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [290b 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [290c 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [290d 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [290e 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [290f 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2910 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2911 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2913 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2912 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2914 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a29 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a2a 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a2b 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a2c 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a2d 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [2a2e 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a2f 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a30 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a31 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a32 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a33 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2a34 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816102E +peer1.org2.example.com | [2a35 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E344A609A1270F7620B232884AB060A4D2E8AB8C9560433C59D9CDB539AF005E +peer1.org2.example.com | [2a36 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2a37 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2a38 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2a39 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2a3a 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a3b 05-20 18:21:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a3c 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a3d 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a3e 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a3f 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a40 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a41 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a42 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a43 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a44 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a45 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a46 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a47 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a48 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a49 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a4a 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2a4b 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28c4 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [28c5 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28c6 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [28c7 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [28c8 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28c9 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [28ca 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [28cb 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28cc 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [28cd 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28ce 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28cf 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [28d0 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [28d1 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [28d2 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 gate 1589998860866654900 evaluation starts +peer0.org1.example.com | [28d3 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28d4 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [28d5 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 principal matched by identity 0 +peer0.org1.example.com | [28d6 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer0.org1.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer0.org1.example.com | [28d7 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer0.org1.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer0.org1.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer0.org1.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer0.org1.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer0.org1.example.com | [28d8 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [28d9 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 gate 1589998860866654900 evaluation succeeds +peer0.org1.example.com | [28da 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28db 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28dc 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [28dd 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a74 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2a75 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2a76 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a77 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a78 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a79 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [2a7a 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a7b 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a7c 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a7d 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2a7e 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > alive: +peer1.org1.example.com | [2a7f 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a80 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a81 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a82 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a83 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a84 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2a85 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +peer1.org1.example.com | 00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +peer1.org1.example.com | [2a86 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +peer1.org1.example.com | 00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +peer1.org1.example.com | 00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +peer1.org1.example.com | 00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +peer1.org1.example.com | 00000040 7b 06 5e 80 dd eb 85 |{.^....| +peer1.org1.example.com | [2a87 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [2a88 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 d0 ba 12 7b d9 ac e5 8c 46 05 94 |0D. i...{....F..| +peer0.org2.example.com | [2915 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2916 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2917 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2918 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2919 05-20 18:20:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [291a 05-20 18:20:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [291b 05-20 18:20:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [291c 05-20 18:20:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [291d 05-20 18:20:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [291e 05-20 18:20:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816102A +peer0.org2.example.com | [291f 05-20 18:20:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 04E295D2B095A4917B7C736F04E742864B341C034D6224DEA3F21330732AAA85 +peer0.org2.example.com | [2920 05-20 18:20:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2921 05-20 18:20:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2922 05-20 18:20:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2923 05-20 18:20:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2924 05-20 18:20:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2925 05-20 18:20:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2926 05-20 18:20:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2927 05-20 18:20:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2928 05-20 18:20:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2929 05-20 18:20:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [292a 05-20 18:20:58.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [292b 05-20 18:20:58.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [292c 05-20 18:20:58.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [292d 05-20 18:20:58.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [292e 05-20 18:20:58.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [292f 05-20 18:20:58.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2930 05-20 18:20:58.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2931 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2932 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2933 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2934 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2935 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 6b 24 2a 5a a9 0e fc 2c 35 44 de 2d ba 08 b4 |.k$*Z...,5D.-...| +peer0.org2.example.com | 00000010 5d a5 6a 28 ee bd 61 d8 4a d2 e8 d3 a9 eb 6b 02 |].j(..a.J.....k.| +peer0.org2.example.com | [2936 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf c0 75 b3 f3 7f 8f f4 5d 3b 9b |0E.!...u.....];.| +peer0.org2.example.com | 00000010 e1 3e ce fb b3 a9 50 11 a4 20 dd 41 e2 c9 ef 1a |.>....P.. .A....| +peer0.org2.example.com | 00000020 2b 78 43 79 d8 02 20 12 73 5b f2 9f d1 f8 4b 85 |+xCy.. .s[....K.| +peer0.org2.example.com | 00000030 23 91 28 1f 7f 95 14 09 93 83 92 1d 0d 7f 54 0c |#.(...........T.| +peer0.org2.example.com | 00000040 1f de 4c 17 d0 eb 93 |..L....| +peer0.org2.example.com | [2937 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2938 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2939 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [293a 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [293b 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [293c 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [293d 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [293e 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [293f 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2940 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2941 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2942 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2943 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2944 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2945 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2947 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2946 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2948 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2949 05-20 18:20:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [294a 05-20 18:20:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [294b 05-20 18:20:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [294c 05-20 18:20:59.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [294d 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [294e 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28de 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28df 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [28e0 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [28e1 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [28e2 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [28e3 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28e4 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28e5 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28e6 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [28e7 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28e8 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28e9 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28ea 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [28eb 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\316\373\263\251P\021\244 \335A\342\311\357\032+xCy\330\002 \022s[\362\237\321\370K\205#\221(\037\177\225\024\t\223\203\222\035\r\177T\014\037\336L\027\320\353\223" > alive: +peer0.org1.example.com | [28ec 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [28ed 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28ee 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [28ef 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102A +peer0.org1.example.com | [28f0 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9362A72BC007CC7F95DABC24928616878FC44CB0A8B0DB70D8144CC79B1DFDA2 +peer0.org1.example.com | [28f1 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [28f2 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [28f3 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [28f4 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [28f5 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28f6 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [28f8 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28f7 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [28f9 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28fb 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [28fa 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [28fc 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28fd 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [28fe 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28ff 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2900 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2901 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2902 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2903 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2904 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +peer0.org1.example.com | 00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +peer0.org1.example.com | [2905 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +peer0.org1.example.com | 00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +peer0.org1.example.com | 00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +peer0.org1.example.com | 00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +peer0.org1.example.com | 00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +peer0.org1.example.com | [2906 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [2907 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce e9 ae cf 71 86 0b 98 40 b1 2a |0E.!.....q...@.*| +peer0.org1.example.com | 00000010 5b 89 df 24 63 ac 05 12 53 2e de 2a 71 0a 76 d2 |[..$c...S..*q.v.| +peer0.org1.example.com | 00000020 89 4c 0e 94 5c 02 20 11 59 c3 d3 b9 f1 16 1b af |.L..\. .Y.......| +peer0.org1.example.com | 00000030 ae 05 20 65 f5 cc e1 02 10 53 1f 53 0f 97 24 6f |.. e.....S.S..$o| +peer0.org1.example.com | 00000040 49 d8 42 f3 e6 ed 6e |I.B...n| +peer0.org1.example.com | [2908 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2909 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [290a 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [290b 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [290c 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [290d 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [290e 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [290f 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2910 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2911 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a4c 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2a4d 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a4e 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a4f 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2a50 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2a51 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2a52 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc150 gate 1589998864034315000 evaluation starts +peer1.org2.example.com | [2a53 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a54 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc150 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2a55 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2a56 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc150 principal evaluation fails +peer1.org2.example.com | [2a57 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc150 gate 1589998864034315000 evaluation fails +peer1.org2.example.com | [2a58 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a59 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a5a 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2a5b 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc6d0 gate 1589998864035318900 evaluation starts +peer1.org2.example.com | [2a5c 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc6d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a5d 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc6d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2a5e 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc6d0 principal matched by identity 0 +peer1.org2.example.com | [2a5f 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 99 74 be 00 23 99 e7 43 0e 63 30 a3 45 ad da |..t..#..C.c0.E..| +peer1.org2.example.com | 00000010 64 c1 69 6e 6c d5 db b7 41 dc 87 ae cb ec 80 dd |d.inl...A.......| +peer1.org2.example.com | [2a60 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 45 3b 7f 19 bc 1d ee 99 87 ab 76 |0D. RE;........v| +peer1.org2.example.com | 00000010 b6 a5 e7 d4 c8 88 44 1a f1 19 70 26 e0 55 aa 75 |......D...p&.U.u| +peer1.org2.example.com | 00000020 4d c8 e2 bc 02 20 0c 6e be 50 04 b8 a6 02 f6 5b |M.... .n.P.....[| +peer1.org2.example.com | 00000030 3a e2 97 4a 8c 80 73 92 86 e9 14 6d 4c f6 fd 29 |:..J..s....mL..)| +peer1.org2.example.com | 00000040 c8 88 51 48 90 ed |..QH..| +peer1.org2.example.com | [2a61 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc6d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a62 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031fc6d0 gate 1589998864035318900 evaluation succeeds +peer1.org2.example.com | [2a63 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2a64 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2a65 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2a66 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2a67 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a68 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2a69 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2a6a 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a6b 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2a6c 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a6d 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a6e 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a6f 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a70 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a71 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a72 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a73 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 19 21 5d c6 85 4d e0 ce 98 a7 6b 2d 10 71 cb 11 |.!]..M....k-.q..| +peer1.org1.example.com | 00000020 58 a4 dd 49 02 20 31 7f 5e f0 e4 19 4c 80 58 05 |X..I. 1.^...L.X.| +peer1.org1.example.com | 00000030 04 f4 88 f0 35 ac 16 e5 ca 5a 0c 29 47 b3 95 dd |....5....Z.)G...| +peer1.org1.example.com | 00000040 47 52 22 06 66 3b |GR".f;| +peer1.org1.example.com | [2a89 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2a8a 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [2a8b 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2a8c 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2a8d 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2a8e 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a8f 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a90 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a91 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2a92 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a93 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a94 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2a95 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a96 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a97 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" secret_envelope: > alive: +peer1.org1.example.com | [2a98 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a99 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a9a 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a9b 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [2a9c 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a9d 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [2a9e 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a9f 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer1.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer1.org1.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer1.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer1.org1.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer1.org1.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2aa0 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89ff0 gate 1589998873043931300 evaluation starts +peer1.org1.example.com | [2aa1 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2aa2 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89ff0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2aa3 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org1.example.com | [2aa4 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [2aa5 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [2aa6 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89ff0 principal matched by identity 0 +peer1.org1.example.com | [2aa7 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 a3 4b 58 7d 3a 8c 7a 8a 5a 35 e1 14 b2 ed 1d |..KX}:.z.Z5.....| +peer1.org1.example.com | 00000010 77 84 8b fb f0 74 b1 e4 89 cf f7 aa 5e 2c 5d 82 |w....t......^,].| +peer0.org2.example.com | [294f 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2950 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2951 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2952 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2953 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2954 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2955 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003122b00 gate 1589998859095119400 evaluation starts +peer0.org2.example.com | [2956 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003122b00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2957 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003122b00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2958 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003122b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2959 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003122b00 principal evaluation fails +peer0.org2.example.com | [295a 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003122b00 gate 1589998859095119400 evaluation fails +peer0.org2.example.com | [295b 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [295c 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [295d 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [295e 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123170 gate 1589998859097538600 evaluation starts +peer0.org2.example.com | [295f 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2960 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123170 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2961 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123170 principal matched by identity 0 +peer0.org2.example.com | [2962 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 15 58 9d f8 7d 89 60 dd 94 db 47 24 b1 16 3b |..X..}.`...G$..;| +peer0.org2.example.com | 00000010 6e 4b ae c7 1e db de 4e 6f d7 1e 59 23 1d 5d 02 |nK.....No..Y#.].| +peer0.org2.example.com | [2963 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 85 0e 74 ba bb a2 a2 f1 66 17 db |0D. M..t.....f..| +peer0.org2.example.com | 00000010 4e 03 b1 fa d3 41 4c 12 39 76 b3 5a 7f 74 dc 09 |N....AL.9v.Z.t..| +peer0.org2.example.com | 00000020 c4 1b 78 44 02 20 52 d1 f5 87 ed 9e 1a ec 7c d5 |..xD. R.......|.| +peer0.org2.example.com | 00000030 47 c2 6d af b9 2d 9c 87 0c 83 ff 21 65 1b 66 82 |G.m..-.....!e.f.| +peer0.org2.example.com | 00000040 84 9c 7c cf 9b 71 |..|..q| +peer0.org2.example.com | [2964 05-20 18:20:59.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123170 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2965 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003123170 gate 1589998859097538600 evaluation succeeds +peer0.org2.example.com | [2966 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2967 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2968 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2969 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [296a 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [296b 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [296c 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [296d 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [296e 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [296f 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2970 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2971 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2972 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2973 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2974 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2975 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2976 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2977 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2978 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a74 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a75 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a76 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2a77 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a78 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a79 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a7a 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2a7b 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a7c 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a7d 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a7e 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a7f 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a80 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a81 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a82 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a83 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a84 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a85 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a86 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a87 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a88 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a89 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a8a 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a8b 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a8c 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a8d 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a8e 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2a8f 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a90 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a91 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a92 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2a93 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a94 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a95 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a96 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a97 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2912 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2913 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2914 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2915 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2916 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2917 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2918 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 gate 1589998861021358300 evaluation starts +peer0.org1.example.com | [2919 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [291a 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [291b 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [291c 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [291d 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 principal matched by identity 0 +peer0.org1.example.com | [291e 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer0.org1.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer0.org1.example.com | [291f 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer0.org1.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer0.org1.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer0.org1.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer0.org1.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer0.org1.example.com | [2920 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2921 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 gate 1589998861021358300 evaluation succeeds +peer0.org1.example.com | [2922 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2923 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2924 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2925 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2926 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2927 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2928 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2929 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +peer0.org1.example.com | 00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +peer0.org1.example.com | [292a 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +peer0.org1.example.com | 00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +peer0.org1.example.com | 00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +peer0.org1.example.com | 00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +peer0.org1.example.com | 00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +peer0.org1.example.com | [292b 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [292c 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [292d 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [292e 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [292f 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer0.org1.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer0.org2.example.com | [2979 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [297a 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [297b 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [297c 05-20 18:20:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [297d 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [297e 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [297f 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2980 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2981 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2982 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2983 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2984 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2985 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2986 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2987 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2988 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2989 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [298a 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [298b 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [298c 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [298d 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [298e 05-20 18:20:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [298f 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2990 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2991 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2992 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2993 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2994 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2995 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2996 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2997 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2998 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2999 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299a 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299b 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [299c 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [299d 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [299e 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [299f 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [29a0 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a1 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a2 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [29a3 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [29a4 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [29a5 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29a6 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29a7 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [29a8 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29a9 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29aa 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29ab 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29ac 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [29ad 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a75f0 gate 1589998860125970400 evaluation starts +peer0.org2.example.com | [29ae 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a75f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29af 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a75f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [29b0 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a75f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [29b1 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a75f0 principal evaluation fails +peer0.org2.example.com | [29b2 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a75f0 gate 1589998860125970400 evaluation fails +peer0.org2.example.com | [29b3 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29b4 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29b5 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29b6 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7b70 gate 1589998860127874600 evaluation starts +peer0.org2.example.com | [29b7 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7b70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29b8 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7b70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [29b9 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7b70 principal matched by identity 0 +peer0.org2.example.com | [29ba 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [29bb 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [29bc 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7b70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29bd 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7b70 gate 1589998860127874600 evaluation succeeds +peer0.org2.example.com | [29be 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29bf 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29c0 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29c1 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29c2 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [29c3 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [29c5 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29c6 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [29c7 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29c8 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29c9 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29ca 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29cb 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [29cc 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030496d0 gate 1589998860132697900 evaluation starts +peer0.org2.example.com | [29cd 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030496d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29ce 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030496d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [29cf 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030496d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [29d0 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030496d0 principal evaluation fails +peer0.org2.example.com | [29d1 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030496d0 gate 1589998860132697900 evaluation fails +peer0.org2.example.com | [29d2 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29d3 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29d4 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29d5 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049c40 gate 1589998860132948900 evaluation starts +peer0.org2.example.com | [29d6 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29d7 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049c40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [29d8 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049c40 principal matched by identity 0 +peer0.org2.example.com | [29d9 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [29da 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | [2a98 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a99 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a9a 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a9b 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2a9c 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [2a9e 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a9f 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2aa0 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2aa1 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2aa2 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2aa3 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2aa4 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2aa5 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030deef0 gate 1589998864417003100 evaluation starts +peer1.org2.example.com | [2aa6 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030deef0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2aa7 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030deef0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2aa8 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030deef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2aa9 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030deef0 principal evaluation fails +peer1.org2.example.com | [2aaa 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030deef0 gate 1589998864417003100 evaluation fails +peer1.org2.example.com | [2aab 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2aac 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2aad 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2aae 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030df460 gate 1589998864417367200 evaluation starts +peer1.org2.example.com | [2aaf 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030df460 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ab0 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030df460 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2ab1 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030df460 principal matched by identity 0 +peer1.org2.example.com | [2ab2 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2ab3 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2ab4 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030df460 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ab5 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030df460 gate 1589998864417367200 evaluation succeeds +peer1.org2.example.com | [2ab6 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2ab7 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2ab8 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2ab9 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2aba 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2abb 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2abc 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2abd 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2abe 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2abf 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ac0 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ac1 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ac2 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c800 gate 1589998864418526000 evaluation starts +peer1.org2.example.com | [2ac3 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c800 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ac4 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c800 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2ac5 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ac6 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c800 principal evaluation fails +peer1.org2.example.com | [2ac7 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306c800 gate 1589998864418526000 evaluation fails +peer1.org2.example.com | [2ac8 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ac9 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2aca 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2acb 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cdc0 gate 1589998864419355300 evaluation starts +peer1.org2.example.com | [2acc 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cdc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2acd 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cdc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2ace 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cdc0 principal matched by identity 0 +peer1.org2.example.com | [2acf 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2ad0 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [2ad1 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cdc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ad2 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306cdc0 gate 1589998864419355300 evaluation succeeds +peer1.org2.example.com | [2ad3 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2ad4 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2ad5 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2ad6 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ad7 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2ad8 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2ad9 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ada 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2adb 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2adc 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2add 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ade 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2adf 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ae0 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ae1 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ae2 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ae3 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ae4 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303aaa0 gate 1589998864422970500 evaluation starts +peer1.org2.example.com | [2ae5 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303aaa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ae6 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303aaa0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2ae7 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303aaa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ae8 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303aaa0 principal evaluation fails +peer1.org2.example.com | [2ae9 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303aaa0 gate 1589998864422970500 evaluation fails +peer1.org2.example.com | [2aea 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2aeb 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2aec 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2aed 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303b040 gate 1589998864427005700 evaluation starts +peer1.org2.example.com | [2aee 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303b040 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2aef 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303b040 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2af0 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303b040 principal matched by identity 0 +peer1.org2.example.com | [2af1 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2af2 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [2af3 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303b040 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2af4 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00303b040 gate 1589998864427005700 evaluation succeeds +peer1.org2.example.com | [2af5 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2af6 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2af7 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2af8 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2af9 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2afa 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [29db 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049c40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29dc 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049c40 gate 1589998860132948900 evaluation succeeds +peer0.org2.example.com | [29dd 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29de 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29df 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29e0 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29e1 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29e2 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [29e3 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aa8 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 85 0e 94 fc 33 9e 4b ab b1 ae 2d |0D. .....3.K...-| +peer1.org1.example.com | 00000010 23 bd fa 52 b0 58 eb 31 08 63 6c 33 c9 2a c4 71 |#..R.X.1.cl3.*.q| +peer1.org1.example.com | 00000020 7d e9 4b 53 02 20 68 18 fe 74 c6 55 ca 39 b3 74 |}.KS. h..t.U.9.t| +peer1.org1.example.com | 00000030 50 8c 72 93 21 b5 23 53 29 12 d5 b8 3a fb ec f3 |P.r.!.#S)...:...| +peer1.org1.example.com | 00000040 ca 96 1f 39 90 b6 |...9..| +peer1.org1.example.com | [2aa9 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89ff0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2aaa 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89ff0 gate 1589998873043931300 evaluation succeeds +peer1.org1.example.com | [2aab 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2aac 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2aad 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2aae 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2aaf 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [2ab0 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org1.example.com | [2ab1 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ab2 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [2ab3 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org1.example.com | [2ab4 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [2ab5 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer1.org1.example.com | [2ab6 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org1.example.com | [2ab7 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org1.example.com | [2ab8 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer1.org1.example.com | [2ab9 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org1.example.com | [2aba 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [2abb 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004ab3a40 env 0xc004c71680 txn 0 +peer1.org1.example.com | [2abc 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004c71680 +peer1.org1.example.com | [2abd 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +peer1.org1.example.com | [2abe 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [2abf 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [2ac0 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [2ac1 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ac2 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2ac3 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [2ac5 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [2ac4 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ac6 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ac7 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ac8 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [2ac9 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aca 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [2acb 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2acc 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2acd 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer1.org1.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +peer1.org1.example.com | [2ace 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer1.org1.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer1.org1.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer1.org1.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer1.org1.example.com | 00000040 cf eb d4 a9 50 ef |....P.| +peer1.org1.example.com | [2acf 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2930 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer0.org1.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer0.org1.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer0.org1.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer0.org1.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer0.org1.example.com | [2931 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2932 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2933 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2934 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2935 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2936 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer0.org1.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer0.org1.example.com | [2937 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer0.org1.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer0.org1.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer0.org1.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer0.org1.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer0.org1.example.com | [2939 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [293a 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [293b 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2938 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [293c 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +peer0.org1.example.com | 00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +peer0.org1.example.com | [293d 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +peer0.org1.example.com | 00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +peer0.org1.example.com | 00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +peer0.org1.example.com | 00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +peer0.org1.example.com | 00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +peer0.org1.example.com | [293e 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [293f 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2940 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2941 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2942 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2943 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2944 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2945 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2946 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2947 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2948 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2949 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [294a 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [294b 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [294c 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [294d 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [294e 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [294f 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29e4 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29e5 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29e6 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [29e7 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29e8 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29e9 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29ea 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29eb 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [29ec 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f2a0 gate 1589998860135417600 evaluation starts +peer0.org2.example.com | [29ed 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29ee 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f2a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [29ef 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [29f0 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f2a0 principal evaluation fails +peer0.org2.example.com | [29f1 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f2a0 gate 1589998860135417600 evaluation fails +peer0.org2.example.com | [29f2 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29f3 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29f4 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29f5 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f810 gate 1589998860135839600 evaluation starts +peer0.org2.example.com | [29f6 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29f7 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f810 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [29f8 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f810 principal matched by identity 0 +peer0.org2.example.com | [29f9 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [29fa 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [29fb 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29fc 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301f810 gate 1589998860135839600 evaluation succeeds +peer0.org2.example.com | [29fd 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29fe 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29ff 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a00 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a01 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a02 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ad0 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004d5e000, header channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +peer1.org1.example.com | [2ad1 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org1.example.com | [2ad2 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org1.example.com | [2ad3 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org1.example.com | [2ad4 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [2ad5 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +peer1.org1.example.com | [2ad6 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org1.example.com | [2ad7 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004d5a000 +peer1.org1.example.com | [2ad8 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer1.org1.example.com | [2ad9 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4230e9d5-5045-445a-a383-9fdf37c86d59] +peer1.org1.example.com | [2ada 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4230e9d5-5045-445a-a383-9fdf37c86d59] +peer1.org1.example.com | [2adb 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 gate 1589998873057785700 evaluation starts +peer1.org1.example.com | [2adc 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2add 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2ade 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 principal matched by identity 0 +peer1.org1.example.com | [2adf 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 b7 ce 88 7a f7 52 8b 0c a8 74 4e f1 48 08 da |!...z.R...tN.H..| +peer1.org1.example.com | 00000010 ac 99 28 d2 a1 48 cd 61 2f af 2e f6 42 02 3f 61 |..(..H.a/...B.?a| +peer1.org1.example.com | [2ae0 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 c2 7c 26 22 5d be 68 cd a6 f6 e5 |0D. ..|&"].h....| +peer1.org1.example.com | 00000010 48 53 b9 c3 e0 ae de 08 64 67 26 f6 31 27 88 f2 |HS......dg&.1'..| +peer1.org1.example.com | 00000020 a9 e6 9d 32 02 20 73 44 51 76 29 d5 24 65 bf 5f |...2. sDQv).$e._| +peer1.org1.example.com | 00000030 e3 1c 3f 4b d3 cf 58 b5 0f f6 c2 d8 95 42 68 80 |..?K..X......Bh.| +peer1.org1.example.com | 00000040 9b 73 66 c0 4e 99 |.sf.N.| +peer1.org1.example.com | [2ae1 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ae2 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [2ae3 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 skipping identity 0 because it has already been used +peer1.org1.example.com | [2ae4 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 principal evaluation fails +peer1.org1.example.com | [2ae5 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65460 gate 1589998873057785700 evaluation succeeds +peer1.org1.example.com | [2ae6 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer1.org1.example.com | [2ae7 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | [2ae8 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | [2ae9 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer1.org1.example.com | [2aea 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer1.org1.example.com | [2aeb 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [00d8b2b3-8426-4398-bff2-d8b10c8d7c5a] +peer1.org1.example.com | [2aec 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2aed 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [00d8b2b3-8426-4398-bff2-d8b10c8d7c5a] +peer1.org1.example.com | [2aee 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer1.org1.example.com | [2aef 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [97a77da3-81cf-4c43-a1c1-15983a2d71e3] +peer1.org1.example.com | [2af0 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [2af1 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [97a77da3-81cf-4c43-a1c1-15983a2d71e3] +peer1.org1.example.com | [2af2 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 gate 1589998873058760600 evaluation starts +peer1.org1.example.com | [2af3 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2af4 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2af5 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | [2a03 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a04 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a05 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a06 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a07 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a08 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a09 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fccb80 gate 1589998860136678000 evaluation starts +peer0.org2.example.com | [2a0a 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fccb80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a0b 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fccb80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2a0c 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fccb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a0d 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fccb80 principal evaluation fails +peer0.org2.example.com | [2a0e 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fccb80 gate 1589998860136678000 evaluation fails +peer0.org2.example.com | [2a0f 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a10 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a11 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a12 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd170 gate 1589998860136964600 evaluation starts +peer0.org2.example.com | [2a13 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a14 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd170 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2a15 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd170 principal matched by identity 0 +peer0.org2.example.com | [2a16 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2a17 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2a18 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd170 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a19 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcd170 gate 1589998860136964600 evaluation succeeds +peer0.org2.example.com | [2a1a 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a1b 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a1c 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a1d 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a1e 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2a1f 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2a21 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2a22 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a23 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a24 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a25 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2af6 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [2af7 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [2af8 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [2af9 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [2afa 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [2afb 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 principal matched by identity 0 +peer1.org1.example.com | [2afc 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer1.org1.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +peer1.org1.example.com | [2afd 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer1.org1.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer1.org1.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer1.org1.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer1.org1.example.com | 00000040 cf eb d4 a9 50 ef |....P.| +peer1.org1.example.com | [2afe 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2aff 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [2b00 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 skipping identity 0 because it has already been used +peer1.org1.example.com | [2b01 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 principal evaluation fails +peer1.org1.example.com | [2b02 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d983b0 gate 1589998873058760600 evaluation succeeds +peer1.org1.example.com | [2b03 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer1.org1.example.com | [2b04 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb appears to be valid +peer1.org1.example.com | [2b05 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004d5a000 +peer1.org1.example.com | [2b06 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004ab3a40 env 0xc004c71680 txn 0 +peer1.org1.example.com | [2b07 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [2b08 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 19ms +peer1.org1.example.com | [2b09 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [2b0a 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [2b0b 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org1.example.com | [2b0c 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [2b0d 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [2b0e 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [2b0f 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer1.org1.example.com | [2b10 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [2b11 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org1.example.com | [2b12 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2b13 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer1.org1.example.com | [2b14 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] marked as valid by state validator +peer1.org1.example.com | [2b15 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004d8ae40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004d8ae80), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc004d8aec0)} +peer1.org1.example.com | [2b16 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [2b17 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [2b18 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [2b19 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc004d9ad20)}} +peer1.org1.example.com | [2b1a 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer1.org1.example.com | [2b1b 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [2b1c 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | [2b1d 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | [2b1e 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org1.example.com | [2b1f 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | [2b20 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org1.example.com | [2b21 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2950 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2951 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2952 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2953 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2954 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2955 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2956 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2957 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2958 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2959 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 gate 1589998861162924000 evaluation starts +peer0.org1.example.com | [295a 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [295b 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [295c 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 principal matched by identity 0 +peer0.org1.example.com | [295d 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 49 b4 94 19 ac 01 e0 9c bf d9 ad 7f 6b dc 81 |.I...........k..| +peer0.org1.example.com | 00000010 91 0f 1a eb 2d d4 8c df 09 9a b6 5a 12 b8 59 e8 |....-......Z..Y.| +peer0.org1.example.com | [295e 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 70 e7 1e d9 c9 83 30 29 6e 49 42 |0D. p.....0)nIB| +peer0.org1.example.com | 00000010 af 5d 2b 71 c7 6f 15 fc ce 10 50 15 7f e2 1b 67 |.]+q.o....P....g| +peer0.org1.example.com | 00000020 f3 04 ae e0 02 20 44 78 31 d6 0d 50 0c ea 5a b2 |..... Dx1..P..Z.| +peer0.org1.example.com | 00000030 b2 90 45 f0 b3 a6 de 01 67 fe 77 95 b2 80 d3 4a |..E.....g.w....J| +peer0.org1.example.com | 00000040 ed b4 ac cf 07 b5 |......| +peer0.org1.example.com | [295f 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2960 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 gate 1589998861162924000 evaluation succeeds +peer0.org1.example.com | [2961 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2962 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2963 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2964 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2965 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2966 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2967 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2968 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2969 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [296a 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [296b 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [296c 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [296d 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [296e 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [296f 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2970 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2971 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2972 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2973 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2974 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2975 05-20 18:21:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is # examples/chaincode/go/chaincode_example02 +peer0.org1.example.com | /tmp/go-link-893163648/000001.o: In function `pluginOpen': +peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-893163648/000021.o: In function `mygetgrouplist': +peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-893163648/000020.o: In function `mygetgrgid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-893163648/000020.o: In function `mygetgrnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-893163648/000020.o: In function `mygetpwnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-893163648/000020.o: In function `mygetpwuid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-893163648/000006.o: In function `_cgo_7e1b3c2abc8d_C2func_getaddrinfo': +peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:57: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | [2976 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2977 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2978 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2979 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [297a 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [297b 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b ab 66 01 c3 50 4d 84 f5 de f4 13 8b 08 c0 74 |K.f..PM........t| +peer0.org1.example.com | 00000010 cb b3 c5 21 22 6c 2f 80 86 ad f2 1c 0f 02 9e 28 |...!"l/........(| +peer0.org1.example.com | [297c 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 21 7b 3e b7 a0 15 80 2f f8 86 69 |0D. [!{>..../..i| +peer0.org1.example.com | 00000010 57 47 2a 89 fd 28 6c ac 67 6e a7 e2 3e 9a a6 80 |WG*..(l.gn..>...| +peer0.org1.example.com | 00000020 75 ce 4e ef 02 20 19 0f 49 17 b3 92 a8 4d a5 7a |u.N.. ..I....M.z| +peer0.org1.example.com | 00000030 3c e0 85 17 e2 99 a8 f4 cb 36 af f7 3f 56 e4 8d |<........6..?V..| +peer0.org1.example.com | 00000040 09 83 0f 9f 3e 54 |....>T| +peer0.org1.example.com | [297d 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [297e 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [297f 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2980 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2981 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2982 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2983 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2984 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2985 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2986 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2987 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2988 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2989 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [298a 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [298b 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [298c 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [298d 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [298e 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [298f 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2990 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2991 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2992 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2993 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2994 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2995 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2996 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2997 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2998 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2999 05-20 18:21:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [299a 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [299b 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [299c 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [299d 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [299e 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [299f 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29a0 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [29a1 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29a2 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [29a3 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [29a4 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29a5 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29a6 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29a7 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [29a8 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29a9 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29aa 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [29ab 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [29ac 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [29ad 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 gate 1589998863584217100 evaluation starts +peer0.org1.example.com | [29ae 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29af 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [29b0 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 principal matched by identity 0 +peer0.org1.example.com | [29b1 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [29b2 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [29b3 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29b4 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 gate 1589998863584217100 evaluation succeeds +peer0.org1.example.com | [29b5 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29b6 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29b7 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [29b8 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [29b9 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [29ba 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [29bb 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29bc 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29bd 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [29c0 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29c1 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29c2 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [29c3 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [29c4 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [29c5 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 gate 1589998863593090800 evaluation starts +peer0.org1.example.com | [29c6 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29c7 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [29c8 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 principal matched by identity 0 +peer0.org1.example.com | [29c9 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [29ca 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e555f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29cc 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 gate 1589998863593090800 evaluation succeeds +peer0.org1.example.com | [29be 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [29bf 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [29cd 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29ce 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29cf 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [29d0 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [29d1 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [29d2 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [29d3 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29d4 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [29d5 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29d6 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29d7 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29d8 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [29d9 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29da 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29db 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [29dc 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [29dd 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [29de 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 gate 1589998863602203100 evaluation starts +peer0.org1.example.com | [29df 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29e0 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [29e1 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 principal matched by identity 0 +peer0.org1.example.com | [29e2 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [29e3 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e27150 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29e5 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 gate 1589998863602203100 evaluation succeeds +peer0.org1.example.com | [29e6 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29e7 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29e8 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [29e9 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [29ea 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [29eb 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [29ec 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [2afb 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2afc 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2afd 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2afe 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2aff 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b00 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b01 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010240 gate 1589998864428635000 evaluation starts +peer1.org2.example.com | [2b02 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010240 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b03 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010240 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2b04 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2b05 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010240 principal evaluation fails +peer1.org2.example.com | [2b06 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010240 gate 1589998864428635000 evaluation fails +peer1.org2.example.com | [2b07 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b08 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b09 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2b0a 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030107c0 gate 1589998864428978100 evaluation starts +peer1.org2.example.com | [2b0b 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030107c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b0c 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030107c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2b0d 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030107c0 principal matched by identity 0 +peer1.org2.example.com | [2b0e 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2b0f 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2b10 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030107c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b11 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030107c0 gate 1589998864428978100 evaluation succeeds +peer1.org2.example.com | [2b12 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b13 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b14 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b15 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b16 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2b17 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2b19 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2b1a 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b1b 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b1c 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b1d 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b1e 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b1f 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b20 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b21 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b22 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b23 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b24 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b25 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feec80 gate 1589998864430970100 evaluation starts +peer1.org2.example.com | [2b26 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feec80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b27 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feec80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2b28 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feec80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2b29 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feec80 principal evaluation fails +peer1.org2.example.com | [2b2a 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feec80 gate 1589998864430970100 evaluation fails +peer1.org2.example.com | [2b2b 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b2c 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b2d 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2b2e 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef1f0 gate 1589998864431307600 evaluation starts +peer1.org2.example.com | [2b2f 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef1f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b30 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef1f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2b31 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef1f0 principal matched by identity 0 +peer1.org2.example.com | [2b32 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2b33 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2b34 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef1f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b35 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fef1f0 gate 1589998864431307600 evaluation succeeds +peer1.org2.example.com | [2b36 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b37 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b38 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b39 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b3a 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b3b 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a26 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a27 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a28 05-20 18:21:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a29 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a2a 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a2b 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a2c 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a2d 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d700 gate 1589998860140829000 evaluation starts +peer0.org2.example.com | [2a2e 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a2f 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d700 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2a30 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a31 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d700 principal evaluation fails +peer0.org2.example.com | [2a32 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer0.org2.example.com | [2a34 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer0.org2.example.com | [2a35 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer0.org2.example.com | [2a33 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d700 gate 1589998860140829000 evaluation fails +peer0.org2.example.com | [2a36 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a37 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a38 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a39 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 gate 1589998860145920000 evaluation starts +peer0.org2.example.com | [2a3a 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a3b 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2a3c 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 principal matched by identity 0 +peer0.org2.example.com | [2a3d 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2a3e 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2a3f 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a40 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 gate 1589998860145920000 evaluation succeeds +peer0.org2.example.com | [2a41 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a42 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a43 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a44 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a45 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a46 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a47 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a48 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a49 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a4a 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a4b 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a4c 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a4d 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26f40 gate 1589998860147102000 evaluation starts +peer0.org2.example.com | [2a4e 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26f40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a4f 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26f40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2a50 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a51 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26f40 principal evaluation fails +peer0.org2.example.com | [2a52 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26f40 gate 1589998860147102000 evaluation fails +peer0.org2.example.com | [2a53 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a54 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a55 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a56 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f274b0 gate 1589998860149144000 evaluation starts +peer0.org2.example.com | [2a57 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f274b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a58 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f274b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2a59 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f274b0 principal matched by identity 0 +peer0.org2.example.com | [2a5a 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [2a5b 05-20 18:21:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [29ed 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [29ee 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29ef 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b22 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 204 16 199 248 94 182 105 85 213 16 32 155 71 9 168 143 189 197 26 183 38 191 42 248 76 95 113 199 35 57 8 174 2 32 94 212 239 141 159 195 201 141 159 155 194 209 234 160 88 89 230 158 216 23 171 142 91 248 105 254 139 43 90 52 186 191]} 0x1519b80}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002a90450 0xc002a14960 {{0 0} 0 0 0 0} {false}})]} +peer1.org1.example.com | [2b23 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [2b24 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0001f4da0})} +peer1.org1.example.com | [2b25 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org1.example.com | [2b26 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org1.example.com | [2b27 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org1.example.com | [2b28 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org1.example.com | [2b29 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xe4, 0xd0, 0x6e, 0x11, 0x83, 0x40, 0x38, 0x1c, 0x2a, 0x25, 0xb9, 0x5b, 0xef, 0x40, 0xdf, 0xab, 0x76, 0x31, 0x92, 0x2e, 0xb6, 0x6d, 0xd2, 0x76, 0xed, 0x67, 0x48, 0xc4, 0x26, 0xd8, 0xcb, 0xd9} txOffsets= +peer1.org1.example.com | txId=d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb locPointer=offset=70, bytesLength=3519 +peer1.org1.example.com | ] +peer1.org1.example.com | [2b2a 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84951, bytesLength=3519] for tx ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to txid-index +peer1.org1.example.com | [2b2b 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84951, bytesLength=3519] for tx number:[0] ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to blockNumTranNum index +peer1.org1.example.com | [2b2c 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89462], isChainEmpty=[false], lastBlockNumber=[3] +peer1.org1.example.com | [2b2d 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer1.org1.example.com | [2b2e 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer1.org1.example.com | [2b2f 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer1.org1.example.com | [2b30 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [2b31 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [2b32 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [2b33 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [2b34 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [2b35 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [2b36 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer1.org1.example.com | [2b37 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [2b38 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer1.org1.example.com | [2b39 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [57d4d7f8-c582-4ea0-bae2-f48a6028745e] +peer1.org1.example.com | [2b3b 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer1.org1.example.com | [2b3c 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2b3d 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer1.org1.example.com | [2b3e 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [57d4d7f8-c582-4ea0-bae2-f48a6028745e] +peer1.org1.example.com | [2b3f 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org1.example.com | [2b40 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2b41 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D09590EEBFEFB38816...08031A0C0A0565787030321203312E30 +peer1.org1.example.com | [2b42 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66804BAA96F0F60F94386FAB321C90A7501C20E97F9633951BAA7CFD1A062695 +peer1.org1.example.com | [2b43 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org2.example.com | [2b3c 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b3d 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b3e 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b3f 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b40 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b41 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b42 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd8440 gate 1589998864432177000 evaluation starts +peer1.org2.example.com | [2b43 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd8440 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b44 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd8440 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2b45 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd8440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2b46 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd8440 principal evaluation fails +peer1.org2.example.com | [2b47 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd8440 gate 1589998864432177000 evaluation fails +peer1.org2.example.com | [2b48 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b49 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b4a 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2b4b 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd89b0 gate 1589998864432499600 evaluation starts +peer1.org2.example.com | [2b4c 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd89b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b4d 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd89b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2b4e 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd89b0 principal matched by identity 0 +peer1.org2.example.com | [2b4f 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2b50 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [2b51 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd89b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b52 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd89b0 gate 1589998864432499600 evaluation succeeds +peer1.org2.example.com | [2b53 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b54 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b55 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b56 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b57 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2b58 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2b59 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2b5a 05-20 18:21:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [2b5c 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b5d 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b5e 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b5f 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b60 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b61 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b62 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b63 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b64 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2b65 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b66 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b67 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b68 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b69 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2b6a 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b6b 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b6c 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b6d 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b6e 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b6f 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b70 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b71 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d600 gate 1589998864622260200 evaluation starts +peer1.org2.example.com | [2b72 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b73 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d600 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2b74 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2b75 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d600 principal evaluation fails +peer1.org2.example.com | [2b76 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4d600 gate 1589998864622260200 evaluation fails +peer1.org2.example.com | [2b77 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b78 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b79 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2b7a 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4db70 gate 1589998864622540100 evaluation starts +peer1.org2.example.com | [2b7b 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4db70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b7c 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4db70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2b7d 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4db70 principal matched by identity 0 +peer1.org2.example.com | [2b7e 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer1.org2.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer1.org2.example.com | [2b7f 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer1.org2.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer1.org2.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer1.org2.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer1.org2.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer1.org2.example.com | [2b80 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4db70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b81 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f4db70 gate 1589998864622540100 evaluation succeeds +peer1.org2.example.com | [2b82 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b83 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b84 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b85 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b86 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b87 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2b88 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2b89 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2b8a 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2b8b 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b8c 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b8d 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b8e 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2b8f 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b90 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b91 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b92 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2b93 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2b94 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b95 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b96 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b97 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b98 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b99 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2b9a 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b9b 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\312E\376\331\237\000+\373\214\276`W\267\225$\225\336\233\242\234\326\002 8\303\325\216\340z\323u\250\031\353\263\343\201\352\247L\240\300\022\257\254\270%\356!\307\017\223\034\311\310" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b9c 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\312E\376\331\237\000+\373\214\276`W\267\225$\225\336\233\242\234\326\002 8\303\325\216\340z\323u\250\031\353\263\343\201\352\247L\240\300\022\257\254\270%\356!\307\017\223\034\311\310" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b9d 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b9e 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\312E\376\331\237\000+\373\214\276`W\267\225$\225\336\233\242\234\326\002 8\303\325\216\340z\323u\250\031\353\263\343\201\352\247L\240\300\022\257\254\270%\356!\307\017\223\034\311\310" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b9f 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2ba0 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer1.org2.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer1.org2.example.com | [2ba1 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer1.org2.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer1.org2.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer1.org2.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer1.org2.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer1.org2.example.com | [2ba2 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2ba3 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 81 a8 88 9d e6 88 e2 82 c1 3e |0E.!...........>| +peer1.org2.example.com | 00000010 ca 45 fe d9 9f 00 2b fb 8c be 60 57 b7 95 24 95 |.E....+...`W..$.| +peer1.org2.example.com | 00000020 de 9b a2 9c d6 02 20 38 c3 d5 8e e0 7a d3 75 a8 |...... 8....z.u.| +peer1.org2.example.com | 00000030 19 eb b3 e3 81 ea a7 4c a0 c0 12 af ac b8 25 ee |.......L......%.| +peer1.org2.example.com | 00000040 21 c7 0f 93 1c c9 c8 |!......| +peer1.org2.example.com | [2ba4 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2ba5 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [2ba6 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2ba7 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2ba8 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2ba9 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2baa 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bab 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bac 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [2bad 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bae 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2baf 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2bb0 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\312E\376\331\237\000+\373\214\276`W\267\225$\225\336\233\242\234\326\002 8\303\325\216\340z\323u\250\031\353\263\343\201\352\247L\240\300\022\257\254\270%\356!\307\017\223\034\311\310" > > alive: +peer1.org2.example.com | [2bb1 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bb2 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bb3 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bb4 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bb5 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb6 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb7 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb8 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb9 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bba 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bbb 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2bbc 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bbd 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bbe 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bbf 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2bc0 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bc1 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bc2 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2bc3 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b3a 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [2b44 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer1.org1.example.com | [2b45 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer1.org1.example.com | [2b46 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer1.org1.example.com | [2b47 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org1.example.com | [2b48 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer1.org1.example.com | [2b49 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 28ms (state_validation=11ms block_and_pvtdata_commit=9ms state_commit=5ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer1.org1.example.com | [2b4a 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2b4b 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D09590EEBFEFB38816...08041A0C0A0565787030321203312E30 +peer1.org1.example.com | [2b4c 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E80DD39B6E1CA2089C66D9B6A1E4FFC7B6989B93FD7B302C5529278E1437C1A2 +peer1.org1.example.com | [2b4d 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer1.org1.example.com | [2b4e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b4f 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b50 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b51 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b52 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b53 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b54 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b55 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b56 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b57 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2b58 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b59 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b5a 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b5b 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b5c 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2b5d 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [2a5c 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f274b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a5d 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f274b0 gate 1589998860149144000 evaluation succeeds +peer0.org2.example.com | [2a5e 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a5f 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a60 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a61 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a62 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2a63 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2a64 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2a65 05-20 18:21:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org1.example.com | [29f0 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [29f1 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29f2 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29f3 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [29f4 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [29f5 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [29f6 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 gate 1589998863610623600 evaluation starts +peer0.org1.example.com | [29f7 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29f8 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [29f9 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 principal matched by identity 0 +peer0.org1.example.com | [29fa 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [29fb 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [29fc 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29fd 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 gate 1589998863610623600 evaluation succeeds +peer0.org1.example.com | [29fe 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29ff 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a00 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a01 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a02 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a03 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a04 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2a05 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2a06 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2a07 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2a08 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a09 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b5e 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b5f 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b60 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b61 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b62 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b63 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b64 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e08b60 gate 1589998873208582900 evaluation starts +peer1.org1.example.com | [2b65 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e08b60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b66 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e08b60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2b67 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e08b60 principal matched by identity 0 +peer1.org1.example.com | [2b68 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 00 66 c9 fb 7f 38 5f 33 14 12 37 25 cf 84 14 |..f...8_3..7%...| +peer1.org1.example.com | 00000010 c4 d1 d8 f0 e5 a6 1e e9 af 66 62 30 20 44 41 c2 |.........fb0 DA.| +peer1.org1.example.com | [2b69 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9b 75 c8 e1 e3 f5 36 76 b9 39 |0E.!...u....6v.9| +peer1.org1.example.com | 00000010 15 26 2e 42 81 95 e6 21 43 80 e0 c4 fc 34 a7 8f |.&.B...!C....4..| +peer1.org1.example.com | 00000020 9e 70 87 73 d5 02 20 03 2e 58 4b 18 0f a8 76 8b |.p.s.. ..XK...v.| +peer1.org1.example.com | 00000030 72 4f 72 05 e4 d2 df af 41 1d 62 9c 53 15 70 de |rOr.....A.b.S.p.| +peer1.org1.example.com | 00000040 f6 ae e1 80 c3 48 12 |.....H.| +peer1.org1.example.com | [2b6a 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e08b60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b6b 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e08b60 gate 1589998873208582900 evaluation succeeds +peer1.org1.example.com | [2b6c 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b6d 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b6e 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b6f 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b70 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b71 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2b72 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2b73 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2b74 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2b75 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b76 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b77 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b78 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2b79 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b7a 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b7b 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b7c 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2a67 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a68 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a69 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2a6a 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a6b 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a6c 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2a6d 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a6e 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a6f 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a70 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a71 05-20 18:21:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a72 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a73 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a74 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a75 05-20 18:21:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a76 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a77 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a78 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a79 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a7a 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a7b 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a7c 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a7d 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a7e 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [2a7f 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a80 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a81 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a82 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a83 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2a84 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bc4 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bc5 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bc6 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bc7 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bc8 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bc9 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bca 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bcb 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bcc 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2bcd 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a0a 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a0b 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a0c 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a0d 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a0e 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2a0f 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2a10 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 gate 1589998863619645900 evaluation starts +peer0.org1.example.com | [2a11 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a12 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2a13 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 principal matched by identity 0 +peer0.org1.example.com | [2a14 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2a15 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003dfb2e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a17 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 gate 1589998863619645900 evaluation succeeds +peer0.org1.example.com | [2a18 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a19 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a1a 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a1b 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a1c 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a1d 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a1e 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a1f 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a20 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a21 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a22 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2a23 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2a24 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 gate 1589998863621161900 evaluation starts +peer1.org1.example.com | [2b7d 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > alive: alive: alive: +peer1.org1.example.com | [2b7e 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b7f 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b80 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b81 05-20 18:21:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2b82 05-20 18:21:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161034 +peer1.org1.example.com | [2b83 05-20 18:21:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A10CB2B97727151FAEA2156305CA9569EE71B8C31AA091B3E616DF319F5A498D +peer1.org1.example.com | [2b84 05-20 18:21:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2b85 05-20 18:21:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2b86 05-20 18:21:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2b87 05-20 18:21:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2b88 05-20 18:21:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b89 05-20 18:21:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b8a 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2b8b 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b8c 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2b8d 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b8f 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b90 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b91 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2b92 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b93 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b8e 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b94 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b95 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b96 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b97 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b98 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b99 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2b9a 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b9b 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b9c 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b9d 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b9e 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b9f 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ba0 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ba1 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e31260 gate 1589998873692207400 evaluation starts +peer1.org1.example.com | [2ba2 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e31260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ba3 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e31260 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2ba4 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e31260 principal matched by identity 0 +peer1.org1.example.com | [2ba5 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5c 30 e1 0e bf 69 da de a0 54 59 19 94 c1 0a |.\0...i...TY....| +peer1.org1.example.com | 00000010 24 16 2c df aa 4a f0 59 f0 c9 31 0e 64 c4 1d 8e |$.,..J.Y..1.d...| +peer1.org1.example.com | [2ba6 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 37 e7 8d a9 ee d3 fd b2 d1 20 |0E.!..7........ | +peer1.org1.example.com | 00000010 86 10 4d 6c 7a 3d 84 1e 2d 5a 3c 90 61 24 9b 8c |..Mlz=..-Z<.a$..| +peer1.org1.example.com | 00000020 5a 0f a9 40 d7 02 20 4b c2 4b 07 1c 02 f9 6a 40 |Z..@.. K.K....j@| +peer1.org1.example.com | 00000030 e8 4c 29 92 df e6 e5 64 23 b3 20 aa e8 b9 e8 58 |.L)....d#. ....X| +peer1.org1.example.com | 00000040 35 28 6b ee f7 af 8b |5(k....| +peer1.org1.example.com | [2ba7 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e31260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ba8 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e31260 gate 1589998873692207400 evaluation succeeds +peer1.org1.example.com | [2ba9 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2baa 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bab 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2bac 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2bad 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bae 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2baf 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2bb0 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2bb1 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2bb2 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb3 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb4 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb5 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bb6 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bce 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2bcf 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bd0 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bd1 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2bd2 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2bd3 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2bd4 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19420 gate 1589998865007125900 evaluation starts +peer1.org2.example.com | [2bd5 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19420 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2bd6 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19420 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2bd7 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2bd8 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19420 principal evaluation fails +peer1.org2.example.com | [2bd9 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f19420 gate 1589998865007125900 evaluation fails +peer1.org2.example.com | [2bda 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bdb 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bdc 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2bdd 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f199a0 gate 1589998865008131800 evaluation starts +peer1.org2.example.com | [2bde 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f199a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2bdf 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f199a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2be0 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f199a0 principal matched by identity 0 +peer1.org2.example.com | [2be1 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer1.org2.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer1.org2.example.com | [2be2 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer1.org2.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer1.org2.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer1.org2.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer1.org2.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer1.org2.example.com | [2be3 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f199a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2be4 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f199a0 gate 1589998865008131800 evaluation succeeds +peer1.org2.example.com | [2be5 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2be6 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2be7 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2be8 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2be9 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bea 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2beb 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2bec 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2bed 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2bee 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bef 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf0 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf1 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [2bf2 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bf3 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bf4 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bf5 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2bf6 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2bf7 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bf8 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf9 05-20 18:21:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2bfa 05-20 18:21:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2bfb 05-20 18:21:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2bfc 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2bfd 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2bfe 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2bff 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c00 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c01 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c02 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c03 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c04 05-20 18:21:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c05 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c06 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c07 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c08 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c09 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c0a 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c0b 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c0c 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c0d 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c0e 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c0f 05-20 18:21:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c10 05-20 18:21:05.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816102F +peer1.org2.example.com | [2c11 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3B4EEAE7A9E43BF64C738E01AF9DF2B2561FA70C28271876630B4F3592637826 +peer1.org2.example.com | [2c12 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c13 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2c14 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2c15 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c16 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c17 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c18 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c19 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c1a 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c1c 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c1b 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c1d 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c1e 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c1f 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c20 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c21 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c22 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c23 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c24 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2c25 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer1.org2.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer1.org2.example.com | [2c26 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer1.org2.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer1.org2.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer1.org2.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer1.org2.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer1.org2.example.com | [2c27 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [2c28 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 8d 10 33 16 1b 3d ea e1 dc 64 6c |0D. ...3..=...dl| +peer1.org2.example.com | 00000010 3c 0a bf 1f 1b 19 10 a9 d1 de 0a 02 ef 26 97 63 |<............&.c| +peer1.org2.example.com | 00000020 dc 4b f5 61 02 20 52 4e 98 f1 28 2b 74 1c 36 7c |.K.a. RN..(+t.6|| +peer1.org2.example.com | 00000030 e3 6d a0 98 ab da 06 69 3f 59 3c e9 c6 c8 11 0b |.m.....i?Y<.....| +peer1.org2.example.com | 00000040 7b b9 56 62 0c 30 |{.Vb.0| +peer1.org2.example.com | [2c29 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2c2a 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2c2b 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c2c 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c2d 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c2e 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c2f 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c30 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2c31 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c32 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c33 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c34 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c35 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c36 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c37 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2c38 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1ca60 gate 1589998865213660600 evaluation starts +peer1.org2.example.com | [2c39 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1ca60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c3a 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1ca60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2c3b 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1ca60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2c3c 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1ca60 principal evaluation fails +peer1.org2.example.com | [2c3d 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1ca60 gate 1589998865213660600 evaluation fails +peer1.org2.example.com | [2c3e 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c3f 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c40 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2c41 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1d070 gate 1589998865216820400 evaluation starts +peer1.org2.example.com | [2c42 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1d070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c43 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1d070 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2c44 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1d070 principal matched by identity 0 +peer1.org2.example.com | [2c45 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer1.org2.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer1.org2.example.com | [2c46 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer1.org2.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer1.org2.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer1.org2.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer1.org2.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer1.org2.example.com | [2c47 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1d070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c48 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1d070 gate 1589998865216820400 evaluation succeeds +peer1.org2.example.com | [2c49 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c4a 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c4b 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2c4c 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2c4d 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c4e 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c4f 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2c50 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer1.org2.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer1.org2.example.com | [2c51 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer1.org2.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer1.org2.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer1.org2.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer1.org2.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer1.org2.example.com | [2c52 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c53 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c54 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2c55 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer1.org2.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer1.org2.example.com | [2c56 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer1.org2.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer1.org2.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer0.org2.example.com | [2a85 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a86 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a87 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a88 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a89 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a8a 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a8b 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e3f0 gate 1589998860625067100 evaluation starts +peer0.org2.example.com | [2a8c 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e3f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a8d 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e3f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2a8e 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a8f 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e3f0 principal evaluation fails +peer0.org2.example.com | [2a90 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e3f0 gate 1589998860625067100 evaluation fails +peer0.org2.example.com | [2a91 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a92 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a93 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a94 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e960 gate 1589998860630372400 evaluation starts +peer0.org2.example.com | [2a95 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a96 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e960 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2a97 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e960 principal matched by identity 0 +peer0.org2.example.com | [2a98 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer0.org2.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer0.org2.example.com | [2a99 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer0.org2.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer0.org2.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer0.org2.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer0.org2.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer0.org2.example.com | [2a9a 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e960 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a9b 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e5e960 gate 1589998860630372400 evaluation succeeds +peer0.org2.example.com | [2a9c 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a9d 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a9e 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a9f 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2aa0 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2aa1 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2aa2 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2aa3 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2aa4 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2aa5 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aa6 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aa7 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aa8 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [2aa9 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aaa 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aab 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aac 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2aad 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\316\373\263\251P\021\244 \335A\342\311\357\032+xCy\330\002 \022s[\362\237\321\370K\205#\221(\037\177\225\024\t\223\203\222\035\r\177T\014\037\336L\027\320\353\223" > alive: alive: alive: +peer0.org2.example.com | [2aae 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2aaf 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab0 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2ab1 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ab2 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2ab3 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ab4 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2ab5 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ab6 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ab7 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab8 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ab9 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aba 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2abb 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2abc 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2abd 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2abe 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2abf 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ac0 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ac1 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ac2 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ac3 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ac4 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ac5 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ac6 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ac7 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac8 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac9 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aca 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2acb 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2acc 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2acd 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2ace 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2acf 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2ad0 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816102B +peer0.org2.example.com | [2ad1 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ED41405C2C11A2459ED32D1779941730935534721DE0F191173952C189C7237E +peer0.org2.example.com | [2ad2 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2ad3 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2ad4 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2ad5 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ad6 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ad7 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ad8 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ad9 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ada 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2adb 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2adc 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2add 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ade 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2adf 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ae0 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ae1 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ae2 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ae3 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a25 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a26 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2a27 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 principal matched by identity 0 +peer0.org1.example.com | [2a28 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2a29 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2a2a 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a2b 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 gate 1589998863621161900 evaluation succeeds +peer0.org1.example.com | [2a2c 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a2d 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a2e 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a2f 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a30 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a31 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a32 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a33 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a34 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a35 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2a36 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a37 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a38 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a39 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a3a 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a3b 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2a3c 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2a3d 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 gate 1589998863686410700 evaluation starts +peer0.org1.example.com | [2a3e 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a3f 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2a40 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 principal matched by identity 0 +peer0.org1.example.com | [2a41 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 79 dd 11 27 ae a5 5c d3 41 99 e1 2d 78 96 fc |dy..'..\.A..-x..| +peer0.org1.example.com | 00000010 02 92 52 d8 37 b0 04 7e c8 20 48 5b 3b e7 01 90 |..R.7..~. H[;...| +peer0.org1.example.com | [2a42 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a3 40 f1 8c 72 2c 60 aa 44 24 30 |0D. '.@..r,`.D$0| +peer1.org1.example.com | [2bb7 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bb8 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bb9 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bba 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bbb 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bbc 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2bbd 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bbe 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bbf 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bc0 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bc1 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bc2 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bc3 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bc4 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2bc5 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bc6 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bc7 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bc8 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bc9 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bca 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bcb 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bcc 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bcd 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bce 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bcf 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bd0 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2bd1 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ae4 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2ae5 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer0.org2.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer0.org2.example.com | [2ae6 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer0.org2.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer0.org2.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer0.org2.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer0.org2.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer0.org2.example.com | [2ae7 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ae8 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ae9 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aea 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aeb 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2aec 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aed 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2aee 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2aef 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer0.org2.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer0.org2.example.com | [2af0 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer0.org2.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer0.org2.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer0.org2.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer0.org2.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer0.org2.example.com | [2af1 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [2af2 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 fa db 69 70 33 32 cf a3 50 07 26 |0D. B..ip32..P.&| +peer0.org2.example.com | 00000010 4b f5 0c 56 74 db e9 4e 64 a8 93 34 9c 92 c7 5e |K..Vt..Nd..4...^| +peer0.org2.example.com | 00000020 12 94 cb f0 02 20 03 fe 8f 12 d5 e4 ac 5a 0b 10 |..... .......Z..| +peer0.org2.example.com | 00000030 62 fd 67 85 80 c7 e0 7b eb 84 8b 73 87 60 82 5b |b.g....{...s.`.[| +peer0.org2.example.com | 00000040 c1 42 df 5b 5f 5e |.B.[_^| +peer0.org2.example.com | [2af3 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2af4 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2af5 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2af6 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2af7 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2af9 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2af8 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2afa 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer1.org2.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer1.org2.example.com | [2c57 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c58 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c59 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c5a 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c5b 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c5c 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c5d 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c5e 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2c5f 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c60 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c61 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c62 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c63 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c64 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c65 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2c66 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efd30 gate 1589998865227689700 evaluation starts +peer1.org2.example.com | [2c67 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efd30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c68 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efd30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2c69 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2c6a 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efd30 principal evaluation fails +peer1.org2.example.com | [2c6b 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efd30 gate 1589998865227689700 evaluation fails +peer1.org2.example.com | [2c6c 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c6d 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c6e 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2c6f 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d02a0 gate 1589998865228865000 evaluation starts +peer1.org2.example.com | [2c70 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d02a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c71 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d02a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2c72 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d02a0 principal matched by identity 0 +peer1.org2.example.com | [2c73 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer1.org2.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer1.org2.example.com | [2c74 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer1.org2.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer1.org2.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer1.org2.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer1.org2.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer1.org2.example.com | [2c75 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d02a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c76 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028d02a0 gate 1589998865228865000 evaluation succeeds +peer1.org2.example.com | [2c77 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c78 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c79 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2c7a 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2c7b 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c7c 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c7d 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2c7e 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer1.org2.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer1.org2.example.com | [2c7f 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer1.org2.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer1.org2.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer1.org2.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer1.org2.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer1.org2.example.com | [2c80 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c81 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c82 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2c83 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer1.org2.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer1.org2.example.com | [2c84 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer1.org1.example.com | [2bd2 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2bd3 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bd4 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bd5 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bd6 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2bd7 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2bd8 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2bd9 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4d9c0 gate 1589998873928832800 evaluation starts +peer1.org1.example.com | [2bda 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4d9c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2bdb 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4d9c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2bdc 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4d9c0 principal matched by identity 0 +peer1.org1.example.com | [2bde 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 ab be cd ba 92 e5 e0 72 e9 86 7e d5 90 ba 69 |........r..~...i| +peer1.org1.example.com | 00000010 87 f6 a7 89 b8 f1 bb fc 10 a5 53 98 60 53 30 57 |..........S.`S0W| +peer1.org1.example.com | [2bdf 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a c7 ab cf 32 de 2c a7 b4 bb 7b d8 |0D. z...2.,...{.| +peer1.org1.example.com | 00000010 dc a7 57 f7 55 61 ff 29 30 7d 90 36 6d ae e9 29 |..W.Ua.)0}.6m..)| +peer1.org1.example.com | 00000020 a8 59 90 39 02 20 38 0c cd 0b dd 8e ef 64 26 0d |.Y.9. 8......d&.| +peer1.org1.example.com | 00000030 99 a2 53 65 84 7b 95 27 4e 5c 2f 88 cb 7f 05 1b |..Se.{.'N\/.....| +peer1.org1.example.com | 00000040 9e cb ec 6a b3 91 |...j..| +peer1.org1.example.com | [2bdd 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2be0 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4d9c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2be1 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4d9c0 gate 1589998873928832800 evaluation succeeds +peer1.org1.example.com | [2be2 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2be3 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2be4 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2be5 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2be6 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2be7 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2be8 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2be9 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2bea 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2beb 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bec 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bed 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bee 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bef 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf0 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bf1 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2afb 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2afc 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2afd 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2afe 05-20 18:21:00.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2aff 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b00 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b01 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1bfb0 gate 1589998860900566000 evaluation starts +peer0.org2.example.com | [2b02 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1bfb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b03 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1bfb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2b04 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1bfb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2b05 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1bfb0 principal evaluation fails +peer0.org2.example.com | [2b06 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a1bfb0 gate 1589998860900566000 evaluation fails +peer0.org2.example.com | [2b07 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b08 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b09 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2b0a 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a08520 gate 1589998860902610400 evaluation starts +peer0.org2.example.com | [2b0b 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a08520 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b0c 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a08520 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2b0d 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a08520 principal matched by identity 0 +peer0.org2.example.com | [2b0e 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +peer0.org2.example.com | 00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +peer0.org2.example.com | [2b0f 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +peer0.org2.example.com | 00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +peer0.org2.example.com | 00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +peer0.org2.example.com | 00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +peer0.org2.example.com | 00000040 47 e0 a3 4a 24 d6 |G..J$.| +peer0.org2.example.com | [2b10 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a08520 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2b11 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a08520 gate 1589998860902610400 evaluation succeeds +peer0.org2.example.com | [2b12 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b13 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b14 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b15 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b16 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b17 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b18 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2b19 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +peer0.org2.example.com | 00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +peer0.org2.example.com | [2b1a 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +peer0.org2.example.com | 00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +peer0.org2.example.com | 00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +peer0.org2.example.com | 00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +peer0.org2.example.com | 00000040 da 1d a6 b8 a8 1b 7f |.......| +peer0.org2.example.com | [2b1b 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b1c 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b1d 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b1e 05-20 18:21:00.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b1f 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b20 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b21 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2b22 05-20 18:21:00.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b23 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b24 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b25 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b26 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2b27 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b28 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b29 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b2a 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b2b 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b2c 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b2d 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b2e 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ec430 gate 1589998861000585100 evaluation starts +peer0.org2.example.com | [2b2f 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ec430 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b30 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ec430 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2b31 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ec430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2b32 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ec430 principal evaluation fails +peer0.org2.example.com | [2b33 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ec430 gate 1589998861000585100 evaluation fails +peer0.org2.example.com | [2b34 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b35 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b36 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2b37 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ecae0 gate 1589998861003226100 evaluation starts +peer0.org2.example.com | [2b38 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ecae0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b39 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ecae0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2b3a 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ecae0 principal matched by identity 0 +peer0.org2.example.com | [2b3b 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +peer0.org2.example.com | 00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +peer0.org2.example.com | [2b3c 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +peer0.org2.example.com | 00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +peer0.org2.example.com | 00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +peer0.org2.example.com | 00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +peer0.org2.example.com | 00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +peer0.org2.example.com | [2b3d 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ecae0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2b3e 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ecae0 gate 1589998861003226100 evaluation succeeds +peer0.org2.example.com | [2b3f 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b40 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b41 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b42 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b43 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b44 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2b45 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2b46 05-20 18:21:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2b47 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2b48 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b49 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b4a 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b4b 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [2b4c 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b4d 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b4e 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b4f 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b50 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\316\373\263\251P\021\244 \335A\342\311\357\032+xCy\330\002 \022s[\362\237\321\370K\205#\221(\037\177\225\024\t\223\203\222\035\r\177T\014\037\336L\027\320\353\223" > alive: alive: alive: +peer0.org2.example.com | [2b51 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b52 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b53 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b54 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b55 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2b56 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b57 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b58 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b59 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b5a 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2b5b 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 49 b4 94 19 ac 01 e0 9c bf d9 ad 7f 6b dc 81 |.I...........k..| +peer0.org2.example.com | 00000010 91 0f 1a eb 2d d4 8c df 09 9a b6 5a 12 b8 59 e8 |....-......Z..Y.| +peer0.org2.example.com | [2b5c 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 70 e7 1e d9 c9 83 30 29 6e 49 42 |0D. p.....0)nIB| +peer0.org2.example.com | 00000010 af 5d 2b 71 c7 6f 15 fc ce 10 50 15 7f e2 1b 67 |.]+q.o....P....g| +peer0.org2.example.com | 00000020 f3 04 ae e0 02 20 44 78 31 d6 0d 50 0c ea 5a b2 |..... Dx1..P..Z.| +peer0.org2.example.com | 00000030 b2 90 45 f0 b3 a6 de 01 67 fe 77 95 b2 80 d3 4a |..E.....g.w....J| +peer0.org2.example.com | 00000040 ed b4 ac cf 07 b5 |......| +peer0.org2.example.com | [2b5d 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2b5e 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 67 0a 71 77 bf 7b a9 fa c8 95 |0E.!..g.qw.{....| +peer0.org2.example.com | 00000010 0a 72 f4 11 ef 85 72 9a 85 5b d2 b3 1d 21 51 90 |.r....r..[...!Q.| +peer0.org2.example.com | 00000020 c3 8f 91 5a 86 02 20 01 72 24 f7 13 cc 6d b0 fb |...Z.. .r$...m..| +peer0.org2.example.com | 00000030 24 be c9 64 21 2e 95 b2 84 2f fa 2f f1 8d 98 e5 |$..d!...././....| +peer0.org2.example.com | 00000040 6f 36 6f eb 48 62 e9 |o6o.Hb.| +peer0.org2.example.com | [2b5f 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2b60 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [2b61 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2b62 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2b63 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2b64 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b65 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b66 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b67 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2b68 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b69 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b6a 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b6b 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [2b6c 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b6d 05-20 18:21:01.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b6e 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b6f 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 b4 13 77 e9 02 dc a9 b4 1b 1b 57 84 66 51 01 |...w.......W.fQ.| +peer0.org2.example.com | 00000010 de fb 63 d0 72 db ce 01 48 e7 04 24 a1 a2 b4 00 |..c.r...H..$....| +peer0.org2.example.com | [2b70 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 ba 96 97 99 1f 33 e0 60 f6 a7 |0E.!.......3.`..| +peer0.org2.example.com | 00000010 21 77 da 4c 58 f8 7f b7 ae 49 d4 f3 09 a9 ae c3 |!w.LX....I......| +peer0.org2.example.com | 00000020 22 ec c8 33 04 02 20 1f 4d 77 90 51 7d a4 62 56 |"..3.. .Mw.Q}.bV| +peer0.org2.example.com | 00000030 82 be 74 53 b6 5e 7c 9f 0c c5 d3 67 13 01 8d 3d |..tS.^|....g...=| +peer0.org2.example.com | 00000040 72 97 97 84 27 79 1a |r...'y.| +peer0.org2.example.com | [2b71 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b72 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b73 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b74 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [2b75 05-20 18:21:01.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2b76 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [2b77 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2b78 05-20 18:21:01.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [2b79 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b7a 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b7b 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b7c 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2b7d 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b7e 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b7f 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b80 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b81 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b82 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer1.org2.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer1.org2.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer1.org2.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer1.org2.example.com | [2c85 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c86 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c87 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c88 05-20 18:21:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c89 05-20 18:21:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2c8a 05-20 18:21:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [2c8b 05-20 18:21:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c8c 05-20 18:21:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB38816100E1801 +peer1.org2.example.com | [2c8d 05-20 18:21:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 89D0860F70B89D9180E8BA171A34B7984B85AE01A2D02E991E6D8AC1F5E8F96F +peer1.org2.example.com | [2c8e 05-20 18:21:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2c8f 05-20 18:21:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c90 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c91 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c92 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c93 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2c94 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c96 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c95 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c97 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c98 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c99 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c9a 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c9b 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c9c 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c9d 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c9e 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c9f 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ca0 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ca1 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ca2 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ca3 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ca4 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ca5 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ca6 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ca7 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ca8 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ca9 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2caa 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2cab 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cac 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2cad 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf2 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bf3 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf4 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf5 05-20 18:21:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bf6 05-20 18:21:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bf7 05-20 18:21:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bf8 05-20 18:21:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bf9 05-20 18:21:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bfa 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bfb 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2bfc 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bfd 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bff 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2c00 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2bfe 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c01 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c02 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c03 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c04 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c05 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c06 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2c07 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 64 3c db e4 0f 17 fc c6 df c3 fa ae 81 c9 ec |.d<.............| +peer1.org1.example.com | 00000010 22 27 83 8f c6 a5 a8 e0 7a bd f9 e6 e9 7c 4e 2d |"'......z....|N-| +peer1.org1.example.com | [2c08 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 5d c5 bd 45 ac c4 17 a4 d7 75 dc |0D. I]..E.....u.| +peer1.org1.example.com | 00000010 63 ca 0b 82 7b 6a 53 97 a2 c3 ce fa 36 a7 f0 86 |c...{jS.....6...| +peer1.org1.example.com | 00000020 b2 bf b7 ea 02 20 46 3a 87 c5 67 97 1a fd be f3 |..... F:..g.....| +peer1.org1.example.com | 00000030 27 40 54 b5 8a cf 49 30 5c f1 3d cc 24 f8 eb 37 |'@T...I0\.=.$..7| +peer1.org1.example.com | 00000040 90 3a 3f 81 b6 87 |.:?...| +peer1.org1.example.com | [2c09 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c0a 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2c0b 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2c0c 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2c0d 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2c0e 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c0f 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c10 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c11 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c12 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c13 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c14 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2c15 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c16 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000010 92 b2 85 f0 87 e3 d4 91 5f 8a 45 8e d1 26 fa 2f |........_.E..&./| +peer0.org1.example.com | 00000020 ef f6 20 83 02 20 0a 30 d1 82 2e 34 4b 1a 49 27 |.. .. .0...4K.I'| +peer0.org1.example.com | 00000030 db d2 ea c0 a7 d9 c8 c5 5f be 71 cb b7 6d 8a 55 |........_.q..m.U| +peer0.org1.example.com | 00000040 fc 7c bf 1c df c6 |.|....| +peer0.org1.example.com | [2a43 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a44 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 gate 1589998863686410700 evaluation succeeds +peer0.org1.example.com | [2a45 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a46 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a47 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a48 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a49 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a4a 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2a4b 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2a4c 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2a4d 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2a4e 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a4f 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a50 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a51 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a52 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a53 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a54 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a55 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a56 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a57 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2a58 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a59 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a5a 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2a5b 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a5c 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a5d 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a5e 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a5f 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a60 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a61 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a62 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a63 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a64 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2cae 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2caf 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2cb0 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cb1 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2cb2 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cb3 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cb4 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2cb5 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2cb6 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2cb7 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847760 gate 1589998868356227000 evaluation starts +peer1.org2.example.com | [2cb8 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847760 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2cb9 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847760 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2cba 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2cbb 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847760 principal evaluation fails +peer1.org2.example.com | [2cbc 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847760 gate 1589998868356227000 evaluation fails +peer1.org2.example.com | [2cbd 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2cbe 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2cbf 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2cc0 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847d20 gate 1589998868356602200 evaluation starts +peer1.org2.example.com | [2cc1 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847d20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2cc2 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847d20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2cc3 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847d20 principal matched by identity 0 +peer1.org2.example.com | [2cc4 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 5e 6c 7c 2f d7 44 b1 cc 2c ab 28 a1 ac 76 67 |f^l|/.D..,.(..vg| +peer1.org2.example.com | 00000010 a7 2f 23 b3 3e 98 07 78 81 6f 9b 25 9b 98 93 86 |./#.>..x.o.%....| +peer1.org2.example.com | [2cc5 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 ae 0b 6a 17 54 ab 33 82 e3 7e |0E.!....j.T.3..~| +peer1.org2.example.com | 00000010 bf ba 15 32 0d ba f5 85 c7 69 10 8f 28 17 73 19 |...2.....i..(.s.| +peer1.org2.example.com | 00000020 a0 00 4b 56 49 02 20 09 21 95 2f c1 56 29 da cf |..KVI. .!./.V)..| +peer1.org2.example.com | 00000030 5f 84 ac 23 64 f1 ab 0b e9 98 46 87 b3 40 3a 60 |_..#d.....F..@:`| +peer1.org2.example.com | 00000040 fa f9 49 b8 1c b9 67 |..I...g| +peer1.org2.example.com | [2cc6 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847d20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2cc7 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002847d20 gate 1589998868356602200 evaluation succeeds +peer1.org2.example.com | [2cc8 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2cc9 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2cca 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2ccb 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ccc 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ccd 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2c17 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c18 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c19 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c1a 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c1b 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c1c 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c1d 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c1e 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c1f 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c20 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c21 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c22 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c23 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c24 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c25 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c26 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c27 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c28 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c29 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c2a 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org1.example.com | [2c2b 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c2c 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org1.example.com | [2c2d 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c2e 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c2f 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2c30 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c31 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c32 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79dd0 gate 1589998875606432000 evaluation starts +peer1.org1.example.com | [2c33 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79dd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c34 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79dd0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2c35 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2c36 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79dd0 principal evaluation fails +peer1.org1.example.com | [2c37 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79dd0 gate 1589998875606432000 evaluation fails +peer1.org1.example.com | [2c38 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a65 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a66 05-20 18:21:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a67 05-20 18:21:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2a68 05-20 18:21:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a69 05-20 18:21:03.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [2a6a 05-20 18:21:03.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6b 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6c 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2a6d 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6e 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6f 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a70 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a71 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a72 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a73 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a74 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a75 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a76 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a77 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a78 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a79 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a7a 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a7b 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a7c 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a7d 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a7e 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a7f 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2a80 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a81 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a82 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a83 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a84 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a85 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2a86 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2a87 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 gate 1589998863909236000 evaluation starts +peer0.org1.example.com | [2a88 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a89 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2a8a 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 principal matched by identity 0 +peer0.org1.example.com | [2a8b 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 44 a6 09 a1 27 0f 76 20 b2 32 88 4a b0 60 a4 |.D...'.v .2.J.`.| +peer0.org1.example.com | 00000010 d2 e8 ab 8c 95 60 43 3c 59 d9 cd b5 39 af 00 5e |.....`C DEBU Verify: sig = 00000000 30 45 02 21 00 f1 82 df af 16 73 79 86 19 f5 ae |0E.!......sy....| +peer0.org1.example.com | 00000010 b6 f1 66 55 44 7c 0e 65 50 6e 8f 35 30 de 70 df |..fUD|.ePn.50.p.| +peer0.org1.example.com | 00000020 89 2b e0 a1 15 02 20 36 6c 17 a1 4e 3f 96 2e fe |.+.... 6l..N?...| +peer0.org1.example.com | 00000030 63 04 d4 e2 c3 ac 4f d2 db 35 e1 41 46 74 e6 7b |c.....O..5.AFt.{| +peer0.org1.example.com | 00000040 ab bb 5a bd c6 9e dc |..Z....| +peer0.org1.example.com | [2a8d 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a8e 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 gate 1589998863909236000 evaluation succeeds +peer0.org1.example.com | [2a8f 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a90 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a91 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a92 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a93 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a94 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2a95 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2a96 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2a97 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2a98 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a99 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a9a 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a9b 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a9c 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a9d 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a9e 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a9f 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2aa0 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2aa1 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2aa2 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2aa3 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b83 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b84 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1650 gate 1589998863356589900 evaluation starts +peer0.org2.example.com | [2b85 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b86 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1650 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2b87 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2b88 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1650 principal evaluation fails +peer0.org2.example.com | [2b89 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1650 gate 1589998863356589900 evaluation fails +peer0.org2.example.com | [2b8a 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b8b 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b8c 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2b8d 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1bc0 gate 1589998863356876200 evaluation starts +peer0.org2.example.com | [2b8e 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b8f 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1bc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2b90 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1bc0 principal matched by identity 0 +peer0.org2.example.com | [2b91 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b ab 66 01 c3 50 4d 84 f5 de f4 13 8b 08 c0 74 |K.f..PM........t| +peer0.org2.example.com | 00000010 cb b3 c5 21 22 6c 2f 80 86 ad f2 1c 0f 02 9e 28 |...!"l/........(| +peer0.org2.example.com | [2b92 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 21 7b 3e b7 a0 15 80 2f f8 86 69 |0D. [!{>..../..i| +peer0.org2.example.com | 00000010 57 47 2a 89 fd 28 6c ac 67 6e a7 e2 3e 9a a6 80 |WG*..(l.gn..>...| +peer0.org2.example.com | 00000020 75 ce 4e ef 02 20 19 0f 49 17 b3 92 a8 4d a5 7a |u.N.. ..I....M.z| +peer0.org2.example.com | 00000030 3c e0 85 17 e2 99 a8 f4 cb 36 af f7 3f 56 e4 8d |<........6..?V..| +peer0.org2.example.com | 00000040 09 83 0f 9f 3e 54 |....>T| +peer0.org2.example.com | [2b93 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1bc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c39 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c3a 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2c3b 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec6340 gate 1589998875610021700 evaluation starts +peer1.org1.example.com | [2c3c 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec6340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c3d 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec6340 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2c3e 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec6340 principal matched by identity 0 +peer1.org1.example.com | [2c3f 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org1.example.com | [2c40 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org1.example.com | [2c41 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c42 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec6340 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c43 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec6340 gate 1589998875610021700 evaluation succeeds +peer1.org1.example.com | [2c44 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2c45 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2c46 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c47 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c48 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c49 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c4a 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org1.example.com | [2c4b 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org1.example.com | [2c4c 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c4d 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c4e 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c4f 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c50 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c51 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [2c52 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c53 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c54 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c55 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c56 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c57 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c58 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org1.example.com | [2c59 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org1.example.com | [2c5a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c5b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c5c 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [2c5d 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [2c5e 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [2c5f 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c60 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 41 13 fe aa b7 0a 89 67 28 05 75 85 ff 5c 6b |.A......g(.u..\k| +peer1.org1.example.com | 00000010 99 b4 a5 97 fc fe 20 63 72 1b 9b d5 6f f9 4d 03 |...... cr...o.M.| +peer1.org1.example.com | [2c61 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e ed 21 4f 68 fe 41 c9 d5 3b a9 |0E.!...!Oh.A..;.| +peer1.org1.example.com | 00000010 f8 de fc d3 8c 6c 64 6d 38 f3 95 28 78 66 6e b3 |.....ldm8..(xfn.| +peer1.org1.example.com | 00000020 0f f0 e1 bb 42 02 20 39 e2 ef 8d e9 dc 88 f1 72 |....B. 9.......r| +peer1.org1.example.com | 00000030 e6 7f 20 c1 18 09 14 2f 8f a8 22 cb 15 ee c5 0b |.. ..../..".....| +peer1.org1.example.com | 00000040 49 af c7 c9 d0 79 b5 |I....y.| +peer1.org1.example.com | [2c62 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c63 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c64 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c65 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [2c66 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c67 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c68 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2c69 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c6a 05-20 18:21:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c6b 05-20 18:21:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c6c 05-20 18:21:15.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2c6d 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c6f 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c70 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c6e 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c72 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c71 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c73 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 752 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c74 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c75 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 752 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c76 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org1.example.com | [2c77 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org1.example.com | [2c78 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer1.org1.example.com | [2c7a 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org1.example.com | [2c79 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7b 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7c 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org1.example.com | [2c7d 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7e 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7f 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c80 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c81 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c82 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c83 05-20 18:21:15.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c84 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c85 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c86 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c87 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2c88 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c89 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c8a 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2c8b 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c8c 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c8d 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09b60 gate 1589998875868081500 evaluation starts +peer1.org1.example.com | [2c8e 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09b60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c8f 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09b60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2c90 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09b60 principal matched by identity 0 +peer1.org1.example.com | [2c91 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org2.example.com | [2cce 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2ccf 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2cd0 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2cd1 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd2 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd3 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd4 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2cd5 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd6 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2cd7 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd8 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cd9 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cda 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cdb 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cdc 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cdd 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cde 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2cdf 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ce0 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ce1 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2ce2 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ce3 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ce4 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ce5 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ce6 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ce7 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ce8 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ce9 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2cea 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ceb 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cec 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ced 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2cee 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cef 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cf0 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cf1 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cf2 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cf3 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aa4 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2aa5 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aa6 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aa7 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aa8 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aa9 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aaa 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aab 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aac 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aad 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aae 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aaf 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ab0 05-20 18:21:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ab1 05-20 18:21:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ab2 05-20 18:21:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ab3 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2ab4 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102B +peer0.org1.example.com | [2ab5 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 089974BE002399E7430E6330A345ADDA64C1696E6CD5DBB741DC87AECBEC80DD +peer0.org1.example.com | [2ab6 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2ab7 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2ab8 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2ab9 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [2aba 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2abb 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2abc 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2abd 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2abe 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2abf 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ac0 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2ac1 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2ac2 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ac3 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b94 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b95 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029a1bc0 gate 1589998863356876200 evaluation succeeds +peer0.org2.example.com | [2b96 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b97 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b98 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b99 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b9a 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b9b 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2b9c 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2b9d 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2b9e 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2b9f 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ba0 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ba1 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ba2 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ba4 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ba3 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ba5 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ba6 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ba7 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ba8 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ba9 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2baa 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bab 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2bac 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bad 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bae 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2baf 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb1 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb0 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb3 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb2 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb4 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb5 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb6 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb7 05-20 18:21:03.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [2bb8 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bb9 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bba 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bbb 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bbc 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bbd 05-20 18:21:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2cf4 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cf5 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cf6 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cf7 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cf8 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2cf9 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cfa 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cfb 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2cfc 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2cfd 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2cfe 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002805e60 gate 1589998868415082600 evaluation starts +peer1.org2.example.com | [2cff 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002805e60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d00 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002805e60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d01 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002805e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d02 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002805e60 principal evaluation fails +peer1.org2.example.com | [2d03 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002805e60 gate 1589998868415082600 evaluation fails +peer1.org2.example.com | [2d04 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d05 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d06 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d07 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ebd10 gate 1589998868415847200 evaluation starts +peer1.org2.example.com | [2d08 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ebd10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d09 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ebd10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d0a 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ebd10 principal matched by identity 0 +peer1.org2.example.com | [2d0b 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2d0c 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [2d0d 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ebd10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d0e 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ebd10 gate 1589998868415847200 evaluation succeeds +peer1.org2.example.com | [2d0f 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d10 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d11 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d12 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d13 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d14 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ac4 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ac5 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2ac6 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ac7 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ac8 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ac9 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2aca 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2acb 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2acc 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2acd 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ace 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2acf 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ad0 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ad1 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ad2 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ad3 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ad4 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ad5 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ad6 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2ad7 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ad8 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ad9 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ada 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2adb 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2adc 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2add 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ade 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [2adf 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ae0 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ae1 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2ae2 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer0.org1.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer0.org1.example.com | [2ae3 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer0.org1.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer0.org1.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer0.org1.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer0.org1.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer0.org1.example.com | [2ae4 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2ae5 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 8c 2c 1a fe 0e a5 35 3e f7 a6 8f |0D. ..,....5>...| +peer0.org1.example.com | 00000010 b9 d9 d1 5e 28 f6 00 d3 bb fb 14 62 67 97 6a b6 |...^(......bg.j.| +peer0.org1.example.com | 00000020 4f b5 f5 4a 02 20 64 2b 43 19 96 04 38 c7 5c 10 |O..J. d+C...8.\.| +peer0.org1.example.com | 00000030 23 23 b8 f0 b8 a5 21 25 25 b7 2a e4 f6 32 5b f2 |##....!%%.*..2[.| +peer0.org1.example.com | 00000040 da c7 77 a5 67 c9 |..w.g.| +peer0.org1.example.com | [2ae6 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [2ae7 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [2ae8 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2ae9 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2aea 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2aeb 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aec 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aed 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aee 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [2aef 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af0 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af1 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2af2 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > alive: +peer0.org1.example.com | [2af3 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [2af4 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2af5 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2af6 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2af7 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2af8 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2af9 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2afa 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2afb 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2afc 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2afd 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2afe 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2aff 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b00 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b01 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d15 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d16 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d17 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d18 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d19 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d1a 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d1b 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026845b0 gate 1589998868420430000 evaluation starts +peer1.org2.example.com | [2d1c 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026845b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d1d 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026845b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d1e 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026845b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d1f 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026845b0 principal evaluation fails +peer1.org2.example.com | [2d20 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026845b0 gate 1589998868420430000 evaluation fails +peer1.org2.example.com | [2d21 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d22 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d23 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d24 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002684b40 gate 1589998868420788700 evaluation starts +peer1.org2.example.com | [2d25 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002684b40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d26 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002684b40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d27 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002684b40 principal matched by identity 0 +peer1.org2.example.com | [2d28 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2d29 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2d2a 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002684b40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d2b 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002684b40 gate 1589998868420788700 evaluation succeeds +peer1.org2.example.com | [2d2c 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d2d 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d2e 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d2f 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d30 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d31 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2bbe 05-20 18:21:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816102C +peer0.org2.example.com | [2bbf 05-20 18:21:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6479DD1127AEA55CD34199E12D7896FC029252D837B0047EC820485B3BE70190 +peer0.org2.example.com | [2bc0 05-20 18:21:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2bc1 05-20 18:21:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2bc2 05-20 18:21:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2bc3 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2bc4 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc5 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc6 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc7 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2bc8 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2bc9 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bcc 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2bca 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bcd 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bce 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bcb 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bcf 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bd0 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bd1 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bd2 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bd3 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bd4 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bd5 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bd6 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bd7 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bd8 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bd9 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2bda 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 44 a6 09 a1 27 0f 76 20 b2 32 88 4a b0 60 a4 |.D...'.v .2.J.`.| +peer0.org2.example.com | 00000010 d2 e8 ab 8c 95 60 43 3c 59 d9 cd b5 39 af 00 5e |.....`C DEBU Verify: sig = 00000000 30 45 02 21 00 f1 82 df af 16 73 79 86 19 f5 ae |0E.!......sy....| +peer0.org2.example.com | 00000010 b6 f1 66 55 44 7c 0e 65 50 6e 8f 35 30 de 70 df |..fUD|.ePn.50.p.| +peer0.org2.example.com | 00000020 89 2b e0 a1 15 02 20 36 6c 17 a1 4e 3f 96 2e fe |.+.... 6l..N?...| +peer0.org2.example.com | 00000030 63 04 d4 e2 c3 ac 4f d2 db 35 e1 41 46 74 e6 7b |c.....O..5.AFt.{| +peer0.org2.example.com | 00000040 ab bb 5a bd c6 9e dc |..Z....| +peer0.org2.example.com | [2bdc 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bdd 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2bde 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2bdf 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org1.example.com | [2c92 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org1.example.com | [2c93 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09b60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c94 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09b60 gate 1589998875868081500 evaluation succeeds +peer1.org1.example.com | [2c95 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c96 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c97 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c98 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c99 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d32 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2d34 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2d35 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d36 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d37 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d38 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d39 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d3a 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d3b 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d3c 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d3d 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d3e 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d3f 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d40 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670dc0 gate 1589998868431650600 evaluation starts +peer1.org2.example.com | [2d41 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d42 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670dc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d43 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d44 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670dc0 principal evaluation fails +peer1.org2.example.com | [2d45 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670dc0 gate 1589998868431650600 evaluation fails +peer1.org2.example.com | [2d46 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d47 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d48 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d49 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671330 gate 1589998868432684500 evaluation starts +peer1.org2.example.com | [2d4a 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671330 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d4b 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671330 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d4c 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671330 principal matched by identity 0 +peer1.org2.example.com | [2d4d 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org2.example.com | [2d4e 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2d4f 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b02 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b03 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b04 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b05 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b06 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b07 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b08 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b09 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b0a 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b0b 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [2b0c 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b0d 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b0e 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b0f 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b10 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2b11 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b12 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b13 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b14 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b15 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b16 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b17 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b18 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 gate 1589998864902202500 evaluation starts +peer0.org1.example.com | [2b19 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b1a 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2b1b 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 principal matched by identity 0 +peer0.org1.example.com | [2b1c 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer0.org1.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer0.org2.example.com | [2be0 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2be1 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2be2 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2be3 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2be4 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2be5 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2be6 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2be7 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2be8 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2be9 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bea 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2beb 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2bec 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bed 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bee 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bef 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bf0 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bf1 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bf2 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bf3 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bf4 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bf5 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bf6 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bf7 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bf8 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bf9 05-20 18:21:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2bfa 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c9a 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c9b 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c9c 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2c9d 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c9e 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c9f 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3c6a0 gate 1589998875874675400 evaluation starts +peer1.org1.example.com | [2ca0 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3c6a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ca1 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3c6a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2ca2 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3c6a0 principal matched by identity 0 +peer1.org1.example.com | [2ca3 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org1.example.com | [2ca4 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org1.example.com | [2ca5 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3c6a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ca6 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3c6a0 gate 1589998875874675400 evaluation succeeds +peer1.org1.example.com | [2ca7 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ca8 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ca9 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2caa 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2cab 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cac 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cad 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2cae 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2caf 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cb0 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2cb1 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2cb2 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2cb3 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3d8a0 gate 1589998875890239700 evaluation starts +peer1.org1.example.com | [2cb4 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3d8a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2cb5 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3d8a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2cb6 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3d8a0 principal matched by identity 0 +peer1.org1.example.com | [2cb7 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer1.org1.example.com | [2cb8 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer1.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer1.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer1.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer1.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer1.org1.example.com | [2cb9 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3d8a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2cba 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3d8a0 gate 1589998875890239700 evaluation succeeds +peer0.org1.example.com | [2b1d 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer0.org1.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer0.org1.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer0.org1.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer0.org1.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer0.org1.example.com | [2b1e 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b1f 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 gate 1589998864902202500 evaluation succeeds +peer0.org1.example.com | [2b20 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b21 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b22 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b23 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b24 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b25 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2b26 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2b27 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2b28 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2b29 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b2a 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b2b 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b2c 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2b2d 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2e 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2f 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b30 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2b31 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2b32 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b33 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b34 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b35 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bfb 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2bfc 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bfd 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bfe 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2bff 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c00 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c01 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284aed0 gate 1589998864043384300 evaluation starts +peer0.org2.example.com | [2c02 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284aed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c03 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284aed0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c04 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284aed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c05 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284aed0 principal evaluation fails +peer0.org2.example.com | [2c06 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284aed0 gate 1589998864043384300 evaluation fails +peer0.org2.example.com | [2c07 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c08 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c09 05-20 18:21:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2c0a 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284b460 gate 1589998864050615300 evaluation starts +peer0.org2.example.com | [2c0b 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284b460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c0c 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284b460 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c0d 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284b460 principal matched by identity 0 +peer0.org2.example.com | [2c0e 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 99 74 be 00 23 99 e7 43 0e 63 30 a3 45 ad da |..t..#..C.c0.E..| +peer0.org2.example.com | 00000010 64 c1 69 6e 6c d5 db b7 41 dc 87 ae cb ec 80 dd |d.inl...A.......| +peer0.org2.example.com | [2c0f 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 45 3b 7f 19 bc 1d ee 99 87 ab 76 |0D. RE;........v| +peer0.org2.example.com | 00000010 b6 a5 e7 d4 c8 88 44 1a f1 19 70 26 e0 55 aa 75 |......D...p&.U.u| +peer0.org2.example.com | 00000020 4d c8 e2 bc 02 20 0c 6e be 50 04 b8 a6 02 f6 5b |M.... .n.P.....[| +peer0.org2.example.com | 00000030 3a e2 97 4a 8c 80 73 92 86 e9 14 6d 4c f6 fd 29 |:..J..s....mL..)| +peer0.org2.example.com | 00000040 c8 88 51 48 90 ed |..QH..| +peer0.org2.example.com | [2c10 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284b460 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c11 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00284b460 gate 1589998864050615300 evaluation succeeds +peer0.org2.example.com | [2c12 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c13 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c14 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c15 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c16 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c17 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c18 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2c19 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2c1a 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2c1b 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2c1c 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c1d 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c1e 05-20 18:21:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c1f 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c21 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c22 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cbb 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cbc 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cbd 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2cbe 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2cbf 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cc0 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cc1 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cc2 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2cc3 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2cc4 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2cc5 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88530 gate 1589998875907000200 evaluation starts +peer1.org1.example.com | [2cc6 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2cc7 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88530 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2cc8 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88530 principal matched by identity 0 +peer1.org1.example.com | [2cc9 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer1.org1.example.com | [2cca 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer1.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer1.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer1.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer1.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer1.org1.example.com | [2ccb 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88530 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ccc 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88530 gate 1589998875907000200 evaluation succeeds +peer1.org1.example.com | [2ccd 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cce 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ccf 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2cd0 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2cd1 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cd2 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 752 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cd3 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd4 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd5 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd6 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2cd7 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cd8 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cd9 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2cda 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2cdb 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2cdc 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89980 gate 1589998875932731900 evaluation starts +peer1.org1.example.com | [2cdd 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89980 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2cde 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89980 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2cdf 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89980 principal matched by identity 0 +peer1.org1.example.com | [2ce0 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2ce1 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004c89980 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ce3 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89980 gate 1589998875932731900 evaluation succeeds +peer1.org1.example.com | [2ce4 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ce5 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ce6 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ce7 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ce8 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2ce9 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2cea 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ceb 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cec 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2ced 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cee 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cef 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2cf0 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2cf1 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2cf2 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81400 gate 1589998875934721200 evaluation starts +peer1.org1.example.com | [2cf3 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2cf4 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81400 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2cf5 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81400 principal matched by identity 0 +peer1.org1.example.com | [2cf6 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer1.org1.example.com | [2cf7 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer1.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer1.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer1.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer1.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer1.org1.example.com | [2cf8 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81400 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2cf9 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b81400 gate 1589998875934721200 evaluation succeeds +peer1.org1.example.com | [2cfa 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cfb 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cfc 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2cfd 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b36 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b37 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b38 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b39 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b3a 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b3b 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b3c 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b3d 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b3e 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b3f 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b40 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2b41 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102C +peer0.org1.example.com | [2b42 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 595F1CCB1B9783D3769ED4A6F2F0F618FCA5BBD433669101BD6BB21FCCCB0E38 +peer0.org1.example.com | [2b43 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2b44 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2b45 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2b46 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2b47 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b48 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2b49 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b4a 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d50 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671330 gate 1589998868432684500 evaluation succeeds +peer1.org2.example.com | [2d51 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d52 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d53 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d54 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d55 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d56 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d57 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d58 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d59 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d5a 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d5b 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d5c 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d5d 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658780 gate 1589998868435760700 evaluation starts +peer1.org2.example.com | [2d5e 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658780 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d5f 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658780 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d60 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d61 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658780 principal evaluation fails +peer1.org2.example.com | [2d62 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658780 gate 1589998868435760700 evaluation fails +peer1.org2.example.com | [2d63 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d64 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d65 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d66 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658cf0 gate 1589998868436478100 evaluation starts +peer1.org2.example.com | [2d67 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658cf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d68 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658cf0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d69 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658cf0 principal matched by identity 0 +peer1.org2.example.com | [2d6a 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2d6b 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [2d6c 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658cf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d6d 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658cf0 gate 1589998868436478100 evaluation succeeds +peer1.org2.example.com | [2d6e 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d6f 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d70 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d71 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d72 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2d73 05-20 18:21:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2d74 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2d75 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org2.example.com | [2d77 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d78 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2d79 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [2d7b 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d7c 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d7d 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d7e 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d7f 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d80 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d81 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d82 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264b6c0 gate 1589998868441817100 evaluation starts +peer1.org2.example.com | [2d83 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264b6c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d84 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264b6c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d85 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264b6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d86 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264b6c0 principal evaluation fails +peer1.org2.example.com | [2d87 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264b6c0 gate 1589998868441817100 evaluation fails +peer1.org2.example.com | [2d88 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d89 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d8a 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d8b 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264bc30 gate 1589998868442284700 evaluation starts +peer1.org2.example.com | [2d8c 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264bc30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d8d 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264bc30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2d8e 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264bc30 principal matched by identity 0 +peer1.org2.example.com | [2d8f 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2b4b 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b4c 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b4d 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b4e 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b4f 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b50 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b51 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b52 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b53 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b54 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b55 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2b56 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer0.org1.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer0.org1.example.com | [2b57 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer0.org1.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer0.org1.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer0.org1.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer0.org1.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer0.org1.example.com | [2b58 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [2b59 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee c7 f2 87 fc b1 5c 59 0c 33 98 |0E.!.......\Y.3.| +peer0.org1.example.com | 00000010 c2 4d 5a 5f 83 40 bc fc e3 5e a8 4c 1b bc 72 32 |.MZ_.@...^.L..r2| +peer0.org1.example.com | 00000020 05 dc 1e 50 3f 02 20 2e 3f 1d a4 87 df df ba c6 |...P?. .?.......| +peer0.org1.example.com | 00000030 a3 32 d9 63 cb 69 9d 73 91 c8 b6 b5 3c 03 a8 d6 |.2.c.i.s....<...| +peer0.org1.example.com | 00000040 d9 7e 28 4c f5 9d b1 |.~(L...| +peer0.org1.example.com | [2b5a 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2b5b 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2b5c 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b5d 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b5e 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b5f 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b60 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b61 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b62 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2b63 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c23 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c24 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c25 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c26 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c20 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c27 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c28 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c29 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c2a 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c2b 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c2c 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2c2d 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c2e 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c2f 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2c30 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c31 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c32 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c33 05-20 18:21:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c34 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c35 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c36 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2c37 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c39 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c38 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c3a 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c3b 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c3c 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c3d 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c3e 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2c3f 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2c40 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c41 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c42 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c43 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c44 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c45 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c46 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c47 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c48 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b070 gate 1589998864122820400 evaluation starts +peer0.org2.example.com | [2c49 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b070 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c4a 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b070 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c4b 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c4c 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b070 principal evaluation fails +peer0.org2.example.com | [2c4d 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b070 gate 1589998864122820400 evaluation fails +peer0.org2.example.com | [2c4e 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c4f 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c50 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2c51 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b640 gate 1589998864123198600 evaluation starts +peer0.org2.example.com | [2c52 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c53 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b640 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c54 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b640 principal matched by identity 0 +peer0.org2.example.com | [2c55 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2c56 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2c57 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c58 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00275b640 gate 1589998864123198600 evaluation succeeds +peer0.org2.example.com | [2c59 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c5a 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c5b 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c5c 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c5d 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2c5e 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [2c60 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b64 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b65 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b66 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b67 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b68 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b69 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b6a 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 gate 1589998865019008200 evaluation starts +peer0.org1.example.com | [2b6b 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b6c 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2b6d 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 principal matched by identity 0 +peer0.org1.example.com | [2b6e 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer0.org1.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer0.org1.example.com | [2b6f 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer0.org1.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer0.org1.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer0.org1.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer0.org1.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer0.org1.example.com | [2b70 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b71 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 gate 1589998865019008200 evaluation succeeds +peer0.org1.example.com | [2b72 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b73 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b74 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b75 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b76 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b77 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b78 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2b79 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer0.org1.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer0.org1.example.com | [2b7a 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer0.org1.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer0.org1.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer0.org1.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer0.org1.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer0.org1.example.com | [2b7b 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b7c 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b7d 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b7e 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2b7f 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer0.org1.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer0.org1.example.com | [2b80 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer0.org1.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer0.org1.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer0.org1.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer0.org1.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer0.org1.example.com | [2b81 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b82 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b83 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b84 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b85 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b86 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b87 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b88 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b89 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b8a 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b8b 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b8c 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b8d 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [2b8e 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b8f 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b90 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b91 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b92 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b93 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2b94 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer0.org1.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer0.org1.example.com | [2b95 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer0.org1.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer0.org1.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer0.org1.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer0.org1.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer0.org1.example.com | [2b96 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b97 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b98 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2b99 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer0.org1.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer0.org1.example.com | [2b9a 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer0.org1.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer0.org1.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer0.org1.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer0.org1.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer0.org1.example.com | [2b9b 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b9c 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b9d 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b9e 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b9f 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ba0 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ba1 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ba2 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ba3 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2ba4 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ba5 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2ba6 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ba7 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ba8 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ba9 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2baa 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2bab 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 gate 1589998865211667200 evaluation starts +peer0.org1.example.com | [2bac 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2bad 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2bae 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 principal matched by identity 0 +peer0.org1.example.com | [2baf 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer0.org1.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer0.org1.example.com | [2bb0 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer0.org1.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer0.org1.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer0.org1.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer0.org1.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer0.org1.example.com | [2bb1 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2bb2 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 gate 1589998865211667200 evaluation succeeds +peer1.org2.example.com | [2d90 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2d91 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264bc30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d92 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264bc30 gate 1589998868442284700 evaluation succeeds +peer1.org2.example.com | [2d93 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d94 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d95 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d96 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d97 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d98 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d99 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d9a 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d9b 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d9c 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d9d 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d9e 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d9f 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262ce40 gate 1589998868443329200 evaluation starts +peer1.org2.example.com | [2da0 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262ce40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2da1 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262ce40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2da2 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262ce40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2da3 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262ce40 principal evaluation fails +peer1.org2.example.com | [2da4 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262ce40 gate 1589998868443329200 evaluation fails +peer1.org2.example.com | [2da5 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2da6 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2da7 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2da8 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d3b0 gate 1589998868443684300 evaluation starts +peer1.org2.example.com | [2da9 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d3b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2daa 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d3b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2dab 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d3b0 principal matched by identity 0 +peer1.org2.example.com | [2dac 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [2dad 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [2dae 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d3b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2daf 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d3b0 gate 1589998868443684300 evaluation succeeds +peer1.org2.example.com | [2db0 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2db1 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c61 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c62 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c63 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c64 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c65 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c66 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c67 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6530 gate 1589998864124898700 evaluation starts +peer0.org2.example.com | [2c68 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c69 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6530 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c6a 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c6b 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6530 principal evaluation fails +peer0.org2.example.com | [2c6c 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6530 gate 1589998864124898700 evaluation fails +peer0.org2.example.com | [2c6d 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c6e 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c6f 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2c70 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269a4f0 gate 1589998864126266500 evaluation starts +peer0.org2.example.com | [2c71 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269a4f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c72 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269a4f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c73 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269a4f0 principal matched by identity 0 +peer0.org2.example.com | [2c74 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [2c75 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [2c76 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269a4f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c77 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269a4f0 gate 1589998864126266500 evaluation succeeds +peer0.org2.example.com | [2c78 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c79 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c7a 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c7b 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c7c 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c7d 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c7e 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c7f 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c80 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c81 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c82 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c83 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c84 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c85 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c86 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c87 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b960 gate 1589998864134594800 evaluation starts +peer0.org2.example.com | [2c88 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c89 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b960 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c8a 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c8b 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b960 principal evaluation fails +peer0.org2.example.com | [2c8c 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269b960 gate 1589998864134594800 evaluation fails +peer0.org2.example.com | [2c8d 05-20 18:21:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c8e 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c8f 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2c90 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269bed0 gate 1589998864140124600 evaluation starts +peer0.org2.example.com | [2c91 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269bed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c92 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269bed0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2c93 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269bed0 principal matched by identity 0 +peer0.org2.example.com | [2c94 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [2c95 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [2c96 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269bed0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c97 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269bed0 gate 1589998864140124600 evaluation succeeds +peer0.org2.example.com | [2c98 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c99 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c9a 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c9b 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c9c 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c9d 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c9e 05-20 18:21:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c9f 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ca0 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ca1 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ca2 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ca3 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ca4 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b110 gate 1589998864152955700 evaluation starts +peer0.org2.example.com | [2ca5 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b110 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ca6 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b110 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2ca7 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ca8 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b110 principal evaluation fails +peer0.org2.example.com | [2ca9 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b110 gate 1589998864152955700 evaluation fails +peer0.org2.example.com | [2caa 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cab 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cac 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2cad 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b680 gate 1589998864157087100 evaluation starts +peer0.org2.example.com | [2cae 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b680 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2caf 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b680 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2cb0 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b680 principal matched by identity 0 +peer0.org2.example.com | [2cb1 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2cb2 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2cb3 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b680 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2cb4 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268b680 gate 1589998864157087100 evaluation succeeds +peer0.org2.example.com | [2cb5 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2cb6 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2cb7 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2cb8 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2cb9 05-20 18:21:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2cba 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2cbc 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2cbd 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cbe 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cbf 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cc0 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cc1 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cc2 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2cc3 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cc4 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cc5 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2cc6 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2cc7 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2cc8 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026778e0 gate 1589998864165839000 evaluation starts +peer0.org2.example.com | [2cc9 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026778e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2cca 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026778e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2ccb 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026778e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ccc 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026778e0 principal evaluation fails +peer0.org2.example.com | [2ccd 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026778e0 gate 1589998864165839000 evaluation fails +peer0.org2.example.com | [2cce 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ccf 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cd0 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2cd1 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002677e50 gate 1589998864166784700 evaluation starts +peer0.org2.example.com | [2cd2 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002677e50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2cd3 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002677e50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2cd4 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002677e50 principal matched by identity 0 +peer0.org2.example.com | [2cd5 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2cd6 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2cd7 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002677e50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2cd8 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002677e50 gate 1589998864166784700 evaluation succeeds +peer0.org2.example.com | [2cd9 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2cda 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2cdb 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2cdc 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2cdd 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cde 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bb3 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2bb4 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2bb5 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2bb6 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2bb7 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bb8 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2bb9 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2cfe 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org1.example.com | [2cff 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org1.example.com | [2d00 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d01 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 752 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d02 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d03 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2d04 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2d05 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d06 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d07 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d08 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d09 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d0a 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d0b 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d0c 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d0d 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43760 gate 1589998875940108000 evaluation starts +peer1.org1.example.com | [2d0e 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43760 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d0f 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43760 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2d10 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43760 principal matched by identity 0 +peer1.org1.example.com | [2d11 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2d12 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2d13 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43760 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d14 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b43760 gate 1589998875940108000 evaluation succeeds +peer1.org1.example.com | [2d15 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d16 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d17 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d18 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d19 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d1a 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cdf 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ce0 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ce1 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ce2 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ce3 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ce4 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ce5 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663060 gate 1589998864168077600 evaluation starts +peer0.org2.example.com | [2ce6 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ce7 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663060 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2ce8 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2ce9 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663060 principal evaluation fails +peer0.org2.example.com | [2cea 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002663060 gate 1589998864168077600 evaluation fails +peer0.org2.example.com | [2ceb 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cec 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ced 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2cee 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026635d0 gate 1589998864168638700 evaluation starts +peer0.org2.example.com | [2cef 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026635d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2cf0 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026635d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2cf1 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026635d0 principal matched by identity 0 +peer0.org2.example.com | [2cf2 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [2cf3 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [2cf4 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026635d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2cf5 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026635d0 gate 1589998864168638700 evaluation succeeds +peer0.org2.example.com | [2cf6 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2cf7 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2cf8 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2cf9 05-20 18:21:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2cfa 05-20 18:21:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2cfb 05-20 18:21:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2cfc 05-20 18:21:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2cfd 05-20 18:21:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [2cff 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d00 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d01 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2d02 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d03 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d04 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d05 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d06 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2db2 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2db3 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2db4 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2db5 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2db6 05-20 18:21:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2db7 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2db8 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2db9 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dba 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dbb 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dbc 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dbd 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dbe 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dbf 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2dc0 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dc1 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2dc2 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dc3 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2dc4 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2dc5 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc6 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2dc7 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2dc8 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2dc9 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2dca 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2dcb 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2dcc 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274b930 gate 1589998868629604800 evaluation starts +peer1.org2.example.com | [2dcd 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274b930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2dce 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274b930 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2d1b 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d1c 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d1d 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d1e 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d1f 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d20 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d21 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298970 gate 1589998875944400200 evaluation starts +peer1.org1.example.com | [2d22 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298970 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d23 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298970 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2d24 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298970 principal matched by identity 0 +peer1.org1.example.com | [2d25 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org1.example.com | [2d26 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org1.example.com | [2d27 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298970 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d28 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003298970 gate 1589998875944400200 evaluation succeeds +peer1.org1.example.com | [2d29 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d2a 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d2b 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d2c 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d2d 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org1.example.com | [2d2e 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org1.example.com | [2d2f 05-20 18:21:15.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d30 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d31 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d32 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d33 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d34 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d35 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d36 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d07 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d08 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d09 05-20 18:21:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d0a 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d0b 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d0c 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d0d 05-20 18:21:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d0e 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d0f 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d10 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d11 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d12 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d13 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d14 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d15 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d16 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [2d17 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d18 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d19 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d1a 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d1b 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2d1c 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d1d 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2d1e 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d1f 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d20 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2d21 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2d22 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2d23 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002813f70 gate 1589998864622540100 evaluation starts +peer0.org2.example.com | [2d24 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002813f70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d25 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002813f70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2d26 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002813f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2d27 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002813f70 principal evaluation fails +peer0.org2.example.com | [2d28 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002813f70 gate 1589998864622540100 evaluation fails +peer0.org2.example.com | [2d29 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d2a 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d2b 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2d2c 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2570 gate 1589998864622792600 evaluation starts +peer0.org2.example.com | [2d2d 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2570 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d2e 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2570 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2d2f 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2570 principal matched by identity 0 +peer0.org2.example.com | [2d30 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer0.org2.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer0.org2.example.com | [2d31 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer0.org2.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer0.org2.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer0.org2.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer0.org2.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer0.org2.example.com | [2d32 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2570 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d33 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2570 gate 1589998864622792600 evaluation succeeds +peer0.org2.example.com | [2d34 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d35 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d36 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d37 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d38 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d39 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2d3a 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2d3b 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2d3c 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2d3d 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d3e 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d3f 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d40 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [2d41 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d42 05-20 18:21:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d43 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d44 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d45 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d46 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d47 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [2d48 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2d49 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d4a 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2d4c 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d4b 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d4e 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d4d 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2d50 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d51 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d52 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d53 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d54 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d55 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d56 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2d57 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816102D +peer0.org2.example.com | [2d58 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 65C518B4C096F22105BA975D2D64ABD16FF7B08E1C7975D9CEF9C27843958528 +peer0.org2.example.com | [2d59 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2d5a 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2d5b 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2d5c 05-20 18:21:04.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d5d 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d5e 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\312E\376\331\237\000+\373\214\276`W\267\225$\225\336\233\242\234\326\002 8\303\325\216\340z\323u\250\031\353\263\343\201\352\247L\240\300\022\257\254\270%\356!\307\017\223\034\311\310" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d5f 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d60 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2d61 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d62 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d63 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d64 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d65 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\312E\376\331\237\000+\373\214\276`W\267\225$\225\336\233\242\234\326\002 8\303\325\216\340z\323u\250\031\353\263\343\201\352\247L\240\300\022\257\254\270%\356!\307\017\223\034\311\310" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d66 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d4f 05-20 18:21:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d67 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d68 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d69 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d6a 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d6b 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2d6c 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer0.org2.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer0.org2.example.com | [2d6d 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer0.org2.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer0.org2.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer0.org2.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer0.org2.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer0.org2.example.com | [2d6e 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d6f 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [2d70 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 81 a8 88 9d e6 88 e2 82 c1 3e |0E.!...........>| +peer0.org2.example.com | 00000010 ca 45 fe d9 9f 00 2b fb 8c be 60 57 b7 95 24 95 |.E....+...`W..$.| +peer0.org2.example.com | 00000020 de 9b a2 9c d6 02 20 38 c3 d5 8e e0 7a d3 75 a8 |...... 8....z.u.| +peer0.org2.example.com | 00000030 19 eb b3 e3 81 ea a7 4c a0 c0 12 af ac b8 25 ee |.......L......%.| +peer0.org2.example.com | 00000040 21 c7 0f 93 1c c9 c8 |!......| +peer0.org2.example.com | [2d71 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2d72 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2d73 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d74 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d75 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d76 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d77 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2d78 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d79 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer0.org2.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer0.org2.example.com | [2d7a 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d7b 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d7c 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer0.org2.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer0.org2.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer0.org2.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer0.org2.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer0.org2.example.com | [2d7d 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d7e 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d7f 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d80 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d81 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d82 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d83 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d84 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d85 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d86 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d87 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d88 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d89 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2d8a 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d8b 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d8c 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d8d 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d8e 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d8f 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d90 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d91 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2d92 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bba 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2bbb 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2bbc 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bbd 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bbe 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bbf 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [2bc0 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc1 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc2 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc3 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2bc4 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2bc5 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bc6 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bc7 05-20 18:21:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [2bc8 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [2bc9 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2bca 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100E1801 +peer0.org1.example.com | [2bcb 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0332D51B7AE0DF028CBD59832DC67088A7A35609B96105CE0952BCB0CA5FB800 +peer0.org1.example.com | [2bcc 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [2bcd 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bce 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bcf 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd0 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd1 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2bd2 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd3 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd4 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bd5 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bd6 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd7 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd8 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2bd9 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bda 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bdb 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bdc 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bdd 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bde 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bdf 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2be0 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2be1 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2be2 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2be3 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2be4 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2be5 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2be6 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2be7 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2be8 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2be9 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2bea 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2beb 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2bec 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2bed 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2bee 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 gate 1589998867576300900 evaluation starts +peer0.org1.example.com | [2bef 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2bf0 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2bf1 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 principal matched by identity 0 +peer0.org1.example.com | [2bf2 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2bf3 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00391b920 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2bf5 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 gate 1589998867576300900 evaluation succeeds +peer0.org1.example.com | [2bf6 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2bf7 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2bf8 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2bf9 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2bfa 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bfb 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dcf 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274b930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2dd0 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274b930 principal evaluation fails +peer1.org2.example.com | [2dd1 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274b930 gate 1589998868629604800 evaluation fails +peer1.org2.example.com | [2dd2 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2dd3 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2dd4 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2dd5 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274bea0 gate 1589998868629963900 evaluation starts +peer1.org2.example.com | [2dd6 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274bea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2dd7 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274bea0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2dd8 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274bea0 principal matched by identity 0 +peer1.org2.example.com | [2dd9 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer1.org2.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer1.org2.example.com | [2dda 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer1.org2.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer1.org2.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer1.org2.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer1.org2.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer1.org2.example.com | [2ddb 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274bea0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ddc 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274bea0 gate 1589998868629963900 evaluation succeeds +peer1.org2.example.com | [2ddd 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dde 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2ddf 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2de0 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2de1 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2de2 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2de3 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2de4 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2de5 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2de6 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2de7 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2de8 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2de9 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2dea 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2deb 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dec 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ded 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2dee 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2def 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2df0 05-20 18:21:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2df1 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2df2 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2df3 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2df4 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2df5 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2df6 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 41 ce eb 92 77 7b 35 6e 91 56 13 55 2b c8 ec |.A...w{5n.V.U+..| +peer1.org2.example.com | 00000010 ee be 04 d3 2d db 61 f8 37 23 08 40 98 4a ec df |....-.a.7#.@.J..| +peer1.org2.example.com | [2df7 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d 20 39 e5 9a a4 2d 7f 71 ac 45 19 |0D. - 9...-.q.E.| +peer1.org2.example.com | 00000010 04 4f 7f f9 3b 84 8a 8a 8b c4 e1 ab e3 3c 57 f6 |.O..;........ DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2df9 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2dfa 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2dfb 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2dfc 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2dfd 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dfe 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dff 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e00 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e01 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e02 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e03 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e04 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e05 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e06 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e07 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e08 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e09 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e0a 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e0b 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e0c 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e0d 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e0e 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bfc 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2bfd 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2bfe 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2bff 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c00 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c01 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c02 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 gate 1589998867578665300 evaluation starts +peer0.org1.example.com | [2c03 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c04 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2c05 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 principal matched by identity 0 +peer0.org1.example.com | [2c06 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2c07 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2c08 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c09 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 gate 1589998867578665300 evaluation succeeds +peer0.org1.example.com | [2c0a 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c0b 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c0c 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c0d 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c0e 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c0f 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c10 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c11 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c12 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d93 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2d94 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d95 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d96 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2d97 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2d98 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2d99 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592580 gate 1589998864924685100 evaluation starts +peer0.org2.example.com | [2d9a 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d9b 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592580 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2d9c 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2d9d 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592580 principal evaluation fails +peer0.org2.example.com | [2d9e 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592580 gate 1589998864924685100 evaluation fails +peer0.org2.example.com | [2d9f 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2da0 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2da1 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2da2 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2da4 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2da5 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592b10 gate 1589998864938358100 evaluation starts +peer0.org2.example.com | [2da6 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592b10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2da3 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2da7 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592b10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2da8 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592b10 principal matched by identity 0 +peer0.org2.example.com | [2da9 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +peer0.org2.example.com | 00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +peer0.org2.example.com | [2dab 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +peer0.org2.example.com | 00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +peer0.org2.example.com | 00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +peer0.org2.example.com | 00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +peer0.org2.example.com | 00000040 b1 ad 93 da a3 d9 |......| +peer0.org2.example.com | [2dac 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592b10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2dad 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002592b10 gate 1589998864938358100 evaluation succeeds +peer0.org2.example.com | [2dae 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2daf 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2db0 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2db1 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2daa 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2db2 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2db3 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2db4 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2db5 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +peer0.org2.example.com | 00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +peer0.org2.example.com | [2db6 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +peer0.org2.example.com | 00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +peer0.org2.example.com | 00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +peer0.org2.example.com | 00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +peer0.org2.example.com | 00000040 25 c7 a9 62 01 f4 |%..b..| +peer0.org2.example.com | [2db7 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2db8 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2db9 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dba 05-20 18:21:04.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d37 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2d38 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d39 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d3a 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d3b 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d3c 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d3d 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d3e 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d3f 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abecf0 gate 1589998876154071200 evaluation starts +peer1.org1.example.com | [2d40 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abecf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d41 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abecf0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2d42 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abecf0 principal matched by identity 0 +peer1.org1.example.com | [2d43 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org1.example.com | [2d44 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org1.example.com | [2d45 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abecf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d46 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abecf0 gate 1589998876154071200 evaluation succeeds +peer1.org1.example.com | [2d47 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d48 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d49 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d4a 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d4b 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d4c 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d4d 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2d4e 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2d4f 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e0f 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e10 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e11 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e12 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e13 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e14 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e15 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2e16 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e17 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e18 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e19 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e1a 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e1b 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2e1c 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer1.org2.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer1.org2.example.com | [2e1d 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org2.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer1.org2.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org2.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org2.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org2.example.com | [2e1e 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2e1f 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a e9 00 cf e8 45 5e 7a c0 76 8d |0E.!......E^z.v.| +peer1.org2.example.com | 00000010 e0 c5 ed 2d dd eb 04 4f ab 74 c8 63 ad 93 fc e7 |...-...O.t.c....| +peer1.org2.example.com | 00000020 c0 30 6b 3c cb 02 20 5a d2 df 9e 29 88 dd dc 8c |.0k<.. Z...)....| +peer1.org2.example.com | 00000030 ab b9 b8 8e 0a 8b d0 5d 5e 63 da ad 30 91 59 61 |.......]^c..0.Ya| +peer1.org2.example.com | 00000040 42 bc 74 b5 7e 95 86 |B.t.~..| +peer1.org2.example.com | [2e20 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2e21 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [2e22 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2e23 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2e24 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2e25 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e26 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e27 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e28 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [2e29 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e2a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e2b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e2c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\300\215_8pQ\253" secret_envelope: > alive: +peer1.org2.example.com | [2e2d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e2e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e2f 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e30 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e31 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e32 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e33 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e34 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e35 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e36 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e37 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2e38 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e39 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2e3a 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161030 +peer1.org2.example.com | [2e3b 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ADAD2B751EAD78E0E362E3F2D383B7662D27C308FB787167315665D750C699C8 +peer1.org2.example.com | [2e3c 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2e3d 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2e3e 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2e3f 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2e40 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e41 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e42 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e43 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2e44 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e45 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2e46 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2e47 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e49 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e4a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e4b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e48 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e4c 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e4d 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e4e 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e4f 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2e50 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e51 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e52 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e53 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e54 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e55 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e56 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e57 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e58 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e59 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e5a 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e5b 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e5c 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2e5d 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e5e 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2e5f 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e60 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e61 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2e62 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2e63 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2e64 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f98a0 gate 1589998869007392500 evaluation starts +peer1.org2.example.com | [2e65 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f98a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e66 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f98a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2e67 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f98a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2e68 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f98a0 principal evaluation fails +peer1.org2.example.com | [2e69 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f98a0 gate 1589998869007392500 evaluation fails +peer1.org2.example.com | [2e6a 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e6b 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e6c 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2e6d 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9e10 gate 1589998869007643500 evaluation starts +peer1.org2.example.com | [2e6e 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9e10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e6f 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9e10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2e70 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9e10 principal matched by identity 0 +peer1.org2.example.com | [2e71 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +peer1.org2.example.com | 00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +peer1.org2.example.com | 00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +peer1.org2.example.com | 00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +peer1.org2.example.com | 00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +peer1.org2.example.com | 00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +peer1.org2.example.com | [2e73 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9e10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e74 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004f9e10 gate 1589998869007643500 evaluation succeeds +peer1.org2.example.com | [2e75 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e76 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e77 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e78 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2e79 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e7a 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2e7b 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2e7c 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2e7d 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2e7e 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e7f 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e80 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e81 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [2e82 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e83 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dbb 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dbc 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dbd 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dbe 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2dbf 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dc0 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2dc1 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2dc2 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2dc3 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2dc4 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2dc5 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2dc6 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024eef20 gate 1589998865028717100 evaluation starts +peer0.org2.example.com | [2dc7 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024eef20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2dc8 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024eef20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2dc9 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024eef20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2dca 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024eef20 principal evaluation fails +peer0.org2.example.com | [2dcb 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024eef20 gate 1589998865028717100 evaluation fails +peer0.org2.example.com | [2dcc 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2dcd 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2dce 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2dcf 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef490 gate 1589998865029088500 evaluation starts +peer0.org2.example.com | [2dd0 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef490 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2dd1 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef490 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2dd2 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef490 principal matched by identity 0 +peer0.org2.example.com | [2dd3 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer0.org2.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer0.org2.example.com | [2dd4 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer0.org2.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer0.org2.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer0.org2.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer0.org2.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer0.org2.example.com | [2dd5 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef490 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2dd6 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ef490 gate 1589998865029088500 evaluation succeeds +peer0.org2.example.com | [2dd7 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2c13 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c14 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c15 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c16 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c17 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c18 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c19 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 gate 1589998867580266000 evaluation starts +peer0.org1.example.com | [2c1a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c1b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2c1c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 principal matched by identity 0 +peer0.org1.example.com | [2c1d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2c1e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2c1f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c20 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 gate 1589998867580266000 evaluation succeeds +peer0.org1.example.com | [2c21 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c22 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c23 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c24 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c25 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2c26 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2c27 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c28 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c29 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c2a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c2b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c2c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c2d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c2e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c2f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 gate 1589998867582695500 evaluation starts +peer0.org1.example.com | [2c30 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c31 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2c32 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 principal matched by identity 0 +peer0.org1.example.com | [2c33 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2c34 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003831bd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c36 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 gate 1589998867582695500 evaluation succeeds +peer0.org1.example.com | [2c37 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c38 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c39 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c3a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c3b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c3c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2c3d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2c3e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c3f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c40 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c41 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c42 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c43 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c44 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c45 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c46 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c47 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c48 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c49 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 gate 1589998867584973800 evaluation starts +peer0.org1.example.com | [2c4a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c4b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2c4c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 principal matched by identity 0 +peer0.org1.example.com | [2c4d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2c4e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0037df720 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c50 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 gate 1589998867584973800 evaluation succeeds +peer0.org1.example.com | [2c51 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c52 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c53 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c54 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c55 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2c56 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2c57 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | [2d50 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2e84 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dd8 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2d51 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e85 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2dd9 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c58 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | [2d52 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e86 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\300\215_8pQ\253" > alive: alive: alive: +peer0.org2.example.com | [2dda 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [2d53 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2e87 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ddb 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [2d54 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2e88 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ddc 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | [2d55 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ddd 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2e89 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2d56 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a741a0 gate 1589998876170051100 evaluation starts +peer0.org2.example.com | [2dde 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2e8a 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c59 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d57 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a741a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ddf 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2e8b 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2c5a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d58 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a741a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2de0 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e8c 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2c5b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d59 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a741a0 principal matched by identity 0 +peer0.org2.example.com | [2de1 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e8d 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c5c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d5a 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org2.example.com | [2de2 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e8e 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c5d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org2.example.com | [2de3 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [2e8f 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c5e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d5b 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org2.example.com | [2de4 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e90 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c5f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org2.example.com | [2de5 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e91 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c60 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org2.example.com | [2de6 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e92 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c61 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 gate 1589998867587684700 evaluation starts +peer1.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org2.example.com | [2de7 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e93 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c62 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org2.example.com | [2de8 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2e94 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e9d50 gate 1589998869024307600 evaluation starts +peer0.org1.example.com | [2c63 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2d5c 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a741a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2de9 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e95 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e9d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c64 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 principal matched by identity 0 +peer1.org1.example.com | [2d5d 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a741a0 gate 1589998876170051100 evaluation succeeds +peer0.org2.example.com | [2dea 05-20 18:21:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e96 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e9d50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2c65 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | [2d5e 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2deb 05-20 18:21:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e97 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e9d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2d5f 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2dec 05-20 18:21:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e98 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e9d50 principal evaluation fails +peer0.org1.example.com | [2c66 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | [2d60 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ded 05-20 18:21:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [2e99 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e9d50 gate 1589998869024307600 evaluation fails +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | [2d61 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2dee 05-20 18:21:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e9a 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | [2d62 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2def 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e9b 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | [2d63 05-20 18:21:16.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2df0 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e9c 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2d64 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2df1 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e9d 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d03e0 gate 1589998869024890100 evaluation starts +peer0.org1.example.com | [2c67 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d65 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2df2 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2e9e 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d03e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c68 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 gate 1589998867587684700 evaluation succeeds +peer1.org1.example.com | [2d66 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2df3 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer1.org2.example.com | [2e9f 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d03e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2c69 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d67 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer1.org2.example.com | [2ea0 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d03e0 principal matched by identity 0 +peer0.org1.example.com | [2c6a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d68 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2df4 05-20 18:21:05.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer1.org2.example.com | [2ea1 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 c6 90 00 a5 4e 5e 59 f0 f3 bd 2b ad ea 9a a8 |E....N^Y...+....| +peer0.org1.example.com | [2c6b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d69 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer1.org2.example.com | 00000010 1e d3 87 b1 03 17 29 bb b9 47 05 3e ec f3 d8 a3 |......)..G.>....| +peer1.org1.example.com | [2d6a 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c6c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer1.org2.example.com | [2ea2 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 cf 26 a9 2f 1d ec e8 6e 1a 71 |0E.!...&./...n.q| +peer1.org1.example.com | [2d6b 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c6d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer1.org2.example.com | 00000010 56 01 37 76 3c f0 12 9e b7 1c d4 c6 59 38 f1 30 |V.7v<.......Y8.0| +peer1.org1.example.com | [2d6c 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6e 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer1.org2.example.com | 00000020 7c 8e 86 b6 ec 02 20 1f 41 a0 37 72 9c e0 0e 9d ||..... .A.7r....| +peer0.org1.example.com | [2c6f 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d6d 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2df5 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000030 ac 1c 6c f9 e3 5c d1 19 4b ca 45 bc 11 a6 2b 3b |..l..\..K.E...+;| +peer0.org1.example.com | [2c70 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [2d6e 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | 00000040 2d c7 33 17 09 38 36 |-.3..86| +peer0.org1.example.com | [2c71 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d6f 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2df6 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 8d 10 33 16 1b 3d ea e1 dc 64 6c |0D. ...3..=...dl| +peer1.org2.example.com | [2ea3 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d03e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c72 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d70 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 3c 0a bf 1f 1b 19 10 a9 d1 de 0a 02 ef 26 97 63 |<............&.c| +peer1.org2.example.com | [2ea4 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d03e0 gate 1589998869024890100 evaluation succeeds +peer0.org1.example.com | [2c73 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d71 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 dc 4b f5 61 02 20 52 4e 98 f1 28 2b 74 1c 36 7c |.K.a. RN..(+t.6|| +peer1.org2.example.com | [2ea5 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2c74 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d72 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 e3 6d a0 98 ab da 06 69 3f 59 3c e9 c6 c8 11 0b |.m.....i?Y<.....| +peer1.org2.example.com | [2ea6 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2c75 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d73 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75a50 gate 1589998876425128200 evaluation starts +peer0.org2.example.com | 00000040 7b b9 56 62 0c 30 |{.Vb.0| +peer1.org2.example.com | [2ea7 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c76 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d74 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75a50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2df7 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2ea8 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c77 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d75 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75a50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2df8 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [2c78 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea9 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d76 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75a50 principal matched by identity 0 +peer0.org2.example.com | [2df9 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2c79 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eaa 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2d77 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org2.example.com | [2dfa 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2c7a 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eab 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org2.example.com | [2dfb 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2c7b 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eac 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2d78 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org2.example.com | [2dfc 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c7c 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ead 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org2.example.com | [2dfd 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c7d 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eae 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org2.example.com | [2dfe 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [2c7e 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eaf 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org2.example.com | [2dff 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c7f 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eb0 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org2.example.com | [2e00 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c80 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eb1 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d79 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75a50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e01 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c81 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eb2 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d7a 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75a50 gate 1589998876425128200 evaluation succeeds +peer0.org2.example.com | [2e02 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [2c82 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eb3 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d7b 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e03 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c83 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eb4 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d7c 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e04 05-20 18:21:05.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c84 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eb5 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d7d 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e05 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c85 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2eb6 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d7e 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e06 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [2c86 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2eb7 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d7f 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e07 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 d0 86 0f 70 b8 9d 91 80 e8 ba 17 1a 34 b7 98 |....p........4..| +peer0.org1.example.com | [2c87 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eb8 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d80 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 4b 85 ae 01 a2 d0 2e 99 1e 6d 8a c1 f5 e8 f9 6f |K........m.....o| +peer0.org1.example.com | [2c88 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2eb9 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d81 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2e08 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 c1 75 70 7f 34 93 7c 41 e4 a5 |0E.!...up.4.|A..| +peer0.org1.example.com | [2c89 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2eba 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d82 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 12 ef 4d 9e 7f 8b 0a 4b 63 9a a6 c4 ce cb e7 cd |..M....Kc.......| +peer0.org2.example.com | 00000020 49 ae f5 9b 81 02 20 3e 6b 49 ee 22 dd f5 60 4e |I..... >kI."..`N| +peer1.org2.example.com | [2ebb 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d83 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000030 3e d1 e8 5b 8f 0f ab 11 51 c1 2e 24 62 bb 05 1b |>..[....Q..$b...| +peer0.org1.example.com | [2c8a 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 5e 6c 7c 2f d7 44 b1 cc 2c ab 28 a1 ac 76 67 |f^l|/.D..,.(..vg| +peer1.org2.example.com | [2ebc 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d84 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000040 4f 54 6e b0 d3 c6 67 |OTn...g| +peer0.org1.example.com | 00000010 a7 2f 23 b3 3e 98 07 78 81 6f 9b 25 9b 98 93 86 |./#.>..x.o.%....| +peer1.org2.example.com | [2ebd 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d85 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2e09 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c8b 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 ae 0b 6a 17 54 ab 33 82 e3 7e |0E.!....j.T.3..~| +peer1.org2.example.com | [2ebe 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d86 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e0a 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 bf ba 15 32 0d ba f5 85 c7 69 10 8f 28 17 73 19 |...2.....i..(.s.| +peer1.org2.example.com | [2ebf 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d87 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ec0 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000020 a0 00 4b 56 49 02 20 09 21 95 2f c1 56 29 da cf |..KVI. .!./.V)..| +peer1.org1.example.com | [2d88 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ec1 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e0b 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 5f 84 ac 23 64 f1 ab 0b e9 98 46 87 b3 40 3a 60 |_..#d.....F..@:`| +peer1.org1.example.com | [2d89 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ec2 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e0c 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org1.example.com | 00000040 fa f9 49 b8 1c b9 67 |..I...g| +peer1.org1.example.com | [2d8a 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ec3 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e0d 05-20 18:21:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org1.example.com | [2c8c 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d8b 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ec4 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e0e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c8d 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2d8c 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ec5 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2e0f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c8e 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2d8d 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ec6 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e10 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c8f 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2ec7 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d8e 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e11 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ec8 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2c90 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2d8f 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e12 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ec9 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c91 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d90 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e13 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eca 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2c92 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d91 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e14 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ecb 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c93 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d92 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e15 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ecc 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c94 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d93 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e16 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ecd 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c95 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d94 05-20 18:21:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e17 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ece 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [2c96 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d95 05-20 18:21:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e18 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ecf 05-20 18:21:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c97 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2d96 05-20 18:21:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e19 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ed0 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c98 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d97 05-20 18:21:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e1a 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2c99 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d98 05-20 18:21:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e1b 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ed1 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c9a 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d99 05-20 18:21:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e1c 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ed2 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c9b 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2d9a 05-20 18:21:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2e1d 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ed3 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c9c 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d9b 05-20 18:21:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e1e 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ed5 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c9d 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d9c 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e1f 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ed4 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c9e 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d9d 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e20 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ed6 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c9f 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d9e 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e21 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ed7 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ca0 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d9f 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e22 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ed8 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca1 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2da0 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e23 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ed9 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca2 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2da1 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e24 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eda 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ca3 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2da2 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e25 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2edb 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca4 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2da3 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e26 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2edc 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca5 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2da4 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e27 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2edd 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ca6 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2da5 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e28 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ede 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2ca7 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2da6 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [2e29 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2edf 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161031 +peer0.org1.example.com | [2ca8 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2da7 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e2a 05-20 18:21:08.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ee0 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9AC707DEF132C984D21F5CF69CD15B3B3510640B999D323943307D8CA7C00492 +peer0.org1.example.com | [2ca9 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2da8 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [2e2b 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa860 gate 1589998868121064400 evaluation starts +peer1.org2.example.com | [2ee1 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2caa 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2da9 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039db0f0 gate 1589998876604405200 evaluation starts +peer0.org2.example.com | [2e2c 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ee2 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2cab 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2daa 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039db0f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e2d 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa860 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2ee3 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [2cac 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dab 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039db0f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2e2e 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ee4 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cad 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dac 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039db0f0 principal matched by identity 0 +peer0.org2.example.com | [2e2f 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa860 principal evaluation fails +peer1.org2.example.com | [2ee5 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cae 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e30 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa860 gate 1589998868121064400 evaluation fails +peer1.org1.example.com | [2dad 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 a3 ec 61 a4 ad 59 ea 0d d4 21 2b 5b 17 ab 9a |`..a..Y...!+[...| +peer1.org2.example.com | [2ee6 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2caf 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e31 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 9c a0 1a 50 b3 8f 56 15 01 e6 88 09 86 5e bd cd |...P..V......^..| +peer0.org1.example.com | [2cb0 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ee7 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e32 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2dae 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 48 aa fc f8 38 9b 88 7c 3f 1b |0E.!..H...8..|?.| +peer0.org1.example.com | [2cb1 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2ee8 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e33 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 33 c7 ff 2b 76 bb aa af ac cb 54 f5 33 53 2f 7f |3..+v.....T.3S/.| +peer0.org1.example.com | [2cb2 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ee9 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e34 05-20 18:21:08.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aadd0 gate 1589998868122450200 evaluation starts +peer1.org1.example.com | 00000020 c4 c8 ab b7 90 02 20 63 73 30 8d 2b 48 d1 6b 6c |...... cs0.+H.kl| +peer0.org1.example.com | [2cb3 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eeb 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e35 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aadd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 ba a4 0e 90 77 93 77 24 a2 66 27 82 ed 77 88 a8 |....w.w$.f'..w..| +peer0.org1.example.com | [2cb4 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eec 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e36 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aadd0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000040 d0 41 f6 eb c5 5f 62 |.A..._b| +peer0.org1.example.com | [2cb5 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eed 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e37 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aadd0 principal matched by identity 0 +peer1.org1.example.com | [2daf 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039db0f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2cb6 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2eee 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e38 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | [2db0 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039db0f0 gate 1589998876604405200 evaluation succeeds +peer0.org1.example.com | [2cb7 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eef 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2db1 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2cb8 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ef0 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e39 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | [2db2 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2cb9 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ef1 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [2db3 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2cba 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ef2 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [2db4 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2cbb 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ef3 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | [2db5 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [2cbc 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2ef4 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2db6 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org1.example.com | [2cbd 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer1.org2.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer0.org2.example.com | [2e3a 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aadd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2db7 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer1.org2.example.com | [2ef5 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer0.org2.example.com | [2e3b 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aadd0 gate 1589998868122450200 evaluation succeeds +peer1.org1.example.com | [2db8 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [2cbe 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer1.org2.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer0.org2.example.com | [2e3c 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2db9 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org1.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer1.org2.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer0.org2.example.com | [2e3d 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer1.org2.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer0.org2.example.com | [2e3e 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer1.org1.example.com | [2dba 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer0.org1.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer1.org1.example.com | [2dbb 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer1.org2.example.com | [2ef6 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [2cbf 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | [2dbc 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2ef7 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a7 49 19 8e c0 e5 f3 db 4d 11 |0E.!...I......M.| +peer0.org2.example.com | [2e3f 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | 00000010 13 54 ef 57 02 86 51 00 c8 23 6f 7c 8a 96 23 b4 |.T.W..Q..#o|..#.| +peer0.org2.example.com | [2e40 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cc0 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 61 9f 42 4c 38 47 4f 62 bc 24 |0E.!..a.BL8GOb.$| +peer1.org2.example.com | 00000020 b4 30 12 d7 73 02 20 33 02 8e 26 11 18 f9 86 66 |.0..s. 3..&....f| +peer1.org1.example.com | [2dbd 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org2.example.com | [2e41 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 96 2f fa b1 21 34 f8 fd bc 85 94 9f d1 20 8d e6 |./..!4....... ..| +peer1.org2.example.com | 00000030 6a 7c 6e 0f a7 5a 61 10 85 ff 46 5a 53 fc b8 d4 |j|n..Za...FZS...| +peer1.org1.example.com | [2dbe 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org2.example.com | [2e42 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 ba b4 74 ba 99 02 20 7c 9c 3a 2b c8 17 05 0e 48 |..t... |.:+....H| +peer1.org2.example.com | 00000040 d6 30 c1 24 95 0c 44 |.0.$..D| +peer1.org1.example.com | [2dbf 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org2.example.com | [2e43 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 54 95 b8 76 f4 d7 f6 7b 84 dc 07 65 0e 39 c2 ec |T..v...{...e.9..| +peer1.org2.example.com | [2ef8 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2dc0 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004ab2940 env 0xc003b7d590 txn 0 +peer0.org2.example.com | [2e44 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 b6 30 70 ce fb a5 0c |.0p....| +peer1.org2.example.com | [2ef9 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2dc1 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [2e45 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2cc1 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2efa 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc2 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003b7d590 +peer0.org2.example.com | [2e46 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2cc2 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [2efb 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc3 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e47 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2cc3 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2efc 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dc4 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e48 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003680b0 gate 1589998868138812700 evaluation starts +peer0.org1.example.com | [2cc4 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2efd 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc5 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e49 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003680b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cc5 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2efe 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dc6 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e4a 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003680b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2eff 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2cc6 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc7 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e4b 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003680b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2f00 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cc7 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc8 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e4c 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003680b0 principal evaluation fails +peer1.org2.example.com | [2eea 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cc8 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc9 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +peer0.org2.example.com | [2e4d 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003680b0 gate 1589998868138812700 evaluation fails +peer0.org1.example.com | [2cc9 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2f01 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2dca 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2e4e 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cca 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f02 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2dcb 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2e4f 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ccb 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f03 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2dcc 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2e50 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2ccc 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f04 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2dcd 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [2e51 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000368630 gate 1589998868139216200 evaluation starts +peer0.org1.example.com | [2ccd 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2f05 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2dce 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2e52 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000368630 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cce 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f06 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2dcf 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 7e c4 71 ef b0 20 ae cd 05 10 be 77 ae f6 68 |.~.q.. .....w..h| +peer0.org2.example.com | [2e53 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000368630 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2ccf 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f07 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c33a0 gate 1589998869207590200 evaluation starts +peer1.org1.example.com | 00000010 4b 20 de 34 61 55 df 2a 9b 70 6c 05 f8 d9 58 f1 |K .4aU.*.pl...X.| +peer0.org2.example.com | [2e54 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000368630 principal matched by identity 0 +peer0.org1.example.com | [2cd0 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f08 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c33a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2dd0 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 f1 17 4c a9 a9 d6 1e 50 a5 18 |0E.!....L....P..| +peer0.org2.example.com | [2e55 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | [2cd1 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f09 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c33a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000010 e7 94 ff 3a 5b 3e 7f 2a d7 2f 47 85 a5 2a e8 5a |...:[>.*./G..*.Z| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2cd2 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f0a 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c33a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000020 8a 68 49 69 f0 02 20 3c f9 13 4b 83 24 18 9c c7 |.hIi.. <..K.$...| +peer0.org2.example.com | [2e56 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | [2cd3 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f0b 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c33a0 principal evaluation fails +peer1.org1.example.com | 00000030 06 c2 76 90 44 10 43 e8 4b 7a ea 74 b6 08 d1 7e |..v.D.C.Kz.t...~| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | [2cd4 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2f0c 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c33a0 gate 1589998869207590200 evaluation fails +peer1.org1.example.com | 00000040 9d 56 77 6a 8e 23 e5 |.Vwj.#.| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | [2cd5 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f0d 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2dd1 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | [2cd6 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2f0e 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2dd2 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002674000, header channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2f0f 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2cd7 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2dd3 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [2e57 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000368630 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f10 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c3930 gate 1589998869207898100 evaluation starts +peer0.org1.example.com | [2cd8 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2dd4 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [2e58 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000368630 gate 1589998868139216200 evaluation succeeds +peer1.org2.example.com | [2f11 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c3930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cd9 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2dd5 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [2e59 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2f12 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c3930 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2cda 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2dd6 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [2e5a 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2f13 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c3930 principal matched by identity 0 +peer0.org1.example.com | [2cdb 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2dd7 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +peer0.org2.example.com | [2e5b 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2f14 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cdc 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 gate 1589998868683037100 evaluation starts +peer1.org1.example.com | [2dd8 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2e5c 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2f15 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer0.org1.example.com | [2cdd 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2dd9 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0003dc400 +peer0.org2.example.com | [2e5d 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org2.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer0.org1.example.com | [2cde 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2dda 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2f16 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer0.org1.example.com | [2cdf 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 principal matched by identity 0 +peer1.org1.example.com | [2ddb 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161035 +peer0.org2.example.com | [2e5e 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer0.org1.example.com | [2ce0 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 41 ce eb 92 77 7b 35 6e 91 56 13 55 2b c8 ec |.A...w{5n.V.U+..| +peer1.org1.example.com | [2ddc 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 87539E7E7867E360EEB5ACAB0576405643F0A8375079D30D00E828B5EAEE8F41 +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer0.org1.example.com | 00000010 ee be 04 d3 2d db 61 f8 37 23 08 40 98 4a ec df |....-.a.7#.@.J..| +peer1.org1.example.com | [2ddd 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: sig = 00000000 30 44 02 20 2d 20 39 e5 9a a4 2d 7f 71 ac 45 19 |0D. - 9...-.q.E.| +peer1.org1.example.com | [2dde 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org2.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer0.org1.example.com | 00000010 04 4f 7f f9 3b 84 8a 8a 8b c4 e1 ab e3 3c 57 f6 |.O..;........ DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org2.example.com | [2f17 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c3930 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 09 62 54 27 02 20 2d 23 d5 17 bb 12 5a d1 00 e7 |.bT'. -#....Z...| +peer1.org1.example.com | [2de0 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e5f 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | [2f18 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c3930 gate 1589998869207898100 evaluation succeeds +peer0.org1.example.com | 00000030 18 9f 8e dc cb a9 8e 02 03 70 88 16 dc 5e da 13 |.........p...^..| +peer1.org1.example.com | [2de1 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | [2f19 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 25 a7 9f 9c fc bc |%.....| +peer1.org1.example.com | [2de2 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e60 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | [2f1a 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ce2 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2de3 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | [2f1b 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ce3 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 gate 1589998868683037100 evaluation succeeds +peer1.org1.example.com | [2de4 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | [2f1c 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ce4 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2de5 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | [2f1d 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2ce5 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2de6 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | [2f1e 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ce6 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2de7 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e61 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f1f 05-20 18:21:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2ce7 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2de8 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e62 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f20 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer0.org1.example.com | [2ce8 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2de9 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e63 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer0.org1.example.com | [2ce9 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2dea 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e64 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f21 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer0.org1.example.com | [2cea 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2deb 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e65 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer0.org1.example.com | [2ceb 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2dec 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e66 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2cec 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org1.example.com | [2ded 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e67 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ced 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org1.example.com | [2dee 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [61a28084-b137-4fc0-83e5-96ed6e43dbc8] +peer0.org1.example.com | [2cee 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e68 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org2.example.com | [2f22 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f23 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f24 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2f25 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer1.org2.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer1.org2.example.com | [2f26 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer1.org2.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer1.org2.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer1.org1.example.com | [2def 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2e69 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer0.org1.example.com | [2cef 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2df0 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [61a28084-b137-4fc0-83e5-96ed6e43dbc8] +peer0.org2.example.com | [2e6a 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer0.org1.example.com | [2cf0 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2df1 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [2e6b 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f27 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cf1 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2df2 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f4a840aa-e272-4fb7-9ca8-8f0fef10da09] +peer0.org2.example.com | [2e6c 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ad230 gate 1589998868150045700 evaluation starts +peer1.org2.example.com | [2f28 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cf2 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e6d 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ad230 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2df3 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f4a840aa-e272-4fb7-9ca8-8f0fef10da09] +peer1.org2.example.com | [2f29 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cf3 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e6e 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ad230 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2df4 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 gate 1589998876657981900 evaluation starts +peer1.org2.example.com | [2f2a 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cf4 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cf5 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cf6 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e6f 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ad230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2e70 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ad230 principal evaluation fails +peer0.org2.example.com | [2e71 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004ad230 gate 1589998868150045700 evaluation fails +peer0.org2.example.com | [2e72 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e73 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e74 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2e75 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004adac0 gate 1589998868150924300 evaluation starts +peer0.org2.example.com | [2e76 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004adac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e77 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004adac0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2e78 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004adac0 principal matched by identity 0 +peer0.org2.example.com | [2e79 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2e7a 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | [2cf7 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2e7b 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004adac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e7c 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004adac0 gate 1589998868150924300 evaluation succeeds +peer0.org2.example.com | [2e7d 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e7e 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e7f 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e80 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e81 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e82 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e83 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e84 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e85 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e86 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e87 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e88 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e89 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ade0 gate 1589998868152992700 evaluation starts +peer0.org2.example.com | [2e8a 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ade0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e8b 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ade0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2e8c 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ade0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2e8d 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ade0 principal evaluation fails +peer0.org2.example.com | [2e8e 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ade0 gate 1589998868152992700 evaluation fails +peer0.org2.example.com | [2e8f 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f2b 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e90 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cf8 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2df5 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f2c 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2e91 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2cf9 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2df6 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2df7 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 principal matched by identity 0 +peer1.org1.example.com | [2df8 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d b5 79 02 a0 13 24 af ee 36 b8 e5 ce 52 47 37 |..y...$..6...RG7| +peer1.org2.example.com | [2f2d 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cfa 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 ae 23 cb ec c7 9b 1b 57 15 1a 12 c3 73 ab e1 33 |.#.....W....s..3| +peer1.org2.example.com | [2f2e 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer0.org2.example.com | [2e92 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047b350 gate 1589998868153339600 evaluation starts +peer0.org1.example.com | [2cfb 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2df9 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c0 40 ba fd 54 d1 92 c4 ba 63 |0E.!...@..T....c| +peer1.org2.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer0.org2.example.com | [2e93 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047b350 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cfc 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 18 50 b5 27 31 85 77 5c 74 2d 19 c2 1e 4b 9d e3 |.P.'1.w\t-...K..| +peer1.org2.example.com | [2f2f 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org2.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer0.org2.example.com | [2e94 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047b350 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000020 38 f5 37 e3 7c 02 20 0c 58 b1 88 a5 16 5e d1 c6 |8.7.|. .X....^..| +peer1.org2.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer0.org2.example.com | [2e95 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047b350 principal matched by identity 0 +peer0.org1.example.com | [2cfd 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 6d 9f 41 d6 b1 4c 07 49 8c b4 f5 07 dd 09 10 78 |m.A..L.I.......x| +peer1.org2.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer0.org2.example.com | [2e96 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | [2cfe 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000040 2b 80 b1 b5 92 a5 b3 |+......| +peer1.org2.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2cff 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2dfa 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f30 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e97 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | [2d00 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dfb 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [2f31 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f32 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [2dfc 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 skipping identity 0 because it has already been used +peer1.org2.example.com | [2f33 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer0.org1.example.com | [2d01 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [2dfd 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 principal evaluation fails +peer1.org2.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer0.org1.example.com | [2d02 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | [2dfe 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c7000 gate 1589998876657981900 evaluation succeeds +peer1.org2.example.com | [2f34 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer0.org1.example.com | [2d03 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2dff 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d7d0a86d-bf10-455f-9cc7-b68f92a3a12d] +peer1.org2.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer0.org1.example.com | [2d04 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e98 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047b350 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e00 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d7d0a86d-bf10-455f-9cc7-b68f92a3a12d] +peer1.org2.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer0.org1.example.com | [2d05 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e99 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047b350 gate 1589998868153339600 evaluation succeeds +peer1.org2.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer0.org2.example.com | [2e9a 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2e01 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer0.org1.example.com | [2d06 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e9b 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2e02 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb appears to be valid +peer1.org2.example.com | [2f35 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d07 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e9c 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e03 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0003dc400 +peer1.org2.example.com | [2f36 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d08 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e9d 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e04 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004ab2940 env 0xc003b7d590 txn 0 +peer1.org2.example.com | [2f37 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d09 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e9e 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | [2e05 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [2f38 05-20 18:21:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d0a 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org1.example.com | [2e06 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 45ms +peer1.org2.example.com | [2f39 05-20 18:21:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer0.org1.example.com | [2d0b 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e9f 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | [2e07 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [2f3a 05-20 18:21:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer0.org1.example.com | [2d0c 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | [2e08 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [2f3b 05-20 18:21:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2d0d 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | [2e09 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer1.org2.example.com | [2f3c 05-20 18:21:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB38816100F1801 +peer0.org1.example.com | [2d0e 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | [2e0a 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [2f3d 05-20 18:21:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 53B906B2CD97B877D8A19F436D303EAB8AD216F148AC9F33C2FE286EE12E4556 +peer0.org1.example.com | [2d0f 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2e0c 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [2f3e 05-20 18:21:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org1.example.com | [2d10 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ea0 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | [2e0d 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [2f3f 05-20 18:21:11.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d11 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2e0e 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer1.org2.example.com | [2f40 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d12 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d13 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d14 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d15 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d16 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d17 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2d18 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ea1 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | [2f41 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d19 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | [2e0f 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [2f42 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d1a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [2f43 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2d1b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [2ea2 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e11 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [2ea3 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e12 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2d1c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2f44 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ea4 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org1.example.com | [2e13 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [2d1d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f45 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f46 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2ea5 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | [2d1e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f47 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | [2e14 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2d1f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2f48 05-20 18:21:11.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | [2e15 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2d20 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 gate 1589998868886362600 evaluation starts +peer1.org2.example.com | [2f49 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | [2e16 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2d21 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f4a 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2e17 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] marked as valid by state validator +peer0.org1.example.com | [2d22 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f4b 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ea6 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e18 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004ab3900), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004ab3940)} +peer0.org1.example.com | [2d23 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2f4c 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ea7 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e19 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [2d24 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2f4d 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ea8 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e1a 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [2d25 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 principal matched by identity 0 +peer1.org2.example.com | [2f4e 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ea9 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e1b 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [2d26 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f4f 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2eaa 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e1c 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org1.example.com | [2d27 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer1.org2.example.com | [2f50 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2eab 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e1d 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org1.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer1.org2.example.com | [2f51 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2eac 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e1e 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org1.example.com | [2d28 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2f52 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ead 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e1f 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d29 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org2.example.com | [2f53 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f54 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e20 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer1.org2.example.com | [2f55 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2eae 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376350 gate 1589998868159209000 evaluation starts +peer1.org1.example.com | [2e0b 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org2.example.com | [2f56 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2eaf 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376350 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e21 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer0.org1.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org2.example.com | [2f57 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eb0 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376350 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer0.org1.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org2.example.com | [2f58 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eb1 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2e22 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer0.org1.example.com | [2d2a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f59 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eb2 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376350 principal evaluation fails +peer1.org1.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer0.org1.example.com | [2d2b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f5a 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [2eb3 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376350 gate 1589998868159209000 evaluation fails +peer1.org1.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer0.org1.example.com | [2d2c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f5b 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2eb4 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer0.org1.example.com | [2d2d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f5c 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f5d 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d2e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 gate 1589998868886362600 evaluation succeeds +peer1.org1.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer1.org2.example.com | [2f5e 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2d2f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eb5 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e23 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer1.org2.example.com | [2f5f 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d30 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2eb6 05-20 18:21:08.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2e24 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [2f60 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d31 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [2f61 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d32 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e25 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 96 f4 fd d3 fa 0a bd 96 aa eb |0E.!............| +peer1.org2.example.com | [2f63 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d33 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 f8 03 a4 45 c3 11 50 7e 34 52 72 c5 91 94 39 81 |...E..P~4Rr...9.| +peer0.org2.example.com | [2eb7 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376bc0 gate 1589998868160038000 evaluation starts +peer1.org2.example.com | [2f62 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d34 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 06 a3 30 e1 40 02 20 77 bf 22 c6 3b 50 88 07 42 |..0.@. w.".;P..B| +peer0.org2.example.com | [2eb8 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f64 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 96 4d c1 89 f6 e0 a9 3c b1 d5 ed 88 83 56 0e 3f |.M.....<.....V.?| +peer0.org2.example.com | [2eb9 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376bc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2f65 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d35 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 05 be cf 44 ef e8 b8 |...D...| +peer0.org2.example.com | [2eba 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376bc0 principal matched by identity 0 +peer1.org2.example.com | [2f66 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d36 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e26 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2ebb 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | [2d37 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f67 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e27 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2d38 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2f68 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e28 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ebc 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | [2d39 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2f69 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e29 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | [2d3a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2f6a 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e2a 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | [2d3b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2f6b 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e2b 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0xa4, 0x2e, 0x9a, 0xd0, 0x47, 0x9a, 0xd6, 0x54, 0xc0, 0x1a, 0xaa, 0x8c, 0xcf, 0x92, 0x89, 0x7b, 0x18, 0x78, 0x45, 0x2d, 0x50, 0x36, 0x95, 0xaf, 0xa8, 0x78, 0xd1, 0xa7, 0xb2, 0x8a, 0xb1, 0xaf} txOffsets= +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | [2d3c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f6c 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | txId=523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb locPointer=offset=70, bytesLength=2982 +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org2.example.com | [2f6d 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d3d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | ] +peer0.org2.example.com | [2ebd 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376bc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d3e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ebe 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376bc0 gate 1589998868160038000 evaluation succeeds +peer1.org1.example.com | [2e2d 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2982] for tx ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to txid-index +peer0.org1.example.com | [2d3f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [2f6e 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ebf 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2e2e 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2982] for tx number:[0] ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to blockNumTranNum index +peer0.org1.example.com | [2d40 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f6f 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ec0 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2e2f 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d41 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f70 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f700 gate 1589998872423372400 evaluation starts +peer0.org2.example.com | [2ec1 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e2c 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2d42 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f71 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ec2 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e30 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer0.org1.example.com | [2d43 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f72 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f700 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2ec3 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer0.org1.example.com | [2d44 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\300\215_8pQ\253" > alive: alive: +peer1.org2.example.com | [2f73 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2e31 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer0.org1.example.com | [2d45 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f74 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f700 principal evaluation fails +peer0.org2.example.com | [2ec4 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer0.org1.example.com | [2d46 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f75 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f700 gate 1589998872423372400 evaluation fails +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer0.org1.example.com | [2d47 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f76 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f77 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org1.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer0.org1.example.com | [2d49 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f78 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org1.example.com | [2e32 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d4a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f79 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003940f0 gate 1589998872426488800 evaluation starts +peer0.org2.example.com | [2ec5 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e33 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d4b 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f7a 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003940f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e34 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d4c 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ec6 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f7b 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003940f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2e35 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d4d 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f7c 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003940f0 principal matched by identity 0 +peer0.org2.example.com | [2ec7 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e36 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d4e 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f7d 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | [2ec8 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e37 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d4f 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [2ec9 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e38 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f7e 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | [2d50 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eca 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e39 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | [2d51 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ecb 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e3a 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | [2d52 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ecc 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e3b 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | [2d53 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ecd 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336e80 gate 1589998868162426700 evaluation starts +peer1.org1.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2d54 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ece 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336e80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e3c 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer1.org2.example.com | [2f7f 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003940f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d55 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ecf 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336e80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer1.org2.example.com | [2f80 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003940f0 gate 1589998872426488800 evaluation succeeds +peer0.org1.example.com | [2d56 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ed0 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer1.org2.example.com | [2f81 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2d57 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2ed1 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336e80 principal evaluation fails +peer1.org1.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer1.org2.example.com | [2f82 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2d58 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ed2 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336e80 gate 1589998868162426700 evaluation fails +peer1.org1.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer1.org2.example.com | [2f83 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d59 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ed3 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e3e 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f84 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d5a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ed4 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e3f 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f85 05-20 18:21:12.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d5b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ed5 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2e40 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f86 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d5c 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ed6 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003373f0 gate 1589998868163087700 evaluation starts +peer1.org1.example.com | [2e41 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d5d 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f87 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ed7 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003373f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d5e 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e3d 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93507], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org2.example.com | [2f88 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ed8 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003373f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2d5f 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 gate 1589998868907304000 evaluation starts +peer1.org1.example.com | [2e42 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org2.example.com | [2f89 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ed9 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003373f0 principal matched by identity 0 +peer0.org1.example.com | [2d60 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e43 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer1.org2.example.com | [2f8a 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2eda 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | [2d61 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2e44 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer1.org2.example.com | [2f8b 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2d62 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 principal matched by identity 0 +peer1.org1.example.com | [2e45 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [2f8c 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2edb 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | [2d63 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad ad 2b 75 1e ad 78 e0 e3 62 e3 f2 d3 83 b7 66 |..+u..x..b.....f| +peer1.org1.example.com | [2e46 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [2f8d 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003954a0 gate 1589998872431280400 evaluation starts +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000010 2d 27 c3 08 fb 78 71 67 31 56 65 d7 50 c6 99 c8 |-'...xqg1Ve.P...| +peer1.org1.example.com | [2e47 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [2f8e 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003954a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | [2d64 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 0e 74 ab 02 3d e2 f5 2c ff d9 |0E.!...t..=..,..| +peer1.org1.example.com | [2e48 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [2f8f 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003954a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000010 7a c7 ea 8e bb 0f fe c6 e3 74 6f b3 55 a8 f4 22 |z........to.U.."| +peer1.org1.example.com | [2e49 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [2f90 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003954a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | 00000020 46 c4 6a 09 05 02 20 30 66 93 fb 65 cf e7 b0 cf |F.j... 0f..e....| +peer1.org1.example.com | [2e4a 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | [2f91 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003954a0 principal evaluation fails +peer0.org2.example.com | [2edc 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003373f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000030 7c 9e a1 cd f2 d6 77 2c e0 8a fd ad 73 5c e6 68 ||.....w,....s\.h| +peer1.org1.example.com | [2e4b 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [2edd 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003373f0 gate 1589998868163087700 evaluation succeeds +peer0.org1.example.com | 00000040 04 28 2e ed 6a 3c c6 |.(..j<.| +peer1.org1.example.com | [2e4c 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer1.org2.example.com | [2f92 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003954a0 gate 1589998872431280400 evaluation fails +peer0.org2.example.com | [2ede 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2d65 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e4d 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer1.org2.example.com | [2f93 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2edf 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2d66 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 gate 1589998868907304000 evaluation succeeds +peer1.org1.example.com | [2e4e 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer1.org2.example.com | [2f94 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ee0 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d67 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e4f 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [2f95 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ee1 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d68 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e50 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer1.org2.example.com | [2f96 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000395b10 gate 1589998872431539100 evaluation starts +peer0.org2.example.com | [2ee2 05-20 18:21:08.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e51 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org1.example.com | [2d69 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2f97 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000395b10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ee3 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e52 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org1.example.com | [2d6a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2f98 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000395b10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2ee4 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e53 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 62ms (state_validation=9ms block_and_pvtdata_commit=39ms state_commit=8ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org1.example.com | [2d6b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f99 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000395b10 principal matched by identity 0 +peer0.org2.example.com | [2ee5 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2e54 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2d6c 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2f9a 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [2ee6 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e55 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D09590EEBFEFB38816...08051A0C0A0565787030321203312E30 +peer0.org1.example.com | [2d6d 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2ee7 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e56 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A52A16D073A9FE1901A7077E26DA5C62E49334CB9E4636BD6518065014536F10 +peer0.org1.example.com | [2d6e 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2f9b 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | [2ee8 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2e57 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer0.org1.example.com | [2d6f 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | [2ee9 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e58 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d70 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | [2eea 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e59 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d71 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | [2eeb 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e5a 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d72 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [2eec 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e5b 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d73 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f9c 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000395b10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2eed 05-20 18:21:08.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e5c 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d74 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f9d 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000395b10 gate 1589998872431539100 evaluation succeeds +peer0.org2.example.com | [2eee 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2e5d 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d75 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f9e 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2eef 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e5e 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d76 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f9f 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ef0 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2e5f 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d77 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fa0 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ef1 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2e60 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d78 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fa1 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ef2 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e61 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [2d79 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2fa2 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [2ef3 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e62 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d7a 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2ef4 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e63 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d7b 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fa3 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | [2ef5 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e64 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d7c 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | [2ef6 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e65 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d7d 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e66 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d7f 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [2ef8 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e67 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2d7e 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [2ef9 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370c70 gate 1589998868362646300 evaluation starts +peer1.org1.example.com | [2e68 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d80 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fa4 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | [2efa 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370c70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e69 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d81 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2efb 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370c70 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2e6a 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d82 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2fa5 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | [2efc 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2e6b 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d83 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | [2efd 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370c70 principal evaluation fails +peer1.org1.example.com | [2e6c 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d84 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | [2efe 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370c70 gate 1589998868362646300 evaluation fails +peer1.org1.example.com | [2e6d 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d85 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | [2eff 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e6e 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d86 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2f00 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e6f 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c3260 gate 1589998876907984400 evaluation starts +peer0.org1.example.com | [2d87 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2fa6 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f01 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2e70 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c3260 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d88 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fa7 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f02 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003713b0 gate 1589998868362928300 evaluation starts +peer1.org1.example.com | [2e71 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c3260 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2d89 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f03 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003713b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fa8 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | [2e72 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c3260 principal matched by identity 0 +peer0.org1.example.com | [2d8a 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f04 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003713b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org2.example.com | [2fa9 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer1.org2.example.com | [2fab 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fac 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e73 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer1.org2.example.com | [2fad 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer0.org1.example.com | [2d8b 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2f05 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003713b0 principal matched by identity 0 +peer1.org2.example.com | [2fae 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e74 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer0.org1.example.com | [2d8c 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102D +peer0.org2.example.com | [2f06 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 5e 6c 7c 2f d7 44 b1 cc 2c ab 28 a1 ac 76 67 |f^l|/.D..,.(..vg| +peer0.org2.example.com | 00000010 a7 2f 23 b3 3e 98 07 78 81 6f 9b 25 9b 98 93 86 |./#.>..x.o.%....| +peer1.org2.example.com | [2faf 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2fb0 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2fb1 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2fb2 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402780 gate 1589998872437470500 evaluation starts +peer1.org1.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer0.org2.example.com | [2f07 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 ae 0b 6a 17 54 ab 33 82 e3 7e |0E.!....j.T.3..~| +peer0.org1.example.com | [2d8d 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 29FFAC9606D480AF71FF81D7A474FCE03C63AA893C8668D5357F9D95BF7C1537 +peer1.org2.example.com | [2fb3 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer0.org2.example.com | 00000010 bf ba 15 32 0d ba f5 85 c7 69 10 8f 28 17 73 19 |...2.....i..(.s.| +peer0.org1.example.com | [2d8e 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2fb4 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402780 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer0.org2.example.com | 00000020 a0 00 4b 56 49 02 20 09 21 95 2f c1 56 29 da cf |..KVI. .!./.V)..| +peer0.org1.example.com | [2d8f 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2fb5 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer0.org2.example.com | 00000030 5f 84 ac 23 64 f1 ab 0b e9 98 46 87 b3 40 3a 60 |_..#d.....F..@:`| +peer0.org1.example.com | [2d90 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [2fb6 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402780 principal evaluation fails +peer1.org1.example.com | [2e75 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c3260 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 fa f9 49 b8 1c b9 67 |..I...g| +peer0.org1.example.com | [2d91 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fb7 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402780 gate 1589998872437470500 evaluation fails +peer1.org1.example.com | [2e76 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c3260 gate 1589998876907984400 evaluation succeeds +peer0.org2.example.com | [2f08 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003713b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d92 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2fb8 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f09 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003713b0 gate 1589998868362928300 evaluation succeeds +peer0.org1.example.com | [2d93 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fb9 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f0a 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2e77 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d94 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2fba 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f0b 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2e78 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d95 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fbb 05-20 18:21:12.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402cf0 gate 1589998872439732600 evaluation starts +peer1.org1.example.com | [2e79 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [2d96 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fbc 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402cf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e7a 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f0c 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d97 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2fbd 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402cf0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2e7b 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f0d 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d98 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fbe 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402cf0 principal matched by identity 0 +peer1.org1.example.com | [2e7c 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f0e 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d99 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fbf 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | [2e7d 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f0f 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2d9a 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2e7e 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f10 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2d9b 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fc0 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [2e7f 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f11 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2d9c 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | [2e80 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2f12 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2d9d 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | [2e81 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2d9e 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f13 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [2e82 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2d9f 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f14 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2e83 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2da0 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2f15 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fc1 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402cf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e84 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2da1 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +peer0.org2.example.com | [2f16 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2fc2 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402cf0 gate 1589998872439732600 evaluation succeeds +peer1.org1.example.com | [2e85 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU Exiting +peer1.org2.example.com | [2fc3 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2e86 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2da2 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +peer0.org2.example.com | [2f18 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2fc4 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2e87 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +peer0.org2.example.com | [2f19 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2fc5 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e88 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +peer0.org2.example.com | [2f1a 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fc6 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e89 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +peer0.org2.example.com | [2f1b 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2fc7 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e8a 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +peer0.org2.example.com | [2f1c 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fc8 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e8b 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2da3 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [2f1d 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fc9 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e8c 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [2f1e 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fca 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e8d 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2da4 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 79 47 74 6e 24 a6 15 c9 cc dd 6e |0D. NyGtn$.....n| +peer0.org2.example.com | [2f1f 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fcb 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e8e 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f20 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fcc 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e8f 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 e9 9e f4 bb 7e 37 d5 f2 48 7a 19 af ba 33 c3 e5 |....~7..Hz...3..| +peer0.org1.example.com | 00000020 ec 83 25 4e 02 20 37 80 00 eb 8d 1a 89 28 15 f4 |..%N. 7......(..| +peer1.org1.example.com | [2e90 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 40 dc 84 a9 3b eb 46 71 e1 d9 56 a4 33 56 4b 6a |@...;.Fq..V.3VKj| +peer0.org2.example.com | [2f21 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fcd 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e91 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 dc 69 9f cd 4d 61 |.i..Ma| +peer0.org2.example.com | [2f22 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fce 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e92 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2f23 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2da5 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2fcf 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403fc0 gate 1589998872441875100 evaluation starts +peer1.org1.example.com | [2e93 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +peer0.org2.example.com | [2f24 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2da6 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2fd0 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +peer0.org2.example.com | [2f25 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2da7 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fd1 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403fc0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2e94 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +peer0.org2.example.com | [2f26 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2da8 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fd2 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +peer0.org2.example.com | [2f27 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2da9 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fd3 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403fc0 principal evaluation fails +peer1.org1.example.com | 00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +peer0.org2.example.com | [2f28 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2daa 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fd4 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000403fc0 gate 1589998872441875100 evaluation fails +peer1.org1.example.com | 00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +peer0.org2.example.com | [2f29 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dab 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fd5 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 5e cf 4f 22 10 20 d1 |^.O". .| +peer0.org2.example.com | [2f2a 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2dac 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fd6 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e95 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [2f2b 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dad 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2fd7 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [2f2c 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2dae 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fd8 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430550 gate 1589998872442130600 evaluation starts +peer1.org1.example.com | [2e96 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 7f 63 58 74 ca eb 90 bc 99 7e 32 |0D. H.cXt.....~2| +peer0.org1.example.com | [2daf 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2fd9 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430550 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 a7 05 d9 6b 6b 30 19 c9 98 42 fc 7c e6 59 68 17 |...kk0...B.|.Yh.| +peer0.org2.example.com | [2f2d 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2db0 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fda 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430550 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000020 28 4b 3a 7b 02 20 2b 92 9f bf c4 f9 9e 83 c7 26 |(K:{. +........&| +peer0.org2.example.com | [2f2e 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2db1 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fdb 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430550 principal matched by identity 0 +peer1.org1.example.com | 00000030 45 9c 44 9d ea f2 c7 43 05 8c 54 fe de 02 25 85 |E.D....C..T...%.| +peer0.org2.example.com | [2f2f 05-20 18:21:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2db2 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2fdc 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | 00000040 90 80 be 60 b5 48 |...`.H| +peer0.org2.example.com | [2f30 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2db3 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2e97 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2f31 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2db4 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2fdd 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | [2e98 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2f32 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2db5 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 gate 1589998869012861700 evaluation starts +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [2e99 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2f33 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2db6 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | [2f34 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e9a 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2db7 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2e9b 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2f35 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fde 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430550 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2db8 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 principal matched by identity 0 +peer1.org1.example.com | [2e9c 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f36 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fdf 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430550 gate 1589998872442130600 evaluation succeeds +peer0.org1.example.com | [2db9 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer1.org1.example.com | [2e9d 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f37 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fe0 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer1.org1.example.com | [2e9e 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f38 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2fe1 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2dba 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org1.example.com | [2e9f 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [2f39 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe2 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer1.org1.example.com | [2ea0 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ea1 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ea2 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2f3a 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org1.example.com | [2ea3 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f3b 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe3 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org1.example.com | [2ea4 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe4 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | [2f3c 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org1.example.com | [2ea5 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2f3d 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2dbb 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ea6 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fe5 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | [2f3e 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dbc 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 gate 1589998869012861700 evaluation succeeds +peer1.org1.example.com | [2ea7 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | [2f3f 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2dbd 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ea8 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | [2f40 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f41 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f42 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f43 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2dbe 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f44 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | [2dbf 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ea9 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2dc0 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2eaa 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fe6 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f45 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc600 gate 1589998868623123900 evaluation starts +peer0.org1.example.com | [2dc1 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2eab 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fe7 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f46 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc600 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2dc2 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eac 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fe8 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f47 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc600 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2dc3 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2ead 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fe9 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f48 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2dc4 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +peer0.org1.example.com | 00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +peer0.org1.example.com | 00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +peer0.org1.example.com | 00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +peer1.org2.example.com | [2fea 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f49 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc600 principal evaluation fails +peer1.org1.example.com | [2eae 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +peer1.org2.example.com | [2feb 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f4a 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc600 gate 1589998868623123900 evaluation fails +peer1.org1.example.com | [2eaf 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | 00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +peer1.org2.example.com | [2fec 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f4b 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2eb0 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dc6 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2fed 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f4c 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2eb1 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2dc7 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2fee 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f4d 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2eb2 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2dc8 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fef 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f4e 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ccb70 gate 1589998868623752900 evaluation starts +peer1.org1.example.com | [2eb3 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2dc9 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2ff0 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f4f 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ccb70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2eb4 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2dca 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer1.org2.example.com | [2ff1 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e120 gate 1589998872444571700 evaluation starts +peer0.org2.example.com | [2f50 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ccb70 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2eb5 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer1.org2.example.com | [2ff2 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f51 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ccb70 principal matched by identity 0 +peer0.org1.example.com | [2dcb 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer1.org1.example.com | [2eb6 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2ff3 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e120 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2f52 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer0.org1.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer1.org1.example.com | [2eb7 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ff4 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer0.org1.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer1.org1.example.com | [2eb8 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ff5 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e120 principal evaluation fails +peer0.org2.example.com | [2f53 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer0.org1.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer1.org1.example.com | [2eb9 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ff6 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e120 gate 1589998872444571700 evaluation fails +peer0.org2.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer0.org1.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer1.org1.example.com | [2eba 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ff7 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer0.org1.example.com | [2dcc 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ebb 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ff8 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer0.org1.example.com | [2dcd 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ebc 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151e0 gate 1589998877218040400 evaluation starts +peer1.org2.example.com | [2ff9 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer0.org1.example.com | [2dce 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ebd 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ffa 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e690 gate 1589998872447489900 evaluation starts +peer0.org2.example.com | [2f54 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ccb70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2dcf 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2ebe 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [2ffb 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e690 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f55 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ccb70 gate 1589998868623752900 evaluation succeeds +peer0.org1.example.com | [2dd0 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102E +peer1.org1.example.com | [2ebf 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151e0 principal matched by identity 0 +peer1.org2.example.com | [2ffc 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e690 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2f56 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2dd1 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 45C69000A54E5E59F0F3BD2BADEA9AA81ED387B1031729BBB947053EECF3D8A3 +peer1.org1.example.com | [2ec0 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 85 a1 71 0f 13 04 53 48 63 2b 13 cb 00 a6 c9 |8..q...SHc+.....| +peer1.org2.example.com | [2ffd 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e690 principal matched by identity 0 +peer0.org2.example.com | [2f57 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2dd2 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 e9 08 2c a5 e0 f6 74 db 59 27 df 90 4b ba 91 0c |..,...t.Y'..K...| +peer1.org2.example.com | [2ffe 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [2f58 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2dd3 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2dd4 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [2f59 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2dd5 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2ec1 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 07 6d 0c eb de 11 0c 58 65 7b |0E.!...m.....Xe{| +peer1.org2.example.com | [2fff 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | [2f5a 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2dd6 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 03 0c f3 04 a5 57 c7 4f 39 04 ae ef 9b 31 75 2f |.....W.O9....1u/| +peer1.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | [2dd7 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5b 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000020 55 71 b2 62 9d 02 20 76 b2 3a 92 b3 da 40 9d ea |Uq.b.. v.:...@..| +peer1.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | [2dd8 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5c 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000030 65 69 b4 7c 72 a3 7c ed 23 92 41 83 85 78 af f1 |ei.|r.|.#.A..x..| +peer1.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | [2dd9 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5d 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000040 f7 89 17 55 8d 58 a8 |...U.X.| +peer1.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2dda 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2f5e 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2ec2 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3000 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e690 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ddb 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5f 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ec3 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151e0 gate 1589998877218040400 evaluation succeeds +peer1.org2.example.com | [3001 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034e690 gate 1589998872447489900 evaluation succeeds +peer0.org1.example.com | [2ddc 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2f60 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ec4 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3002 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ddd 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2f61 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ec5 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3003 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2dde 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f62 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | [2ec6 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3004 05-20 18:21:12.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ddf 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f63 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ec7 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3005 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2de0 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f64 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ec8 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3006 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2de1 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f65 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ec9 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3007 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2de2 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f66 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ecb 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2de3 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3008 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f68 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2eca 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2de4 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3009 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f67 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ecc 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2de5 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [300a 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f69 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ecd 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2de6 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [300b 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f6a 05-20 18:21:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2ece 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [300c 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2de7 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2f6b 05-20 18:21:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816102E +peer1.org1.example.com | [2ecf 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [300d 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2de8 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer0.org2.example.com | [2f6c 05-20 18:21:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1541CEEB92777B356E915613552BC8ECEEBE04D32DDB61F837230840984AECDF +peer1.org1.example.com | [2ed0 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [300e 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f900 gate 1589998872451005500 evaluation starts +peer0.org1.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer0.org2.example.com | [2f6d 05-20 18:21:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2ed1 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [300f 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2de9 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer0.org2.example.com | [2f6e 05-20 18:21:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2ed2 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3010 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f900 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer0.org2.example.com | [2f6f 05-20 18:21:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [2ed3 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3011 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer0.org2.example.com | [2f70 05-20 18:21:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2ed4 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3012 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f900 principal evaluation fails +peer0.org1.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer0.org2.example.com | [2f71 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ed5 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3013 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f900 gate 1589998872451005500 evaluation fails +peer0.org1.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer0.org2.example.com | [2f72 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3014 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ed6 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2dea 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f73 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3015 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ed7 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2deb 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f74 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3016 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2ed8 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2dec 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2f75 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3017 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034fe70 gate 1589998872451362800 evaluation starts +peer1.org1.example.com | [2ed9 05-20 18:21:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2ded 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +peer0.org2.example.com | [2f76 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3018 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034fe70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2eda 05-20 18:21:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161036 +peer0.org1.example.com | 00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3019 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034fe70 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2edb 05-20 18:21:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D0F6D9385206DDC75157E764FBB8DFFF16B96B3481FF7B7935D29CA8E20AA752 +peer0.org1.example.com | [2dee 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +peer0.org2.example.com | [2f78 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [301a 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034fe70 principal matched by identity 0 +peer1.org1.example.com | [2edc 05-20 18:21:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +peer0.org2.example.com | [2f79 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [301b 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org1.example.com | [2edd 05-20 18:21:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2ede 05-20 18:21:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +peer1.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org1.example.com | [2edf 05-20 18:21:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | 00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +peer0.org2.example.com | [2f7a 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [301c 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org1.example.com | [2ee0 05-20 18:21:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +peer1.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [2ee1 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2def 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f7c 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [2ee2 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2df0 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | [2f7b 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ee3 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2df1 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [2f7d 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ee4 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2df2 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [301d 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034fe70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f7e 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2ee5 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2df3 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [301e 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034fe70 gate 1589998872451362800 evaluation succeeds +peer0.org2.example.com | [2f7f 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ee6 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2df4 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [301f 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f80 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [2ee7 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2df5 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3020 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f81 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ee8 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2df6 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3021 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f82 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2ee9 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2df7 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3022 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f83 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2eea 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2df8 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3023 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | [2f84 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2eeb 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2df9 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [2f85 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eec 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dfa 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3024 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | [2f86 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2eed 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2dfb 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | [2f87 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eee 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2dfc 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | [2f88 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2eef 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dfd 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | [2f89 05-20 18:21:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ef0 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2dfe 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [2f8a 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ef1 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2dff 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3025 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [2f8b 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ef2 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e00 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [2f8c 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e01 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ef3 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3026 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | [2f8d 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e02 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2ef4 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | [2f8e 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e03 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ef5 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer1.org1.example.com | [2ef6 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e04 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [2f90 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f91 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ef7 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [2f92 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ef8 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2e05 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3027 05-20 18:21:12.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f93 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2ef9 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2e06 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3028 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f94 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816102F +peer1.org1.example.com | [2efa 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2e07 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3029 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f95 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1EE4617D875D2CFA78E5D3E89F8E7999913353E8E798EE200C33545044F3777A +peer1.org1.example.com | [2efb 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037241e0 gate 1589998878704669700 evaluation starts +peer0.org1.example.com | [2e08 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f96 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [302a 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2efc 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037241e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e09 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f97 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [302b 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2efd 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037241e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2e0a 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 gate 1589998869197640000 evaluation starts +peer0.org2.example.com | [2f98 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [302c 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2efe 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037241e0 principal matched by identity 0 +peer0.org1.example.com | [2e0b 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f99 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [302d 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eff 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 09 e9 ba f6 ba 81 60 61 82 5a cc 3e 87 e5 0a |i......`a.Z.>...| +peer0.org1.example.com | [2e0c 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [2f9a 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [302e 05-20 18:21:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 00 0d 9f 4a aa c9 93 ec 11 90 ac 79 9f 00 58 2d |...J.......y..X-| +peer0.org1.example.com | [2e0d 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 principal matched by identity 0 +peer0.org2.example.com | [2f9b 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [302f 05-20 18:21:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f00 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 88 bf 1b 78 8b 0d b6 bf b3 41 0b |0D. `...x.....A.| +peer0.org1.example.com | [2e0e 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer0.org2.example.com | [2f9c 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3030 05-20 18:21:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | 00000010 00 89 a1 2d e9 a4 c1 03 65 e1 f0 2b 7a bb 03 87 |...-....e..+z...| +peer0.org1.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer0.org2.example.com | [2f9d 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3031 05-20 18:21:12.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 fd 1f c4 3e 02 20 4d d6 3c fa 0f 2f ad 38 62 94 |...>. M.<../.8b.| +peer0.org1.example.com | [2e0f 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer0.org2.example.com | [2f9e 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3032 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 01 89 33 cc 0f 8e 42 76 27 5f 8b 9c e5 a9 09 54 |..3...Bv'_.....T| +peer0.org1.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer0.org2.example.com | [2f9f 05-20 18:21:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3033 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 67 9f 36 b5 5a fb |g.6.Z.| +peer0.org1.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer0.org2.example.com | [2fa0 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3034 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f01 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037241e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer0.org2.example.com | [2fa1 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3035 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2f02 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037241e0 gate 1589998878704669700 evaluation succeeds +peer0.org1.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer0.org2.example.com | [2fa2 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3036 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f03 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e10 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2fa3 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3037 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2f04 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e11 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 gate 1589998869197640000 evaluation succeeds +peer0.org2.example.com | [2fa4 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3038 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f05 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2e12 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fa5 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3039 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f06 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2e13 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fa6 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [303a 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2f07 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e14 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fa7 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [303b 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f08 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2e15 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2fa8 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer1.org2.example.com | [303c 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2f09 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2e16 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer1.org2.example.com | [303d 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d270 gate 1589998872641520500 evaluation starts +peer1.org1.example.com | [2f0a 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2e17 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2fa9 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org2.example.com | [303e 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d270 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2f0b 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2e18 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer1.org2.example.com | [303f 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d270 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2f0c 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e19 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org2.example.com | [3040 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2f0d 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e1a 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org2.example.com | [3041 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d270 principal evaluation fails +peer0.org1.example.com | [2e1b 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f0e 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org2.example.com | [3042 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d270 gate 1589998872641520500 evaluation fails +peer0.org1.example.com | [2e1c 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f0f 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2faa 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | [3043 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e1d 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f10 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3044 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e1e 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2f11 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fab 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a e9 00 cf e8 45 5e 7a c0 76 8d |0E.!......E^z.v.| +peer1.org2.example.com | [3045 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2e1f 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f12 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 e0 c5 ed 2d dd eb 04 4f ab 74 c8 63 ad 93 fc e7 |...-...O.t.c....| +peer1.org2.example.com | [3046 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036dd70 gate 1589998872641782400 evaluation starts +peer0.org1.example.com | [2e20 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f13 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 c0 30 6b 3c cb 02 20 5a d2 df 9e 29 88 dd dc 8c |.0k<.. Z...)....| +peer1.org2.example.com | [3047 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036dd70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e21 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f14 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ab b9 b8 8e 0a 8b d0 5d 5e 63 da ad 30 91 59 61 |.......]^c..0.Ya| +peer1.org2.example.com | [3048 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036dd70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2e22 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2f15 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 42 bc 74 b5 7e 95 86 |B.t.~..| +peer1.org2.example.com | [3049 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036dd70 principal matched by identity 0 +peer0.org1.example.com | [2e23 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\300\215_8pQ\253" > alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > alive: +peer1.org1.example.com | [2f16 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fac 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2e24 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [304a 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer1.org1.example.com | [2f17 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fad 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2e25 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer1.org1.example.com | [2f18 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2fae 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e26 05-20 18:21:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 +peer1.org2.example.com | [304b 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer1.org1.example.com | [2f19 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2faf 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e27 05-20 18:21:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer1.org2.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer1.org1.example.com | [2f1a 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e28 05-20 18:21:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org2.example.com | [2fb0 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer1.org1.example.com | [2f1b 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2e29 05-20 18:21:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org2.example.com | [2fb1 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer1.org1.example.com | [2f1c 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e2a 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org2.example.com | [2fb2 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer1.org1.example.com | [2f1d 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e2b 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org2.example.com | [2fb3 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [304c 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036dd70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2f1e 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e2c 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2fb4 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [304d 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036dd70 gate 1589998872641782400 evaluation succeeds +peer1.org1.example.com | [2f1f 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e2d 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100F1801 +peer0.org2.example.com | [2fb5 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [304e 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2f20 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e2e 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2211477076BB0074A91277DA290083B91891BDE1433E0273D30A588ED0BE46BA +peer0.org2.example.com | [2fb6 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [304f 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2f21 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fb7 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3050 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2f22 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e2f 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org2.example.com | [2fb8 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3051 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2f23 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e30 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fb9 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3052 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f24 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e31 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fba 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3053 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2f25 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e32 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbb 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3054 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2f26 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e33 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbc 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3055 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2f27 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e34 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2fbd 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3056 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2f28 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2e35 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbe 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3057 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f29 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e36 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fbf 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3058 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f2a 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2e37 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [2fc0 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3059 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f2b 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e38 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fc1 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [305a 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | [2f2c 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e39 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-1.0 +peer0.org2.example.com | [2fc2 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [305b 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f2d 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2e3a 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +peer0.org2.example.com | [2fc3 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [305c 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f2e 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2e3b 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +peer0.org2.example.com | [2fc4 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [305d 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f2f 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2e3c 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +peer0.org2.example.com | [2fc5 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a4c0 gate 1589998868891284100 evaluation starts +peer1.org2.example.com | [305e 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2f30 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e0a0 gate 1589998878918421700 evaluation starts +peer0.org1.example.com | [2e3d 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +peer0.org2.example.com | [2fc6 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a4c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [305f 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > alive:\300\215_8pQ\253" > alive: +peer1.org1.example.com | [2f31 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e0a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e3e 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:1.0 's authentication is authorized +peer0.org2.example.com | [2fc7 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a4c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3060 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f32 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e0a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2e3f 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [2fc8 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3061 05-20 18:21:12.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f33 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e0a0 principal matched by identity 0 +peer0.org1.example.com | [2e40 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [2fc9 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a4c0 principal evaluation fails +peer1.org2.example.com | [3062 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f34 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 f5 cf b1 26 88 36 e3 91 86 31 95 e4 31 39 82 |....&.6...1..19.| +peer0.org1.example.com | [2e41 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:1.0 +peer0.org2.example.com | [2fca 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a4c0 gate 1589998868891284100 evaluation fails +peer1.org2.example.com | [3063 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 a2 b8 2c c3 d9 01 f1 2f 11 a6 d8 40 96 99 c0 b0 |..,..../...@....| +peer0.org1.example.com | [2e42 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED +peer0.org2.example.com | [2fcb 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3064 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f35 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 a0 b9 28 48 8a 6a 74 3a d8 16 f4 |0D. 2..(H.jt:...| +peer0.org1.example.com | [2e43 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"exp02:1.0" +peer0.org2.example.com | [2fcc 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3065 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | 00000010 cc 0a 44 32 63 7f a2 37 99 57 8a 07 e5 d0 1d a8 |..D2c..7.W......| +peer0.org1.example.com | [2e44 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"exp02:1.0" +peer0.org2.example.com | [2fcd 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3066 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3067 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 7e de 0d 5c 02 20 6e e7 21 36 ee 96 33 80 3d 73 |~..\. n.!6..3.=s| +peer0.org1.example.com | [2e45 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"exp02:1.0" +peer0.org2.example.com | [2fce 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aa30 gate 1589998868891553800 evaluation starts +peer1.org1.example.com | 00000030 2d 7b 26 10 7e a8 b8 e2 08 39 38 f6 3c dc 63 7c |-{&.~....98.<.c|| +peer1.org2.example.com | [3068 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e46 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [2fcf 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aa30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 11 c1 6f 7a 49 29 |..ozI)| +peer1.org2.example.com | [3069 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e47 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [2fd0 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aa30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2f36 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e0a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [306a 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e48 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org2.example.com | [2fd1 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aa30 principal matched by identity 0 +peer1.org1.example.com | [2f37 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e0a0 gate 1589998878918421700 evaluation succeeds +peer1.org2.example.com | [306b 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e49 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] handling PUT_STATE from chaincode +peer0.org2.example.com | [2fd2 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +peer1.org1.example.com | [2f38 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [306c 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e4a 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Completed PUT_STATE. Sending RESPONSE +peer0.org2.example.com | 00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +peer1.org1.example.com | [2f39 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [306d 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e4b 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org2.example.com | [2fd3 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +peer1.org1.example.com | [2f3a 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [306e 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e4c 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] handling PUT_STATE from chaincode +peer1.org1.example.com | [2f3b 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +peer1.org2.example.com | [306f 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [2e4d 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Completed PUT_STATE. Sending RESPONSE +peer1.org1.example.com | [2f3c 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +peer1.org2.example.com | [3070 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e4e 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [2f3d 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | 00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +peer1.org2.example.com | [3071 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e4f 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] notifying Txid:d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, channelID:businesschannel +peer1.org1.example.com | [2f3e 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000040 aa 6c 6c 08 50 44 |.ll.PD| +peer1.org2.example.com | [3072 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e50 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [2f3f 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2fd4 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aa30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3073 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e51 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d4839f2a] Exit chaincode: name:"lscc" (58441ms) +peer1.org1.example.com | [2f40 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2fd5 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337aa30 gate 1589998868891553800 evaluation succeeds +peer1.org2.example.com | [3074 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f41 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e52 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [2fd6 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3075 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2f42 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e53 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +peer0.org2.example.com | [2fd7 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3076 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer1.org1.example.com | [2f43 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e54 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] Exit +peer0.org2.example.com | [2fd8 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer1.org1.example.com | [2f44 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e55 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] Entry chaincode: name:"lscc" +peer0.org2.example.com | [2fd9 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3077 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer1.org1.example.com | [2f45 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e56 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] escc for chaincode name:"lscc" is escc +peer0.org2.example.com | [2fda 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer1.org1.example.com | [2f46 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e57 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, chaincode: lscc} +peer0.org2.example.com | [2fdb 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer1.org1.example.com | [2f47 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e58 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20DCD7CFAA3070856E7CF4B834E38B...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [2fdc 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer1.org1.example.com | [2f48 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f49 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e59 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 21B7CE887AF7528B0CA8744EF14808DAAC9928D2A148CD612FAF2EF642023F61 +peer0.org2.example.com | [2fdd 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer1.org2.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer1.org1.example.com | [2f4a 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f4b 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer0.org2.example.com | [2fde 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org2.example.com | [3078 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [2e5a 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, chaincode: lscc} +peer0.org2.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [2f4c 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e5b 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] Exit +peer0.org2.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org2.example.com | [3079 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 71 2b 72 29 ba 6f 00 43 ac c1 |0E.!..q+r).o.C..| +peer1.org1.example.com | [2f4d 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2e5c 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +peer0.org2.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org2.example.com | 00000010 90 96 f2 ea 10 ad cc d7 a3 7d 60 59 61 7a 60 e2 |.........}`Yaz`.| +peer1.org1.example.com | [2f4e 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e5d 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37094 +peer0.org2.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org2.example.com | 00000020 7e bf 62 01 9c 02 20 53 cf 4b 4c c8 f9 ab 81 51 |~.b... S.KL....Q| +peer1.org1.example.com | [2f4f 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e5e 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37094 grpc.code=OK grpc.call_duration=58.4495216s +peer0.org2.example.com | [2fdf 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 8a 50 d5 d4 db 42 06 ef b6 bf 15 0a 7a 04 ed 9b |.P...B......z...| +peer1.org1.example.com | [2f50 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e5f 05-20 18:21:10.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2fe0 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 17 64 e7 bf 78 ff 6c |.d..x.l| +peer1.org1.example.com | [2f51 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e60 05-20 18:21:10.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2fe1 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [307a 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2e61 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f52 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fe2 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [307b 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2e62 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f53 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fe3 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer1.org2.example.com | [307c 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2e63 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2f54 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer1.org2.example.com | [307d 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2e64 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f55 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fe4 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer0.org1.example.com | [2e65 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [307e 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2f56 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer0.org1.example.com | [2e66 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [307f 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f57 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer0.org1.example.com | [2e67 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3080 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f58 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer0.org1.example.com | [2e68 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3081 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f59 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer0.org1.example.com | [2e69 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3082 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [2f5a 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fe5 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e6a 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3083 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f5b 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fe6 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e6b 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3084 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f5c 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2fe7 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e6c 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3085 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2f5d 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2fe8 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e6d 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3086 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [2f5e 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 93 94 ca 94 35 80 26 c9 0c d2 f3 69 9d 13 0c |.....5.&....i...| +peer0.org2.example.com | [2fe9 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e6e 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3087 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 2b 98 13 17 d5 97 7e fa e8 c5 b1 ca aa a7 ef d8 |+.....~.........| +peer0.org2.example.com | [2fea 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e6f 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3088 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f5f 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 30 03 48 94 b0 1f cb 3a 3a a0 ec |0D. 30.H....::..| +peer0.org2.example.com | [2feb 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2e70 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3089 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 25 63 f0 2a 6a 56 e8 d6 ba 47 97 f0 c0 61 63 c5 |%c.*jV...G...ac.| +peer0.org2.example.com | [2fec 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e71 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [308a 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 0a 5d c3 5b 02 20 70 e7 4e ff d9 88 f7 2f 00 b4 |.].[. p.N..../..| +peer0.org1.example.com | [2e72 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2fed 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [308b 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | 00000030 36 37 d8 a4 07 7f 2e 4d b6 ce 56 b4 1a ab d6 ba |67.....M..V.....| +peer0.org1.example.com | [2e73 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2fee 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [308c 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 4c 62 57 ea 77 94 |LbW.w.| +peer0.org1.example.com | [2e74 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fef 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [308d 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f60 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e75 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff0 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [308e 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2f61 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2e76 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ff1 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [308f 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f62 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2e77 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ff2 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3090 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f63 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2e78 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ff3 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f330 gate 1589998868900132100 evaluation starts +peer1.org2.example.com | [3091 05-20 18:21:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f64 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2e79 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff4 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f330 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3092 05-20 18:21:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f65 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e7a 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff5 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f330 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3093 05-20 18:21:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f66 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e7b 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff6 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3094 05-20 18:21:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f67 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ff7 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f330 principal evaluation fails +peer0.org1.example.com | [2e7c 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3095 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f68 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ff8 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f330 gate 1589998868900132100 evaluation fails +peer0.org1.example.com | [2e7d 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3096 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f69 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff9 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e7e 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3097 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [2f6a 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ffa 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e7f 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3098 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f6b 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ffb 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2e80 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3099 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [2f6c 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2ffc 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8a0 gate 1589998868901836800 evaluation starts +peer0.org1.example.com | [2e81 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [309a 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f6d 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ffd 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e82 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 gate 1589998871909991000 evaluation starts +peer1.org2.example.com | [309b 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [2f6e 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ffe 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2e84 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | [2f70 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fff 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8a0 principal matched by identity 0 +peer0.org1.example.com | [2e85 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [2f6f 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3000 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +peer0.org1.example.com | [2e83 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org2.example.com | 00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +peer1.org1.example.com | [2f71 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e86 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org2.example.com | [3001 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +peer1.org1.example.com | [2f72 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e87 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 principal matched by identity 0 +peer1.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org2.example.com | 00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +peer1.org1.example.com | [2f73 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e88 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer1.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer0.org2.example.com | 00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +peer1.org1.example.com | [2f74 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer1.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer0.org2.example.com | 00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +peer1.org1.example.com | [2f76 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e89 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org2.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer0.org2.example.com | 00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +peer1.org1.example.com | [2f75 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org2.example.com | [3002 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2f77 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer0.org2.example.com | [3003 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340f8a0 gate 1589998868901836800 evaluation succeeds +peer1.org1.example.com | [2f78 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org2.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer0.org2.example.com | [3004 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2f79 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org2.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer0.org2.example.com | [3005 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2f7a 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e8a 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 principal evaluation succeeds for identity 0 +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3006 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2f7b 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e8b 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 gate 1589998871909991000 evaluation succeeds +peer1.org2.example.com | [309c 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080560 gate 1589998872981229100 evaluation starts +peer0.org2.example.com | [3007 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2f7c 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e8c 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [309d 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3008 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2f7d 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e8d 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [309e 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080560 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3009 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f7e 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e8e 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [309f 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org2.example.com | [300a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2f7f 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e8f 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [300b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +peer1.org1.example.com | [2f80 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e90 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +peer1.org2.example.com | [30a0 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [2f81 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e91 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | [300c 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +peer1.org2.example.com | [30a1 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [2f82 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | 00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +peer1.org2.example.com | [30a2 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080560 principal matched by identity 0 +peer1.org1.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer0.org1.example.com | [2e92 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +peer1.org2.example.com | [30a3 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 a3 4b 58 7d 3a 8c 7a 8a 5a 35 e1 14 b2 ed 1d |..KX}:.z.Z5.....| +peer1.org1.example.com | [2f83 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +peer1.org1.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer1.org2.example.com | 00000010 77 84 8b fb f0 74 b1 e4 89 cf f7 aa 5e 2c 5d 82 |w....t......^,].| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +peer1.org1.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer1.org2.example.com | [30a4 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 85 0e 94 fc 33 9e 4b ab b1 ae 2d |0D. .....3.K...-| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | [300d 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer1.org2.example.com | 00000010 23 bd fa 52 b0 58 eb 31 08 63 6c 33 c9 2a c4 71 |#..R.X.1.cl3.*.q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [300e 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer1.org2.example.com | 00000020 7d e9 4b 53 02 20 68 18 fe 74 c6 55 ca 39 b3 74 |}.KS. h..t.U.9.t| +peer0.org1.example.com | [2e93 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [300f 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f84 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 50 8c 72 93 21 b5 23 53 29 12 d5 b8 3a fb ec f3 |P.r.!.#S)...:...| +peer0.org1.example.com | [2e94 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3010 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2f85 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 ca 96 1f 39 90 b6 |...9..| +peer0.org2.example.com | [3011 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +peer0.org1.example.com | [2e95 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2f86 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [30a5 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +peer0.org1.example.com | [2e96 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f87 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [30a6 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080560 gate 1589998872981229100 evaluation succeeds +peer0.org2.example.com | [3012 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +peer0.org1.example.com | [2e97 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f88 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [30a7 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | 00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +peer0.org1.example.com | [2e98 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2f89 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2a60 gate 1589998879617359900 evaluation starts +peer1.org2.example.com | [30a8 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | 00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +peer0.org1.example.com | [2e99 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f8a 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2a60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30a9 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | 00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +peer0.org1.example.com | [2e9a 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2f8b 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2a60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [30aa 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | 00000040 2f 6a 21 87 9e d1 |/j!...| +peer0.org1.example.com | [2e9b 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 gate 1589998871917728600 evaluation starts +peer1.org1.example.com | [2f8c 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [30ab 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org1.example.com | [2e9c 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2f8d 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2a60 principal evaluation fails +peer1.org2.example.com | [30ac 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org2.example.com | [3013 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e9d 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2f8e 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2a60 gate 1589998879617359900 evaluation fails +peer1.org2.example.com | [30ad 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [3014 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e9e 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 principal matched by identity 0 +peer1.org1.example.com | [2f8f 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30ae 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer0.org2.example.com | [3015 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e9f 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer1.org1.example.com | [2f90 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30af 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer0.org2.example.com | [3016 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer1.org1.example.com | [2f91 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [30b0 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org2.example.com | [3017 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ea0 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer1.org1.example.com | [2f92 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2fd0 gate 1589998879617858000 evaluation starts +peer1.org2.example.com | [30b1 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer0.org2.example.com | [3018 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer1.org1.example.com | [2f93 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30b2 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer0.org2.example.com | [3019 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0035e2fd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [30b3 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [301a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad ad 2b 75 1e ad 78 e0 e3 62 e3 f2 d3 83 b7 66 |..+u..x..b.....f| +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer1.org1.example.com | [2f95 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2fd0 principal matched by identity 0 +peer1.org2.example.com | [30b4 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00323ae40 env 0xc0029054a0 txn 0 +peer0.org2.example.com | 00000010 2d 27 c3 08 fb 78 71 67 31 56 65 d7 50 c6 99 c8 |-'...xqg1Ve.P...| +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer1.org1.example.com | [2f96 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer1.org2.example.com | [30b5 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0029054a0 +peer0.org2.example.com | [301b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 0e 74 ab 02 3d e2 f5 2c ff d9 |0E.!...t..=..,..| +peer0.org1.example.com | [2ea1 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer1.org2.example.com | [30b6 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +peer0.org2.example.com | 00000010 7a c7 ea 8e bb 0f fe c6 e3 74 6f b3 55 a8 f4 22 |z........to.U.."| +peer0.org1.example.com | [2ea2 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 gate 1589998871917728600 evaluation succeeds +peer1.org2.example.com | [30b7 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [2f97 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org2.example.com | 00000020 46 c4 6a 09 05 02 20 30 66 93 fb 65 cf e7 b0 cf |F.j... 0f..e....| +peer0.org1.example.com | [2ea3 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30b8 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer0.org2.example.com | 00000030 7c 9e a1 cd f2 d6 77 2c e0 8a fd ad 73 5c e6 68 ||.....w,....s\.h| +peer0.org1.example.com | [2ea4 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30b9 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer0.org2.example.com | 00000040 04 28 2e ed 6a 3c c6 |.(..j<.| +peer0.org1.example.com | [2ea5 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [30ba 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer0.org2.example.com | [301c 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ea7 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [30bb 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer0.org2.example.com | [301d 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2ea6 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37122 +peer1.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [2f98 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2fd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [301e 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [2f99 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e2fd0 gate 1589998879617858000 evaluation succeeds +peer0.org2.example.com | [301f 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2ea8 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003358320 +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [2f9a 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3020 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2ea9 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [2f9b 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3021 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eaa 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [2f9c 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3022 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eab 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | [2f9d 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3023 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eac 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | [2f9e 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3024 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ead 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | [2f9f 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3025 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eae 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 39 bd 73 a0 b0 0c 04 c7 24 b6 79 18 41 6f c9 |M9.s.....$.y.Ao.| +peer1.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [2fa0 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3026 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 08 ad 1a 50 bb 10 17 c3 c4 33 f5 21 e6 11 bd a9 |...P.....3.!....| +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | [2fa1 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer0.org2.example.com | [3027 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eaf 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 99 3b 29 5e 46 20 ad 04 59 fb |0E.!...;)^F ..Y.| +peer1.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer0.org2.example.com | [3028 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 fe 59 ac b4 58 6f 7a ba d2 da 94 c5 f4 b4 33 6c |.Y..Xoz.......3l| +peer1.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | [2fa2 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org2.example.com | [3029 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 f6 cf 6e fe a5 02 20 0d e4 f8 ee 77 d9 bc d9 bb |..n... ....w....| +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer0.org2.example.com | [302a 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 97 3c 50 b8 4c 53 46 31 86 16 1e fd 26 54 6b e8 |. DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer0.org2.example.com | [302b 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000040 43 a4 07 bd 88 af fd |C......| +peer1.org2.example.com | [30bd 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer0.org2.example.com | [302c 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2eb0 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [30be 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer0.org2.example.com | [302d 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2eb1 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0034a3ea0, header 0xc003358780 +peer1.org2.example.com | [30bf 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [2fa3 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [302e 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2eb2 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer1.org2.example.com | [30c0 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer1.org1.example.com | [2fa4 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [302f 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eb3 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][14165957] processing txid: 141659578851823e465eac79d45415f0368da100f62c863f4a4c8d8619bf7a42 +peer1.org2.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +peer1.org1.example.com | [2fa5 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3030 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2eb4 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [141659578851823e465eac79d45415f0368da100f62c863f4a4c8d8619bf7a42] +peer1.org2.example.com | [30c1 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer1.org1.example.com | [2fa6 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3031 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eb5 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer1.org2.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer1.org1.example.com | [2fa7 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer0.org1.example.com | [2eb6 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org2.example.com | [3032 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer1.org1.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer0.org1.example.com | [2eb7 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org2.example.com | [3033 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer1.org1.example.com | [2fa8 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org1.example.com | [2eb8 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3034 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 cf eb d4 a9 50 ef |....P.| +peer1.org1.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer0.org1.example.com | [2eb9 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org2.example.com | [3035 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30c2 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer0.org1.example.com | [2eba 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 gate 1589998871933641300 evaluation starts +peer0.org2.example.com | [3036 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [30c3 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002a36000, header channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +peer1.org1.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer0.org1.example.com | [2ebb 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3037 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [30c4 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org1.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer0.org1.example.com | [2ebc 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3038 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [30c5 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org1.example.com | [2fa9 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ebd 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [3039 05-20 18:21:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30c6 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org1.example.com | [2faa 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ebe 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [303a 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [30c7 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [2fab 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ebf 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [303b 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30c8 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +peer1.org1.example.com | [2fac 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [303c 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ec0 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 principal matched by identity 0 +peer1.org2.example.com | [30c9 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org1.example.com | [2fad 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [303d 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2ec1 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 39 bd 73 a0 b0 0c 04 c7 24 b6 79 18 41 6f c9 |M9.s.....$.y.Ao.| +peer1.org2.example.com | [30ca 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002a34000 +peer1.org1.example.com | [2fae 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [303e 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 08 ad 1a 50 bb 10 17 c3 c4 33 f5 21 e6 11 bd a9 |...P.....3.!....| +peer1.org2.example.com | [30cb 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer1.org1.example.com | [2faf 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [303f 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2ec2 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 99 3b 29 5e 46 20 ad 04 59 fb |0E.!...;)^F ..Y.| +peer1.org2.example.com | [30cc 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [19a3d072-20ff-401b-9b8b-526a9d6a7da9] +peer1.org1.example.com | [2fb0 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3040 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 fe 59 ac b4 58 6f 7a ba d2 da 94 c5 f4 b4 33 6c |.Y..Xoz.......3l| +peer1.org2.example.com | [30cd 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [19a3d072-20ff-401b-9b8b-526a9d6a7da9] +peer1.org1.example.com | [2fb1 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3041 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 f6 cf 6e fe a5 02 20 0d e4 f8 ee 77 d9 bc d9 bb |..n... ....w....| +peer1.org2.example.com | [30ce 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003093940 gate 1589998873005686800 evaluation starts +peer1.org1.example.com | [2fb2 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3042 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 97 3c 50 b8 4c 53 46 31 86 16 1e fd 26 54 6b e8 |. DEBU 0xc003093940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fb3 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3043 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 43 a4 07 bd 88 af fd |C......| +peer1.org2.example.com | [30d0 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003093940 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2fb4 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes +peer0.org2.example.com | [3044 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ec3 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [30d1 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003093940 principal matched by identity 0 +peer0.org2.example.com | [3045 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034666d0 gate 1589998869009953700 evaluation starts +peer1.org1.example.com | [2fb5 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ec4 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 gate 1589998871933641300 evaluation succeeds +peer1.org2.example.com | [30d2 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 b7 ce 88 7a f7 52 8b 0c a8 74 4e f1 48 08 da |!...z.R...tN.H..| +peer0.org2.example.com | [3046 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034666d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fb6 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ec5 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | 00000010 ac 99 28 d2 a1 48 cd 61 2f af 2e f6 42 02 3f 61 |..(..H.a/...B.?a| +peer0.org2.example.com | [3047 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034666d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2fb7 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [2ec6 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [30d3 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 c2 7c 26 22 5d be 68 cd a6 f6 e5 |0D. ..|&"].h....| +peer0.org2.example.com | [3048 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034666d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2fb8 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ec7 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org2.example.com | 00000010 48 53 b9 c3 e0 ae de 08 64 67 26 f6 31 27 88 f2 |HS......dg&.1'..| +peer0.org2.example.com | [3049 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034666d0 principal evaluation fails +peer1.org1.example.com | [2fb9 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [2ec8 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer1.org2.example.com | 00000020 a9 e6 9d 32 02 20 73 44 51 76 29 d5 24 65 bf 5f |...2. sDQv).$e._| +peer0.org2.example.com | [304a 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034666d0 gate 1589998869009953700 evaluation fails +peer1.org1.example.com | [2fba 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360d5c0 gate 1589998879697523500 evaluation starts +peer0.org1.example.com | [2ec9 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | 00000030 e3 1c 3f 4b d3 cf 58 b5 0f f6 c2 d8 95 42 68 80 |..?K..X......Bh.| +peer0.org2.example.com | [304b 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fbb 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360d5c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2eca 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [141659578851823e465eac79d45415f0368da100f62c863f4a4c8d8619bf7a42] +peer1.org2.example.com | 00000040 9b 73 66 c0 4e 99 |.sf.N.| +peer0.org2.example.com | [304c 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fbc 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360d5c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2ecb 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][14165957] Entry chaincode: name:"exp02" +peer1.org2.example.com | [30d4 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003093940 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [304d 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2fbd 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360d5c0 principal matched by identity 0 +peer0.org1.example.com | [2ecc 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [30d5 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003093940 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [304e 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466c60 gate 1589998869011582900 evaluation starts +peer1.org1.example.com | [2fbe 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c d2 c0 ed c4 0d 9d 19 e2 6d ec 9d 39 f9 4c 81 |l........m..9.L.| +peer0.org1.example.com | [2ecd 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][14165957] Exit +peer1.org2.example.com | [30d6 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003093940 skipping identity 0 because it has already been used +peer1.org1.example.com | 00000010 7a 1d b7 69 ac 32 79 ae ff 19 c5 56 5c 20 d1 1b |z..i.2y....V\ ..| +peer0.org2.example.com | [304f 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466c60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ece 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [141659578851823e465eac79d45415f0368da100f62c863f4a4c8d8619bf7a42] +peer1.org2.example.com | [30d7 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003093940 principal evaluation fails +peer1.org1.example.com | [2fbf 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 72 cf 47 ba a7 3c d1 29 ce 51 67 |0D. qr.G..<.).Qg| +peer0.org2.example.com | [3050 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466c60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2ecf 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37122 +peer1.org2.example.com | [30d8 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003093940 gate 1589998873005686800 evaluation succeeds +peer1.org1.example.com | 00000010 8b 1d ec 33 b2 bb d0 94 17 0a 4f ba ca 53 66 fa |...3......O..Sf.| +peer0.org2.example.com | [3051 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466c60 principal matched by identity 0 +peer0.org1.example.com | [2ed0 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37122 grpc.code=OK grpc.call_duration=15.8106ms +peer1.org2.example.com | [30d9 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer1.org1.example.com | 00000020 d3 20 7a 6a 02 20 60 80 81 60 7c 44 fd 13 ef 6a |. zj. `..`|D...j| +peer0.org2.example.com | [3052 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +peer0.org1.example.com | [2ed1 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [30da 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | 00000030 37 ed 6f c6 ed 11 ec b5 2f 13 79 39 26 22 c0 e2 |7.o...../.y9&"..| +peer0.org2.example.com | 00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | 00000040 2d 26 72 55 6f 1b |-&rUo.| +peer0.org2.example.com | [3053 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +peer0.org1.example.com | [2ed2 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | [30dc 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer1.org1.example.com | [2fc0 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360d5c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org2.example.com | [30dd 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer1.org1.example.com | [2fc1 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360d5c0 gate 1589998879697523500 evaluation succeeds +peer0.org2.example.com | 00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org2.example.com | [30de 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1f8e44b0-8fec-437b-942a-558319bd33a2] +peer1.org1.example.com | [2fc2 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | 00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org2.example.com | [30df 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2fc3 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | 00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org2.example.com | [30e0 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1f8e44b0-8fec-437b-942a-558319bd33a2] +peer1.org1.example.com | [2fc4 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3054 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466c60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ed3 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30e1 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer1.org1.example.com | [2fc5 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3055 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466c60 gate 1589998869011582900 evaluation succeeds +peer0.org1.example.com | [2ed4 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer1.org2.example.com | [30e2 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [480c01a8-fbc4-46a1-903e-c579d4925aa7] +peer1.org1.example.com | [2fc6 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [3056 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ed5 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [30e3 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [2fc7 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org2.example.com | [3057 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ed6 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [30e4 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [480c01a8-fbc4-46a1-903e-c579d4925aa7] +peer1.org1.example.com | [2fc8 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [3058 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ed7 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer1.org2.example.com | [30e5 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 gate 1589998873015055300 evaluation starts +peer1.org1.example.com | [2fc9 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org2.example.com | [3059 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer1.org2.example.com | [30e6 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fca 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [305a 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ed8 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer1.org2.example.com | [30e7 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2fcc 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org2.example.com | [305b 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer1.org1.example.com | [2fcd 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer1.org2.example.com | [30e8 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | [305c 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer1.org1.example.com | [2fcb 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30e9 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org2.example.com | [305d 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer1.org1.example.com | [2fce 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org2.example.com | [30eb 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [305e 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer1.org1.example.com | [2fcf 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer1.org2.example.com | [30ea 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +peer0.org2.example.com | [305f 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ed9 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer1.org1.example.com | [2fd0 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer1.org2.example.com | [30ec 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [3060 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer1.org1.example.com | [2fd1 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [30ed 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer0.org2.example.com | [3061 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eda 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer1.org1.example.com | [2fd2 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003ae9780 env 0xc0038b7090 txn 0 +peer1.org2.example.com | [30ee 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [3062 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer1.org1.example.com | [2fd3 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0038b7090 +peer1.org2.example.com | [30ef 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org2.example.com | [3063 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer1.org1.example.com | [2fd4 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +peer1.org2.example.com | [30f0 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3064 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [2fd5 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [2fd6 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fd7 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer1.org1.example.com | [2fd8 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [30f1 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3065 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3066 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2edb 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fd9 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30f2 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3067 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2edc 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fda 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [30f4 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3068 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2edd 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | [30f5 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3069 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ede 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [30f3 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306a 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2edf 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | [30f6 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [306b 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ee0 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | [30f7 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306c 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ee1 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | [30f8 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306d 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2ee2 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | [30f9 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306e 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ee3 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 gate 1589998871954754500 evaluation starts +peer1.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | [30fa 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2ee4 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [306f 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | [30fb 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ee5 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3070 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | [30fc 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ee6 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 principal matched by identity 0 +peer0.org2.example.com | [3071 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | [30fd 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ee7 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | [3072 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | [30fe 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [3073 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | [30ff 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 principal matched by identity 0 +peer0.org1.example.com | [2ee8 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | [3074 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3100 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | [3075 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034debc0 gate 1589998869026253800 evaluation starts +peer1.org1.example.com | [2fdb 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0034debc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fdc 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3101 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer0.org1.example.com | 00000030 95 7d 27 1b d7 55 84 a1 2c a1 98 41 4b 5a 22 2d |.}'..U..,..AKZ"-| +peer0.org2.example.com | [3077 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034debc0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2fdd 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer0.org1.example.com | 00000040 62 48 1e 8a 04 42 |bH...B| +peer0.org2.example.com | [3078 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034debc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2fde 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer0.org1.example.com | [2ee9 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3079 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034debc0 principal evaluation fails +peer1.org1.example.com | [2fdf 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer0.org1.example.com | [2eea 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 gate 1589998871954754500 evaluation succeeds +peer0.org2.example.com | [307a 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034debc0 gate 1589998869026253800 evaluation fails +peer1.org1.example.com | [2fe0 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 cf eb d4 a9 50 ef |....P.| +peer0.org1.example.com | [2eeb 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [307b 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fe2 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3102 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2eec 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [307c 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fe1 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [3103 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2eed 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [307d 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2fe3 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [3104 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 skipping identity 0 because it has already been used +peer0.org1.example.com | [2eee 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [307e 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df130 gate 1589998869026706000 evaluation starts +peer1.org1.example.com | [2fe4 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 39 ad 16 51 9c 3a 63 61 b3 8b e7 78 81 98 26 |.9..Q.:ca...x..&| +peer1.org2.example.com | [3105 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 principal evaluation fails +peer0.org1.example.com | [2eef 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [307f 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 fa 45 70 07 9c c9 7e c2 9a 96 46 22 d6 5c 7d 38 |.Ep...~...F".\}8| +peer1.org2.example.com | [3106 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031608a0 gate 1589998873015055300 evaluation succeeds +peer0.org1.example.com | [2ef0 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3080 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df130 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [2fe5 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 04 e6 28 19 1c 5d a6 e5 ec 93 0a |0D. J..(..].....| +peer1.org2.example.com | [3107 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2ef1 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3081 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df130 principal matched by identity 0 +peer1.org1.example.com | 00000010 c1 a3 fe a2 2d b1 5e 21 14 5f 55 25 ee 8b 39 22 |....-.^!._U%..9"| +peer1.org2.example.com | [3109 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org1.example.com | [2ef2 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3082 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 c6 90 00 a5 4e 5e 59 f0 f3 bd 2b ad ea 9a a8 |E....N^Y...+....| +peer1.org1.example.com | 00000020 ee 75 f0 7e 02 20 77 94 f8 8e ec a2 44 4a 6b 45 |.u.~. w.....DJkE| +peer1.org2.example.com | [310a 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb appears to be valid +peer0.org1.example.com | [2ef3 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 1e d3 87 b1 03 17 29 bb b9 47 05 3e ec f3 d8 a3 |......)..G.>....| +peer1.org1.example.com | 00000030 a4 95 29 d7 fa ec 6f 2a f1 ac 43 a8 e4 d6 92 5b |..)...o*..C....[| +peer1.org2.example.com | [310b 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002a34000 +peer0.org1.example.com | [2ef4 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3083 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 cf 26 a9 2f 1d ec e8 6e 1a 71 |0E.!...&./...n.q| +peer1.org1.example.com | 00000040 b2 87 c3 52 76 5a |...RvZ| +peer1.org2.example.com | [3108 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ef5 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 56 01 37 76 3c f0 12 9e b7 1c d4 c6 59 38 f1 30 |V.7v<.......Y8.0| +peer1.org1.example.com | [2fe6 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [310c 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ef6 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000020 7c 8e 86 b6 ec 02 20 1f 41 a0 37 72 9c e0 0e 9d ||..... .A.7r....| +peer1.org1.example.com | [2fe7 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0002f3000, header channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +peer1.org2.example.com | [310d 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ef7 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 gate 1589998871957158300 evaluation starts +peer0.org2.example.com | 00000030 ac 1c 6c f9 e3 5c d1 19 4b ca 45 bc 11 a6 2b 3b |..l..\..K.E...+;| +peer1.org1.example.com | [2fe8 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [310e 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ef8 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 2d c7 33 17 09 38 36 |-.3..86| +peer1.org1.example.com | [2fe9 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [310f 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ef9 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3084 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df130 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2fea 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org2.example.com | [3110 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2efa 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 principal matched by identity 0 +peer0.org2.example.com | [3085 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df130 gate 1589998869026706000 evaluation succeeds +peer1.org1.example.com | [2feb 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [3111 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b21c0 gate 1589998873051784100 evaluation starts +peer0.org1.example.com | [2efb 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | [3086 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2fec 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +peer1.org2.example.com | [3112 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 59ms +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [3087 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2fed 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org2.example.com | [3113 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b21c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2efc 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | [3088 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2fee 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc000437c00 +peer1.org2.example.com | [3114 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b21c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3089 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer1.org1.example.com | [2fef 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4c8d8d20-e7f2-445e-877f-b2366ba7fee1] +peer1.org2.example.com | [3115 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b21c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [308a 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer1.org1.example.com | [2ff0 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [3116 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b21c0 principal evaluation fails +peer0.org2.example.com | [308b 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer1.org1.example.com | [2ff1 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4c8d8d20-e7f2-445e-877f-b2366ba7fee1] +peer1.org2.example.com | [3117 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b21c0 gate 1589998873051784100 evaluation fails +peer0.org2.example.com | [308c 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer1.org1.example.com | [2ff2 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer1.org2.example.com | [3118 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2efd 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [308d 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2ff3 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3fa16f8e-a989-4506-976b-10a7b467f08d] +peer1.org2.example.com | [3119 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2efe 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 gate 1589998871957158300 evaluation succeeds +peer0.org2.example.com | [308e 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2ff4 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3fa16f8e-a989-4506-976b-10a7b467f08d] +peer1.org2.example.com | [311a 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2eff 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [308f 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ff5 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 gate 1589998879715533700 evaluation starts +peer1.org1.example.com | [2ff6 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ff7 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2f00 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ff8 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 principal matched by identity 0 +peer0.org2.example.com | [3090 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [311b 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2730 gate 1589998873052070800 evaluation starts +peer1.org1.example.com | [2ff9 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 84 ba 80 89 7d 6f bb 1b 4c ac e4 dd 01 e3 3c |.....}o..L.....<| +peer0.org2.example.com | [3091 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [311c 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f01 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 de 3d f0 67 ad c1 13 6c ab 14 c8 18 d0 a7 29 97 |.=.g...l......).| +peer0.org2.example.com | [3092 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [311d 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [2f02 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2f03 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f04 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f05 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f06 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f07 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f08 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2f09 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2f0a 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2f0b 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2f0c 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2f0d 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2f0e 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 gate 1589998871958787700 evaluation starts +peer0.org1.example.com | [2f0f 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f10 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2f11 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 principal matched by identity 0 +peer0.org1.example.com | [2f12 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [2f13 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003060730 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2f15 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 gate 1589998871958787700 evaluation succeeds +peer0.org1.example.com | [2f16 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2f17 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2f18 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2f19 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2f1a 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [2f1b 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer1.org1.example.com | [2ffa 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ca ab ee 53 59 e9 ea bd 6b ce eb |0D. +...SY...k..| +peer1.org1.example.com | 00000010 73 f7 b4 85 d4 e7 7a 7a 2d af 6d 89 29 d0 72 64 |s.....zz-.m.).rd| +peer1.org1.example.com | 00000020 4e 19 45 16 02 20 30 07 e9 a8 42 37 31 ec 39 c0 |N.E.. 0...B71.9.| +peer1.org1.example.com | 00000030 52 64 a4 91 aa d1 22 59 f7 d5 d3 21 13 00 c7 8b |Rd...."Y...!....| +peer1.org1.example.com | 00000040 ca d7 50 8a 5e 9f |..P.^.| +peer1.org1.example.com | [2ffb 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3093 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3094 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3095 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3096 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3097 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3098 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3099 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [309a 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [309b 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [309c 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [309d 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [309e 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [309f 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [30a0 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30a1 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30a2 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30a3 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30a4 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30a5 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30a6 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30a7 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30a8 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [30a9 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [30aa 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [30ab 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30ac 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [30ad 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [311e 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2730 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [311f 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2730 principal matched by identity 0 +peer1.org2.example.com | [3120 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [3121 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +peer1.org2.example.com | 00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +peer1.org2.example.com | [3122 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +peer1.org2.example.com | 00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +peer1.org2.example.com | 00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +peer1.org2.example.com | 00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +peer1.org2.example.com | 00000040 7b 06 5e 80 dd eb 85 |{.^....| +peer1.org2.example.com | [3123 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org2.example.com | [3124 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2730 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3125 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [3126 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2730 gate 1589998873052070800 evaluation succeeds +peer1.org2.example.com | [3127 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [3128 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [312a 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [312b 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [312c 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [312d 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [312e 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [312f 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3130 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3131 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3132 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3133 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3134 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3135 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3137 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3129 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [3136 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00323ae40 env 0xc0029054a0 txn 0 +peer1.org2.example.com | [3138 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [313a 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [313b 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [313c 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > alive: +peer1.org2.example.com | [313d 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [313e 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3139 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer1.org2.example.com | [313f 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [3140 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [3141 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [3142 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer1.org2.example.com | [3143 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] marked as valid by state validator +peer1.org2.example.com | [3144 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003170100), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003170140), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc003170180)} +peer1.org2.example.com | [3145 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [3146 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [3147 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [3148 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc00261f630)}} +peer1.org2.example.com | [3149 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer1.org2.example.com | [314a 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [314b 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org2.example.com | [314c 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org2.example.com | [314d 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org2.example.com | [314e 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org2.example.com | [314f 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org2.example.com | [3150 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [30ae 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [30af 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [30b0 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer0.org2.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer0.org2.example.com | [30b1 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer0.org2.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer0.org2.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer0.org2.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer0.org2.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer0.org2.example.com | [30b2 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [30b3 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a7 49 19 8e c0 e5 f3 db 4d 11 |0E.!...I......M.| +peer0.org2.example.com | 00000010 13 54 ef 57 02 86 51 00 c8 23 6f 7c 8a 96 23 b4 |.T.W..Q..#o|..#.| +peer0.org2.example.com | 00000020 b4 30 12 d7 73 02 20 33 02 8e 26 11 18 f9 86 66 |.0..s. 3..&....f| +peer0.org2.example.com | 00000030 6a 7c 6e 0f a7 5a 61 10 85 ff 46 5a 53 fc b8 d4 |j|n..Za...FZS...| +peer0.org2.example.com | 00000040 d6 30 c1 24 95 0c 44 |.0.$..D| +peer0.org2.example.com | [30b4 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [30b5 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [30b6 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [30b7 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [30b8 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [30b9 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30ba 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30bb 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30bc 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [30bd 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30be 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30bf 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [30c0 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" secret_envelope: > alive: +peer0.org2.example.com | [30c1 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [30c2 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30c3 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [30c4 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 b9 06 b2 cd 97 b8 77 d8 a1 9f 43 6d 30 3e ab |S......w...Cm0>.| +peer0.org2.example.com | 00000010 8a d2 16 f1 48 ac 9f 33 c2 fe 28 6e e1 2e 45 56 |....H..3..(n..EV| +peer0.org2.example.com | [30c5 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 36 a7 01 7f b6 2a 08 0a 3a 7d |0E.!..6....*..:}| +peer0.org2.example.com | 00000010 a2 64 a1 07 e7 f3 97 56 33 80 98 d4 25 98 23 03 |.d.....V3...%.#.| +peer0.org2.example.com | 00000020 57 c2 9a 8d e4 02 20 3e 8b 0f a2 73 83 81 41 64 |W..... >...s..Ad| +peer0.org2.example.com | 00000030 b0 42 d8 aa f9 3f 0c 9a 1d 31 47 f2 f3 fc 79 6a |.B...?...1G...yj| +peer0.org2.example.com | 00000040 e0 64 2f 0d 18 52 29 |.d/..R)| +peer0.org2.example.com | [30c6 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30c7 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30c8 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30c9 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer1.org1.example.com | [2ffc 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [2ffd 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 skipping identity 0 because it has already been used +peer1.org1.example.com | [2ffe 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 principal evaluation fails +peer1.org1.example.com | [2fff 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342be60 gate 1589998879715533700 evaluation succeeds +peer1.org1.example.com | [3000 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [20fde746-d161-4e59-87af-24fc8f0cc86b] +peer1.org1.example.com | [3001 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [20fde746-d161-4e59-87af-24fc8f0cc86b] +peer1.org1.example.com | [3002 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer1.org1.example.com | [3003 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 appears to be valid +peer1.org1.example.com | [3004 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc000437c00 +peer1.org1.example.com | [3005 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003ae9780 env 0xc0038b7090 txn 0 +peer1.org1.example.com | [3006 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [3007 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 10ms +peer1.org1.example.com | [3008 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [3009 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [300a 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer1.org1.example.com | [300b 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [300c 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [300d 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [300e 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer1.org1.example.com | [300f 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [3010 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org1.example.com | [3011 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org1.example.com | [3012 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer1.org1.example.com | [3013 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer1.org1.example.com | [3014 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer1.org1.example.com | [3015 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [3016 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org1.example.com | [3017 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] marked as valid by state validator +peer1.org1.example.com | [3018 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0038da800), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0038da840)} +peer1.org1.example.com | [3019 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [301a 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [301b 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [301c 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer1.org1.example.com | [301d 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer1.org1.example.com | [301e 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer1.org1.example.com | [301f 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer1.org1.example.com | [3020 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x60, 0xc5, 0x4f, 0x44, 0x0, 0x2d, 0xfc, 0xe6, 0x2a, 0x7, 0x13, 0xb5, 0xf5, 0xfc, 0xb9, 0xf0, 0xb, 0x61, 0x18, 0xa, 0xe3, 0x93, 0x45, 0xfc, 0x9f, 0x46, 0x5c, 0xc4, 0x56, 0x14, 0x37, 0xcd} txOffsets= +peer1.org1.example.com | txId=f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 locPointer=offset=70, bytesLength=2980 +peer1.org1.example.com | ] +peer1.org1.example.com | [3021 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93577, bytesLength=2980] for tx ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to txid-index +peer1.org1.example.com | [3022 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93577, bytesLength=2980] for tx number:[0] ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to blockNumTranNum index +peer1.org1.example.com | [3023 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97549], isChainEmpty=[false], lastBlockNumber=[5] +peer1.org1.example.com | [3024 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer1.org1.example.com | [3025 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer1.org1.example.com | [3026 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer1.org1.example.com | [3027 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [3028 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [3029 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [302a 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [302b 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [302c 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [302d 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [302e 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [2f1c 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [2f1d 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [2f1e 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f1f 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f20 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2f21 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2f22 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2f23 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2f24 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2f25 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2f26 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 gate 1589998871970928700 evaluation starts +peer0.org1.example.com | [2f27 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f28 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2f29 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 principal matched by identity 0 +peer0.org1.example.com | [2f2a 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [2f2b 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [2f2c 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2f2d 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 gate 1589998871970928700 evaluation succeeds +peer0.org1.example.com | [2f2e 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2f2f 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2f30 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2f31 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2f32 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f33 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f34 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f35 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f36 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f37 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f38 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f39 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f3a 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f3b 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f3c 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f3d 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f3e 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f3f 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f40 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f41 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f42 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f43 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f44 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f45 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2f46 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f47 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f48 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f49 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f4a 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2f4b 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f4c 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f4d 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f4e 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f4f 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f50 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2f51 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer0.org1.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer0.org1.example.com | [2f52 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer0.org1.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer0.org1.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer0.org1.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer0.org1.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer0.org1.example.com | [2f53 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2f54 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 7a bc 5a 65 7a 98 1f 6d 7b bd |0E.!..z.Zez..m{.| +peer0.org1.example.com | 00000010 8d 4d 6c db f1 02 71 ec 95 b1 b2 ff 4e 19 3c 6f |.Ml...q.....N. DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer1.org1.example.com | [3031 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer1.org1.example.com | [302f 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [3032 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer1.org1.example.com | [3033 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer1.org1.example.com | [3034 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer1.org1.example.com | [3035 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 25ms (state_validation=3ms block_and_pvtdata_commit=11ms state_commit=7ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer1.org1.example.com | [3036 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3037 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D09590EEBFEFB38816...08061A0C0A0565787030321203312E30 +peer1.org1.example.com | [3038 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B587BD74DC1CE2E527347464D82DB7097899880E937103C37066A94CB2E3C9AF +peer1.org1.example.com | [3039 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer1.org1.example.com | [303a 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [303b 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [303c 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 2 1 3] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [303d 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [303e 05-20 18:21:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [303f 05-20 18:21:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3040 05-20 18:21:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [3041 05-20 18:21:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3042 05-20 18:21:19.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3043 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3044 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3046 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [3048 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [3049 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3047 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3045 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [304a 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [304b 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [304c 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [304d 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer1.org1.example.com | [304f 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3050 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3051 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3052 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3053 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3054 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3151 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org2MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 21 116 194 194 71 50 157 36 103 25 148 143 78 21 75 89 144 59 130 38 204 182 117 133 29 221 103 28 112 13 9 18 2 32 45 179 102 198 188 62 43 198 187 107 35 24 53 144 156 204 185 123 247 136 56 185 193 28 95 156 19 19 116 168 12 95]} 0x1519b80}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0027bed50 0xc0027ca300 {{0 0} 0 0 0 0} {false}})]} +peer1.org2.example.com | [3152 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [3153 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0000b7420})} +peer1.org2.example.com | [3154 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org2.example.com | [3155 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org2.example.com | [3156 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org2.example.com | [3157 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org2.example.com | [3158 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3159 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [315b 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [315a 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xe4, 0xd0, 0x6e, 0x11, 0x83, 0x40, 0x38, 0x1c, 0x2a, 0x25, 0xb9, 0x5b, 0xef, 0x40, 0xdf, 0xab, 0x76, 0x31, 0x92, 0x2e, 0xb6, 0x6d, 0xd2, 0x76, 0xed, 0x67, 0x48, 0xc4, 0x26, 0xd8, 0xcb, 0xd9} txOffsets= +peer1.org2.example.com | txId=d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb locPointer=offset=70, bytesLength=3519 +peer1.org2.example.com | ] +peer1.org2.example.com | [315c 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84951, bytesLength=3519] for tx ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to txid-index +peer1.org2.example.com | [315d 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84951, bytesLength=3519] for tx number:[0] ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to blockNumTranNum index +peer1.org2.example.com | [315e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [315f 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3160 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89462], isChainEmpty=[false], lastBlockNumber=[3] +peer1.org2.example.com | [3161 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer1.org2.example.com | [3162 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3163 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3164 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3165 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer1.org2.example.com | [3166 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer1.org2.example.com | [3167 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [3168 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [3169 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [316a 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [316b 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [316c 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | [316d 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org1.example.com | [2f55 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2f56 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2f57 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2f58 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2f59 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2f5a 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f5b 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f5c 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f5d 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [2f5e 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f5f 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f60 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f61 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > alive: +peer0.org1.example.com | [2f62 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f63 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f64 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f65 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f66 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f67 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f68 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f69 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f6a 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f6b 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f6c 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f6d 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [2f6e 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f6f 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f70 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2f71 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f72 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2f73 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f74 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2f75 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f76 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f77 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f78 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f79 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f7a 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f7b 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f7c 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f7d 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f7e 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f7f 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2f80 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f81 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2f82 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36m[2f83 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2f84 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2f86 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2f85 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f88 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f89 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f8a 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f87 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2f8b 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 gate 1589998872897882500 evaluation starts +peer0.org1.example.com | [2f8c 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f8d 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2f8e 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 principal matched by identity 0 +peer0.org1.example.com | [2f8f 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer0.org1.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer0.org1.example.com | [2f91 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer0.org1.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer0.org1.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer0.org1.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer0.org1.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer0.org1.example.com | [2f90 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f92 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2f93 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 gate 1589998872897882500 evaluation succeeds +peer0.org1.example.com | [2f94 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f95 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2f96 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2f97 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f98 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2f99 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f9a 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2f9b 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2f9c 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2f9d 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2f9e 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2f9f 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2fa0 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fa1 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fa2 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fa3 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2fa4 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fa5 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fa6 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fa7 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2fa8 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fa9 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2faa 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [304e 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3055 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3056 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3057 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3058 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3059 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [305a 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [305b 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [305c 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f0ea0 gate 1589998879864821500 evaluation starts +peer1.org1.example.com | [305d 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f0ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [305e 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f0ea0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [305f 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f0ea0 principal matched by identity 0 +peer1.org1.example.com | [3060 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 4c f1 c1 42 24 69 95 71 cc 4a 01 9b 7e 0c f0 |.L..B$i.q.J..~..| +peer1.org1.example.com | 00000010 bb 7f 97 a4 96 85 a9 49 46 56 3e 2c 9d 59 f8 82 |.......IFV>,.Y..| +peer1.org1.example.com | [3061 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 48 94 0e fe 7a 74 16 34 10 ae 39 |0D. yH...zt.4..9| +peer1.org1.example.com | 00000010 4f 61 57 e8 06 00 f2 ab f1 c9 76 25 39 b3 e3 d5 |OaW.......v%9...| +peer1.org1.example.com | 00000020 da e2 e7 87 02 20 64 3e 55 6b c3 df 3e fa 14 b8 |..... d>Uk..>...| +peer1.org1.example.com | 00000030 9d cf fe 12 13 cd 41 76 11 f3 60 e5 e0 a2 0d fa |......Av..`.....| +peer1.org1.example.com | 00000040 ed 4c 76 0d 84 13 |.Lv...| +peer1.org1.example.com | [3062 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f0ea0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3063 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f0ea0 gate 1589998879864821500 evaluation succeeds +peer1.org1.example.com | [3064 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3065 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3066 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3067 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3068 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3069 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [306a 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [306b 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [306c 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [306d 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [306e 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2420 gate 1589998879889870800 evaluation starts +peer1.org1.example.com | [306f 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2420 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3070 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org1.example.com | [3071 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2420 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3072 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2420 principal matched by identity 0 +peer1.org1.example.com | [3073 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 4c f1 c1 42 24 69 95 71 cc 4a 01 9b 7e 0c f0 |.L..B$i.q.J..~..| +peer1.org1.example.com | 00000010 bb 7f 97 a4 96 85 a9 49 46 56 3e 2c 9d 59 f8 82 |.......IFV>,.Y..| +peer1.org1.example.com | [3074 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 48 94 0e fe 7a 74 16 34 10 ae 39 |0D. yH...zt.4..9| +peer1.org1.example.com | 00000010 4f 61 57 e8 06 00 f2 ab f1 c9 76 25 39 b3 e3 d5 |OaW.......v%9...| +peer1.org1.example.com | 00000020 da e2 e7 87 02 20 64 3e 55 6b c3 df 3e fa 14 b8 |..... d>Uk..>...| +peer1.org1.example.com | 00000030 9d cf fe 12 13 cd 41 76 11 f3 60 e5 e0 a2 0d fa |......Av..`.....| +peer1.org1.example.com | 00000040 ed 4c 76 0d 84 13 |.Lv...| +peer1.org1.example.com | [3075 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2420 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3076 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b2420 gate 1589998879889870800 evaluation succeeds +peer1.org1.example.com | [3077 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3078 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3079 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [307a 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [307b 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [307c 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [307d 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [307e 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [307f 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3080 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3081 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3082 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3083 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b3680 gate 1589998879913078400 evaluation starts +peer1.org1.example.com | [3084 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b3680 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3085 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b3680 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3086 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b3680 principal matched by identity 0 +peer1.org1.example.com | [3087 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 7e 93 13 3b 68 8f ee a9 e2 fa 97 d7 a5 35 4c |*~..;h........5L| +peer1.org1.example.com | 00000010 11 52 36 b1 fa a2 f3 91 0d 2b 3f 53 2a 48 b9 e1 |.R6......+?S*H..| +peer1.org1.example.com | [3088 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 05 8f 71 8f b5 00 47 e8 1e f1 61 |0D. 1..q...G...a| +peer1.org1.example.com | 00000010 8a 24 1b 7b 09 92 c9 bb 27 a3 9e 28 35 21 5c e7 |.$.{....'..(5!\.| +peer1.org1.example.com | 00000020 f6 3f d4 98 02 20 7c 43 69 98 f0 12 7d 18 52 bf |.?... |Ci...}.R.| +peer1.org1.example.com | 00000030 ce d0 d3 0f b6 13 c9 e3 68 3f 3d 4c 95 dd 41 f2 |........h?=L..A.| +peer1.org1.example.com | 00000040 33 03 3d 40 2c 6f |3.=@,o| +peer1.org1.example.com | [3089 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b3680 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [308a 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032b3680 gate 1589998879913078400 evaluation succeeds +peer1.org1.example.com | [308b 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [308c 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [308d 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [308e 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [308f 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3090 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3091 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3092 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3093 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3094 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3095 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032541c0 gate 1589998879913839500 evaluation starts +peer1.org1.example.com | [3096 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032541c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3097 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032541c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3098 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032541c0 principal matched by identity 0 +peer1.org1.example.com | [3099 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 7e 93 13 3b 68 8f ee a9 e2 fa 97 d7 a5 35 4c |*~..;h........5L| +peer1.org1.example.com | 00000010 11 52 36 b1 fa a2 f3 91 0d 2b 3f 53 2a 48 b9 e1 |.R6......+?S*H..| +peer1.org1.example.com | [309a 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 05 8f 71 8f b5 00 47 e8 1e f1 61 |0D. 1..q...G...a| +peer1.org1.example.com | 00000010 8a 24 1b 7b 09 92 c9 bb 27 a3 9e 28 35 21 5c e7 |.$.{....'..(5!\.| +peer1.org1.example.com | 00000020 f6 3f d4 98 02 20 7c 43 69 98 f0 12 7d 18 52 bf |.?... |Ci...}.R.| +peer1.org1.example.com | 00000030 ce d0 d3 0f b6 13 c9 e3 68 3f 3d 4c 95 dd 41 f2 |........h?=L..A.| +peer1.org1.example.com | 00000040 33 03 3d 40 2c 6f |3.=@,o| +peer1.org1.example.com | [309b 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032541c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [309c 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032541c0 gate 1589998879913839500 evaluation succeeds +peer1.org1.example.com | [309d 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [309e 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [309f 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30a0 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30a1 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [30a2 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [30a3 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30a4 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30a5 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [30a6 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30a7 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30a8 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003255360 gate 1589998879926851900 evaluation starts +peer1.org1.example.com | [30a9 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003255360 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30aa 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003255360 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [30ab 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003255360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [30ac 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003255360 principal evaluation fails +peer1.org1.example.com | [30ad 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003255360 gate 1589998879926851900 evaluation fails +peer1.org2.example.com | [316e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [316f 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer1.org2.example.com | [3170 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer1.org2.example.com | [3171 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org2.example.com | [3172 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [3173 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer1.org2.example.com | [3174 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer1.org2.example.com | [3175 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7d14f720-0ed4-4cc7-a3fe-53f04bfb78a8] +peer1.org2.example.com | [3176 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer1.org2.example.com | [3177 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [3178 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer1.org2.example.com | [3179 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7d14f720-0ed4-4cc7-a3fe-53f04bfb78a8] +peer1.org2.example.com | [317a 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org2.example.com | [317b 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [317c 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F8B6E8FEC1EFB38816...08031A0C0A0565787030321203312E30 +peer1.org2.example.com | [317d 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B4D4A22432CFB46D515222DB39291FF874496C39BC413B7022B60245B0218E24 +peer1.org2.example.com | [317e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org2.example.com | [317f 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3180 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3181 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3182 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3183 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3184 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3185 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3186 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3187 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3188 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3189 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [318a 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer1.org2.example.com | [318b 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 61ms (state_validation=32ms block_and_pvtdata_commit=18ms state_commit=2ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer1.org2.example.com | [318c 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [318d 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F8B6E8FEC1EFB38816...08041A0C0A0565787030321203312E30 +peer1.org2.example.com | [318e 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F6220924C3900AE4AE244FCF973C82F96D0E38BF5295544E1A784F70FDD89AAF +peer1.org2.example.com | [318f 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer1.org2.example.com | [3190 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [30ca 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [30cb 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [30cc 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [30cd 05-20 18:21:11.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [30ce 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [30cf 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d0 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d1 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d2 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30d3 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [30d4 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d5 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d6 05-20 18:21:11.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d7 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30d8 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d9 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30da 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [30db 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [30dc 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30dd 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [30df 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30de 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [30e0 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30e1 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [30e2 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [30e3 05-20 18:21:12.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [30e4 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30e5 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30e6 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [30e7 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30e8 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fab 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fac 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fad 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fae 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > alive: alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > alive: +peer0.org1.example.com | [2faf 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fb0 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fb1 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [2fb2 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2fb3 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [2fb4 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fb5 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer0.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer0.org1.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer0.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer0.org1.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer0.org1.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [2fb6 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 gate 1589998872980456200 evaluation starts +peer0.org1.example.com | [2fb7 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2fb8 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2fb9 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [2fba 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [2fbb 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [2fbc 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 principal matched by identity 0 +peer0.org1.example.com | [2fbd 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 a3 4b 58 7d 3a 8c 7a 8a 5a 35 e1 14 b2 ed 1d |..KX}:.z.Z5.....| +peer0.org1.example.com | 00000010 77 84 8b fb f0 74 b1 e4 89 cf f7 aa 5e 2c 5d 82 |w....t......^,].| +peer0.org1.example.com | [2fbe 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 85 0e 94 fc 33 9e 4b ab b1 ae 2d |0D. .....3.K...-| +peer0.org1.example.com | 00000010 23 bd fa 52 b0 58 eb 31 08 63 6c 33 c9 2a c4 71 |#..R.X.1.cl3.*.q| +peer0.org1.example.com | 00000020 7d e9 4b 53 02 20 68 18 fe 74 c6 55 ca 39 b3 74 |}.KS. h..t.U.9.t| +peer0.org1.example.com | 00000030 50 8c 72 93 21 b5 23 53 29 12 d5 b8 3a fb ec f3 |P.r.!.#S)...:...| +peer0.org1.example.com | 00000040 ca 96 1f 39 90 b6 |...9..| +peer0.org1.example.com | [2fbf 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2fc0 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 gate 1589998872980456200 evaluation succeeds +peer0.org1.example.com | [2fc1 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2fc2 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2fc3 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2fc4 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2fc5 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org1.example.com | [2fc6 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org1.example.com | [2fc7 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer0.org2.example.com | [30e9 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [30ea 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [30eb 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [30ec 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df5c00 gate 1589998872122736000 evaluation starts +peer0.org2.example.com | [30ed 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df5c00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30ee 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df5c00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [30ef 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df5c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [30f0 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df5c00 principal evaluation fails +peer0.org2.example.com | [30f1 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df5c00 gate 1589998872122736000 evaluation fails +peer0.org2.example.com | [30f2 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [30f3 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [30f4 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [30f5 05-20 18:21:12.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a170 gate 1589998872129510400 evaluation starts +peer0.org2.example.com | [30f6 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30f7 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a170 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [30f8 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a170 principal matched by identity 0 +peer0.org2.example.com | [30f9 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [30fa 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [30fb 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a170 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [30fc 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a170 gate 1589998872129510400 evaluation succeeds +peer0.org2.example.com | [30fd 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [30fe 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [30ff 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3100 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3101 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [3102 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Obtaining identity +peer0.org2.example.com | [3104 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3105 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3106 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3107 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3108 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3109 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [310a 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [310b 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306b7d0 gate 1589998872145601500 evaluation starts +peer0.org2.example.com | [310c 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306b7d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [310d 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306b7d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [310e 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306b7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [310f 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306b7d0 principal evaluation fails +peer0.org2.example.com | [3110 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306b7d0 gate 1589998872145601500 evaluation fails +peer0.org2.example.com | [3111 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3112 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3113 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3114 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306bd40 gate 1589998872149034100 evaluation starts +peer0.org2.example.com | [3115 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306bd40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3116 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306bd40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3117 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306bd40 principal matched by identity 0 +peer0.org2.example.com | [3118 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [3119 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [311a 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306bd40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [311b 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00306bd40 gate 1589998872149034100 evaluation succeeds +peer0.org2.example.com | [311c 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [311d 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [311e 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [311f 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3120 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3121 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [3122 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3123 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3124 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3125 05-20 18:21:12.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3126 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3127 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3128 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3129 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [312a 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [312b 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095190 gate 1589998872150149000 evaluation starts +peer0.org2.example.com | [312c 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [312d 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095190 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3191 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3192 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3193 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3194 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161032 +peer1.org2.example.com | [3195 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 180066C9FB7F385F3314123725CF8414C4D1D8F0E5A61EE9AF666230204441C2 +peer1.org2.example.com | [3196 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3197 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3198 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3199 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\242\307f\245+A\3739^\311\3710\336" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [319a 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [319b 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [319c 05-20 18:21:13.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [319e 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [319f 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [31a0 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a1 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [319d 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\242\307f\245+A\3739^\311\3710\336" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [31a2 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a3 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a4 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [31a5 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a6 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [31a7 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [31a8 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30ae 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30af 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30b0 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [30b1 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032558d0 gate 1589998879929512400 evaluation starts +peer1.org1.example.com | [30b2 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032558d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30b3 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032558d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [30b4 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032558d0 principal matched by identity 0 +peer1.org1.example.com | [30b5 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [30b6 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [30b7 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032558d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30b8 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032558d0 gate 1589998879929512400 evaluation succeeds +peer1.org1.example.com | [30b9 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [30ba 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [30bb 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30bc 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30bd 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 2a 16 d0 73 a9 fe 19 01 a7 07 7e 26 da 5c 62 |.*..s......~&.\b| +peer1.org1.example.com | 00000010 e4 93 34 cb 9e 46 36 bd 65 18 06 50 14 53 6f 10 |..4..F6.e..P.So.| +peer1.org1.example.com | [30be 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 53 b8 38 ad 05 14 b9 c3 2e 45 |0E.!..S.8......E| +peer1.org1.example.com | 00000010 ec 65 9d 94 0d 81 63 35 0e 07 75 08 a7 4d 4e 02 |.e....c5..u..MN.| +peer1.org1.example.com | 00000020 f0 46 30 82 ec 02 20 56 b8 a1 ad 72 6a 2e 06 8c |.F0... V...rj...| +peer1.org1.example.com | 00000030 ff a6 eb f5 de 8b 33 20 6d 28 26 e1 ba fe 2d d1 |......3 m(&...-.| +peer1.org1.example.com | 00000040 a2 c6 aa c1 8a 69 d6 |.....i.| +peer1.org1.example.com | [30bf 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30c0 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [30c1 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30c2 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org2.example.com | [312e 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [312f 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095190 principal evaluation fails +peer0.org2.example.com | [3130 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095190 gate 1589998872150149000 evaluation fails +peer0.org2.example.com | [3131 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3132 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3133 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3134 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095700 gate 1589998872150643300 evaluation starts +peer0.org2.example.com | [3135 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3136 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095700 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3137 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095700 principal matched by identity 0 +peer0.org2.example.com | [3138 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [3139 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [313a 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095700 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [313b 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003095700 gate 1589998872150643300 evaluation succeeds +peer0.org2.example.com | [313c 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [313d 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [313e 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [313f 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3140 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3141 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3142 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3143 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3144 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3145 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3146 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3147 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3148 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2900 gate 1589998872154589700 evaluation starts +peer0.org2.example.com | [3149 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2900 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [314a 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2900 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [314b 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [314c 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2900 principal evaluation fails +peer0.org2.example.com | [314d 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2900 gate 1589998872154589700 evaluation fails +peer0.org2.example.com | [314e 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [314f 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3150 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3151 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2e70 gate 1589998872156873700 evaluation starts +peer0.org2.example.com | [3152 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2e70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3153 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2e70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3154 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2e70 principal matched by identity 0 +peer0.org2.example.com | [3155 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [3156 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [3157 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2e70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3158 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c2e70 gate 1589998872156873700 evaluation succeeds +peer0.org2.example.com | [3159 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [315a 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [315b 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [315c 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [315d 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [315e 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [3160 05-20 18:21:12.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [3161 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3162 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +peer0.org2.example.com | [3163 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3164 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3165 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3166 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3167 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3168 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3169 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [316a 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [316b 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [316c 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f50a0 gate 1589998872164291700 evaluation starts +peer0.org2.example.com | [316d 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f50a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [316e 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f50a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [30c3 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org1.example.com | [30c4 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30c5 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30c6 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30c7 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30c8 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30c9 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [30ca 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30cb 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30cc 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219b40 gate 1589998879932417800 evaluation starts +peer1.org1.example.com | [30cd 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219b40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30ce 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219b40 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [30cf 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219b40 principal matched by identity 0 +peer1.org1.example.com | [30d0 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org1.example.com | [30d1 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org1.example.com | [30d2 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219b40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30d3 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003219b40 gate 1589998879932417800 evaluation succeeds +peer1.org1.example.com | [30d4 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30d5 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30d6 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30d7 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30d8 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer1.org1.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer1.org1.example.com | [30d9 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer1.org1.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer1.org1.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer1.org1.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer1.org1.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer1.org1.example.com | [30da 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30db 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc8 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer0.org1.example.com | [2fc9 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org1.example.com | [2fca 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer0.org1.example.com | [2fcb 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer0.org1.example.com | [2fcc 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [2fcd 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003922280 env 0xc003359f40 txn 0 +peer0.org1.example.com | [2fce 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003359f40 +peer0.org1.example.com | [2fcf 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +peer0.org1.example.com | [2fd0 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2fd1 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2fd2 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2fd3 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2fd4 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2fd5 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer0.org1.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +peer0.org1.example.com | [2fd6 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer0.org1.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer0.org1.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer0.org1.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer0.org1.example.com | 00000040 cf eb d4 a9 50 ef |....P.| +peer0.org1.example.com | [2fd7 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2fd8 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0029d0a80, header channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +peer0.org1.example.com | [2fd9 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [2fda 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [2fdb 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [2fdc 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [2fdd 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +peer0.org1.example.com | [2fde 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [2fdf 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002a0a000 +peer0.org1.example.com | [2fe0 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [2fe1 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2e32c32b-451a-4771-911f-12c089f30ac2] +peer0.org1.example.com | [2fe2 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2e32c32b-451a-4771-911f-12c089f30ac2] +peer0.org1.example.com | [2fe3 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fe4 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [31a9 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [31aa 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31ab 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31ac 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [31ad 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [31ae 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [31af 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d06a90 gate 1589998873218525500 evaluation starts +peer1.org2.example.com | [31b0 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d06a90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31b1 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d06a90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [31b2 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d06a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [31b3 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d06a90 principal evaluation fails +peer1.org2.example.com | [31b4 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d06a90 gate 1589998873218525500 evaluation fails +peer1.org2.example.com | [31b5 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31b6 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31b7 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [31b8 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07000 gate 1589998873220810800 evaluation starts +peer1.org2.example.com | [31b9 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07000 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31ba 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07000 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [31bb 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07000 principal matched by identity 0 +peer1.org2.example.com | [31bc 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +peer1.org2.example.com | 00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +peer1.org2.example.com | [31bd 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +peer1.org2.example.com | 00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +peer1.org2.example.com | 00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +peer1.org2.example.com | 00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +peer1.org2.example.com | 00000040 7b 06 5e 80 dd eb 85 |{.^....| +peer1.org2.example.com | [31be 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07000 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [31bf 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d07000 gate 1589998873220810800 evaluation succeeds +peer1.org2.example.com | [31c0 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [31c1 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31c3 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31c4 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [31c5 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [31c2 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [31c6 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [31c7 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31c8 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [31c9 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer1.org2.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer1.org2.example.com | [31ca 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer1.org1.example.com | [30dc 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30dd 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30de 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30df 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [30e0 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30e1 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30e2 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cd460 gate 1589998879934525300 evaluation starts +peer1.org1.example.com | [30e3 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cd460 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30e4 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cd460 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [30e5 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cd460 principal matched by identity 0 +peer1.org1.example.com | [30e6 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [30e7 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [30e8 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cd460 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30e9 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031cd460 gate 1589998879934525300 evaluation succeeds +peer1.org1.example.com | [30ea 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30eb 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30ec 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30ed 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30ee 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30ef 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30f0 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30f1 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [30f2 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30f3 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30f4 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc130 gate 1589998879935952800 evaluation starts +peer1.org1.example.com | [30f5 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30f6 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc130 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [30f7 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc130 principal matched by identity 0 +peer1.org1.example.com | [30f8 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [30f9 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [30fa 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc130 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30fb 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc130 gate 1589998879935952800 evaluation succeeds +peer1.org1.example.com | [30fc 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30fd 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30fe 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30ff 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3100 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3101 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org1.example.com | [3102 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [2fe5 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [2fe6 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +peer0.org1.example.com | [2fe7 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [2fe8 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer0.org1.example.com | [2fe9 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 gate 1589998873007453400 evaluation starts +peer0.org1.example.com | [2fea 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2feb 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2fed 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102F +peer0.org1.example.com | [2fee 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 96FB5B2BCB725928B472DA5110E6A54DF315A26E9E9205B24AC69A8F38928402 +peer0.org1.example.com | [2fef 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2ff0 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2fec 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [2ff1 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2ff3 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2ff4 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ff5 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2ff2 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [2ff6 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ffa 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2ffb 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ffc 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ff7 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ff8 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ffe 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fff 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ff9 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [2ffd 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3000 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer1.org2.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer1.org2.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer1.org2.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer1.org2.example.com | [31cb 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [31cc 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31cd 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [31ce 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 00 66 c9 fb 7f 38 5f 33 14 12 37 25 cf 84 14 |..f...8_3..7%...| +peer1.org2.example.com | 00000010 c4 d1 d8 f0 e5 a6 1e e9 af 66 62 30 20 44 41 c2 |.........fb0 DA.| +peer1.org2.example.com | [31cf 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9b 75 c8 e1 e3 f5 36 76 b9 39 |0E.!...u....6v.9| +peer1.org2.example.com | 00000010 15 26 2e 42 81 95 e6 21 43 80 e0 c4 fc 34 a7 8f |.&.B...!C....4..| +peer1.org2.example.com | 00000020 9e 70 87 73 d5 02 20 03 2e 58 4b 18 0f a8 76 8b |.p.s.. ..XK...v.| +peer1.org2.example.com | 00000030 72 4f 72 05 e4 d2 df af 41 1d 62 9c 53 15 70 de |rOr.....A.b.S.p.| +peer1.org2.example.com | 00000040 f6 ae e1 80 c3 48 12 |.....H.| +peer1.org2.example.com | [31d0 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [31d1 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [31d2 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31d3 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31d4 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [31d5 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [31d6 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 00 66 c9 fb 7f 38 5f 33 14 12 37 25 cf 84 14 |..f...8_3..7%...| +peer1.org2.example.com | 00000010 c4 d1 d8 f0 e5 a6 1e e9 af 66 62 30 20 44 41 c2 |.........fb0 DA.| +peer1.org2.example.com | [31d7 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9b 75 c8 e1 e3 f5 36 76 b9 39 |0E.!...u....6v.9| +peer1.org2.example.com | 00000010 15 26 2e 42 81 95 e6 21 43 80 e0 c4 fc 34 a7 8f |.&.B...!C....4..| +peer1.org2.example.com | 00000020 9e 70 87 73 d5 02 20 03 2e 58 4b 18 0f a8 76 8b |.p.s.. ..XK...v.| +peer1.org2.example.com | 00000030 72 4f 72 05 e4 d2 df af 41 1d 62 9c 53 15 70 de |rOr.....A.b.S.p.| +peer1.org2.example.com | 00000040 f6 ae e1 80 c3 48 12 |.....H.| +peer1.org2.example.com | [31d8 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [31d9 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 52 b2 9f 53 58 cd 25 0b 79 23 |0E.!..R..SX.%.y#| +peer1.org2.example.com | 00000010 3d 48 0d b1 93 fb a4 f8 6e e3 9d 05 04 d7 fe 91 |=H......n.......| +peer1.org2.example.com | 00000020 3a 27 05 c3 75 02 20 60 cf d7 54 06 ed 98 99 11 |:'..u. `..T.....| +peer1.org2.example.com | 00000030 16 fe 15 66 16 a8 56 4f 0a 3e a2 c7 66 a5 2b 41 |...f..VO.>..f.+A| +peer1.org2.example.com | 00000040 fb 39 5e c9 f9 30 de |.9^..0.| +peer1.org2.example.com | [31da 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [31db 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [31dc 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31dd 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31de 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31df 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [31e0 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31e1 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [31e2 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [31e3 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31e4 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [31e5 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31e6 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31e7 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [31e8 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [31e9 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [31ea 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8ebd0 gate 1589998873238739500 evaluation starts +peer1.org2.example.com | [31eb 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8ebd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31ec 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8ebd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [31ed 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8ebd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [31ee 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8ebd0 principal evaluation fails +peer1.org2.example.com | [31ef 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8ebd0 gate 1589998873238739500 evaluation fails +peer1.org2.example.com | [31f0 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31f1 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31f2 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [31f3 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f140 gate 1589998873239082700 evaluation starts +peer1.org2.example.com | [31f4 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f140 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31f5 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f140 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [31f6 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f140 principal matched by identity 0 +peer1.org2.example.com | [31f7 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer1.org2.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer1.org2.example.com | [31f8 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer1.org2.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer1.org2.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer1.org2.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer1.org2.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer1.org2.example.com | [31f9 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f140 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [31fa 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d8f140 gate 1589998873239082700 evaluation succeeds +peer1.org2.example.com | [31fb 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31fc 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31fd 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [31fe 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [31ff 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3200 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3201 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3202 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer1.org2.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer1.org2.example.com | [3203 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer1.org2.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer1.org2.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer1.org2.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer1.org2.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer1.org2.example.com | [3204 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3205 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3206 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3207 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 00 66 c9 fb 7f 38 5f 33 14 12 37 25 cf 84 14 |..f...8_3..7%...| +peer1.org2.example.com | 00000010 c4 d1 d8 f0 e5 a6 1e e9 af 66 62 30 20 44 41 c2 |.........fb0 DA.| +peer1.org2.example.com | [3208 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9b 75 c8 e1 e3 f5 36 76 b9 39 |0E.!...u....6v.9| +peer0.org1.example.com | [3001 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3002 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3003 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3004 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [3005 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3006 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3007 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3008 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 principal matched by identity 0 +peer0.org1.example.com | [3009 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [300a 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [300b 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [300f 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes +peer0.org1.example.com | [3011 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [300d 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [300e 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3010 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [300c 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 b7 ce 88 7a f7 52 8b 0c a8 74 4e f1 48 08 da |!...z.R...tN.H..| +peer0.org1.example.com | 00000010 ac 99 28 d2 a1 48 cd 61 2f af 2e f6 42 02 3f 61 |..(..H.a/...B.?a| +peer0.org1.example.com | [3012 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +peer0.org1.example.com | 00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +peer0.org1.example.com | [3013 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 c2 7c 26 22 5d be 68 cd a6 f6 e5 |0D. ..|&"].h....| +peer0.org1.example.com | 00000010 48 53 b9 c3 e0 ae de 08 64 67 26 f6 31 27 88 f2 |HS......dg&.1'..| +peer0.org1.example.com | 00000020 a9 e6 9d 32 02 20 73 44 51 76 29 d5 24 65 bf 5f |...2. sDQv).$e._| +peer0.org1.example.com | 00000030 e3 1c 3f 4b d3 cf 58 b5 0f f6 c2 d8 95 42 68 80 |..?K..X......Bh.| +peer0.org1.example.com | 00000040 9b 73 66 c0 4e 99 |.sf.N.| +peer0.org1.example.com | [3015 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3016 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [3017 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 skipping identity 0 because it has already been used +peer0.org1.example.com | [3018 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 principal evaluation fails +peer0.org1.example.com | [3019 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 gate 1589998873007453400 evaluation succeeds +peer0.org1.example.com | [301a 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org1.example.com | [301b 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org1.example.com | [3014 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +peer0.org1.example.com | 00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +peer0.org1.example.com | 00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +peer0.org1.example.com | 00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +peer0.org1.example.com | 00000040 7b 06 5e 80 dd eb 85 |{.^....| +peer0.org1.example.com | [301c 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org1.example.com | [301e 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer0.org1.example.com | [301f 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer0.org1.example.com | [3020 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [fd5fe183-6959-4d86-b6e7-20c3e36fa818] +peer0.org1.example.com | [3021 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3022 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fd5fe183-6959-4d86-b6e7-20c3e36fa818] +peer0.org1.example.com | [3023 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer0.org1.example.com | [3024 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4164c32d-e256-49f6-bc95-d119af04c871] +peer0.org1.example.com | [3025 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [3026 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4164c32d-e256-49f6-bc95-d119af04c871] +peer0.org1.example.com | [3027 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 gate 1589998873058523900 evaluation starts +peer0.org1.example.com | [3028 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3029 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [302a 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 principal matched by identity 0 +peer0.org1.example.com | [302b 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer0.org1.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +peer0.org1.example.com | [302c 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer0.org1.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer0.org1.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer0.org1.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer0.org1.example.com | 00000040 cf eb d4 a9 50 ef |....P.| +peer0.org1.example.com | [302d 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [302e 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [302f 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 skipping identity 0 because it has already been used +peer0.org1.example.com | [3030 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 principal evaluation fails +peer0.org1.example.com | [3031 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 gate 1589998873058523900 evaluation succeeds +peer0.org1.example.com | [3032 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org1.example.com | [3033 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb appears to be valid +peer0.org1.example.com | [3034 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002a0a000 +peer0.org1.example.com | [3035 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003922280 env 0xc003359f40 txn 0 +peer0.org1.example.com | [3036 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [3037 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 70ms +peer0.org1.example.com | [3038 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [3039 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [303a 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer0.org1.example.com | [303b 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [301d 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [303c 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [303d 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [303e 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 d0 ba 12 7b d9 ac e5 8c 46 05 94 |0D. i...{....F..| +peer0.org1.example.com | 00000010 19 21 5d c6 85 4d e0 ce 98 a7 6b 2d 10 71 cb 11 |.!]..M....k-.q..| +peer0.org1.example.com | 00000020 58 a4 dd 49 02 20 31 7f 5e f0 e4 19 4c 80 58 05 |X..I. 1.^...L.X.| +peer0.org1.example.com | 00000030 04 f4 88 f0 35 ac 16 e5 ca 5a 0c 29 47 b3 95 dd |....5....Z.)G...| +peer0.org1.example.com | 00000040 47 52 22 06 66 3b |GR".f;| +peer0.org1.example.com | [303f 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer0.org1.example.com | [3040 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [3041 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [3042 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3044 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer0.org1.example.com | [3043 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3045 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] marked as valid by state validator +peer0.org1.example.com | [3046 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3047 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003749ec0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003749f00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc003749f40)} +peer0.org1.example.com | [3048 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3049 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [304a 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [304b 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [304c 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [304d 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [304e 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0030a7540)}} +peer0.org1.example.com | [304f 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3050 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer0.org1.example.com | [3051 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [3052 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org2.example.com | [316f 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f50a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3170 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f50a0 principal evaluation fails +peer0.org2.example.com | [3171 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f50a0 gate 1589998872164291700 evaluation fails +peer0.org2.example.com | [3172 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3173 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3174 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3175 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f5610 gate 1589998872164942300 evaluation starts +peer0.org2.example.com | [3176 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f5610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3177 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f5610 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3178 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f5610 principal matched by identity 0 +peer0.org2.example.com | [3179 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org2.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org2.example.com | [317a 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org2.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org2.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org2.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org2.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org2.example.com | [317b 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f5610 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [317c 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f5610 gate 1589998872164942300 evaluation succeeds +peer0.org2.example.com | [317d 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [317e 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [317f 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3180 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3181 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3182 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3183 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3184 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3185 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3186 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3187 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3188 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3189 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178810 gate 1589998872168749300 evaluation starts +peer0.org2.example.com | [318a 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [318b 05-20 18:21:12.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178810 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [318c 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [318d 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178810 principal evaluation fails +peer0.org2.example.com | [318e 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178810 gate 1589998872168749300 evaluation fails +peer0.org2.example.com | [318f 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3190 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3191 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3192 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178d80 gate 1589998872171401300 evaluation starts +peer0.org2.example.com | [3193 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178d80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3053 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer0.org1.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer0.org1.example.com | [3054 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer0.org1.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer0.org1.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer0.org1.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer0.org1.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer0.org1.example.com | [3055 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3056 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3057 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3058 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +peer0.org1.example.com | 00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +peer0.org1.example.com | [3059 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +peer0.org1.example.com | 00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +peer0.org1.example.com | 00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +peer0.org1.example.com | 00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +peer0.org1.example.com | 00000040 7b 06 5e 80 dd eb 85 |{.^....| +peer0.org1.example.com | [305a 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [305b 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [305c 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [305d 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [305e 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [305f 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3060 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3061 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3062 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3063 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3064 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org1.example.com | [3065 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3066 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 gate 1589998873070045900 evaluation starts +peer0.org1.example.com | [3067 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3068 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3069 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 principal matched by identity 0 +peer0.org1.example.com | [306a 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer0.org1.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer0.org1.example.com | [306b 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org2.example.com | 00000010 15 26 2e 42 81 95 e6 21 43 80 e0 c4 fc 34 a7 8f |.&.B...!C....4..| +peer1.org2.example.com | 00000020 9e 70 87 73 d5 02 20 03 2e 58 4b 18 0f a8 76 8b |.p.s.. ..XK...v.| +peer1.org2.example.com | 00000030 72 4f 72 05 e4 d2 df af 41 1d 62 9c 53 15 70 de |rOr.....A.b.S.p.| +peer1.org2.example.com | 00000040 f6 ae e1 80 c3 48 12 |.....H.| +peer1.org2.example.com | [3209 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [320a 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [320b 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [320c 05-20 18:21:13.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [320d 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [320e 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [320f 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3210 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3211 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3212 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3213 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3214 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3215 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3216 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3217 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3218 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8290 gate 1589998873386266700 evaluation starts +peer1.org2.example.com | [3219 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8290 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [321a 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8290 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [321b 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [321c 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [321d 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [321e 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8290 principal evaluation fails +peer1.org2.example.com | [321f 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8290 gate 1589998873386266700 evaluation fails +peer1.org2.example.com | [3220 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3221 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3222 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3223 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29140 gate 1589998873404666300 evaluation starts +peer1.org2.example.com | [3224 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29140 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3225 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29140 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3226 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29140 principal matched by identity 0 +peer1.org2.example.com | [3227 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 0c b2 b9 77 27 15 1f ae a2 15 63 05 ca 95 69 |....w'.....c...i| +peer1.org2.example.com | 00000010 ee 71 b8 c3 1a a0 91 b3 e6 16 df 31 9f 5a 49 8d |.q.........1.ZI.| +peer1.org2.example.com | [3228 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 48 b8 f8 ab 39 a4 1b d1 95 0b |0E.!..H...9.....| +peer1.org2.example.com | 00000010 49 42 29 12 fc 81 06 38 3b bd 00 6f 51 fe 6a 23 |IB)....8;..oQ.j#| +peer1.org2.example.com | 00000020 ff 4f 06 23 6c 02 20 4c a4 f5 57 b9 2b a7 e1 cf |.O.#l. L..W.+...| +peer1.org2.example.com | 00000030 6e 4c ae 68 50 ce 9c 66 13 99 88 61 e4 d9 e9 2d |nL.hP..f...a...-| +peer1.org2.example.com | 00000040 86 d7 f9 ac 33 9f 93 |....3..| +peer1.org2.example.com | [3229 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29140 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [322a 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e29140 gate 1589998873404666300 evaluation succeeds +peer1.org2.example.com | [322b 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [322c 05-20 18:21:13.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [322d 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [322e 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [322f 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3230 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3231 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3232 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3233 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3234 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3235 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3236 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3237 05-20 18:21:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3239 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3238 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323a 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [323b 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323c 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [323d 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323e 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [323f 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3240 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3241 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3242 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3243 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3244 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3245 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3246 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3103 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer1.org1.example.com | [3104 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org1.example.com | [3105 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3106 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3107 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3108 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3109 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [310a 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [310b 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [310c 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [310d 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bdc80 gate 1589998879938688200 evaluation starts +peer1.org1.example.com | [310e 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bdc80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [310f 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bdc80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3110 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bdc80 principal matched by identity 0 +peer1.org1.example.com | [3111 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer1.org1.example.com | [3112 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer1.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer1.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer1.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer1.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer1.org1.example.com | [3113 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bdc80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3114 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bdc80 gate 1589998879938688200 evaluation succeeds +peer1.org1.example.com | [3115 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3116 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3117 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3118 05-20 18:21:19.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3119 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer1.org1.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer1.org1.example.com | [311a 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer1.org1.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer1.org1.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer1.org1.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer1.org1.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer1.org1.example.com | [311b 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [311c 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [311d 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [311e 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [311f 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3120 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3121 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3122 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3123 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b5f0 gate 1589998879941518400 evaluation starts +peer1.org1.example.com | [3124 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b5f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3125 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b5f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3126 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b5f0 principal matched by identity 0 +peer1.org1.example.com | [3127 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3128 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3129 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b5f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [312a 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b5f0 gate 1589998879941518400 evaluation succeeds +peer1.org1.example.com | [312b 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [312c 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [312d 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [312e 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [312f 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3130 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3131 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3132 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3133 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3134 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3135 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102130 gate 1589998879943355900 evaluation starts +peer1.org1.example.com | [3136 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3137 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102130 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3138 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102130 principal matched by identity 0 +peer1.org1.example.com | [3139 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [313a 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3194 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178d80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3195 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178d80 principal matched by identity 0 +peer0.org2.example.com | [3196 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org2.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org2.example.com | [3197 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org2.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org2.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org2.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org2.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org2.example.com | [3198 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178d80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3199 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003178d80 gate 1589998872171401300 evaluation succeeds +peer0.org2.example.com | [319a 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [319b 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [319c 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [319d 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [319e 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org2.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org2.example.com | [319f 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org2.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org2.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org2.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org2.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org2.example.com | [31a0 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [31a1 05-20 18:21:12.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Exiting +peer0.org2.example.com | [31a3 05-20 18:21:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a4 05-20 18:21:12.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a5 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [31a6 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a7 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a8 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [31a9 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [31aa 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31ab 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [31ac 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [31ad 05-20 18:21:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31ae 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [31af 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b0 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b1 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31b2 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [31b3 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [31b4 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b5 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b6 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b7 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b8 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b9 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31ba 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [31bb 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31bc 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [31bd 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31be 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [31bf 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [31c0 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31c1 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31c2 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31c3 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31c4 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [31c5 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [31c6 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [31c7 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b52e0 gate 1589998872635418200 evaluation starts +peer0.org2.example.com | [31c8 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b52e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31c9 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b52e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [31ca 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b52e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [31cb 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b52e0 principal evaluation fails +peer0.org2.example.com | [31cc 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b52e0 gate 1589998872635418200 evaluation fails +peer0.org2.example.com | [31cd 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31ce 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31cf 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [31d0 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b5850 gate 1589998872635832100 evaluation starts +peer0.org2.example.com | [31d1 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b5850 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31d2 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b5850 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [31d3 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b5850 principal matched by identity 0 +peer0.org2.example.com | [31d4 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer0.org2.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer0.org2.example.com | [31d5 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer0.org2.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer0.org2.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer0.org2.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer0.org2.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer0.org2.example.com | [31d6 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b5850 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [31d7 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b5850 gate 1589998872635832100 evaluation succeeds +peer0.org2.example.com | [31d8 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31d9 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31da 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [31db 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [31dc 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [31dd 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [31de 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [31df 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [31e0 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [31e1 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31e2 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31e3 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31e4 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [31e5 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e6 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e7 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e8 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [31e9 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [31ea 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31eb 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > alive: alive: +peer0.org2.example.com | [31ec 05-20 18:21:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [31ed 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [31ee 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [31ef 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [31f0 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31f1 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [31f2 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [31f3 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [31f4 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [31f5 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31f6 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [31f7 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31f8 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [31f9 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [31fa 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [306c 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [306d 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer0.org1.example.com | [306e 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [306f 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 130 0 82 231 27 197 206 34 190 230 222 52 236 211 2 162 124 108 59 61 106 121 33 236 98 31 142 3 81 185 239 26 2 32 55 199 95 66 93 215 81 148 237 34 138 208 80 139 173 252 126 144 208 206 53 74 104 254 207 40 134 46 79 136 11 0]} 0x1519b80}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0028c7500 0xc002843860 {{0 0} 0 0 0 0} {false}})]} +peer0.org1.example.com | [3070 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [3071 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00021e820})} +peer0.org1.example.com | [3072 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer0.org1.example.com | [3073 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer0.org1.example.com | [3074 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer0.org1.example.com | [3075 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer0.org1.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer0.org1.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer0.org1.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer0.org1.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer0.org1.example.com | [3076 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3077 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 gate 1589998873070045900 evaluation succeeds +peer0.org1.example.com | [3078 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3079 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [307a 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [307b 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [307c 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [307d 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [307e 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [307f 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3080 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer0.org1.example.com | [3082 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xe4, 0xd0, 0x6e, 0x11, 0x83, 0x40, 0x38, 0x1c, 0x2a, 0x25, 0xb9, 0x5b, 0xef, 0x40, 0xdf, 0xab, 0x76, 0x31, 0x92, 0x2e, 0xb6, 0x6d, 0xd2, 0x76, 0xed, 0x67, 0x48, 0xc4, 0x26, 0xd8, 0xcb, 0xd9} txOffsets= +peer0.org1.example.com | txId=d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb locPointer=offset=70, bytesLength=3519 +peer0.org1.example.com | ] +peer0.org1.example.com | [3083 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84951, bytesLength=3519] for tx ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to txid-index +peer0.org1.example.com | [3081 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3084 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3085 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3086 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [313b 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102130 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [313c 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102130 gate 1589998879943355900 evaluation succeeds +peer1.org1.example.com | [313d 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [313e 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [313f 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3140 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3141 05-20 18:21:19.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3142 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3143 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3144 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3145 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3146 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3147 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3148 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3149 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [314a 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [314b 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [314c 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [314d 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [314e 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [314f 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3150 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3151 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103410 gate 1589998880171530500 evaluation starts +peer1.org1.example.com | [3152 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103410 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3153 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103410 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3154 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103410 principal matched by identity 0 +peer1.org1.example.com | [3155 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3156 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3157 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103410 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3158 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003103410 gate 1589998880171530500 evaluation succeeds +peer1.org1.example.com | [3159 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [315a 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [315b 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [315d 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3087 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3088 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3089 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [308a 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84951, bytesLength=3519] for tx number:[0] ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to blockNumTranNum index +peer0.org1.example.com | [308b 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [308c 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [308d 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [308e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [308f 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3090 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 gate 1589998873102172600 evaluation starts +peer0.org1.example.com | [3091 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3092 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3093 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 principal matched by identity 0 +peer0.org1.example.com | [3094 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer0.org1.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer0.org1.example.com | [3095 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer0.org1.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer0.org1.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer0.org1.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer0.org1.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer0.org1.example.com | [3096 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3097 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 gate 1589998873102172600 evaluation succeeds +peer0.org1.example.com | [3098 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3099 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [309a 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [309b 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [309c 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [309d 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [309e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [309f 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +peer0.org1.example.com | 00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +peer0.org1.example.com | [30a0 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +peer0.org1.example.com | 00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +peer0.org1.example.com | 00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +peer0.org1.example.com | 00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +peer0.org1.example.com | 00000040 7b 06 5e 80 dd eb 85 |{.^....| +peer0.org1.example.com | [30a1 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [30a2 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [30a3 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30a4 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [30a5 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer0.org1.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer0.org1.example.com | [30a6 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer0.org1.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer0.org1.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer0.org1.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer0.org1.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer0.org1.example.com | [30a7 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30a8 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30a9 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30aa 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89462], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org1.example.com | [30ab 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org1.example.com | [30ac 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [30ad 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [30ae 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [30af 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b0 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b1 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b2 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b3 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b4 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b5 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [30b6 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b7 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org1.example.com | [30b8 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org1.example.com | [30b9 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [30ba 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [30bb 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [30bc 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [30bd 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org1.example.com | [30be 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [30bf 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [30c0 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [30c1 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2de64933-8af3-48dd-bbd1-6037a4a10852] +peer0.org1.example.com | [30c2 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer0.org1.example.com | [30c3 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [30c4 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer0.org1.example.com | [30c5 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2de64933-8af3-48dd-bbd1-6037a4a10852] +peer0.org1.example.com | [30c6 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org1.example.com | [315c 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [315e 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [315f 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3160 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3161 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3162 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3163 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3164 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3165 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3166 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3167 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd0710 gate 1589998880187048900 evaluation starts +peer1.org1.example.com | [3168 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd0710 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3169 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd0710 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [316a 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd0710 principal matched by identity 0 +peer1.org1.example.com | [316b 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [316c 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [316d 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd0710 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [316e 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd0710 gate 1589998880187048900 evaluation succeeds +peer1.org1.example.com | [316f 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3170 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3171 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3172 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3173 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3174 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3175 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3176 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3247 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3248 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3249 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [324a 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [324b 05-20 18:21:13.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [324c 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [324d 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [324e 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [324f 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3250 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3251 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5c 30 e1 0e bf 69 da de a0 54 59 19 94 c1 0a |.\0...i...TY....| +peer1.org2.example.com | 00000010 24 16 2c df aa 4a f0 59 f0 c9 31 0e 64 c4 1d 8e |$.,..J.Y..1.d...| +peer1.org2.example.com | [3252 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 37 e7 8d a9 ee d3 fd b2 d1 20 |0E.!..7........ | +peer1.org2.example.com | 00000010 86 10 4d 6c 7a 3d 84 1e 2d 5a 3c 90 61 24 9b 8c |..Mlz=..-Z<.a$..| +peer1.org2.example.com | 00000020 5a 0f a9 40 d7 02 20 4b c2 4b 07 1c 02 f9 6a 40 |Z..@.. K.K....j@| +peer1.org2.example.com | 00000030 e8 4c 29 92 df e6 e5 64 23 b3 20 aa e8 b9 e8 58 |.L)....d#. ....X| +peer1.org2.example.com | 00000040 35 28 6b ee f7 af 8b |5(k....| +peer1.org2.example.com | [3253 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3254 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3255 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3256 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3257 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3258 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3259 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [325a 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [325b 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [325c 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [325d 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [325e 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [325f 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3260 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3261 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3262 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3263 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3264 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3265 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3266 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3267 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3268 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31fb 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [31fc 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [31fd 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31fe 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [31ff 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3200 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3201 05-20 18:21:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3202 05-20 18:21:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161030 +peer0.org2.example.com | [3203 05-20 18:21:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 50A48F343223357D5AA3BF1450C66374F9EDF50282D66C4C25FC1668B75B299B +peer0.org2.example.com | [3204 05-20 18:21:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3205 05-20 18:21:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3206 05-20 18:21:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3207 05-20 18:21:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3208 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3209 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [320b 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [320c 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [320d 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [320a 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [320e 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [320f 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3211 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3210 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3212 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3213 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3214 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3215 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3216 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3217 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3218 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3219 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [321a 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [321b 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [321c 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [321d 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [321e 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [321f 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3220 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer0.org2.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer0.org2.example.com | [3221 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer0.org2.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer0.org2.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer0.org2.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer0.org2.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer0.org2.example.com | [3222 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3223 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 71 2b 72 29 ba 6f 00 43 ac c1 |0E.!..q+r).o.C..| +peer0.org2.example.com | 00000010 90 96 f2 ea 10 ad cc d7 a3 7d 60 59 61 7a 60 e2 |.........}`Yaz`.| +peer0.org2.example.com | 00000020 7e bf 62 01 9c 02 20 53 cf 4b 4c c8 f9 ab 81 51 |~.b... S.KL....Q| +peer0.org2.example.com | 00000030 8a 50 d5 d4 db 42 06 ef b6 bf 15 0a 7a 04 ed 9b |.P...B......z...| +peer0.org2.example.com | 00000040 17 64 e7 bf 78 ff 6c |.d..x.l| +peer0.org2.example.com | [3224 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3225 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3226 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3227 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3228 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3229 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [322a 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [322b 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [322c 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3269 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [326a 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [326b 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [326c 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [326d 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [326e 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161033 +peer1.org2.example.com | [326f 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 02ABBECDBA92E5E072E9867ED590BA6987F6A789B8F1BBFC10A5539860533057 +peer1.org2.example.com | [3270 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3271 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3272 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3273 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3274 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3275 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3276 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3277 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3278 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3279 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [327b 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [327c 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [327d 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [327e 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [327a 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [327f 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3280 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3281 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3282 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3283 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3284 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3285 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [322d 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [322e 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [322f 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3230 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3231 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3232 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3233 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4650 gate 1589998872916903700 evaluation starts +peer0.org2.example.com | [3234 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3235 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4650 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3236 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3237 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4650 principal evaluation fails +peer0.org2.example.com | [3238 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4650 gate 1589998872916903700 evaluation fails +peer0.org2.example.com | [3239 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [323a 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [323b 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [323c 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4bc0 gate 1589998872917956000 evaluation starts +peer0.org2.example.com | [323d 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [323e 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4bc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [323f 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4bc0 principal matched by identity 0 +peer0.org2.example.com | [3240 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +peer0.org2.example.com | 00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +peer0.org2.example.com | [3241 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +peer0.org2.example.com | 00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +peer0.org2.example.com | 00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +peer0.org2.example.com | 00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +peer0.org2.example.com | 00000040 aa 43 54 c4 43 28 |.CT.C(| +peer0.org2.example.com | [3242 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4bc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3243 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c4bc0 gate 1589998872917956000 evaluation succeeds +peer0.org2.example.com | [3244 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3245 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3246 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3247 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3248 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3249 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [324b 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [324c 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer0.org2.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer0.org2.example.com | [324d 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer0.org2.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer0.org2.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer0.org2.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer0.org2.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer0.org2.example.com | [324e 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [324f 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3250 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [324a 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3251 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3252 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer0.org2.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer0.org2.example.com | [3253 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer0.org2.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer0.org2.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer0.org2.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer0.org2.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer0.org2.example.com | [3254 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3255 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3256 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3257 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3259 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3258 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [325a 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +peer0.org2.example.com | 00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +peer0.org2.example.com | [325b 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +peer0.org2.example.com | 00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +peer0.org2.example.com | 00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +peer0.org2.example.com | 00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +peer0.org2.example.com | 00000040 b1 d4 22 e0 e0 7d |.."..}| +peer0.org2.example.com | [325c 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [325d 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [325e 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [325f 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3260 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +peer0.org2.example.com | 00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +peer0.org2.example.com | [3261 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +peer0.org2.example.com | 00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +peer0.org2.example.com | 00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +peer0.org2.example.com | 00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +peer0.org2.example.com | 00000040 b4 f6 fc 88 53 db |....S.| +peer0.org2.example.com | [3262 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3263 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3264 05-20 18:21:12.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3265 05-20 18:21:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3266 05-20 18:21:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3267 05-20 18:21:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3268 05-20 18:21:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3269 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [326a 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3286 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3287 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3288 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3289 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [328a 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [328b 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [328c 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b510 gate 1589998874039600600 evaluation starts +peer1.org2.example.com | [328d 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b510 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [328e 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b510 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [328f 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3290 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b510 principal evaluation fails +peer1.org2.example.com | [3291 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b510 gate 1589998874039600600 evaluation fails +peer1.org2.example.com | [3292 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3293 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3294 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3295 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319ba80 gate 1589998874041427100 evaluation starts +peer1.org2.example.com | [3296 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319ba80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3297 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319ba80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3298 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319ba80 principal matched by identity 0 +peer1.org2.example.com | [3299 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 64 3c db e4 0f 17 fc c6 df c3 fa ae 81 c9 ec |.d<.............| +peer1.org2.example.com | 00000010 22 27 83 8f c6 a5 a8 e0 7a bd f9 e6 e9 7c 4e 2d |"'......z....|N-| +peer1.org2.example.com | [329a 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 5d c5 bd 45 ac c4 17 a4 d7 75 dc |0D. I]..E.....u.| +peer1.org2.example.com | 00000010 63 ca 0b 82 7b 6a 53 97 a2 c3 ce fa 36 a7 f0 86 |c...{jS.....6...| +peer1.org2.example.com | 00000020 b2 bf b7 ea 02 20 46 3a 87 c5 67 97 1a fd be f3 |..... F:..g.....| +peer1.org2.example.com | 00000030 27 40 54 b5 8a cf 49 30 5c f1 3d cc 24 f8 eb 37 |'@T...I0\.=.$..7| +peer1.org2.example.com | 00000040 90 3a 3f 81 b6 87 |.:?...| +peer1.org2.example.com | [329b 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319ba80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [329c 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319ba80 gate 1589998874041427100 evaluation succeeds +peer1.org2.example.com | [329d 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [329e 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [329f 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32a0 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32a1 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32a2 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [32a3 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [32a4 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [32a5 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [32a6 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32a7 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32a8 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32a9 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32aa 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32ab 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32ac 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32ad 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32ae 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32af 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [32b0 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32b1 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3177 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3178 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3179 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [317a 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [317b 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [317c 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [317d 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd1a60 gate 1589998880199150200 evaluation starts +peer1.org1.example.com | [317e 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd1a60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [317f 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd1a60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3180 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd1a60 principal matched by identity 0 +peer1.org1.example.com | [3181 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3182 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3183 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd1a60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3184 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cd1a60 gate 1589998880199150200 evaluation succeeds +peer1.org1.example.com | [3185 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3186 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3187 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3188 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3189 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [318a 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [318b 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [318c 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [318d 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [318e 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [318f 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3190 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3191 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3192 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3193 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c7 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [30c8 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08031A0C0A0565787030321203312E30 +peer0.org1.example.com | [30c9 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6DEBC8D5F6B31BF78931D1929E3A6C9D796A18FCAB0A92FCA37BA330A0E79110 +peer0.org1.example.com | [30ca 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [30cb 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer0.org1.example.com | [30cc 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [30cd 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer0.org1.example.com | [30ce 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer0.org1.example.com | [30cf 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer0.org1.example.com | [30d0 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer0.org1.example.com | [30d1 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer0.org1.example.com | [30d2 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 64ms (state_validation=10ms block_and_pvtdata_commit=43ms state_commit=7ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer0.org1.example.com | [30d3 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [30d4 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08041A0C0A0565787030321203312E30 +peer0.org1.example.com | [30d5 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F5EBCD54A3A3BDF042C87D0459C3EDA07CD735A7838202381BA3E8823A20D29E +peer0.org1.example.com | [30d6 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org1.example.com | [30d7 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [30d8 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [30d9 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30da 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [30db 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [30dc 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30dd 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [30de 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [30df 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [30e0 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [30e1 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [30e2 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [30e3 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 gate 1589998873213065200 evaluation starts +peer0.org1.example.com | [30e4 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [30e5 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [30e6 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 principal matched by identity 0 +peer0.org1.example.com | [30e7 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 00 66 c9 fb 7f 38 5f 33 14 12 37 25 cf 84 14 |..f...8_3..7%...| +peer0.org1.example.com | 00000010 c4 d1 d8 f0 e5 a6 1e e9 af 66 62 30 20 44 41 c2 |.........fb0 DA.| +peer0.org1.example.com | [30e8 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9b 75 c8 e1 e3 f5 36 76 b9 39 |0E.!...u....6v.9| +peer0.org1.example.com | 00000010 15 26 2e 42 81 95 e6 21 43 80 e0 c4 fc 34 a7 8f |.&.B...!C....4..| +peer0.org1.example.com | 00000020 9e 70 87 73 d5 02 20 03 2e 58 4b 18 0f a8 76 8b |.p.s.. ..XK...v.| +peer0.org1.example.com | 00000030 72 4f 72 05 e4 d2 df af 41 1d 62 9c 53 15 70 de |rOr.....A.b.S.p.| +peer0.org1.example.com | 00000040 f6 ae e1 80 c3 48 12 |.....H.| +peer0.org1.example.com | [30e9 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [30ea 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 gate 1589998873213065200 evaluation succeeds +peer0.org1.example.com | [30eb 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [30ec 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [30ed 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [30ee 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [30ef 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [30f0 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [30f1 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [30f2 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [30f3 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [30f4 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f5 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f6 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f7 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [30f8 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30f9 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30fa 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30fb 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [30fc 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > alive: alive: alive: +peer0.org1.example.com | [30fd 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [32b2 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [32b3 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32b4 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32b5 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32b6 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32b7 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32b8 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32b9 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32ba 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32bb 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32bc 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32bd 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32be 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32bf 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32c0 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [32c1 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c2 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c3 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c4 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32c5 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [32c6 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c7 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [32c8 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32c9 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3194 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3195 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3196 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3197 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3198 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3199 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [319a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc72f0 gate 1589998880421248900 evaluation starts +peer1.org1.example.com | [319b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc72f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [319c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc72f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [319d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc72f0 principal matched by identity 0 +peer1.org1.example.com | [319e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [319f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [31a0 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc72f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [31a1 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cc72f0 gate 1589998880421248900 evaluation succeeds +peer1.org1.example.com | [31a2 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31a3 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31a4 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [31a5 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [31a6 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31a7 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31a8 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [31a9 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31aa 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [326b 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [326c 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [326d 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [326e 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [326f 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3270 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3271 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3272 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3273 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3274 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330ca10 gate 1589998873030876800 evaluation starts +peer0.org2.example.com | [3275 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330ca10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3276 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330ca10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3277 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330ca10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3278 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330ca10 principal evaluation fails +peer0.org2.example.com | [3279 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330ca10 gate 1589998873030876800 evaluation fails +peer0.org2.example.com | [327a 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [327b 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [327c 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [327d 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cf80 gate 1589998873031699600 evaluation starts +peer0.org2.example.com | [327e 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cf80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [327f 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cf80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3280 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cf80 principal matched by identity 0 +peer0.org2.example.com | [3281 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +peer0.org2.example.com | 00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +peer0.org2.example.com | [3282 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +peer0.org2.example.com | 00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +peer0.org2.example.com | 00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +peer0.org2.example.com | 00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +peer0.org2.example.com | 00000040 7b 06 5e 80 dd eb 85 |{.^....| +peer0.org2.example.com | [3283 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cf80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3284 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cf80 gate 1589998873031699600 evaluation succeeds +peer0.org2.example.com | [3285 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3286 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3287 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3288 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3289 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [30fe 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30ff 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3100 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3101 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3102 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3103 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 0c b2 b9 77 27 15 1f ae a2 15 63 05 ca 95 69 |....w'.....c...i| +peer0.org1.example.com | 00000010 ee 71 b8 c3 1a a0 91 b3 e6 16 df 31 9f 5a 49 8d |.q.........1.ZI.| +peer0.org1.example.com | [3104 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 48 b8 f8 ab 39 a4 1b d1 95 0b |0E.!..H...9.....| +peer0.org1.example.com | 00000010 49 42 29 12 fc 81 06 38 3b bd 00 6f 51 fe 6a 23 |IB)....8;..oQ.j#| +peer0.org1.example.com | 00000020 ff 4f 06 23 6c 02 20 4c a4 f5 57 b9 2b a7 e1 cf |.O.#l. L..W.+...| +peer0.org1.example.com | 00000030 6e 4c ae 68 50 ce 9c 66 13 99 88 61 e4 d9 e9 2d |nL.hP..f...a...-| +peer0.org1.example.com | 00000040 86 d7 f9 ac 33 9f 93 |....3..| +peer0.org1.example.com | [3105 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3106 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3107 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3108 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3109 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [310a 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [310b 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [310c 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [310d 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [310e 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [310f 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3110 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3111 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3112 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3113 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3114 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3115 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3116 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3117 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3118 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3119 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [311a 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [311b 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [311c 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [311d 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [311e 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [311f 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32ca 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32cb 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32cc 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32cd 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c2d0 gate 1589998875591379200 evaluation starts +peer1.org2.example.com | [32ce 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c2d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32cf 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c2d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [32d0 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c2d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32d1 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c2d0 principal evaluation fails +peer1.org2.example.com | [32d2 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c2d0 gate 1589998875591379200 evaluation fails +peer1.org2.example.com | [32d3 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32d4 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32d5 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32d6 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c840 gate 1589998875594006400 evaluation starts +peer1.org2.example.com | [32d7 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c840 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32d8 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c840 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [32d9 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c840 principal matched by identity 0 +peer1.org2.example.com | [32da 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org2.example.com | [32db 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org2.example.com | [32dc 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c840 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32dd 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c840 gate 1589998875594006400 evaluation succeeds +peer1.org2.example.com | [32de 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32df 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32e0 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32e1 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32e2 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32e3 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32e4 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32e5 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32e6 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32e7 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32e8 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32e9 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d430 gate 1589998875595019100 evaluation starts +peer1.org2.example.com | [32ea 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [32eb 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d430 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32ec 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d430 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [32ed 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32ee 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d430 principal evaluation fails +peer1.org2.example.com | [32ef 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d430 gate 1589998875595019100 evaluation fails +peer1.org2.example.com | [32f0 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32f1 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32f2 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32f3 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d9a0 gate 1589998875597380000 evaluation starts +peer1.org2.example.com | [32f4 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32f5 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d9a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [32f6 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d9a0 principal matched by identity 0 +peer1.org2.example.com | [32f7 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org2.example.com | [32f8 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org2.example.com | [328a 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [328b 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [328c 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [328d 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [328e 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [328f 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3290 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3291 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3292 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3293 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3294 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3295 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3296 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > alive:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > alive: +peer0.org2.example.com | [3297 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3298 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3299 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes +peer0.org2.example.com | [329a 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [329b 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [329c 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [329d 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [329e 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [329f 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32a0 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer0.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer0.org2.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer0.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer0.org2.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer0.org2.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [32a1 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378170 gate 1589998873037756000 evaluation starts +peer0.org2.example.com | [32a2 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32a3 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378170 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [32a4 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org2.example.com | [32a5 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [32a6 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [32a7 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378170 principal matched by identity 0 +peer0.org2.example.com | [32a8 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 a3 4b 58 7d 3a 8c 7a 8a 5a 35 e1 14 b2 ed 1d |..KX}:.z.Z5.....| +peer0.org2.example.com | 00000010 77 84 8b fb f0 74 b1 e4 89 cf f7 aa 5e 2c 5d 82 |w....t......^,].| +peer0.org2.example.com | [32a9 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 85 0e 94 fc 33 9e 4b ab b1 ae 2d |0D. .....3.K...-| +peer0.org2.example.com | 00000010 23 bd fa 52 b0 58 eb 31 08 63 6c 33 c9 2a c4 71 |#..R.X.1.cl3.*.q| +peer0.org2.example.com | 00000020 7d e9 4b 53 02 20 68 18 fe 74 c6 55 ca 39 b3 74 |}.KS. h..t.U.9.t| +peer0.org1.example.com | [3120 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3121 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3122 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3123 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3124 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3125 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3126 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3127 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3128 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3129 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [312a 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [312b 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [312c 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [312d 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [312e 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 gate 1589998873694998500 evaluation starts +peer0.org1.example.com | [312f 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3130 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3131 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 principal matched by identity 0 +peer0.org1.example.com | [3132 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5c 30 e1 0e bf 69 da de a0 54 59 19 94 c1 0a |.\0...i...TY....| +peer0.org1.example.com | 00000010 24 16 2c df aa 4a f0 59 f0 c9 31 0e 64 c4 1d 8e |$.,..J.Y..1.d...| +peer0.org1.example.com | [3133 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 37 e7 8d a9 ee d3 fd b2 d1 20 |0E.!..7........ | +peer0.org1.example.com | 00000010 86 10 4d 6c 7a 3d 84 1e 2d 5a 3c 90 61 24 9b 8c |..Mlz=..-Z<.a$..| +peer0.org1.example.com | 00000020 5a 0f a9 40 d7 02 20 4b c2 4b 07 1c 02 f9 6a 40 |Z..@.. K.K....j@| +peer0.org1.example.com | 00000030 e8 4c 29 92 df e6 e5 64 23 b3 20 aa e8 b9 e8 58 |.L)....d#. ....X| +peer0.org1.example.com | 00000040 35 28 6b ee f7 af 8b |5(k....| +peer0.org1.example.com | [3134 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3135 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 gate 1589998873694998500 evaluation succeeds +peer0.org1.example.com | [3136 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3137 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3138 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3139 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [313a 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32f9 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d9a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32fa 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322d9a0 gate 1589998875597380000 evaluation succeeds +peer1.org2.example.com | [32fb 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32fc 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32fd 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32fe 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32ff 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3300 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3301 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3302 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3303 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3304 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [3305 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3306 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3307 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3308 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3309 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [330a 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [330b 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [330c 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [330d 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [330e 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [330f 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3310 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3311 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325ec50 gate 1589998875618423300 evaluation starts +peer1.org2.example.com | [3312 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325ec50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3313 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325ec50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3314 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325ec50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3315 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325ec50 principal evaluation fails +peer1.org2.example.com | [3316 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325ec50 gate 1589998875618423300 evaluation fails +peer1.org1.example.com | [31ab 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31ac 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31ad 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [31ae 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [31af 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [31b0 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cba240 gate 1589998880426375200 evaluation starts +peer1.org1.example.com | [31b1 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cba240 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [31b2 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cba240 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [31b3 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cba240 principal matched by identity 0 +peer1.org1.example.com | [31b4 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [31b5 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [31b6 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cba240 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [31b7 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cba240 gate 1589998880426375200 evaluation succeeds +peer1.org1.example.com | [31b8 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31b9 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31ba 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [31bb 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [31bc 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31bd 05-20 18:21:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [31be 05-20 18:21:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31bf 05-20 18:21:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [31c0 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [31c1 05-20 18:21:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31c2 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [31c3 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31c4 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [31c5 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31c6 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31c7 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [31c8 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31c9 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ca 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [31cb 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [31cc 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31cd 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 50 8c 72 93 21 b5 23 53 29 12 d5 b8 3a fb ec f3 |P.r.!.#S)...:...| +peer0.org2.example.com | 00000040 ca 96 1f 39 90 b6 |...9..| +peer0.org2.example.com | [32aa 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378170 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [32ab 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378170 gate 1589998873037756000 evaluation succeeds +peer0.org2.example.com | [32ac 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [32ad 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [32ae 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [32af 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [32b0 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [32b1 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer0.org2.example.com | [32b2 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32b3 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [32b4 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org2.example.com | [32b5 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [32b6 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer0.org2.example.com | [32b7 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer0.org2.example.com | [32b8 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org2.example.com | [32b9 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer0.org2.example.com | [32ba 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer0.org2.example.com | [32bb 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [32bc 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002a2f280 env 0xc000235400 txn 0 +peer0.org2.example.com | [32bd 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc000235400 +peer0.org2.example.com | [32be 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +peer0.org2.example.com | [32bf 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [32c0 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [32c1 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [32c2 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32c3 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [32c4 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [32c5 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [32c6 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [32c7 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [32c8 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer0.org2.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +peer0.org2.example.com | [32c9 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer0.org2.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer0.org2.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer0.org2.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer0.org2.example.com | 00000040 cf eb d4 a9 50 ef |....P.| +peer0.org2.example.com | [32ca 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [313b 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [313c 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [313d 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [313e 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [313f 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3140 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3141 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3142 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3143 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3144 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3145 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3146 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3148 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3149 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [314a 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [314b 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3147 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [314c 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [314d 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [314e 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [314f 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3150 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3151 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3152 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3153 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3154 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3155 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3156 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3157 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3158 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3159 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ce 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [31cf 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [31d0 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31d1 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [31d2 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [31d3 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31d4 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d5 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d6 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [31d7 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d8 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d9 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31da 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [31db 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31dc 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [31dd 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [31de 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31df 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [31e0 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161037 +peer1.org1.example.com | [31e1 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A3FFCEA82F256BB54B710E350EF818DDDA3807B06179DC313D646304AEEC5864 +peer1.org1.example.com | [31e2 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [31e3 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [31e4 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [31e5 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31e6 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31e7 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31e8 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [31e9 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ea 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31ec 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31ed 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ee 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ef 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [31f0 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31f1 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [31f2 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [31f3 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer1.org1.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer1.org1.example.com | [31f4 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer1.org1.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer1.org1.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer1.org1.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer1.org1.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer1.org1.example.com | [31eb 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [31f5 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31f6 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [31f7 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 02 82 6e 08 f3 fe 69 b6 7a 95 db |0D. t..n...i.z..| +peer1.org1.example.com | 00000010 56 4a d8 ee 90 9a a0 a9 3c 92 f9 bb 26 fc 77 7b |VJ......<...&.w{| +peer1.org1.example.com | 00000020 a9 ae 75 85 02 20 43 39 da d8 16 59 45 31 e7 f9 |..u.. C9...YE1..| +peer1.org1.example.com | 00000030 fe b2 15 d4 8b 49 94 f0 82 85 1b 79 36 c6 94 ca |.....I.....y6...| +peer1.org1.example.com | 00000040 e3 c1 a1 3f 64 ac |...?d.| +peer1.org1.example.com | [31f8 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [31f9 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [31fa 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [31fb 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [31fc 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31fd 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31fe 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3200 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3201 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ff 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3202 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3203 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer1.org1.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer1.org1.example.com | [3204 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer1.org1.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer1.org1.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer1.org1.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer1.org1.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer1.org2.example.com | [3317 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3318 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3319 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [331a 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325f1c0 gate 1589998875620543200 evaluation starts +peer1.org2.example.com | [331b 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325f1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [331c 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325f1c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [331d 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325f1c0 principal matched by identity 0 +peer1.org2.example.com | [331e 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org2.example.com | [331f 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org2.example.com | [3320 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325f1c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3321 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325f1c0 gate 1589998875620543200 evaluation succeeds +peer1.org2.example.com | [3322 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3323 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3324 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3325 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3326 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3327 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3328 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3329 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [332a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [332b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [315a 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [315b 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [315c 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [315d 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [315e 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [315f 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3160 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3161 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3162 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3163 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3164 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3165 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3166 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 gate 1589998873913437000 evaluation starts +peer0.org1.example.com | [3167 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3168 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3169 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 principal matched by identity 0 +peer0.org1.example.com | [316a 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 ab be cd ba 92 e5 e0 72 e9 86 7e d5 90 ba 69 |........r..~...i| +peer0.org1.example.com | 00000010 87 f6 a7 89 b8 f1 bb fc 10 a5 53 98 60 53 30 57 |..........S.`S0W| +peer0.org1.example.com | [316b 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a c7 ab cf 32 de 2c a7 b4 bb 7b d8 |0D. z...2.,...{.| +peer0.org1.example.com | 00000010 dc a7 57 f7 55 61 ff 29 30 7d 90 36 6d ae e9 29 |..W.Ua.)0}.6m..)| +peer0.org1.example.com | 00000020 a8 59 90 39 02 20 38 0c cd 0b dd 8e ef 64 26 0d |.Y.9. 8......d&.| +peer0.org1.example.com | 00000030 99 a2 53 65 84 7b 95 27 4e 5c 2f 88 cb 7f 05 1b |..Se.{.'N\/.....| +peer0.org1.example.com | 00000040 9e cb ec 6a b3 91 |...j..| +peer0.org1.example.com | [316c 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [316d 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 gate 1589998873913437000 evaluation succeeds +peer0.org1.example.com | [316e 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [316f 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3170 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3171 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3172 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3173 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3174 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3205 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3206 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3207 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3208 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3209 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [320a 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [320b 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer1.org1.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer1.org1.example.com | [320c 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [320d 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer1.org1.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer1.org1.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer1.org1.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer1.org1.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer1.org1.example.com | [320e 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [320f 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3210 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3211 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3212 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [3213 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 40 9b 5b f6 4d 03 28 18 22 b8 9c 91 15 87 fc dd |@.[.M.(.".......| +peer1.org1.example.com | 00000010 a0 4b 15 33 19 cc 73 5a fe fd 61 29 e9 da f8 5c |.K.3..sZ..a)...\| +peer1.org1.example.com | [3214 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b e7 89 3a 2e a0 43 e5 75 3e b6 |0E.!....:..C.u>.| +peer1.org1.example.com | 00000010 09 74 6d 80 45 60 ae 7f 47 33 61 13 e4 60 29 48 |.tm.E`..G3a..`)H| +peer1.org1.example.com | 00000020 e1 bb 95 b4 93 02 20 0a 81 48 2f 8c 4c 08 a2 94 |...... ..H/.L...| +peer1.org1.example.com | 00000030 c8 65 e1 12 b5 1f be 14 92 af 9c 55 87 cf e5 f2 |.e.........U....| +peer1.org1.example.com | 00000040 35 a3 c1 90 8a 83 b4 |5......| +peer1.org1.example.com | [3215 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3216 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3217 05-20 18:21:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3218 05-20 18:21:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [3219 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [321a 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [321b 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [321c 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [321d 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [321e 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [321f 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3220 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3221 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3222 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3223 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3224 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3225 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3226 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3227 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32cb 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003374a80, header channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +peer0.org2.example.com | [32cc 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [32cd 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [32ce 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [32cf 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [32d0 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +peer0.org2.example.com | [32d1 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [32d2 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00339c000 +peer0.org2.example.com | [32d3 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [32d4 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [818c8780-e7ec-46fa-8a01-210a20ebea61] +peer0.org2.example.com | [32d5 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [818c8780-e7ec-46fa-8a01-210a20ebea61] +peer0.org2.example.com | [32d6 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 gate 1589998873061495900 evaluation starts +peer0.org2.example.com | [32d7 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32d8 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [32d9 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 principal matched by identity 0 +peer0.org2.example.com | [32da 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 b7 ce 88 7a f7 52 8b 0c a8 74 4e f1 48 08 da |!...z.R...tN.H..| +peer0.org2.example.com | 00000010 ac 99 28 d2 a1 48 cd 61 2f af 2e f6 42 02 3f 61 |..(..H.a/...B.?a| +peer0.org2.example.com | [32db 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 c2 7c 26 22 5d be 68 cd a6 f6 e5 |0D. ..|&"].h....| +peer0.org2.example.com | 00000010 48 53 b9 c3 e0 ae de 08 64 67 26 f6 31 27 88 f2 |HS......dg&.1'..| +peer0.org2.example.com | 00000020 a9 e6 9d 32 02 20 73 44 51 76 29 d5 24 65 bf 5f |...2. sDQv).$e._| +peer0.org2.example.com | 00000030 e3 1c 3f 4b d3 cf 58 b5 0f f6 c2 d8 95 42 68 80 |..?K..X......Bh.| +peer0.org2.example.com | 00000040 9b 73 66 c0 4e 99 |.sf.N.| +peer0.org2.example.com | [32dc 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [32dd 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [32de 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 skipping identity 0 because it has already been used +peer0.org2.example.com | [32df 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 principal evaluation fails +peer0.org2.example.com | [32e0 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a75e0 gate 1589998873061495900 evaluation succeeds +peer0.org2.example.com | [32e1 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org2.example.com | [32e2 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32e3 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32e4 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32e5 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32e6 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32e7 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32e8 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org2.example.com | [32e9 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org2.example.com | [32ea 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer0.org2.example.com | [32eb 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer0.org2.example.com | [32ec 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [014ef853-aaab-4e92-8b36-e6d7ae743510] +peer0.org2.example.com | [32ed 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [32ee 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [014ef853-aaab-4e92-8b36-e6d7ae743510] +peer0.org2.example.com | [32ef 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer0.org2.example.com | [32f0 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [17a24b12-b20f-4bbd-9e54-af2071a35f76] +peer0.org2.example.com | [32f1 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org2.example.com | [32f2 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [17a24b12-b20f-4bbd-9e54-af2071a35f76] +peer0.org2.example.com | [32f3 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 gate 1589998873072493200 evaluation starts +peer0.org2.example.com | [32f4 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32f5 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [32f6 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | [32f7 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org2.example.com | [32f8 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [32f9 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [3175 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3176 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3177 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3178 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3179 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [317a 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [317b 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [317c 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [317d 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [317e 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [317f 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3180 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3181 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3182 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3183 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3184 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3185 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3186 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3187 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3188 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3189 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [318a 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [318b 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [318c 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [318d 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [318e 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [318f 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3190 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3191 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3192 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3193 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161030 +peer0.org1.example.com | [3194 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 80643CDBE40F17FCC6DFC3FAAE81C9EC2227838FC6A5A8E07ABDF9E6E97C4E2D +peer0.org1.example.com | [3195 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3196 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3197 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3198 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3199 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [319a 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [319b 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [319c 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [332c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [332d 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [332e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [332f 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290480 gate 1589998875635559500 evaluation starts +peer1.org2.example.com | [3330 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3331 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290480 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3332 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3333 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290480 principal evaluation fails +peer1.org2.example.com | [3334 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003290480 gate 1589998875635559500 evaluation fails +peer1.org2.example.com | [3335 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3336 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3337 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3338 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032909f0 gate 1589998875636531800 evaluation starts +peer1.org2.example.com | [3339 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032909f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [333a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032909f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [333b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032909f0 principal matched by identity 0 +peer1.org2.example.com | [333c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org2.example.com | [333d 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org2.example.com | [333e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032909f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [333f 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032909f0 gate 1589998875636531800 evaluation succeeds +peer1.org1.example.com | [3228 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3229 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [322a 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [322b 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [322c 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [322d 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [322e 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [322f 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3230 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3231 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3232 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3233 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3234 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7220 gate 1589998880917052900 evaluation starts +peer1.org1.example.com | [3235 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7220 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3236 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7220 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3237 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7220 principal matched by identity 0 +peer1.org1.example.com | [3238 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer1.org1.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer1.org1.example.com | [3239 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer1.org1.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer1.org1.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer1.org1.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer1.org1.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer1.org1.example.com | [323a 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7220 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [323b 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa7220 gate 1589998880917052900 evaluation succeeds +peer1.org1.example.com | [323c 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [323d 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [323e 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [323f 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3240 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3241 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3242 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3243 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3244 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3245 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3246 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3247 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3248 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3249 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [324a 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [324b 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [324c 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [324d 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [324e 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [324f 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3250 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [3251 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3252 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [3253 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3254 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +peer1.org1.example.com | 00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +peer1.org1.example.com | [3255 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +peer1.org1.example.com | 00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +peer1.org1.example.com | 00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +peer1.org1.example.com | 00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +peer1.org1.example.com | 00000040 a7 58 d0 cf be 9c |.X....| +peer1.org1.example.com | [3256 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3257 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 ed ec cf dc 2f 25 84 1f 8e 5f da |0D. q..../%..._.| +peer1.org1.example.com | 00000010 76 4a e0 9d 64 0a 2b e9 63 2c 2a 74 60 75 dc ef |vJ..d.+.c,*t`u..| +peer1.org1.example.com | 00000020 43 61 ff 11 02 20 1b 1e 2b 88 73 31 9e f1 84 38 |Ca... ..+.s1...8| +peer1.org1.example.com | 00000030 cb 09 67 0a 59 e5 0e 0c 46 da a8 67 b7 1a e1 ae |..g.Y...F..g....| +peer1.org1.example.com | 00000040 bd d9 eb dc 25 4f |....%O| +peer1.org1.example.com | [3258 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3259 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [325a 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [325b 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [325c 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [325d 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [325e 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [325f 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3260 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [3261 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3262 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3263 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3264 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" secret_envelope: > alive: +peer1.org1.example.com | [3265 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3266 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3267 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3268 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3269 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [326a 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [326b 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [326c 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [326d 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [326e 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [326f 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3270 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [3271 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3272 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3273 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3274 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3275 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3276 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3277 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3278 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3279 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [327a 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [327b 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [327c 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [327d 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [327e 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f12d0 gate 1589998881211675700 evaluation starts +peer1.org1.example.com | [327f 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f12d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3280 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f12d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3281 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f12d0 principal matched by identity 0 +peer1.org1.example.com | [3282 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d9 1e e7 0c 37 ab 5b 5f f1 3d d1 11 4f 4e 43 |D....7.[_.=..ONC| +peer1.org1.example.com | 00000010 ee 0c d8 f5 08 2a 60 c0 32 c2 fa 43 67 59 81 46 |.....*`.2..CgY.F| +peer1.org1.example.com | [3283 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 92 be a4 7a ce 13 5b 41 e4 0c 8c |0D. ....z..[A...| +peer0.org2.example.com | [32fa 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org2.example.com | [32fb 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [32fc 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 principal matched by identity 0 +peer0.org2.example.com | [32fd 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +peer0.org2.example.com | 00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +peer0.org2.example.com | [32fe 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +peer0.org2.example.com | 00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +peer0.org2.example.com | 00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +peer0.org2.example.com | 00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +peer0.org2.example.com | 00000040 cf eb d4 a9 50 ef |....P.| +peer0.org2.example.com | [32ff 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3300 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [3301 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 skipping identity 0 because it has already been used +peer0.org2.example.com | [3302 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 principal evaluation fails +peer0.org2.example.com | [3303 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003406530 gate 1589998873072493200 evaluation succeeds +peer0.org2.example.com | [3304 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org2.example.com | [3305 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb appears to be valid +peer0.org2.example.com | [3306 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00339c000 +peer0.org2.example.com | [3307 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [3308 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 30ms +peer0.org2.example.com | [3309 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [330a 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [330b 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer0.org2.example.com | [330c 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [330d 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [330e 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [330f 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer0.org2.example.com | [3310 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [3311 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [3312 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [3313 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer0.org2.example.com | [3314 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] marked as valid by state validator +peer0.org2.example.com | [3315 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00295bc80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00295bcc0), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc00295bd00)} +peer0.org2.example.com | [3316 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [3317 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [3318 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [3319 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0034bcb40)}} +peer0.org2.example.com | [331a 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer0.org2.example.com | [331b 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org2.example.com | [331c 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org2.example.com | [331d 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org2.example.com | [331e 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer0.org2.example.com | [331f 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org2.example.com | [3320 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer0.org2.example.com | [3321 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [3322 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org2MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 132 53 234 158 5 21 54 55 10 100 91 67 152 48 179 166 60 118 102 235 162 136 222 206 88 47 254 10 61 189 12 128 2 32 58 2 18 253 151 76 108 165 23 28 220 105 249 185 187 254 215 186 77 3 235 95 190 143 176 102 185 153 196 74 41 107]} 0x1519b80}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00275fe60 0xc00276aea0 {{0 0} 0 0 0 0} {false}})]} +peer0.org2.example.com | [3323 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org2.example.com | [3324 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00000e760})} +peer0.org2.example.com | [3325 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer0.org2.example.com | [3326 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer0.org2.example.com | [3327 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer0.org2.example.com | [3328 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002a2f280 env 0xc000235400 txn 0 +peer0.org2.example.com | [3329 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer0.org2.example.com | [332a 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xe4, 0xd0, 0x6e, 0x11, 0x83, 0x40, 0x38, 0x1c, 0x2a, 0x25, 0xb9, 0x5b, 0xef, 0x40, 0xdf, 0xab, 0x76, 0x31, 0x92, 0x2e, 0xb6, 0x6d, 0xd2, 0x76, 0xed, 0x67, 0x48, 0xc4, 0x26, 0xd8, 0xcb, 0xd9} txOffsets= +peer0.org2.example.com | txId=d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb locPointer=offset=70, bytesLength=3519 +peer0.org2.example.com | ] +peer0.org2.example.com | [332b 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84958, bytesLength=3519] for tx ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to txid-index +peer0.org2.example.com | [332c 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84958, bytesLength=3519] for tx number:[0] ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to blockNumTranNum index +peer0.org2.example.com | [332d 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89469], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org2.example.com | [332e 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org2.example.com | [332f 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org2.example.com | [3330 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org2.example.com | [3331 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [3332 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [3333 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [3334 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [3335 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [3336 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [3337 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org2.example.com | [3338 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3339 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [333a 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [333b 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [333c 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [333d 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f3ad76b0-a2ab-415b-ac31-d81356bb4d54] +peer0.org2.example.com | [333e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer0.org2.example.com | [333f 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [3340 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer0.org2.example.com | [3341 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f3ad76b0-a2ab-415b-ac31-d81356bb4d54] +peer0.org2.example.com | [3342 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org2.example.com | [3340 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3341 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3342 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3343 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3344 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3345 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3346 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3347 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3348 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3349 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [334a 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [334b 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [334c 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [319d 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [319f 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31a1 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [31a2 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [319e 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31a0 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31a3 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31a4 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31a5 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31a6 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37126 +peer0.org1.example.com | [31a7 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002b536d0 +peer0.org1.example.com | [31a8 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [31a9 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [31aa 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [31ab 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [31ac 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [31ad 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 63 ce 05 0a 89 fe 06 6f 09 41 3e fe 55 d4 f1 |.c......o.A>.U..| +peer0.org1.example.com | 00000010 f4 bb 54 93 f0 3a 98 c1 46 67 e3 48 e9 de 2b c0 |..T..:..Fg.H..+.| +peer0.org1.example.com | [31ae 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 0d 03 bb d4 f1 92 e1 3f 9a c3 |0E.!.........?..| +peer0.org1.example.com | 00000010 76 c2 5d b1 51 62 02 96 eb 54 d4 e2 27 1c 5b 61 |v.].Qb...T..'.[a| +peer0.org1.example.com | 00000020 e9 39 c5 32 d7 02 20 7f 10 3b e7 47 f5 4c 81 43 |.9.2.. ..;.G.L.C| +peer0.org1.example.com | 00000030 82 8d d2 43 cf 92 bf c2 60 0b b1 2e 4b 25 c1 a2 |...C....`...K%..| +peer0.org1.example.com | 00000040 52 41 98 75 55 ea 7e |RA.uU.~| +peer0.org1.example.com | [31af 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [31b0 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001393b0, header 0xc002b53ae0 +peer0.org1.example.com | [31b1 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [31b2 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] processing txid: 8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49 +peer0.org1.example.com | [31b3 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49] +peer0.org1.example.com | [31b4 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [31b5 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [31b6 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [31b7 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [31b8 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [31b9 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 gate 1589998874212707800 evaluation starts +peer0.org1.example.com | [31ba 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [31bb 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [31bc 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 principal matched by identity 0 +peer0.org1.example.com | [31bd 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 63 ce 05 0a 89 fe 06 6f 09 41 3e fe 55 d4 f1 |.c......o.A>.U..| +peer0.org1.example.com | 00000010 f4 bb 54 93 f0 3a 98 c1 46 67 e3 48 e9 de 2b c0 |..T..:..Fg.H..+.| +peer0.org1.example.com | [31be 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 0d 03 bb d4 f1 92 e1 3f 9a c3 |0E.!.........?..| +peer0.org1.example.com | 00000010 76 c2 5d b1 51 62 02 96 eb 54 d4 e2 27 1c 5b 61 |v.].Qb...T..'.[a| +peer0.org1.example.com | 00000020 e9 39 c5 32 d7 02 20 7f 10 3b e7 47 f5 4c 81 43 |.9.2.. ..;.G.L.C| +peer0.org1.example.com | 00000030 82 8d d2 43 cf 92 bf c2 60 0b b1 2e 4b 25 c1 a2 |...C....`...K%..| +peer0.org1.example.com | 00000040 52 41 98 75 55 ea 7e |RA.uU.~| +peer0.org1.example.com | [31bf 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [31c0 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 gate 1589998874212707800 evaluation succeeds +peer0.org1.example.com | [31c1 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [31c2 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [31c3 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [31c4 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [31c5 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [31c6 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49] +peer0.org1.example.com | [31c7 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] Entry chaincode: name:"exp02" +peer0.org1.example.com | [31c8 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [31c9 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org2.example.com | [3343 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3344 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408CC93F4F0C0EFB38816...08031A0C0A0565787030321203312E30 +peer0.org2.example.com | [3345 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CCE038E87868D33E488D435CB4256E0C76A198633C7041DED9519610A7566A17 +peer0.org2.example.com | [3346 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org2.example.com | [3347 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer0.org2.example.com | [3348 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer0.org2.example.com | [3349 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer0.org2.example.com | [334a 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [334b 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer0.org2.example.com | [334c 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer0.org2.example.com | [334d 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer0.org2.example.com | [334e 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 33ms (state_validation=3ms block_and_pvtdata_commit=14ms state_commit=8ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer0.org2.example.com | [334f 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3350 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408CC93F4F0C0EFB38816...08041A0C0A0565787030321203312E30 +peer0.org2.example.com | [3351 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A9BF297F97E63E4E88A7AD1220C13828BE64303E0E93ACFA63842588BAC7DE89 +peer0.org2.example.com | [3352 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org2.example.com | [3353 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\242\307f\245+A\3739^\311\3710\336" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3354 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3355 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\242\307f\245+A\3739^\311\3710\336" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3356 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3357 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 00 66 c9 fb 7f 38 5f 33 14 12 37 25 cf 84 14 |..f...8_3..7%...| +peer0.org2.example.com | 00000010 c4 d1 d8 f0 e5 a6 1e e9 af 66 62 30 20 44 41 c2 |.........fb0 DA.| +peer0.org2.example.com | [3358 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9b 75 c8 e1 e3 f5 36 76 b9 39 |0E.!...u....6v.9| +peer0.org2.example.com | 00000010 15 26 2e 42 81 95 e6 21 43 80 e0 c4 fc 34 a7 8f |.&.B...!C....4..| +peer0.org2.example.com | 00000020 9e 70 87 73 d5 02 20 03 2e 58 4b 18 0f a8 76 8b |.p.s.. ..XK...v.| +peer0.org2.example.com | 00000030 72 4f 72 05 e4 d2 df af 41 1d 62 9c 53 15 70 de |rOr.....A.b.S.p.| +peer0.org2.example.com | 00000040 f6 ae e1 80 c3 48 12 |.....H.| +peer0.org2.example.com | [3359 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [335a 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 52 b2 9f 53 58 cd 25 0b 79 23 |0E.!..R..SX.%.y#| +peer0.org2.example.com | 00000010 3d 48 0d b1 93 fb a4 f8 6e e3 9d 05 04 d7 fe 91 |=H......n.......| +peer0.org2.example.com | 00000020 3a 27 05 c3 75 02 20 60 cf d7 54 06 ed 98 99 11 |:'..u. `..T.....| +peer0.org2.example.com | 00000030 16 fe 15 66 16 a8 56 4f 0a 3e a2 c7 66 a5 2b 41 |...f..VO.>..f.+A| +peer0.org2.example.com | 00000040 fb 39 5e c9 f9 30 de |.9^..0.| +peer1.org2.example.com | [334d 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [334e 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [334f 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3350 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3351 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3352 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3353 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291d80 gate 1589998875865526800 evaluation starts +peer1.org2.example.com | [3354 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3355 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291d80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3356 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3357 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291d80 principal evaluation fails +peer1.org2.example.com | [3358 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003291d80 gate 1589998875865526800 evaluation fails +peer1.org2.example.com | [3359 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [335a 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [335b 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [335c 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be2f0 gate 1589998875868400000 evaluation starts +peer1.org2.example.com | [335d 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be2f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [335e 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be2f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [335f 05-20 18:21:15.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be2f0 principal matched by identity 0 +peer1.org2.example.com | [3360 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer1.org2.example.com | [3361 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org2.example.com | [3362 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be2f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3363 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032be2f0 gate 1589998875868400000 evaluation succeeds +peer1.org2.example.com | [3364 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3365 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3366 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3367 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3368 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3369 05-20 18:21:15.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [336a 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [336b 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [336c 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [336d 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [336e 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [336f 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032beee0 gate 1589998875896868000 evaluation starts +peer1.org2.example.com | [3370 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032beee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3371 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032beee0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3372 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032beee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3373 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032beee0 principal evaluation fails +peer1.org2.example.com | [3374 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032beee0 gate 1589998875896868000 evaluation fails +peer1.org2.example.com | [3375 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3376 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3377 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3378 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bf450 gate 1589998875899328600 evaluation starts +peer1.org2.example.com | [3379 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bf450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [337a 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bf450 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [337b 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bf450 principal matched by identity 0 +peer1.org2.example.com | [337c 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer1.org2.example.com | [337d 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org2.example.com | [337e 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bf450 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [337f 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032bf450 gate 1589998875899328600 evaluation succeeds +peer1.org2.example.com | [3380 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3381 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3382 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3383 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3384 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3385 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3386 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3387 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [3388 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3389 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [338a 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [338b 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [338c 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [338d 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [338e 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [338f 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3390 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3391 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3392 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 32 70 7b 0e 4b 3d a4 d2 bf dc ed 0d e9 ce 00 0c |2p{.K=..........| +peer1.org1.example.com | 00000020 32 5c a3 ab 02 20 67 34 2a a2 04 06 20 ad 57 a9 |2\... g4*... .W.| +peer1.org1.example.com | 00000030 e5 78 9f d4 46 98 c4 24 47 29 71 69 15 de 5a 9c |.x..F..$G)qi..Z.| +peer1.org1.example.com | 00000040 b0 0e 27 08 eb 69 |..'..i| +peer1.org1.example.com | [3284 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f12d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3285 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f12d0 gate 1589998881211675700 evaluation succeeds +peer1.org1.example.com | [3286 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3287 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3288 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3289 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [328a 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [328b 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [328c 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [328d 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [328e 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [328f 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3290 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3291 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3292 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [3293 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3294 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3295 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3296 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3297 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > alive: alive: alive: +peer1.org1.example.com | [3298 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3299 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [329a 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [329b 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161038 +peer1.org1.example.com | [329c 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 58B2EC035C9883213EAEA16077AA4DECA82BC8CDD996CD1BFCD4185CC4717F01 +peer1.org1.example.com | [329d 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [329e 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [329f 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [32a0 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [32a1 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a2 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a3 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a4 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [32a5 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a6 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [32a7 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [32a8 05-20 18:21:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [32a9 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32aa 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [32ab 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32ac 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [32ad 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32ae 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32af 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32b0 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32b1 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32b2 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [32b3 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [32b4 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | [335b 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [335c 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [335d 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [335e 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [335f 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3360 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3361 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3362 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [3363 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3364 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3365 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3366 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\242\307f\245+A\3739^\311\3710\336" > > alive: +peer0.org2.example.com | [3367 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3368 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3369 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [336a 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [336b 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [336c 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [336d 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [336e 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [336f 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3370 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3393 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3394 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3395 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3396 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3397 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003300e90 gate 1589998875918334100 evaluation starts +peer1.org2.example.com | [3398 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003300e90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3399 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003300e90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [31ca 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8518a715] Entry chaincode: name:"exp02" +peer0.org1.example.com | [31cb 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [31cc 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [31cd 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] handling GET_STATE from chaincode +peer0.org1.example.com | [31ce 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [31cf 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [31d0 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [31d1 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [31d2 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] notifying Txid:8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49, channelID:businesschannel +peer0.org1.example.com | [31d3 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [31d4 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8518a715] Exit chaincode: name:"exp02" (6ms) +peer0.org1.example.com | [31d5 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [31d6 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49] +peer0.org1.example.com | [31d7 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] Exit +peer0.org1.example.com | [31d8 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] Entry chaincode: name:"exp02" +peer0.org1.example.com | [31d9 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [31da 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49, chaincode: exp02} +peer0.org1.example.com | [31db 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20E84406E0A1C34F0CEEA9F3FA63A9...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [31dc 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5EE4747F4EC471CA851ED9CDD0B01A1758FF85BE2130EF80C2171D81D8E4AA31 +peer0.org1.example.com | [31dd 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49, chaincode: exp02} +peer0.org1.example.com | [31de 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] Exit +peer0.org1.example.com | [31df 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49] +peer0.org1.example.com | [31e0 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37126 +peer0.org1.example.com | [31e1 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37126 grpc.code=OK grpc.call_duration=14.8869ms +peer0.org1.example.com | [31e2 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [31e3 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [31e4 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37130 +peer0.org1.example.com | [31e5 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002ab89b0 +peer0.org1.example.com | [31e6 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [31e7 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [31e8 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [31e9 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [31ea 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [31eb 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f c3 64 ad 57 9f c8 1e 3f 52 36 79 4d 8b 4f ff |o.d.W...?R6yM.O.| +peer0.org1.example.com | 00000010 6b b2 08 cf 3e 06 8c b0 3d fb f3 bd b2 f4 80 18 |k...>...=.......| +peer0.org1.example.com | [31ec 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 c9 4a 63 43 e5 13 cf 49 3b 29 |0E.!...JcC...I;)| +peer0.org1.example.com | 00000010 65 7f 70 37 8c e5 f0 be 61 38 03 e4 8b 70 d6 71 |e.p7....a8...p.q| +peer0.org1.example.com | 00000020 67 ab 7c b0 85 02 20 6b fc bb 04 37 c3 80 f3 03 |g.|... k...7....| +peer0.org1.example.com | 00000030 bb 83 1a 8e 03 8a f9 64 4f ef 03 94 73 5f a3 a0 |.......dO...s_..| +peer0.org1.example.com | 00000040 3d bc 9f 99 b1 38 9e |=....8.| +peer0.org1.example.com | [31ed 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [31ee 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000139a40, header 0xc002ab8dc0 +peer0.org1.example.com | [31ef 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [31f0 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] processing txid: 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb +peer0.org1.example.com | [31f1 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +peer0.org1.example.com | [31f2 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [31f3 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [31f4 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [31f5 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [31f6 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [31f7 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 gate 1589998874528956000 evaluation starts +peer0.org1.example.com | [31f8 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [31f9 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [31fa 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 principal matched by identity 0 +peer0.org1.example.com | [31fb 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f c3 64 ad 57 9f c8 1e 3f 52 36 79 4d 8b 4f ff |o.d.W...?R6yM.O.| +peer0.org1.example.com | 00000010 6b b2 08 cf 3e 06 8c b0 3d fb f3 bd b2 f4 80 18 |k...>...=.......| +peer0.org1.example.com | [31fc 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 c9 4a 63 43 e5 13 cf 49 3b 29 |0E.!...JcC...I;)| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [32b5 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32b6 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32b7 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32b8 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32b9 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32ba 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [32bb 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32bc 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [32bd 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32be 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32bf 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [32c0 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [32c1 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [32c2 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00295be10 gate 1589998883685742400 evaluation starts +peer1.org1.example.com | [32c3 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00295be10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [32c4 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00295be10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [32c5 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00295be10 principal matched by identity 0 +peer1.org1.example.com | [32c6 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 e9 73 9f 56 17 b9 e6 d3 0f 25 32 4b 95 c3 f5 |5.s.V.....%2K...| +peer1.org1.example.com | 00000010 8b c3 08 f1 84 c8 e6 e8 c1 7b 18 d9 2c 71 e0 22 |.........{..,q."| +peer1.org1.example.com | [32c7 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 f5 62 e9 51 96 e5 13 e3 12 9b |0E.!...b.Q......| +peer1.org1.example.com | 00000010 03 8b 78 67 11 ef 40 46 cb 24 0b 3f 0d ab d9 72 |..xg..@F.$.?...r| +peer1.org1.example.com | 00000020 49 18 73 b9 3a 02 20 26 95 f9 43 b0 34 6f b1 d3 |I.s.:. &..C.4o..| +peer1.org1.example.com | 00000030 47 25 59 1c e4 17 64 e8 ec 18 2b c9 fb fd de 97 |G%Y...d...+.....| +peer1.org1.example.com | 00000040 1c 28 1e 1d 82 98 4d |.(....M| +peer1.org1.example.com | [32c8 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00295be10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [32c9 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00295be10 gate 1589998883685742400 evaluation succeeds +peer1.org1.example.com | [32ca 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32cb 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32cc 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [32cd 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [32ce 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3371 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3372 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3373 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3374 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3375 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493320 gate 1589998873363626900 evaluation starts +peer0.org2.example.com | [3376 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493320 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3377 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493320 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3378 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3379 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493320 principal evaluation fails +peer0.org2.example.com | [337a 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493320 gate 1589998873363626900 evaluation fails +peer0.org2.example.com | [337b 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [337c 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [337d 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [337e 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493890 gate 1589998873364063900 evaluation starts +peer0.org2.example.com | [337f 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3380 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493890 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3381 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493890 principal matched by identity 0 +peer0.org2.example.com | [3382 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 0c b2 b9 77 27 15 1f ae a2 15 63 05 ca 95 69 |....w'.....c...i| +peer0.org2.example.com | 00000010 ee 71 b8 c3 1a a0 91 b3 e6 16 df 31 9f 5a 49 8d |.q.........1.ZI.| +peer0.org2.example.com | [3383 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 48 b8 f8 ab 39 a4 1b d1 95 0b |0E.!..H...9.....| +peer0.org2.example.com | 00000010 49 42 29 12 fc 81 06 38 3b bd 00 6f 51 fe 6a 23 |IB)....8;..oQ.j#| +peer0.org2.example.com | 00000020 ff 4f 06 23 6c 02 20 4c a4 f5 57 b9 2b a7 e1 cf |.O.#l. L..W.+...| +peer0.org2.example.com | 00000030 6e 4c ae 68 50 ce 9c 66 13 99 88 61 e4 d9 e9 2d |nL.hP..f...a...-| +peer0.org2.example.com | 00000040 86 d7 f9 ac 33 9f 93 |....3..| +peer0.org2.example.com | [3384 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3385 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493890 gate 1589998873364063900 evaluation succeeds +peer0.org2.example.com | [3386 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3387 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3388 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3389 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [338a 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [338b 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [338c 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [338d 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [338e 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [338f 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3390 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3391 05-20 18:21:13.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3392 05-20 18:21:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3393 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3394 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3395 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3396 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3397 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3398 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3399 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [339a 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [339b 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000010 65 7f 70 37 8c e5 f0 be 61 38 03 e4 8b 70 d6 71 |e.p7....a8...p.q| +peer0.org1.example.com | 00000020 67 ab 7c b0 85 02 20 6b fc bb 04 37 c3 80 f3 03 |g.|... k...7....| +peer0.org1.example.com | 00000030 bb 83 1a 8e 03 8a f9 64 4f ef 03 94 73 5f a3 a0 |.......dO...s_..| +peer0.org1.example.com | 00000040 3d bc 9f 99 b1 38 9e |=....8.| +peer0.org1.example.com | [31fd 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [31fe 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 gate 1589998874528956000 evaluation succeeds +peer0.org1.example.com | [31ff 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [3200 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [3201 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [3202 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [3203 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3204 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +peer0.org1.example.com | [3205 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3206 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3207 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [3208 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][523b8dde] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3209 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [320a 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [320b 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] handling GET_STATE from chaincode +peer0.org1.example.com | [320c 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [320d 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [320e 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [320f 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [3210 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] handling GET_STATE from chaincode +peer0.org1.example.com | [3211 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] getting state for chaincode exp02, key b, channel businesschannel +peer0.org1.example.com | [3212 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [3213 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [3214 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [3215 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] handling PUT_STATE from chaincode +peer0.org1.example.com | [3216 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [3217 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [3218 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] handling PUT_STATE from chaincode +peer0.org1.example.com | [3219 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [321a 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [321b 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] notifying Txid:523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, channelID:businesschannel +peer0.org1.example.com | [321c 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [321d 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][523b8dde] Exit chaincode: name:"exp02" (12ms) +peer0.org1.example.com | [321e 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [321f 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +peer0.org1.example.com | [3220 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] Exit +peer0.org1.example.com | [3221 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3222 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [3223 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, chaincode: exp02} +peer0.org1.example.com | [3224 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20B949A68968C82EA1BD42F8BFCBA4...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3225 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8DB57902A01324AFEE36B8E5CE524737AE23CBECC79B1B57151A12C373ABE133 +peer0.org1.example.com | [3226 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, chaincode: exp02} +peer0.org1.example.com | [3227 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] Exit +peer0.org1.example.com | [3228 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +peer1.org1.example.com | [32cf 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [32d0 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [32d1 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [32d2 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [32d3 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32d4 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32d5 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32d6 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32d7 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32d8 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32d9 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32da 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32dc 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32dd 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32de 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32db 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32df 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32e0 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32e1 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32e2 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [32e3 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32e4 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [32e5 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32e6 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32e7 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32e8 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32e9 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32ea 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32eb 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32ec 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32ed 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [32ee 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [32ef 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 2 1 3] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [32f0 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32f1 05-20 18:21:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32f2 05-20 18:21:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32f3 05-20 18:21:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [339a 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003300e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [339b 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003300e90 principal evaluation fails +peer1.org2.example.com | [339c 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003300e90 gate 1589998875918334100 evaluation fails +peer1.org2.example.com | [339d 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [339e 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [339f 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [33a0 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003301400 gate 1589998875920584200 evaluation starts +peer1.org2.example.com | [33a1 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003301400 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33a2 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003301400 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [33a3 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003301400 principal matched by identity 0 +peer1.org2.example.com | [33a4 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer1.org2.example.com | [33a5 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org2.example.com | [33a6 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003301400 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [33a7 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003301400 gate 1589998875920584200 evaluation succeeds +peer1.org2.example.com | [33a8 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33a9 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33aa 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [33ab 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [33ac 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33ad 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33ae 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33af 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33b0 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33b1 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33b2 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [33b3 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [33b4 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org2.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org2.example.com | [33b5 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org2.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org2.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org2.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org2.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org2.example.com | [33b6 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [33b7 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [33b8 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [33b9 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [33ba 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [33bb 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032755d0 gate 1589998876133495700 evaluation starts +peer1.org2.example.com | [33bc 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032755d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33bd 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032755d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [33be 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032755d0 principal matched by identity 0 +peer1.org2.example.com | [33bf 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org2.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org2.example.com | [33c0 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org2.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org2.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org2.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org1.example.com | [32f4 05-20 18:21:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32f6 05-20 18:21:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32f8 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32f7 05-20 18:21:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32f5 05-20 18:21:23.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32f9 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32fa 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [32fb 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [32fc 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32fd 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32fe 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32ff 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3300 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3301 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3302 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3303 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3304 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3305 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285eac0 gate 1589998883851211500 evaluation starts +peer1.org1.example.com | [3306 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285eac0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3307 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285eac0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3308 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285eac0 principal matched by identity 0 +peer1.org1.example.com | [3309 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [330a 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [330b 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285eac0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [330c 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00285eac0 gate 1589998883851211500 evaluation succeeds +peer1.org1.example.com | [330d 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [330e 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [330f 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3310 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3311 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3312 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [3313 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [3314 05-20 18:21:23.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [3315 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [3316 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3317 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3318 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3319 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [331a 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [331b 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [331c 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [331d 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [331e 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4ae0 gate 1589998883866049000 evaluation starts +peer1.org1.example.com | [331f 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3320 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4ae0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3321 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4ae0 principal matched by identity 0 +peer1.org1.example.com | [3322 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [3323 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [3324 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4ae0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3325 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4ae0 gate 1589998883866049000 evaluation succeeds +peer1.org1.example.com | [3326 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3327 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3328 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3329 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [332a 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [332b 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [332c 05-20 18:21:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [332d 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [332e 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org2.example.com | [33c1 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032755d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [33c2 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032755d0 gate 1589998876133495700 evaluation succeeds +peer1.org2.example.com | [33c3 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [33c4 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [33c5 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [33c6 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [33c7 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33c8 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33c9 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33ca 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [33cb 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33cc 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33cd 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [33ce 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33cf 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [33d0 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33d1 05-20 18:21:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [33d2 05-20 18:21:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [33d3 05-20 18:21:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [33d4 05-20 18:21:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610101801 +peer1.org2.example.com | [33d5 05-20 18:21:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B3227FD937055BFEE754C9BECAE0AD28DD23FFAB0DA00216DB9270447B6A931C +peer1.org2.example.com | [33d6 05-20 18:21:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [33d7 05-20 18:21:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33d8 05-20 18:21:16.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33d9 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33da 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33db 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [33dc 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33dd 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33de 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [33df 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33e0 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [33e1 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [33e2 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [33e3 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [33e4 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33e5 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33e6 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33e7 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [33e8 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33e9 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33ea 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33eb 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [339c 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [339d 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [339e 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [339f 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33a0 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [33a1 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33a2 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [33a3 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33a4 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [33a5 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33a6 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [33a7 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33a8 05-20 18:21:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [33a9 05-20 18:21:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161031 +peer0.org2.example.com | [33aa 05-20 18:21:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 105C30E10EBF69DADEA054591994C10A24162CDFAA4AF059F0C9310E64C41D8E +peer0.org2.example.com | [33ab 05-20 18:21:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [33ac 05-20 18:21:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [33ad 05-20 18:21:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [33ae 05-20 18:21:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [33af 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33b0 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33b1 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [33b2 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33b3 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [33b4 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33b5 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [33b6 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [33b7 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33b8 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [33b9 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33ba 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [33bb 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33bc 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33bd 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33be 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33bf 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3229 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37130 +peer0.org1.example.com | [322a 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37130 grpc.code=OK grpc.call_duration=18.0775ms +peer0.org1.example.com | [322b 05-20 18:21:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [322c 05-20 18:21:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [322d 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37136 +peer0.org1.example.com | [322e 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002ab9770 +peer0.org1.example.com | [322f 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3230 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3231 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3232 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3233 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3234 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [3235 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3236 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3237 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3238 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 51 89 11 ee c5 4a e1 5c 92 86 34 89 d2 a9 8d |MQ....J.\..4....| +peer0.org1.example.com | 00000010 e3 09 61 29 9d d9 af b6 f3 bb 28 ee 10 a2 cc 74 |..a)......(....t| +peer0.org1.example.com | [3239 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 ec 2a 0b 5b c2 99 87 e9 c2 c2 1d |0D. $.*.[.......| +peer0.org1.example.com | 00000010 86 cf 75 e3 51 61 5f 04 1b 1e 3d 26 37 3e f2 55 |..u.Qa_...=&7>.U| +peer0.org1.example.com | 00000020 18 13 fe 3e 02 20 31 ff 3b 43 40 cc b8 cd dd 72 |...>. 1.;C@....r| +peer0.org1.example.com | 00000030 84 22 06 39 92 b5 2e 88 ee 12 eb 8b a5 23 05 d4 |.".9.........#..| +peer0.org1.example.com | 00000040 62 d8 7e 4a 95 cc |b.~J..| +peer0.org1.example.com | [323a 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [323b 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002630a0, header 0xc002ab9b80 +peer0.org1.example.com | [323c 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [323d 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] processing txid: 3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f +peer0.org1.example.com | [323e 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f] +peer0.org1.example.com | [323f 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [3240 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [3241 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [3242 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3243 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [3244 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 gate 1589998874744143400 evaluation starts +peer0.org1.example.com | [3245 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3246 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3247 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3248 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 principal evaluation fails +peer0.org1.example.com | [3249 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 gate 1589998874744143400 evaluation fails +peer0.org1.example.com | [324a 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [324b 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [324c 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [324d 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 gate 1589998874744500200 evaluation starts +peer0.org1.example.com | [324e 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [324f 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3250 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [3251 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3252 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3253 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 principal matched by identity 0 +peer0.org1.example.com | [3254 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 51 89 11 ee c5 4a e1 5c 92 86 34 89 d2 a9 8d |MQ....J.\..4....| +peer0.org1.example.com | 00000010 e3 09 61 29 9d d9 af b6 f3 bb 28 ee 10 a2 cc 74 |..a)......(....t| +peer0.org1.example.com | [3255 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 ec 2a 0b 5b c2 99 87 e9 c2 c2 1d |0D. $.*.[.......| +peer0.org1.example.com | 00000010 86 cf 75 e3 51 61 5f 04 1b 1e 3d 26 37 3e f2 55 |..u.Qa_...=&7>.U| +peer0.org1.example.com | 00000020 18 13 fe 3e 02 20 31 ff 3b 43 40 cc b8 cd dd 72 |...>. 1.;C@....r| +peer0.org1.example.com | 00000030 84 22 06 39 92 b5 2e 88 ee 12 eb 8b a5 23 05 d4 |.".9.........#..| +peer0.org1.example.com | 00000040 62 d8 7e 4a 95 cc |b.~J..| +peer0.org1.example.com | [3256 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3257 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 gate 1589998874744500200 evaluation succeeds +peer0.org1.example.com | [3258 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3259 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [325a 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [325b 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [325c 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [325d 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f] +peer0.org1.example.com | [325e 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] Entry chaincode: name:"exp02" +peer0.org1.example.com | [325f 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3260 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [3261 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3caefe83] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3262 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3263 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [3264 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] handling GET_STATE from chaincode +peer0.org1.example.com | [3265 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [3266 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [3267 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [3268 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3269 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] notifying Txid:3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f, channelID:businesschannel +peer0.org1.example.com | [326a 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [326b 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3caefe83] Exit chaincode: name:"exp02" (17ms) +peer0.org1.example.com | [326c 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [326d 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f] +peer0.org1.example.com | [326e 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] Exit +peer0.org1.example.com | [326f 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3270 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [3271 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f, chaincode: exp02} +peer0.org1.example.com | [3272 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A204CC4A260B336FF1D22A82D6280E9...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3273 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 43910A6709966C77268EF78FFF632B3B18F931720DCC4D25FEF71B30B0ACA503 +peer0.org1.example.com | [3274 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f, chaincode: exp02} +peer0.org1.example.com | [3275 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] Exit +peer0.org1.example.com | [3276 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f] +peer0.org1.example.com | [3277 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37136 +peer0.org1.example.com | [3278 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37136 grpc.code=OK grpc.call_duration=28.8691ms +peer0.org1.example.com | [3279 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [327a 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [327b 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [327c 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [327d 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [327e 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [327f 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3280 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3282 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3281 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3284 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3285 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org1.example.com | [3286 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3287 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33c0 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 ab be cd ba 92 e5 e0 72 e9 86 7e d5 90 ba 69 |........r..~...i| +peer0.org2.example.com | 00000010 87 f6 a7 89 b8 f1 bb fc 10 a5 53 98 60 53 30 57 |..........S.`S0W| +peer0.org2.example.com | [33c1 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a c7 ab cf 32 de 2c a7 b4 bb 7b d8 |0D. z...2.,...{.| +peer0.org2.example.com | 00000010 dc a7 57 f7 55 61 ff 29 30 7d 90 36 6d ae e9 29 |..W.Ua.)0}.6m..)| +peer0.org2.example.com | 00000020 a8 59 90 39 02 20 38 0c cd 0b dd 8e ef 64 26 0d |.Y.9. 8......d&.| +peer0.org2.example.com | 00000030 99 a2 53 65 84 7b 95 27 4e 5c 2f 88 cb 7f 05 1b |..Se.{.'N\/.....| +peer0.org2.example.com | 00000040 9e cb ec 6a b3 91 |...j..| +peer0.org2.example.com | [33c2 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33c3 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [33c4 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [33c5 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [33c6 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [33c7 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33c8 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33c9 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33ca 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33cb 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33cd 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33ce 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33cf 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33d0 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33cc 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d1 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [33d2 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d3 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [33d4 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33d5 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33d6 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33d7 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33d8 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33d9 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33da 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33db 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33dc 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33dd 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33de 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33df 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [33e0 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33e1 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33e2 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33e3 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33e4 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33e5 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33e6 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [33e7 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035204f0 gate 1589998874045185000 evaluation starts +peer0.org2.example.com | [33e8 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035204f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33e9 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035204f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [33ea 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035204f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [33eb 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035204f0 principal evaluation fails +peer0.org2.example.com | [33ec 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035204f0 gate 1589998874045185000 evaluation fails +peer0.org2.example.com | [33ed 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33ee 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33ef 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33f0 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520a60 gate 1589998874045824600 evaluation starts +peer0.org2.example.com | [33f1 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520a60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33f2 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520a60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [33f3 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520a60 principal matched by identity 0 +peer0.org2.example.com | [33f4 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 64 3c db e4 0f 17 fc c6 df c3 fa ae 81 c9 ec |.d<.............| +peer0.org2.example.com | 00000010 22 27 83 8f c6 a5 a8 e0 7a bd f9 e6 e9 7c 4e 2d |"'......z....|N-| +peer0.org2.example.com | [33f5 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 5d c5 bd 45 ac c4 17 a4 d7 75 dc |0D. I]..E.....u.| +peer0.org2.example.com | 00000010 63 ca 0b 82 7b 6a 53 97 a2 c3 ce fa 36 a7 f0 86 |c...{jS.....6...| +peer0.org2.example.com | 00000020 b2 bf b7 ea 02 20 46 3a 87 c5 67 97 1a fd be f3 |..... F:..g.....| +peer0.org2.example.com | 00000030 27 40 54 b5 8a cf 49 30 5c f1 3d cc 24 f8 eb 37 |'@T...I0\.=.$..7| +peer0.org2.example.com | 00000040 90 3a 3f 81 b6 87 |.:?...| +peer0.org2.example.com | [33f6 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520a60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33f7 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003520a60 gate 1589998874045824600 evaluation succeeds +peer0.org2.example.com | [33f8 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33f9 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33fa 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33fb 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33fc 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [33fd 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [33fe 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3288 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3289 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3283 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [328a 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [328b 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [328c 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [328d 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [328e 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [328f 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes +peer0.org1.example.com | [3290 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes +peer0.org1.example.com | [3291 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [3292 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [3293 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3294 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3295 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3296 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3297 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3298 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3299 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [329a 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [329b 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 gate 1589998875581618900 evaluation starts +peer0.org1.example.com | [329c 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [329d 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [329e 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 principal matched by identity 0 +peer0.org1.example.com | [329f 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [32a0 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00245f8f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32a2 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 gate 1589998875581618900 evaluation succeeds +peer0.org1.example.com | [32a3 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32a4 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32a5 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32a6 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32a7 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32a8 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32a9 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 752 bytes, Signature: 0 bytes +peer0.org1.example.com | [32aa 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32ab 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32ac 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32ad 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32ae 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32af 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32b0 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 gate 1589998875592937900 evaluation starts +peer0.org1.example.com | [32b1 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32b2 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [32b3 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 principal matched by identity 0 +peer0.org1.example.com | [32b4 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [32b5 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer1.org1.example.com | [332f 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3330 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3331 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3332 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3333 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3334 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3335 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f40 gate 1589998883872069100 evaluation starts +peer1.org1.example.com | [3336 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3337 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f40 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3338 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f40 principal matched by identity 0 +peer1.org1.example.com | [3339 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [333a 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [333b 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [333c 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f40 gate 1589998883872069100 evaluation succeeds +peer1.org1.example.com | [333d 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [333e 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [333f 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3340 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3341 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [3342 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [3343 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3344 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33ff 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3400 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3401 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3402 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3403 05-20 18:21:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3404 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3405 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3406 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3407 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3408 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3409 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [340b 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [340a 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [340c 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [340d 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [340e 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [340f 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3410 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3411 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3412 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3413 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3414 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3415 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3416 05-20 18:21:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3417 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3418 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3419 05-20 18:21:14.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [341a 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [341b 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33ec 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33ed 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33ee 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33ef 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f0 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org2.example.com | [33f1 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f2 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f3 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [33f4 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33f5 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [33f6 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33f7 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [33f8 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33f9 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org2.example.com | [33fa 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33fb 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33fc 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33fd 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [33fe 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3345 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3346 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3347 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3348 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3349 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [334a 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [334b 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9b20 gate 1589998883875165500 evaluation starts +peer1.org1.example.com | [334c 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9b20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [334d 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9b20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [334e 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9b20 principal matched by identity 0 +peer1.org1.example.com | [334f 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3350 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3351 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9b20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3352 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f9b20 gate 1589998883875165500 evaluation succeeds +peer1.org1.example.com | [3353 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3354 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3355 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3356 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3357 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [3358 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [3359 05-20 18:21:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [335a 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [335b 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [335c 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [335d 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [335e 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [335f 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3360 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [32b6 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32b7 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 gate 1589998875592937900 evaluation succeeds +peer0.org1.example.com | [32b8 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32b9 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32ba 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32bb 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes +peer0.org1.example.com | [32bc 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32bd 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org1.example.com | [32be 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org1.example.com | [32bf 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32c0 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32c1 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32c2 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32c3 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32c4 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 gate 1589998875599718200 evaluation starts +peer0.org1.example.com | [32c5 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32c6 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [32c7 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [32c8 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 principal evaluation fails +peer0.org1.example.com | [32c9 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 gate 1589998875599718200 evaluation fails +peer0.org1.example.com | [32ca 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32cb 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32cc 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [32cd 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 gate 1589998875606865800 evaluation starts +peer0.org1.example.com | [32ce 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32cf 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [32d0 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 principal matched by identity 0 +peer0.org1.example.com | [32d1 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org1.example.com | [32d2 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org1.example.com | [32d3 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32d4 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 gate 1589998875606865800 evaluation succeeds +peer0.org1.example.com | [32d5 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [32d6 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [32d7 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32d8 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32d9 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32da 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 752 bytes, Signature: 0 bytes +peer0.org1.example.com | [32db 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32dc 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [32dd 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [32de 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32df 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32e0 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32e1 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32e2 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32e3 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32e4 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32e5 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32e6 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 gate 1589998875620435000 evaluation starts +peer0.org1.example.com | [32e7 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32e8 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [32e9 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 principal matched by identity 0 +peer0.org1.example.com | [32ea 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +peer0.org1.example.com | 00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +peer0.org1.example.com | [32eb 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +peer0.org1.example.com | 00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +peer0.org1.example.com | 00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +peer0.org1.example.com | 00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +peer0.org1.example.com | 00000040 fa b0 68 85 ee f6 |..h...| +peer0.org1.example.com | [32ec 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32ed 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 gate 1589998875620435000 evaluation succeeds +peer0.org1.example.com | [32ee 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32ef 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32f0 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32f1 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32f2 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32f3 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32f4 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32f5 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32f6 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32f7 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32f8 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32f9 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32fa 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 gate 1589998875625537900 evaluation starts +peer0.org1.example.com | [32fb 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32fc 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [32fd 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 principal matched by identity 0 +peer0.org1.example.com | [32fe 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org1.example.com | [32ff 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org1.example.com | [3300 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3301 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 gate 1589998875625537900 evaluation succeeds +peer0.org1.example.com | [3302 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3303 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3304 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3305 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3306 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3307 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3308 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3309 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [330a 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [330b 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [330c 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 gate 1589998875628202600 evaluation starts +peer0.org1.example.com | [330d 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [330e 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [341c 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [341d 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [341e 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [341f 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3420 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3421 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3422 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aa80 gate 1589998875577896900 evaluation starts +peer0.org2.example.com | [3423 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aa80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3424 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aa80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3425 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aa80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3426 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aa80 principal evaluation fails +peer0.org2.example.com | [3427 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aa80 gate 1589998875577896900 evaluation fails +peer0.org2.example.com | [3428 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3429 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [342a 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [342b 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aff0 gate 1589998875578945100 evaluation starts +peer0.org2.example.com | [342c 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [342d 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aff0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [342e 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aff0 principal matched by identity 0 +peer0.org2.example.com | [342f 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org2.example.com | [3430 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org2.example.com | [3431 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aff0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3432 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354aff0 gate 1589998875578945100 evaluation succeeds +peer0.org2.example.com | [3433 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3434 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3435 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3436 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3437 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3438 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3439 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [343a 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [343b 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [343c 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [343d 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [343e 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354bbe0 gate 1589998875581248700 evaluation starts +peer0.org2.example.com | [343f 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354bbe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3440 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354bbe0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3441 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354bbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3442 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354bbe0 principal evaluation fails +peer0.org2.example.com | [3443 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354bbe0 gate 1589998875581248700 evaluation fails +peer0.org2.example.com | [3444 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3445 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3446 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3447 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562150 gate 1589998875581585500 evaluation starts +peer0.org2.example.com | [3448 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562150 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3449 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562150 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [344a 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562150 principal matched by identity 0 +peer0.org2.example.com | [344b 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org2.example.com | [344c 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org2.example.com | [344d 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562150 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [344e 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003562150 gate 1589998875581585500 evaluation succeeds +peer0.org2.example.com | [344f 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3450 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3451 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3452 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3453 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3454 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3455 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3456 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3457 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3458 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3459 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345a 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345b 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [345c 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345d 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [345e 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [345f 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3460 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3461 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3462 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3463 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3464 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3465 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3466 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3467 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3361 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3362 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3363 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3364 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3365 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3366 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3367 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269e520 gate 1589998883884595300 evaluation starts +peer1.org1.example.com | [3368 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269e520 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3369 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269e520 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [336a 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269e520 principal matched by identity 0 +peer1.org1.example.com | [336b 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [336c 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [336d 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269e520 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [336e 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269e520 gate 1589998883884595300 evaluation succeeds +peer1.org1.example.com | [336f 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3370 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3371 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3372 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3373 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3374 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3375 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3376 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3377 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3378 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3379 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [337a 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [337b 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269f750 gate 1589998883888080200 evaluation starts +peer1.org1.example.com | [337c 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269f750 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [337d 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269f750 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [337e 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269f750 principal matched by identity 0 +peer1.org1.example.com | [337f 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [33ff 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3400 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3401 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3402 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3403 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0310 gate 1589998876433430300 evaluation starts +peer1.org2.example.com | [3404 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0310 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3405 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0310 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3406 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3407 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0310 principal evaluation fails +peer1.org2.example.com | [3408 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0310 gate 1589998876433430300 evaluation fails +peer1.org2.example.com | [3409 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [340a 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [340b 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [340c 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0880 gate 1589998876437273700 evaluation starts +peer1.org2.example.com | [340d 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0880 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [340e 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0880 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [340f 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0880 principal matched by identity 0 +peer1.org2.example.com | [3410 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org2.example.com | [3411 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org2.example.com | [3412 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0880 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3414 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0880 gate 1589998876437273700 evaluation succeeds +peer1.org2.example.com | [3415 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3416 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3417 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3418 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3419 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [341a 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [341b 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3413 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org2.example.com | [341c 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [341d 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [341e 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [341f 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3420 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3421 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1a80 gate 1589998876448622700 evaluation starts +peer1.org2.example.com | [3422 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1a80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3423 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1a80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3424 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3425 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1a80 principal evaluation fails +peer1.org2.example.com | [3426 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1a80 gate 1589998876448622700 evaluation fails +peer1.org2.example.com | [3427 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3428 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3429 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [342a 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1ff0 gate 1589998876451816700 evaluation starts +peer1.org2.example.com | [342b 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [342c 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1ff0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [342d 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1ff0 principal matched by identity 0 +peer1.org2.example.com | [342e 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer1.org2.example.com | [342f 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org2.example.com | [3430 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1ff0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3431 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1ff0 gate 1589998876451816700 evaluation succeeds +peer1.org2.example.com | [3432 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3433 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3434 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3435 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3436 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org2.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org2.example.com | [3437 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org2.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org2.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org2.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org2.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org2.example.com | [3438 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org2.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer1.org2.example.com | [3439 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer1.org2.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer1.org2.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer1.org2.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer1.org2.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer1.org2.example.com | [343a 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [343b 05-20 18:21:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org2.example.com | [343c 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [343d 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [343e 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [330f 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 principal matched by identity 0 +peer0.org1.example.com | [3310 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org1.example.com | [3311 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org1.example.com | [3312 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3313 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 gate 1589998875628202600 evaluation succeeds +peer0.org1.example.com | [3314 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3315 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3316 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3317 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3318 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org1.example.com | [3319 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org1.example.com | [331a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [331b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes +peer0.org1.example.com | [331c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [331d 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +peer0.org1.example.com | 00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +peer0.org1.example.com | [331e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +peer0.org1.example.com | 00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +peer0.org1.example.com | 00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +peer0.org1.example.com | 00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +peer0.org1.example.com | 00000040 0e 74 be f2 58 6c |.t..Xl| +peer0.org1.example.com | [331f 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3320 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3380 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [3381 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269f750 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3382 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00269f750 gate 1589998883888080200 evaluation succeeds +peer1.org1.example.com | [3383 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3384 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3385 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3386 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3387 05-20 18:21:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3388 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3389 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [338a 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [338b 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [338c 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [338d 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [338e 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [338f 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3390 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3391 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3392 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3393 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3394 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026900d0 gate 1589998883941774600 evaluation starts +peer1.org1.example.com | [3395 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026900d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3396 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026900d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3397 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026900d0 principal matched by identity 0 +peer1.org1.example.com | [3398 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae ba aa f2 24 29 99 42 b5 68 89 5b a2 64 26 78 |....$).B.h.[.d&x| +peer1.org1.example.com | 00000010 51 13 28 2c 68 6a cd 60 8d 56 7d 83 b7 b3 1c 69 |Q.(,hj.`.V}....i| +peer1.org1.example.com | [3399 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e d5 2e 0f fa 16 f4 f9 e6 69 36 bc |0D. .........i6.| +peer1.org1.example.com | 00000010 ef f8 a3 9a 55 37 19 71 17 ff 46 d7 3d ca 2d f3 |....U7.q..F.=.-.| +peer1.org1.example.com | 00000020 0f 7a 9f 9f 02 20 1a 1b 29 51 86 0f 02 b5 7e e9 |.z... ..)Q....~.| +peer1.org1.example.com | 00000030 95 84 e0 4a ff e1 b3 22 15 df 6b 07 ad fb 66 8d |...J..."..k...f.| +peer1.org1.example.com | 00000040 33 da f0 35 1e ad |3..5..| +peer1.org1.example.com | [339a 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026900d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [339b 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026900d0 gate 1589998883941774600 evaluation succeeds +peer1.org1.example.com | [339c 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3468 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3469 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [346a 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003563d40 gate 1589998875613981600 evaluation starts +peer0.org2.example.com | [346b 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003563d40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [346c 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003563d40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [346d 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003563d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [346e 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003563d40 principal evaluation fails +peer0.org2.example.com | [346f 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003563d40 gate 1589998875613981600 evaluation fails +peer0.org2.example.com | [3470 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3471 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3472 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3473 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035862b0 gate 1589998875614457800 evaluation starts +peer0.org2.example.com | [3474 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035862b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3475 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035862b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3476 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035862b0 principal matched by identity 0 +peer0.org2.example.com | [3477 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org2.example.com | [3478 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org2.example.com | [3479 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035862b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [347a 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035862b0 gate 1589998875614457800 evaluation succeeds +peer0.org2.example.com | [347b 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [347c 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [347d 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [347e 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [347f 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3480 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3481 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3482 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3483 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3484 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3485 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3486 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3487 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3488 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a250 gate 1589998875631124300 evaluation starts +peer1.org2.example.com | [343f 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3440 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3441 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3442 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3443 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3444 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3445 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8220 gate 1589998876462284100 evaluation starts +peer1.org2.example.com | [3446 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3447 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8220 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3448 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3449 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8220 principal evaluation fails +peer1.org2.example.com | [344a 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8220 gate 1589998876462284100 evaluation fails +peer1.org2.example.com | [344b 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [344c 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [344d 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [344e 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8790 gate 1589998876462564600 evaluation starts +peer1.org2.example.com | [344f 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8790 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3450 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8790 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3451 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8790 principal matched by identity 0 +peer1.org2.example.com | [3452 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer1.org2.example.com | [3453 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org2.example.com | [3454 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8790 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3455 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d8790 gate 1589998876462564600 evaluation succeeds +peer1.org2.example.com | [3456 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3457 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3458 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3459 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [345a 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [345b 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [345c 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [345d 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [345e 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [345f 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3460 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3461 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3462 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9990 gate 1589998876464972000 evaluation starts +peer1.org2.example.com | [3463 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9990 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3464 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9990 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3465 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3466 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9990 principal evaluation fails +peer1.org2.example.com | [3467 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9990 gate 1589998876464972000 evaluation fails +peer1.org2.example.com | [3468 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3469 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [346a 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [346b 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9f00 gate 1589998876465552000 evaluation starts +peer1.org2.example.com | [346c 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9f00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [346d 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9f00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [346e 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9f00 principal matched by identity 0 +peer1.org2.example.com | [346f 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org2.example.com | [3470 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org2.example.com | [3471 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9f00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3472 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d9f00 gate 1589998876465552000 evaluation succeeds +peer0.org1.example.com | [3321 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3322 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3323 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3324 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3325 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3326 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3327 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 gate 1589998875631255200 evaluation starts +peer0.org1.example.com | [3328 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3329 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [332a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 principal matched by identity 0 +peer0.org1.example.com | [332b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org1.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org1.example.com | [332c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org1.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org1.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0003b62e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [332e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 gate 1589998875631255200 evaluation succeeds +peer0.org1.example.com | [332f 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3330 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3331 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3332 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3333 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +peer0.org1.example.com | 00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +peer0.org1.example.com | [3334 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +peer0.org1.example.com | 00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +peer0.org1.example.com | 00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +peer0.org1.example.com | 00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +peer0.org1.example.com | 00000040 44 85 f3 ea d6 67 |D....g| +peer0.org1.example.com | [3335 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3336 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3337 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3338 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3339 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [333a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [333b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [333c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3473 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3474 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3475 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3476 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3477 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org2.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org2.example.com | [3478 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org2.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org2.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org2.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org2.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org2.example.com | [3479 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org2.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer1.org2.example.com | [347a 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer1.org2.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer1.org2.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer1.org2.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer1.org2.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer1.org2.example.com | [347b 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [347c 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org2.example.com | [347d 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer1.org2.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer1.org2.example.com | [347e 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer1.org2.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer1.org2.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer1.org2.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer1.org2.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer1.org2.example.com | [347f 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3480 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [339d 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [339e 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [339f 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [33a0 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33a1 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [33a2 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [33a3 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [33a4 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [33a5 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33a6 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33a7 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33a8 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33a9 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33aa 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33ab 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33ac 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33ad 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33ae 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [33af 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33b0 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33b1 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [33b2 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33b3 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33b4 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33b5 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33b6 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33b7 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33b8 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33b9 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33ba 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33bb 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33bc 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33bd 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33be 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33bf 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33c0 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [333d 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 gate 1589998875639470900 evaluation starts +peer0.org1.example.com | [333e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [333f 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3340 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 principal matched by identity 0 +peer0.org1.example.com | [3341 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org1.example.com | [3342 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org1.example.com | [3343 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3344 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 gate 1589998875639470900 evaluation succeeds +peer0.org1.example.com | [3345 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3346 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3347 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3348 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3349 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [334a 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [334b 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [334c 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [334d 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [334e 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [334f 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 gate 1589998875643403600 evaluation starts +peer0.org1.example.com | [3350 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3351 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3352 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 principal matched by identity 0 +peer0.org1.example.com | [3353 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org1.example.com | [3354 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org1.example.com | [3355 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3356 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 gate 1589998875643403600 evaluation succeeds +peer0.org1.example.com | [3357 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3358 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3359 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [335a 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [335b 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [335c 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [335d 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [335e 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [335f 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610101801 +peer0.org1.example.com | [3360 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B4113FEAAB70A896728057585FF5C6B99B4A597FCFE2063721B9BD56FF94D03 +peer0.org1.example.com | [3361 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [3362 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3363 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3364 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3365 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3366 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3367 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3368 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3369 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [336a 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [336b 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [336c 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [336d 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [336e 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [336f 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3370 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3371 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3372 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3373 05-20 18:21:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer0.org1.example.com | [3374 05-20 18:21:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer0.org1.example.com | [3375 05-20 18:21:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer0.org1.example.com | [3376 05-20 18:21:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3377 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3378 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3489 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [348a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a250 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [348b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [348c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a250 principal evaluation fails +peer0.org2.example.com | [348d 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a250 gate 1589998875631124300 evaluation fails +peer0.org2.example.com | [348e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [348f 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3490 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3491 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a7c0 gate 1589998875635559500 evaluation starts +peer0.org2.example.com | [3492 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a7c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3493 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a7c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3494 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a7c0 principal matched by identity 0 +peer0.org2.example.com | [3495 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org2.example.com | [3496 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org2.example.com | [3497 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a7c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3498 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359a7c0 gate 1589998875635559500 evaluation succeeds +peer0.org2.example.com | [3499 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [349a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [349b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [349c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [349d 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [349e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [349f 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [34a0 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a1 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a2 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a3 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34a4 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [34a5 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a6 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [34a7 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34a8 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34a9 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [33c1 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33c2 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [33c3 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c c9 60 43 dd 5d 60 05 b7 fa 4c 05 b5 7a 1d e6 |..`C.]`...L..z..| +peer1.org1.example.com | 00000010 d2 ff 2b 4c f1 74 e3 ea 2a 7d ff dc 7c 99 89 20 |..+L.t..*}..|.. | +peer1.org1.example.com | [33c4 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 ba 21 21 40 6b b6 b3 76 b1 c6 4b |0D. ..!!@k..v..K| +peer1.org1.example.com | 00000010 50 7b 98 5c 08 c1 1c d5 4a 72 db e8 ba a8 54 62 |P{.\....Jr....Tb| +peer1.org1.example.com | 00000020 4e 37 a1 a6 02 20 24 87 11 1e 3e d7 57 0c 4f 3f |N7... $...>.W.O?| +peer1.org1.example.com | 00000030 2f db 26 c7 38 ef 84 40 bf 5c dc 47 5b 53 fd 3e |/.&.8..@.\.G[S.>| +peer1.org1.example.com | 00000040 4a 69 1a 6d 6f e5 |Ji.mo.| +peer1.org1.example.com | [33c5 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33c6 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [33c7 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [33c8 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [33c9 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [33ca 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33cb 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33cc 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33cd 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33ce 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33cf 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33d0 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33d1 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33d2 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33d3 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33d4 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33d5 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [33d6 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33d7 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [33d8 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33d9 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33da 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33db 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33dc 05-20 18:21:24.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33dd 05-20 18:21:24.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [33de 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33df 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3481 05-20 18:21:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3482 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3483 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3484 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3485 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3486 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3487 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342e770 gate 1589998876471678100 evaluation starts +peer1.org2.example.com | [3488 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342e770 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3489 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342e770 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [348a 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342e770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [348b 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342e770 principal evaluation fails +peer1.org2.example.com | [348c 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342e770 gate 1589998876471678100 evaluation fails +peer1.org2.example.com | [348d 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [348e 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [348f 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3490 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342ece0 gate 1589998876472977800 evaluation starts +peer1.org2.example.com | [3491 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342ece0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3492 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342ece0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3493 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342ece0 principal matched by identity 0 +peer1.org2.example.com | [3494 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer1.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer1.org2.example.com | [3495 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer1.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer1.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer1.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer1.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer1.org2.example.com | [3496 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342ece0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3497 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342ece0 gate 1589998876472977800 evaluation succeeds +peer1.org2.example.com | [3498 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3499 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [349a 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [349b 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [349c 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [349d 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34aa 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34ab 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [34ac 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587570 gate 1589998875889274900 evaluation starts +peer0.org2.example.com | [34ad 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587570 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34ae 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587570 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [34af 05-20 18:21:15.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [34b0 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587570 principal evaluation fails +peer0.org2.example.com | [34b1 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587570 gate 1589998875889274900 evaluation fails +peer0.org2.example.com | [34b2 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34b3 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34b4 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34b5 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587ae0 gate 1589998875890557300 evaluation starts +peer0.org2.example.com | [34b6 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34b7 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587ae0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [34b8 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587ae0 principal matched by identity 0 +peer0.org2.example.com | [34b9 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org2.example.com | [34ba 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org2.example.com | [34bb 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587ae0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [34bc 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587ae0 gate 1589998875890557300 evaluation succeeds +peer0.org2.example.com | [34bd 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34be 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34bf 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34c0 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [34c1 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34c2 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34c3 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34c4 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34c5 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [34c6 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34c7 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [34c8 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ca6d0 gate 1589998875900029800 evaluation starts +peer0.org2.example.com | [34c9 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ca6d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34ca 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ca6d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [34cb 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ca6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [34cc 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ca6d0 principal evaluation fails +peer0.org2.example.com | [34cd 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ca6d0 gate 1589998875900029800 evaluation fails +peer0.org2.example.com | [34ce 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34cf 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34d0 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34d1 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cac40 gate 1589998875900682600 evaluation starts +peer0.org2.example.com | [34d2 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cac40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34d3 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cac40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [34d4 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cac40 principal matched by identity 0 +peer0.org2.example.com | [34d5 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org2.example.com | [34d6 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org2.example.com | [34d7 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cac40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [34d8 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cac40 gate 1589998875900682600 evaluation succeeds +peer0.org2.example.com | [34d9 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34da 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34db 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34dc 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [34dd 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34de 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34df 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e0 05-20 18:21:15.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [34e1 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e2 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e3 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [34e4 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34e5 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [34e6 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34e7 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [34e8 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34e9 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [34ea 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34eb 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34ec 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [34ed 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34ee 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [34ef 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e85f0 gate 1589998875922971800 evaluation starts +peer0.org2.example.com | [34f0 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e85f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34f1 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e85f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [34f2 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e85f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [34f3 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e85f0 principal evaluation fails +peer0.org2.example.com | [34f4 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e85f0 gate 1589998875922971800 evaluation fails +peer0.org1.example.com | [3379 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [337a 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [337b 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [337c 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [337d 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [337e 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org1.example.com | [337f 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org1.example.com | [3380 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3381 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3382 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3383 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org1.example.com | [3384 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org1.example.com | [3385 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3386 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3387 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3388 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3389 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org1.example.com | [33e0 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33e1 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [33e2 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [33e3 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33e4 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33e5 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33e6 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33e7 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [33e8 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [33e9 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33ea 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33eb 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33ec 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33ed 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [33ee 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [33ef 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [33f0 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [33f1 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33f2 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [33f3 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [33f4 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [33f5 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [33f6 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33f7 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [33f8 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33f9 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [33fa 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [33fb 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33fc 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [33fd 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [33fe 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [33ff 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [349e 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [349f 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34a0 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34a1 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [34a2 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [34a3 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [34a4 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342fee0 gate 1589998876476845800 evaluation starts +peer1.org2.example.com | [34a5 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342fee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34a6 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342fee0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [34a7 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342fee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [34a8 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342fee0 principal evaluation fails +peer1.org2.example.com | [34a9 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342fee0 gate 1589998876476845800 evaluation fails +peer1.org2.example.com | [34aa 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34ab 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34ac 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [34ad 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a450 gate 1589998876484033200 evaluation starts +peer1.org2.example.com | [34ae 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34af 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a450 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [34b0 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a450 principal matched by identity 0 +peer1.org2.example.com | [34b1 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer1.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer1.org2.example.com | [34b2 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer1.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer1.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer1.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer1.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer1.org2.example.com | [34b3 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a450 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34b4 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a450 gate 1589998876484033200 evaluation succeeds +peer1.org2.example.com | [34b5 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34b6 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34b7 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [34b8 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [34b9 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org2.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer1.org2.example.com | [34ba 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer1.org2.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer1.org2.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer1.org2.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer1.org2.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer1.org2.example.com | [34bb 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34bc 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [34bd 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [34be 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34bf 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34c0 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34c1 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34c2 05-20 18:21:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34c3 05-20 18:21:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34c4 05-20 18:21:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [34c5 05-20 18:21:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34c6 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34c7 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34c8 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [34c9 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34f5 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34f6 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34f7 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34f8 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8b60 gate 1589998875928555500 evaluation starts +peer0.org2.example.com | [34f9 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8b60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34fa 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8b60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [34fb 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8b60 principal matched by identity 0 +peer0.org2.example.com | [34fc 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org2.example.com | [34fd 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org2.example.com | [34fe 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8b60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [34ff 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e8b60 gate 1589998875928555500 evaluation succeeds +peer0.org2.example.com | [3500 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3501 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3502 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3503 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3504 05-20 18:21:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3505 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3506 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3507 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3508 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3509 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [350a 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [350b 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [350c 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [350d 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [350e 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [350f 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3510 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3511 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3512 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3513 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3514 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3515 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3400 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3401 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3402 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3403 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3404 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3405 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3406 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3407 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3408 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3409 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [340a 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [340b 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [340c 05-20 18:21:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [340d 05-20 18:21:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [340e 05-20 18:21:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [340f 05-20 18:21:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3410 05-20 18:21:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161039 +peer1.org1.example.com | [3411 05-20 18:21:24.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3FE3F3A9FA068C57129EA7D2BE3E138AE809FE98FF1A8FAFFCD970F753A93D46 +peer1.org1.example.com | [3412 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3413 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3414 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3415 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3416 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3417 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3418 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3419 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [341a 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [341b 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [341c 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [341d 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [341e 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [341f 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3420 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3421 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3422 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3423 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3424 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer1.org1.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer1.org1.example.com | [3425 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer1.org1.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer1.org1.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer1.org1.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer1.org1.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer1.org1.example.com | [3426 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3427 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 3a 6f 96 72 1d bd 6a f9 50 e0 |0E.!..:o.r..j.P.| +peer1.org1.example.com | 00000010 2d 9f d0 d9 6f ec 8c 62 05 c1 9c 67 4d de 0e 32 |-...o..b...gM..2| +peer1.org1.example.com | 00000020 10 ca 21 99 31 02 20 40 fa 15 5b 14 bc 3c 77 4d |..!.1. @..[.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3429 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [342a 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [342b 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [342c 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [342d 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [342e 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [342f 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3430 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3431 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer1.org1.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer1.org1.example.com | [3432 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer1.org1.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer1.org1.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer1.org1.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer1.org1.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer1.org1.example.com | [3433 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3434 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3435 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3436 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3437 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3438 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3439 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org1.example.com | [338a 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org1.example.com | [338b 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [338c 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [338d 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [338e 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [338f 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3390 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3391 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3392 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3393 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3394 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3395 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3396 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3397 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3398 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3399 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [339a 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [339b 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [339c 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 gate 1589998876136567500 evaluation starts +peer0.org1.example.com | [339d 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [339e 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [339f 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 principal matched by identity 0 +peer0.org1.example.com | [33a0 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org1.example.com | [33a2 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org1.example.com | [33a3 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [33a4 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 gate 1589998876136567500 evaluation succeeds +peer0.org1.example.com | [33a5 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33a6 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33a7 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [33a8 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [33a9 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33aa 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33a1 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [33ab 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [33ac 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33ad 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [33ae 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33af 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33b0 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [33b1 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [33b2 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [33b3 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 gate 1589998876163415600 evaluation starts +peer0.org1.example.com | [33b4 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [33b5 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [33b6 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 principal matched by identity 0 +peer0.org1.example.com | [33b7 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org1.example.com | [33b8 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org1.example.com | [33b9 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [33ba 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 gate 1589998876163415600 evaluation succeeds +peer0.org1.example.com | [33bb 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33bc 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33bd 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [33be 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [33bf 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33c0 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33c1 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [343a 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [343b 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [343c 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer1.org1.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer1.org1.example.com | [343d 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer1.org1.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer1.org1.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer1.org1.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer1.org1.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer1.org1.example.com | [343e 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [343f 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3440 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3441 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3442 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3443 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3444 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3445 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3446 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3447 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3448 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3449 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [344a 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [344b 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [344c 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [344d 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [344e 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [344f 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3450 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3451 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3452 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3453 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3454 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3455 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3456 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ca 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [34cb 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003356c90 gate 1589998876595010900 evaluation starts +peer1.org2.example.com | [34cc 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003356c90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34cd 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003356c90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [34ce 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003356c90 principal matched by identity 0 +peer1.org2.example.com | [34cf 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 a3 ec 61 a4 ad 59 ea 0d d4 21 2b 5b 17 ab 9a |`..a..Y...!+[...| +peer1.org2.example.com | 00000010 9c a0 1a 50 b3 8f 56 15 01 e6 88 09 86 5e bd cd |...P..V......^..| +peer1.org2.example.com | [34d0 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 48 aa fc f8 38 9b 88 7c 3f 1b |0E.!..H...8..|?.| +peer1.org2.example.com | 00000010 33 c7 ff 2b 76 bb aa af ac cb 54 f5 33 53 2f 7f |3..+v.....T.3S/.| +peer1.org2.example.com | 00000020 c4 c8 ab b7 90 02 20 63 73 30 8d 2b 48 d1 6b 6c |...... cs0.+H.kl| +peer1.org2.example.com | 00000030 ba a4 0e 90 77 93 77 24 a2 66 27 82 ed 77 88 a8 |....w.w$.f'..w..| +peer1.org2.example.com | 00000040 d0 41 f6 eb c5 5f 62 |.A..._b| +peer1.org2.example.com | [34d1 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003356c90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34d2 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003356c90 gate 1589998876595010900 evaluation succeeds +peer1.org2.example.com | [34d3 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [34d4 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [34d5 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [34d6 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [34d7 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org2.example.com | [34d8 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org2.example.com | [34d9 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [34da 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +peer1.org2.example.com | [34db 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [34dc 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer1.org2.example.com | [34dd 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer1.org2.example.com | [34de 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer1.org2.example.com | [34df 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer1.org2.example.com | [34e0 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer1.org2.example.com | [34e1 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer1.org2.example.com | [34e2 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [34e3 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003171a40 env 0xc003796ff0 txn 0 +peer1.org2.example.com | [34e4 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003796ff0 +peer1.org2.example.com | [34e5 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +peer1.org2.example.com | [34e6 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [34e7 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [34e8 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34e9 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [34ea 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | [34eb 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [34ec 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 7e c4 71 ef b0 20 ae cd 05 10 be 77 ae f6 68 |.~.q.. .....w..h| +peer1.org2.example.com | 00000010 4b 20 de 34 61 55 df 2a 9b 70 6c 05 f8 d9 58 f1 |K .4aU.*.pl...X.| +peer1.org2.example.com | [34ed 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 f1 17 4c a9 a9 d6 1e 50 a5 18 |0E.!....L....P..| +peer1.org2.example.com | 00000010 e7 94 ff 3a 5b 3e 7f 2a d7 2f 47 85 a5 2a e8 5a |...:[>.*./G..*.Z| +peer1.org2.example.com | 00000020 8a 68 49 69 f0 02 20 3c f9 13 4b 83 24 18 9c c7 |.hIi.. <..K.$...| +peer1.org2.example.com | 00000030 06 c2 76 90 44 10 43 e8 4b 7a ea 74 b6 08 d1 7e |..v.D.C.Kz.t...~| +peer1.org2.example.com | 00000040 9d 56 77 6a 8e 23 e5 |.Vwj.#.| +peer1.org2.example.com | [34ee 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [3516 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3517 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3518 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3519 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [351a 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e9ff0 gate 1589998876122664200 evaluation starts +peer0.org2.example.com | [351b 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e9ff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [351c 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e9ff0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [351d 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e9ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [351e 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e9ff0 principal evaluation fails +peer0.org2.example.com | [351f 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e9ff0 gate 1589998876122664200 evaluation fails +peer0.org2.example.com | [3520 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3521 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3522 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3523 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e560 gate 1589998876122960800 evaluation starts +peer0.org2.example.com | [3524 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3525 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e560 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3526 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e560 principal matched by identity 0 +peer0.org2.example.com | [3527 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org2.example.com | [3528 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org2.example.com | [3529 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [352a 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e560 gate 1589998876122960800 evaluation succeeds +peer0.org2.example.com | [352b 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [352c 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [352d 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [352e 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3530 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3531 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [352f 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [3532 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3533 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3534 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3536 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3537 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3538 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3535 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [353a 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [353b 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [353c 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [353d 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [353e 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [353f 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360f8f0 gate 1589998876129500800 evaluation starts +peer0.org2.example.com | [3540 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360f8f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3541 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360f8f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3542 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360f8f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3543 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360f8f0 principal evaluation fails +peer0.org2.example.com | [3544 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360f8f0 gate 1589998876129500800 evaluation fails +peer0.org2.example.com | [3545 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3546 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3547 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3548 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fe60 gate 1589998876130508200 evaluation starts +peer0.org2.example.com | [3549 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fe60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [354a 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fe60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [354b 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fe60 principal matched by identity 0 +peer0.org2.example.com | [354c 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org2.example.com | [354d 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org2.example.com | [354e 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fe60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [354f 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fe60 gate 1589998876130508200 evaluation succeeds +peer0.org2.example.com | [3550 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3551 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3552 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3553 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3554 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org2.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org2.example.com | [3555 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org2.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org2.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org2.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org2.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org2.example.com | [3556 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org2.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org2.example.com | [3557 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org2.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org2.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org2.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org2.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org2.example.com | [3558 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3559 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [355a 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [355b 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [355c 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [355d 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036316d0 gate 1589998876135406100 evaluation starts +peer0.org2.example.com | [355e 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036316d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [355f 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036316d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3560 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036316d0 principal matched by identity 0 +peer0.org2.example.com | [3561 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org2.example.com | [34ef 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0028d8000, header channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +peer1.org2.example.com | [34f0 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [34f1 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f2 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [34f3 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org2.example.com | [34f4 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [34f5 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +peer1.org2.example.com | [34f6 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org2.example.com | [34f7 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00294f400 +peer1.org2.example.com | [34f8 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [e713bb23-5bfb-4640-93fc-2589334782dd] +peer1.org2.example.com | [34f9 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [34fa 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e713bb23-5bfb-4640-93fc-2589334782dd] +peer1.org2.example.com | [34fb 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer1.org2.example.com | [34fc 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [80cc0639-d7f7-473c-a1cf-5aec374cdbd0] +peer1.org2.example.com | [34fe 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [80cc0639-d7f7-473c-a1cf-5aec374cdbd0] +peer1.org2.example.com | [34ff 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 gate 1589998876618257300 evaluation starts +peer1.org2.example.com | [3500 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3501 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3502 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 principal matched by identity 0 +peer1.org2.example.com | [3503 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d b5 79 02 a0 13 24 af ee 36 b8 e5 ce 52 47 37 |..y...$..6...RG7| +peer1.org2.example.com | 00000010 ae 23 cb ec c7 9b 1b 57 15 1a 12 c3 73 ab e1 33 |.#.....W....s..3| +peer1.org2.example.com | [3504 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c0 40 ba fd 54 d1 92 c4 ba 63 |0E.!...@..T....c| +peer1.org2.example.com | 00000010 18 50 b5 27 31 85 77 5c 74 2d 19 c2 1e 4b 9d e3 |.P.'1.w\t-...K..| +peer1.org2.example.com | 00000020 38 f5 37 e3 7c 02 20 0c 58 b1 88 a5 16 5e d1 c6 |8.7.|. .X....^..| +peer1.org2.example.com | 00000030 6d 9f 41 d6 b1 4c 07 49 8c b4 f5 07 dd 09 10 78 |m.A..L.I.......x| +peer1.org2.example.com | 00000040 2b 80 b1 b5 92 a5 b3 |+......| +peer1.org2.example.com | [3505 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3506 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [3507 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 skipping identity 0 because it has already been used +peer1.org2.example.com | [3508 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 principal evaluation fails +peer1.org2.example.com | [3509 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347acd0 gate 1589998876618257300 evaluation succeeds +peer1.org2.example.com | [350a 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [583add5f-8897-4429-9e6a-d2cef7ffbf08] +peer1.org2.example.com | [350b 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [583add5f-8897-4429-9e6a-d2cef7ffbf08] +peer1.org2.example.com | [350c 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | [350d 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb appears to be valid +peer1.org2.example.com | [350e 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00294f400 +peer1.org2.example.com | [350f 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003171a40 env 0xc003796ff0 txn 0 +peer1.org2.example.com | [3510 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [3511 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 22ms +peer1.org2.example.com | [3512 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [3513 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [3514 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer1.org2.example.com | [3515 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [3516 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [3517 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [3518 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer1.org2.example.com | [3519 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [351a 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [351b 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | [351c 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org2.example.com | [351d 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org2.example.com | [3562 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org2.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org2.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org2.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org2.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org2.example.com | [3563 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036316d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3564 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036316d0 gate 1589998876135406100 evaluation succeeds +peer0.org2.example.com | [3565 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3566 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3567 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3568 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3569 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [356a 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 766 bytes, Signature: 0 bytes +peer0.org2.example.com | [356b 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +peer0.org2.example.com | 00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +peer0.org2.example.com | [356c 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +peer0.org2.example.com | 00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +peer0.org2.example.com | 00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org2.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org2.example.com | [356e 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org2.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org2.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org2.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org2.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org2.example.com | [356f 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3570 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3571 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3572 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3573 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3574 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3575 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3576 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3577 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649850 gate 1589998876141651100 evaluation starts +peer0.org2.example.com | [3578 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649850 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3579 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649850 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [357a 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [357b 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649850 principal evaluation fails +peer0.org2.example.com | [357c 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649850 gate 1589998876141651100 evaluation fails +peer0.org2.example.com | [357d 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [357e 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [357f 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3580 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649dc0 gate 1589998876142539500 evaluation starts +peer0.org2.example.com | [3581 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3582 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649dc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3583 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649dc0 principal matched by identity 0 +peer0.org2.example.com | [3584 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org2.example.com | [3585 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org2.example.com | [3586 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649dc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3587 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003649dc0 gate 1589998876142539500 evaluation succeeds +peer0.org2.example.com | [3588 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3589 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [358a 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [358b 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [358c 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [358d 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [358e 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [358f 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3590 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3591 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3592 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3593 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3594 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efc0 gate 1589998876145964400 evaluation starts +peer0.org2.example.com | [3595 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3596 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3597 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3598 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efc0 principal evaluation fails +peer0.org2.example.com | [3599 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365efc0 gate 1589998876145964400 evaluation fails +peer0.org2.example.com | [359a 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [359b 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [359c 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [359d 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f530 gate 1589998876146404000 evaluation starts +peer0.org2.example.com | [359e 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [359f 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f530 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [35a0 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f530 principal matched by identity 0 +peer0.org2.example.com | [35a1 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org2.example.com | [35a2 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org2.example.com | [35a3 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [35a4 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f530 gate 1589998876146404000 evaluation succeeds +peer0.org2.example.com | [35a5 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35a6 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35a7 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35a8 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35a9 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35aa 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [35ab 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35ac 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35ad 05-20 18:21:16.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35ae 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [35af 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35b0 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35b1 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [35b2 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [35b3 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [35b4 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e980 gate 1589998876150693700 evaluation starts +peer0.org2.example.com | [35b5 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e980 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35b6 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e980 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [35b7 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [35b8 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e980 principal evaluation fails +peer0.org2.example.com | [35b9 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e980 gate 1589998876150693700 evaluation fails +peer0.org2.example.com | [35ba 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [35bb 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [35bc 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [35bd 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367eef0 gate 1589998876155776600 evaluation starts +peer0.org2.example.com | [35be 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367eef0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [33c2 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [33c3 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33c4 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33c5 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33c6 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33c7 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [33c8 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [33c9 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33ca 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [33cb 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33cc 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33cd 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [33ce 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [33cf 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [33d0 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 gate 1589998876437216700 evaluation starts +peer0.org1.example.com | [33d1 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [33d2 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [33d3 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 principal matched by identity 0 +peer0.org1.example.com | [33d4 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org1.example.com | [33d5 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org1.example.com | [33d6 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [33d7 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 gate 1589998876437216700 evaluation succeeds +peer0.org1.example.com | [33d8 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33d9 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33da 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [33db 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [33dc 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33dd 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33de 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [33df 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3457 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3458 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3459 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [345a 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [345b 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [345c 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [345d 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ae3b0 gate 1589998884926519100 evaluation starts +peer1.org1.example.com | [345e 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ae3b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [345f 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ae3b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3460 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ae3b0 principal matched by identity 0 +peer1.org1.example.com | [3461 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer1.org1.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer1.org1.example.com | [3462 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer1.org1.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer1.org1.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer1.org1.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer1.org1.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer1.org1.example.com | [3463 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ae3b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3464 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ae3b0 gate 1589998884926519100 evaluation succeeds +peer1.org1.example.com | [3465 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3466 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3467 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3468 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3469 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [346a 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [346b 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [346c 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [346d 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [346e 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [346f 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3470 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3471 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3472 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3473 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3474 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33e0 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [33e1 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [33e2 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e3 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [33e4 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [33e5 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [33e6 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [33e7 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e8 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33e9 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33ea 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [33eb 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [33ec 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [33ed 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 gate 1589998876589398000 evaluation starts +peer0.org1.example.com | [33ee 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [33ef 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [33f0 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 principal matched by identity 0 +peer0.org1.example.com | [33f1 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 a3 ec 61 a4 ad 59 ea 0d d4 21 2b 5b 17 ab 9a |`..a..Y...!+[...| +peer0.org1.example.com | 00000010 9c a0 1a 50 b3 8f 56 15 01 e6 88 09 86 5e bd cd |...P..V......^..| +peer0.org1.example.com | [33f2 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 48 aa fc f8 38 9b 88 7c 3f 1b |0E.!..H...8..|?.| +peer0.org1.example.com | 00000010 33 c7 ff 2b 76 bb aa af ac cb 54 f5 33 53 2f 7f |3..+v.....T.3S/.| +peer0.org1.example.com | 00000020 c4 c8 ab b7 90 02 20 63 73 30 8d 2b 48 d1 6b 6c |...... cs0.+H.kl| +peer0.org1.example.com | 00000030 ba a4 0e 90 77 93 77 24 a2 66 27 82 ed 77 88 a8 |....w.w$.f'..w..| +peer0.org1.example.com | 00000040 d0 41 f6 eb c5 5f 62 |.A..._b| +peer0.org1.example.com | [33f3 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [33f4 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 gate 1589998876589398000 evaluation succeeds +peer0.org1.example.com | [33f5 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [33f6 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [33f7 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [33f8 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [33f9 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org1.example.com | [33fa 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org1.example.com | [33fb 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [33fc 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org1.example.com | [33fd 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org1.example.com | [33fe 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org1.example.com | [33ff 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org1.example.com | [3400 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org1.example.com | [3401 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [3402 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0034ca6c0 env 0xc0028394f0 txn 0 +peer0.org1.example.com | [3403 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0028394f0 +peer0.org1.example.com | [3404 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +peer0.org1.example.com | [3405 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3406 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +peer0.org1.example.com | [3407 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3408 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [35bf 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367eef0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [35c0 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367eef0 principal matched by identity 0 +peer0.org2.example.com | [35c1 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org2.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org2.example.com | [35c2 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org2.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org2.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org2.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org2.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org2.example.com | [35c3 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367eef0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3475 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3476 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > alive: +peer1.org1.example.com | [3477 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [3478 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3479 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [347a 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [347b 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [347c 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [347d 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer1.org1.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer1.org1.example.com | [347e 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer1.org1.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer1.org1.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer1.org1.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer1.org1.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer1.org1.example.com | [347f 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3480 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 3d 9f c4 1d b5 e6 49 a1 c7 04 af |0D. 1=.....I....| +peer1.org1.example.com | 00000010 f9 a8 0d d0 37 b4 21 df ae 99 8c 00 7b 96 50 cd |....7.!.....{.P.| +peer1.org1.example.com | 00000020 71 40 a3 1b 02 20 13 4b d0 c2 9c cb 9d 40 1f 58 |q@... .K.....@.X| +peer1.org1.example.com | 00000030 6b ae db 46 f7 cb c4 1b d8 28 1f 07 e7 93 a1 9a |k..F.....(......| +peer1.org1.example.com | 00000040 af fe aa 58 f2 69 |...X.i| +peer1.org1.example.com | [3481 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3482 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [3483 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3484 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3485 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3486 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3487 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3488 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [351e 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org2.example.com | [351f 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [3520 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org2.example.com | [3521 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] marked as valid by state validator +peer1.org2.example.com | [3522 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002e89300), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002e89340)} +peer1.org2.example.com | [3523 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [3524 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [3525 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [3526 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer1.org2.example.com | [3527 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer1.org2.example.com | [3528 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer1.org2.example.com | [3529 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer1.org2.example.com | [352a 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0xa4, 0x2e, 0x9a, 0xd0, 0x47, 0x9a, 0xd6, 0x54, 0xc0, 0x1a, 0xaa, 0x8c, 0xcf, 0x92, 0x89, 0x7b, 0x18, 0x78, 0x45, 0x2d, 0x50, 0x36, 0x95, 0xaf, 0xa8, 0x78, 0xd1, 0xa7, 0xb2, 0x8a, 0xb1, 0xaf} txOffsets= +peer1.org2.example.com | txId=523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb locPointer=offset=70, bytesLength=2982 +peer1.org2.example.com | ] +peer1.org2.example.com | [352b 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2982] for tx ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to txid-index +peer1.org2.example.com | [352c 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2982] for tx number:[0] ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to blockNumTranNum index +peer1.org2.example.com | [352d 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93507], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org2.example.com | [352e 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org2.example.com | [352f 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer1.org2.example.com | [3530 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer1.org2.example.com | [3531 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [34fd 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3533 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3535 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3536 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3537 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3538 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes +peer1.org2.example.com | [3539 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3532 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [353a 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [353b 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [353c 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [3534 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [353d 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | [353e 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [353f 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3541 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3542 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3540 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [3543 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer1.org1.example.com | [3489 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [348a 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [348b 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [348c 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [348d 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" secret_envelope: > alive: +peer1.org1.example.com | [348e 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [348f 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3490 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3491 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3492 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3493 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3494 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3495 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3496 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3497 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3498 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3499 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [349a 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [349b 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [349c 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [349d 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [349e 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [349f 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [34a0 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35c4 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367eef0 gate 1589998876155776600 evaluation succeeds +peer0.org2.example.com | [35c5 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35c6 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35c7 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35c8 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35c9 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35ca 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35cb 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [35cc 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35cd 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35ce 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [35cf 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [35d0 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [35d1 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a0f0 gate 1589998876159566800 evaluation starts +peer0.org2.example.com | [35d2 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a0f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35d3 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a0f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [35d4 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [35d5 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a0f0 principal evaluation fails +peer0.org2.example.com | [35d6 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a0f0 gate 1589998876159566800 evaluation fails +peer0.org2.example.com | [35d7 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [35d8 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [35d9 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [35da 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a660 gate 1589998876159988500 evaluation starts +peer0.org2.example.com | [35db 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35dc 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a660 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [35dd 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a660 principal matched by identity 0 +peer0.org2.example.com | [35de 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org2.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org2.example.com | [35df 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org2.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org2.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org2.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org2.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org2.example.com | [35e0 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a660 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [35e1 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00369a660 gate 1589998876159988500 evaluation succeeds +peer0.org2.example.com | [35e2 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35e3 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35e4 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35e5 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35e6 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org2.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org2.example.com | [35e7 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org2.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org2.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org2.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org2.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org2.example.com | [35e8 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org2.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org2.example.com | [35e9 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org2.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org2.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org2.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org2.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org2.example.com | [35ea 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3539 05-20 18:21:16.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [35eb 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35ec 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [35ed 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 22 7f d9 37 05 5b fe e7 54 c9 be ca e0 ad 28 |."..7.[..T.....(| +peer0.org2.example.com | 00000010 dd 23 ff ab 0d a0 02 16 db 92 70 44 7b 6a 93 1c |.#........pD{j..| +peer0.org2.example.com | [35ee 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 96 94 2d 00 ab b2 50 aa 26 15 39 |0D. $..-...P.&.9| +peer0.org2.example.com | 00000010 8a 98 6b 8a f3 f4 ec a0 58 e3 61 72 b6 3f 9b 63 |..k.....X.ar.?.c| +peer0.org2.example.com | 00000020 8f 65 10 39 02 20 5f 35 78 05 bd 60 e3 03 a3 d8 |.e.9. _5x..`....| +peer0.org2.example.com | 00000030 08 12 9f 26 d3 64 42 37 00 4b 76 a3 fe eb e9 d3 |...&.dB7.Kv.....| +peer0.org2.example.com | 00000040 6c 82 a6 90 3b 76 |l...;v| +peer0.org2.example.com | [35ef 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f0 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3544 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3409 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [34a1 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3545 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [340a 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer1.org1.example.com | [34a2 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35f1 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3546 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [340b 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [34a3 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35f2 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer1.org2.example.com | [3547 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [35f3 05-20 18:21:16.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org1.example.com | [340c 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [34a4 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3548 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org2.example.com | [35f4 05-20 18:21:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [340d 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 7e c4 71 ef b0 20 ae cd 05 10 be 77 ae f6 68 |.~.q.. .....w..h| +peer1.org1.example.com | [34a5 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [354b 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer1.org2.example.com | [3549 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [354c 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [34a6 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [35f5 05-20 18:21:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34a7 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00256c740 gate 1589998885221891300 evaluation starts +peer0.org2.example.com | [35f6 05-20 18:21:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [354d 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e80e0 gate 1589998876673409300 evaluation starts +peer0.org1.example.com | 00000010 4b 20 de 34 61 55 df 2a 9b 70 6c 05 f8 d9 58 f1 |K .4aU.*.pl...X.| +peer1.org1.example.com | [34a8 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00256c740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35f7 05-20 18:21:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [354a 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [340e 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 f1 17 4c a9 a9 d6 1e 50 a5 18 |0E.!....L....P..| +peer1.org1.example.com | [34a9 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00256c740 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [35f8 05-20 18:21:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [354f 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org1.example.com | 00000010 e7 94 ff 3a 5b 3e 7f 2a d7 2f 47 85 a5 2a e8 5a |...:[>.*./G..*.Z| +peer1.org1.example.com | [34aa 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00256c740 principal matched by identity 0 +peer0.org2.example.com | [35f9 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3550 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org1.example.com | 00000020 8a 68 49 69 f0 02 20 3c f9 13 4b 83 24 18 9c c7 |.hIi.. <..K.$...| +peer0.org1.example.com | 00000030 06 c2 76 90 44 10 43 e8 4b 7a ea 74 b6 08 d1 7e |..v.D.C.Kz.t...~| +peer0.org2.example.com | [35fa 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [35fb 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 9d 56 77 6a 8e 23 e5 |.Vwj.#.| +peer1.org1.example.com | [34ab 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 17 ca 1c e9 94 63 04 ee b0 29 0d 30 67 8d 01 |......c...).0g..| +peer0.org2.example.com | [35fc 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer0.org2.example.com | [35fd 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer1.org2.example.com | [354e 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e80e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 1d 4b 42 72 7c 6f 36 9b 97 86 eb 47 d9 8e f0 2d |.KBr|o6....G...-| +peer0.org2.example.com | [35fe 05-20 18:21:16.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35ff 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3551 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer1.org1.example.com | [34ac 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8e dd 23 fa 21 3c f0 19 20 e2 |0E.!....#.!<.. .| +peer0.org2.example.com | [3600 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3601 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3602 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3603 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 b5 34 85 9e a9 24 67 bb 0c b5 51 ba 8d d2 c0 46 |.4...$g...Q....F| +peer0.org2.example.com | [3604 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer1.org1.example.com | 00000020 25 5d fc 57 58 02 20 65 dd ea c7 45 18 d0 0a b3 |%].WX. e...E....| +peer1.org1.example.com | 00000030 3d 15 ce bc 17 04 6f ff 99 5b 87 e8 95 9f 51 61 |=.....o..[....Qa| +peer0.org2.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org2.example.com | [3605 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org2.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org2.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org2.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org2.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org2.example.com | [3606 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3552 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 50ms (state_validation=6ms block_and_pvtdata_commit=12ms state_commit=28ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer1.org2.example.com | [3553 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3554 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F8B6E8FEC1EFB38816...08051A0C0A0565787030321203312E30 +peer1.org2.example.com | [3555 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2A7E93133B688FEEA9E2FA97D7A5354C115236B1FAA2F3910D2B3F532A48B9E1 +peer1.org2.example.com | [3556 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer1.org2.example.com | [3557 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e80e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3558 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e80e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3559 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e80e0 principal evaluation fails +peer1.org2.example.com | [355a 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e80e0 gate 1589998876673409300 evaluation fails +peer1.org2.example.com | [355b 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [355c 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [355d 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [355e 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e8650 gate 1589998876684584900 evaluation starts +peer1.org2.example.com | [355f 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e8650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3560 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e8650 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3561 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e8650 principal matched by identity 0 +peer1.org2.example.com | [3562 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer1.org2.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer1.org2.example.com | [3563 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer1.org2.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer1.org2.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer1.org2.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer1.org2.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer1.org2.example.com | [3564 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e8650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3565 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e8650 gate 1589998876684584900 evaluation succeeds +peer1.org2.example.com | [3566 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3567 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3568 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3569 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 f5 4c ff 9c 63 33 48 |.L..c3H| +peer1.org1.example.com | [34ad 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00256c740 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [34ae 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00256c740 gate 1589998885221891300 evaluation succeeds +peer1.org1.example.com | [34af 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34b0 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34b1 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34b2 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [34b3 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [34b4 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [34b5 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [34b6 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [34b7 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [34b8 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34b9 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34ba 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34bb 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [34bc 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34bd 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34be 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34bf 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [340f 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3410 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002680800, header channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +peer0.org1.example.com | [3411 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [3412 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [3413 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [3414 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [3415 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +peer0.org1.example.com | [3416 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [3417 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00261d800 +peer0.org1.example.com | [3418 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1aa5a4ec-ef09-4241-983e-1e35c5c71757] +peer0.org1.example.com | [3419 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [341a 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1aa5a4ec-ef09-4241-983e-1e35c5c71757] +peer0.org1.example.com | [341b 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [341c 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b481a9f7-4842-4b1f-b04f-1e32c1820c6c] +peer0.org1.example.com | [341d 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b481a9f7-4842-4b1f-b04f-1e32c1820c6c] +peer0.org1.example.com | [341e 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 gate 1589998876601436800 evaluation starts +peer0.org1.example.com | [341f 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3420 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3421 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 principal matched by identity 0 +peer0.org1.example.com | [3422 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d b5 79 02 a0 13 24 af ee 36 b8 e5 ce 52 47 37 |..y...$..6...RG7| +peer0.org1.example.com | 00000010 ae 23 cb ec c7 9b 1b 57 15 1a 12 c3 73 ab e1 33 |.#.....W....s..3| +peer0.org1.example.com | [3423 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c0 40 ba fd 54 d1 92 c4 ba 63 |0E.!...@..T....c| +peer0.org1.example.com | 00000010 18 50 b5 27 31 85 77 5c 74 2d 19 c2 1e 4b 9d e3 |.P.'1.w\t-...K..| +peer0.org1.example.com | 00000020 38 f5 37 e3 7c 02 20 0c 58 b1 88 a5 16 5e d1 c6 |8.7.|. .X....^..| +peer0.org1.example.com | 00000030 6d 9f 41 d6 b1 4c 07 49 8c b4 f5 07 dd 09 10 78 |m.A..L.I.......x| +peer0.org1.example.com | 00000040 2b 80 b1 b5 92 a5 b3 |+......| +peer0.org1.example.com | [3424 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3425 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3427 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3426 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [3428 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 skipping identity 0 because it has already been used +peer0.org1.example.com | [3429 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [342a 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 principal evaluation fails +peer0.org1.example.com | [342b 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 gate 1589998876601436800 evaluation succeeds +peer0.org1.example.com | [342c 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [342d 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f6419456-2439-4e8f-858a-28987f0f2083] +peer0.org1.example.com | [342e 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f6419456-2439-4e8f-858a-28987f0f2083] +peer0.org1.example.com | [342f 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3430 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [3431 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb appears to be valid +peer0.org1.example.com | [3432 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3433 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00261d800 +peer1.org2.example.com | [356a 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [356b 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [356c 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [356d 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [356e 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [356f 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3570 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3571 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3572 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3573 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3574 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3575 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3576 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3577 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3579 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3578 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [357a 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [357b 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [357c 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [357d 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [357e 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [357f 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3580 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [34c0 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > alive: alive: +peer1.org1.example.com | [34c1 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [34c2 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34c3 05-20 18:21:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [34c4 05-20 18:21:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [34c5 05-20 18:21:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [34c6 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [34c7 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf bb 52 6a e6 37 bf 39 58 8e 04 1a 31 52 94 26 |..Rj.7.9X...1R.&| +peer1.org1.example.com | 00000010 10 4e 84 eb 02 f0 4d 01 4f a8 25 b8 f8 f5 f2 7d |.N....M.O.%....}| +peer1.org1.example.com | [34c8 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 02 f7 60 3f 29 7c e6 96 5d 07 |0E.!....`?)|..].| +peer1.org1.example.com | 00000010 9f 2c 2d 45 a0 8c 9d 8d b7 08 13 a5 d6 2c e3 8e |.,-E.........,..| +peer1.org1.example.com | 00000020 22 f4 80 4a a1 02 20 57 b5 44 3f 8c 26 89 28 64 |"..J.. W.D?.&.(d| +peer1.org1.example.com | 00000030 6d 64 0a 74 61 29 fc ce 89 f6 fe dc 3e 62 cb 50 |md.ta)......>b.P| +peer1.org1.example.com | 00000040 da b2 22 70 0b e8 5a |.."p..Z| +peer1.org1.example.com | [34c9 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34ca 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34cb 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34cc 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [34cd 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34ce 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34cf 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34d0 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34d1 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [34d2 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [34d3 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 3 4 5 2] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [34d4 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34d5 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34d6 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34d7 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [34d8 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34d9 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34da 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34db 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34dc 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34dd 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34de 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [34df 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [34e0 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34e1 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34e2 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3581 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3582 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3583 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3584 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3585 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer1.org2.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer1.org2.example.com | [3586 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3587 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer1.org2.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer1.org2.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer1.org2.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer1.org2.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer1.org2.example.com | [3589 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [358a 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 82 89 c9 e7 6d be 59 a8 9b 63 |0E.!......m.Y..c| +peer1.org2.example.com | 00000010 59 bf 19 f9 ab 50 07 7d bc c5 60 2b cb 93 e4 12 |Y....P.}..`+....| +peer1.org2.example.com | 00000020 8d c9 d9 db de 02 20 3a f8 32 30 d3 fa 22 f4 e0 |...... :.20.."..| +peer1.org2.example.com | 00000030 58 1c 6a 03 ec 42 09 8b 1f ca 48 8c 4b 0a 6f 9a |X.j..B....H.K.o.| +peer1.org2.example.com | 00000040 73 19 91 49 e0 d0 fd |s..I...| +peer1.org2.example.com | [3588 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [358b 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [358c 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [358d 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [358e 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [358f 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3590 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3591 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3592 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3593 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3594 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3595 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3596 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3597 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3598 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3599 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [359a 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [359b 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [359c 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [359d 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3434 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3435 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0034ca6c0 env 0xc0028394f0 txn 0 +peer0.org1.example.com | [3436 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [3437 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes +peer0.org1.example.com | [3438 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3439 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 6ms +peer0.org1.example.com | [343a 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [343b 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [343c 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer0.org1.example.com | [343d 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [343e 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [343f 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [3440 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer0.org1.example.com | [3441 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [3442 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [3443 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [3444 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [3445 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [3446 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [3447 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3448 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [3449 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] marked as valid by state validator +peer0.org1.example.com | [344a 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034cb740), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034cb780)} +peer0.org1.example.com | [344b 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [344c 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [344d 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [344e 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org1.example.com | [344f 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org1.example.com | [3450 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org1.example.com | [3451 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org1.example.com | [3452 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3453 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3454 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3455 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3456 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3457 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer0.org1.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer0.org1.example.com | [3458 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer0.org1.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer0.org1.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer0.org1.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer0.org1.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer0.org1.example.com | [3459 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [345a 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 96 f4 fd d3 fa 0a bd 96 aa eb |0E.!............| +peer0.org1.example.com | 00000010 f8 03 a4 45 c3 11 50 7e 34 52 72 c5 91 94 39 81 |...E..P~4Rr...9.| +peer0.org1.example.com | 00000020 06 a3 30 e1 40 02 20 77 bf 22 c6 3b 50 88 07 42 |..0.@. w.".;P..B| +peer0.org1.example.com | 00000030 96 4d c1 89 f6 e0 a9 3c b1 d5 ed 88 83 56 0e 3f |.M.....<.....V.?| +peer0.org1.example.com | 00000040 05 be cf 44 ef e8 b8 |...D...| +peer0.org1.example.com | [345b 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0xa4, 0x2e, 0x9a, 0xd0, 0x47, 0x9a, 0xd6, 0x54, 0xc0, 0x1a, 0xaa, 0x8c, 0xcf, 0x92, 0x89, 0x7b, 0x18, 0x78, 0x45, 0x2d, 0x50, 0x36, 0x95, 0xaf, 0xa8, 0x78, 0xd1, 0xa7, 0xb2, 0x8a, 0xb1, 0xaf} txOffsets= +peer0.org1.example.com | txId=523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb locPointer=offset=70, bytesLength=2982 +peer0.org1.example.com | ] +peer1.org1.example.com | [34e3 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [34e4 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34e5 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34e6 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [34e7 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [34e8 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [34e9 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b5770 gate 1589998887841798300 evaluation starts +peer1.org1.example.com | [34ea 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b5770 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34eb 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b5770 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [34ec 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b5770 principal matched by identity 0 +peer1.org1.example.com | [34ed 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [34ee 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [34ef 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [34f0 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b5770 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [34f1 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b5770 gate 1589998887841798300 evaluation succeeds +peer1.org1.example.com | [34f2 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34f3 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34f4 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34f5 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [34f6 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [34f7 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [34f8 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [34f9 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [34fa 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34fb 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3607 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3608 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3609 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [360a 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [360b 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [360c 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [360d 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [360e 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [360f 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [3610 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3611 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3612 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3613 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3614 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3615 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3616 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3617 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3618 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3619 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [361a 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [361b 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [361c 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bbcb0 gate 1589998876639172900 evaluation starts +peer0.org2.example.com | [361d 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bbcb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [361e 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bbcb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [361f 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bbcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3620 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bbcb0 principal evaluation fails +peer0.org2.example.com | [3621 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036bbcb0 gate 1589998876639172900 evaluation fails +peer0.org2.example.com | [3622 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3623 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3624 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3625 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2220 gate 1589998876641574000 evaluation starts +peer0.org2.example.com | [3626 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3627 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2220 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3628 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2220 principal matched by identity 0 +peer0.org2.example.com | [3629 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer0.org2.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer0.org2.example.com | [362a 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer0.org2.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer0.org2.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer0.org2.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer0.org2.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer0.org2.example.com | [362b 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2220 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [362c 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f2220 gate 1589998876641574000 evaluation succeeds +peer0.org2.example.com | [362d 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [362e 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [362f 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3630 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3631 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3632 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3633 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3634 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3635 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3636 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3637 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3638 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3639 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [363a 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [363b 05-20 18:21:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [363d 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [363c 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes +peer0.org2.example.com | [363e 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [363f 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3640 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [3641 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3642 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [3644 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003627af0 gate 1589998876656998700 evaluation starts +peer0.org2.example.com | [3645 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003627af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3646 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003627af0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3647 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003627af0 principal matched by identity 0 +peer0.org2.example.com | [3648 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 a3 ec 61 a4 ad 59 ea 0d d4 21 2b 5b 17 ab 9a |`..a..Y...!+[...| +peer0.org2.example.com | 00000010 9c a0 1a 50 b3 8f 56 15 01 e6 88 09 86 5e bd cd |...P..V......^..| +peer0.org2.example.com | [3649 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 48 aa fc f8 38 9b 88 7c 3f 1b |0E.!..H...8..|?.| +peer0.org2.example.com | 00000010 33 c7 ff 2b 76 bb aa af ac cb 54 f5 33 53 2f 7f |3..+v.....T.3S/.| +peer0.org2.example.com | 00000020 c4 c8 ab b7 90 02 20 63 73 30 8d 2b 48 d1 6b 6c |...... cs0.+H.kl| +peer0.org2.example.com | 00000030 ba a4 0e 90 77 93 77 24 a2 66 27 82 ed 77 88 a8 |....w.w$.f'..w..| +peer0.org2.example.com | 00000040 d0 41 f6 eb c5 5f 62 |.A..._b| +peer0.org2.example.com | [364a 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003627af0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [364b 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003627af0 gate 1589998876656998700 evaluation succeeds +peer0.org2.example.com | [364c 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [364d 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [364e 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [364f 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3650 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [3651 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org2.example.com | [3652 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34fc 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [34fd 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34fe 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34ff 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3500 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3501 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3502 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000497b90 gate 1589998887848512500 evaluation starts +peer1.org1.example.com | [3503 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000497b90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3504 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000497b90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3505 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000497b90 principal matched by identity 0 +peer1.org1.example.com | [3506 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [3507 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [3508 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000497b90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3509 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000497b90 gate 1589998887848512500 evaluation succeeds +peer1.org1.example.com | [350a 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [350b 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [350c 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [350d 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [350e 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [350f 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3510 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3511 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3512 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3513 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3514 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3515 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3516 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3517 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3518 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3519 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e3050 gate 1589998887851964600 evaluation starts +peer1.org1.example.com | [351a 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e3050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [351b 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e3050 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [345c 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2982] for tx ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to txid-index +peer0.org1.example.com | [345d 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2982] for tx number:[0] ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to blockNumTranNum index +peer0.org1.example.com | [345e 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [345f 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [3460 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3461 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3462 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3463 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3464 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3465 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3466 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3467 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3468 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3469 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [346a 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [346b 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [346c 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [346d 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93507], isChainEmpty=[false], lastBlockNumber=[4] +peer0.org1.example.com | [346e 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer0.org1.example.com | [346f 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org1.example.com | [3470 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org1.example.com | [3471 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [3472 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [3473 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [3474 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [3475 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [3476 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [3477 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [3478 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org2.example.com | [3653 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [3654 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org2.example.com | [3655 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [3656 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org2.example.com | [3657 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org2.example.com | [3658 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org2.example.com | [3659 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org2.example.com | [365a 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org2.example.com | [365b 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [365c 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002849600 env 0xc004d780f0 txn 0 +peer0.org2.example.com | [365d 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004d780f0 +peer0.org2.example.com | [365e 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +peer0.org2.example.com | [365f 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [3660 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [3661 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [3662 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [3663 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3643 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3664 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 7e c4 71 ef b0 20 ae cd 05 10 be 77 ae f6 68 |.~.q.. .....w..h| +peer0.org2.example.com | 00000010 4b 20 de 34 61 55 df 2a 9b 70 6c 05 f8 d9 58 f1 |K .4aU.*.pl...X.| +peer0.org2.example.com | [3665 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 f1 17 4c a9 a9 d6 1e 50 a5 18 |0E.!....L....P..| +peer0.org2.example.com | 00000010 e7 94 ff 3a 5b 3e 7f 2a d7 2f 47 85 a5 2a e8 5a |...:[>.*./G..*.Z| +peer0.org2.example.com | 00000020 8a 68 49 69 f0 02 20 3c f9 13 4b 83 24 18 9c c7 |.hIi.. <..K.$...| +peer0.org2.example.com | 00000030 06 c2 76 90 44 10 43 e8 4b 7a ea 74 b6 08 d1 7e |..v.D.C.Kz.t...~| +peer0.org2.example.com | 00000040 9d 56 77 6a 8e 23 e5 |.Vwj.#.| +peer0.org2.example.com | [3666 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3667 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3668 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3669 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [366a 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003404800, header channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +peer0.org2.example.com | [366b 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org1.example.com | [351c 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e3050 principal matched by identity 0 +peer1.org1.example.com | [351d 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [351e 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [351f 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e3050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3520 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003e3050 gate 1589998887851964600 evaluation succeeds +peer1.org1.example.com | [3521 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3522 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3523 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3524 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3525 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [3526 05-20 18:21:27.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [3527 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3528 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3529 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [352a 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [352b 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [352c 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [352d 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [352e 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [352f 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370960 gate 1589998887860774700 evaluation starts +peer1.org1.example.com | [3530 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370960 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3531 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370960 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3532 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370960 principal matched by identity 0 +peer1.org1.example.com | [3533 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3534 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | [359e 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [359f 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [35a0 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35a1 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a2 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a3 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [35a4 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a5 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a6 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35a7 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [35a8 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35a9 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer1.org2.example.com | [35aa 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ab 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ac 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35ad 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ae 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35af 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [35b0 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [35b1 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35b2 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [35b3 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35b4 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35b5 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [35b6 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [35b7 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [35b8 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b820 gate 1589998877031022600 evaluation starts +peer0.org2.example.com | [366c 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [366d 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [366e 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [366f 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +peer0.org2.example.com | [3670 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [3671 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc003706400 +peer0.org2.example.com | [3672 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [774e9296-3ae1-4b90-9876-b18c97465829] +peer0.org2.example.com | [3673 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [3674 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [774e9296-3ae1-4b90-9876-b18c97465829] +peer0.org2.example.com | [3675 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [3676 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3677 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3678 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3679 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [367a 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [47f54c5d-377a-4318-8a0d-f93e8e62ff13] +peer0.org2.example.com | [367c 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [47f54c5d-377a-4318-8a0d-f93e8e62ff13] +peer0.org2.example.com | [367d 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 gate 1589998876666572400 evaluation starts +peer0.org2.example.com | [367e 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [367f 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3680 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 principal matched by identity 0 +peer0.org2.example.com | [3681 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d b5 79 02 a0 13 24 af ee 36 b8 e5 ce 52 47 37 |..y...$..6...RG7| +peer0.org2.example.com | 00000010 ae 23 cb ec c7 9b 1b 57 15 1a 12 c3 73 ab e1 33 |.#.....W....s..3| +peer0.org2.example.com | [3682 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c0 40 ba fd 54 d1 92 c4 ba 63 |0E.!...@..T....c| +peer0.org2.example.com | 00000010 18 50 b5 27 31 85 77 5c 74 2d 19 c2 1e 4b 9d e3 |.P.'1.w\t-...K..| +peer0.org2.example.com | 00000020 38 f5 37 e3 7c 02 20 0c 58 b1 88 a5 16 5e d1 c6 |8.7.|. .X....^..| +peer0.org2.example.com | 00000030 6d 9f 41 d6 b1 4c 07 49 8c b4 f5 07 dd 09 10 78 |m.A..L.I.......x| +peer0.org2.example.com | 00000040 2b 80 b1 b5 92 a5 b3 |+......| +peer0.org2.example.com | [367b 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3683 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3684 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3685 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [3686 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 skipping identity 0 because it has already been used +peer0.org2.example.com | [3687 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 principal evaluation fails +peer0.org2.example.com | [3688 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370fb60 gate 1589998876666572400 evaluation succeeds +peer0.org2.example.com | [3689 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4ab6d373-6e1f-4d8a-8f99-15193d7a92b0] +peer0.org2.example.com | [368a 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4ab6d373-6e1f-4d8a-8f99-15193d7a92b0] +peer0.org2.example.com | [368b 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | [368c 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb appears to be valid +peer0.org2.example.com | [368d 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc003706400 +peer0.org2.example.com | [368e 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002849600 env 0xc004d780f0 txn 0 +peer0.org2.example.com | [368f 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [3690 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 28ms +peer0.org2.example.com | [3691 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [3692 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [3693 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer0.org2.example.com | [3694 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [3695 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [3696 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [3697 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer0.org2.example.com | [3698 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [3699 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [369a 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [369b 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [369c 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [369d 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [369e 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [369f 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [36a0 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] marked as valid by state validator +peer0.org2.example.com | [36a1 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc000379080), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0003790c0)} +peer0.org2.example.com | [36a2 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [36a3 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [36a4 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [36a5 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org2.example.com | [36a6 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org2.example.com | [36a7 05-20 18:21:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org2.example.com | [36a8 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org2.example.com | [36a9 05-20 18:21:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0xa4, 0x2e, 0x9a, 0xd0, 0x47, 0x9a, 0xd6, 0x54, 0xc0, 0x1a, 0xaa, 0x8c, 0xcf, 0x92, 0x89, 0x7b, 0x18, 0x78, 0x45, 0x2d, 0x50, 0x36, 0x95, 0xaf, 0xa8, 0x78, 0xd1, 0xa7, 0xb2, 0x8a, 0xb1, 0xaf} txOffsets= +peer0.org2.example.com | txId=523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb locPointer=offset=70, bytesLength=2982 +peer0.org2.example.com | ] +peer0.org2.example.com | [36aa 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89539, bytesLength=2982] for tx ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to txid-index +peer0.org2.example.com | [36ab 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89539, bytesLength=2982] for tx number:[0] ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to blockNumTranNum index +peer0.org2.example.com | [36ac 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93514], isChainEmpty=[false], lastBlockNumber=[4] +peer0.org2.example.com | [36ad 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer0.org2.example.com | [36ae 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org2.example.com | [36af 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org2.example.com | [36b0 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [36b1 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [36b2 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [36b3 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [36b4 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [36b5 05-20 18:21:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [36b6 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [36b7 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org2.example.com | [36b9 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org2.example.com | [36b8 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [36ba 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org2.example.com | [36bb 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org2.example.com | [36bc 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org2.example.com | [36bd 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org2.example.com | [36be 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 38ms (state_validation=8ms block_and_pvtdata_commit=19ms state_commit=6ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org2.example.com | [36bf 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [36c0 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408CC93F4F0C0EFB38816...08051A0C0A0565787030321203312E30 +peer0.org2.example.com | [36c1 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DC4CF1C14224699571CC4A019B7E0CF0BB7F97A49685A94946563E2C9D59F882 +peer0.org2.example.com | [36c2 05-20 18:21:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer0.org2.example.com | [36c3 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [36c4 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [36c5 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [36c6 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [36c7 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36c8 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [36c9 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [36ca 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [36cb 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [36cc 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36cd 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [36ce 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36cf 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [36d0 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [36d1 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36d2 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [36d3 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [36d4 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36d5 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [36d6 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [36d7 05-20 18:21:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36d8 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [36d9 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161032 +peer0.org2.example.com | [36da 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5CECECEC486AFBBD91870F6E72FF9FE1B238AD45195AC302D07B1804AF959DD +peer0.org2.example.com | [36db 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [36dc 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [36dd 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [36de 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [36df 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36e0 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [36e1 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3479 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org1.example.com | [347a 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org1.example.com | [347b 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [347c 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org1.example.com | [347d 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org1.example.com | [347e 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org1.example.com | [347f 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 60ms (state_validation=6ms block_and_pvtdata_commit=40ms state_commit=7ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org1.example.com | [3480 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3481 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08051A0C0A0565787030321203312E30 +peer0.org1.example.com | [3482 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 183899186ECD66C583B6CFE6179CB80F29AB8A6CB5675FDD377B09AFF4BBCE4F +peer0.org1.example.com | [3483 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer0.org1.example.com | [3484 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3485 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3486 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3487 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3488 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3489 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [348a 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [348b 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [348c 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [348d 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [348e 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [348f 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3490 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3491 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3492 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3493 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3494 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3495 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3496 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3497 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3498 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3499 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [349a 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [349b 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [349c 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [349d 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [349e 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [349f 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34a0 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34a2 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [34a3 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34a4 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34a5 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [34a6 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [34a7 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [34a8 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 gate 1589998876921927800 evaluation starts +peer0.org1.example.com | [34a9 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [34aa 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [34ab 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 principal matched by identity 0 +peer0.org1.example.com | [34ac 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer0.org1.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer0.org1.example.com | [34ad 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer0.org1.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer0.org1.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer0.org1.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer0.org1.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer0.org1.example.com | [34ae 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [34af 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 gate 1589998876921927800 evaluation succeeds +peer0.org1.example.com | [34b0 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34b1 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34b2 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [34b3 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [34b4 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [34b5 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [34b6 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [34b7 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [34b8 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [34b9 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34ba 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34bb 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34bc 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [36e3 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [36e4 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36e2 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [36e6 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [36e7 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36e5 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [36e8 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36e9 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [36ea 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [36eb 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36ec 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36ed 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36ee 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36ef 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36f0 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36f1 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [36f2 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36f3 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [36f4 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36f5 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [36f6 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [36f7 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer0.org2.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer0.org2.example.com | [36f8 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer0.org2.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer0.org2.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer0.org2.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer0.org2.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer0.org2.example.com | [36f9 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [36fa 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 82 89 c9 e7 6d be 59 a8 9b 63 |0E.!......m.Y..c| +peer0.org2.example.com | 00000010 59 bf 19 f9 ab 50 07 7d bc c5 60 2b cb 93 e4 12 |Y....P.}..`+....| +peer0.org2.example.com | 00000020 8d c9 d9 db de 02 20 3a f8 32 30 d3 fa 22 f4 e0 |...... :.20.."..| +peer0.org2.example.com | 00000030 58 1c 6a 03 ec 42 09 8b 1f ca 48 8c 4b 0a 6f 9a |X.j..B....H.K.o.| +peer0.org2.example.com | 00000040 73 19 91 49 e0 d0 fd |s..I...| +peer0.org2.example.com | [36fb 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [36fc 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [36fd 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36fe 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36ff 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3700 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3701 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3702 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3703 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer0.org2.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer0.org2.example.com | [3704 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer0.org2.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer0.org2.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer0.org2.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer0.org2.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer0.org2.example.com | [3705 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3706 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3707 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3708 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3709 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [370a 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [370b 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [370c 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [370d 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer0.org2.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer0.org2.example.com | [370e 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer0.org2.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer0.org2.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer0.org2.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer0.org2.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer0.org2.example.com | [370f 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3710 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3712 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3713 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3714 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 1 2] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3711 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3715 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3716 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3717 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3718 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3719 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371a 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371b 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [371c 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [371d 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [371e 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379bf20 gate 1589998876946378100 evaluation starts +peer0.org2.example.com | [371f 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379bf20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3720 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379bf20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3721 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379bf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3722 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379bf20 principal evaluation fails +peer0.org2.example.com | [3723 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379bf20 gate 1589998876946378100 evaluation fails +peer0.org2.example.com | [3724 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3725 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3726 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3727 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6490 gate 1589998876947473000 evaluation starts +peer0.org2.example.com | [3728 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6490 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3729 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6490 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [372a 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6490 principal matched by identity 0 +peer0.org2.example.com | [372b 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer0.org2.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer0.org2.example.com | [372c 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer0.org2.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer0.org2.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer0.org1.example.com | [34bd 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34be 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35b9 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b820 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35ba 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b820 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [35bb 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [35bc 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b820 principal evaluation fails +peer1.org2.example.com | [35bd 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b820 gate 1589998877031022600 evaluation fails +peer1.org2.example.com | [35be 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35bf 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35c0 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [35c1 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd90 gate 1589998877036796100 evaluation starts +peer1.org2.example.com | [35c2 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35c3 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [35c4 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd90 principal matched by identity 0 +peer1.org2.example.com | [35c5 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +peer1.org2.example.com | 00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +peer1.org2.example.com | [35c6 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +peer1.org2.example.com | 00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +peer1.org2.example.com | 00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +peer1.org2.example.com | 00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +peer1.org2.example.com | 00000040 5e cf 4f 22 10 20 d1 |^.O". .| +peer1.org2.example.com | [35c7 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35c8 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd90 gate 1589998877036796100 evaluation succeeds +peer1.org2.example.com | [35c9 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35ca 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35cb 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [35cc 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [35cd 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [35ce 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [35cf 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [35d0 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [35d1 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [35d2 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35d3 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35d4 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [35d5 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35d6 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35d7 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35d8 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35d9 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35da 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [35dc 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3535 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370960 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3536 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000370960 gate 1589998887860774700 evaluation succeeds +peer1.org1.example.com | [3537 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3538 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3539 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer0.org2.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer0.org2.example.com | [372d 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6490 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [372e 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6490 gate 1589998876947473000 evaluation succeeds +peer0.org2.example.com | [372f 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3730 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3731 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3732 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3733 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3734 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3735 05-20 18:21:16.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3736 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3737 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3738 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3739 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [373a 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34bf 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34c0 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34c1 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [34c2 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c3 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34a1 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c4 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c5 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c6 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34c7 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c8 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c9 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [34cb 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34ca 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [34cc 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [35db 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [35dd 05-20 18:21:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [35de 05-20 18:21:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35df 05-20 18:21:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [35e0 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35e1 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [35e2 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35e3 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [35e4 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35e5 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [35e6 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35e7 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [35e8 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35e9 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ea 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [35eb 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ec 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35ed 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ee 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ef 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35f0 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [35f1 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [35f2 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35f3 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [35f4 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161034 +peer1.org2.example.com | [35f5 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3885A1710F13045348632B13CB00A6C9E9082CA5E0F674DB5927DF904BBA910C +peer1.org2.example.com | [35f6 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [35f7 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [35f8 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [35f9 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [353a 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [353b 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [353c 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [353d 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [353e 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [353f 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [3540 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [3541 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [3542 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [3543 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3544 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3545 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3546 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3547 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3548 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3549 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [354a 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [354b 05-20 18:21:27.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032f3e0 gate 1589998887869916100 evaluation starts +peer1.org1.example.com | [354c 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032f3e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [354d 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032f3e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [354e 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032f3e0 principal matched by identity 0 +peer1.org1.example.com | [354f 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3550 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3551 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032f3e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3552 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00032f3e0 gate 1589998887869916100 evaluation succeeds +peer1.org1.example.com | [3553 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [373b 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [373c 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [373d 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [373e 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [373f 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3740 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3741 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037af330 gate 1589998877040107800 evaluation starts +peer0.org2.example.com | [3742 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037af330 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3743 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037af330 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3744 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037af330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3745 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037af330 principal evaluation fails +peer0.org2.example.com | [3746 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037af330 gate 1589998877040107800 evaluation fails +peer0.org2.example.com | [3747 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3748 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3749 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [374a 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6fe0 gate 1589998877050095600 evaluation starts +peer0.org2.example.com | [374b 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [374c 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6fe0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [374d 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6fe0 principal matched by identity 0 +peer0.org2.example.com | [374e 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +peer0.org2.example.com | 00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +peer0.org2.example.com | [374f 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +peer0.org2.example.com | 00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +peer0.org2.example.com | 00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +peer0.org2.example.com | 00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +peer0.org2.example.com | 00000040 5e cf 4f 22 10 20 d1 |^.O". .| +peer0.org2.example.com | [3750 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6fe0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3751 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c6fe0 gate 1589998877050095600 evaluation succeeds +peer0.org2.example.com | [3752 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3753 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3754 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3755 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3756 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3757 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3758 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3759 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [375a 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [375b 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [375c 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [375d 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [375e 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [375f 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3760 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3554 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3555 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3556 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3557 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3558 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3559 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [355a 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [355b 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [355c 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [355d 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [355e 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [355f 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003245e0 gate 1589998887873176100 evaluation starts +peer1.org1.example.com | [3560 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003245e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3561 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003245e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3562 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003245e0 principal matched by identity 0 +peer1.org1.example.com | [3563 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [3564 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [3565 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003245e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3566 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003245e0 gate 1589998887873176100 evaluation succeeds +peer1.org1.example.com | [3567 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3568 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3569 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [356a 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [356b 05-20 18:21:27.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [356c 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [356d 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [356e 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [356f 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3570 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3571 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3572 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [3573 05-20 18:21:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3574 05-20 18:21:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816103A +peer1.org1.example.com | [3575 05-20 18:21:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CEED346B9C51199AC60F9A68D0E03DB647F93ACCE916F7FBFD637C25678A8EB9 +peer1.org1.example.com | [3576 05-20 18:21:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3577 05-20 18:21:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3578 05-20 18:21:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3579 05-20 18:21:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [357a 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [357b 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [357c 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [357d 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [357e 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [357f 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3580 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3581 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3582 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3583 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3584 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3585 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3586 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3587 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3588 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3589 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [358a 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [358b 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [358c 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [358d 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [358e 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [358f 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3590 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3591 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [3592 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3761 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3762 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3763 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3764 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3765 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3766 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3767 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3768 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3769 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [376a 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [376b 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [376c 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [376d 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [376e 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 85 a1 71 0f 13 04 53 48 63 2b 13 cb 00 a6 c9 |8..q...SHc+.....| +peer0.org2.example.com | 00000010 e9 08 2c a5 e0 f6 74 db 59 27 df 90 4b ba 91 0c |..,...t.Y'..K...| +peer0.org2.example.com | [376f 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 07 6d 0c eb de 11 0c 58 65 7b |0E.!...m.....Xe{| +peer0.org2.example.com | 00000010 03 0c f3 04 a5 57 c7 4f 39 04 ae ef 9b 31 75 2f |.....W.O9....1u/| +peer0.org2.example.com | 00000020 55 71 b2 62 9d 02 20 76 b2 3a 92 b3 da 40 9d ea |Uq.b.. v.:...@..| +peer0.org2.example.com | 00000030 65 69 b4 7c 72 a3 7c ed 23 92 41 83 85 78 af f1 |ei.|r.|.#.A..x..| +peer0.org2.example.com | 00000040 f7 89 17 55 8d 58 a8 |...U.X.| +peer0.org2.example.com | [3770 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3771 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 ca 19 be 90 e9 dc 6d 90 0e 32 |0E.!........m..2| +peer0.org2.example.com | 00000010 a6 17 99 63 6f 50 78 3b f8 42 c2 22 f7 47 82 fe |...coPx;.B.".G..| +peer0.org2.example.com | 00000020 8b 83 f7 ba cb 02 20 5e 03 7d 4b 23 44 1b 77 b1 |...... ^.}K#D.w.| +peer0.org2.example.com | 00000030 a2 0b 63 24 36 22 68 93 1b 22 e2 c7 71 95 f8 ad |..c$6"h.."..q...| +peer0.org2.example.com | 00000040 2f 45 61 1c ba a1 c4 |/Ea....| +peer0.org2.example.com | [3772 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3773 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [3774 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3775 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3776 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3777 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3778 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3779 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [377a 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [377b 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [377c 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [377d 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [377e 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [377f 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [3780 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3781 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3782 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3783 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3784 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3785 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3786 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3787 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3788 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3789 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [378a 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [378b 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [378c 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381aff0 gate 1589998878365631700 evaluation starts +peer0.org1.example.com | [34cd 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [34ce 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34cf 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [34d0 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161031 +peer0.org1.example.com | [34d1 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A831E61CCFF16F6CF97C1DADAC967635AE6CF5695BD8CFDB87E5069E0CD9B891 +peer0.org1.example.com | [34d2 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [34d3 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [34d4 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [34d5 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34d6 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34d7 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34d9 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34d8 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [34da 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34db 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34dc 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [34de 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34dd 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [34df 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34e0 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [34e1 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [34e2 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34e3 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [34e4 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [34e5 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +peer0.org1.example.com | 00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +peer0.org1.example.com | [34e6 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +peer0.org1.example.com | 00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +peer0.org1.example.com | 00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +peer0.org1.example.com | 00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +peer0.org1.example.com | 00000040 5e cf 4f 22 10 20 d1 |^.O". .| +peer1.org2.example.com | [35fa 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35fb 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35fc 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35fd 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35fe 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ff 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3600 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3601 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3602 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3603 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3604 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3605 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3606 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3607 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3608 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3609 05-20 18:21:17.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 85 a1 71 0f 13 04 53 48 63 2b 13 cb 00 a6 c9 |8..q...SHc+.....| +peer1.org2.example.com | 00000010 e9 08 2c a5 e0 f6 74 db 59 27 df 90 4b ba 91 0c |..,...t.Y'..K...| +peer1.org2.example.com | [360a 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 07 6d 0c eb de 11 0c 58 65 7b |0E.!...m.....Xe{| +peer1.org2.example.com | 00000010 03 0c f3 04 a5 57 c7 4f 39 04 ae ef 9b 31 75 2f |.....W.O9....1u/| +peer1.org2.example.com | 00000020 55 71 b2 62 9d 02 20 76 b2 3a 92 b3 da 40 9d ea |Uq.b.. v.:...@..| +peer1.org2.example.com | 00000030 65 69 b4 7c 72 a3 7c ed 23 92 41 83 85 78 af f1 |ei.|r.|.#.A..x..| +peer1.org2.example.com | 00000040 f7 89 17 55 8d 58 a8 |...U.X.| +peer1.org2.example.com | [360b 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [360c 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 ca 19 be 90 e9 dc 6d 90 0e 32 |0E.!........m..2| +peer1.org2.example.com | 00000010 a6 17 99 63 6f 50 78 3b f8 42 c2 22 f7 47 82 fe |...coPx;.B.".G..| +peer1.org2.example.com | 00000020 8b 83 f7 ba cb 02 20 5e 03 7d 4b 23 44 1b 77 b1 |...... ^.}K#D.w.| +peer1.org2.example.com | 00000030 a2 0b 63 24 36 22 68 93 1b 22 e2 c7 71 95 f8 ad |..c$6"h.."..q...| +peer1.org2.example.com | 00000040 2f 45 61 1c ba a1 c4 |/Ea....| +peer1.org2.example.com | [360d 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3593 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3594 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3595 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3596 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3597 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3598 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3599 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [359a 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [359b 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34e7 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [34e8 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 7f 63 58 74 ca eb 90 bc 99 7e 32 |0D. H.cXt.....~2| +peer0.org1.example.com | 00000010 a7 05 d9 6b 6b 30 19 c9 98 42 fc 7c e6 59 68 17 |...kk0...B.|.Yh.| +peer0.org1.example.com | 00000020 28 4b 3a 7b 02 20 2b 92 9f bf c4 f9 9e 83 c7 26 |(K:{. +........&| +peer0.org1.example.com | 00000030 45 9c 44 9d ea f2 c7 43 05 8c 54 fe de 02 25 85 |E.D....C..T...%.| +peer0.org1.example.com | 00000040 90 80 be 60 b5 48 |...`.H| +peer0.org1.example.com | [34e9 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [34ea 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [34eb 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34ec 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34ed 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [34ee 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [34ef 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34f0 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [34f1 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [34f2 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34f3 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [34f4 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34f5 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34f6 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [34f7 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [34f8 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [34f9 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 gate 1589998877065881200 evaluation starts +peer0.org1.example.com | [34fa 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [34fb 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [34fc 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 principal matched by identity 0 +peer0.org1.example.com | [34fd 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer0.org1.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer0.org1.example.com | [34fe 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer0.org1.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer0.org1.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer0.org1.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer0.org1.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer0.org1.example.com | [34ff 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3500 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 gate 1589998877065881200 evaluation succeeds +peer0.org1.example.com | [3501 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3502 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [378d 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381aff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [378e 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381aff0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [378f 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381aff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3790 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381aff0 principal evaluation fails +peer0.org2.example.com | [3791 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381aff0 gate 1589998878365631700 evaluation fails +peer0.org2.example.com | [3792 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3793 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3794 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3795 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381b560 gate 1589998878367414700 evaluation starts +peer0.org2.example.com | [3796 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381b560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3797 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381b560 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3798 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381b560 principal matched by identity 0 +peer0.org2.example.com | [3799 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 f6 d9 38 52 06 dd c7 51 57 e7 64 fb b8 df ff |...8R...QW.d....| +peer0.org2.example.com | 00000010 16 b9 6b 34 81 ff 7b 79 35 d2 9c a8 e2 0a a7 52 |..k4..{y5......R| +peer0.org2.example.com | [379a 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 4d 13 6e 93 cb 99 64 dd cc b8 |0E.!..M.n...d...| +peer0.org2.example.com | 00000010 d5 ec e1 7b bb c0 26 d3 5f 7d a1 5e 6b e5 36 af |...{..&._}.^k.6.| +peer0.org2.example.com | 00000020 50 5e f3 6a 6a 02 20 0c 96 69 07 04 73 77 a3 77 |P^.jj. ..i..sw.w| +peer0.org2.example.com | 00000030 e5 74 a6 c4 1f d9 12 7a b3 23 6e 6b 74 82 08 b2 |.t.....z.#nkt...| +peer0.org2.example.com | 00000040 cc 4b 07 50 38 e3 4d |.K.P8.M| +peer0.org2.example.com | [379b 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381b560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [379c 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381b560 gate 1589998878367414700 evaluation succeeds +peer0.org2.example.com | [379d 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [379e 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [379f 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [37a0 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [37a1 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37a2 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [37a3 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [37a4 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [37a5 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [37a6 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37a7 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37a8 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37a9 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37aa 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37ab 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37ac 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37ad 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37ae 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37af 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37b0 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37b1 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37b2 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37b3 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [37b4 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37b5 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37b6 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [37b7 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37b8 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37b9 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ba 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37bb 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37bc 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37bd 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37be 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37bf 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [37c0 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161033 +peer0.org2.example.com | [37c1 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6909E9BAF6BA816061825ACC3E87E50A000D9F4AAAC993EC1190AC799F00582D +peer0.org2.example.com | [37c2 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [37c3 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [37c4 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [37c5 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [37c6 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37c7 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37c8 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [37c9 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37ca 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37cc 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37cb 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [37cd 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ce 05-20 18:21:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37d0 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37d1 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37cf 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37d2 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37d3 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37d4 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37d5 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37d6 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [37d7 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 f5 cf b1 26 88 36 e3 91 86 31 95 e4 31 39 82 |....&.6...1..19.| +peer0.org2.example.com | 00000010 a2 b8 2c c3 d9 01 f1 2f 11 a6 d8 40 96 99 c0 b0 |..,..../...@....| +peer0.org2.example.com | [37d8 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 a0 b9 28 48 8a 6a 74 3a d8 16 f4 |0D. 2..(H.jt:...| +peer0.org2.example.com | 00000010 cc 0a 44 32 63 7f a2 37 99 57 8a 07 e5 d0 1d a8 |..D2c..7.W......| +peer0.org2.example.com | 00000020 7e de 0d 5c 02 20 6e e7 21 36 ee 96 33 80 3d 73 |~..\. n.!6..3.=s| +peer0.org2.example.com | 00000030 2d 7b 26 10 7e a8 b8 e2 08 39 38 f6 3c dc 63 7c |-{&.~....98.<.c|| +peer0.org2.example.com | 00000040 11 c1 6f 7a 49 29 |..ozI)| +peer0.org1.example.com | [3503 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3504 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3505 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3506 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3507 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3508 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +peer0.org1.example.com | 00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +peer0.org1.example.com | [3509 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +peer0.org1.example.com | 00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +peer0.org1.example.com | 00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +peer0.org1.example.com | 00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +peer0.org1.example.com | 00000040 5e cf 4f 22 10 20 d1 |^.O". .| +peer0.org1.example.com | [350a 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [350b 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [350c 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [350d 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [350e 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [350f 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3510 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer0.org1.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer0.org1.example.com | [3511 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer0.org1.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer0.org1.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer0.org1.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer0.org1.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer0.org1.example.com | [3512 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3513 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3514 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3515 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [3516 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3517 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer0.org1.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer0.org1.example.com | [3518 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer0.org1.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer0.org1.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer0.org1.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer0.org1.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer0.org1.example.com | [3519 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [351a 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [351b 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [351c 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [351d 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +peer0.org1.example.com | 00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +peer0.org1.example.com | [351e 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +peer0.org1.example.com | 00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +peer0.org1.example.com | 00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +peer0.org1.example.com | 00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +peer0.org1.example.com | 00000040 5e cf 4f 22 10 20 d1 |^.O". .| +peer0.org1.example.com | [351f 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3520 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3521 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3522 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3523 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3524 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3525 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3526 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3527 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3528 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3529 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [352a 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [352b 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [352c 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [352d 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [352e 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37140 +peer0.org1.example.com | [352f 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000322280 +peer0.org1.example.com | [3530 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3531 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3532 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3533 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [3534 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3535 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 bb 7c 6f 95 ef 22 03 2c c1 03 39 06 19 6e ee |7.|o..".,..9..n.| +peer0.org1.example.com | 00000010 5d 4d 29 1f c7 32 04 22 df 23 38 02 70 0d 4d 33 |]M)..2.".#8.p.M3| +peer0.org1.example.com | [3536 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 7f fb 46 45 f9 78 ad 06 f3 20 |0E.!....FE.x... | +peer0.org1.example.com | 00000010 5b 5f 5d 54 81 af d8 02 7f 05 12 0e 9d e3 6d f7 |[_]T..........m.| +peer0.org1.example.com | 00000020 c9 5f 58 e8 15 02 20 4d 84 e6 a9 42 d1 14 86 9a |._X... M...B....| +peer0.org1.example.com | 00000030 bc fe 2e 8c 92 ec d7 c0 68 43 f8 7e 72 de 2c 91 |........hC.~r.,.| +peer0.org1.example.com | 00000040 87 e9 2d bd 39 5a 8b |..-.9Z.| +peer0.org1.example.com | [3537 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3538 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00037aa80, header 0xc000322690 +peer0.org1.example.com | [3539 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [353a 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] processing txid: 80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f +peer0.org1.example.com | [353b 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f] +peer0.org1.example.com | [353c 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [353d 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [353e 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [353f 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3540 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [3541 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 gate 1589998877198223400 evaluation starts +peer0.org1.example.com | [3542 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3543 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3544 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3545 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 principal evaluation fails +peer0.org1.example.com | [3546 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 gate 1589998877198223400 evaluation fails +peer0.org1.example.com | [3547 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [3548 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [3549 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [354a 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 gate 1589998877201494400 evaluation starts +peer0.org1.example.com | [354b 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [354c 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [354d 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 principal matched by identity 0 +peer0.org1.example.com | [354e 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 bb 7c 6f 95 ef 22 03 2c c1 03 39 06 19 6e ee |7.|o..".,..9..n.| +peer0.org1.example.com | 00000010 5d 4d 29 1f c7 32 04 22 df 23 38 02 70 0d 4d 33 |]M)..2.".#8.p.M3| +peer0.org1.example.com | [354f 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 7f fb 46 45 f9 78 ad 06 f3 20 |0E.!....FE.x... | +peer0.org1.example.com | 00000010 5b 5f 5d 54 81 af d8 02 7f 05 12 0e 9d e3 6d f7 |[_]T..........m.| +peer0.org1.example.com | 00000020 c9 5f 58 e8 15 02 20 4d 84 e6 a9 42 d1 14 86 9a |._X... M...B....| +peer0.org1.example.com | 00000030 bc fe 2e 8c 92 ec d7 c0 68 43 f8 7e 72 de 2c 91 |........hC.~r.,.| +peer0.org1.example.com | 00000040 87 e9 2d bd 39 5a 8b |..-.9Z.| +peer0.org1.example.com | [3550 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3551 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 gate 1589998877201494400 evaluation succeeds +peer0.org1.example.com | [3552 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3553 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3554 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [3555 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [3556 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3557 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f] +peer0.org1.example.com | [3558 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3559 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [355a 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [355b 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][80971321] Entry chaincode: name:"exp02" +peer0.org1.example.com | [355c 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [355d 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [355e 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [355f 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3560 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3561 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3562 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3563 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3564 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3565 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3566 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3567 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3568 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3569 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 gate 1589998877246567500 evaluation starts +peer0.org1.example.com | [356a 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [356b 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [356c 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 principal matched by identity 0 +peer0.org1.example.com | [356d 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 85 a1 71 0f 13 04 53 48 63 2b 13 cb 00 a6 c9 |8..q...SHc+.....| +peer1.org2.example.com | [360e 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [360f 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3610 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3611 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3612 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3613 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3614 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3615 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3616 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3617 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3618 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3619 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [361a 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [361b 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [361c 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358db40 gate 1589998877236782800 evaluation starts +peer1.org2.example.com | [361d 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358db40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [361e 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358db40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [361f 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358db40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3620 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358db40 principal evaluation fails +peer1.org2.example.com | [3621 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358db40 gate 1589998877236782800 evaluation fails +peer1.org2.example.com | [3622 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3623 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3624 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3625 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aa0b0 gate 1589998877238555700 evaluation starts +peer1.org2.example.com | [3626 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aa0b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3627 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aa0b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3628 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aa0b0 principal matched by identity 0 +peer1.org2.example.com | [3629 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +peer1.org2.example.com | 00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +peer1.org2.example.com | [362a 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +peer1.org2.example.com | 00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +peer1.org2.example.com | 00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +peer1.org2.example.com | 00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +peer1.org2.example.com | 00000040 5e cf 4f 22 10 20 d1 |^.O". .| +peer1.org2.example.com | [362b 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aa0b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [362c 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035aa0b0 gate 1589998877238555700 evaluation succeeds +peer1.org2.example.com | [362d 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [362e 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [362f 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3630 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [359c 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [359d 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [359e 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [359f 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35a0 05-20 18:21:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [35a1 05-20 18:21:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [35a2 05-20 18:21:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [35a3 05-20 18:21:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35a4 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35a5 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35a6 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [35a7 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35a8 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35a9 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [35aa 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [35ab 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35ac 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [35ad 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [35ae 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35af 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [35b0 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816103B +peer1.org1.example.com | [35b1 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C798BF8CBB6159465DC82DEB942A37C1861F9E4A91264445DA4DB7891239A920 +peer1.org1.example.com | [35b2 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [35b3 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [35b4 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [35b5 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35b6 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [35b7 05-20 18:21:28.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37d9 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37da 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [37db 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [37dc 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [37dd 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [37de 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37df 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37e0 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37e1 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37e2 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37e3 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37e4 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37e5 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37e6 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37e7 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37e8 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37e9 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37ea 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37eb 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37ec 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ed 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37ee 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ef 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37f0 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37f1 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37f2 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37f3 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37f5 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37f6 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [37f7 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e9 08 2c a5 e0 f6 74 db 59 27 df 90 4b ba 91 0c |..,...t.Y'..K...| +peer0.org1.example.com | [356e 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 07 6d 0c eb de 11 0c 58 65 7b |0E.!...m.....Xe{| +peer0.org1.example.com | 00000010 03 0c f3 04 a5 57 c7 4f 39 04 ae ef 9b 31 75 2f |.....W.O9....1u/| +peer0.org1.example.com | 00000020 55 71 b2 62 9d 02 20 76 b2 3a 92 b3 da 40 9d ea |Uq.b.. v.:...@..| +peer0.org1.example.com | 00000030 65 69 b4 7c 72 a3 7c ed 23 92 41 83 85 78 af f1 |ei.|r.|.#.A..x..| +peer0.org1.example.com | 00000040 f7 89 17 55 8d 58 a8 |...U.X.| +peer0.org1.example.com | [356f 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3570 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 gate 1589998877246567500 evaluation succeeds +peer0.org1.example.com | [3571 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3572 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3573 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3574 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3575 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3576 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3577 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3578 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3579 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [357a 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [357c 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [357d 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [357e 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [357f 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3580 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3581 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3582 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3583 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3584 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3585 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [357b 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [3586 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] handling GET_STATE from chaincode +peer0.org1.example.com | [3587 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [3588 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [3589 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [358a 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [358b 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] notifying Txid:80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f, channelID:businesschannel +peer0.org1.example.com | [358c 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [358d 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][80971321] Exit chaincode: name:"exp02" (48ms) +peer0.org1.example.com | [358e 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [3631 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3632 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3633 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3634 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer1.org2.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer1.org2.example.com | [3635 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer1.org2.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer1.org2.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer1.org2.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer1.org2.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer1.org2.example.com | [3637 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3636 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3638 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3639 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [363a 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 85 a1 71 0f 13 04 53 48 63 2b 13 cb 00 a6 c9 |8..q...SHc+.....| +peer1.org2.example.com | 00000010 e9 08 2c a5 e0 f6 74 db 59 27 df 90 4b ba 91 0c |..,...t.Y'..K...| +peer1.org2.example.com | [363b 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 07 6d 0c eb de 11 0c 58 65 7b |0E.!...m.....Xe{| +peer1.org2.example.com | 00000010 03 0c f3 04 a5 57 c7 4f 39 04 ae ef 9b 31 75 2f |.....W.O9....1u/| +peer1.org2.example.com | 00000020 55 71 b2 62 9d 02 20 76 b2 3a 92 b3 da 40 9d ea |Uq.b.. v.:...@..| +peer1.org2.example.com | 00000030 65 69 b4 7c 72 a3 7c ed 23 92 41 83 85 78 af f1 |ei.|r.|.#.A..x..| +peer1.org2.example.com | 00000040 f7 89 17 55 8d 58 a8 |...U.X.| +peer1.org2.example.com | [363c 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [363d 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [363e 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [363f 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3640 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3641 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3642 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3643 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3644 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3645 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3646 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3647 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3648 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3649 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [364a 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d07c0 gate 1589998877263420500 evaluation starts +peer1.org2.example.com | [364b 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d07c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [364c 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d07c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [364d 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d07c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [364e 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d07c0 principal evaluation fails +peer1.org2.example.com | [364f 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d07c0 gate 1589998877263420500 evaluation fails +peer1.org2.example.com | [3650 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3651 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3652 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3653 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0d30 gate 1589998877263752000 evaluation starts +peer1.org2.example.com | [3654 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3655 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0d30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3656 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0d30 principal matched by identity 0 +peer1.org2.example.com | [3657 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +peer1.org2.example.com | 00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +peer1.org2.example.com | [3658 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +peer1.org2.example.com | 00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +peer1.org2.example.com | 00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +peer1.org2.example.com | 00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +peer1.org2.example.com | 00000040 40 06 f5 13 60 a2 52 |@...`.R| +peer1.org2.example.com | [3659 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0d30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [365a 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d0d30 gate 1589998877263752000 evaluation succeeds +peer1.org2.example.com | [365b 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [365c 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [365d 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [365e 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [365f 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3660 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3661 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3662 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +peer1.org2.example.com | 00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +peer1.org2.example.com | [3663 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +peer1.org2.example.com | 00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +peer1.org2.example.com | 00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +peer1.org2.example.com | 00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +peer1.org2.example.com | 00000040 b3 67 a8 db 29 82 |.g..).| +peer1.org2.example.com | [3664 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3665 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3666 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3667 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 85 a1 71 0f 13 04 53 48 63 2b 13 cb 00 a6 c9 |8..q...SHc+.....| +peer1.org2.example.com | 00000010 e9 08 2c a5 e0 f6 74 db 59 27 df 90 4b ba 91 0c |..,...t.Y'..K...| +peer1.org2.example.com | [3668 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 07 6d 0c eb de 11 0c 58 65 7b |0E.!...m.....Xe{| +peer1.org2.example.com | 00000010 03 0c f3 04 a5 57 c7 4f 39 04 ae ef 9b 31 75 2f |.....W.O9....1u/| +peer1.org2.example.com | 00000020 55 71 b2 62 9d 02 20 76 b2 3a 92 b3 da 40 9d ea |Uq.b.. v.:...@..| +peer1.org2.example.com | 00000030 65 69 b4 7c 72 a3 7c ed 23 92 41 83 85 78 af f1 |ei.|r.|.#.A..x..| +peer1.org2.example.com | 00000040 f7 89 17 55 8d 58 a8 |...U.X.| +peer1.org2.example.com | [3669 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [366a 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [366b 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [366c 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [366d 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [366e 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37f8 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [37f9 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37fa 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37fb 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [37fc 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [37fd 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [37fe 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886100 gate 1589998879050506500 evaluation starts +peer0.org2.example.com | [37ff 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886100 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3800 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886100 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3801 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3802 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886100 principal evaluation fails +peer0.org2.example.com | [3803 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886100 gate 1589998879050506500 evaluation fails +peer0.org2.example.com | [3804 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3805 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3806 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3807 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886670 gate 1589998879052827500 evaluation starts +peer0.org2.example.com | [3808 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886670 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3809 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886670 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [380a 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886670 principal matched by identity 0 +peer0.org2.example.com | [380b 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 93 94 ca 94 35 80 26 c9 0c d2 f3 69 9d 13 0c |.....5.&....i...| +peer0.org2.example.com | 00000010 2b 98 13 17 d5 97 7e fa e8 c5 b1 ca aa a7 ef d8 |+.....~.........| +peer0.org2.example.com | [380c 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 30 03 48 94 b0 1f cb 3a 3a a0 ec |0D. 30.H....::..| +peer0.org2.example.com | 00000010 25 63 f0 2a 6a 56 e8 d6 ba 47 97 f0 c0 61 63 c5 |%c.*jV...G...ac.| +peer0.org2.example.com | 00000020 0a 5d c3 5b 02 20 70 e7 4e ff d9 88 f7 2f 00 b4 |.].[. p.N..../..| +peer0.org2.example.com | 00000030 36 37 d8 a4 07 7f 2e 4d b6 ce 56 b4 1a ab d6 ba |67.....M..V.....| +peer0.org2.example.com | 00000040 4c 62 57 ea 77 94 |LbW.w.| +peer0.org2.example.com | [380d 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886670 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [380e 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886670 gate 1589998879052827500 evaluation succeeds +peer0.org2.example.com | [380f 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3810 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3811 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3812 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3813 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3814 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3815 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3816 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3817 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3818 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3819 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [381a 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [358f 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f] +peer0.org1.example.com | [3590 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] Exit +peer0.org1.example.com | [3591 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3592 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [3593 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f, chaincode: exp02} +peer0.org1.example.com | [3594 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A207889D5FF5CD303F2B49E9E532936...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3595 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 51256D1FC7CEF52FA967A8006D3CF9F37D6B88276F9C7771445D5A2C622B604D +peer0.org1.example.com | [3596 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f, chaincode: exp02} +peer0.org1.example.com | [3597 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] Exit +peer0.org1.example.com | [3598 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f] +peer0.org1.example.com | [3599 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37140 +peer0.org1.example.com | [359a 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37140 grpc.code=OK grpc.call_duration=71.9182ms +peer0.org1.example.com | [359b 05-20 18:21:17.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [359c 05-20 18:21:17.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [359d 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37144 +peer0.org1.example.com | [359e 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003c06e0 +peer0.org1.example.com | [359f 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [35a0 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [35a1 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [35a2 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [35a3 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [35a4 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 81 b2 3e fd 64 d5 51 2e 92 ce 21 72 9b 55 45 |2..>.d.Q...!r.UE| +peer0.org1.example.com | 00000010 08 b4 35 96 a3 c5 ea 99 20 08 5e 9a 11 12 f6 4a |..5..... .^....J| +peer0.org1.example.com | [35a5 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 04 17 47 9b 11 6d 57 4e c4 bf |0E.!....G..mWN..| +peer0.org1.example.com | 00000010 22 d2 3f ae 23 ca 61 a4 dd bb e0 53 aa 81 32 9d |".?.#.a....S..2.| +peer0.org1.example.com | 00000020 e3 ac 47 e2 95 02 20 06 3f e4 54 8a fa f3 30 42 |..G... .?.T...0B| +peer0.org1.example.com | 00000030 48 1c 96 9e 0a 53 59 de 36 84 a6 62 31 61 a3 1d |H....SY.6..b1a..| +peer0.org1.example.com | 00000040 ba 30 71 c8 b3 40 cd |.0q..@.| +peer0.org1.example.com | [35a6 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [35a7 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000170af0, header 0xc0003c0af0 +peer0.org1.example.com | [35a8 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [35a9 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] processing txid: f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 +peer0.org1.example.com | [35aa 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +peer0.org1.example.com | [35ab 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [35ac 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [35ad 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [35ae 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [35af 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [35b0 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 gate 1589998877501339900 evaluation starts +peer0.org1.example.com | [35b1 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35b2 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [35b3 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [35b4 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 principal evaluation fails +peer0.org1.example.com | [35b5 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 gate 1589998877501339900 evaluation fails +peer0.org1.example.com | [35b6 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [35b7 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [35b8 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [35b9 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 gate 1589998877503408000 evaluation starts +peer0.org1.example.com | [35ba 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35bb 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [35bc 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 principal matched by identity 0 +peer0.org1.example.com | [35bd 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 81 b2 3e fd 64 d5 51 2e 92 ce 21 72 9b 55 45 |2..>.d.Q...!r.UE| +peer0.org1.example.com | 00000010 08 b4 35 96 a3 c5 ea 99 20 08 5e 9a 11 12 f6 4a |..5..... .^....J| +peer0.org1.example.com | [35be 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 04 17 47 9b 11 6d 57 4e c4 bf |0E.!....G..mWN..| +peer0.org1.example.com | 00000010 22 d2 3f ae 23 ca 61 a4 dd bb e0 53 aa 81 32 9d |".?.#.a....S..2.| +peer0.org1.example.com | 00000020 e3 ac 47 e2 95 02 20 06 3f e4 54 8a fa f3 30 42 |..G... .?.T...0B| +peer0.org1.example.com | 00000030 48 1c 96 9e 0a 53 59 de 36 84 a6 62 31 61 a3 1d |H....SY.6..b1a..| +peer0.org1.example.com | 00000040 ba 30 71 c8 b3 40 cd |.0q..@.| +peer0.org1.example.com | [35bf 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [35c0 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 gate 1589998877503408000 evaluation succeeds +peer0.org1.example.com | [35c1 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [35c2 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [35c3 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [35c4 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [35c5 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [35c6 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +peer0.org1.example.com | [35c7 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [35c8 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [35c9 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [35ca 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f7da02c4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [35cb 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [35cc 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [35cd 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] handling GET_STATE from chaincode +peer0.org1.example.com | [35ce 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [35cf 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [35d0 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [35d1 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [35d2 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] handling GET_STATE from chaincode +peer0.org1.example.com | [35d3 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] getting state for chaincode exp02, key b, channel businesschannel +peer0.org1.example.com | [35d4 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [35d5 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [35d6 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [35d7 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] handling PUT_STATE from chaincode +peer0.org1.example.com | [35d8 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [35d9 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer1.org1.example.com | [35b8 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [35b9 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [35ba 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [35bb 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35bc 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [35bd 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [35be 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35bf 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [35c0 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [35c1 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35c2 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [35c3 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35c4 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35c5 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [35c6 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [35c7 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [35c8 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7ad0 gate 1589998888621372400 evaluation starts +peer1.org1.example.com | [35c9 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7ad0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [35ca 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7ad0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [35cb 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7ad0 principal matched by identity 0 +peer1.org1.example.com | [35cc 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 17 ca 1c e9 94 63 04 ee b0 29 0d 30 67 8d 01 |......c...).0g..| +peer1.org1.example.com | 00000010 1d 4b 42 72 7c 6f 36 9b 97 86 eb 47 d9 8e f0 2d |.KBr|o6....G...-| +peer1.org1.example.com | [35cd 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8e dd 23 fa 21 3c f0 19 20 e2 |0E.!....#.!<.. .| +peer1.org1.example.com | 00000010 b5 34 85 9e a9 24 67 bb 0c b5 51 ba 8d d2 c0 46 |.4...$g...Q....F| +peer1.org1.example.com | 00000020 25 5d fc 57 58 02 20 65 dd ea c7 45 18 d0 0a b3 |%].WX. e...E....| +peer1.org1.example.com | 00000030 3d 15 ce bc 17 04 6f ff 99 5b 87 e8 95 9f 51 61 |=.....o..[....Qa| +peer1.org1.example.com | 00000040 f5 4c ff 9c 63 33 48 |.L..c3H| +peer1.org1.example.com | [35ce 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7ad0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [35cf 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d7ad0 gate 1589998888621372400 evaluation succeeds +peer1.org1.example.com | [35d0 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [35d1 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [37f4 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [381b 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [381c 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [381d 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [381e 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [381f 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3820 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3821 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3822 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3823 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3824 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3825 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3826 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3827 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3828 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3829 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [382a 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [382b 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [382c 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [382d 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [382e 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [382f 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3830 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3831 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3832 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3833 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3834 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3835 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3836 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3837 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [366f 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3670 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3671 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3672 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3673 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3674 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3675 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3676 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3677 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3678 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb400 gate 1589998878372463300 evaluation starts +peer1.org2.example.com | [3679 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb400 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [367a 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb400 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [367b 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [367c 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb400 principal evaluation fails +peer1.org2.example.com | [367d 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb400 gate 1589998878372463300 evaluation fails +peer1.org2.example.com | [367e 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [367f 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3680 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3681 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb970 gate 1589998878372951600 evaluation starts +peer1.org2.example.com | [3682 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb970 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3683 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb970 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3684 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb970 principal matched by identity 0 +peer1.org2.example.com | [3685 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 f6 d9 38 52 06 dd c7 51 57 e7 64 fb b8 df ff |...8R...QW.d....| +peer1.org2.example.com | 00000010 16 b9 6b 34 81 ff 7b 79 35 d2 9c a8 e2 0a a7 52 |..k4..{y5......R| +peer1.org2.example.com | [3686 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 4d 13 6e 93 cb 99 64 dd cc b8 |0E.!..M.n...d...| +peer1.org2.example.com | 00000010 d5 ec e1 7b bb c0 26 d3 5f 7d a1 5e 6b e5 36 af |...{..&._}.^k.6.| +peer1.org2.example.com | 00000020 50 5e f3 6a 6a 02 20 0c 96 69 07 04 73 77 a3 77 |P^.jj. ..i..sw.w| +peer1.org2.example.com | 00000030 e5 74 a6 c4 1f d9 12 7a b3 23 6e 6b 74 82 08 b2 |.t.....z.#nkt...| +peer1.org2.example.com | 00000040 cc 4b 07 50 38 e3 4d |.K.P8.M| +peer1.org2.example.com | [3687 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb970 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3688 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb970 gate 1589998878372951600 evaluation succeeds +peer1.org2.example.com | [3689 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [368a 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [368b 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [368c 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [368d 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [368e 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [368f 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3690 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3691 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3692 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3693 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3695 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3694 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3696 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3698 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3699 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [369a 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [369b 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [369c 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [369d 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [369e 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [369f 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36a0 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [36a1 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3697 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [36a2 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [36a5 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36a3 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36a6 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36a7 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [36a4 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [36a8 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36a9 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [36aa 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36ab 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36ac 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36ad 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3838 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3839 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [383a 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [383b 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [383c 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [383d 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [383e 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f4e0 gate 1589998879599840200 evaluation starts +peer0.org2.example.com | [383f 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f4e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3840 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f4e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3841 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3842 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f4e0 principal evaluation fails +peer0.org2.example.com | [3843 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389f4e0 gate 1589998879599840200 evaluation fails +peer0.org2.example.com | [3844 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3845 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3846 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3847 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389fa50 gate 1589998879601253300 evaluation starts +peer0.org2.example.com | [3848 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389fa50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3849 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389fa50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [384a 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389fa50 principal matched by identity 0 +peer0.org2.example.com | [384b 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer0.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer0.org2.example.com | [384c 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer0.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer0.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer0.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer0.org2.example.com | [384d 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389fa50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [384e 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00389fa50 gate 1589998879601253300 evaluation succeeds +peer0.org2.example.com | [384f 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3850 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3851 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3852 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3853 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3854 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3855 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3856 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3857 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3858 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3859 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [385a 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8640 gate 1589998879611811000 evaluation starts +peer0.org2.example.com | [385b 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [385c 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8640 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [385d 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [385e 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8640 principal evaluation fails +peer0.org2.example.com | [385f 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8640 gate 1589998879611811000 evaluation fails +peer0.org2.example.com | [3860 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3861 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3862 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3863 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8bb0 gate 1589998879615670500 evaluation starts +peer0.org2.example.com | [3864 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3865 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8bb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3866 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8bb0 principal matched by identity 0 +peer0.org2.example.com | [3867 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer0.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer0.org2.example.com | [3868 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer1.org1.example.com | [35d2 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [35d3 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [35d4 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [35d6 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [35d7 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35d8 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [35d9 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35da 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [35d5 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35db 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [35dc 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer1.org1.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer1.org1.example.com | [35dd 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer1.org1.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer1.org1.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer1.org1.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer1.org1.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer1.org1.example.com | [35de 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [35df 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [35e0 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35e1 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [35e2 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer1.org1.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer1.org1.example.com | [35e3 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer1.org1.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer1.org1.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer1.org1.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer1.org1.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer1.org1.example.com | [35e4 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35e5 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35e6 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35e7 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [35e8 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [35e9 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer1.org1.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer1.org1.example.com | [35ea 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer1.org1.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer1.org1.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer1.org1.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer1.org1.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer1.org1.example.com | [35eb 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [35ec 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf e6 0f fb f5 4d f0 04 22 c8 22 |0E.!......M.."."| +peer1.org1.example.com | 00000010 0e 55 75 77 02 40 0c b6 fc 3f 2b 66 31 2b d6 26 |.Uuw.@...?+f1+.&| +peer1.org1.example.com | 00000020 ee d9 99 f2 fd 02 20 2a 11 c9 45 25 9e ff 78 8c |...... *..E%..x.| +peer1.org1.example.com | 00000030 60 71 67 87 85 5b 3a 75 c7 a4 0a 72 fe ef d9 23 |`qg..[:u...r...#| +peer0.org1.example.com | [35da 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] handling PUT_STATE from chaincode +peer0.org1.example.com | [35db 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [35dc 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [35dd 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] notifying Txid:f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, channelID:businesschannel +peer0.org1.example.com | [35de 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [35df 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f7da02c4] Exit chaincode: name:"exp02" (14ms) +peer0.org1.example.com | [35e0 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [35e1 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +peer0.org1.example.com | [35e2 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] Exit +peer0.org1.example.com | [35e3 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [35e4 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [35e5 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, chaincode: exp02} +peer0.org1.example.com | [35e6 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20B57D90A38DDE60D7CDE95F55FA89...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [35e7 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AE84BA80897D6FBB1B4CACE4DD01E33CDE3DF067ADC1136CAB14C818D0A72997 +peer0.org1.example.com | [35e8 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, chaincode: exp02} +peer0.org1.example.com | [35e9 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] Exit +peer0.org1.example.com | [35ea 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +peer0.org1.example.com | [35eb 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37144 +peer0.org1.example.com | [35ec 05-20 18:21:17.53 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37144 grpc.code=OK grpc.call_duration=35.0697ms +peer0.org1.example.com | [35ed 05-20 18:21:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [35ee 05-20 18:21:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [35ef 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37150 +peer0.org1.example.com | [35f0 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000323b80 +peer0.org1.example.com | [35f1 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [35f2 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [35f3 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [35f4 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [35f5 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [35f6 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e4 fa d5 ba 29 ad 1d 18 a5 22 50 19 c2 26 7b |.....)...."P..&{| +peer0.org1.example.com | 00000010 32 1f 0a de 10 c4 bb 8b 58 9e 9f 4d 2c b3 8e 81 |2.......X..M,...| +peer0.org1.example.com | [35f7 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 7f 1f 46 f0 48 21 d2 3e 5a 26 |0E.!....F.H!.>Z&| +peer0.org1.example.com | 00000010 e4 8c b0 5d 23 27 8c 6a 89 47 22 57 93 98 70 c4 |...]#'.j.G"W..p.| +peer0.org1.example.com | 00000020 03 21 e3 9e 21 02 20 4e 63 81 63 ec e1 77 76 8f |.!..!. Nc.c..wv.| +peer0.org1.example.com | 00000030 e3 fa 09 1d c2 20 cb 03 fc ed 3c 0f 9c 09 c7 c2 |..... ....<.....| +peer0.org1.example.com | 00000040 2b 92 5e 5d 4c ee f4 |+.^]L..| +peer0.org1.example.com | [35f8 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [35f9 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00037b570, header 0xc000323f90 +peer0.org1.example.com | [35fa 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [35fb 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] processing txid: a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa +peer0.org1.example.com | [35fc 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa] +peer0.org1.example.com | [35fd 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [35fe 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [35ff 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [3600 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3601 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [3602 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 gate 1589998877929684500 evaluation starts +peer0.org1.example.com | [3603 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3604 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3605 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 principal matched by identity 0 +peer0.org1.example.com | [3606 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e4 fa d5 ba 29 ad 1d 18 a5 22 50 19 c2 26 7b |.....)...."P..&{| +peer0.org1.example.com | 00000010 32 1f 0a de 10 c4 bb 8b 58 9e 9f 4d 2c b3 8e 81 |2.......X..M,...| +peer0.org1.example.com | [3607 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 7f 1f 46 f0 48 21 d2 3e 5a 26 |0E.!....F.H!.>Z&| +peer0.org1.example.com | 00000010 e4 8c b0 5d 23 27 8c 6a 89 47 22 57 93 98 70 c4 |...]#'.j.G"W..p.| +peer0.org1.example.com | 00000020 03 21 e3 9e 21 02 20 4e 63 81 63 ec e1 77 76 8f |.!..!. Nc.c..wv.| +peer0.org1.example.com | 00000030 e3 fa 09 1d c2 20 cb 03 fc ed 3c 0f 9c 09 c7 c2 |..... ....<.....| +peer0.org1.example.com | 00000040 2b 92 5e 5d 4c ee f4 |+.^]L..| +peer0.org1.example.com | [3608 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3609 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 gate 1589998877929684500 evaluation succeeds +peer0.org1.example.com | [360a 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [360b 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [360c 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [360d 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [360e 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [360f 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa] +peer0.org1.example.com | [3610 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3611 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [36ae 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36af 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36b0 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [36b1 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 09 e9 ba f6 ba 81 60 61 82 5a cc 3e 87 e5 0a |i......`a.Z.>...| +peer1.org2.example.com | 00000010 00 0d 9f 4a aa c9 93 ec 11 90 ac 79 9f 00 58 2d |...J.......y..X-| +peer1.org1.example.com | 00000040 b4 9b f7 07 dd cc 41 |......A| +peer1.org1.example.com | [35ed 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [35ee 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [35ef 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f0 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f1 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f2 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [35f3 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [35f4 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f5 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [35f6 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [35f7 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35f8 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [35f9 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [35fa 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [35fb 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35fc 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35fd 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [35fe 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [35ff 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3600 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000296c80 gate 1589998888650207300 evaluation starts +peer1.org1.example.com | [3601 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000296c80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3602 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000296c80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3603 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000296c80 principal matched by identity 0 +peer1.org1.example.com | [3604 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3605 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer1.org1.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer1.org1.example.com | [3606 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer1.org1.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer1.org1.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer0.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer0.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer0.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer0.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer0.org2.example.com | [3869 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8bb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [386a 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8bb0 gate 1589998879615670500 evaluation succeeds +peer0.org2.example.com | [386b 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [386c 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [386d 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [386e 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [386f 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3870 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes +peer0.org2.example.com | [3871 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3873 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3874 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [3872 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3875 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3876 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [3877 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3878 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3879 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [387a 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [387b 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [387c 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [387d 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003887f10 gate 1589998879635783500 evaluation starts +peer0.org2.example.com | [387e 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003887f10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [387f 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003887f10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3880 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003887f10 principal matched by identity 0 +peer0.org2.example.com | [3881 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c d2 c0 ed c4 0d 9d 19 e2 6d ec 9d 39 f9 4c 81 |l........m..9.L.| +peer0.org2.example.com | 00000010 7a 1d b7 69 ac 32 79 ae ff 19 c5 56 5c 20 d1 1b |z..i.2y....V\ ..| +peer0.org2.example.com | [3882 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 72 cf 47 ba a7 3c d1 29 ce 51 67 |0D. qr.G..<.).Qg| +peer0.org2.example.com | 00000010 8b 1d ec 33 b2 bb d0 94 17 0a 4f ba ca 53 66 fa |...3......O..Sf.| +peer0.org2.example.com | 00000020 d3 20 7a 6a 02 20 60 80 81 60 7c 44 fd 13 ef 6a |. zj. `..`|D...j| +peer0.org2.example.com | 00000030 37 ed 6f c6 ed 11 ec b5 2f 13 79 39 26 22 c0 e2 |7.o...../.y9&"..| +peer0.org2.example.com | 00000040 2d 26 72 55 6f 1b |-&rUo.| +peer0.org2.example.com | [3883 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003887f10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3884 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003887f10 gate 1589998879635783500 evaluation succeeds +peer0.org2.example.com | [3885 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3886 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3887 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3889 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3888 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [388b 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [388a 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [388c 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org2.example.com | [388d 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [388e 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [388f 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3890 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [3892 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org2.example.com | [3891 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3894 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3895 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3893 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [3896 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org2.example.com | [3897 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3899 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org2.example.com | [389a 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org2.example.com | [389b 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org2.example.com | [3898 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [389d 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [389c 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org2.example.com | [389e 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [389f 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00009fd40 env 0xc00383bd60 txn 0 +peer0.org2.example.com | [38a0 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00383bd60 +peer0.org2.example.com | [38a1 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +peer0.org2.example.com | [38a2 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [38a3 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [38a4 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [38a5 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38a6 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [38a7 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [38a8 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [38a9 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [38aa 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [38ab 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 39 ad 16 51 9c 3a 63 61 b3 8b e7 78 81 98 26 |.9..Q.:ca...x..&| +peer0.org2.example.com | 00000010 fa 45 70 07 9c c9 7e c2 9a 96 46 22 d6 5c 7d 38 |.Ep...~...F".\}8| +peer0.org2.example.com | [38ac 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 04 e6 28 19 1c 5d a6 e5 ec 93 0a |0D. J..(..].....| +peer0.org2.example.com | 00000010 c1 a3 fe a2 2d b1 5e 21 14 5f 55 25 ee 8b 39 22 |....-.^!._U%..9"| +peer0.org2.example.com | 00000020 ee 75 f0 7e 02 20 77 94 f8 8e ec a2 44 4a 6b 45 |.u.~. w.....DJkE| +peer0.org2.example.com | 00000030 a4 95 29 d7 fa ec 6f 2a f1 ac 43 a8 e4 d6 92 5b |..)...o*..C....[| +peer0.org2.example.com | 00000040 b2 87 c3 52 76 5a |...RvZ| +peer0.org2.example.com | [38ad 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [38af 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00390a000, header channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +peer0.org2.example.com | [38b0 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [38b1 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [38b2 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [38b3 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [38b4 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +peer0.org2.example.com | [38b5 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [38b6 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0038e0400 +peer0.org2.example.com | [38b7 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ab5f9393-5c0a-4a6d-b16c-ba3ab3e125e6] +peer0.org2.example.com | [38b8 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [38b9 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ab5f9393-5c0a-4a6d-b16c-ba3ab3e125e6] +peer0.org2.example.com | [38ba 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [38bc 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38bd 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38bb 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4c8c1102-1354-4e70-bec1-2f63d8c8b7ea] +peer0.org2.example.com | [38be 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38bf 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38c0 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38c1 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38c2 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4c8c1102-1354-4e70-bec1-2f63d8c8b7ea] +peer0.org2.example.com | [38c3 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 gate 1589998879665355100 evaluation starts +peer0.org2.example.com | [38c4 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38c5 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [38c6 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 principal matched by identity 0 +peer0.org2.example.com | [38c7 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 84 ba 80 89 7d 6f bb 1b 4c ac e4 dd 01 e3 3c |.....}o..L.....<| +peer0.org2.example.com | 00000010 de 3d f0 67 ad c1 13 6c ab 14 c8 18 d0 a7 29 97 |.=.g...l......).| +peer0.org2.example.com | [38c8 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ca ab ee 53 59 e9 ea bd 6b ce eb |0D. +...SY...k..| +peer0.org1.example.com | [3612 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [3613 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a58d159c] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3614 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3615 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [3616 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] handling GET_STATE from chaincode +peer0.org1.example.com | [3617 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [3618 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [3619 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [361a 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [361b 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] notifying Txid:a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa, channelID:businesschannel +peer0.org1.example.com | [361c 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [361d 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a58d159c] Exit chaincode: name:"exp02" (6ms) +peer0.org1.example.com | [361e 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [361f 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa] +peer0.org1.example.com | [3620 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] Exit +peer0.org1.example.com | [3621 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3622 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [3623 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa, chaincode: exp02} +peer0.org1.example.com | [3624 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C4428E6EA59D8F3593FC924E4350...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3625 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3751A47567E8F3D3B6ED3077B0641A49B60AF0C290156EAA88B52CE746FEA341 +peer0.org1.example.com | [3626 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa, chaincode: exp02} +peer0.org1.example.com | [3627 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] Exit +peer0.org1.example.com | [3628 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa] +peer0.org1.example.com | [3629 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37150 +peer0.org1.example.com | [362a 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37150 grpc.code=OK grpc.call_duration=21.4332ms +peer0.org1.example.com | [362b 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [362c 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37150: read: connection reset by peer +peer0.org1.example.com | [362d 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [362e 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [362f 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3630 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3631 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3632 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3633 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 f6 d9 38 52 06 dd c7 51 57 e7 64 fb b8 df ff |...8R...QW.d....| +peer0.org1.example.com | 00000010 16 b9 6b 34 81 ff 7b 79 35 d2 9c a8 e2 0a a7 52 |..k4..{y5......R| +peer0.org1.example.com | [3634 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 4d 13 6e 93 cb 99 64 dd cc b8 |0E.!..M.n...d...| +peer0.org1.example.com | 00000010 d5 ec e1 7b bb c0 26 d3 5f 7d a1 5e 6b e5 36 af |...{..&._}.^k.6.| +peer0.org1.example.com | 00000020 50 5e f3 6a 6a 02 20 0c 96 69 07 04 73 77 a3 77 |P^.jj. ..i..sw.w| +peer0.org1.example.com | 00000030 e5 74 a6 c4 1f d9 12 7a b3 23 6e 6b 74 82 08 b2 |.t.....z.#nkt...| +peer0.org1.example.com | 00000040 cc 4b 07 50 38 e3 4d |.K.P8.M| +peer0.org1.example.com | [3635 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3636 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3637 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3638 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3639 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [363a 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [363b 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [363c 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [363d 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [363e 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [363f 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3640 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3641 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3643 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3644 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3645 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3642 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3646 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3647 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3648 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3649 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [364a 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [364b 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [364c 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [364d 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [364e 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [364f 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3650 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3651 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3652 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3653 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3654 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3655 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3656 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3657 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3658 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3659 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [365a 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [365b 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [365c 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [365d 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 gate 1589998878687572600 evaluation starts +peer0.org1.example.com | [365e 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [365f 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3660 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 principal matched by identity 0 +peer0.org1.example.com | [3661 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 09 e9 ba f6 ba 81 60 61 82 5a cc 3e 87 e5 0a |i......`a.Z.>...| +peer0.org1.example.com | 00000010 00 0d 9f 4a aa c9 93 ec 11 90 ac 79 9f 00 58 2d |...J.......y..X-| +peer0.org1.example.com | [3662 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 88 bf 1b 78 8b 0d b6 bf b3 41 0b |0D. `...x.....A.| +peer0.org1.example.com | 00000010 00 89 a1 2d e9 a4 c1 03 65 e1 f0 2b 7a bb 03 87 |...-....e..+z...| +peer0.org1.example.com | 00000020 fd 1f c4 3e 02 20 4d d6 3c fa 0f 2f ad 38 62 94 |...>. M.<../.8b.| +peer0.org1.example.com | 00000030 01 89 33 cc 0f 8e 42 76 27 5f 8b 9c e5 a9 09 54 |..3...Bv'_.....T| +peer0.org1.example.com | 00000040 67 9f 36 b5 5a fb |g.6.Z.| +peer0.org1.example.com | [3663 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3664 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 gate 1589998878687572600 evaluation succeeds +peer0.org1.example.com | [3665 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3667 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3668 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3666 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3669 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [366a 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [366b 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [366c 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [366d 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [366e 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [366f 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3670 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3671 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3672 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3673 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3674 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3675 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36b2 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 88 bf 1b 78 8b 0d b6 bf b3 41 0b |0D. `...x.....A.| +peer1.org2.example.com | 00000010 00 89 a1 2d e9 a4 c1 03 65 e1 f0 2b 7a bb 03 87 |...-....e..+z...| +peer1.org2.example.com | 00000020 fd 1f c4 3e 02 20 4d d6 3c fa 0f 2f ad 38 62 94 |...>. M.<../.8b.| +peer1.org2.example.com | 00000030 01 89 33 cc 0f 8e 42 76 27 5f 8b 9c e5 a9 09 54 |..3...Bv'_.....T| +peer1.org2.example.com | 00000040 67 9f 36 b5 5a fb |g.6.Z.| +peer1.org2.example.com | [36b3 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36b4 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [36b5 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [36b6 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [36b7 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [36b8 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36b9 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36ba 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36bb 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36bc 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36bd 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36be 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [36bf 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36c0 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [36c1 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36c2 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c3 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36c4 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c5 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36c6 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c7 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36c8 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c9 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36ca 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36cb 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36cc 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36cd 05-20 18:21:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [36ce 05-20 18:21:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161035 +peer1.org2.example.com | [36cf 05-20 18:21:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 08F5CFB1268836E391863195E4313982A2B82CC3D901F12F11A6D8409699C0B0 +peer1.org2.example.com | [36d0 05-20 18:21:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [36d1 05-20 18:21:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [36d2 05-20 18:21:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [36d3 05-20 18:21:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [36d4 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36d5 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36d6 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36d7 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [36d8 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36d9 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [36da 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36db 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36dc 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [36dd 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36de 05-20 18:21:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36e0 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36df 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36e1 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36e2 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36e3 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36e4 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [36e5 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36e6 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [36e7 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36e8 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36e9 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [36ea 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [36eb 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [36ec 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036540e0 gate 1589998879046354300 evaluation starts +peer1.org2.example.com | [36ed 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036540e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36ee 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036540e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [36ef 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036540e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [36f0 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036540e0 principal evaluation fails +peer1.org2.example.com | [36f1 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036540e0 gate 1589998879046354300 evaluation fails +peer1.org2.example.com | [36f2 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36f3 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36f4 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [36f5 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654650 gate 1589998879047235300 evaluation starts +peer1.org2.example.com | [36f6 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36f7 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654650 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [36f8 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654650 principal matched by identity 0 +peer1.org2.example.com | [36f9 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 93 94 ca 94 35 80 26 c9 0c d2 f3 69 9d 13 0c |.....5.&....i...| +peer1.org2.example.com | 00000010 2b 98 13 17 d5 97 7e fa e8 c5 b1 ca aa a7 ef d8 |+.....~.........| +peer1.org2.example.com | [36fa 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 30 03 48 94 b0 1f cb 3a 3a a0 ec |0D. 30.H....::..| +peer1.org2.example.com | 00000010 25 63 f0 2a 6a 56 e8 d6 ba 47 97 f0 c0 61 63 c5 |%c.*jV...G...ac.| +peer1.org2.example.com | 00000020 0a 5d c3 5b 02 20 70 e7 4e ff d9 88 f7 2f 00 b4 |.].[. p.N..../..| +peer1.org2.example.com | 00000030 36 37 d8 a4 07 7f 2e 4d b6 ce 56 b4 1a ab d6 ba |67.....M..V.....| +peer1.org2.example.com | 00000040 4c 62 57 ea 77 94 |LbW.w.| +peer1.org2.example.com | [36fb 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [36fc 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654650 gate 1589998879047235300 evaluation succeeds +peer1.org2.example.com | [36fd 05-20 18:21:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [36fe 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [36ff 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3700 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3701 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3702 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3703 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3704 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3705 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3706 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3707 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3708 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3709 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [370a 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [370b 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [370c 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [370d 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [370e 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [370f 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3710 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3711 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3712 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3713 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3714 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3715 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3716 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3717 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3718 05-20 18:21:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3719 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [371a 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [371b 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [371c 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [371d 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [371e 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [371f 05-20 18:21:19.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3720 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3721 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3722 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [3723 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3724 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [3725 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f5d0 gate 1589998879575279700 evaluation starts +peer1.org2.example.com | [3726 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3727 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f5d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3728 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f5d0 principal matched by identity 0 +peer1.org2.example.com | [3729 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c d2 c0 ed c4 0d 9d 19 e2 6d ec 9d 39 f9 4c 81 |l........m..9.L.| +peer1.org2.example.com | 00000010 7a 1d b7 69 ac 32 79 ae ff 19 c5 56 5c 20 d1 1b |z..i.2y....V\ ..| +peer1.org2.example.com | [372a 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 72 cf 47 ba a7 3c d1 29 ce 51 67 |0D. qr.G..<.).Qg| +peer1.org2.example.com | 00000010 8b 1d ec 33 b2 bb d0 94 17 0a 4f ba ca 53 66 fa |...3......O..Sf.| +peer1.org2.example.com | 00000020 d3 20 7a 6a 02 20 60 80 81 60 7c 44 fd 13 ef 6a |. zj. `..`|D...j| +peer1.org2.example.com | 00000030 37 ed 6f c6 ed 11 ec b5 2f 13 79 39 26 22 c0 e2 |7.o...../.y9&"..| +peer1.org2.example.com | 00000040 2d 26 72 55 6f 1b |-&rUo.| +peer1.org2.example.com | [372b 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f5d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [372c 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362f5d0 gate 1589998879575279700 evaluation succeeds +peer1.org2.example.com | [372d 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [372e 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [372f 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [3730 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [3731 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer1.org2.example.com | [3732 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer1.org2.example.com | [3733 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [3734 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +peer1.org1.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer1.org1.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer1.org1.example.com | [3607 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000296c80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3608 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000296c80 gate 1589998888650207300 evaluation succeeds +peer1.org1.example.com | [3609 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [360a 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [360b 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [360c 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [360d 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [360e 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [360f 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3610 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer1.org1.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer1.org1.example.com | [3611 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer1.org1.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer1.org1.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer1.org1.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer1.org1.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer1.org1.example.com | [3612 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3613 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3614 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3615 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer1.org1.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer1.org1.example.com | [3616 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer1.org1.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer1.org1.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer1.org1.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer1.org1.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer1.org1.example.com | [3617 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3618 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3619 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [361a 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [361b 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [361c 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [361d 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [361e 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [361f 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 73 f7 b4 85 d4 e7 7a 7a 2d af 6d 89 29 d0 72 64 |s.....zz-.m.).rd| +peer0.org2.example.com | 00000020 4e 19 45 16 02 20 30 07 e9 a8 42 37 31 ec 39 c0 |N.E.. 0...B71.9.| +peer0.org2.example.com | 00000030 52 64 a4 91 aa d1 22 59 f7 d5 d3 21 13 00 c7 8b |Rd...."Y...!....| +peer0.org2.example.com | 00000040 ca d7 50 8a 5e 9f |..P.^.| +peer0.org2.example.com | [38ae 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ef370 gate 1589998879661847900 evaluation starts +peer0.org2.example.com | [38c9 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [38ca 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ef370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38cc 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ef370 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [38cd 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ef370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [38cb 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [38ce 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ef370 principal evaluation fails +peer0.org2.example.com | [38cf 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ef370 gate 1589998879661847900 evaluation fails +peer0.org2.example.com | [38d0 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [38d1 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [38d2 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [38d3 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038efb00 gate 1589998879674648900 evaluation starts +peer0.org2.example.com | [38d4 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038efb00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38d5 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038efb00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [38d6 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038efb00 principal matched by identity 0 +peer0.org2.example.com | [38d7 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer0.org1.example.com | [3676 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3677 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3678 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3679 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [367a 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [367b 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [367c 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [367d 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [367e 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [367f 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3680 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3681 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3682 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3683 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3684 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3685 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3686 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3687 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3688 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3689 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [368a 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [368b 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [368c 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [368d 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [368e 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [368f 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3690 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3691 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3692 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3693 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3694 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3695 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 gate 1589998878923826400 evaluation starts +peer0.org1.example.com | [3696 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3697 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3698 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 principal matched by identity 0 +peer0.org1.example.com | [3699 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 f5 cf b1 26 88 36 e3 91 86 31 95 e4 31 39 82 |....&.6...1..19.| +peer0.org1.example.com | 00000010 a2 b8 2c c3 d9 01 f1 2f 11 a6 d8 40 96 99 c0 b0 |..,..../...@....| +peer0.org1.example.com | [369a 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 a0 b9 28 48 8a 6a 74 3a d8 16 f4 |0D. 2..(H.jt:...| +peer0.org1.example.com | 00000010 cc 0a 44 32 63 7f a2 37 99 57 8a 07 e5 d0 1d a8 |..D2c..7.W......| +peer0.org1.example.com | 00000020 7e de 0d 5c 02 20 6e e7 21 36 ee 96 33 80 3d 73 |~..\. n.!6..3.=s| +peer0.org1.example.com | 00000030 2d 7b 26 10 7e a8 b8 e2 08 39 38 f6 3c dc 63 7c |-{&.~....98.<.c|| +peer0.org1.example.com | 00000040 11 c1 6f 7a 49 29 |..ozI)| +peer0.org1.example.com | [369b 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [369c 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 gate 1589998878923826400 evaluation succeeds +peer0.org1.example.com | [369d 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [369e 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [369f 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [36a0 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [36a1 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36a2 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [36a3 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36a4 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36a5 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [36a6 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [36a7 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36a8 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [36a9 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36aa 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ab 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ac 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ad 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3735 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer1.org2.example.com | [3736 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer1.org2.example.com | [3737 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org2.example.com | [3738 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer1.org2.example.com | [3739 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer1.org2.example.com | [373a 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [373b 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00281cf00 env 0xc004d22730 txn 0 +peer1.org2.example.com | [373c 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004d22730 +peer1.org2.example.com | [373e 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +peer1.org2.example.com | [373f 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [3740 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [3741 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [3742 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [373d 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [3743 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer1.org2.example.com | [3744 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3745 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [3746 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [3747 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [3748 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [3749 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 39 ad 16 51 9c 3a 63 61 b3 8b e7 78 81 98 26 |.9..Q.:ca...x..&| +peer1.org2.example.com | 00000010 fa 45 70 07 9c c9 7e c2 9a 96 46 22 d6 5c 7d 38 |.Ep...~...F".\}8| +peer1.org2.example.com | [374a 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 04 e6 28 19 1c 5d a6 e5 ec 93 0a |0D. J..(..].....| +peer1.org2.example.com | 00000010 c1 a3 fe a2 2d b1 5e 21 14 5f 55 25 ee 8b 39 22 |....-.^!._U%..9"| +peer1.org2.example.com | 00000020 ee 75 f0 7e 02 20 77 94 f8 8e ec a2 44 4a 6b 45 |.u.~. w.....DJkE| +peer1.org2.example.com | 00000030 a4 95 29 d7 fa ec 6f 2a f1 ac 43 a8 e4 d6 92 5b |..)...o*..C....[| +peer1.org2.example.com | 00000040 b2 87 c3 52 76 5a |...RvZ| +peer1.org2.example.com | [374b 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [374c 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002873800, header channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +peer1.org2.example.com | [374d 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [374e 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [374f 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org2.example.com | [3750 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [3751 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +peer1.org2.example.com | [3752 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org1.example.com | [3620 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3621 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3622 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3623 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3624 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3625 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3626 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000346040 gate 1589998888665633900 evaluation starts +peer1.org1.example.com | [3627 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000346040 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3628 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000346040 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3629 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000346040 principal matched by identity 0 +peer1.org1.example.com | [362a 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 25 c1 a0 94 7e 60 34 8e 31 4c 35 2f 35 77 91 |K%...~`4.1L5/5w.| +peer1.org1.example.com | 00000010 b0 b5 05 2a 7e d6 75 24 44 f4 1d 18 c0 ee 0a 61 |...*~.u$D......a| +peer1.org1.example.com | [362b 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 8c 59 83 51 56 ab 18 ae f2 ec |0E.!...Y.QV.....| +peer1.org1.example.com | 00000010 89 66 e1 ed 13 1e f4 c0 00 11 f0 d6 a1 de e8 e5 |.f..............| +peer1.org1.example.com | 00000020 41 ab 99 45 db 02 20 68 de 29 84 16 d0 11 2f 31 |A..E.. h.)..../1| +peer1.org1.example.com | 00000030 70 57 84 92 a1 49 94 95 dc 82 87 cc 9c 49 44 f3 |pW...I.......ID.| +peer1.org1.example.com | 00000040 5d ef a4 a3 26 cd c6 |]...&..| +peer1.org1.example.com | [362c 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000346040 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [362d 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000346040 gate 1589998888665633900 evaluation succeeds +peer1.org1.example.com | [362e 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [362f 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3630 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3631 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3632 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3633 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3634 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3635 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3636 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3637 05-20 18:21:28.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3638 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3639 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [363a 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [363b 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [363c 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [363d 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [363e 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [363f 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3640 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3641 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3642 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3643 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3644 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3645 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3646 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36ae 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36af 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b0 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b1 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36b2 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b3 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36b4 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36b5 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36b6 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36b7 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36b8 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36b9 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [36ba 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36bb 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36bc 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [36bd 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36be 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36bf 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36c0 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36c1 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [36c2 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161032 +peer0.org1.example.com | [36c3 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8B9394CA94358026C90CD2F3699D130C2B981317D5977EFAE8C5B1CAAAA7EFD8 +peer0.org1.example.com | [36c4 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [36c5 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [36c6 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [36c7 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [36c8 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36c9 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36ca 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36cb 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [36cc 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [36cd 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36ce 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [36cf 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36d0 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36d1 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36d2 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36d3 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36d4 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36d5 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36d6 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36d7 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36d8 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36d9 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [36da 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [36db 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36dc 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [36dd 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36de 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36df 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [36e0 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [36e2 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36e1 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36e3 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [36e4 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36e5 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [36e6 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36e7 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36e9 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36e8 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [36eb 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [36ec 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [36ed 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [36ee 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 gate 1589998879598336300 evaluation starts +peer0.org1.example.com | [36ef 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [36f0 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [36f1 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 principal matched by identity 0 +peer0.org1.example.com | [36f2 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c d2 c0 ed c4 0d 9d 19 e2 6d ec 9d 39 f9 4c 81 |l........m..9.L.| +peer0.org1.example.com | 00000010 7a 1d b7 69 ac 32 79 ae ff 19 c5 56 5c 20 d1 1b |z..i.2y....V\ ..| +peer0.org1.example.com | [36f3 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [36f4 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 72 cf 47 ba a7 3c d1 29 ce 51 67 |0D. qr.G..<.).Qg| +peer0.org1.example.com | 00000010 8b 1d ec 33 b2 bb d0 94 17 0a 4f ba ca 53 66 fa |...3......O..Sf.| +peer0.org1.example.com | 00000020 d3 20 7a 6a 02 20 60 80 81 60 7c 44 fd 13 ef 6a |. zj. `..`|D...j| +peer0.org1.example.com | 00000030 37 ed 6f c6 ed 11 ec b5 2f 13 79 39 26 22 c0 e2 |7.o...../.y9&"..| +peer0.org1.example.com | 00000040 2d 26 72 55 6f 1b |-&rUo.| +peer0.org1.example.com | [36f5 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [36f6 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36f7 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [36f8 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 gate 1589998879598336300 evaluation succeeds +peer0.org1.example.com | [36f9 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [36fa 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [36fb 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [36fd 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org1.example.com | [36fc 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [36fe 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org1.example.com | [3700 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org1.example.com | [3701 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [3702 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [36ff 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer0.org2.example.com | [38d8 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer0.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer0.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer0.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer0.org2.example.com | [38d9 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038efb00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [38da 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038efb00 gate 1589998879674648900 evaluation succeeds +peer0.org2.example.com | [38db 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [38dc 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [38dd 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [38de 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [38df 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38e0 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [38e1 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38e2 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [38e3 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [38e4 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [38e5 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [38e6 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [38e7 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [38e8 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393eda0 gate 1589998879678230100 evaluation starts +peer0.org2.example.com | [38e9 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393eda0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38ea 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393eda0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [38eb 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393eda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [38ec 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393eda0 principal evaluation fails +peer0.org2.example.com | [38ed 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393eda0 gate 1589998879678230100 evaluation fails +peer0.org2.example.com | [38ee 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [38ef 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [38f0 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [38f1 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393f310 gate 1589998879681651800 evaluation starts +peer0.org2.example.com | [38f3 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393f310 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38f4 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393f310 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [38f5 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393f310 principal matched by identity 0 +peer0.org2.example.com | [38f6 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer0.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer0.org2.example.com | [38f7 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer0.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer1.org2.example.com | [3753 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00369c000 +peer1.org2.example.com | [3754 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [de5b2a2f-2fbb-44c7-935c-1c4666dcc524] +peer1.org2.example.com | [3755 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [3756 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [de5b2a2f-2fbb-44c7-935c-1c4666dcc524] +peer1.org2.example.com | [3757 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer1.org2.example.com | [3758 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [22c75adb-f91d-48dc-89ce-5dbe763d20c3] +peer1.org2.example.com | [3759 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [22c75adb-f91d-48dc-89ce-5dbe763d20c3] +peer1.org2.example.com | [375a 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 gate 1589998879594739600 evaluation starts +peer1.org2.example.com | [375b 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [375c 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [375d 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 principal matched by identity 0 +peer1.org2.example.com | [375e 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 84 ba 80 89 7d 6f bb 1b 4c ac e4 dd 01 e3 3c |.....}o..L.....<| +peer1.org2.example.com | 00000010 de 3d f0 67 ad c1 13 6c ab 14 c8 18 d0 a7 29 97 |.=.g...l......).| +peer1.org2.example.com | [375f 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3760 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3761 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3762 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3763 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3764 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3765 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3766 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes +peer1.org2.example.com | [3767 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org1.example.com | [3705 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org1.example.com | [3706 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org1.example.com | [3703 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [3707 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +peer0.org1.example.com | [3708 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [3709 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org1.example.com | [3704 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org1.example.com | [370a 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org1.example.com | [370b 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org1.example.com | [370c 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org1.example.com | [370d 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org1.example.com | [370e 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [370f 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0030a8840 env 0xc002499ae0 txn 0 +peer0.org1.example.com | [3710 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002499ae0 +peer0.org1.example.com | [3711 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +peer0.org1.example.com | [3712 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3713 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3714 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3715 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [3716 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3717 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 39 ad 16 51 9c 3a 63 61 b3 8b e7 78 81 98 26 |.9..Q.:ca...x..&| +peer0.org1.example.com | 00000010 fa 45 70 07 9c c9 7e c2 9a 96 46 22 d6 5c 7d 38 |.Ep...~...F".\}8| +peer0.org1.example.com | [3718 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 04 e6 28 19 1c 5d a6 e5 ec 93 0a |0D. J..(..].....| +peer0.org1.example.com | 00000010 c1 a3 fe a2 2d b1 5e 21 14 5f 55 25 ee 8b 39 22 |....-.^!._U%..9"| +peer0.org1.example.com | 00000020 ee 75 f0 7e 02 20 77 94 f8 8e ec a2 44 4a 6b 45 |.u.~. w.....DJkE| +peer0.org1.example.com | 00000030 a4 95 29 d7 fa ec 6f 2a f1 ac 43 a8 e4 d6 92 5b |..)...o*..C....[| +peer0.org1.example.com | 00000040 b2 87 c3 52 76 5a |...RvZ| +peer0.org1.example.com | [3719 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [371a 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003694000, header channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +peer0.org1.example.com | [371b 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [371c 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [371d 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [371e 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [371f 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +peer0.org1.example.com | [3720 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [3721 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc003686000 +peer0.org1.example.com | [3722 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [36d7a45f-6736-4eb9-a283-97d0922ef6cf] +peer0.org1.example.com | [3723 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3724 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [36d7a45f-6736-4eb9-a283-97d0922ef6cf] +peer0.org1.example.com | [3725 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [3726 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0474797c-3ada-4527-bf6e-cb528b49f359] +peer0.org1.example.com | [3727 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0474797c-3ada-4527-bf6e-cb528b49f359] +peer0.org1.example.com | [3728 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 gate 1589998879661465300 evaluation starts +peer1.org1.example.com | [3647 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3648 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3649 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [364a 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [364b 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [364c 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [364d 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [364e 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [364f 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3650 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3651 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3652 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3653 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3654 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3655 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3656 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3657 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3658 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3659 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [365a 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [365b 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [365c 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [365d 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [365e 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [365f 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3660 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3661 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3662 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3663 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3729 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [372a 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [372b 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 principal matched by identity 0 +peer0.org1.example.com | [372c 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 84 ba 80 89 7d 6f bb 1b 4c ac e4 dd 01 e3 3c |.....}o..L.....<| +peer0.org1.example.com | 00000010 de 3d f0 67 ad c1 13 6c ab 14 c8 18 d0 a7 29 97 |.=.g...l......).| +peer0.org1.example.com | [372d 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ca ab ee 53 59 e9 ea bd 6b ce eb |0D. +...SY...k..| +peer0.org1.example.com | 00000010 73 f7 b4 85 d4 e7 7a 7a 2d af 6d 89 29 d0 72 64 |s.....zz-.m.).rd| +peer0.org1.example.com | 00000020 4e 19 45 16 02 20 30 07 e9 a8 42 37 31 ec 39 c0 |N.E.. 0...B71.9.| +peer0.org1.example.com | 00000030 52 64 a4 91 aa d1 22 59 f7 d5 d3 21 13 00 c7 8b |Rd...."Y...!....| +peer0.org1.example.com | 00000040 ca d7 50 8a 5e 9f |..P.^.| +peer0.org1.example.com | [372e 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [372f 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [3730 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 skipping identity 0 because it has already been used +peer0.org1.example.com | [3731 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 principal evaluation fails +peer0.org1.example.com | [3732 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 gate 1589998879661465300 evaluation succeeds +peer0.org1.example.com | [3733 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [57b5853c-bc06-4a6b-8b05-581592e5b61e] +peer0.org1.example.com | [3734 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [57b5853c-bc06-4a6b-8b05-581592e5b61e] +peer0.org1.example.com | [3735 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [3736 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 appears to be valid +peer0.org1.example.com | [3737 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc003686000 +peer0.org1.example.com | [3738 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0030a8840 env 0xc002499ae0 txn 0 +peer0.org1.example.com | [3739 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [373a 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 23ms +peer0.org1.example.com | [373b 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [373c 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [373d 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org1.example.com | [373e 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [373f 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [3740 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [3741 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org1.example.com | [3742 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [3743 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [3744 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [3745 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [3746 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [3747 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [3748 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3749 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [374a 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [374b 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [374c 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [374d 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer0.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer0.org2.example.com | [38f2 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 skipping identity 0 because it has already been used +peer0.org2.example.com | [38f8 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 principal evaluation fails +peer0.org2.example.com | [38f9 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003909ab0 gate 1589998879665355100 evaluation succeeds +peer0.org2.example.com | [38fa 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ac78f62f-14d0-48f6-990d-292aa7dd9b4f] +peer0.org2.example.com | [38fc 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ac78f62f-14d0-48f6-990d-292aa7dd9b4f] +peer0.org2.example.com | [38fd 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | [38fe 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 appears to be valid +peer0.org2.example.com | [38fb 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393f310 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [38ff 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0038e0400 +peer0.org2.example.com | [3900 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393f310 gate 1589998879681651800 evaluation succeeds +peer0.org2.example.com | [3903 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3901 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00009fd40 env 0xc00383bd60 txn 0 +peer0.org2.example.com | [3902 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [3904 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3905 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 57ms +peer0.org2.example.com | [3906 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3907 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [3908 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [3909 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [390a 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org2.example.com | [390c 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [390d 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [390e 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [390f 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org2.example.com | [3910 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [390b 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3911 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [3912 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [3913 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [3914 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [3915 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [3916 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [3917 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [3918 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] marked as valid by state validator +peer0.org2.example.com | [3919 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003206b00), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003206b40)} +peer0.org2.example.com | [391b 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [391c 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [391d 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [391e 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org2.example.com | [391f 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org2.example.com | [3920 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org2.example.com | [391a 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3921 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org2.example.com | [3922 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x60, 0xc5, 0x4f, 0x44, 0x0, 0x2d, 0xfc, 0xe6, 0x2a, 0x7, 0x13, 0xb5, 0xf5, 0xfc, 0xb9, 0xf0, 0xb, 0x61, 0x18, 0xa, 0xe3, 0x93, 0x45, 0xfc, 0x9f, 0x46, 0x5c, 0xc4, 0x56, 0x14, 0x37, 0xcd} txOffsets= +peer0.org2.example.com | txId=f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 locPointer=offset=70, bytesLength=2980 +peer0.org2.example.com | ] +peer0.org2.example.com | [3923 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93584, bytesLength=2980] for tx ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to txid-index +peer0.org2.example.com | [3924 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93584, bytesLength=2980] for tx number:[0] ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to blockNumTranNum index +peer0.org2.example.com | [3925 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97556], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org2.example.com | [3926 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org2.example.com | [3927 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org2.example.com | [3928 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org2.example.com | [3929 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [392a 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [392b 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [392c 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [392d 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [392e 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [392f 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [3930 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org2.example.com | [3931 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org2.example.com | [3932 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org2.example.com | [3933 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [3934 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org2.example.com | [3935 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org2.example.com | [3936 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org2.example.com | [3937 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 46ms (state_validation=9ms block_and_pvtdata_commit=23ms state_commit=8ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org2.example.com | [3938 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3939 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408CC93F4F0C0EFB38816...08061A0C0A0565787030321203312E30 +peer0.org2.example.com | [393a 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CF4E4E5C7DE92FEB0EBC3F27A1107C7C87429C938162459CE1B2EF677B48EBD3 +peer0.org2.example.com | [393b 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org2.example.com | [393c 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [393d 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [393e 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [393f 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3940 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3941 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3942 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3943 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3944 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3945 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3946 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3947 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3948 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3949 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ff70 gate 1589998879861613000 evaluation starts +peer0.org2.example.com | [394a 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ff70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [394b 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ff70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [394c 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ff70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [394d 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ff70 principal evaluation fails +peer0.org2.example.com | [394e 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00397ff70 gate 1589998879861613000 evaluation fails +peer0.org2.example.com | [394f 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3950 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3951 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3952 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c4e0 gate 1589998879864830700 evaluation starts +peer0.org2.example.com | [3953 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c4e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3954 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c4e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3955 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c4e0 principal matched by identity 0 +peer0.org2.example.com | [3956 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3957 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3958 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c4e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3959 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c4e0 gate 1589998879864830700 evaluation succeeds +peer0.org2.example.com | [395a 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [395b 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [395c 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [395d 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [395e 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [395f 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3960 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3961 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3962 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3963 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3964 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3965 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d0d0 gate 1589998879872235500 evaluation starts +peer0.org2.example.com | [3966 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3967 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d0d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3968 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3969 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d0d0 principal evaluation fails +peer0.org2.example.com | [396a 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d0d0 gate 1589998879872235500 evaluation fails +peer0.org2.example.com | [396b 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [396c 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [396d 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [396e 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d640 gate 1589998879880310300 evaluation starts +peer0.org2.example.com | [396f 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3970 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d640 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3971 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d640 principal matched by identity 0 +peer0.org2.example.com | [3972 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3973 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [3664 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3665 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3666 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3667 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3668 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3669 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [366a 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003595b0 gate 1589998888894786100 evaluation starts +peer1.org1.example.com | [366b 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003595b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [366c 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003595b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [366d 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003595b0 principal matched by identity 0 +peer1.org1.example.com | [366e 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 1e 74 7c 7e b9 e3 9f 9f a7 fb f1 a8 7d df ee |8.t|~........}..| +peer1.org1.example.com | 00000010 68 7e 2a 3f 2e 2b 10 2e 4a 64 bb d2 e9 77 f8 a1 |h~*?.+..Jd...w..| +peer1.org1.example.com | [366f 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 fd cd 4c f8 c1 51 90 7e 36 0b |0E.!....L..Q.~6.| +peer1.org1.example.com | 00000010 42 28 0c 3a 7b e5 84 a3 1f e3 88 4e 2f 01 3c e7 |B(.:{......N/.<.| +peer1.org1.example.com | 00000020 0e d1 cb fe 77 02 20 34 5c 17 c5 c1 40 1b e9 55 |....w. 4\...@..U| +peer1.org1.example.com | 00000030 89 dd ae 66 19 2c a2 ff 23 2b 86 b5 9e 5c d7 02 |...f.,..#+...\..| +peer1.org1.example.com | 00000040 ee 64 9e 75 a1 03 51 |.d.u..Q| +peer1.org1.example.com | [3670 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003595b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3671 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003595b0 gate 1589998888894786100 evaluation succeeds +peer1.org1.example.com | [3672 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3673 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3674 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3675 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3676 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3677 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3678 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3679 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [367a 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [367b 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [367c 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [367d 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [367e 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [367f 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3680 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3681 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3682 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3683 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3684 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3685 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3686 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3687 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3688 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3689 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3974 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3975 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d640 gate 1589998879880310300 evaluation succeeds +peer0.org2.example.com | [3976 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3977 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3978 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3979 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [397a 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [397b 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [397c 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3768 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3769 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [376a 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [376b 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [376c 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [376d 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [376e 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [376f 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3770 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3771 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3772 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3773 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3774 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3775 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2550 gate 1589998879617391400 evaluation starts +peer1.org2.example.com | [3776 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3777 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2550 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3778 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3779 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2550 principal evaluation fails +peer1.org2.example.com | [377a 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2550 gate 1589998879617391400 evaluation fails +peer1.org2.example.com | [377b 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [377c 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [377d 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [377e 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2ac0 gate 1589998879617650300 evaluation starts +peer1.org2.example.com | [377f 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3780 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2ac0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3781 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2ac0 principal matched by identity 0 +peer1.org2.example.com | [3782 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer1.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer1.org2.example.com | [3783 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer1.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer1.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer1.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer1.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer1.org2.example.com | [3784 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2ac0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3785 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2ac0 gate 1589998879617650300 evaluation succeeds +peer1.org2.example.com | [3786 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3787 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3788 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3789 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [378a 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [378b 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [378c 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [378d 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [378e 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [378f 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3790 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ca ab ee 53 59 e9 ea bd 6b ce eb |0D. +...SY...k..| +peer1.org2.example.com | 00000010 73 f7 b4 85 d4 e7 7a 7a 2d af 6d 89 29 d0 72 64 |s.....zz-.m.).rd| +peer1.org2.example.com | 00000020 4e 19 45 16 02 20 30 07 e9 a8 42 37 31 ec 39 c0 |N.E.. 0...B71.9.| +peer1.org2.example.com | 00000030 52 64 a4 91 aa d1 22 59 f7 d5 d3 21 13 00 c7 8b |Rd...."Y...!....| +peer1.org2.example.com | 00000040 ca d7 50 8a 5e 9f |..P.^.| +peer1.org2.example.com | [3791 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3792 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d36b0 gate 1589998879620803100 evaluation starts +peer1.org2.example.com | [3793 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d36b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3794 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d36b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3795 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d36b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3796 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d36b0 principal evaluation fails +peer1.org2.example.com | [3797 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d36b0 gate 1589998879620803100 evaluation fails +peer1.org2.example.com | [3798 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3799 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [379a 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [379b 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d3c20 gate 1589998879621608900 evaluation starts +peer1.org2.example.com | [379c 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d3c20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [379d 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d3c20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [379e 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d3c20 principal matched by identity 0 +peer1.org2.example.com | [379f 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer1.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer1.org2.example.com | [37a0 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer1.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer1.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer1.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer1.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer1.org2.example.com | [37a1 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d3c20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [37a2 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d3c20 gate 1589998879621608900 evaluation succeeds +peer1.org2.example.com | [37a3 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [37a4 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [37a5 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [37a6 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [37a7 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [37a8 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [37a9 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 skipping identity 0 because it has already been used +peer1.org2.example.com | [37aa 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 principal evaluation fails +peer1.org2.example.com | [37ab 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036991d0 gate 1589998879594739600 evaluation succeeds +peer1.org2.example.com | [37ac 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3083061c-995e-4f55-af73-774188b3c35c] +peer1.org2.example.com | [37ad 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3083061c-995e-4f55-af73-774188b3c35c] +peer1.org2.example.com | [37ae 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37af 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | [37b0 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 appears to be valid +peer1.org2.example.com | [37b1 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00369c000 +peer1.org2.example.com | [37b2 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00281cf00 env 0xc004d22730 txn 0 +peer1.org2.example.com | [37b3 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [37b4 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 43ms +peer1.org2.example.com | [37b5 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37b6 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [37b7 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37b8 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [37b9 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer1.org2.example.com | [37ba 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [397d 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [397e 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [397f 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3980 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3981 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3982 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3983 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3984 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3985 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3986 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3987 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3988 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3989 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [398a 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [398b 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [398c 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ce910 gate 1589998879905848500 evaluation starts +peer0.org2.example.com | [398d 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ce910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [398e 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ce910 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [398f 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ce910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3990 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ce910 principal evaluation fails +peer0.org2.example.com | [3991 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ce910 gate 1589998879905848500 evaluation fails +peer0.org2.example.com | [3992 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3993 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3994 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3995 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cee80 gate 1589998879907034100 evaluation starts +peer0.org2.example.com | [3996 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cee80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3997 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cee80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3998 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cee80 principal matched by identity 0 +peer0.org2.example.com | [3999 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [399a 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [399b 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cee80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [399c 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cee80 gate 1589998879907034100 evaluation succeeds +peer0.org2.example.com | [399d 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [399e 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [399f 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [39a0 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [39a1 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39a2 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [39a3 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39a4 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39a5 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39a6 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39a7 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [39a8 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [39a9 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [39aa 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8b70 gate 1589998879919821100 evaluation starts +peer0.org2.example.com | [39ab 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8b70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39ac 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8b70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [39ad 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [39ae 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8b70 principal evaluation fails +peer0.org2.example.com | [39af 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c8b70 gate 1589998879919821100 evaluation fails +peer0.org2.example.com | [39b0 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [39b1 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [39b2 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [39b3 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c90e0 gate 1589998879922655400 evaluation starts +peer0.org2.example.com | [39b4 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c90e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39b5 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c90e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [39b6 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c90e0 principal matched by identity 0 +peer0.org2.example.com | [39b7 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [39b8 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [39b9 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c90e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [39ba 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c90e0 gate 1589998879922655400 evaluation succeeds +peer0.org2.example.com | [39bb 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39bc 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39bd 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [39be 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [39bf 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39c0 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c1 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39c2 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39c3 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [39c4 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [39c5 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c6 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [39c7 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39c8 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [39c9 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [39cb 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39ca 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39cc 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39cd 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39ce 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39cf 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39d0 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39d1 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [39d2 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [39d3 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [39d4 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04860 gate 1589998880120185800 evaluation starts +peer0.org2.example.com | [39d5 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39d6 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04860 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [39d7 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [39d8 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04860 principal evaluation fails +peer0.org2.example.com | [39d9 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04860 gate 1589998880120185800 evaluation fails +peer0.org2.example.com | [39da 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [39db 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [39dc 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [39dd 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04dd0 gate 1589998880121587400 evaluation starts +peer0.org2.example.com | [39de 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04dd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39df 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04dd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [39e0 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04dd0 principal matched by identity 0 +peer0.org2.example.com | [39e1 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [39e2 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [39e3 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04dd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [39e4 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a04dd0 gate 1589998880121587400 evaluation succeeds +peer0.org2.example.com | [39e5 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39e6 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39e7 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [39e8 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [39e9 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39ea 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39eb 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39ec 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39ed 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39ee 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [39ef 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [39f0 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [39f1 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05fd0 gate 1589998880124028400 evaluation starts +peer0.org2.example.com | [39f2 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39f3 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05fd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [39f4 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [39f5 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05fd0 principal evaluation fails +peer0.org2.example.com | [39f6 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a05fd0 gate 1589998880124028400 evaluation fails +peer0.org2.example.com | [39f7 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [39f8 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [39f9 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [39fa 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a18540 gate 1589998880126024600 evaluation starts +peer0.org2.example.com | [39fb 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a18540 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39fc 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a18540 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [39fd 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a18540 principal matched by identity 0 +peer0.org2.example.com | [39fe 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [39ff 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3a00 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a18540 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a01 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a18540 gate 1589998880126024600 evaluation succeeds +peer0.org2.example.com | [3a02 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a03 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a04 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a05 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a06 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a07 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a08 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a09 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a0a 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a0b 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3a0c 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a19080 gate 1589998880132000800 evaluation starts +peer0.org2.example.com | [3a0d 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a19080 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a0e 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a19080 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a0f 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a19080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3a10 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a19080 principal evaluation fails +peer0.org2.example.com | [3a11 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a19080 gate 1589998880132000800 evaluation fails +peer0.org2.example.com | [3a12 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a13 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a14 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a15 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a195f0 gate 1589998880132507600 evaluation starts +peer0.org2.example.com | [3a16 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a195f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a17 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a195f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a18 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a195f0 principal matched by identity 0 +peer0.org2.example.com | [3a19 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3a1a 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | [368a 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [368b 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [368c 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [368d 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [368e 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [368f 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3691 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3690 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3692 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3693 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3694 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3695 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3696 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3697 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3698 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3699 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [369a 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [369b 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [369c 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [369d 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1d60 gate 1589998888918199400 evaluation starts +peer1.org1.example.com | [369e 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1d60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [369f 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1d60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [36a0 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1d60 principal matched by identity 0 +peer1.org1.example.com | [36a1 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer1.org1.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer1.org2.example.com | [37bb 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [37bc 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [37bd 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [37be 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37bf 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer1.org2.example.com | [37c0 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [37c1 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [37c2 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37c3 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | [37c4 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer1.org2.example.com | [37c5 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [37c6 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer1.org2.example.com | [37c7 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37c8 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer1.org2.example.com | [37c9 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [37ca 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org2.example.com | [37cb 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [37cc 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] marked as valid by state validator +peer1.org2.example.com | [37cd 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37ce 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002977fc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0025ba140)} +peer1.org2.example.com | [37cf 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [37d0 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [37d1 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [37d2 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer1.org2.example.com | [37d3 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer1.org2.example.com | [37d4 05-20 18:21:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer1.org2.example.com | [37d5 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer1.org2.example.com | [37d6 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x60, 0xc5, 0x4f, 0x44, 0x0, 0x2d, 0xfc, 0xe6, 0x2a, 0x7, 0x13, 0xb5, 0xf5, 0xfc, 0xb9, 0xf0, 0xb, 0x61, 0x18, 0xa, 0xe3, 0x93, 0x45, 0xfc, 0x9f, 0x46, 0x5c, 0xc4, 0x56, 0x14, 0x37, 0xcd} txOffsets= +peer1.org2.example.com | txId=f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 locPointer=offset=70, bytesLength=2980 +peer1.org2.example.com | ] +peer1.org2.example.com | [37d7 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93577, bytesLength=2980] for tx ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to txid-index +peer1.org2.example.com | [37d8 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93577, bytesLength=2980] for tx number:[0] ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to blockNumTranNum index +peer1.org2.example.com | [37d9 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97549], isChainEmpty=[false], lastBlockNumber=[5] +peer1.org2.example.com | [37da 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer1.org2.example.com | [37db 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [37dd 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [37de 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [374e 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [374f 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3750 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3751 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 gate 1589998879681383700 evaluation starts +peer0.org1.example.com | [3752 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3753 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3754 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 principal matched by identity 0 +peer0.org1.example.com | [3755 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org1.example.com | [3756 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org1.example.com | [3757 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3758 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 gate 1589998879681383700 evaluation succeeds +peer0.org1.example.com | [3759 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [375a 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [375b 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [375c 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [375d 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [375f 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] marked as valid by state validator +peer0.org1.example.com | [375e 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3760 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0030a9d80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0030a9dc0)} +peer0.org1.example.com | [3761 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [3762 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [3763 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [3764 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3765 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org1.example.com | [3766 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org1.example.com | [3767 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org1.example.com | [3768 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [36ea 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3769 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [376a 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [376b 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [376c 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [376e 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [376f 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [376d 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3770 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3771 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3a1b 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a195f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a1c 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a195f0 gate 1589998880132507600 evaluation succeeds +peer0.org2.example.com | [3a1d 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a1e 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a1f 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a20 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a21 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [3a22 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a26 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a27 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a28 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a23 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a29 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a2a 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3a2b 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3a2c 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36a2 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer1.org1.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer1.org1.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer1.org1.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer1.org1.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer1.org1.example.com | [36a3 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1d60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36a4 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d1d60 gate 1589998888918199400 evaluation succeeds +peer1.org1.example.com | [36a5 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36a6 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36a7 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36a8 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36a9 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [36aa 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [36ab 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [36ac 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [36ad 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [36ae 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36af 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36b0 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36b1 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [36b2 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36b3 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36b4 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36b5 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [36b6 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > alive: alive: alive:t\017)\266^\305\377\212\306\242sG\23166\362:\210\273\002 \001\362\240&\340%\364\006\017\213\024\205\026\300\022\374\371\315\247\276\010\020\302\312\3451\n<\360\037\2743" > +peer1.org1.example.com | [36b7 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [36b8 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36b9 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [36ba 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36bb 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [36bc 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37df 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [37e0 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [37e1 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [37dc 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer1.org2.example.com | [37e2 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer1.org2.example.com | [37e3 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [37e4 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [37e5 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [37e6 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [37e7 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [37e8 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | [37e9 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [37ea 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [37eb 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer1.org2.example.com | [37ec 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [37ed 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [37ee 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer1.org2.example.com | [37ef 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3680 gate 1589998879669597500 evaluation starts +peer1.org2.example.com | [37f0 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer1.org2.example.com | [37f1 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3680 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [37f2 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [37f3 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3680 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [37f4 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [37f5 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3680 principal evaluation fails +peer1.org2.example.com | [37f6 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer1.org2.example.com | [37f7 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3680 gate 1589998879669597500 evaluation fails +peer1.org2.example.com | [37f8 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer1.org2.example.com | [37f9 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37fa 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37fb 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [37fc 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3bf0 gate 1589998879670810600 evaluation starts +peer1.org2.example.com | [37fd 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [37fe 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer1.org2.example.com | [37ff 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 46ms (state_validation=0ms block_and_pvtdata_commit=32ms state_commit=8ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer1.org2.example.com | [3800 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3801 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F8B6E8FEC1EFB38816...08061A0C0A0565787030321203312E30 +peer1.org2.example.com | [3802 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 268A1CFE10F29EE07686B710BE83ADE07F811B4F26233BC2CD642C72E961D228 +peer1.org2.example.com | [3803 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer1.org2.example.com | [3804 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3bf0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3805 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3bf0 principal matched by identity 0 +peer1.org2.example.com | [3806 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer1.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer1.org2.example.com | [3807 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org2.example.com | [3a2d 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a2e 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a2f 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a30 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3a31 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3eac0 gate 1589998880140554800 evaluation starts +peer0.org2.example.com | [3a32 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3eac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a33 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3eac0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a34 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3eac0 principal matched by identity 0 +peer0.org2.example.com | [3a35 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3a36 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3a37 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3eac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a38 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3eac0 gate 1589998880140554800 evaluation succeeds +peer0.org2.example.com | [3a39 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a3a 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a3b 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a3c 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a3d 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3a3e 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3a3f 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a40 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a41 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org2.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org2.example.com | [3a42 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org2.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org2.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org2.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org2.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org2.example.com | [3a24 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a44 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a25 05-20 18:21:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a45 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a43 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a46 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36bd 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [36be 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36bf 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [36c0 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [36c1 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +peer1.org1.example.com | 00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +peer1.org1.example.com | [36c2 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +peer1.org1.example.com | 00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +peer1.org1.example.com | 00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +peer1.org1.example.com | 00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +peer1.org1.example.com | 00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +peer1.org1.example.com | [36c3 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [36c4 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 11 98 1b 55 1e cf f6 ce 72 7b 22 |0D. ....U....r{"| +peer1.org1.example.com | 00000010 56 84 9b 3f 78 85 77 76 3b ae 0d f9 97 06 9f cc |V..?x.wv;.......| +peer1.org1.example.com | 00000020 55 f2 4c 96 02 20 74 17 9a 84 9f 54 39 f5 ab d6 |U.L.. t....T9...| +peer1.org1.example.com | 00000030 c4 33 02 41 f0 b1 ea 75 12 9f fc 0b 4b b0 9f 0c |.3.A...u....K...| +peer1.org1.example.com | 00000040 76 8d 8f ef 4e b0 |v...N.| +peer1.org1.example.com | [36c5 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [36c6 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [36c7 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [36c8 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [36c9 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [36ca 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36cb 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36cc 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36cd 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [36ce 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36cf 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36d0 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [36d1 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:t\017)\266^\305\377\212\306\242sG\23166\362:\210\273\002 \001\362\240&\340%\364\006\017\213\024\205\026\300\022\374\371\315\247\276\010\020\302\312\3451\n<\360\037\2743" > +peer1.org1.example.com | [36d2 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [36d3 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36d4 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36d5 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36d6 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36d7 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [36d8 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 06 9e ab 2f 17 ac 20 ac ac 13 e8 81 39 87 ba |..../.. .....9..| +peer1.org1.example.com | 00000010 1b 35 ba d6 ed bc 07 a3 94 fc 64 7c c6 6f e6 4d |.5........d|.o.M| +peer1.org1.example.com | [36d9 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 a6 41 a7 ed f6 df 93 cc c4 23 ff |0D. U.A.......#.| +peer1.org1.example.com | 00000010 ab 35 79 86 4d a2 ec ba 68 ab 46 ee 77 d9 4f de |.5y.M...h.F.w.O.| +peer1.org1.example.com | 00000020 14 33 f8 83 02 20 42 7d bd a7 6a f0 a9 5a a6 9b |.3... B}..j..Z..| +peer1.org1.example.com | 00000030 c1 3c 5f 08 51 b8 75 f9 f1 fe 30 e4 df c2 a3 2e |.<_.Q.u...0.....| +peer1.org1.example.com | 00000040 14 79 20 a4 a5 97 |.y ...| +peer1.org1.example.com | [36da 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36db 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [36dc 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [36dd 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [36de 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [36df 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36e0 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36e1 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36e2 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36e3 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36e4 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36e5 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36e6 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36e7 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36e8 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36e9 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36ea 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [36eb 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36ec 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [36ed 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36ee 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36ef 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36f0 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36f1 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3772 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3773 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3774 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes +peer0.org1.example.com | [3775 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3776 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3777 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 gate 1589998879696282800 evaluation starts +peer0.org1.example.com | [3778 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3779 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [377a 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 principal matched by identity 0 +peer0.org1.example.com | [377b 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 4c f1 c1 42 24 69 95 71 cc 4a 01 9b 7e 0c f0 |.L..B$i.q.J..~..| +peer0.org1.example.com | 00000010 bb 7f 97 a4 96 85 a9 49 46 56 3e 2c 9d 59 f8 82 |.......IFV>,.Y..| +peer0.org1.example.com | [377c 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 48 94 0e fe 7a 74 16 34 10 ae 39 |0D. yH...zt.4..9| +peer0.org1.example.com | 00000010 4f 61 57 e8 06 00 f2 ab f1 c9 76 25 39 b3 e3 d5 |OaW.......v%9...| +peer0.org1.example.com | 00000020 da e2 e7 87 02 20 64 3e 55 6b c3 df 3e fa 14 b8 |..... d>Uk..>...| +peer0.org1.example.com | 00000030 9d cf fe 12 13 cd 41 76 11 f3 60 e5 e0 a2 0d fa |......Av..`.....| +peer0.org1.example.com | 00000040 ed 4c 76 0d 84 13 |.Lv...| +peer0.org1.example.com | [377d 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [377e 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org1.example.com | [377f 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 gate 1589998879696282800 evaluation succeeds +peer0.org1.example.com | [3781 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3782 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3783 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3780 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x60, 0xc5, 0x4f, 0x44, 0x0, 0x2d, 0xfc, 0xe6, 0x2a, 0x7, 0x13, 0xb5, 0xf5, 0xfc, 0xb9, 0xf0, 0xb, 0x61, 0x18, 0xa, 0xe3, 0x93, 0x45, 0xfc, 0x9f, 0x46, 0x5c, 0xc4, 0x56, 0x14, 0x37, 0xcd} txOffsets= +peer0.org1.example.com | txId=f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 locPointer=offset=70, bytesLength=2980 +peer0.org1.example.com | ] +peer0.org1.example.com | [3784 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93577, bytesLength=2980] for tx ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to txid-index +peer0.org1.example.com | [3785 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93577, bytesLength=2980] for tx number:[0] ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to blockNumTranNum index +peer0.org1.example.com | [3786 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3787 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3788 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3789 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [378a 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [378b 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [378c 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97549], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org1.example.com | [378d 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org1.example.com | [378e 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [378f 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 gate 1589998879724774000 evaluation starts +peer0.org1.example.com | [3790 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3791 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3792 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 principal matched by identity 0 +peer0.org1.example.com | [3793 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 4c f1 c1 42 24 69 95 71 cc 4a 01 9b 7e 0c f0 |.L..B$i.q.J..~..| +peer0.org1.example.com | 00000010 bb 7f 97 a4 96 85 a9 49 46 56 3e 2c 9d 59 f8 82 |.......IFV>,.Y..| +peer0.org1.example.com | [3794 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 48 94 0e fe 7a 74 16 34 10 ae 39 |0D. yH...zt.4..9| +peer0.org1.example.com | 00000010 4f 61 57 e8 06 00 f2 ab f1 c9 76 25 39 b3 e3 d5 |OaW.......v%9...| +peer0.org1.example.com | 00000020 da e2 e7 87 02 20 64 3e 55 6b c3 df 3e fa 14 b8 |..... d>Uk..>...| +peer0.org1.example.com | 00000030 9d cf fe 12 13 cd 41 76 11 f3 60 e5 e0 a2 0d fa |......Av..`.....| +peer0.org1.example.com | 00000040 ed 4c 76 0d 84 13 |.Lv...| +peer0.org1.example.com | [3795 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3796 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 gate 1589998879724774000 evaluation succeeds +peer0.org1.example.com | [3797 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3798 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3799 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [379a 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [379b 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [379c 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [379d 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [379e 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org2.example.com | [3a47 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3a48 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a49 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a4a 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a4b 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a4c 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3a4d 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54a70 gate 1589998880150540500 evaluation starts +peer0.org2.example.com | [3a4e 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54a70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a4f 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54a70 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a50 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3a51 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54a70 principal evaluation fails +peer0.org2.example.com | [3a52 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54a70 gate 1589998880150540500 evaluation fails +peer0.org2.example.com | [3a53 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a54 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a55 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a56 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54fe0 gate 1589998880151433000 evaluation starts +peer0.org2.example.com | [3a57 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a58 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54fe0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a59 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54fe0 principal matched by identity 0 +peer0.org2.example.com | [3a5a 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer0.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer0.org2.example.com | [3a5b 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer0.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer0.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer0.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer0.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer0.org2.example.com | [3a5c 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54fe0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a5d 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54fe0 gate 1589998880151433000 evaluation succeeds +peer0.org2.example.com | [3a5e 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a5f 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a60 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a61 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a62 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3a63 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3a64 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a65 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a66 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3a67 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a68 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a69 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a6a 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a6b 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3a6c 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51660 gate 1589998880183166900 evaluation starts +peer0.org2.example.com | [3a6d 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a6e 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51660 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a6f 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3a70 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51660 principal evaluation fails +peer0.org2.example.com | [3a71 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51660 gate 1589998880183166900 evaluation fails +peer0.org2.example.com | [3a72 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a73 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a74 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a75 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51bd0 gate 1589998880184281200 evaluation starts +peer0.org2.example.com | [3a76 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a77 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51bd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a78 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51bd0 principal matched by identity 0 +peer0.org2.example.com | [3a79 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3a7a 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3a7b 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51bd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a7c 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a51bd0 gate 1589998880184281200 evaluation succeeds +peer0.org2.example.com | [3a7d 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a7e 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a7f 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a80 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a81 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a82 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a83 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a84 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 4c f1 c1 42 24 69 95 71 cc 4a 01 9b 7e 0c f0 |.L..B$i.q.J..~..| +peer0.org2.example.com | 00000010 bb 7f 97 a4 96 85 a9 49 46 56 3e 2c 9d 59 f8 82 |.......IFV>,.Y..| +peer0.org2.example.com | [3a85 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 48 94 0e fe 7a 74 16 34 10 ae 39 |0D. yH...zt.4..9| +peer0.org2.example.com | 00000010 4f 61 57 e8 06 00 f2 ab f1 c9 76 25 39 b3 e3 d5 |OaW.......v%9...| +peer0.org2.example.com | 00000020 da e2 e7 87 02 20 64 3e 55 6b c3 df 3e fa 14 b8 |..... d>Uk..>...| +peer0.org2.example.com | 00000030 9d cf fe 12 13 cd 41 76 11 f3 60 e5 e0 a2 0d fa |......Av..`.....| +peer0.org2.example.com | 00000040 ed 4c 76 0d 84 13 |.Lv...| +peer0.org2.example.com | [3a86 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 7e 93 13 3b 68 8f ee a9 e2 fa 97 d7 a5 35 4c |*~..;h........5L| +peer0.org2.example.com | 00000010 11 52 36 b1 fa a2 f3 91 0d 2b 3f 53 2a 48 b9 e1 |.R6......+?S*H..| +peer0.org2.example.com | [3a87 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 05 8f 71 8f b5 00 47 e8 1e f1 61 |0D. 1..q...G...a| +peer0.org2.example.com | 00000010 8a 24 1b 7b 09 92 c9 bb 27 a3 9e 28 35 21 5c e7 |.$.{....'..(5!\.| +peer0.org2.example.com | 00000020 f6 3f d4 98 02 20 7c 43 69 98 f0 12 7d 18 52 bf |.?... |Ci...}.R.| +peer0.org2.example.com | 00000030 ce d0 d3 0f b6 13 c9 e3 68 3f 3d 4c 95 dd 41 f2 |........h?=L..A.| +peer0.org2.example.com | 00000040 33 03 3d 40 2c 6f |3.=@,o| +peer0.org2.example.com | [3a88 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a89 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a8a 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3a8b 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a8c 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a8d 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a8e 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a8f 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3a90 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7be00 gate 1589998880195069000 evaluation starts +peer0.org2.example.com | [3a91 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7be00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a92 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7be00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a93 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7be00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3a94 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7be00 principal evaluation fails +peer0.org2.example.com | [3a95 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7be00 gate 1589998880195069000 evaluation fails +peer0.org2.example.com | [3a96 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a97 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a98 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a99 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9e370 gate 1589998880199430700 evaluation starts +peer0.org2.example.com | [3a9a 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9e370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a9b 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9e370 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3a9c 05-20 18:21:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9e370 principal matched by identity 0 +peer0.org2.example.com | [3a9d 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3a9e 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3a9f 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9e370 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3aa0 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9e370 gate 1589998880199430700 evaluation succeeds +peer0.org2.example.com | [3aa1 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3aa2 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3aa3 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3aa4 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3aa5 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa6 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa7 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3aa8 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3aa9 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3aaa 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3aab 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3aac 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3aad 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9f570 gate 1589998880203744400 evaluation starts +peer0.org2.example.com | [3aae 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9f570 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3aaf 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9f570 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3ab0 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9f570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3ab1 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9f570 principal evaluation fails +peer0.org2.example.com | [3ab2 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9f570 gate 1589998880203744400 evaluation fails +peer0.org2.example.com | [3ab3 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3ab4 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3ab5 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ab6 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9fae0 gate 1589998880204815300 evaluation starts +peer0.org2.example.com | [3ab7 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9fae0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ab8 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9fae0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3ab9 05-20 18:21:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9fae0 principal matched by identity 0 +peer0.org2.example.com | [3aba 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3abb 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3abc 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9fae0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3abd 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9fae0 gate 1589998880204815300 evaluation succeeds +peer1.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer1.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer1.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer1.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer1.org2.example.com | [3808 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3bf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3809 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3bf0 gate 1589998879670810600 evaluation succeeds +peer1.org2.example.com | [380a 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [380b 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [380c 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [380d 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [380e 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [380f 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3810 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3811 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3812 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3813 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3814 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3815 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3816 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3817 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744e90 gate 1589998879687801400 evaluation starts +peer1.org2.example.com | [3818 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744e90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3819 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744e90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [381a 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [381b 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744e90 principal evaluation fails +peer1.org2.example.com | [381c 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744e90 gate 1589998879687801400 evaluation fails +peer1.org2.example.com | [381d 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [381e 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [381f 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3820 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003745400 gate 1589998879691016400 evaluation starts +peer1.org2.example.com | [3821 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003745400 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3822 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003745400 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3823 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003745400 principal matched by identity 0 +peer1.org2.example.com | [3824 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 38 99 18 6e cd 66 c5 83 b6 cf e6 17 9c b8 0f |.8..n.f.........| +peer1.org2.example.com | 00000010 29 ab 8a 6c b5 67 5f dd 37 7b 09 af f4 bb ce 4f |)..l.g_.7{.....O| +peer1.org2.example.com | [3825 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 f3 e1 76 fc 83 0c 68 e5 68 d3 5f |0D. ...v...h.h._| +peer1.org2.example.com | 00000010 eb 74 e0 15 4b f9 77 53 0e 93 aa 2d 72 7d e5 c8 |.t..K.wS...-r}..| +peer1.org2.example.com | 00000020 60 ab bc 4b 02 20 38 d3 a6 22 a4 ec 78 5b d7 a9 |`..K. 8.."..x[..| +peer1.org2.example.com | 00000030 5c 60 4b 0a e0 06 9a a7 2a ec c3 52 49 b4 22 9e |\`K.....*..RI.".| +peer1.org2.example.com | 00000040 4c 2a 5f 68 9f 74 |L*_h.t| +peer1.org2.example.com | [3826 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003745400 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [379f 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org1.example.com | [37a0 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org1.example.com | [37a1 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org1.example.com | [37a2 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [37a3 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [37a4 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [37a5 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [37a6 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [37a7 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [37a8 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +peer0.org1.example.com | 00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +peer0.org1.example.com | [37a9 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +peer0.org1.example.com | 00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +peer0.org1.example.com | 00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +peer0.org1.example.com | 00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +peer0.org1.example.com | 00000040 3e a0 4f b3 e6 c4 |>.O...| +peer0.org1.example.com | [37aa 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37ab 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37ac 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [37ad 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37ae 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37af 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [37b0 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [37b1 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37b2 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 gate 1589998879731293900 evaluation starts +peer0.org1.example.com | [37b3 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [37b4 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [37b5 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 principal matched by identity 0 +peer0.org1.example.com | [37b6 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org1.example.com | [37b7 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org1.example.com | [37b8 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [37b9 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 gate 1589998879731293900 evaluation succeeds +peer0.org1.example.com | [37ba 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37bb 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37bc 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36f2 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36f3 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36f4 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36f5 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36f6 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [36f7 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [36f8 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [36f9 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36fa 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36fb 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36fc 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36fd 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36fe 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36ff 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [3700 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3701 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3702 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3703 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3704 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3705 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3706 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3707 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3708 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3709 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [370a 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [370b 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [370c 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [370d 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26340 gate 1589998889182226700 evaluation starts +peer1.org1.example.com | [370e 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [370f 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26340 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3710 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26340 principal matched by identity 0 +peer1.org1.example.com | [3711 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer1.org1.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer1.org1.example.com | [3712 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer1.org1.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer1.org1.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer1.org1.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer1.org1.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer1.org1.example.com | [3713 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26340 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3714 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d26340 gate 1589998889182226700 evaluation succeeds +peer1.org1.example.com | [3715 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3716 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3717 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3718 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3719 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [371a 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [371b 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [371c 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [371d 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [371e 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [371f 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3720 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3721 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [3722 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3723 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3724 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3725 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3726 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3727 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3728 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:t\017)\266^\305\377\212\306\242sG\23166\362:\210\273\002 \001\362\240&\340%\364\006\017\213\024\205\026\300\022\374\371\315\247\276\010\020\302\312\3451\n<\360\037\2743" > +peer1.org1.example.com | [3729 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [372a 05-20 18:21:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 c6 79 1c f0 57 ab 8a 95 ea ee 0c 0e 4a 0d a8 |..y..W.......J..| +peer1.org1.example.com | 00000010 ed 07 7e c2 f3 bc 41 bd b9 62 9f e6 1a b2 ad c1 |..~...A..b......| +peer1.org1.example.com | [372b 05-20 18:21:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 17 3d 6b b8 35 e5 0d 39 48 2f |0E.!...=k.5..9H/| +peer1.org1.example.com | 00000010 3a 99 55 89 e6 4e 41 99 21 2b c7 1a 2b 94 ae b5 |:.U..NA.!+..+...| +peer1.org1.example.com | 00000020 9a b5 4d d2 9f 02 20 62 37 d3 85 e5 09 36 8b 8e |..M... b7....6..| +peer1.org1.example.com | 00000030 af ba 0b 6d 8f 39 59 95 fd 1a 3e f5 25 3b 67 63 |...m.9Y...>.%;gc| +peer1.org1.example.com | 00000040 7e b8 c2 c9 68 09 fe |~...h..| +peer1.org1.example.com | [372c 05-20 18:21:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [372d 05-20 18:21:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [372e 05-20 18:21:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [372f 05-20 18:21:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [3730 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3731 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3732 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3733 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3734 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3735 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3736 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 2 1] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3737 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3738 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3739 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [373a 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [373b 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [373d 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [373c 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [373e 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [373f 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3740 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3741 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3742 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3743 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3744 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3745 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3746 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3747 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3748 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3749 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [374a 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [374b 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [374c 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [374d 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d45290 gate 1589998891816884100 evaluation starts +peer1.org1.example.com | [374e 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d45290 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [374f 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d45290 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3750 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d45290 principal matched by identity 0 +peer1.org1.example.com | [3751 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [3752 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [3753 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d45290 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3754 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d45290 gate 1589998891816884100 evaluation succeeds +peer1.org1.example.com | [3755 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3756 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3757 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3758 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3759 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [375a 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | [3827 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003745400 gate 1589998879691016400 evaluation succeeds +peer1.org2.example.com | [3828 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3829 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [382a 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [382b 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [382c 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [382d 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [382e 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [382f 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3830 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3831 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3832 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3833 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3834 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3835 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3836 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3837 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3838 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3839 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [383a 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [383b 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d260 gate 1589998879857053500 evaluation starts +peer1.org2.example.com | [383c 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d260 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [383d 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d260 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [383e 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [383f 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d260 principal evaluation fails +peer1.org2.example.com | [3840 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d260 gate 1589998879857053500 evaluation fails +peer1.org2.example.com | [3841 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3842 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3843 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3844 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d7d0 gate 1589998879864222000 evaluation starts +peer1.org2.example.com | [3845 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d7d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3846 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d7d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3847 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d7d0 principal matched by identity 0 +peer1.org2.example.com | [3848 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3849 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | [37bd 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [37be 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37bf 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37c0 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [37c1 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37c3 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37c4 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [37c5 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [37c2 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [37c7 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org1.example.com | [37c6 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37c9 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 gate 1589998879743874300 evaluation starts +peer0.org1.example.com | [37ca 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [37cb 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [37cc 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 principal matched by identity 0 +peer0.org1.example.com | [37cd 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 7e 93 13 3b 68 8f ee a9 e2 fa 97 d7 a5 35 4c |*~..;h........5L| +peer0.org1.example.com | 00000010 11 52 36 b1 fa a2 f3 91 0d 2b 3f 53 2a 48 b9 e1 |.R6......+?S*H..| +peer0.org1.example.com | [37ce 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 05 8f 71 8f b5 00 47 e8 1e f1 61 |0D. 1..q...G...a| +peer0.org1.example.com | 00000010 8a 24 1b 7b 09 92 c9 bb 27 a3 9e 28 35 21 5c e7 |.$.{....'..(5!\.| +peer0.org1.example.com | 00000020 f6 3f d4 98 02 20 7c 43 69 98 f0 12 7d 18 52 bf |.?... |Ci...}.R.| +peer0.org1.example.com | 00000030 ce d0 d3 0f b6 13 c9 e3 68 3f 3d 4c 95 dd 41 f2 |........h?=L..A.| +peer0.org1.example.com | 00000040 33 03 3d 40 2c 6f |3.=@,o| +peer0.org1.example.com | [37cf 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [37d0 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 gate 1589998879743874300 evaluation succeeds +peer0.org1.example.com | [37d1 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37d2 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37d3 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [37d4 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [37d5 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37d6 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37d7 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37d8 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [37d9 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [37da 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37db 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 gate 1589998879745704500 evaluation starts +peer0.org1.example.com | [37dc 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [37dd 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [37de 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 principal matched by identity 0 +peer0.org1.example.com | [37df 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 7e 93 13 3b 68 8f ee a9 e2 fa 97 d7 a5 35 4c |*~..;h........5L| +peer0.org1.example.com | 00000010 11 52 36 b1 fa a2 f3 91 0d 2b 3f 53 2a 48 b9 e1 |.R6......+?S*H..| +peer0.org1.example.com | [37e0 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 05 8f 71 8f b5 00 47 e8 1e f1 61 |0D. 1..q...G...a| +peer0.org1.example.com | 00000010 8a 24 1b 7b 09 92 c9 bb 27 a3 9e 28 35 21 5c e7 |.$.{....'..(5!\.| +peer0.org1.example.com | 00000020 f6 3f d4 98 02 20 7c 43 69 98 f0 12 7d 18 52 bf |.?... |Ci...}.R.| +peer0.org1.example.com | 00000030 ce d0 d3 0f b6 13 c9 e3 68 3f 3d 4c 95 dd 41 f2 |........h?=L..A.| +peer0.org1.example.com | 00000040 33 03 3d 40 2c 6f |3.=@,o| +peer0.org1.example.com | [37e1 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org1.example.com | [37e2 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org1.example.com | [37c8 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [37e3 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org1.example.com | [37e4 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org1.example.com | [37e5 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [37e6 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 gate 1589998879745704500 evaluation succeeds +peer0.org1.example.com | [37e7 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37e8 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37e9 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [37ea 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [37eb 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37ec 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [37ed 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org1.example.com | [37ee 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 80ms (state_validation=10ms block_and_pvtdata_commit=43ms state_commit=21ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org1.example.com | [37ef 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [37f0 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08061A0C0A0565787030321203312E30 +peer0.org1.example.com | [37f1 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C84BC1AA61CFC2E1D8CABEB0C0A92D688628E692BA44AF8D66D9C464A7959AE9 +peer0.org1.example.com | [37f2 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org1.example.com | [37f3 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +peer0.org1.example.com | 00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +peer0.org1.example.com | [37f4 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +peer0.org1.example.com | 00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +peer0.org1.example.com | 00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +peer0.org1.example.com | 00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +peer0.org1.example.com | 00000040 ac 24 01 88 e6 29 e6 |.$...).| +peer0.org1.example.com | [37f5 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f6 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f7 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [37f8 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37f9 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [384a 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d7d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [384b 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373d7d0 gate 1589998879864222000 evaluation succeeds +peer1.org2.example.com | [384c 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [384d 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [384e 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [384f 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3850 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3851 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3852 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3853 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3854 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3855 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3856 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3857 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778310 gate 1589998879873545300 evaluation starts +peer1.org2.example.com | [3858 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778310 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3859 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778310 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [385a 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [385b 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778310 principal evaluation fails +peer1.org2.example.com | [385c 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778310 gate 1589998879873545300 evaluation fails +peer1.org2.example.com | [385d 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [385e 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [385f 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3860 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778880 gate 1589998879883446000 evaluation starts +peer1.org2.example.com | [3861 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778880 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3862 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778880 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3863 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778880 principal matched by identity 0 +peer1.org2.example.com | [3864 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3865 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [3866 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778880 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3867 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003778880 gate 1589998879883446000 evaluation succeeds +peer1.org2.example.com | [3868 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3869 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [386a 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [386b 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [386c 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [386d 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [386e 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [386f 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [3870 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3871 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3872 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3874 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3abe 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3abf 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ac0 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ac1 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ac2 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ac3 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ac4 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ac5 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3ac6 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ac7 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ac8 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ac9 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3aca 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3acb 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3acc 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3acd 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ace 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3acf 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ad0 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ad1 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ad2 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ad3 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | [37fa 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [37fb 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [37fc 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37fd 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 gate 1589998879757073100 evaluation starts +peer0.org1.example.com | [37fe 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [37ff 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3800 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 principal matched by identity 0 +peer0.org1.example.com | [3801 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +peer0.org1.example.com | 00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +peer0.org1.example.com | [3802 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +peer0.org1.example.com | 00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +peer0.org1.example.com | 00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +peer0.org1.example.com | 00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +peer0.org1.example.com | 00000040 e4 5a da 7d e5 48 |.Z.}.H| +peer0.org1.example.com | [3803 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3804 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 gate 1589998879757073100 evaluation succeeds +peer0.org1.example.com | [3805 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3806 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3807 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3808 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3809 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [380a 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [380b 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [380c 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [380d 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [380e 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [380f 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3810 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3811 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3812 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3813 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3814 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3815 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3816 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3817 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3818 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3819 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 gate 1589998879762032100 evaluation starts +peer0.org1.example.com | [381a 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [381b 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [381c 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 principal matched by identity 0 +peer0.org1.example.com | [381d 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +peer0.org1.example.com | 00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +peer0.org1.example.com | [381e 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +peer0.org1.example.com | 00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +peer0.org1.example.com | 00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +peer0.org1.example.com | 00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +peer0.org1.example.com | 00000040 ee 25 7d 3b 62 82 |.%};b.| +peer0.org1.example.com | [381f 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3820 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3821 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 gate 1589998879762032100 evaluation succeeds +peer0.org1.example.com | [3822 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3823 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3824 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3825 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3826 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 2a 16 d0 73 a9 fe 19 01 a7 07 7e 26 da 5c 62 |.*..s......~&.\b| +peer0.org1.example.com | 00000010 e4 93 34 cb 9e 46 36 bd 65 18 06 50 14 53 6f 10 |..4..F6.e..P.So.| +peer0.org1.example.com | [3827 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 53 b8 38 ad 05 14 b9 c3 2e 45 |0E.!..S.8......E| +peer0.org1.example.com | 00000010 ec 65 9d 94 0d 81 63 35 0e 07 75 08 a7 4d 4e 02 |.e....c5..u..MN.| +peer0.org1.example.com | 00000020 f0 46 30 82 ec 02 20 56 b8 a1 ad 72 6a 2e 06 8c |.F0... V...rj...| +peer0.org1.example.com | 00000030 ff a6 eb f5 de 8b 33 20 6d 28 26 e1 ba fe 2d d1 |......3 m(&...-.| +peer0.org1.example.com | 00000040 a2 c6 aa c1 8a 69 d6 |.....i.| +peer0.org1.example.com | [3828 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3829 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [382a 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [382b 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [382c 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [382d 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 gate 1589998879767763300 evaluation starts +peer0.org1.example.com | [382e 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [382f 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3830 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3831 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 principal evaluation fails +peer0.org1.example.com | [3832 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 gate 1589998879767763300 evaluation fails +peer0.org1.example.com | [3833 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3834 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3835 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3836 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 gate 1589998879768320000 evaluation starts +peer0.org1.example.com | [3837 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3838 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3839 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 principal matched by identity 0 +peer0.org1.example.com | [383a 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 2a 16 d0 73 a9 fe 19 01 a7 07 7e 26 da 5c 62 |.*..s......~&.\b| +peer0.org1.example.com | 00000010 e4 93 34 cb 9e 46 36 bd 65 18 06 50 14 53 6f 10 |..4..F6.e..P.So.| +peer0.org1.example.com | [383b 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 53 b8 38 ad 05 14 b9 c3 2e 45 |0E.!..S.8......E| +peer0.org1.example.com | 00000010 ec 65 9d 94 0d 81 63 35 0e 07 75 08 a7 4d 4e 02 |.e....c5..u..MN.| +peer0.org1.example.com | 00000020 f0 46 30 82 ec 02 20 56 b8 a1 ad 72 6a 2e 06 8c |.F0... V...rj...| +peer0.org1.example.com | 00000030 ff a6 eb f5 de 8b 33 20 6d 28 26 e1 ba fe 2d d1 |......3 m(&...-.| +peer0.org1.example.com | 00000040 a2 c6 aa c1 8a 69 d6 |.....i.| +peer0.org1.example.com | [383c 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [383d 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 gate 1589998879768320000 evaluation succeeds +peer0.org1.example.com | [383e 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [383f 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3840 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3841 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3842 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3843 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3844 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3845 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3846 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [375b 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [375c 05-20 18:21:31.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [375d 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [375e 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [375f 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3760 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3761 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3762 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3763 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dbeb90 gate 1589998891832525500 evaluation starts +peer1.org1.example.com | [3764 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dbeb90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3765 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dbeb90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3766 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dbeb90 principal matched by identity 0 +peer1.org1.example.com | [3767 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3768 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3769 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dbeb90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [376a 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dbeb90 gate 1589998891832525500 evaluation succeeds +peer1.org1.example.com | [376b 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3847 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3848 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3849 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [384a 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [384b 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [384c 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [384d 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [384e 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [384f 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3850 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3851 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3852 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3853 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3854 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3855 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 gate 1589998879901656100 evaluation starts +peer0.org1.example.com | [3857 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3856 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3858 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3859 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [385a 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 principal evaluation fails +peer0.org1.example.com | [385b 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 gate 1589998879901656100 evaluation fails +peer0.org1.example.com | [385c 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [385d 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [385e 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [385f 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 gate 1589998879909870800 evaluation starts +peer0.org1.example.com | [3860 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3861 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3862 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 principal matched by identity 0 +peer0.org1.example.com | [3863 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [3864 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [3865 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3866 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 gate 1589998879909870800 evaluation succeeds +peer0.org1.example.com | [3867 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3868 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3869 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [386a 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [386b 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [386c 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [386d 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [386e 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [386f 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3870 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3871 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3872 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [3875 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [376c 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3873 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ad4 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | [3876 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [376d 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3874 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | [3877 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [376e 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3875 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | [3878 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [376f 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | [3876 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | [3879 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [3877 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [387a 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3770 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | [3878 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ad5 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [387b 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003779bf0 gate 1589998879897278800 evaluation starts +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | [3879 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ad6 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [387c 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003779bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | [387a 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ad7 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | [387d 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003779bf0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | [387b 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3ad8 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | [3771 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [387e 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003779bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [387c 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | [3772 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [387f 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003779bf0 principal evaluation fails +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | [3773 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3880 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003779bf0 gate 1589998879897278800 evaluation fails +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [3774 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3881 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | [3ad9 05-20 18:21:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3775 05-20 18:21:31.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3882 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3ada 05-20 18:21:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3776 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3883 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [387d 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3adb 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3777 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3884 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379c160 gate 1589998879898376300 evaluation starts +peer0.org1.example.com | [387e 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3adc 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3778 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3779 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [387f 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3add 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [377a 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3880 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3885 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379c160 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ade 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [377b 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3881 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3886 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379c160 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3adf 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [377c 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e306f0 gate 1589998891846411800 evaluation starts +peer0.org1.example.com | [3882 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3883 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ae0 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [377d 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e306f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3884 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3887 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379c160 principal matched by identity 0 +peer0.org2.example.com | [3ae1 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [377e 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e306f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3885 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3886 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ae2 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [377f 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e306f0 principal matched by identity 0 +peer0.org1.example.com | [3887 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ae3 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3888 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | [3780 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | [3ae4 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3888 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3ae5 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3889 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3889 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | [3781 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | [3ae6 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [388a 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | [3ae7 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [388b 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | [3ae8 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [388c 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | [3ae9 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [388d 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3aea 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [388e 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 gate 1589998880144296000 evaluation starts +peer1.org2.example.com | [388a 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379c160 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3782 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e306f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3aeb 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [388f 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [388b 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379c160 gate 1589998879898376300 evaluation succeeds +peer1.org1.example.com | [3783 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e306f0 gate 1589998891846411800 evaluation succeeds +peer0.org2.example.com | [3aec 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3890 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [388c 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3784 05-20 18:21:31.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3aed 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3891 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 principal matched by identity 0 +peer1.org2.example.com | [388d 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3785 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3aee 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3892 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | [388e 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3786 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3aef 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3890 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3787 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3af0 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb380 gate 1589998880641674000 evaluation starts +peer0.org1.example.com | [3893 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | [3788 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | [3af1 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb380 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [3789 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | [3af2 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb380 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | [3af3 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3891 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | [3af4 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb380 principal evaluation fails +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | [3af5 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb380 gate 1589998880641674000 evaluation fails +peer1.org2.example.com | [3892 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3894 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3af6 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [388f 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3895 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 gate 1589998880144296000 evaluation succeeds +peer0.org2.example.com | [3af7 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [378a 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | [3893 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3896 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3af8 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [378b 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | [3897 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3af9 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb8f0 gate 1589998880641995700 evaluation starts +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | [3898 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3894 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3afa 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb8f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | [3899 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3873 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3afb 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb8f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | [389a 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3afc 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb8f0 principal matched by identity 0 +peer1.org2.example.com | [3895 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [389b 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3afd 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer1.org2.example.com | [3896 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [378c 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [389c 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer1.org2.example.com | [3897 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [378d 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [389d 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3afe 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer1.org2.example.com | [3898 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [378e 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [389e 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer1.org2.example.com | [3899 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [378f 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [389f 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer1.org2.example.com | [389a 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3790 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38a0 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer1.org2.example.com | [389b 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3791 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38a1 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 gate 1589998880145977600 evaluation starts +peer0.org2.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer1.org2.example.com | [389c 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3792 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [38a2 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3aff 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb8f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [389d 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d450 gate 1589998879917521700 evaluation starts +peer1.org1.example.com | [3793 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3b00 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adb8f0 gate 1589998880641995700 evaluation succeeds +peer1.org2.example.com | [389e 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38a3 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3b01 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [389f 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d450 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [38a4 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 principal matched by identity 0 +peer1.org1.example.com | [3794 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e366d0 gate 1589998891858336000 evaluation starts +peer0.org2.example.com | [3b02 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38a0 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [38a5 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | [3795 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e366d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b03 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3796 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e366d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3b04 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38a6 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | [3797 05-20 18:21:31.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e366d0 principal matched by identity 0 +peer0.org2.example.com | [3b05 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [38a1 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d450 principal evaluation fails +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | [3798 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | [3b06 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [38a2 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d450 gate 1589998879917521700 evaluation fails +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3b07 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [38a3 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | [3799 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | [3b08 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [38a4 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | [3b09 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [38a5 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [38a7 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | [3b0a 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38a6 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d9c0 gate 1589998879917763000 evaluation starts +peer0.org1.example.com | [38a8 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 gate 1589998880145977600 evaluation succeeds +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | [3b0b 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38a7 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d9c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38a9 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3b0c 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38a8 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d9c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [38aa 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [379a 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e366d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b0d 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [38a9 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d9c0 principal matched by identity 0 +peer1.org1.example.com | [379b 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e366d0 gate 1589998891858336000 evaluation succeeds +peer0.org1.example.com | [38ab 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b0e 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38aa 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | [379c 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38ac 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b0f 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [379d 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38ad 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b10 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38ab 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | [379e 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [38ae 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b11 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | [379f 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38af 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b12 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\002 M\326<\372\017/\2558b\224\001\2113\314\017\216Bv'_\213\234\345\251\tTg\2376\265Z\373" > +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | [37a0 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38b0 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [3b13 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | [37a1 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [38b1 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b14 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [37a2 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | [38b2 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b15 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [38ac 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d9c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [38b3 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b16 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [38ad 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00379d9c0 gate 1589998879917763000 evaluation succeeds +peer1.org1.example.com | [37a3 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | [38b4 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b17 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [38ae 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | [38b5 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b18 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [38af 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | [38b6 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b19 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38b0 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | [38b7 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b1a 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [38b1 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [38b8 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b1b 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [38b2 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38b3 05-20 18:21:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38b4 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [37a4 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | [3b1c 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b1f 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [38b9 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38b5 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b1d 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [38ba 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38b6 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b20 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [37a5 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | [38bb 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38b7 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b22 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38bc 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | [38b8 05-20 18:21:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b1e 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [38bd 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | [3b23 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38be 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | [38b9 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b21 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38bf 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [38ba 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b24 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c0 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 gate 1589998880178272700 evaluation starts +peer1.org1.example.com | [37a6 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38bb 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | [3b25 05-20 18:21:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c1 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37a7 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3b26 05-20 18:21:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38c2 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [37a8 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38bc 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | [3b27 05-20 18:21:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c3 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 principal matched by identity 0 +peer1.org1.example.com | [37a9 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | [3b28 05-20 18:21:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c4 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | [37aa 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | [3b29 05-20 18:21:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [37ab 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | [3b2a 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [37ac 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [38c5 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | [3b2b 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161034 +peer0.org2.example.com | [3b2c 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA36B6F164FE8FE5A09BA0D7BEEE1DAB9608045576EC0DD986F6F1CC569C0B5C +peer1.org2.example.com | [38bd 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | [3b2d 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [37ad 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [38be 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | [37ae 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4c860 gate 1589998891868992700 evaluation starts +peer0.org2.example.com | [3b2e 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [38bf 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | [37af 05-20 18:21:31.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4c860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b2f 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [38c0 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [37b0 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4c860 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [37b1 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4c860 principal matched by identity 0 +peer1.org2.example.com | [38c1 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [38c6 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37b2 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | [38c2 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 gate 1589998880161528700 evaluation starts +peer0.org2.example.com | [3b30 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38c7 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 gate 1589998880178272700 evaluation succeeds +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [38c3 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b31 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38c8 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37b3 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | [38c4 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3b32 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:QLW\252\262\333\361lr\013\027&\266\\PC\2341" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38c9 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | [38c5 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 principal matched by identity 0 +peer0.org2.example.com | [3b33 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ca 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | [38c6 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | [3b34 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38cb 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3b35 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:QLW\252\262\333\361lr\013\027&\266\\PC\2341" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [38cc 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3b36 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38cd 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38c7 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | [37b4 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4c860 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b37 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ce 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37154 +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | [3b38 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b39 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | [37b5 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e4c860 gate 1589998891868992700 evaluation succeeds +peer1.org1.example.com | [37b6 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [38cf 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004a3ed20 +peer1.org2.example.com | [38c8 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37b7 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3b3b 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37b8 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b3c 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37b9 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38d0 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [38d1 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [37ba 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38c9 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378b380 gate 1589998880161528700 evaluation succeeds +peer0.org1.example.com | [38d2 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [37bb 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b3d 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38ca 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38d3 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [37bc 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b3a 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38cb 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38cc 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [38cd 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b3e 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38ce 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37bd 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38d4 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3b3f 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38cf 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [38d5 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 a4 a6 3d e9 c6 74 3d ff 76 92 1b ca 15 f6 bc |...=..t=.v......| +peer0.org2.example.com | [3b40 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [37be 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37bf 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [37c0 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38d0 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [38d1 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | [3b41 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37c1 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [37c2 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65180 gate 1589998891877931500 evaluation starts +peer1.org1.example.com | [37c3 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65180 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37c4 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65180 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [37c5 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65180 principal matched by identity 0 +peer1.org1.example.com | [37c6 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [37c7 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [37c8 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65180 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37c9 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d65180 gate 1589998891877931500 evaluation succeeds +peer1.org1.example.com | [37ca 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37cb 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37cc 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [37cd 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [37ce 05-20 18:21:31.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37cf 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [37d0 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [37d1 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37d2 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37d3 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37d4 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37d5 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [37d6 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [37d7 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37d8 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37d9 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37da 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37db 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [37dc 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [37dd 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [37de 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [37df 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [37e0 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [37e1 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [37e2 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37e3 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [37e4 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37e5 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [37e6 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37e7 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [37e8 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [37e9 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37ea 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [37eb 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [37ec 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [37ed 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37ee 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [37ef 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [37f0 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [37f1 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37f2 05-20 18:21:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37f3 05-20 18:21:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37f4 05-20 18:21:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [37f5 05-20 18:21:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37f6 05-20 18:21:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37f7 05-20 18:21:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [37f8 05-20 18:21:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [37f9 05-20 18:21:32.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37fa 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [37fb 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [37fc 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37fd 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [37fe 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816103C +peer1.org1.example.com | [37ff 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5C9DA102E90A240588BD66FCE32364A61CD65CCD15C4D3956E96822F5E956963 +peer1.org1.example.com | [3800 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3801 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000010 8c b6 76 bd 37 8a 4a 08 95 2c 0d c0 6d 85 12 21 |..v.7.J..,..m..!| +peer0.org1.example.com | [38d6 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 de 1a fe 46 0d d6 53 10 e1 |0E.!......F..S..| +peer0.org1.example.com | 00000010 23 a9 87 fc 9a 6e 2b 17 9e 98 06 be 87 7d b6 f0 |#....n+......}..| +peer0.org1.example.com | 00000020 94 55 0b f4 62 02 20 27 0b cd c5 55 bd c7 ba b4 |.U..b. '...U....| +peer0.org1.example.com | 00000030 cb b8 53 af 24 24 4b 83 ef 80 4e 40 14 31 2d 5e |..S.$$K...N@.1-^| +peer0.org1.example.com | 00000040 be 5d 18 31 c4 3a 9c |.].1.:.| +peer0.org1.example.com | [38d7 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [38d8 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00362af50, header 0xc004a3f180 +peer0.org1.example.com | [38d9 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [38da 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] processing txid: 179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c +peer0.org1.example.com | [38db 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c] +peer0.org1.example.com | [38dc 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [38dd 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [38de 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [38df 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [38e0 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [38e1 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 gate 1589998880222348300 evaluation starts +peer0.org1.example.com | [38e2 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38e3 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [38e4 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 principal matched by identity 0 +peer0.org1.example.com | [38e5 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 a4 a6 3d e9 c6 74 3d ff 76 92 1b ca 15 f6 bc |...=..t=.v......| +peer0.org1.example.com | 00000010 8c b6 76 bd 37 8a 4a 08 95 2c 0d c0 6d 85 12 21 |..v.7.J..,..m..!| +peer0.org1.example.com | [38e6 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 de 1a fe 46 0d d6 53 10 e1 |0E.!......F..S..| +peer0.org1.example.com | 00000010 23 a9 87 fc 9a 6e 2b 17 9e 98 06 be 87 7d b6 f0 |#....n+......}..| +peer0.org1.example.com | 00000020 94 55 0b f4 62 02 20 27 0b cd c5 55 bd c7 ba b4 |.U..b. '...U....| +peer0.org1.example.com | 00000030 cb b8 53 af 24 24 4b 83 ef 80 4e 40 14 31 2d 5e |..S.$$K...N@.1-^| +peer0.org1.example.com | 00000040 be 5d 18 31 c4 3a 9c |.].1.:.| +peer0.org1.example.com | [38e7 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [38e8 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 gate 1589998880222348300 evaluation succeeds +peer0.org1.example.com | [38e9 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [38ea 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [38eb 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [38ec 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [38ed 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [38ee 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c] +peer0.org1.example.com | [38ef 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] Entry chaincode: name:"exp02" +peer0.org1.example.com | [38f0 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [38f1 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [38f2 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][179578d2] Entry chaincode: name:"exp02" +peer0.org1.example.com | [38f3 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [38f4 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [38f5 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] handling GET_STATE from chaincode +peer0.org1.example.com | [38f6 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [38f7 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [38f8 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [38f9 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [38fa 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] notifying Txid:179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c, channelID:businesschannel +peer0.org1.example.com | [38fb 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [38fc 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][179578d2] Exit chaincode: name:"exp02" (4ms) +peer0.org1.example.com | [38fd 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [38fe 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c] +peer0.org1.example.com | [38ff 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] Exit +peer0.org1.example.com | [3900 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3901 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [3902 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c, chaincode: exp02} +peer0.org1.example.com | [3903 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C59211E7F3BBF6722BAB430C648C...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3904 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 978D2E6EAAD9F3ED16D0D068630C5529CCBB6B6B4C47594470E716FDCBA19062 +peer0.org1.example.com | [3905 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c, chaincode: exp02} +peer0.org1.example.com | [3906 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] Exit +peer0.org1.example.com | [3907 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c] +peer0.org1.example.com | [3908 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37154 +peer0.org1.example.com | [3909 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37154 grpc.code=OK grpc.call_duration=16.9338ms +peer0.org1.example.com | [390a 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [390b 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [390c 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [390d 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [390e 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [390f 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3910 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3911 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3912 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3913 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3914 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [38d2 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d3 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38d4 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d5 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d6 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [38d7 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d8 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d9 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [38da 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38db 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [38dc 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38dd 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [38de 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [38df 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [38e0 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [38e1 05-20 18:21:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38e2 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38e3 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38e4 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [38e5 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [38e6 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38e7 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [38e8 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38e9 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [38ea 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38eb 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [38ec 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [38ed 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [38ee 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [38ef 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38f0 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b42 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b43 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b44 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b45 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b46 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b48 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b47 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b49 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3b4a 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer0.org2.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer0.org2.example.com | [3b4b 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer0.org2.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer0.org2.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer0.org2.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer0.org2.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer0.org2.example.com | [3b4c 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b4d 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b4e 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b4f 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b50 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b52 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3b53 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer0.org2.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer0.org2.example.com | [3b54 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer0.org2.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer0.org2.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer0.org2.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer0.org2.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer0.org2.example.com | [3b51 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b55 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3b56 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 0c e0 6e f6 ec 18 c8 d5 f2 8a |0E.!....n.......| +peer0.org2.example.com | 00000010 7a 3b 67 47 e3 cb 2f f5 67 f7 f5 c4 4c 8c 49 f6 |z;gG../.g...L.I.| +peer0.org2.example.com | 00000020 09 01 0c 19 d5 02 20 22 6a 49 67 7d 10 fb 4b ed |...... "jIg}..K.| +peer0.org2.example.com | 00000030 72 91 3c fd 3e 51 4c 57 aa b2 db f1 6c 72 0b 17 |r.<.>QLW....lr..| +peer0.org2.example.com | 00000040 26 b6 5c 50 43 9c 31 |&.\PC.1| +peer0.org2.example.com | [3b57 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3b58 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3b59 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b5a 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b5b 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b5c 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b5d 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3b5e 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b5f 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b60 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b61 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3b62 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3802 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3803 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3804 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247\233;" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3805 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247\233;" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3806 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247\233;" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3807 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3808 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3809 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247\233;" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [380a 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247\233;" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [380c 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [380b 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247\233;" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [380d 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [380e 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [380f 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3810 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3811 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3812 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3813 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38f1 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38f2 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38f3 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38f4 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [38f5 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38f6 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [38f7 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bdb80 gate 1589998880413616800 evaluation starts +peer1.org2.example.com | [38f8 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bdb80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38f9 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bdb80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [38fa 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bdb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [38fb 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bdb80 principal evaluation fails +peer1.org2.example.com | [38fc 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037bdb80 gate 1589998880413616800 evaluation fails +peer1.org2.example.com | [38fd 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38fe 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38ff 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3900 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e0f0 gate 1589998880413896200 evaluation starts +peer1.org2.example.com | [3901 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3902 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e0f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3903 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e0f0 principal matched by identity 0 +peer1.org2.example.com | [3904 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3905 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [3906 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e0f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3907 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e0f0 gate 1589998880413896200 evaluation succeeds +peer1.org2.example.com | [3908 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3909 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [390a 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [390b 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [390c 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [390d 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [390e 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [390f 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3910 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b63 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b64 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b65 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b66 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3b67 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3b68 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3b69 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b567c0 gate 1589998880954248000 evaluation starts +peer0.org2.example.com | [3b6a 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b567c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b6b 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b567c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3b6c 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b567c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3b6d 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b567c0 principal evaluation fails +peer0.org2.example.com | [3b6e 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b567c0 gate 1589998880954248000 evaluation fails +peer0.org2.example.com | [3b6f 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3b70 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3b71 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3b72 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56d30 gate 1589998880956699200 evaluation starts +peer0.org2.example.com | [3b73 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b74 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56d30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3b75 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56d30 principal matched by identity 0 +peer0.org2.example.com | [3b76 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer0.org2.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer0.org2.example.com | [3b77 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer0.org2.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer0.org2.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer0.org2.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer0.org2.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer0.org2.example.com | [3b78 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b79 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56d30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b7a 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56d30 gate 1589998880956699200 evaluation succeeds +peer0.org2.example.com | [3b7b 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b7c 05-20 18:21:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b7d 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b7e 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b7f 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b80 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b81 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3b82 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer0.org2.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer0.org2.example.com | [3b83 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer0.org2.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer0.org2.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer0.org2.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer0.org2.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer0.org2.example.com | [3b84 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b85 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b86 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b87 05-20 18:21:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3814 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3815 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3816 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3817 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3818 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3819 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [381a 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79d30 gate 1589998892636184600 evaluation starts +peer1.org1.example.com | [381b 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79d30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [381c 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79d30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [381d 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79d30 principal matched by identity 0 +peer1.org1.example.com | [381e 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer1.org1.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer1.org1.example.com | [381f 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer1.org1.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer1.org1.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer1.org1.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer1.org1.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer1.org1.example.com | [3820 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3821 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79d30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3822 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79d30 gate 1589998892636184600 evaluation succeeds +peer1.org1.example.com | [3823 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3824 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3825 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3826 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3827 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3828 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3829 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [382a 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [382b 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer1.org1.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer1.org1.example.com | [382c 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer1.org1.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer1.org1.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer1.org1.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer1.org1.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer1.org1.example.com | [382d 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [382e 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [382f 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3830 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3831 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3832 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3833 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer1.org1.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer1.org1.example.com | [3834 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer1.org1.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer1.org1.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer1.org1.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer1.org1.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer1.org1.example.com | [3835 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3836 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 97 fb c0 74 25 c8 28 41 0b e2 |0E.!.....t%.(A..| +peer1.org1.example.com | 00000010 e8 9c 0d 61 d8 35 67 28 38 1c 05 db 44 19 d6 27 |...a.5g(8...D..'| +peer1.org2.example.com | [3911 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3912 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3913 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3914 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f2f0 gate 1589998880415430300 evaluation starts +peer1.org2.example.com | [3915 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f2f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3916 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f2f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3917 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3918 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f2f0 principal evaluation fails +peer1.org2.example.com | [3919 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f2f0 gate 1589998880415430300 evaluation fails +peer1.org2.example.com | [391a 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [391b 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [391c 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [391d 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f860 gate 1589998880415700800 evaluation starts +peer1.org2.example.com | [391e 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [391f 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f860 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3920 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f860 principal matched by identity 0 +peer1.org2.example.com | [3921 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3922 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3923 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f860 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3924 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380f860 gate 1589998880415700800 evaluation succeeds +peer1.org2.example.com | [3925 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3926 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3927 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3928 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3929 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [392a 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [392b 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [392c 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [392d 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [392e 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [392f 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e3a0 gate 1589998880416553300 evaluation starts +peer1.org2.example.com | [3930 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3931 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e3a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3932 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e3a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3933 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e3a0 principal evaluation fails +peer1.org2.example.com | [3934 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e3a0 gate 1589998880416553300 evaluation fails +peer1.org2.example.com | [3935 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3936 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3937 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3938 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e910 gate 1589998880417014500 evaluation starts +peer1.org2.example.com | [3939 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [393a 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e910 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [393b 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e910 principal matched by identity 0 +peer1.org2.example.com | [393c 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [393d 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 d7 09 5e 6c be 02 20 04 d1 2f da 94 0a 82 ed b1 |..^l.. ../......| +peer1.org1.example.com | 00000030 bf f9 6c 69 50 4c 3f 8c a2 13 4d a0 df f6 14 74 |..liPL?...M....t| +peer1.org1.example.com | 00000040 cf 86 49 9b 5f 6d b6 |..I._m.| +peer1.org1.example.com | [3837 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3838 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3839 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [383b 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [383a 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [383c 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [383d 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [383e 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [383f 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3840 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3841 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3842 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3843 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3844 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3845 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3846 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3847 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004efdee0 gate 1589998892643687700 evaluation starts +peer1.org1.example.com | [3848 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004efdee0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3849 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004efdee0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [384a 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004efdee0 principal matched by identity 0 +peer1.org1.example.com | [384b 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer1.org1.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer1.org1.example.com | [384c 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer1.org1.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer1.org1.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer1.org1.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer1.org1.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer1.org1.example.com | [384d 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004efdee0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [384e 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004efdee0 gate 1589998892643687700 evaluation succeeds +peer1.org1.example.com | [384f 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3850 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3851 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3852 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3853 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3854 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3855 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3856 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer1.org1.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer1.org1.example.com | [3857 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer1.org1.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer1.org1.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer1.org1.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer1.org1.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer1.org1.example.com | [3858 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3859 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [385a 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [385b 05-20 18:21:32.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [385c 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [385d 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [385e 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [385f 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3860 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3861 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3862 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3863 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3864 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3865 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3866 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3867 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3868 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3869 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [386a 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [386b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [386c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [386d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [386e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [386f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3870 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3915 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3916 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3917 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3918 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3919 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [391a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [391b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 gate 1589998880421414800 evaluation starts +peer0.org1.example.com | [391c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [391d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [391e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 principal matched by identity 0 +peer0.org1.example.com | [391f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [3920 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [3921 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3922 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 gate 1589998880421414800 evaluation succeeds +peer0.org1.example.com | [3923 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3924 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3925 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3926 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3927 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3928 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3929 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [392a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [392b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [392c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [392d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [392e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 gate 1589998880422352700 evaluation starts +peer0.org1.example.com | [392f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3930 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3931 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 principal matched by identity 0 +peer0.org1.example.com | [3932 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [3933 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [3934 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3935 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 gate 1589998880422352700 evaluation succeeds +peer0.org1.example.com | [3936 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3937 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3938 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [393e 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [393f 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3940 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer1.org2.example.com | [3941 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3942 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3943 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3944 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3945 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3946 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3947 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3948 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3949 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e910 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [394a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382e910 gate 1589998880417014500 evaluation succeeds +peer1.org2.example.com | [394b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [394c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [394d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [394e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [394f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [3950 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [3951 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3952 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3953 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3954 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3955 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3956 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b88 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b89 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b8a 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b8b 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3b8c 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b8d 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b8e 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b8f 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b90 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3b91 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3b92 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3b93 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4bca0 gate 1589998881032281300 evaluation starts +peer0.org2.example.com | [3b94 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4bca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b95 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4bca0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3b96 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4bca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3b97 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4bca0 principal evaluation fails +peer0.org2.example.com | [3b98 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4bca0 gate 1589998881032281300 evaluation fails +peer0.org2.example.com | [3b99 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3b9a 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3b9b 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3b9c 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7a210 gate 1589998881032851300 evaluation starts +peer0.org2.example.com | [3b9d 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7a210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b9e 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7a210 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3b9f 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7a210 principal matched by identity 0 +peer0.org2.example.com | [3ba0 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +peer0.org2.example.com | 00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +peer0.org2.example.com | [3ba1 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +peer0.org2.example.com | 00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +peer0.org2.example.com | 00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +peer0.org2.example.com | 00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +peer0.org2.example.com | 00000040 a7 58 d0 cf be 9c |.X....| +peer0.org2.example.com | [3ba2 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7a210 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3ba3 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7a210 gate 1589998881032851300 evaluation succeeds +peer0.org2.example.com | [3ba4 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ba5 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ba6 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ba7 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3871 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3872 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3873 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3874 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3875 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3876 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3877 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031962d0 gate 1589998892915227600 evaluation starts +peer1.org1.example.com | [3878 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031962d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3879 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031962d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [387a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031962d0 principal matched by identity 0 +peer1.org1.example.com | [387b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer1.org1.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer1.org1.example.com | [387c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer1.org1.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer1.org1.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer1.org1.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer1.org1.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer1.org1.example.com | [387d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031962d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [387e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031962d0 gate 1589998892915227600 evaluation succeeds +peer1.org1.example.com | [387f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3880 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3881 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3882 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3883 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3884 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3885 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3886 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3887 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3888 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3889 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [388a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [388b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [388c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [388d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [388e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [388f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3890 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3891 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ba8 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ba9 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3baa 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3bab 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3bac 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3bad 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bae 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3baf 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bb0 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3bb1 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bb2 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bb3 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bb4 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3bb5 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > alive:\002 M\326<\372\017/\2558b\224\001\2113\314\017\216Bv'_\213\234\345\251\tTg\2376\265Z\373" > +peer0.org2.example.com | [3bb6 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bb7 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bb8 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bb9 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bba 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3bbb 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bbc 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [396b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038529c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [396c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038529c0 gate 1589998880425297600 evaluation succeeds +peer1.org2.example.com | [396d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [396e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [396f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3970 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3971 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3972 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3973 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3974 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3975 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3976 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3977 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3978 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3979 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003853bc0 gate 1589998880426340200 evaluation starts +peer1.org2.example.com | [397a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003853bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3892 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:t\017)\266^\305\377\212\306\242sG\23166\362:\210\273\002 \001\362\240&\340%\364\006\017\213\024\205\026\300\022\374\371\315\247\276\010\020\302\312\3451\n<\360\037\2743" > +peer1.org1.example.com | [3893 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3894 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3895 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3896 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3897 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +peer1.org1.example.com | 00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +peer1.org1.example.com | [3898 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +peer1.org1.example.com | 00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +peer1.org1.example.com | 00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +peer1.org1.example.com | 00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +peer1.org1.example.com | 00000040 5c 0c f4 3b 58 db 03 |\..;X..| +peer1.org1.example.com | [3899 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [389a 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 58 72 83 0f a2 1c 38 74 20 70 |0E.!..Xr....8t p| +peer1.org1.example.com | 00000010 48 2a ef 7f d5 22 08 66 f3 65 87 9f 7d 24 8f 31 |H*...".f.e..}$.1| +peer1.org1.example.com | 00000020 74 9c d3 cb 3a 02 20 71 30 8f 95 07 cf aa 90 5c |t...:. q0......\| +peer1.org1.example.com | 00000030 ed 23 20 ea 65 1e e0 26 4d b5 59 47 a5 3b f2 0a |.# .e..&M.YG.;..| +peer1.org1.example.com | 00000040 bc 73 67 43 ad 88 a4 |.sgC...| +peer1.org1.example.com | [389b 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [389c 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [389d 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [389e 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [389f 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [38a0 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38a1 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38a2 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38a3 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [38a4 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38a5 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38a6 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [38a7 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [38a8 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38a9 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:t\017)\266^\305\377\212\306\242sG\23166\362:\210\273\002 \001\362\240&\340%\364\006\017\213\024\205\026\300\022\374\371\315\247\276\010\020\302\312\3451\n<\360\037\2743" > +peer1.org1.example.com | [38aa 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [38ab 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [38ac 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [38ad 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38ae 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38af 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b0 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b1 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b2 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38b3 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [38b4 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38b5 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [38b6 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [38b7 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38b8 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [38b9 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [38ba 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38bb 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [38bc 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38bd 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38be 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [38bf 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [38c0 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [38c1 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e5e60 gate 1589998893188203900 evaluation starts +peer1.org1.example.com | [38c2 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e5e60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38c3 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e5e60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [38c4 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e5e60 principal matched by identity 0 +peer1.org1.example.com | [38c5 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 53 0b 00 f7 89 a5 eb 6a 24 a7 c9 74 38 68 f1 |4S......j$..t8h.| +peer1.org1.example.com | 00000010 04 1d 36 bb 9c c6 aa 18 31 cb 8f 86 e3 b5 66 7e |..6.....1.....f~| +peer1.org1.example.com | [38c6 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a5 74 b6 f9 29 0d 09 5e 35 99 d9 |0D. &.t..)..^5..| +peer1.org1.example.com | 00000010 c8 29 65 f1 b3 f7 14 c1 19 e2 72 cc 9e 56 a3 83 |.)e.......r..V..| +peer1.org1.example.com | 00000020 9c db 2e 98 02 20 37 8d 3b 4f fa c7 9a 97 c1 ee |..... 7.;O......| +peer1.org1.example.com | 00000030 fe 46 6d 7e b5 69 19 59 ba 22 cc 4e 33 2c 93 cf |.Fm~.i.Y.".N3,..| +peer1.org1.example.com | 00000040 a0 10 16 eb 60 1f |....`.| +peer1.org1.example.com | [38c7 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e5e60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [38c8 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e5e60 gate 1589998893188203900 evaluation succeeds +peer1.org1.example.com | [38c9 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38ca 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38cb 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [38cc 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [38cd 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38ce 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [38cf 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [38d0 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [38d1 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [38d2 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38d3 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38d4 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38d5 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [38d6 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d7 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [397b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003853bc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [397c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003853bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [397d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003853bc0 principal evaluation fails +peer1.org2.example.com | [397e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003853bc0 gate 1589998880426340200 evaluation fails +peer1.org2.example.com | [397f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3980 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3981 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3982 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386a130 gate 1589998880428987900 evaluation starts +peer1.org2.example.com | [3983 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386a130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3984 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386a130 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3985 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386a130 principal matched by identity 0 +peer1.org2.example.com | [3986 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3987 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3988 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386a130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3989 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386a130 gate 1589998880428987900 evaluation succeeds +peer1.org2.example.com | [398a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [398b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [398c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [398d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [398e 05-20 18:21:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [398f 05-20 18:21:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [3990 05-20 18:21:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3991 05-20 18:21:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [3992 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3993 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org2.example.com | [3994 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3995 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 7e 93 13 3b 68 8f ee a9 e2 fa 97 d7 a5 35 4c |*~..;h........5L| +peer1.org2.example.com | 00000010 11 52 36 b1 fa a2 f3 91 0d 2b 3f 53 2a 48 b9 e1 |.R6......+?S*H..| +peer1.org2.example.com | [3996 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 05 8f 71 8f b5 00 47 e8 1e f1 61 |0D. 1..q...G...a| +peer1.org2.example.com | 00000010 8a 24 1b 7b 09 92 c9 bb 27 a3 9e 28 35 21 5c e7 |.$.{....'..(5!\.| +peer1.org2.example.com | 00000020 f6 3f d4 98 02 20 7c 43 69 98 f0 12 7d 18 52 bf |.?... |Ci...}.R.| +peer1.org2.example.com | 00000030 ce d0 d3 0f b6 13 c9 e3 68 3f 3d 4c 95 dd 41 f2 |........h?=L..A.| +peer1.org2.example.com | 00000040 33 03 3d 40 2c 6f |3.=@,o| +peer1.org2.example.com | [3997 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3998 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3999 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [399a 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [399b 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [399c 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [399d 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [399e 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [399f 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884a50 gate 1589998880443358100 evaluation starts +peer1.org2.example.com | [39a0 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884a50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39a1 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884a50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [39a2 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [39a3 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884a50 principal evaluation fails +peer1.org2.example.com | [39a4 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884a50 gate 1589998880443358100 evaluation fails +peer1.org2.example.com | [39a5 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [39a6 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [39a7 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [39a8 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884fc0 gate 1589998880443840700 evaluation starts +peer1.org2.example.com | [39a9 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39aa 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884fc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [39ab 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884fc0 principal matched by identity 0 +peer1.org2.example.com | [39ac 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [39ad 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [39ae 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884fc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [39af 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003884fc0 gate 1589998880443840700 evaluation succeeds +peer1.org2.example.com | [39b0 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39b1 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39b2 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [39b3 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [39b4 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39b5 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39b6 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [39b7 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39b8 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39b9 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [39ba 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [39bb 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [39bc 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a01c0 gate 1589998880446490100 evaluation starts +peer1.org2.example.com | [39bd 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a01c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39be 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a01c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [39bf 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a01c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [39c0 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a01c0 principal evaluation fails +peer1.org2.example.com | [39c1 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a01c0 gate 1589998880446490100 evaluation fails +peer1.org2.example.com | [39c2 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [39c3 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [39c4 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [39c5 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0730 gate 1589998880446845700 evaluation starts +peer1.org2.example.com | [39c6 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0730 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39c7 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0730 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [39c8 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0730 principal matched by identity 0 +peer1.org2.example.com | [39c9 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [39ca 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [39cb 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0730 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [39cc 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a0730 gate 1589998880446845700 evaluation succeeds +peer0.org2.example.com | 00000010 ee 0c d8 f5 08 2a 60 c0 32 c2 fa 43 67 59 81 46 |.....*`.2..CgY.F| +peer0.org2.example.com | [3bc1 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 92 be a4 7a ce 13 5b 41 e4 0c 8c |0D. ....z..[A...| +peer0.org2.example.com | 00000010 32 70 7b 0e 4b 3d a4 d2 bf dc ed 0d e9 ce 00 0c |2p{.K=..........| +peer0.org2.example.com | 00000020 32 5c a3 ab 02 20 67 34 2a a2 04 06 20 ad 57 a9 |2\... g4*... .W.| +peer0.org2.example.com | 00000030 e5 78 9f d4 46 98 c4 24 47 29 71 69 15 de 5a 9c |.x..F..$G)qi..Z.| +peer0.org2.example.com | 00000040 b0 0e 27 08 eb 69 |..'..i| +peer0.org2.example.com | [3bc2 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3bc3 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 75 81 34 7a c0 ec db 30 27 8f |0E.!..u.4z...0'.| +peer0.org2.example.com | 00000010 62 91 6d a2 83 a4 b3 3d 27 9e a5 5b e5 0b 97 1b |b.m....='..[....| +peer0.org2.example.com | 00000020 47 70 83 a9 be 02 20 4f 2e f0 3c 7b 20 ae 88 46 |Gp.... O..<{ ..F| +peer0.org2.example.com | 00000030 2d 65 1b 46 3b ad 46 cd 09 ba 43 fb 8d 69 3b 02 |-e.F;.F...C..i;.| +peer0.org2.example.com | 00000040 8a 0b a3 a3 fb c3 50 |......P| +peer0.org2.example.com | [3bc4 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3bc5 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [3bc6 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3bc7 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3bc8 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3bc9 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bca 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bcb 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bcc 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [3bcd 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bce 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bcf 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3bd0 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: +peer0.org2.example.com | [3bd1 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bd2 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bd3 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [3bd4 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3bd5 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [3bd6 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [3bd7 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 53 5c 91 f0 9b 75 1f 94 4f 2f 14 24 80 c3 af |?S\...u..O/.$...| +peer0.org2.example.com | 00000010 eb 4a 95 1c f0 4f a2 1e 2c 1b 3c ff d8 35 ca 91 |.J...O..,.<..5..| +peer0.org2.example.com | [3bd8 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 e6 e7 55 f6 2d 2e 28 16 56 b9 |0E.!....U.-.(.V.| +peer0.org2.example.com | 00000010 64 f8 a3 56 ee 82 66 ea f2 92 d2 f3 c9 ed 68 ad |d..V..f.......h.| +peer0.org2.example.com | 00000020 71 b7 33 56 8b 02 20 69 3a e1 d8 c6 c6 95 3e 54 |q.3V.. i:.....>T| +peer0.org2.example.com | 00000030 0b 8e 48 ec b9 c4 45 39 48 3f 43 2a fb 60 ee 6c |..H...E9H?C*.`.l| +peer0.org2.example.com | 00000040 19 0d 79 bc d1 73 cd |..y..s.| +peer0.org2.example.com | [3bd9 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bda 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bdb 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bdc 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer1.org2.example.com | [39cd 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39ce 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39cf 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [39d0 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [39d1 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [39d2 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [39d3 05-20 18:21:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39d4 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [39d5 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [39d6 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39d7 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39d8 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39d9 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39da 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39db 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39dc 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [39dd 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39de 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [39df 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39e0 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [39e1 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [39e2 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39e3 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [39e4 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39e5 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39e6 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [39e7 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [39e8 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [39e9 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c66d0 gate 1589998880641789200 evaluation starts +peer1.org2.example.com | [39ea 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c66d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39eb 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c66d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [39ec 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c66d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [39ed 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c66d0 principal evaluation fails +peer1.org2.example.com | [39ee 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c66d0 gate 1589998880641789200 evaluation fails +peer1.org2.example.com | [39ef 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [39f0 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [39f1 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [39f2 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6c40 gate 1589998880642105700 evaluation starts +peer1.org2.example.com | [39f3 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39f4 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6c40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [39f5 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6c40 principal matched by identity 0 +peer1.org2.example.com | [39f6 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer1.org2.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer1.org2.example.com | [39f7 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer1.org2.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer1.org2.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer1.org2.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer1.org2.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer1.org2.example.com | [39f8 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6c40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [39f9 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c6c40 gate 1589998880642105700 evaluation succeeds +peer1.org2.example.com | [39fa 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39fb 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39fc 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [39fd 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [39fe 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [39ff 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3a00 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3a01 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3a02 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3a03 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a04 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a05 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a06 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3a07 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a08 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a09 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a0a 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a0b 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\002 M\326<\372\017/\2558b\224\001\2113\314\017\216Bv'_\213\234\345\251\tTg\2376\265Z\373" > alive: alive: +peer1.org2.example.com | [3a0c 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a0d 05-20 18:21:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a0e 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a0f 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a10 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a11 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3a12 05-20 18:21:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a13 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:QLW\252\262\333\361lr\013\027&\266\\PC\2341" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a14 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:QLW\252\262\333\361lr\013\027&\266\\PC\2341" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a15 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a16 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:QLW\252\262\333\361lr\013\027&\266\\PC\2341" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a17 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3a18 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer1.org2.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer1.org2.example.com | [3a19 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer1.org2.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer1.org2.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer1.org2.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer1.org2.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer1.org2.example.com | [3a1a 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3a1b 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 0c e0 6e f6 ec 18 c8 d5 f2 8a |0E.!....n.......| +peer0.org1.example.com | [3939 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [393a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [393b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [393c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [393d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [393e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [393f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bdd 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3bde 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3bdf 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3be0 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3be1 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3be2 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3be3 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3be4 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3be5 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3be6 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3be7 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3be8 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3be9 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc8ce0 gate 1589998883368672300 evaluation starts +peer0.org2.example.com | [3bea 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc8ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3beb 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc8ce0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3bec 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc8ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3bed 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc8ce0 principal evaluation fails +peer0.org2.example.com | [3bee 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc8ce0 gate 1589998883368672300 evaluation fails +peer0.org2.example.com | [3bef 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bf0 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bf1 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3bf2 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc9250 gate 1589998883373336300 evaluation starts +peer0.org2.example.com | [3bf3 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc9250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bf4 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc9250 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3bf5 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc9250 principal matched by identity 0 +peer0.org2.example.com | [3bf6 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 b2 ec 03 5c 98 83 21 3e ae a1 60 77 aa 4d ec |X...\..!>..`w.M.| +peer0.org2.example.com | 00000010 a8 2b c8 cd d9 96 cd 1b fc d4 18 5c c4 71 7f 01 |.+.........\.q..| +peer0.org2.example.com | [3bf7 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 a1 cb f2 c0 13 0b 6a f9 00 d5 22 |0D. t......j..."| +peer0.org2.example.com | 00000010 dc bf 2d d8 f4 3f f8 8f e1 c1 7f 0d 68 d2 8c e3 |..-..?......h...| +peer0.org2.example.com | 00000020 45 bf be 7c 02 20 55 e1 92 1e bf 5d 1d 69 69 52 |E..|. U....].iiR| +peer0.org2.example.com | 00000030 aa 42 35 c7 c5 bc a4 e0 f1 57 ea 29 ba 2a 48 2e |.B5......W.).*H.| +peer0.org2.example.com | 00000040 b7 f5 bb 7d ee 59 |...}.Y| +peer0.org2.example.com | [3bf8 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc9250 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3bf9 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc9250 gate 1589998883373336300 evaluation succeeds +peer0.org2.example.com | [3bfa 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3bfb 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3bfc 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [38d8 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d9 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [38da 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:t\017)\266^\305\377\212\306\242sG\23166\362:\210\273\002 \001\362\240&\340%\364\006\017\213\024\205\026\300\022\374\371\315\247\276\010\020\302\312\3451\n<\360\037\2743" > +peer1.org1.example.com | [38db 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [38dc 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 7a 3b 67 47 e3 cb 2f f5 67 f7 f5 c4 4c 8c 49 f6 |z;gG../.g...L.I.| +peer1.org2.example.com | 00000020 09 01 0c 19 d5 02 20 22 6a 49 67 7d 10 fb 4b ed |...... "jIg}..K.| +peer1.org2.example.com | 00000030 72 91 3c fd 3e 51 4c 57 aa b2 db f1 6c 72 0b 17 |r.<.>QLW....lr..| +peer1.org2.example.com | 00000040 26 b6 5c 50 43 9c 31 |&.\PC.1| +peer1.org2.example.com | [3a1c 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3a1d 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [3a1e 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3a1f 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a20 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3a21 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3a22 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a23 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a24 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a25 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a26 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a27 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a28 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a29 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3a2a 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a2b 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a2c 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a2d 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3a2e 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a2f 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a30 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a31 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a32 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:QLW\252\262\333\361lr\013\027&\266\\PC\2341" > > alive: +peer1.org2.example.com | [3a33 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a34 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a35 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a36 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38dd 05-20 18:21:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [38de 05-20 18:21:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816103D +peer1.org1.example.com | [38df 05-20 18:21:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 152181358098F0D0310437020E741F1A159A2CA5DA2C903299F3C9810EA04FF6 +peer1.org1.example.com | [38e0 05-20 18:21:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [38e1 05-20 18:21:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [38e2 05-20 18:21:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [38e3 05-20 18:21:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [38e4 05-20 18:21:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38e5 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38e6 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38e7 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [38e8 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [38e9 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38ea 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [38eb 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38ec 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38ed 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38ee 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38ef 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38f0 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38f1 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38f2 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38f3 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38f4 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38f5 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [38f6 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a37 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3a38 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a39 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a3a 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a3b 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a3c 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a3d 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a3e 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a3f 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a40 05-20 18:21:20.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a41 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a42 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a43 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a44 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3a45 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a46 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a47 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a48 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a49 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a4a 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a4b 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3a4c 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ed40 gate 1589998881031389900 evaluation starts +peer1.org2.example.com | [3a4d 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ed40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a4e 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ed40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3a4f 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ed40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3a50 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ed40 principal evaluation fails +peer1.org2.example.com | [3a51 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391ed40 gate 1589998881031389900 evaluation fails +peer1.org2.example.com | [3a52 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bfd 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3bfe 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3bff 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3c00 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3c01 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3c02 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3c03 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c04 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c05 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c06 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c07 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c08 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c09 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c0a 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c0b 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c0c 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c0d 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c0e 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c0f 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c10 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c11 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3c12 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c13 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c14 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c15 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3c16 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c17 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c18 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c19 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c1a 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c1b 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c1c 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c1d 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c1e 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c1f 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c20 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c21 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c22 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a53 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a54 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a55 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391f2b0 gate 1589998881032743100 evaluation starts +peer1.org2.example.com | [3a56 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391f2b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a57 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391f2b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3a58 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391f2b0 principal matched by identity 0 +peer1.org2.example.com | [3a59 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +peer1.org2.example.com | 00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +peer1.org2.example.com | [3a5a 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +peer1.org2.example.com | 00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +peer1.org2.example.com | 00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +peer1.org2.example.com | 00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +peer1.org2.example.com | 00000040 a7 58 d0 cf be 9c |.X....| +peer1.org2.example.com | [3a5b 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391f2b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a5c 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391f2b0 gate 1589998881032743100 evaluation succeeds +peer1.org2.example.com | [3a5d 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a5e 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a5f 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3a60 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a61 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3a62 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3a63 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3a64 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3a65 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3a66 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a67 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a68 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a69 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3a6a 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a6b 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a6c 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a6d 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a6e 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > alive: +peer1.org2.example.com | [3a6f 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a70 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a71 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3a72 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a73 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3a75 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [38f7 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [38f8 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38f9 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38fa 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [38fb 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [38fc 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [38fd 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38fe 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032376d0 gate 1589998893654294100 evaluation starts +peer1.org1.example.com | [38ff 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032376d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3900 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3901 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032376d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3902 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032376d0 principal matched by identity 0 +peer1.org1.example.com | [3903 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 2e 5d 5f 01 69 3b 83 25 71 a8 91 35 1e c2 7f |..]_.i;.%q..5...| +peer1.org1.example.com | 00000010 1c 5b f6 1a b8 2a 22 f3 6f d8 05 28 c1 95 9e 5a |.[...*".o..(...Z| +peer1.org1.example.com | [3904 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 da 1b 61 14 be 37 c0 12 2f cc b2 |0D. 0..a..7../..| +peer1.org1.example.com | 00000010 39 66 1e 18 39 19 ed ad 44 02 51 66 6a c6 09 37 |9f..9...D.Qfj..7| +peer1.org1.example.com | 00000020 d9 a9 a6 e3 02 20 41 36 56 18 0b 4e 83 90 d7 dd |..... A6V..N....| +peer1.org1.example.com | 00000030 eb c5 67 42 bc 75 ae 58 55 79 f4 cd ae 33 80 dd |..gB.u.XUy...3..| +peer1.org1.example.com | 00000040 e2 02 0f e5 5b e4 |....[.| +peer1.org1.example.com | [3905 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032376d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3906 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032376d0 gate 1589998893654294100 evaluation succeeds +peer1.org1.example.com | [3907 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3908 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3909 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [390a 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [390b 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [390c 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [390d 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [390e 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [390f 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3910 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3911 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3912 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3913 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3914 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3915 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3916 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3917 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3918 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3919 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [391a 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [391b 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [391c 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [391d 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a76 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3a74 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a79 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a77 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a7b 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a78 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a7a 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a7c 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a7d 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a7e 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a7f 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a80 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a81 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a82 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a83 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a84 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a85 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a86 05-20 18:21:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a87 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3a88 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161036 +peer1.org2.example.com | [3a89 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 44D91EE70C37AB5B5FF13DD1114F4E43EE0CD8F5082A60C032C2FA4367598146 +peer1.org2.example.com | [3a8a 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3a8b 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3a8c 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3a8d 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a8e 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a8f 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c23 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c24 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c25 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c26 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c27 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c28 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3c29 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9220 gate 1589998883605419700 evaluation starts +peer0.org2.example.com | [3c2a 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c2b 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9220 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3c2c 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3c2d 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9220 principal evaluation fails +peer0.org2.example.com | [3c2e 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9220 gate 1589998883605419700 evaluation fails +peer0.org2.example.com | [3c2f 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c30 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c31 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c32 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9790 gate 1589998883607341000 evaluation starts +peer0.org2.example.com | [3c33 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9790 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c34 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9790 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3c35 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9790 principal matched by identity 0 +peer0.org2.example.com | [3c36 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3c37 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3c38 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9790 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c39 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9790 gate 1589998883607341000 evaluation succeeds +peer0.org2.example.com | [3c3a 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c3b 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c3c 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c3d 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c3e 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3f 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c40 05-20 18:21:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3c41 05-20 18:21:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161035 +peer0.org2.example.com | [3c42 05-20 18:21:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 35E9739F5617B9E6D30F25324B95C3F58BC308F184C8E6E8C17B18D92C71E022 +peer0.org2.example.com | [3c43 05-20 18:21:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3c44 05-20 18:21:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3c45 05-20 18:21:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3c46 05-20 18:21:23.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [3c47 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3940 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3941 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3942 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3943 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3944 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3945 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3946 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3947 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3948 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3949 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [394a 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [394b 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [394c 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [394d 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [394e 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [394f 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3950 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3951 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3952 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3953 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer0.org1.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer0.org1.example.com | [3954 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer0.org1.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer0.org1.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer0.org1.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer0.org1.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer0.org1.example.com | [3955 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3956 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 02 82 6e 08 f3 fe 69 b6 7a 95 db |0D. t..n...i.z..| +peer0.org1.example.com | 00000010 56 4a d8 ee 90 9a a0 a9 3c 92 f9 bb 26 fc 77 7b |VJ......<...&.w{| +peer0.org1.example.com | 00000020 a9 ae 75 85 02 20 43 39 da d8 16 59 45 31 e7 f9 |..u.. C9...YE1..| +peer0.org1.example.com | 00000030 fe b2 15 d4 8b 49 94 f0 82 85 1b 79 36 c6 94 ca |.....I.....y6...| +peer0.org1.example.com | 00000040 e3 c1 a1 3f 64 ac |...?d.| +peer1.org2.example.com | [3a90 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a91 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a92 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a93 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a96 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a97 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a98 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a99 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a9a 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a9b 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a9c 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a9d 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3a9e 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d9 1e e7 0c 37 ab 5b 5f f1 3d d1 11 4f 4e 43 |D....7.[_.=..ONC| +peer1.org2.example.com | 00000010 ee 0c d8 f5 08 2a 60 c0 32 c2 fa 43 67 59 81 46 |.....*`.2..CgY.F| +peer1.org2.example.com | [3a9f 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 92 be a4 7a ce 13 5b 41 e4 0c 8c |0D. ....z..[A...| +peer1.org2.example.com | 00000010 32 70 7b 0e 4b 3d a4 d2 bf dc ed 0d e9 ce 00 0c |2p{.K=..........| +peer1.org2.example.com | 00000020 32 5c a3 ab 02 20 67 34 2a a2 04 06 20 ad 57 a9 |2\... g4*... .W.| +peer1.org2.example.com | 00000030 e5 78 9f d4 46 98 c4 24 47 29 71 69 15 de 5a 9c |.x..F..$G)qi..Z.| +peer1.org2.example.com | 00000040 b0 0e 27 08 eb 69 |..'..i| +peer1.org2.example.com | [3aa0 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3aa1 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 75 81 34 7a c0 ec db 30 27 8f |0E.!..u.4z...0'.| +peer1.org2.example.com | 00000010 62 91 6d a2 83 a4 b3 3d 27 9e a5 5b e5 0b 97 1b |b.m....='..[....| +peer1.org2.example.com | 00000020 47 70 83 a9 be 02 20 4f 2e f0 3c 7b 20 ae 88 46 |Gp.... O..<{ ..F| +peer1.org2.example.com | 00000030 2d 65 1b 46 3b ad 46 cd 09 ba 43 fb 8d 69 3b 02 |-e.F;.F...C..i;.| +peer1.org2.example.com | 00000040 8a 0b a3 a3 fb c3 50 |......P| +peer1.org2.example.com | [3aa2 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3aa3 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3aa4 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3aa5 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3aa7 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [391e 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [391f 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3920 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3921 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3922 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3923 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3924 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3925 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3926 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3927 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3928 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3929 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [392a 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [392b 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [392c 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [392d 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [392e 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [392f 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3930 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3931 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3932 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3933 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3934 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0350 gate 1589998893887588700 evaluation starts +peer1.org1.example.com | [3935 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0350 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3936 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0350 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3937 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0350 principal matched by identity 0 +peer0.org1.example.com | [3957 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3958 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3959 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [395a 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [395b 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [395c 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [395d 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [395e 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [395f 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3960 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3961 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3962 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3963 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [3964 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3965 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3966 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [3967 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [3968 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3969 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610111801 +peer0.org1.example.com | [396a 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 409B5BF64D03281822B89C911587FCDDA04B153319CC735AFEFD6129E9DAF85C +peer0.org1.example.com | [396b 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [396c 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [396d 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [396e 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [396f 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3970 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3971 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3972 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [3aa8 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3aa9 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3aaa 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3aa6 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [3aab 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [3aac 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3aad 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610111801 +peer1.org2.example.com | [3aae 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3F535C91F09B751F944F2F142480C3AFEB4A951CF04FA21E2C1B3CFFD835CA91 +peer1.org2.example.com | [3aaf 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [3ab0 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ab1 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ab2 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ab3 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ab4 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ab5 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3ab6 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a120 gate 1589998881229931100 evaluation starts +peer1.org2.example.com | [3ab7 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ab8 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a120 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ab9 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3aba 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a120 principal evaluation fails +peer1.org2.example.com | [3abc 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a120 gate 1589998881229931100 evaluation fails +peer1.org2.example.com | [3abd 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3abe 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3abf 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3abb 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ac0 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a690 gate 1589998881231933600 evaluation starts +peer1.org2.example.com | [3ac1 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ac2 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a690 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ac3 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a690 principal matched by identity 0 +peer1.org2.example.com | [3ac4 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +peer1.org2.example.com | 00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +peer1.org2.example.com | [3ac5 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +peer1.org2.example.com | 00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +peer1.org2.example.com | 00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +peer1.org2.example.com | 00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +peer1.org2.example.com | 00000040 a7 58 d0 cf be 9c |.X....| +peer1.org2.example.com | [3ac6 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a690 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ac7 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398a690 gate 1589998881231933600 evaluation succeeds +peer1.org2.example.com | [3ac8 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ac9 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c48 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c49 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c4a 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3c4b 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c4c 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3c4d 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3c4e 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3c4f 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c50 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3c51 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c52 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3c53 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c54 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c55 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c56 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c57 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c58 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c59 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c5a 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c5b 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c5c 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3c5d 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae ba aa f2 24 29 99 42 b5 68 89 5b a2 64 26 78 |....$).B.h.[.d&x| +peer0.org2.example.com | 00000010 51 13 28 2c 68 6a cd 60 8d 56 7d 83 b7 b3 1c 69 |Q.(,hj.`.V}....i| +peer0.org2.example.com | [3c5e 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e d5 2e 0f fa 16 f4 f9 e6 69 36 bc |0D. .........i6.| +peer0.org2.example.com | 00000010 ef f8 a3 9a 55 37 19 71 17 ff 46 d7 3d ca 2d f3 |....U7.q..F.=.-.| +peer0.org2.example.com | 00000020 0f 7a 9f 9f 02 20 1a 1b 29 51 86 0f 02 b5 7e e9 |.z... ..)Q....~.| +peer0.org2.example.com | 00000030 95 84 e0 4a ff e1 b3 22 15 df 6b 07 ad fb 66 8d |...J..."..k...f.| +peer0.org2.example.com | 00000040 33 da f0 35 1e ad |3..5..| +peer0.org2.example.com | [3c5f 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c60 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3c61 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3c62 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3c63 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3c64 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c65 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c66 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c67 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c68 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3938 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 40 5e d8 c2 f2 23 07 a8 9e 95 1f e2 cc be 4f |r@^...#........O| +peer1.org1.example.com | 00000010 eb 2d 03 a9 44 50 df 1c 22 f9 bd 8e 2f 09 4f 0b |.-..DP..".../.O.| +peer1.org1.example.com | [3939 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 ec 28 4d b9 67 61 5f 45 e3 c3 |0E.!...(M.ga_E..| +peer1.org1.example.com | 00000010 87 71 18 3f e3 14 d2 9c c2 16 e7 10 b3 46 1c 1a |.q.?.........F..| +peer1.org1.example.com | 00000020 27 a9 50 fc 0f 02 20 00 b1 c1 a8 fb 8f 39 28 e7 |'.P... ......9(.| +peer1.org1.example.com | 00000030 d5 a5 45 61 49 b5 ba 66 6d f5 b4 8f bf 86 20 d8 |..EaI..fm..... .| +peer1.org1.example.com | 00000040 97 55 fe 9a 6d 5d ce |.U..m].| +peer1.org1.example.com | [393a 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0350 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [393b 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a0350 gate 1589998893887588700 evaluation succeeds +peer1.org1.example.com | [393c 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [393d 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [393e 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [393f 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3940 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3941 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3942 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3943 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3944 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3945 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3946 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3947 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3948 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3949 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [394a 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [394b 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [394c 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [394d 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [394e 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [394f 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3950 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3951 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3952 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3953 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3954 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3955 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3956 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3957 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3958 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3959 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [395a 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [395b 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3973 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3974 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3975 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37158 +peer0.org1.example.com | [3976 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0039b3450 +peer0.org1.example.com | [3977 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3978 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3979 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [397a 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [397b 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [397c 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 6e f0 92 6e a8 68 b6 53 c8 1e d5 43 d4 0e 14 |.n..n.h.S...C...| +peer0.org1.example.com | 00000010 5e 07 c2 f4 2a f2 9f b3 0d 2b dc 33 00 a3 f0 4a |^...*....+.3...J| +peer0.org1.example.com | [397d 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 8b ff 1c ff 30 03 3f 85 06 e5 |0E.!......0.?...| +peer0.org1.example.com | 00000010 16 31 ba bb de 1f 43 0b 49 ee de 75 67 01 e8 13 |.1....C.I..ug...| +peer0.org1.example.com | 00000020 60 e8 8d 71 76 02 20 26 d5 df 05 b7 83 09 5f 11 |`..qv. &......_.| +peer0.org1.example.com | 00000030 09 c5 66 f8 54 52 30 19 84 79 32 72 80 6d cb e7 |..f.TR0..y2r.m..| +peer0.org1.example.com | 00000040 56 09 01 f8 ff 58 d1 |V....X.| +peer0.org1.example.com | [397e 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [397f 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00362b810, header 0xc0039b3860 +peer0.org1.example.com | [3980 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [3981 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] processing txid: 8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1 +peer0.org1.example.com | [3982 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1] +peer0.org1.example.com | [3983 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3984 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1] +peer0.org1.example.com | [3985 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3986 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8e3e1896] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3987 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3988 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists +peer0.org1.example.com | [3989 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [398a 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [398b 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [398c 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [398d 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 gate 1589998880742234200 evaluation starts +peer0.org1.example.com | [398e 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [398f 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3990 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3991 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 principal evaluation fails +peer0.org1.example.com | [3992 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 gate 1589998880742234200 evaluation fails +peer0.org1.example.com | [3993 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3994 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3995 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3996 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 gate 1589998880745575400 evaluation starts +peer0.org1.example.com | [3997 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3998 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3999 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 principal matched by identity 0 +peer0.org1.example.com | [399a 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 6e f0 92 6e a8 68 b6 53 c8 1e d5 43 d4 0e 14 |.n..n.h.S...C...| +peer0.org1.example.com | 00000010 5e 07 c2 f4 2a f2 9f b3 0d 2b dc 33 00 a3 f0 4a |^...*....+.3...J| +peer0.org1.example.com | [399b 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 8b ff 1c ff 30 03 3f 85 06 e5 |0E.!......0.?...| +peer0.org1.example.com | 00000010 16 31 ba bb de 1f 43 0b 49 ee de 75 67 01 e8 13 |.1....C.I..ug...| +peer0.org1.example.com | 00000020 60 e8 8d 71 76 02 20 26 d5 df 05 b7 83 09 5f 11 |`..qv. &......_.| +peer0.org1.example.com | 00000030 09 c5 66 f8 54 52 30 19 84 79 32 72 80 6d cb e7 |..f.TR0..y2r.m..| +peer0.org1.example.com | 00000040 56 09 01 f8 ff 58 d1 |V....X.| +peer0.org1.example.com | [399c 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [399d 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 gate 1589998880745575400 evaluation succeeds +peer0.org1.example.com | [399e 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [399f 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [39a0 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [39a1 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [39a2 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [39a3 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] handling GET_STATE from chaincode +peer0.org1.example.com | [39a4 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [39a5 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [39a6 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [39a7 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [39a8 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] notifying Txid:8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1, channelID:businesschannel +peer0.org1.example.com | [39a9 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [39aa 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8e3e1896] Exit chaincode: name:"lscc" (8ms) +peer0.org1.example.com | [39ab 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [39ac 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1] +peer0.org1.example.com | [39ad 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] Exit +peer0.org1.example.com | [39ae 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] Entry chaincode: name:"lscc" +peer0.org1.example.com | [39af 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [39b0 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1, chaincode: lscc} +peer0.org1.example.com | [39b1 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20E33167429C08FCCA7CFE8415DF23...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [39b2 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F1E578FDB5D53E4162ECB47475489BCCA37AD42B2BE3DC53E757B7F45C0B5A33 +peer0.org1.example.com | [39b3 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1, chaincode: lscc} +peer0.org1.example.com | [39b4 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] Exit +peer0.org1.example.com | [39b5 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1] +peer0.org1.example.com | [39b6 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37158 +peer0.org1.example.com | [39b7 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37158 grpc.code=OK grpc.call_duration=14.3785ms +peer0.org1.example.com | [39b8 05-20 18:21:20.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [39b9 05-20 18:21:20.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37158: read: connection reset by peer +peer0.org1.example.com | [39ba 05-20 18:21:20.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [39bb 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [39bc 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3aca 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3acb 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3acc 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3acd 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ace 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3acf 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer1.org2.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer1.org2.example.com | [3ad1 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ad2 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ad3 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ad4 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ad5 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3ad6 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ad7 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ad8 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ad9 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ad0 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer1.org2.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer1.org2.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer1.org2.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer1.org2.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer1.org2.example.com | [3ada 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3adb 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3adc 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3add 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d9 1e e7 0c 37 ab 5b 5f f1 3d d1 11 4f 4e 43 |D....7.[_.=..ONC| +peer1.org2.example.com | 00000010 ee 0c d8 f5 08 2a 60 c0 32 c2 fa 43 67 59 81 46 |.....*`.2..CgY.F| +peer1.org2.example.com | [3ade 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 92 be a4 7a ce 13 5b 41 e4 0c 8c |0D. ....z..[A...| +peer1.org2.example.com | 00000010 32 70 7b 0e 4b 3d a4 d2 bf dc ed 0d e9 ce 00 0c |2p{.K=..........| +peer1.org2.example.com | 00000020 32 5c a3 ab 02 20 67 34 2a a2 04 06 20 ad 57 a9 |2\... g4*... .W.| +peer1.org2.example.com | 00000030 e5 78 9f d4 46 98 c4 24 47 29 71 69 15 de 5a 9c |.x..F..$G)qi..Z.| +peer1.org2.example.com | 00000040 b0 0e 27 08 eb 69 |..'..i| +peer1.org2.example.com | [3adf 05-20 18:21:21.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ae0 05-20 18:21:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ae1 05-20 18:21:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ae2 05-20 18:21:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ae3 05-20 18:21:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ae4 05-20 18:21:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ae5 05-20 18:21:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3ae6 05-20 18:21:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [395c 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [395d 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [395e 05-20 18:21:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [395f 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3960 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3961 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3962 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3963 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 54 a7 27 ac c3 28 b5 79 9b b5 2e e8 e5 61 3f |.T.'..(.y.....a?| +peer1.org1.example.com | 00000010 36 d6 d5 19 3e 0a 9a 31 c1 96 9d 84 ce bc 04 29 |6...>..1.......)| +peer1.org1.example.com | [3964 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 f8 03 37 d7 bf 8c 2e 25 32 dc c9 |0D. ...7....%2..| +peer1.org1.example.com | 00000010 23 d9 07 77 e8 33 7f ef 72 02 d1 2f eb 80 65 7a |#..w.3..r../..ez| +peer1.org1.example.com | 00000020 db bd 58 7a 02 20 6b b0 4d 66 c0 d3 ca 49 e0 ed |..Xz. k.Mf...I..| +peer1.org1.example.com | 00000030 04 bd c3 d8 55 c6 36 d6 64 c1 17 7f 41 07 1f 25 |....U.6.d...A..%| +peer1.org1.example.com | 00000040 89 a8 10 dc 74 30 |....t0| +peer1.org1.example.com | [3965 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3966 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3967 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3968 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3969 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [396a 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [396b 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [396c 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [396d 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [396e 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [396f 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3970 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3971 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3972 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3973 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3975 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3974 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3976 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3977 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3978 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3979 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [397a 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [397b 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [397c 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [397d 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [397e 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [397f 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3980 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3981 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33352 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes +peer1.org1.example.com | [3982 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3983 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3984 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [3985 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3986 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [39bd 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [39be 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39bf 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c0 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c1 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c2 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c3 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c4 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [39c5 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39c6 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [39c7 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [39c8 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39c9 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [39ca 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [39cb 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39cc 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [39cd 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39ce 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39d0 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [39cf 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [39d1 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [39d3 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [39d2 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [39d4 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 gate 1589998880899849500 evaluation starts +peer0.org1.example.com | [39d5 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39d6 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [39d8 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 principal matched by identity 0 +peer0.org1.example.com | [39d7 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [39d9 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer0.org1.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer0.org1.example.com | [39da 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer0.org1.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer0.org1.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer0.org1.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer0.org1.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer0.org1.example.com | [39db 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [39dc 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [39dd 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [39de 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [39df 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 gate 1589998880899849500 evaluation succeeds +peer0.org1.example.com | [39e0 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [39e2 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39e1 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39e3 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39e4 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [39e7 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [39e6 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [39e9 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39e8 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39e5 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [39ea 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ae7 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ae8 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ae9 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3aea 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3aeb 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3aec 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3aed 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8da0 gate 1589998881265566200 evaluation starts +peer1.org2.example.com | [3aee 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8da0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3aef 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8da0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3af0 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3af1 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8da0 principal evaluation fails +peer1.org2.example.com | [3af2 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8da0 gate 1589998881265566200 evaluation fails +peer1.org2.example.com | [3af3 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3af4 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3af5 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3af6 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9310 gate 1589998881269868000 evaluation starts +peer1.org2.example.com | [3af7 05-20 18:21:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9310 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3af8 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9310 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3af9 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9310 principal matched by identity 0 +peer1.org2.example.com | [3afa 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer1.org2.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer1.org2.example.com | [3afb 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer1.org2.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer1.org2.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer1.org2.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer1.org2.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer1.org2.example.com | [3afc 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9310 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3afd 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9310 gate 1589998881269868000 evaluation succeeds +peer1.org2.example.com | [3afe 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3aff 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b00 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b01 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b02 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b03 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b04 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3b05 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer1.org2.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer1.org2.example.com | [3b06 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer1.org2.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer1.org2.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer1.org2.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer1.org2.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer1.org2.example.com | [3b07 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b08 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b09 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3b0a 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d9 1e e7 0c 37 ab 5b 5f f1 3d d1 11 4f 4e 43 |D....7.[_.=..ONC| +peer1.org2.example.com | 00000010 ee 0c d8 f5 08 2a 60 c0 32 c2 fa 43 67 59 81 46 |.....*`.2..CgY.F| +peer1.org1.example.com | [3987 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5530 gate 1589998895268496900 evaluation starts +peer1.org1.example.com | [3988 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3989 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5530 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [398a 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5530 principal matched by identity 0 +peer1.org1.example.com | [398b 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 87 87 7f 13 5e f6 db 66 b0 b1 bd 66 9e 18 bc |.....^..f...f...| +peer1.org1.example.com | 00000010 13 91 ed 8a 3e 67 f7 03 4c ad 6d 05 df 46 a9 d9 |....>g..L.m..F..| +peer1.org1.example.com | [398c 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 e0 45 06 b2 29 ae 57 9a fc 76 4e |0D. s.E..).W..vN| +peer1.org1.example.com | 00000010 5c 64 0c b0 3c 09 f7 2a f4 bc e4 e5 89 75 c1 d1 |\d..<..*.....u..| +peer1.org1.example.com | 00000020 5e 26 5e 2f 02 20 2c 28 c9 85 45 c5 aa 13 24 53 |^&^/. ,(..E...$S| +peer1.org1.example.com | 00000030 60 fe 99 55 99 cc 33 f0 40 a6 78 f7 f7 58 04 a9 |`..U..3.@.x..X..| +peer1.org1.example.com | 00000040 f3 97 5b 74 de 1b |..[t..| +peer1.org1.example.com | [398d 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5530 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [398e 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5530 gate 1589998895268496900 evaluation succeeds +peer1.org1.example.com | [398f 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [3990 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [3991 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [3992 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [3993 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [3994 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer1.org1.example.com | [3995 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3996 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [3997 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org1.example.com | [3998 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [3999 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer1.org1.example.com | [399a 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer1.org1.example.com | [399b 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org1.example.com | [399c 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer1.org1.example.com | [399d 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer1.org1.example.com | [399e 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [399f 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00333d500 env 0xc00031a0f0 txn 0 +peer1.org1.example.com | [39a0 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00031a0f0 +peer1.org1.example.com | [39a1 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +peer1.org1.example.com | [39a2 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [39a3 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [39a4 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [39a5 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a6 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [39a7 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org1.example.com | [39a8 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [39a9 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [39aa 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [39ab 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 49 4f 23 4c 66 ab 43 40 69 01 b9 28 34 2c |.IIO#Lf.C@i..(4,| +peer0.org2.example.com | [3c69 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c6a 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3c6b 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c6c 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3c6d 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c6e 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c6f 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c70 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c71 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c72 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c73 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c74 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c75 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c76 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c77 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c78 05-20 18:21:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c79 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c7a 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c7b 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c7c 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3c7d 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c7e 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c7f 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c80 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c81 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c82 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c83 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3c84 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58020 gate 1589998884053817100 evaluation starts +peer0.org2.example.com | [3c85 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c86 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58020 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3c87 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3c88 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58020 principal evaluation fails +peer0.org2.example.com | [3c89 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58020 gate 1589998884053817100 evaluation fails +peer0.org2.example.com | [3c8a 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c8b 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c8c 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c8d 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58590 gate 1589998884059923500 evaluation starts +peer0.org2.example.com | [3c8e 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58590 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c8f 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58590 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3c90 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58590 principal matched by identity 0 +peer0.org2.example.com | [3c91 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c c9 60 43 dd 5d 60 05 b7 fa 4c 05 b5 7a 1d e6 |..`C.]`...L..z..| +peer0.org2.example.com | 00000010 d2 ff 2b 4c f1 74 e3 ea 2a 7d ff dc 7c 99 89 20 |..+L.t..*}..|.. | +peer0.org2.example.com | [3c92 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 ba 21 21 40 6b b6 b3 76 b1 c6 4b |0D. ..!!@k..v..K| +peer0.org2.example.com | 00000010 50 7b 98 5c 08 c1 1c d5 4a 72 db e8 ba a8 54 62 |P{.\....Jr....Tb| +peer0.org2.example.com | 00000020 4e 37 a1 a6 02 20 24 87 11 1e 3e d7 57 0c 4f 3f |N7... $...>.W.O?| +peer0.org2.example.com | 00000030 2f db 26 c7 38 ef 84 40 bf 5c dc 47 5b 53 fd 3e |/.&.8..@.\.G[S.>| +peer0.org2.example.com | 00000040 4a 69 1a 6d 6f e5 |Ji.mo.| +peer0.org2.example.com | [3c93 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58590 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c94 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58590 gate 1589998884059923500 evaluation succeeds +peer0.org2.example.com | [3c95 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c96 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c97 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c98 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c99 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3c9a 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3c9b 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3c9c 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3c9d 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3c9e 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c9f 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ca0 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ca1 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ca2 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ca3 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ca4 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ca5 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [39eb 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [39ec 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [39ed 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [39ee 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ef 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [39f0 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [39f1 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [39f2 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [39f3 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39f4 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39f5 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39f6 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [39f7 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [39f8 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [39f9 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [39fa 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39fb 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [39fc 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [39fd 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [39fe 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ff 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a00 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a01 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a02 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3a03 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3a04 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a05 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a06 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37162 +peer0.org1.example.com | [3a07 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004a9ed70 +peer0.org1.example.com | [3a08 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3a09 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3a0a 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3a0b 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3a0c 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3a0d 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 ef 09 95 24 d2 95 01 f4 a9 48 2f ee 45 2a ac |Q...$.....H/.E*.| +peer0.org1.example.com | 00000010 16 6a e0 fd 6e 74 c5 46 c0 a9 d5 94 2c ba a5 13 |.j..nt.F....,...| +peer0.org1.example.com | [3a0e 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 fb 73 46 76 0b 33 1b b5 ed ff 0e |0D. y.sFv.3.....| +peer0.org1.example.com | 00000010 aa fb fa 9f 5b 37 18 55 c1 27 70 63 09 80 ca de |....[7.U.'pc....| +peer0.org1.example.com | 00000020 bf a6 b6 f4 02 20 1f 58 3e a7 16 70 a4 00 d3 13 |..... .X>..p....| +peer0.org1.example.com | 00000030 f3 a8 6f 9e a2 85 d8 f7 69 4d d2 68 a2 b1 8e 1f |..o.....iM.h....| +peer0.org1.example.com | 00000040 06 02 53 33 66 71 |..S3fq| +peer0.org1.example.com | [3a0f 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3a10 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad05b0, header 0xc004a9f180 +peer0.org1.example.com | [3a11 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [3a12 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] processing txid: 1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd +peer0.org1.example.com | [3a13 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd] +peer0.org1.example.com | [3a14 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3a15 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd] +peer0.org1.example.com | [3a16 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3a17 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1b8b8d4c] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3a18 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3a19 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec +peer0.org1.example.com | [3a1a 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3a1b 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a1c 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a1d 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a1e 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 gate 1589998881012990300 evaluation starts +peer0.org1.example.com | [3a1f 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a20 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3a21 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3a22 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 principal evaluation fails +peer0.org1.example.com | [3a23 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 gate 1589998881012990300 evaluation fails +peer0.org1.example.com | [3a24 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a25 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a26 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3a27 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 gate 1589998881014075200 evaluation starts +peer1.org1.example.com | 00000010 71 2d cf eb 11 06 d8 cc 15 14 32 60 e9 81 58 21 |q-........2`..X!| +peer1.org1.example.com | [39ac 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 51 e2 c7 48 26 65 f8 8c 6e 5a 85 |0D. .Q..H&e..nZ.| +peer1.org1.example.com | 00000010 8a 41 ca a0 4b 9c 5c 82 d8 9b c8 b3 00 54 02 d4 |.A..K.\......T..| +peer1.org1.example.com | 00000020 81 5b 50 d2 02 20 01 14 a5 f1 ad ed ae d1 ee fd |.[P.. ..........| +peer1.org1.example.com | 00000030 6f ef 05 30 85 7c 16 66 26 77 a5 98 56 0f 7e 61 |o..0.|.f&w..V.~a| +peer1.org1.example.com | 00000040 43 ae 34 84 59 de |C.4.Y.| +peer1.org1.example.com | [39ad 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [39ae 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003440000, header channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +peer1.org1.example.com | [39af 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [39b0 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [39b1 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [39b2 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [39b3 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [39b4 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [39b5 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [39b6 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [39b7 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [39b8 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [39b9 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [39ba 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [39bb 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [39bc 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [39bd 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [39be 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [39bf 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [39c0 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [39c1 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [39c2 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [39c3 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [39c4 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [39c5 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [39c6 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [39c7 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [39c8 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [39c9 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [39ca 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [39cb 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39cc 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39cd 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39ce 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39cf 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d0 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d1 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [3b0b 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 92 be a4 7a ce 13 5b 41 e4 0c 8c |0D. ....z..[A...| +peer1.org2.example.com | 00000010 32 70 7b 0e 4b 3d a4 d2 bf dc ed 0d e9 ce 00 0c |2p{.K=..........| +peer1.org2.example.com | 00000020 32 5c a3 ab 02 20 67 34 2a a2 04 06 20 ad 57 a9 |2\... g4*... .W.| +peer1.org2.example.com | 00000030 e5 78 9f d4 46 98 c4 24 47 29 71 69 15 de 5a 9c |.x..F..$G)qi..Z.| +peer1.org2.example.com | 00000040 b0 0e 27 08 eb 69 |..'..i| +peer0.org1.example.com | [3a28 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a29 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3a2a 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 principal matched by identity 0 +peer0.org1.example.com | [3a2b 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 ef 09 95 24 d2 95 01 f4 a9 48 2f ee 45 2a ac |Q...$.....H/.E*.| +peer0.org1.example.com | 00000010 16 6a e0 fd 6e 74 c5 46 c0 a9 d5 94 2c ba a5 13 |.j..nt.F....,...| +peer0.org1.example.com | [3a2c 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 fb 73 46 76 0b 33 1b b5 ed ff 0e |0D. y.sFv.3.....| +peer0.org1.example.com | 00000010 aa fb fa 9f 5b 37 18 55 c1 27 70 63 09 80 ca de |....[7.U.'pc....| +peer0.org1.example.com | 00000020 bf a6 b6 f4 02 20 1f 58 3e a7 16 70 a4 00 d3 13 |..... .X>..p....| +peer0.org1.example.com | 00000030 f3 a8 6f 9e a2 85 d8 f7 69 4d d2 68 a2 b1 8e 1f |..o.....iM.h....| +peer0.org1.example.com | 00000040 06 02 53 33 66 71 |..S3fq| +peer0.org1.example.com | [3a2d 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a2e 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 gate 1589998881014075200 evaluation succeeds +peer0.org1.example.com | [3a2f 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a30 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3a31 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a32 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a33 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [3a34 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] handling GET_STATE from chaincode +peer0.org1.example.com | [3a35 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [3a36 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3a37 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [3a38 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3a39 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] notifying Txid:1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd, channelID:businesschannel +peer0.org1.example.com | [3a3a 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3a3b 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1b8b8d4c] Exit chaincode: name:"lscc" (6ms) +peer0.org1.example.com | [3a3c 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [3a3d 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd] +peer0.org1.example.com | [3a3e 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] Exit +peer0.org1.example.com | [3a3f 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3a40 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [3a41 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd, chaincode: lscc} +peer0.org1.example.com | [3a42 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20EC6D75C79641BAE5A8A68C7EBA64...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3a43 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 202E8CE6D052CE6DDC857801A9452E7140A0F52C33E00349BE91241A3AF205CD +peer0.org1.example.com | [3a44 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd, chaincode: lscc} +peer0.org1.example.com | [3a45 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] Exit +peer0.org1.example.com | [3a46 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd] +peer0.org1.example.com | [3a47 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37162 +peer0.org1.example.com | [3a48 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37162 grpc.code=OK grpc.call_duration=9.9654ms +peer0.org1.example.com | [3a49 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3a4a 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161033 +peer0.org1.example.com | [3a4b 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0E7E6E0CDACAD22AC9688BB4D35E29A8016453E15A0EE5484FCF8AFCB9589D3B +peer0.org1.example.com | [3a4c 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3a4d 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3a4e 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3a4f 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3a50 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ca6 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ca7 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ca8 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ca9 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3caa 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3cab 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cac 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d2 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer1.org1.example.com | [39d3 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer1.org1.example.com | [39d4 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org1.example.com | [39d5 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [39d6 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [39d7 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [39d8 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [39d9 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [39da 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [39db 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [39dc 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [39dd 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer1.org1.example.com | [39de 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [39df 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | [39e0 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org1.example.com | [39e1 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb9980 gate 1589998895294972200 evaluation starts +peer1.org1.example.com | [39e2 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb9980 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [39e3 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb9980 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [39e4 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb9980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [39e5 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb9980 processing identity 1 with bytes of 115a110 +peer1.org1.example.com | [39e6 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [39e7 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [39e8 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [39e9 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [39ea 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [39eb 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [39ec 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb9980 principal matched by identity 1 +peer1.org1.example.com | [39ed 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +peer1.org1.example.com | 00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..| +peer1.org1.example.com | [39ee 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +peer1.org1.example.com | 00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +peer1.org1.example.com | 00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +peer1.org1.example.com | 00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +peer1.org1.example.com | 00000040 72 24 fc be df 99 95 |r$.....| +peer1.org1.example.com | [39ef 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb9980 principal evaluation succeeds for identity 1 +peer1.org1.example.com | [39f0 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb9980 gate 1589998895294972200 evaluation succeeds +peer1.org1.example.com | [39f1 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [39f2 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [39f3 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org1.example.com | [39f4 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org1.example.com | [39f5 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d202d0 gate 1589998895299557800 evaluation starts +peer1.org1.example.com | [39f6 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d202d0 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [39f7 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d202d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [39f8 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d202d0 principal matched by identity 0 +peer1.org1.example.com | [39f9 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +peer1.org1.example.com | 00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.| +peer1.org1.example.com | [39fa 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +peer1.org1.example.com | 00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +peer1.org1.example.com | 00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +peer1.org1.example.com | 00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +peer1.org1.example.com | 00000040 61 03 26 ae cc 43 |a.&..C| +peer1.org1.example.com | [39fb 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d202d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [39fc 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d202d0 gate 1589998895299557800 evaluation succeeds +peer1.org1.example.com | [39fd 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [39fe 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [39ff 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer1.org1.example.com | [3a00 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer1.org1.example.com | [3a01 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [3a02 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [3a03 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [3a04 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [3a05 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3a06 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [3a07 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a08 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a09 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a0a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a0b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a0c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a0d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a0e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a0f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a10 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a11 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [3a12 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [3a13 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer1.org1.example.com | [3a14 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org1.example.com | [3a15 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [3a16 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a17 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a18 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a19 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a1a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a1b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a1c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a1d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a1e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a1f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a20 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [3a21 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [3a22 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [3a23 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [3a24 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [3a25 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [3a26 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [3a27 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [3a28 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [3a29 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [3a2a 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [3a2b 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3a2c 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [3a51 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3a52 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a53 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3a54 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a55 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a56 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a57 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a58 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a59 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a5a 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3a5b 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37162: read: connection reset by peer +peer0.org1.example.com | [3a5c 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3a5d 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a5e 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a5f 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a60 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a61 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a62 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3a63 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a64 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a65 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +peer0.org1.example.com | 00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +peer0.org1.example.com | [3a66 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +peer0.org1.example.com | 00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +peer0.org1.example.com | 00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +peer0.org1.example.com | 00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +peer0.org1.example.com | 00000040 a7 58 d0 cf be 9c |.X....| +peer0.org1.example.com | [3a67 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [3a68 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 ed ec cf dc 2f 25 84 1f 8e 5f da |0D. q..../%..._.| +peer0.org1.example.com | 00000010 76 4a e0 9d 64 0a 2b e9 63 2c 2a 74 60 75 dc ef |vJ..d.+.c,*t`u..| +peer0.org1.example.com | 00000020 43 61 ff 11 02 20 1b 1e 2b 88 73 31 9e f1 84 38 |Ca... ..+.s1...8| +peer0.org1.example.com | 00000030 cb 09 67 0a 59 e5 0e 0c 46 da a8 67 b7 1a e1 ae |..g.Y...F..g....| +peer0.org1.example.com | 00000040 bd d9 eb dc 25 4f |....%O| +peer0.org1.example.com | [3a69 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3a6a 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3a6b 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a6c 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a6d 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a6e 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3a6f 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer0.org1.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer0.org1.example.com | [3a70 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer0.org1.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer0.org1.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer0.org1.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer0.org1.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer0.org1.example.com | [3a71 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a72 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a73 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a74 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a75 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3a76 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +peer0.org1.example.com | 00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +peer0.org1.example.com | [3a77 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +peer0.org1.example.com | 00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +peer0.org1.example.com | 00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +peer0.org1.example.com | 00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +peer0.org1.example.com | 00000040 a7 58 d0 cf be 9c |.X....| +peer0.org1.example.com | [3a78 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a79 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a7a 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a7b 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a7c 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a7d 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3a7e 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +peer0.org1.example.com | 00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +peer0.org1.example.com | [3a7f 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +peer0.org1.example.com | 00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +peer0.org1.example.com | 00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +peer0.org1.example.com | 00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +peer0.org1.example.com | 00000040 02 e5 d6 78 aa a2 6b |...x..k| +peer0.org1.example.com | [3a80 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a81 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a82 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a83 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3a84 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a2d 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [3a2e 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [3a2f 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3a30 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3a31 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [3a32 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3a33 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [3a34 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [3a35 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3a36 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3a37 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | [3a38 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [3a39 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3a3a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3a3b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [3a3c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3a3d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [3a3e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [3a3f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3a40 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3a41 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org1.example.com | [3a42 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org1.example.com | [3a43 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3a44 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3a45 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org1.example.com | [3a46 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org1.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer1.org1.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer1.org1.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3a47 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [3a48 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [3a49 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [3a4a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [3a4b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [3a4c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [3a4d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [3a4e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [3a4f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [3a50 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3a51 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3a52 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [3a53 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3a54 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3a55 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [3a56 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3a57 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer1.org1.example.com | [3a58 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer1.org1.example.com | [3a59 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [3a5a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [3a5b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [3a5c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org1.example.com | [3a5d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer1.org1.example.com | [3a5e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer1.org1.example.com | [3a5f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org1.example.com | [3a60 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [3a61 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [3a62 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [3a63 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [3a64 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [3a65 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [3a66 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [3a67 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [3a68 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [3a69 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [3a6a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [3a6b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [3a6c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [3a6d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [3a6e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [3a6f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [3a70 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [3a71 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [3a72 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [3a73 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [3a74 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [3a75 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [3a76 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [3a77 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [3a78 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [3a79 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [3a7a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3a7b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [3a7c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [3a7d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [3a7e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [3a7f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [3a80 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [3a81 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a82 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [3a83 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [3a84 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [3a85 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [3a86 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [3a87 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [3a88 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a89 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [3a8a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [3a8b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [3cad 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3cae 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3caf 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb0 05-20 18:21:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3cb1 05-20 18:21:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb2 05-20 18:21:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3cb3 05-20 18:21:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb4 05-20 18:21:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3cb5 05-20 18:21:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb6 05-20 18:21:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb7 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cb8 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cb9 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3cba 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cbb 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cbc 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cbd 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cbe 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cbf 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cc0 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cc1 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cc2 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cc3 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cc4 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3cc5 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3cc6 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3cc7 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3cc8 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3cc9 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3b0c 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b0d 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b0e 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b0f 05-20 18:21:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b10 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b11 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b12 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b13 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3b14 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b15 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3b16 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b17 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b18 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3b19 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3b1a 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3b1b 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9b80 gate 1589998883365711100 evaluation starts +peer1.org2.example.com | [3b1c 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9b80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b1d 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9b80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3b1e 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3b1f 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9b80 principal evaluation fails +peer1.org2.example.com | [3b20 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c9b80 gate 1589998883365711100 evaluation fails +peer1.org2.example.com | [3b21 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b22 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b23 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3b24 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039de0f0 gate 1589998883371999300 evaluation starts +peer1.org2.example.com | [3b25 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039de0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b26 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039de0f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3b27 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039de0f0 principal matched by identity 0 +peer1.org2.example.com | [3b28 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 b2 ec 03 5c 98 83 21 3e ae a1 60 77 aa 4d ec |X...\..!>..`w.M.| +peer1.org2.example.com | 00000010 a8 2b c8 cd d9 96 cd 1b fc d4 18 5c c4 71 7f 01 |.+.........\.q..| +peer1.org2.example.com | [3b29 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 a1 cb f2 c0 13 0b 6a f9 00 d5 22 |0D. t......j..."| +peer1.org2.example.com | 00000010 dc bf 2d d8 f4 3f f8 8f e1 c1 7f 0d 68 d2 8c e3 |..-..?......h...| +peer1.org2.example.com | 00000020 45 bf be 7c 02 20 55 e1 92 1e bf 5d 1d 69 69 52 |E..|. U....].iiR| +peer1.org2.example.com | 00000030 aa 42 35 c7 c5 bc a4 e0 f1 57 ea 29 ba 2a 48 2e |.B5......W.).*H.| +peer1.org2.example.com | 00000040 b7 f5 bb 7d ee 59 |...}.Y| +peer1.org1.example.com | [3a8c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [3a8d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [3a8e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [3a8f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [3a90 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [3a91 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [3a92 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [3a93 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [3a94 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [3a95 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [3a96 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [3a97 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [3a98 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [3a99 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [3a9a 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [3a9b 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [3a9c 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [3a9d 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [3a9e 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [3a9f 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [3aa0 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [3aa1 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [3aa2 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [3aa3 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [3aa4 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [3aa5 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [3aa6 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [3aa7 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [3aa8 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [3aa9 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [3aaa 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [3aab 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [3aac 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [3aad 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [3aae 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [3aaf 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer1.org1.example.com | [3ab0 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [3ab1 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [3ab2 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [3ab3 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [3ab4 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [3ab5 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [3ab6 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [3ab7 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [3ab8 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [3ab9 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [3aba 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [3abb 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [3abc 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [3abd 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [3abe 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [3abf 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [3ac0 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [3ac1 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [3ac2 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [3ac3 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org1.example.com | [3ac4 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [3ac5 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ac6 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ac7 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3cca 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ab40 gate 1589998884124835800 evaluation starts +peer0.org2.example.com | [3ccb 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ab40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ccc 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ab40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3ccd 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ab40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3cce 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ab40 principal evaluation fails +peer0.org2.example.com | [3ccf 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ab40 gate 1589998884124835800 evaluation fails +peer0.org2.example.com | [3cd0 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3cd1 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3cd2 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3cd3 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b0b0 gate 1589998884125851400 evaluation starts +peer0.org2.example.com | [3cd4 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b0b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3cd5 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b0b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3cd6 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b0b0 principal matched by identity 0 +peer0.org2.example.com | [3cd7 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3cd8 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3cd9 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b0b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3cda 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b0b0 gate 1589998884125851400 evaluation succeeds +peer0.org2.example.com | [3cdb 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3cdc 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3cdd 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3cde 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3cdf 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ce0 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ce1 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ce2 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ce3 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ce4 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ce5 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ce6 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3ce7 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca82b0 gate 1589998884135209100 evaluation starts +peer0.org2.example.com | [3ce8 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca82b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ce9 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca82b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3cea 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca82b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3ceb 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca82b0 principal evaluation fails +peer0.org2.example.com | [3cec 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca82b0 gate 1589998884135209100 evaluation fails +peer0.org2.example.com | [3ced 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b2a 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039de0f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3b2b 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039de0f0 gate 1589998883371999300 evaluation succeeds +peer1.org2.example.com | [3b2c 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b2d 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b2e 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b2f 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b30 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b31 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3b32 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3b33 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b34 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3b35 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b36 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b37 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b38 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b3a 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b39 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b3b 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b3c 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b3d 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b3e 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b3f 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b40 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b41 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b42 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b43 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3b44 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b45 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3b46 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b47 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b48 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b49 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b4a 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b4b 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b4c 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b4d 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b4e 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b4f 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b50 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b51 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b52 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b53 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b54 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b55 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b56 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3b57 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b58 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b59 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3b5a 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3b5b 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3b5c 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb760 gate 1589998883608005200 evaluation starts +peer1.org2.example.com | [3b5d 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb760 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b5e 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb760 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3b5f 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3b60 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb760 principal evaluation fails +peer1.org2.example.com | [3b61 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fb760 gate 1589998883608005200 evaluation fails +peer1.org2.example.com | [3b62 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b63 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b64 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3b65 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcd0 gate 1589998883612669200 evaluation starts +peer1.org2.example.com | [3b66 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b67 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3b68 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcd0 principal matched by identity 0 +peer1.org2.example.com | [3b69 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3b6a 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3b6b 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3b6c 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fbcd0 gate 1589998883612669200 evaluation succeeds +peer1.org2.example.com | [3b6d 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ac8 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ac9 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3aca 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548770 gate 1589998895368636700 evaluation starts +peer1.org1.example.com | [3acb 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548770 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3acc 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548770 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3acd 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3ace 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548770 principal evaluation fails +peer1.org1.example.com | [3acf 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548770 gate 1589998895368636700 evaluation fails +peer1.org1.example.com | [3ad0 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ad1 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ad2 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3ad3 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548ce0 gate 1589998895368975100 evaluation starts +peer1.org1.example.com | [3ad4 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ad5 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548ce0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3ad6 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548ce0 principal matched by identity 0 +peer1.org1.example.com | [3ad7 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [3ad8 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [3ad9 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3ada 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003548ce0 gate 1589998895368975100 evaluation succeeds +peer1.org1.example.com | [3adb 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3adc 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3add 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ade 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3adf 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ae0 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ae1 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ae2 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ae3 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ae4 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ae5 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003549820 gate 1589998895370160300 evaluation starts +peer1.org1.example.com | [3ae6 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003549820 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ae7 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003549820 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3ae8 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003549820 principal matched by identity 0 +peer1.org1.example.com | [3ae9 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org1.example.com | [3aea 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org1.example.com | [3aeb 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003549820 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3aec 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003549820 gate 1589998895370160300 evaluation succeeds +peer1.org2.example.com | [3b6e 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b6f 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b70 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b71 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b72 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b73 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b74 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b75 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b76 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b77 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3b78 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 e9 73 9f 56 17 b9 e6 d3 0f 25 32 4b 95 c3 f5 |5.s.V.....%2K...| +peer1.org2.example.com | 00000010 8b c3 08 f1 84 c8 e6 e8 c1 7b 18 d9 2c 71 e0 22 |.........{..,q."| +peer1.org2.example.com | [3b79 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 f5 62 e9 51 96 e5 13 e3 12 9b |0E.!...b.Q......| +peer1.org2.example.com | 00000010 03 8b 78 67 11 ef 40 46 cb 24 0b 3f 0d ab d9 72 |..xg..@F.$.?...r| +peer1.org2.example.com | 00000020 49 18 73 b9 3a 02 20 26 95 f9 43 b0 34 6f b1 d3 |I.s.:. &..C.4o..| +peer1.org2.example.com | 00000030 47 25 59 1c e4 17 64 e8 ec 18 2b c9 fb fd de 97 |G%Y...d...+.....| +peer1.org2.example.com | 00000040 1c 28 1e 1d 82 98 4d |.(....M| +peer1.org2.example.com | [3b7a 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b7b 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3b7c 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3b7d 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b7e 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3b7f 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b80 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b81 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b82 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b83 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b84 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b85 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3b86 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b87 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3b88 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b89 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b8a 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b8b 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b8c 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b8d 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b8e 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b8f 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b90 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b91 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b92 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b93 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b94 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b95 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b96 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b97 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b98 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b99 05-20 18:21:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3b9a 05-20 18:21:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161037 +peer1.org2.example.com | [3b9b 05-20 18:21:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AEBAAAF224299942B568895BA26426785113282C686ACD608D567D83B7B31C69 +peer1.org2.example.com | [3b9c 05-20 18:21:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3b9d 05-20 18:21:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3b9e 05-20 18:21:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3b9f 05-20 18:21:23.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3ba0 05-20 18:21:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ba1 05-20 18:21:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ba2 05-20 18:21:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3ba3 05-20 18:21:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ba4 05-20 18:21:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ba5 05-20 18:21:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ba6 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3ba7 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ba8 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ba9 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3baa 05-20 18:21:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3bab 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bac 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bad 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bae 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3baf 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bb0 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3bb1 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bb2 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3bb3 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3bb4 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3bb5 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3bb6 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3bb7 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3bb8 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5ab50 gate 1589998884051871600 evaluation starts +peer1.org2.example.com | [3bb9 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5ab50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3bba 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5ab50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3bbb 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5ab50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3bbc 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5ab50 principal evaluation fails +peer1.org2.example.com | [3bbd 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5ab50 gate 1589998884051871600 evaluation fails +peer1.org2.example.com | [3bbe 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3bbf 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3bc0 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3bc1 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b0c0 gate 1589998884055570400 evaluation starts +peer1.org2.example.com | [3bc2 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b0c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3bc3 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b0c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3bc4 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b0c0 principal matched by identity 0 +peer1.org2.example.com | [3bc5 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c c9 60 43 dd 5d 60 05 b7 fa 4c 05 b5 7a 1d e6 |..`C.]`...L..z..| +peer1.org2.example.com | 00000010 d2 ff 2b 4c f1 74 e3 ea 2a 7d ff dc 7c 99 89 20 |..+L.t..*}..|.. | +peer1.org2.example.com | [3bc6 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 ba 21 21 40 6b b6 b3 76 b1 c6 4b |0D. ..!!@k..v..K| +peer1.org2.example.com | 00000010 50 7b 98 5c 08 c1 1c d5 4a 72 db e8 ba a8 54 62 |P{.\....Jr....Tb| +peer1.org2.example.com | 00000020 4e 37 a1 a6 02 20 24 87 11 1e 3e d7 57 0c 4f 3f |N7... $...>.W.O?| +peer1.org2.example.com | 00000030 2f db 26 c7 38 ef 84 40 bf 5c dc 47 5b 53 fd 3e |/.&.8..@.\.G[S.>| +peer1.org2.example.com | 00000040 4a 69 1a 6d 6f e5 |Ji.mo.| +peer1.org2.example.com | [3bc7 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b0c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3bc8 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b0c0 gate 1589998884055570400 evaluation succeeds +peer1.org2.example.com | [3bc9 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bca 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bcb 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3bcc 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3bcd 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bce 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3bcf 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3bd0 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3cee 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3cef 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3cf0 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8820 gate 1589998884138355000 evaluation starts +peer0.org2.example.com | [3cf1 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8820 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3cf2 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8820 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3cf3 05-20 18:21:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8820 principal matched by identity 0 +peer0.org2.example.com | [3cf4 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3cf5 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3cf6 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8820 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3cf7 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca8820 gate 1589998884138355000 evaluation succeeds +peer0.org2.example.com | [3cf8 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3cf9 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3cfa 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3cfb 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3cfc 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3cfd 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3cfe 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3cff 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3d00 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d01 05-20 18:21:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d02 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d03 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d04 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d05 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d06 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d07 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d08 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d09 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3d0a 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3d0b 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4a50 gate 1589998884155095600 evaluation starts +peer0.org2.example.com | [3d0c 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4a50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d0d 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4a50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3d0e 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3d0f 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4a50 principal evaluation fails +peer0.org2.example.com | [3d10 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4a50 gate 1589998884155095600 evaluation fails +peer0.org2.example.com | [3d11 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d12 05-20 18:21:24.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d13 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d14 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4fc0 gate 1589998884161218900 evaluation starts +peer0.org2.example.com | [3d15 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4fc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d16 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4fc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3d17 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4fc0 principal matched by identity 0 +peer0.org2.example.com | [3d18 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3d19 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3d1a 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4fc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d1b 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc4fc0 gate 1589998884161218900 evaluation succeeds +peer0.org2.example.com | [3d1c 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d1d 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d1e 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d1f 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d20 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d21 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d22 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d23 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d24 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d25 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d26 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3d27 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3d28 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce01c0 gate 1589998884168723400 evaluation starts +peer0.org2.example.com | [3d29 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce01c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d2a 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce01c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3d2b 05-20 18:21:24.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce01c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3d2c 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce01c0 principal evaluation fails +peer0.org2.example.com | [3d2d 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce01c0 gate 1589998884168723400 evaluation fails +peer0.org2.example.com | [3d2e 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3bd1 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3bd2 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bd3 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bd4 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bd5 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd6 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd7 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd8 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd9 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bda 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bdb 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3bdc 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bdd 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bde 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bdf 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3be0 05-20 18:21:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3be1 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be2 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3be3 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be4 05-20 18:21:24.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3be5 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be6 05-20 18:21:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3be7 05-20 18:21:24.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be8 05-20 18:21:24.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be9 05-20 18:21:24.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bea 05-20 18:21:24.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3beb 05-20 18:21:24.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bec 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bed 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bee 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bef 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf0 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bf1 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bf2 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bf3 05-20 18:21:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bf4 05-20 18:21:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3bf5 05-20 18:21:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bf6 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf7 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf8 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3a85 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3a86 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a87 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a88 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a89 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a8a 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a8b 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 gate 1589998881044422600 evaluation starts +peer0.org1.example.com | [3a8c 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a8d 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3a8e 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 principal matched by identity 0 +peer0.org1.example.com | [3a8f 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +peer0.org1.example.com | 00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +peer0.org1.example.com | [3a90 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +peer0.org1.example.com | 00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +peer0.org1.example.com | 00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +peer0.org1.example.com | 00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +peer0.org1.example.com | 00000040 db 73 5e d1 c9 7c bd |.s^..|.| +peer0.org1.example.com | [3a91 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a92 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 gate 1589998881044422600 evaluation succeeds +peer0.org1.example.com | [3a93 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a94 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a95 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a96 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a97 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a98 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a99 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3a9a 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +peer0.org1.example.com | 00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +peer0.org1.example.com | [3a9b 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +peer0.org1.example.com | 00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +peer0.org1.example.com | 00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +peer0.org1.example.com | 00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +peer0.org1.example.com | 00000040 a7 58 d0 cf be 9c |.X....| +peer0.org1.example.com | [3a9c 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a9d 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a9e 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a9f 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3aa0 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3aa1 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3aa2 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3aa3 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa4 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa5 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa6 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa7 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa8 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa9 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3aaa 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3aab 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3aac 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3aad 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3aae 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3aaf 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3ab0 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ab1 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ab2 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ab3 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ab4 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ab5 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ab6 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ab7 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 gate 1589998881218039100 evaluation starts +peer0.org1.example.com | [3ab8 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ab9 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3aba 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 principal matched by identity 0 +peer0.org1.example.com | [3abb 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d9 1e e7 0c 37 ab 5b 5f f1 3d d1 11 4f 4e 43 |D....7.[_.=..ONC| +peer0.org1.example.com | 00000010 ee 0c d8 f5 08 2a 60 c0 32 c2 fa 43 67 59 81 46 |.....*`.2..CgY.F| +peer0.org1.example.com | [3abc 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 92 be a4 7a ce 13 5b 41 e4 0c 8c |0D. ....z..[A...| +peer0.org1.example.com | 00000010 32 70 7b 0e 4b 3d a4 d2 bf dc ed 0d e9 ce 00 0c |2p{.K=..........| +peer0.org1.example.com | 00000020 32 5c a3 ab 02 20 67 34 2a a2 04 06 20 ad 57 a9 |2\... g4*... .W.| +peer0.org1.example.com | 00000030 e5 78 9f d4 46 98 c4 24 47 29 71 69 15 de 5a 9c |.x..F..$G)qi..Z.| +peer0.org1.example.com | 00000040 b0 0e 27 08 eb 69 |..'..i| +peer0.org1.example.com | [3abd 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3abe 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 gate 1589998881218039100 evaluation succeeds +peer0.org1.example.com | [3abf 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d2f 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d30 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d31 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0730 gate 1589998884171211000 evaluation starts +peer0.org2.example.com | [3d32 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d33 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0730 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3d34 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0730 principal matched by identity 0 +peer0.org2.example.com | [3d35 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3d36 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3d37 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0730 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d38 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0730 gate 1589998884171211000 evaluation succeeds +peer0.org2.example.com | [3d39 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d3a 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d3b 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d3c 05-20 18:21:24.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d3d 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3d3e 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3d3f 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3d40 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3d41 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d42 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d43 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3d44 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3d45 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d46 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d47 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d48 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d49 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d4a 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d4b 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3d4c 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3d4d 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00fa0 gate 1589998884185661500 evaluation starts +peer0.org2.example.com | [3d4e 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d4f 05-20 18:21:24.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00fa0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3d50 05-20 18:21:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3d51 05-20 18:21:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00fa0 principal evaluation fails +peer0.org2.example.com | [3d52 05-20 18:21:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00fa0 gate 1589998884185661500 evaluation fails +peer0.org2.example.com | [3d53 05-20 18:21:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d54 05-20 18:21:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d55 05-20 18:21:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d56 05-20 18:21:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01510 gate 1589998884195517100 evaluation starts +peer0.org2.example.com | [3d57 05-20 18:21:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d58 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01510 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3d59 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01510 principal matched by identity 0 +peer0.org2.example.com | [3d5a 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3d5b 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3d5c 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d5d 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01510 gate 1589998884195517100 evaluation succeeds +peer0.org2.example.com | [3d5e 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d5f 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d60 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d61 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d62 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3d63 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3d64 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d65 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d66 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d67 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d68 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d69 05-20 18:21:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3bf9 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bfa 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bfb 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bfc 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bfd 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bfe 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bff 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c00 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c01 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c02 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c03 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c04 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c05 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c07 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c06 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c08 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c09 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c0a 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79a50 gate 1589998884422801400 evaluation starts +peer1.org2.example.com | [3c0b 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79a50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c0c 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79a50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c0d 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c0e 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79a50 principal evaluation fails +peer1.org2.example.com | [3c0f 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79a50 gate 1589998884422801400 evaluation fails +peer1.org2.example.com | [3c10 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c11 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c12 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c13 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79fc0 gate 1589998884423799200 evaluation starts +peer1.org2.example.com | [3c14 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c15 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79fc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c16 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79fc0 principal matched by identity 0 +peer1.org2.example.com | [3c17 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3c18 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [3c19 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79fc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c1a 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a79fc0 gate 1589998884423799200 evaluation succeeds +peer1.org2.example.com | [3c1b 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c1c 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c1d 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c1e 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c1f 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c20 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c21 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c22 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c23 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c24 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d6a 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3d6b 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3d6c 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1ae00 gate 1589998884211068500 evaluation starts +peer0.org2.example.com | [3d6d 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1ae00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d6e 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1ae00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3d6f 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1ae00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3d70 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1ae00 principal evaluation fails +peer0.org2.example.com | [3d71 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1ae00 gate 1589998884211068500 evaluation fails +peer0.org2.example.com | [3d72 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d73 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d74 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d75 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1b370 gate 1589998884214069100 evaluation starts +peer0.org2.example.com | [3d76 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1b370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d77 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1b370 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3d78 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1b370 principal matched by identity 0 +peer0.org2.example.com | [3d79 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3d7a 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3d7b 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1b370 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d7c 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d1b370 gate 1589998884214069100 evaluation succeeds +peer0.org2.example.com | [3d7d 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d7e 05-20 18:21:24.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d7f 05-20 18:21:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d80 05-20 18:21:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d81 05-20 18:21:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d82 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d83 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d84 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3d85 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d86 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d87 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3d88 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d89 05-20 18:21:24.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d8a 05-20 18:21:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d8b 05-20 18:21:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d8c 05-20 18:21:24.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d8d 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d8e 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d8f 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d90 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d91 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d92 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d93 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d94 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d95 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d96 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d97 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d98 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d99 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [3d9a 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d9b 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d9c 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d9d 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d9e 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3d9f 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3da0 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3da1 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3da2 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3da3 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3da4 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3da5 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3da6 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a470 gate 1589998884660922800 evaluation starts +peer0.org2.example.com | [3da7 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a470 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3da8 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a470 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3da9 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3daa 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a470 principal evaluation fails +peer0.org2.example.com | [3dab 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a470 gate 1589998884660922800 evaluation fails +peer0.org2.example.com | [3dac 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3dad 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3dae 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3daf 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a9e0 gate 1589998884662371300 evaluation starts +peer0.org2.example.com | [3db0 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a9e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3db1 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a9e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3db2 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a9e0 principal matched by identity 0 +peer0.org2.example.com | [3db3 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer0.org2.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer0.org2.example.com | [3db4 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer1.org2.example.com | [3c25 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c26 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c27 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad1c0 gate 1589998884428041100 evaluation starts +peer1.org2.example.com | [3c28 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c29 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad1c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c2a 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c2b 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad1c0 principal evaluation fails +peer1.org2.example.com | [3c2c 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad1c0 gate 1589998884428041100 evaluation fails +peer1.org2.example.com | [3c2d 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c2e 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c2f 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c30 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad730 gate 1589998884430024300 evaluation starts +peer1.org2.example.com | [3c31 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad730 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c32 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad730 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c33 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad730 principal matched by identity 0 +peer1.org2.example.com | [3c34 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3c35 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3c36 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad730 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c37 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aad730 gate 1589998884430024300 evaluation succeeds +peer1.org2.example.com | [3c38 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c39 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c3a 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c3b 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c3c 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [3c3d 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | [3ac0 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ac1 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3ac2 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3ac3 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [3c3e 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3c3f 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [3c40 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c41 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c42 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c43 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c44 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c45 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c46 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c47 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c48 05-20 18:21:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c49 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c4a 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c4b 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5960 gate 1589998884440277200 evaluation starts +peer1.org2.example.com | [3c4c 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c4d 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5960 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c4e 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c4f 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5960 principal evaluation fails +peer1.org2.example.com | [3c50 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5960 gate 1589998884440277200 evaluation fails +peer1.org2.example.com | [3c51 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c52 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c53 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c54 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5ed0 gate 1589998884440974800 evaluation starts +peer1.org2.example.com | [3c55 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c56 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5ed0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c57 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5ed0 principal matched by identity 0 +peer1.org2.example.com | [3c58 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3c59 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3c5a 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5ed0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c5b 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac5ed0 gate 1589998884440974800 evaluation succeeds +peer1.org2.example.com | [3c5c 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c5d 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c5e 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c5f 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c60 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c61 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c62 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c63 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c64 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c65 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c66 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ac4 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3ac5 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3ac6 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3ac7 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3ac8 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ac9 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3aca 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3acb 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3acc 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3acd 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ace 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3acf 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3ad0 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3ad1 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ad2 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ad3 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37166 +peer0.org1.example.com | [3ad4 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003b86ff0 +peer0.org1.example.com | [3ad5 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3ad6 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3ad7 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3ad8 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3ad9 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3ada 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b ae e8 50 99 c2 fc 87 3a e8 fd f0 af dd 41 ac |...P....:.....A.| +peer0.org1.example.com | 00000010 22 51 34 54 6c f5 e5 a2 74 1d fc 07 1a 04 a3 89 |"Q4Tl...t.......| +peer0.org1.example.com | [3adb 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 a3 b5 c3 87 41 81 53 9b b4 a2 ca |0D. b....A.S....| +peer0.org1.example.com | 00000010 c4 f2 b7 66 7c 94 4a c2 18 2d a5 b9 79 fc 30 e5 |...f|.J..-..y.0.| +peer1.org2.example.com | [3c67 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c68 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae50d0 gate 1589998884443042700 evaluation starts +peer1.org2.example.com | [3c69 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae50d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c6a 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae50d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c6b 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae50d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c6c 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae50d0 principal evaluation fails +peer1.org2.example.com | [3c6d 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae50d0 gate 1589998884443042700 evaluation fails +peer1.org2.example.com | [3c6e 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c6f 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c70 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c71 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae5640 gate 1589998884443938800 evaluation starts +peer1.org2.example.com | [3c72 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae5640 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c73 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae5640 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c74 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae5640 principal matched by identity 0 +peer1.org2.example.com | [3c75 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3c76 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [3c77 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae5640 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c78 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae5640 gate 1589998884443938800 evaluation succeeds +peer1.org2.example.com | [3c79 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c7a 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c7b 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c7c 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c7d 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3c7e 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [3c7f 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [3c80 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [3c81 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c82 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c83 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3c84 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [3c85 05-20 18:21:24.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c86 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c87 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c88 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c89 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c8a 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c8b 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c8c 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c8d 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b03eb0 gate 1589998884453764900 evaluation starts +peer1.org2.example.com | [3c8e 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b03eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c8f 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b03eb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c90 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b03eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c91 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b03eb0 principal evaluation fails +peer1.org2.example.com | [3c92 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b03eb0 gate 1589998884453764900 evaluation fails +peer1.org2.example.com | [3c93 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c94 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c95 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c96 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b20420 gate 1589998884455219300 evaluation starts +peer1.org2.example.com | [3c97 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b20420 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c98 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b20420 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3c99 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b20420 principal matched by identity 0 +peer1.org2.example.com | [3c9a 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3c9b 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [3c9c 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b20420 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c9d 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b20420 gate 1589998884455219300 evaluation succeeds +peer1.org2.example.com | [3c9e 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c9f 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ca0 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ca1 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ca2 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ca3 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ca4 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ca5 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ca6 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ca7 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ca8 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ca9 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3caa 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21620 gate 1589998884459525200 evaluation starts +peer1.org2.example.com | [3cab 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cac 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21620 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3cad 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3cae 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21620 principal evaluation fails +peer1.org2.example.com | [3caf 05-20 18:21:24.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21620 gate 1589998884459525200 evaluation fails +peer1.org2.example.com | [3cb0 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 d1 5c e9 20 02 20 22 d0 38 4a a6 33 4c c4 5f 30 |.\. . ".8J.3L._0| +peer0.org1.example.com | 00000030 99 77 0c 05 25 4a 09 6a d6 5d 21 ea 97 02 28 b0 |.w..%J.j.]!...(.| +peer0.org1.example.com | 00000040 e6 9e 6c 39 12 08 |..l9..| +peer0.org1.example.com | [3adc 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3add 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003b905b0, header 0xc003b87400 +peer0.org1.example.com | [3ade 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [3adf 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] processing txid: f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1 +peer0.org1.example.com | [3ae0 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1] +peer0.org1.example.com | [3ae1 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3ae2 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1] +peer0.org1.example.com | [3ae3 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3ae4 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f7d98548] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3ae5 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3ae6 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData +peer0.org1.example.com | [3ae7 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3ae8 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer0.org2.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer0.org2.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer0.org2.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer0.org2.example.com | [3db5 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a9e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3db6 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5a9e0 gate 1589998884662371300 evaluation succeeds +peer0.org2.example.com | [3db7 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3aed 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3aee 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3aef 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3af0 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3af1 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3af2 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3af3 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3af4 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3af5 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3af6 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3af7 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 gate 1589998895370970900 evaluation starts +peer1.org1.example.com | [3af8 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3af9 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3afa 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 principal matched by identity 0 +peer1.org1.example.com | [3afb 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3afc 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3afd 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3afe 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 gate 1589998895370970900 evaluation succeeds +peer1.org1.example.com | [3aff 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b00 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b01 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b02 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b03 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org1.example.com | [3b04 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [3b05 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [3b06 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b07 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [3b09 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [3b08 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [3b0b 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cb1 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cb2 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3cb3 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21b90 gate 1589998884460418500 evaluation starts +peer1.org2.example.com | [3cb4 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21b90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cb5 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21b90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3db8 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3db9 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3dba 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3dbb 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3dbc 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3dbd 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3dbe 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3dbf 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3dc0 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dc1 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dc2 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dc3 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3dc4 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dc5 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dc6 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dc7 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3dc8 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > alive: +peer0.org2.example.com | [3dc9 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dca 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dcb 05-20 18:21:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3dcc 05-20 18:21:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3dcd 05-20 18:21:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3dce 05-20 18:21:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3dcf 05-20 18:21:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3dd0 05-20 18:21:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3dd1 05-20 18:21:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd2 05-20 18:21:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dd3 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd4 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dd5 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd6 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dd7 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd8 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd9 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dda 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ddb 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ddc 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ddd 05-20 18:21:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dde 05-20 18:21:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ddf 05-20 18:21:24.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cb6 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21b90 principal matched by identity 0 +peer1.org2.example.com | [3cb7 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3cb8 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3cb9 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21b90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3cba 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b21b90 gate 1589998884460418500 evaluation succeeds +peer1.org2.example.com | [3cbb 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cbc 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cbd 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3cbe 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3cbf 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [3cc0 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [3cc1 05-20 18:21:24.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cc2 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cc3 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cc4 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cc5 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cc6 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cc7 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cc8 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cc9 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cca 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3ccb 05-20 18:21:24.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ccc 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ccd 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cce 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ccf 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3cd0 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ae9 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3aea 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3aeb 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 gate 1589998881301621700 evaluation starts +peer0.org1.example.com | [3aec 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3aed 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3aee 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3aef 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 principal evaluation fails +peer0.org1.example.com | [3af0 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 gate 1589998881301621700 evaluation fails +peer0.org1.example.com | [3af1 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3af2 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3af3 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3af4 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 gate 1589998881302383800 evaluation starts +peer0.org1.example.com | [3af5 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3af6 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3af7 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 principal matched by identity 0 +peer0.org1.example.com | [3af8 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b ae e8 50 99 c2 fc 87 3a e8 fd f0 af dd 41 ac |...P....:.....A.| +peer0.org1.example.com | 00000010 22 51 34 54 6c f5 e5 a2 74 1d fc 07 1a 04 a3 89 |"Q4Tl...t.......| +peer0.org1.example.com | [3af9 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 a3 b5 c3 87 41 81 53 9b b4 a2 ca |0D. b....A.S....| +peer0.org1.example.com | 00000010 c4 f2 b7 66 7c 94 4a c2 18 2d a5 b9 79 fc 30 e5 |...f|.J..-..y.0.| +peer0.org1.example.com | 00000020 d1 5c e9 20 02 20 22 d0 38 4a a6 33 4c c4 5f 30 |.\. . ".8J.3L._0| +peer0.org1.example.com | 00000030 99 77 0c 05 25 4a 09 6a d6 5d 21 ea 97 02 28 b0 |.w..%J.j.]!...(.| +peer0.org1.example.com | 00000040 e6 9e 6c 39 12 08 |..l9..| +peer0.org1.example.com | [3afa 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3afb 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 gate 1589998881302383800 evaluation succeeds +peer0.org1.example.com | [3afc 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3afd 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3afe 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3aff 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3b00 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [3b01 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] handling GET_STATE from chaincode +peer0.org1.example.com | [3b02 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [3b03 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3b04 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [3b05 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3b06 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] notifying Txid:f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1, channelID:businesschannel +peer0.org1.example.com | [3b07 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3b08 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f7d98548] Exit chaincode: name:"lscc" (6ms) +peer0.org1.example.com | [3b09 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [3b0a 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1] +peer0.org1.example.com | [3b0b 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] Exit +peer0.org1.example.com | [3b0c 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3b0d 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [3b0e 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1, chaincode: lscc} +peer0.org1.example.com | [3b0f 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F6095DC6194EDA83E337248F8590...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3b10 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3D1A9FA47970F510A2F236A3FCACD615A24DCD722E586640FDA3AEFA6C7B0E6E +peer1.org2.example.com | [3cd1 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3cd2 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cd3 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cd4 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3cd5 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3cd6 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3cd7 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b503a0 gate 1589998884647962400 evaluation starts +peer1.org2.example.com | [3cd8 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b503a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cd9 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b503a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3cda 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b503a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3cdb 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b503a0 principal evaluation fails +peer1.org2.example.com | [3cdc 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b503a0 gate 1589998884647962400 evaluation fails +peer1.org2.example.com | [3cdd 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cde 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cdf 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ce0 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50910 gate 1589998884652552700 evaluation starts +peer1.org2.example.com | [3ce1 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ce2 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50910 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ce3 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50910 principal matched by identity 0 +peer1.org2.example.com | [3ce4 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer1.org2.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer1.org2.example.com | [3ce5 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer1.org2.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer1.org2.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer1.org2.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer1.org2.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer1.org2.example.com | [3ce6 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50910 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ce7 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50910 gate 1589998884652552700 evaluation succeeds +peer1.org2.example.com | [3ce8 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ce9 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cea 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ceb 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3cec 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ced 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3cee 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3cef 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3cf0 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3cf1 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cf2 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cf3 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cf4 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3cf5 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cf6 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cf7 05-20 18:21:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cf8 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b11 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1, chaincode: lscc} +peer0.org1.example.com | [3b12 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] Exit +peer0.org1.example.com | [3b13 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1] +peer0.org1.example.com | [3b14 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37166 +peer0.org1.example.com | [3b15 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37166 grpc.code=OK grpc.call_duration=9.4049ms +peer0.org1.example.com | [3b16 05-20 18:21:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3b17 05-20 18:21:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3b18 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37170 +peer0.org1.example.com | [3b19 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003d46230 +peer0.org1.example.com | [3b1a 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3b1b 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3b1c 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3b1d 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3b1e 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3b1f 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 0b 4b d7 b9 c7 57 c9 dc 83 02 70 33 97 65 a1 |..K...W....p3.e.| +peer0.org1.example.com | 00000010 88 5a 7e 3c 31 1e a1 d6 72 29 f0 73 33 79 61 3b |.Z~<1...r).s3ya;| +peer0.org1.example.com | [3b20 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 48 c6 16 54 f9 64 f4 62 8f 61 |0E.!..H..T.d.b.a| +peer0.org1.example.com | 00000010 7e 23 ab 4f a1 41 79 cb d0 ec 83 a3 ac ca 53 e6 |~#.O.Ay.......S.| +peer0.org1.example.com | 00000020 57 91 ef 6d 27 02 20 11 44 1b cb 19 63 13 f9 75 |W..m'. .D...c..u| +peer0.org1.example.com | 00000030 63 bb cb 42 f7 c5 2d de 0b ed 40 40 eb 84 61 6e |c..B..-...@@..an| +peer0.org1.example.com | 00000040 d3 15 52 1f c6 8b eb |..R....| +peer0.org1.example.com | [3b21 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3b22 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad11f0, header 0xc003d46640 +peer0.org1.example.com | [3b23 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [3b24 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] processing txid: cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af +peer0.org1.example.com | [3b25 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af] +peer0.org1.example.com | [3b26 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3b27 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af] +peer0.org1.example.com | [3b28 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3b29 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cafd5ae5] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3b2a 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3b2b 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 0b 4b d7 b9 c7 57 c9 dc 83 02 70 33 97 65 a1 |..K...W....p3.e.| +peer0.org1.example.com | 00000010 88 5a 7e 3c 31 1e a1 d6 72 29 f0 73 33 79 61 3b |.Z~<1...r).s3ya;| +peer0.org1.example.com | [3b2c 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 48 c6 16 54 f9 64 f4 62 8f 61 |0E.!..H..T.d.b.a| +peer0.org1.example.com | 00000010 7e 23 ab 4f a1 41 79 cb d0 ec 83 a3 ac ca 53 e6 |~#.O.Ay.......S.| +peer0.org1.example.com | 00000020 57 91 ef 6d 27 02 20 11 44 1b cb 19 63 13 f9 75 |W..m'. .D...c..u| +peer0.org1.example.com | 00000030 63 bb cb 42 f7 c5 2d de 0b ed 40 40 eb 84 61 6e |c..B..-...@@..an| +peer0.org1.example.com | 00000040 d3 15 52 1f c6 8b eb |..R....| +peer0.org1.example.com | [3b2d 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [cafd5ae5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3b2e 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [cafd5ae5] notifying Txid:cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af, channelID:businesschannel +peer0.org1.example.com | [3b2f 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3b30 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cafd5ae5] Exit chaincode: name:"lscc" (2ms) +peer0.org1.example.com | [3b31 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [3b32 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af] +peer0.org2.example.com | [3de0 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de1 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de2 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de3 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de4 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de5 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de6 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de7 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de8 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3de9 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dea 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3deb 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161036 +peer0.org2.example.com | [3dec 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0664B31516BC3A6101A0525AFF281E4A677AAF8EAB87986F1537F1BC2FCFDA6D +peer0.org2.example.com | [3ded 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3dee 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3def 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3df0 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3df1 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3df2 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3df3 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b0a 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [3b0d 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [3b0c 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org1.example.com | [3b0e 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [3b0f 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [3b11 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b10 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [3b13 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00359a9b0, CONNECTING +peer1.org2.example.com | [3cf9 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cfa 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cfb 05-20 18:21:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > alive: +peer1.org2.example.com | [3cfc 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cfd 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cfe 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cff 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3d00 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d01 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d02 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d03 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d04 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d05 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d06 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d07 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d08 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d09 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3d0a 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d0b 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d0c 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d0d 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d0e 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d0f 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3d10 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer1.org2.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer1.org2.example.com | [3d11 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer1.org2.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer1.org2.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer1.org2.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer1.org2.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer1.org2.example.com | [3d12 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3d13 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 ee 3d 59 ac 45 52 a4 18 de 3d 2c |0D. .=Y.ER...=,| +peer1.org2.example.com | 00000010 e2 39 5f b4 87 ad 4e db 11 20 40 27 c0 29 ad 09 |.9_...N.. @'.)..| +peer1.org2.example.com | 00000020 0b 98 28 4a 02 20 70 e0 50 88 2c 9c 7f 57 e4 6e |..(J. p.P.,..W.n| +peer1.org2.example.com | 00000030 f5 54 6c df c3 74 17 42 fc 4d ec b8 30 47 68 31 |.Tl..t.B.M..0Gh1| +peer1.org2.example.com | 00000040 46 15 60 8d 6a 54 |F.`.jT| +peer1.org2.example.com | [3d14 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3d15 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [3d16 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3d17 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3d18 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3d19 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d1a 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d1b 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d1c 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3d1d 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d1e 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d1f 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d20 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" secret_envelope: > alive: +peer1.org2.example.com | [3d21 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d22 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d23 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d24 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d25 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3d26 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d27 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d28 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d29 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d2a 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d2b 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d2c 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d2d 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d2e 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b12 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b14 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b15 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b16 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [3b17 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [3b18 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [3b19 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [3b1a 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [3b1b 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035fc5d0, CONNECTING +peer1.org1.example.com | [3b1c 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00359a9b0, READY +peer1.org1.example.com | [3b1d 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [3b1e 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [3b1f 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org1.example.com | [3b20 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [3b21 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [3b22 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [3b23 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [3b24 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 176ms +peer1.org1.example.com | [3b25 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00333d500 env 0xc00031a0f0 txn 0 +peer1.org1.example.com | [3b26 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [3b27 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [3b28 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [3b29 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer1.org1.example.com | [3b2a 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [3b2b 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [3b2c 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [3b2d 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer1.org1.example.com | [3b2e 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [3b2f 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [3b30 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [3b31 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [3b32 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [3b33 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [3b34 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [3b33 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] Exit +peer0.org1.example.com | [3b34 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3b35 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [3b36 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af, chaincode: lscc} +peer0.org1.example.com | [3b37 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A201B7EEF268A1A8B6478AD98EB6BB8...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3b38 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 28F011693BC3988D020CFE5AB7F1556141293652C81402789FA922528BD431D0 +peer0.org1.example.com | [3b39 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af, chaincode: lscc} +peer0.org1.example.com | [3b3a 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] Exit +peer0.org1.example.com | [3b3b 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af] +peer0.org1.example.com | [3b3c 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37170 +peer0.org1.example.com | [3b3d 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37170 grpc.code=OK grpc.call_duration=4.4884ms +peer0.org1.example.com | [3b3e 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3b3f 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3df4 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3df5 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3df6 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3df7 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3df8 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3df9 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dfb 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dfc 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dfd 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3dfe 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer0.org2.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer0.org2.example.com | [3dff 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer0.org2.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer0.org2.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer0.org2.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer0.org2.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer0.org2.example.com | [3dfa 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e00 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e01 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3e02 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 ee 3d 59 ac 45 52 a4 18 de 3d 2c |0D. .=Y.ER...=,| +peer0.org2.example.com | 00000010 e2 39 5f b4 87 ad 4e db 11 20 40 27 c0 29 ad 09 |.9_...N.. @'.)..| +peer0.org2.example.com | 00000020 0b 98 28 4a 02 20 70 e0 50 88 2c 9c 7f 57 e4 6e |..(J. p.P.,..W.n| +peer0.org2.example.com | 00000030 f5 54 6c df c3 74 17 42 fc 4d ec b8 30 47 68 31 |.Tl..t.B.M..0Gh1| +peer0.org2.example.com | 00000040 46 15 60 8d 6a 54 |F.`.jT| +peer0.org2.example.com | [3e03 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3e04 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3e05 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e06 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e07 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e08 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e09 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e0a 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3e0b 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer0.org2.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer0.org2.example.com | [3e0c 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer0.org2.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer0.org2.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer0.org2.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer0.org2.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer0.org2.example.com | [3e0d 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d2f 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d30 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d31 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d32 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3d33 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d34 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3d35 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d36 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d37 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3d38 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3d39 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3d3a 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bae4b0 gate 1589998885034299000 evaluation starts +peer1.org2.example.com | [3d3b 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bae4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d3c 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bae4b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3d3d 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bae4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3d3e 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bae4b0 principal evaluation fails +peer1.org2.example.com | [3d3f 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bae4b0 gate 1589998885034299000 evaluation fails +peer1.org2.example.com | [3d40 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3d41 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3d42 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3d43 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baea20 gate 1589998885038616000 evaluation starts +peer1.org2.example.com | [3d44 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baea20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d45 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baea20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3d46 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baea20 principal matched by identity 0 +peer1.org2.example.com | [3d47 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer1.org2.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer0.org2.example.com | [3e0e 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e0f 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e10 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e11 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e12 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e13 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e14 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3e15 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e16 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e17 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e18 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e19 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e1a 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e1b 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3e1c 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4220 gate 1589998884940497400 evaluation starts +peer0.org2.example.com | [3e1d 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e1e 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4220 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3e1f 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3e20 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4220 principal evaluation fails +peer0.org2.example.com | [3e21 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4220 gate 1589998884940497400 evaluation fails +peer0.org2.example.com | [3e22 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e23 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e24 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e25 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4790 gate 1589998884941395600 evaluation starts +peer0.org2.example.com | [3e26 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4790 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e27 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4790 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3e28 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4790 principal matched by identity 0 +peer0.org2.example.com | [3e29 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer0.org2.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer0.org2.example.com | [3e2a 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer0.org2.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer0.org2.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer0.org2.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer0.org2.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer0.org2.example.com | [3e2b 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4790 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e2c 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4790 gate 1589998884941395600 evaluation succeeds +peer0.org2.example.com | [3e2d 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e2e 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e2f 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e30 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e31 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3e32 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e33 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3e34 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer0.org2.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer0.org2.example.com | [3e35 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer0.org2.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer0.org2.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer0.org2.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer0.org2.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer0.org2.example.com | [3e36 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e37 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e38 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e39 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e3a 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e3b 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e3c 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3e3d 05-20 18:21:24.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e3e 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e3f 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e40 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e41 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3e42 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e43 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e44 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e45 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e46 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e47 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e48 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3e49 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de0ad0 gate 1589998885042286100 evaluation starts +peer0.org2.example.com | [3e4a 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de0ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e4b 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de0ad0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3e4c 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de0ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3e4d 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de0ad0 principal evaluation fails +peer0.org2.example.com | [3e4e 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de0ad0 gate 1589998885042286100 evaluation fails +peer0.org2.example.com | [3e4f 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e50 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e51 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e52 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1040 gate 1589998885051942400 evaluation starts +peer0.org2.example.com | [3e53 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e54 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1040 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3e55 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1040 principal matched by identity 0 +peer0.org2.example.com | [3e56 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer0.org2.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer0.org2.example.com | [3e57 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer0.org2.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer0.org2.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer0.org2.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer0.org2.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer0.org2.example.com | [3e58 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1040 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e59 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1040 gate 1589998885051942400 evaluation succeeds +peer0.org2.example.com | [3e5a 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e5b 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e5c 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e5d 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e5e 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d48 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer1.org2.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer1.org2.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer1.org2.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer1.org2.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer1.org2.example.com | [3d49 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baea20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3d4a 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baea20 gate 1589998885038616000 evaluation succeeds +peer1.org2.example.com | [3d4b 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d4c 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d4d 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3d4e 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3d4f 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d50 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3d51 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3d52 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3d53 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3d54 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d55 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d56 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d57 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3d58 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d59 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d5a 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d5b 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d5c 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > alive:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > alive: +peer1.org2.example.com | [3d5d 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d5e 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d5f 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3d60 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d61 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3d62 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d63 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3d64 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d65 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d66 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d67 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d68 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d69 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d6a 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d6b 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d6c 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d6d 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d6e 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d6f 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d70 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d71 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d72 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d73 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d74 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d75 05-20 18:21:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3d76 05-20 18:21:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161038 +peer1.org2.example.com | [3d77 05-20 18:21:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8D17CA1CE9946304EEB0290D30678D011D4B42727C6F369B9786EB47D98EF02D +peer1.org2.example.com | [3d78 05-20 18:21:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3d79 05-20 18:21:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3d7a 05-20 18:21:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3d7b 05-20 18:21:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d7c 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d7d 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:B" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d7e 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d7f 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d81 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d82 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:B" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d83 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d80 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b40 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37174 +peer0.org1.example.com | [3b41 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003d479a0 +peer0.org1.example.com | [3b42 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3b43 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3b44 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3b45 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3b46 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3b47 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 74 17 12 d3 2e 43 68 00 d6 01 ea 55 80 3a 05 |.t....Ch....U.:.| +peer0.org1.example.com | 00000010 ac 48 bd 15 b3 54 35 57 05 2a e4 42 cd 40 f0 bf |.H...T5W.*.B.@..| +peer0.org1.example.com | [3b48 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 41 51 34 c2 98 3a d7 28 19 57 b0 |0D. 7AQ4..:.(.W.| +peer0.org1.example.com | 00000010 7f 7a 61 0a c6 40 87 a7 f0 7c 5c dc 59 5c b9 5c |.za..@...|\.Y\.\| +peer0.org1.example.com | 00000020 19 2a 25 d3 02 20 13 b5 3d 98 9b f6 85 dc 55 52 |.*%.. ..=.....UR| +peer0.org1.example.com | 00000030 7f 68 c0 52 80 a7 5d 1c ac b0 60 e9 ba a3 9b af |.h.R..]...`.....| +peer0.org1.example.com | 00000040 53 b1 ab ee 3b c8 |S...;.| +peer0.org1.example.com | [3b49 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3b4a 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad16c0, header 0xc003d47db0 +peer0.org1.example.com | [3b4b 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [3b4c 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] processing txid: 1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647 +peer0.org1.example.com | [3b4d 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647] +peer0.org1.example.com | [3b4e 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3b4f 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647] +peer0.org1.example.com | [3b50 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3b51 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1625e6d9] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3b52 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3b53 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes +peer0.org1.example.com | [3b54 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3b55 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3b56 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3b57 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3b58 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 gate 1589998881719267700 evaluation starts +peer0.org1.example.com | [3b59 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3b5a 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3b5b 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3b5c 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 principal evaluation fails +peer0.org1.example.com | [3b5d 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 gate 1589998881719267700 evaluation fails +peer0.org1.example.com | [3b5e 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b5f 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b60 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3b61 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 gate 1589998881719718200 evaluation starts +peer0.org1.example.com | [3b62 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3b63 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3b64 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 principal matched by identity 0 +peer0.org1.example.com | [3b65 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 74 17 12 d3 2e 43 68 00 d6 01 ea 55 80 3a 05 |.t....Ch....U.:.| +peer0.org1.example.com | 00000010 ac 48 bd 15 b3 54 35 57 05 2a e4 42 cd 40 f0 bf |.H...T5W.*.B.@..| +peer0.org1.example.com | [3b66 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 41 51 34 c2 98 3a d7 28 19 57 b0 |0D. 7AQ4..:.(.W.| +peer0.org1.example.com | 00000010 7f 7a 61 0a c6 40 87 a7 f0 7c 5c dc 59 5c b9 5c |.za..@...|\.Y\.\| +peer0.org1.example.com | 00000020 19 2a 25 d3 02 20 13 b5 3d 98 9b f6 85 dc 55 52 |.*%.. ..=.....UR| +peer0.org1.example.com | 00000030 7f 68 c0 52 80 a7 5d 1c ac b0 60 e9 ba a3 9b af |.h.R..]...`.....| +peer0.org1.example.com | 00000040 53 b1 ab ee 3b c8 |S...;.| +peer0.org1.example.com | [3b67 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3b68 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 gate 1589998881719718200 evaluation succeeds +peer0.org1.example.com | [3b69 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3b6a 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3b6b 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3b6c 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3b6d 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +peer0.org1.example.com | [3b6e 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] handling GET_STATE_BY_RANGE from chaincode +peer0.org1.example.com | [3b6f 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +peer0.org1.example.com | [3b70 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding a result +peer0.org2.example.com | [3e5f 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3e60 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e61 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3e62 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3e63 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e64 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e65 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3e66 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e67 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e68 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e69 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e6a 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3e6b 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e6c 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d84 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d85 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d86 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d87 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d88 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d89 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3d8a 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d8b 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d8c 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d8d 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3d8e 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d8f 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d90 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3d91 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3d92 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3d93 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9060 gate 1589998885226423700 evaluation starts +peer1.org2.example.com | [3d94 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9060 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d95 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9060 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3d96 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3d97 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9060 principal evaluation fails +peer1.org2.example.com | [3d98 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be9060 gate 1589998885226423700 evaluation fails +peer1.org2.example.com | [3d99 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3d9a 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3d9b 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3d9c 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be95d0 gate 1589998885227721200 evaluation starts +peer1.org2.example.com | [3d9d 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be95d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d9e 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be95d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3d9f 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be95d0 principal matched by identity 0 +peer1.org2.example.com | [3da0 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer1.org2.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer1.org2.example.com | [3da1 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer1.org2.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer1.org2.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer1.org2.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer1.org2.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer1.org2.example.com | [3da2 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be95d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3da3 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be95d0 gate 1589998885227721200 evaluation succeeds +peer1.org2.example.com | [3da4 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3da5 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3da6 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3da7 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3da8 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3da9 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3daa 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3dab 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer1.org2.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer1.org2.example.com | [3dac 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer1.org2.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer1.org2.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer1.org2.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer1.org2.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer1.org2.example.com | [3dad 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3dae 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3daf 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3db0 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 17 ca 1c e9 94 63 04 ee b0 29 0d 30 67 8d 01 |......c...).0g..| +peer1.org2.example.com | 00000010 1d 4b 42 72 7c 6f 36 9b 97 86 eb 47 d9 8e f0 2d |.KBr|o6....G...-| +peer1.org2.example.com | [3db1 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8e dd 23 fa 21 3c f0 19 20 e2 |0E.!....#.!<.. .| +peer1.org2.example.com | 00000010 b5 34 85 9e a9 24 67 bb 0c b5 51 ba 8d d2 c0 46 |.4...$g...Q....F| +peer1.org2.example.com | 00000020 25 5d fc 57 58 02 20 65 dd ea c7 45 18 d0 0a b3 |%].WX. e...E....| +peer1.org2.example.com | 00000030 3d 15 ce bc 17 04 6f ff 99 5b 87 e8 95 9f 51 61 |=.....o..[....Qa| +peer1.org2.example.com | 00000040 f5 4c ff 9c 63 33 48 |.L..c3H| +peer1.org2.example.com | [3db2 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3db3 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3db4 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3db5 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3db6 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3db7 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3db8 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 17 ca 1c e9 94 63 04 ee b0 29 0d 30 67 8d 01 |......c...).0g..| +peer1.org2.example.com | 00000010 1d 4b 42 72 7c 6f 36 9b 97 86 eb 47 d9 8e f0 2d |.KBr|o6....G...-| +peer1.org2.example.com | [3db9 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8e dd 23 fa 21 3c f0 19 20 e2 |0E.!....#.!<.. .| +peer1.org2.example.com | 00000010 b5 34 85 9e a9 24 67 bb 0c b5 51 ba 8d d2 c0 46 |.4...$g...Q....F| +peer1.org2.example.com | 00000020 25 5d fc 57 58 02 20 65 dd ea c7 45 18 d0 0a b3 |%].WX. e...E....| +peer1.org2.example.com | 00000030 3d 15 ce bc 17 04 6f ff 99 5b 87 e8 95 9f 51 61 |=.....o..[....Qa| +peer1.org2.example.com | 00000040 f5 4c ff 9c 63 33 48 |.L..c3H| +peer1.org2.example.com | [3dba 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3dbb 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dbc 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dbd 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea be 1f df 27 7a b6 87 1e 11 7c |0E.!.....'z....|| +peer1.org2.example.com | 00000010 5e 35 d3 11 f9 99 b8 af 36 50 af 7c ce 9e e9 a4 |^5......6P.|....| +peer1.org2.example.com | 00000020 ba 06 f5 3d 78 02 20 37 b9 e9 4f 3c 19 25 e8 98 |...=x. 7..O<.%..| +peer1.org2.example.com | 00000030 2e 83 29 38 d7 e7 ce 1a 1f e8 f7 98 75 f6 e1 ec |..)8........u...| +peer1.org2.example.com | 00000040 86 f5 eb 7b be 3e 42 |...{.>B| +peer1.org2.example.com | [3dbe 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3dbf 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3dc0 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dc1 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dc2 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dc3 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dc4 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3dc5 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc6 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3dc7 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3dc8 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3dc9 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3dca 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3dcb 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3dcc 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1ef10 gate 1589998885233008800 evaluation starts +peer1.org2.example.com | [3dcd 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1ef10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3dce 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1ef10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3dcf 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1ef10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3dd0 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1ef10 principal evaluation fails +peer1.org2.example.com | [3dd1 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1ef10 gate 1589998885233008800 evaluation fails +peer1.org2.example.com | [3dd2 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3dd3 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3dd4 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3dd5 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1f480 gate 1589998885233334300 evaluation starts +peer1.org2.example.com | [3dd6 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1f480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3dd7 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1f480 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3dd8 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1f480 principal matched by identity 0 +peer1.org2.example.com | [3dd9 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer1.org2.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer1.org2.example.com | [3dda 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer1.org2.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer1.org2.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer1.org2.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer1.org2.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer1.org2.example.com | [3ddb 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1f480 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ddc 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1f480 gate 1589998885233334300 evaluation succeeds +peer1.org2.example.com | [3ddd 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3dde 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ddf 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3de0 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3de1 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3de2 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de3 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3de4 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer1.org2.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer1.org2.example.com | [3de5 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer1.org2.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer1.org2.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer1.org2.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer1.org2.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer1.org2.example.com | [3de6 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3de7 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de8 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3de9 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 17 ca 1c e9 94 63 04 ee b0 29 0d 30 67 8d 01 |......c...).0g..| +peer1.org2.example.com | 00000010 1d 4b 42 72 7c 6f 36 9b 97 86 eb 47 d9 8e f0 2d |.KBr|o6....G...-| +peer1.org2.example.com | [3dea 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8e dd 23 fa 21 3c f0 19 20 e2 |0E.!....#.!<.. .| +peer1.org2.example.com | 00000010 b5 34 85 9e a9 24 67 bb 0c b5 51 ba 8d d2 c0 46 |.4...$g...Q....F| +peer1.org2.example.com | 00000020 25 5d fc 57 58 02 20 65 dd ea c7 45 18 d0 0a b3 |%].WX. e...E....| +peer1.org2.example.com | 00000030 3d 15 ce bc 17 04 6f ff 99 5b 87 e8 95 9f 51 61 |=.....o..[....Qa| +peer1.org2.example.com | 00000040 f5 4c ff 9c 63 33 48 |.L..c3H| +peer0.org1.example.com | [3b71 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got keys and values. Sending RESPONSE +peer0.org1.example.com | [3b72 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Completed GET_STATE_BY_RANGE. Sending RESPONSE +peer0.org1.example.com | [3b73 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +peer0.org1.example.com | [3b74 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] handling QUERY_STATE_CLOSE from chaincode +peer0.org1.example.com | [3b75 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Completed QUERY_STATE_CLOSE. Sending RESPONSE +peer0.org1.example.com | [3b76 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3b77 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] notifying Txid:1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647, channelID:businesschannel +peer0.org1.example.com | [3b78 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3b79 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1625e6d9] Exit chaincode: name:"lscc" (3ms) +peer0.org1.example.com | [3b7a 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [3b7b 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647] +peer0.org1.example.com | [3b7c 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] Exit +peer0.org1.example.com | [3b7d 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] Entry chaincode: name:"lscc" +peer0.org1.example.com | [3b7e 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [3b7f 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647, chaincode: lscc} +peer0.org1.example.com | [3b80 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209737844B1DAB8C805F37E69E2B9A...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3b81 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EAF45BA6759663D8377CA15DD12B1E3B6F431F8606FD08BC9AF8A665FB0E260C +peer0.org1.example.com | [3b82 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647, chaincode: lscc} +peer0.org1.example.com | [3b83 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] Exit +peer0.org1.example.com | [3b84 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647] +peer0.org1.example.com | [3b85 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37174 +peer0.org1.example.com | [3b86 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37174 grpc.code=OK grpc.call_duration=12.8907ms +peer0.org1.example.com | [3b87 05-20 18:21:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3b88 05-20 18:21:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3b89 05-20 18:21:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37178 +peer0.org1.example.com | [3b8a 05-20 18:21:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e2ff40 +peer0.org1.example.com | [3b8b 05-20 18:21:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3b8c 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3b8d 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3b8e 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3b8f 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3b90 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 58 20 a2 59 7f df b2 f1 bb 20 21 cb db b5 86 |FX .Y..... !....| +peer0.org1.example.com | 00000010 ae 19 aa f1 4a 0e 15 78 86 c9 c3 6d 8d c8 1d 27 |....J..x...m...'| +peer0.org1.example.com | [3b91 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 68 c9 c3 b6 f1 1a 1d 86 33 8d |0E.!..h.......3.| +peer0.org1.example.com | 00000010 5d 9a dc ac 36 35 af 97 8d f0 81 d5 b6 8d 59 d8 |]...65........Y.| +peer0.org1.example.com | 00000020 fb 31 e6 8e 13 02 20 2b 35 69 6b cb 7e 9b 1b 8c |.1.... +5ik.~...| +peer0.org1.example.com | 00000030 3e 99 b0 52 0e 80 5f b8 fd 03 95 6c dc 7e a8 b5 |>..R.._....l.~..| +peer0.org1.example.com | 00000040 47 81 0d 3a 5e 01 54 |G..:^.T| +peer0.org1.example.com | [3b92 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3b93 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003e9e2a0, header 0xc003f5a370 +peer0.org1.example.com | [3b94 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [3b95 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] processing txid: 27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487 +peer0.org1.example.com | [3b96 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487] +peer0.org1.example.com | [3b97 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3b98 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][27941c18] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3b99 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3b9a 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [3b9b 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [3b9c 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3b9d 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3b9e 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3b9f 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ba0 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 gate 1589998882138483900 evaluation starts +peer0.org1.example.com | [3ba1 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ba2 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3ba3 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3ba4 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 principal evaluation fails +peer0.org2.example.com | [3e6d 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > alive:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > alive: +peer0.org2.example.com | [3e6e 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e6f 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e70 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3e71 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e72 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:B" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e73 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:B" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e74 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3e75 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 17 ca 1c e9 94 63 04 ee b0 29 0d 30 67 8d 01 |......c...).0g..| +peer0.org2.example.com | 00000010 1d 4b 42 72 7c 6f 36 9b 97 86 eb 47 d9 8e f0 2d |.KBr|o6....G...-| +peer0.org2.example.com | [3e76 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8e dd 23 fa 21 3c f0 19 20 e2 |0E.!....#.!<.. .| +peer0.org2.example.com | 00000010 b5 34 85 9e a9 24 67 bb 0c b5 51 ba 8d d2 c0 46 |.4...$g...Q....F| +peer0.org2.example.com | 00000020 25 5d fc 57 58 02 20 65 dd ea c7 45 18 d0 0a b3 |%].WX. e...E....| +peer0.org2.example.com | 00000030 3d 15 ce bc 17 04 6f ff 99 5b 87 e8 95 9f 51 61 |=.....o..[....Qa| +peer0.org2.example.com | 00000040 f5 4c ff 9c 63 33 48 |.L..c3H| +peer0.org2.example.com | [3e77 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3e78 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea be 1f df 27 7a b6 87 1e 11 7c |0E.!.....'z....|| +peer0.org2.example.com | 00000010 5e 35 d3 11 f9 99 b8 af 36 50 af 7c ce 9e e9 a4 |^5......6P.|....| +peer0.org2.example.com | 00000020 ba 06 f5 3d 78 02 20 37 b9 e9 4f 3c 19 25 e8 98 |...=x. 7..O<.%..| +peer0.org2.example.com | 00000030 2e 83 29 38 d7 e7 ce 1a 1f e8 f7 98 75 f6 e1 ec |..)8........u...| +peer0.org2.example.com | 00000040 86 f5 eb 7b be 3e 42 |...{.>B| +peer0.org2.example.com | [3e79 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3e7a 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [3e7b 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e7c 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3e7d 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3e7e 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e7f 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e80 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e81 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [3e82 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e83 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3deb 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3dec 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ded 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dee 05-20 18:21:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3def 05-20 18:21:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [3df0 05-20 18:21:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [3df1 05-20 18:21:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3df2 05-20 18:21:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610121801 +peer1.org2.example.com | [3df3 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 01932A0DE9956A93003908D1EACA007570F7D82A7901DFC9178E3781DFE536F9 +peer1.org2.example.com | [3df4 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [3df5 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3df6 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3df7 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3df8 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3df9 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3ba5 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 gate 1589998882138483900 evaluation fails +peer0.org1.example.com | [3ba6 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ba7 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ba8 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ba9 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 gate 1589998882141085200 evaluation starts +peer0.org1.example.com | [3baa 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bab 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3bac 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 principal matched by identity 0 +peer0.org1.example.com | [3bad 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 58 20 a2 59 7f df b2 f1 bb 20 21 cb db b5 86 |FX .Y..... !....| +peer0.org1.example.com | 00000010 ae 19 aa f1 4a 0e 15 78 86 c9 c3 6d 8d c8 1d 27 |....J..x...m...'| +peer0.org1.example.com | [3bae 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 68 c9 c3 b6 f1 1a 1d 86 33 8d |0E.!..h.......3.| +peer0.org1.example.com | 00000010 5d 9a dc ac 36 35 af 97 8d f0 81 d5 b6 8d 59 d8 |]...65........Y.| +peer0.org1.example.com | 00000020 fb 31 e6 8e 13 02 20 2b 35 69 6b cb 7e 9b 1b 8c |.1.... +5ik.~...| +peer0.org1.example.com | 00000030 3e 99 b0 52 0e 80 5f b8 fd 03 95 6c dc 7e a8 b5 |>..R.._....l.~..| +peer0.org1.example.com | 00000040 47 81 0d 3a 5e 01 54 |G..:^.T| +peer0.org1.example.com | [3baf 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3bb0 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 gate 1589998882141085200 evaluation succeeds +peer0.org1.example.com | [3bb1 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3bb2 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3bb3 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3bb4 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3bb5 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [27941c18] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3bb6 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [27941c18] notifying Txid:27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487, channelID:businesschannel +peer0.org1.example.com | [3bb7 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3bb8 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][27941c18] Exit chaincode: name:"qscc" (7ms) +peer0.org1.example.com | [3bb9 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] Exit +peer0.org1.example.com | [3bba 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3bbb 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] escc for chaincode name:"qscc" is escc +peer0.org1.example.com | [3bbc 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487, chaincode: qscc} +peer0.org1.example.com | [3bbd 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20317D6E208956FEFD39DB61A80380...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3bbe 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 131598BA47C527C3CC325E62F934CE351DBCE338BB30A0CB46543B809B72A324 +peer0.org1.example.com | [3bbf 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487, chaincode: qscc} +peer0.org1.example.com | [3bc0 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] Exit +peer0.org1.example.com | [3bc1 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37178 +peer0.org1.example.com | [3bc2 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37178 grpc.code=OK grpc.call_duration=19.1131ms +peer0.org1.example.com | [3bc3 05-20 18:21:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3bc4 05-20 18:21:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3bc5 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37182 +peer0.org1.example.com | [3bc6 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003f5b310 +peer0.org1.example.com | [3bc7 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3bc8 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3bc9 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3bca 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3bcb 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3bcc 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 1d 67 72 e3 73 06 63 73 49 50 16 ab 04 dd 7b |..gr.s.csIP....{| +peer0.org1.example.com | 00000010 f5 03 69 0c f5 0f f3 b8 ca f0 d5 bb f8 63 6c 2d |..i..........cl-| +peer0.org1.example.com | [3bcd 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 e1 2e e1 84 b7 31 bb 6e f5 e6 |0E.!.......1.n..| +peer0.org1.example.com | 00000010 2c 9e 0f 2e 7a 09 dd 75 dc 14 70 ad e1 ae d2 44 |,...z..u..p....D| +peer0.org1.example.com | 00000020 e3 f6 8a a7 71 02 20 26 c4 ad c4 c0 50 85 9f b9 |....q. &....P...| +peer0.org1.example.com | 00000030 35 ae eb 28 f8 cf 69 07 21 d4 cd be 0f 03 94 26 |5..(..i.!......&| +peer0.org1.example.com | 00000040 f7 37 0f 4b 34 d1 b8 |.7.K4..| +peer0.org1.example.com | [3bce 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3bcf 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003e9e700, header 0xc003f5b720 +peer0.org1.example.com | [3bd0 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [3bd1 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] processing txid: c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225 +peer0.org1.example.com | [3bd2 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225] +peer0.org1.example.com | [3bd3 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3bd4 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c8c489f9] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3bd5 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [3e84 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3e85 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:B" > > alive: +peer0.org2.example.com | [3e86 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e87 05-20 18:21:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e88 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e89 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [3e8a 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 93 2a 0d e9 95 6a 93 00 39 08 d1 ea ca 00 75 |..*...j..9.....u| +peer0.org2.example.com | 00000010 70 f7 d8 2a 79 01 df c9 17 8e 37 81 df e5 36 f9 |p..*y.....7...6.| +peer0.org2.example.com | [3e8b 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 c6 20 b8 92 df d1 b9 6e a2 f6 |0E.!... .....n..| +peer0.org2.example.com | 00000010 b3 9d 15 fa b3 4c 08 c8 49 b2 05 e6 9c ee b9 68 |.....L..I......h| +peer0.org2.example.com | 00000020 0c 44 52 db 99 02 20 7c 0c 1a 0f 8f c1 4e ac c7 |.DR... |.....N..| +peer0.org2.example.com | 00000030 61 ec 9f 5b 89 5b 0b e4 81 a0 6e ac 37 88 ed f3 |a..[.[....n.7...| +peer0.org2.example.com | 00000040 dc 2a e8 41 e8 b9 d5 |.*.A...| +peer0.org2.example.com | [3e8c 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e8d 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e8e 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e8f 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [3e90 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3e91 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e92 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e93 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e94 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e95 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e96 05-20 18:21:27.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e97 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e98 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e99 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e9a 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e9b 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e9c 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e9d 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3e9e 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e9f 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ea0 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea1 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ea2 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea3 05-20 18:21:28.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ea4 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea5 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ea6 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ea7 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b35 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [3b36 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [3b37 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [3b38 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [3b39 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002acf680)} +peer1.org1.example.com | [3b3a 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [3b3b 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [3b3c 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [3b3d 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org1.example.com | [3b3e 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org1.example.com | [3b3f 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org1.example.com | [3b40 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035fc5d0, READY +peer1.org1.example.com | [3b41 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org1.example.com | [3b42 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3b43 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [3b44 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [3b45 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xd4, 0xd4, 0x5b, 0x4, 0x4e, 0x8a, 0x13, 0x2b, 0x2, 0xd9, 0x3, 0xc3, 0x1e, 0x8, 0xa3, 0x0, 0x38, 0xa2, 0x72, 0xe6, 0xd8, 0x7f, 0xf1, 0x5f, 0x4f, 0x51, 0x17, 0xe3, 0xb7, 0xa8, 0x82, 0xb3} txOffsets= +peer1.org1.example.com | txId=987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2 locPointer=offset=71, bytesLength=40146 +peer1.org1.example.com | ] +peer1.org1.example.com | [3b46 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97620, bytesLength=40146] for tx ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to txid-index +peer1.org1.example.com | [3b47 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97620, bytesLength=40146] for tx number:[0] ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to blockNumTranNum index +peer1.org1.example.com | [3b48 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3b4a 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [3b4b 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [3b4c 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [3b49 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [3b4d 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138758], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org1.example.com | [3b4e 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer1.org1.example.com | [3b4f 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b50 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b51 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3b52 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3b53 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3b54 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b55 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b56 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org1.example.com | [3b57 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b58 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b59 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b5a 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b5b 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b5c 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3b5d 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3b5e 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3b5f 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e2a0 gate 1589998895497108300 evaluation starts +peer1.org1.example.com | [3b60 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e2a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b61 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e2a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3b62 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3b63 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e2a0 principal evaluation fails +peer1.org1.example.com | [3b64 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e2a0 gate 1589998895497108300 evaluation fails +peer1.org1.example.com | [3b65 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3b66 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3b67 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b68 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e830 gate 1589998895497373400 evaluation starts +peer1.org1.example.com | [3b69 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e830 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b6a 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e830 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3b6b 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3b6c 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e830 principal evaluation fails +peer1.org1.example.com | [3b6d 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383e830 gate 1589998895497373400 evaluation fails +peer1.org1.example.com | [3b6e 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b6f 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b70 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3b71 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383edc0 gate 1589998895497614900 evaluation starts +peer1.org1.example.com | [3b72 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383edc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b73 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383edc0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3b74 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [3b75 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3b76 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3b77 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383edc0 principal matched by identity 0 +peer1.org1.example.com | [3b78 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [3b79 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 e0 8c 46 6f 82 eb 7e 89 ab 91 c8 |0D. '..Fo..~....| +peer1.org1.example.com | 00000010 83 68 c0 a0 42 8e 08 ff 96 35 9f 25 cb c4 af 49 |.h..B....5.%...I| +peer1.org1.example.com | 00000020 03 17 6c 3a 02 20 07 d2 8a 1b a8 c6 b2 83 5c e8 |..l:. ........\.| +peer1.org1.example.com | 00000030 e4 f4 46 db 29 2f 38 70 d1 cb 4e 26 a8 79 2d 19 |..F.)/8p..N&.y-.| +peer1.org1.example.com | 00000040 2c 52 7a 45 ef fd |,RzE..| +peer1.org1.example.com | [3b7a 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383edc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3b7b 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00383edc0 gate 1589998895497614900 evaluation succeeds +peer1.org1.example.com | [3b7c 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b7d 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b7e 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b7f 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b80 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [3b81 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b82 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3b83 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161043 +peer1.org1.example.com | [3b84 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CD0F9DDAFC2C87CC9973CFD8F09EDBC3E73F9124D7C5E44AEC58BBA7E7E4D869 +peer1.org1.example.com | [3b85 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [3ea8 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ea9 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3eaa 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3eab 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3eac 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ead 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3eae 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e46b20 gate 1589998888178427200 evaluation starts +peer0.org2.example.com | [3eaf 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e46b20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3eb0 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e46b20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3eb1 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e46b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3eb2 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e46b20 principal evaluation fails +peer0.org2.example.com | [3eb3 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e46b20 gate 1589998888178427200 evaluation fails +peer0.org2.example.com | [3eb4 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3eb5 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3eb6 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3eb7 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e47090 gate 1589998888178898700 evaluation starts +peer0.org2.example.com | [3eb8 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e47090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3eb9 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e47090 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3eba 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e47090 principal matched by identity 0 +peer0.org2.example.com | [3ebb 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3ebc 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3ebd 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e47090 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3ebe 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e47090 gate 1589998888178898700 evaluation succeeds +peer0.org2.example.com | [3ebf 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ec0 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ec1 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ec2 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ec3 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec4 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec5 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ec6 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ec7 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ec8 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ec9 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3eca 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3ecb 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a290 gate 1589998888183764500 evaluation starts +peer0.org2.example.com | [3ecc 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a290 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ecd 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a290 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3ece 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3ecf 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a290 principal evaluation fails +peer0.org2.example.com | [3ed0 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a290 gate 1589998888183764500 evaluation fails +peer0.org2.example.com | [3ed1 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3ed2 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3ed3 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ed4 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a800 gate 1589998888184173600 evaluation starts +peer0.org2.example.com | [3ed5 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ed6 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a800 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3ed7 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a800 principal matched by identity 0 +peer0.org2.example.com | [3ed8 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3ed9 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3eda 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a800 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3edb 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6a800 gate 1589998888184173600 evaluation succeeds +peer0.org2.example.com | [3edc 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3edd 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ede 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3edf 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ee0 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3ee1 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3ee2 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3ee3 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3ee4 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ee5 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ee6 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ee7 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ee8 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ee9 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3eea 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3eeb 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3eec 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3eed 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3eee 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3eef 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80a30 gate 1589998888189337400 evaluation starts +peer0.org2.example.com | [3ef0 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80a30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ef1 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80a30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3ef2 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3ef3 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80a30 principal evaluation fails +peer0.org2.example.com | [3ef4 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80a30 gate 1589998888189337400 evaluation fails +peer0.org2.example.com | [3ef5 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3ef6 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3ef7 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ef8 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80fa0 gate 1589998888189758900 evaluation starts +peer0.org2.example.com | [3ef9 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3efa 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80fa0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3efb 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80fa0 principal matched by identity 0 +peer0.org2.example.com | [3efc 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3efd 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3efe 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80fa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3eff 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e80fa0 gate 1589998888189758900 evaluation succeeds +peer0.org2.example.com | [3f00 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f01 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3bd6 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +peer0.org1.example.com | [3bd7 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber +peer0.org1.example.com | [3bd8 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3bd9 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3bda 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3bdb 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3bdc 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 gate 1589998882358399300 evaluation starts +peer0.org1.example.com | [3bdd 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bde 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3bdf 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3be0 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 principal evaluation fails +peer0.org1.example.com | [3be1 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 gate 1589998882358399300 evaluation fails +peer0.org1.example.com | [3be2 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3be3 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3be4 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3be5 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 gate 1589998882361305700 evaluation starts +peer0.org1.example.com | [3be6 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3be7 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3be8 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 principal matched by identity 0 +peer0.org1.example.com | [3be9 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 1d 67 72 e3 73 06 63 73 49 50 16 ab 04 dd 7b |..gr.s.csIP....{| +peer0.org1.example.com | 00000010 f5 03 69 0c f5 0f f3 b8 ca f0 d5 bb f8 63 6c 2d |..i..........cl-| +peer0.org1.example.com | [3bea 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 e1 2e e1 84 b7 31 bb 6e f5 e6 |0E.!.......1.n..| +peer0.org1.example.com | 00000010 2c 9e 0f 2e 7a 09 dd 75 dc 14 70 ad e1 ae d2 44 |,...z..u..p....D| +peer0.org1.example.com | 00000020 e3 f6 8a a7 71 02 20 26 c4 ad c4 c0 50 85 9f b9 |....q. &....P...| +peer0.org1.example.com | 00000030 35 ae eb 28 f8 cf 69 07 21 d4 cd be 0f 03 94 26 |5..(..i.!......&| +peer0.org1.example.com | 00000040 f7 37 0f 4b 34 d1 b8 |.7.K4..| +peer0.org1.example.com | [3beb 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3bec 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 gate 1589998882361305700 evaluation succeeds +peer0.org1.example.com | [3bed 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3bee 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3bef 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3bf0 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3bf1 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2] +peer0.org1.example.com | [3bf2 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[56676] +peer0.org1.example.com | [3bf3 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[40873], Going to peek [8] bytes +peer0.org1.example.com | [3bf4 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[28202], placementInfo={fileNum=[0], startOffset=[56676], bytesOffset=[56679]} +peer0.org1.example.com | [3bf5 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [c8c489f9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3bf6 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [c8c489f9] notifying Txid:c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225, channelID:businesschannel +peer0.org1.example.com | [3bf7 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3bf8 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c8c489f9] Exit chaincode: name:"qscc" (11ms) +peer0.org1.example.com | [3bf9 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] Exit +peer0.org1.example.com | [3bfa 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3bfb 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] escc for chaincode name:"qscc" is escc +peer0.org1.example.com | [3bfc 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225, chaincode: qscc} +peer0.org1.example.com | [3bfd 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2007937044121078B02AEB2D23DBEE...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3bfe 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 98506D37D45860292C79373262AE14BA1E3364636C22879D29E92728BEE7AE36 +peer0.org1.example.com | [3bff 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225, chaincode: qscc} +peer0.org1.example.com | [3c00 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] Exit +peer0.org1.example.com | [3c01 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37182 +peer0.org1.example.com | [3c02 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37182 grpc.code=OK grpc.call_duration=20.1951ms +peer0.org1.example.com | [3c03 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c04 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c05 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37186 +peer0.org1.example.com | [3c06 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003d1ac80 +peer0.org1.example.com | [3c07 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3c08 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3c09 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3c0a 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3c0b 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3c0c 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 42 fc e4 5f bc 26 53 73 07 18 bb 0d b0 3b 4a |.B.._.&Ss.....;J| +peer0.org1.example.com | 00000010 8c 25 2e 5f 19 90 fa 6c 7e 7e b0 40 4e d1 01 23 |.%._...l~~.@N..#| +peer0.org1.example.com | [3c0d 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af b5 f7 40 f9 06 81 de a1 a1 a7 |0E.!....@.......| +peer0.org1.example.com | 00000010 62 40 54 ee d5 b5 f2 69 27 81 63 42 09 78 34 74 |b@T....i'.cB.x4t| +peer0.org1.example.com | 00000020 fb 2b 6d 9a ca 02 20 5d 87 aa 63 b9 4a bb 16 43 |.+m... ]..c.J..C| +peer0.org1.example.com | 00000030 a5 86 a7 cc 12 c0 4b 5a 14 0b a8 d0 eb 97 47 85 |......KZ......G.| +peer0.org1.example.com | 00000040 ac af b2 1f ae d8 fe |.......| +peer0.org1.example.com | [3c0e 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3c0f 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003b90af0, header 0xc003d1b090 +peer0.org1.example.com | [3c10 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [3c11 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] processing txid: e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161 +peer0.org1.example.com | [3c12 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161] +peer0.org1.example.com | [3c13 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3c14 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e01630d0] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3c15 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3c16 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock +peer0.org1.example.com | [3c17 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock +peer0.org1.example.com | [3c18 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3c19 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c1a 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c1b 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c1c 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 gate 1589998882825327900 evaluation starts +peer0.org1.example.com | [3c1d 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c1e 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3c1f 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3c20 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 principal evaluation fails +peer0.org1.example.com | [3c21 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 gate 1589998882825327900 evaluation fails +peer0.org1.example.com | [3c22 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c23 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c24 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3c25 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 gate 1589998882825972500 evaluation starts +peer0.org1.example.com | [3c26 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c27 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3c28 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 principal matched by identity 0 +peer0.org1.example.com | [3c29 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 42 fc e4 5f bc 26 53 73 07 18 bb 0d b0 3b 4a |.B.._.&Ss.....;J| +peer0.org1.example.com | 00000010 8c 25 2e 5f 19 90 fa 6c 7e 7e b0 40 4e d1 01 23 |.%._...l~~.@N..#| +peer0.org1.example.com | [3c2a 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af b5 f7 40 f9 06 81 de a1 a1 a7 |0E.!....@.......| +peer0.org1.example.com | 00000010 62 40 54 ee d5 b5 f2 69 27 81 63 42 09 78 34 74 |b@T....i'.cB.x4t| +peer0.org1.example.com | 00000020 fb 2b 6d 9a ca 02 20 5d 87 aa 63 b9 4a bb 16 43 |.+m... ]..c.J..C| +peer0.org1.example.com | 00000030 a5 86 a7 cc 12 c0 4b 5a 14 0b a8 d0 eb 97 47 85 |......KZ......G.| +peer0.org1.example.com | 00000040 ac af b2 1f ae d8 fe |.......| +peer0.org1.example.com | [3c2b 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c2c 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 gate 1589998882825972500 evaluation succeeds +peer0.org1.example.com | [3c2d 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c2e 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c2f 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c30 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c31 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [e01630d0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3c32 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [e01630d0] notifying Txid:e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161, channelID:businesschannel +peer0.org1.example.com | [3c33 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3c34 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e01630d0] Exit chaincode: name:"cscc" (3ms) +peer0.org1.example.com | [3c35 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] Exit +peer0.org1.example.com | [3c36 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3c37 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] escc for chaincode name:"cscc" is escc +peer0.org1.example.com | [3c38 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161, chaincode: cscc} +peer0.org1.example.com | [3c39 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20FC1BD9B1E8AFB278A66A87613B44...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3c3a 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4C072DC29A1DBE644BD0542C23540A321FDC31B3F6C8FFD7C6D45408BBB7A429 +peer0.org1.example.com | [3c3b 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161, chaincode: cscc} +peer0.org1.example.com | [3c3c 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] Exit +peer0.org1.example.com | [3c3d 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37186 +peer0.org1.example.com | [3c3e 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37186 grpc.code=OK grpc.call_duration=6.1274ms +peer0.org1.example.com | [3c3f 05-20 18:21:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c40 05-20 18:21:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3dfa 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dfb 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dfc 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [3dfd 05-20 18:21:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dfe 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dff 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e00 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e01 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e02 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e03 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e04 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e05 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e06 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e07 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e08 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e09 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e0a 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e0b 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e0c 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e0d 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e0e 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e0f 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e10 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3e11 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e12 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e13 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e14 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e15 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3e16 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e17 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b86 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org1.example.com | [3b87 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer1.org1.example.com | [3b88 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [3b89 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [3b8a 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [3b8b 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [3b8c 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3b8e 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3b90 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3b8f 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3b8d 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [3b91 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b92 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:8643065459122474973 tag:EMPTY mem_req:\247\204q\276\002 >\177\312\252\354\007-\242\224\0041\371\276\372\210@b\225\016\204\326\323iAR\266k\3261[w\274" > > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3b93 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:8643065459122474973 tag:EMPTY mem_req:\247\204q\276\002 >\177\312\252\354\007-\242\224\0041\371\276\372\210@b\225\016\204\326\323iAR\266k\3261[w\274" > > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b94 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b95 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 isn't responsive: EOF +peer1.org1.example.com | [3b96 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> WARN Entering [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] +peer1.org1.example.com | [3b97 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: +peer1.org1.example.com | [3b9a 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3b9b 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org1.example.com | [3b99 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3b9c 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [3b9d 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [3b9e 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 8a 48 37 99 6c 29 e2 98 c6 13 5f |0D. D.H7.l)...._| +peer1.org1.example.com | 00000010 3c 9d 76 6a 87 7a de b0 31 ad 40 68 bc 1b 7f 1e |<.vj.z..1.@h....| +peer1.org1.example.com | 00000020 d5 99 bc 5d 02 20 1f 50 ba 9f f9 b7 a5 28 1e d7 |...]. .P.....(..| +peer1.org1.example.com | 00000030 62 fd ec 24 4e 04 f0 dd 92 ae e8 15 02 81 10 ff |b..$N...........| +peer1.org1.example.com | 00000040 1a d7 b0 12 19 15 |......| +peer1.org1.example.com | [3b98 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [3b9f 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [3ba0 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3ba3 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161044 +peer1.org1.example.com | [3ba4 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C990640D4BDD0FE0E02A879C87030B6F799611DF57D61990ACEE2C18941613B9 +peer1.org1.example.com | [3ba5 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3ba6 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3ba7 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3ba8 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3f02 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f03 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c41 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37190 +peer0.org1.example.com | [3c42 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040108c0 +peer0.org1.example.com | [3c43 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3c44 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3c45 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3c46 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3c47 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3c48 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 74 26 78 59 2a c0 30 72 96 28 72 46 bb f0 07 | t&xY*.0r.(rF...| +peer0.org1.example.com | 00000010 41 ed 9a 4b 0f 71 e3 1d d0 be cb 25 04 d1 5d ec |A..K.q.....%..].| +peer0.org1.example.com | [3c49 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 ef c9 cf 81 db 8f 01 df 29 2d 16 |0D. s........)-.| +peer0.org1.example.com | 00000010 eb 79 e3 da 14 f8 4e c1 d8 8e 86 7f 3e c2 3f cb |.y....N.....>.?.| +peer0.org1.example.com | 00000020 1c a9 2e 0f 02 20 08 e6 54 47 89 d3 bd 42 a5 f4 |..... ..TG...B..| +peer0.org1.example.com | 00000030 4b 8f cc 84 89 02 fc fa d8 fd dd 3e cd 25 2a 41 |K..........>.%*A| +peer0.org1.example.com | 00000040 81 14 ee b9 5a 90 |....Z.| +peer0.org1.example.com | [3c4a 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3c4b 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003e9eb60, header 0xc004010cd0 +peer0.org1.example.com | [3c4c 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [3c4d 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] processing txid: 6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df +peer0.org1.example.com | [3c4e 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df] +peer0.org1.example.com | [3c4f 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3c50 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][6af84bf7] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3c51 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3c52 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [3c53 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 74 26 78 59 2a c0 30 72 96 28 72 46 bb f0 07 | t&xY*.0r.(rF...| +peer0.org1.example.com | 00000010 41 ed 9a 4b 0f 71 e3 1d d0 be cb 25 04 d1 5d ec |A..K.q.....%..].| +peer0.org1.example.com | [3c54 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 ef c9 cf 81 db 8f 01 df 29 2d 16 |0D. s........)-.| +peer0.org1.example.com | 00000010 eb 79 e3 da 14 f8 4e c1 d8 8e 86 7f 3e c2 3f cb |.y....N.....>.?.| +peer0.org1.example.com | 00000020 1c a9 2e 0f 02 20 08 e6 54 47 89 d3 bd 42 a5 f4 |..... ..TG...B..| +peer0.org1.example.com | 00000030 4b 8f cc 84 89 02 fc fa d8 fd dd 3e cd 25 2a 41 |K..........>.%*A| +peer0.org1.example.com | 00000040 81 14 ee b9 5a 90 |....Z.| +peer0.org1.example.com | [3c55 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [6af84bf7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3c56 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [6af84bf7] notifying Txid:6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df, channelID:businesschannel +peer0.org1.example.com | [3c57 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3c58 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][6af84bf7] Exit chaincode: name:"cscc" (2ms) +peer0.org1.example.com | [3c59 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] Exit +peer0.org1.example.com | [3c5a 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3c5b 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] escc for chaincode name:"cscc" is escc +peer0.org1.example.com | [3c5c 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df, chaincode: cscc} +peer0.org1.example.com | [3c5d 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F2F05901F40AE1A5A5F2FDE0F3E1...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3c5e 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0A369227B9CD0809754838D980480355DDABCBF66BB6DC543E411DEC6C0625C4 +peer0.org1.example.com | [3c5f 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df, chaincode: cscc} +peer0.org1.example.com | [3c60 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] Exit +peer0.org1.example.com | [3c61 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37190 +peer0.org1.example.com | [3c62 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37190 grpc.code=OK grpc.call_duration=9.8485ms +peer0.org1.example.com | [3c63 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c64 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37190: read: connection reset by peer +peer0.org1.example.com | [3c65 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c66 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c67 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c68 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c69 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c6a 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3c6b 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 b2 ec 03 5c 98 83 21 3e ae a1 60 77 aa 4d ec |X...\..!>..`w.M.| +peer0.org1.example.com | 00000010 a8 2b c8 cd d9 96 cd 1b fc d4 18 5c c4 71 7f 01 |.+.........\.q..| +peer0.org1.example.com | [3c6c 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 a1 cb f2 c0 13 0b 6a f9 00 d5 22 |0D. t......j..."| +peer0.org1.example.com | 00000010 dc bf 2d d8 f4 3f f8 8f e1 c1 7f 0d 68 d2 8c e3 |..-..?......h...| +peer0.org1.example.com | 00000020 45 bf be 7c 02 20 55 e1 92 1e bf 5d 1d 69 69 52 |E..|. U....].iiR| +peer0.org1.example.com | 00000030 aa 42 35 c7 c5 bc a4 e0 f1 57 ea 29 ba 2a 48 2e |.B5......W.).*H.| +peer0.org1.example.com | 00000040 b7 f5 bb 7d ee 59 |...}.Y| +peer0.org1.example.com | [3c6d 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c6e 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3c6f 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3c70 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3c71 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3c72 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c73 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c74 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c75 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c76 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c77 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c78 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3c79 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c7a 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c7b 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c7c 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3ba9 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12452863225678033096 tag:EMPTY mem_req:\255\214M\227\214\232\2605\334\202\375\223m\351\233\307\016\310mJ:dV\325\275\311zaH\002 F-(Z\002\r\256\006\264\223\004 `\364\021\305\340N\362\241\252\001\252\3367\356\0104H\363D\245" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ba1 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org1.example.com | [3baa 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org1.example.com | [3bab 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:12452863225678033096 tag:EMPTY mem_req:\255\214M\227\214\232\2605\334\202\375\223m\351\233\307\016\310mJ:dV\325\275\311zaH\002 F-(Z\002\r\256\006\264\223\004 `\364\021\305\340N\362\241\252\001\252\3367\356\0104H\363D\245" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bac 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bad 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org1.example.com | [3ba2 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [3bae 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org1.example.com | [3baf 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:33352 disconnected +peer1.org1.example.com | [3bb0 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3bb1 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org1.example.com | [3bb2 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org1.example.com | [3bb3 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [3bb4 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:33352 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m27.9713563s +peer1.org1.example.com | [3bb5 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer1.org1.example.com | [3bb6 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 99ms (state_validation=12ms block_and_pvtdata_commit=45ms state_commit=36ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer1.org1.example.com | [3bb7 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3bb8 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D09590EEBFEFB38816...08071A0C0A0565787030321203312E30 +peer1.org1.example.com | [3bb9 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5505741F404E341A58A40C244F5379EA30D3B43FAF519D06F95273A968ADFF7 +peer1.org1.example.com | [3bba 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer1.org1.example.com | [3bbb 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [3bbc 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.599Z grpc.peer_address=172.18.0.7:33516 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=352.9µs +peer1.org1.example.com | [3bbd 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [3bbe 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [3bbf 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [3bc0 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3bc1 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [3bc2 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [3bc3 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:33516 +peer1.org2.example.com | [3e18 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e19 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e1a 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e1b 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e1c 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3e1d 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c764f0 gate 1589998888329769800 evaluation starts +peer1.org2.example.com | [3e1e 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c764f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e1f 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c764f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3e20 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c764f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3e21 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c764f0 principal evaluation fails +peer1.org2.example.com | [3e22 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c764f0 gate 1589998888329769800 evaluation fails +peer1.org2.example.com | [3e23 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3e24 05-20 18:21:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3e25 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e26 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c76a60 gate 1589998888330043400 evaluation starts +peer1.org2.example.com | [3e27 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c76a60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e28 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c76a60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3e29 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c76a60 principal matched by identity 0 +peer1.org2.example.com | [3e2a 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce ed 34 6b 9c 51 19 9a c6 0f 9a 68 d0 e0 3d b6 |..4k.Q.....h..=.| +peer1.org2.example.com | 00000010 47 f9 3a cc e9 16 f7 fb fd 63 7c 25 67 8a 8e b9 |G.:......c|%g...| +peer1.org2.example.com | [3e2b 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 24 ff 7f ca 7a b9 68 05 4b 1c |0E.!..$...z.h.K.| +peer1.org2.example.com | 00000010 02 3e 74 0f 29 b6 5e c5 ff 8a c6 a2 73 47 99 36 |.>t.).^.....sG.6| +peer1.org2.example.com | 00000020 36 f2 3a 88 bb 02 20 01 f2 a0 26 e0 25 f4 06 0f |6.:... ...&.%...| +peer1.org2.example.com | 00000030 8b 14 85 16 c0 12 fc f9 cd a7 be 08 10 c2 ca e5 |................| +peer1.org2.example.com | 00000040 31 0a 3c f0 1f bc 33 |1.<...3| +peer1.org2.example.com | [3e2c 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c76a60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e2d 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c76a60 gate 1589998888330043400 evaluation succeeds +peer1.org2.example.com | [3e2e 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e2f 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e30 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e31 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e32 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e33 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3e34 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3e35 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3e36 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3e37 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e38 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e39 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e3a 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e3b 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e3c 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e3d 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e3e 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e3f 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e40 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e41 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e42 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e43 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c7d 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c7e 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c7f 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c80 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c81 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c82 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c83 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c84 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c85 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c86 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c87 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c88 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c89 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c8a 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c8b 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3c8c 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c8d 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c8e 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c8f 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c90 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c91 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c92 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c93 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c94 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [3c95 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [3c96 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [3c97 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [3c98 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c99 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bc4 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:33516 +peer1.org1.example.com | [3bc5 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [3bc6 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 1f 2b a5 3b 1a 09 df 98 35 c1 |0E.!...+.;....5.| +peer1.org1.example.com | 00000010 15 2d ae a9 31 4c 23 55 2b b5 6f 27 0c 3f 05 5a |.-..1L#U+.o'.?.Z| +peer1.org1.example.com | 00000020 ff d2 46 ad ee 02 20 4f 55 6d 18 0b 97 98 dc ac |..F... OUm......| +peer1.org1.example.com | 00000030 c3 04 24 99 32 0e 16 c5 15 52 ae 16 31 68 ac 58 |..$.2....R..1h.X| +peer1.org1.example.com | 00000040 6e 48 2e ee a5 a4 9f |nH.....| +peer1.org1.example.com | [3bc7 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:33516 +peer1.org1.example.com | [3bc8 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:33516 +peer1.org1.example.com | [3bc9 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bca 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bcb 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bcc 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3bcd 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bce 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bcf 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [3bd0 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 0b e8 72 30 98 de c3 19 12 57 f3 31 fa 04 65 |...r0.....W.1..e| +peer1.org1.example.com | 00000010 4b 96 2d b7 4e 27 6c 64 3b 29 06 41 14 9c 7a 38 |K.-.N'ld;).A..z8| +peer1.org1.example.com | [3bd1 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 35 30 91 fd c9 30 87 6b ae 5e ba |0D. .50...0.k.^.| +peer1.org1.example.com | 00000010 82 c8 0a 67 71 9d ec 77 91 d4 c6 2c c0 41 8b fa |...gq..w...,.A..| +peer1.org1.example.com | 00000020 9e 75 a5 92 02 20 21 49 41 be 63 19 7d cf 61 85 |.u... !IA.c.}.a.| +peer1.org1.example.com | 00000030 5c 78 c8 40 db 69 ea bb 73 2c b7 36 ef cb 5b 52 |\x.@.i..s,.6..[R| +peer1.org1.example.com | 00000040 62 c6 79 b6 2a 30 |b.y.*0| +peer1.org1.example.com | [3bd2 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bd3 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bd4 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [3bd5 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bd6 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bd7 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5 6] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3bd8 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bd9 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bda 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org1.example.com | [3bdb 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bdd 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bdc 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bde 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bdf 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [3be0 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [3be1 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3be2 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org1.example.com | [3be3 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org1.example.com | [3be4 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3be5 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3be6 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3be7 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3be8 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3be9 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3bea 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3beb 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3bec 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a410d0 gate 1589998895813846700 evaluation starts +peer1.org1.example.com | [3bed 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a410d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bee 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a410d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3bef 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a410d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3bf0 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a410d0 principal evaluation fails +peer1.org1.example.com | [3bf1 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a410d0 gate 1589998895813846700 evaluation fails +peer1.org1.example.com | [3bf2 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3bf3 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3bf4 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3bf5 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41640 gate 1589998895815019200 evaluation starts +peer1.org1.example.com | [3bf6 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41640 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bf7 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41640 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3bf8 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3bf9 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41640 principal evaluation fails +peer1.org1.example.com | [3bfb 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41640 gate 1589998895815019200 evaluation fails +peer1.org1.example.com | [3bfc 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3bfd 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3bfe 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3bff 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41bb0 gate 1589998895816671200 evaluation starts +peer1.org1.example.com | [3c00 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c01 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41bb0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c02 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41bb0 principal matched by identity 0 +peer1.org1.example.com | [3c03 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org1.example.com | [3c04 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org1.example.com | [3c05 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41bb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c06 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a41bb0 gate 1589998895816671200 evaluation succeeds +peer1.org1.example.com | [3c07 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c08 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c09 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c0a 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c0b 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org1.example.com | [3c0c 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org1.example.com | [3c0d 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c0e 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c0f 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3c10 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3c11 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3bfa 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c12 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c13 05-20 18:21:35.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c14 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c15 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c16 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [3c17 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3c18 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61690 gate 1589998895820095000 evaluation starts +peer1.org1.example.com | [3c19 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c1a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c1b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61690 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c1c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3c1d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c1e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61690 principal evaluation fails +peer1.org1.example.com | [3c20 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61690 gate 1589998895820095000 evaluation fails +peer1.org1.example.com | [3c1f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c21 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c22 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c23 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c24 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61c20 gate 1589998895820444300 evaluation starts +peer1.org1.example.com | [3c25 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61c20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e44 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3e45 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e46 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e47 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3e48 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e49 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e4a 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e4b 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e4c 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e4d 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e4e 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e4f 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e50 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e51 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e52 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e53 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3e54 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e55 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e56 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e57 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e58 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e59 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e5a 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e5b 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e5c 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3e5d 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [3e5e 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e5f 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e60 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e61 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e62 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e63 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e64 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e65 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3e66 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99b50 gate 1589998888383729200 evaluation starts +peer1.org2.example.com | [3e67 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99b50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e68 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99b50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3e69 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3e6a 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99b50 principal evaluation fails +peer1.org2.example.com | [3e6b 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c99b50 gate 1589998888383729200 evaluation fails +peer1.org2.example.com | [3e6c 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3e6d 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3e6e 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e6f 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc00c0 gate 1589998888384013600 evaluation starts +peer1.org2.example.com | [3e70 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc00c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e71 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc00c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3e72 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc00c0 principal matched by identity 0 +peer1.org2.example.com | [3e73 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3e74 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [3e75 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc00c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e76 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc00c0 gate 1589998888384013600 evaluation succeeds +peer1.org2.example.com | [3e77 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e78 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e79 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e7a 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e7b 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e7c 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e7d 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e7e 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f04 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f05 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f06 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f07 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f08 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f09 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f0a 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f0b 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3f0c 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c1a0 gate 1589998888191908500 evaluation starts +peer0.org2.example.com | [3f0d 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c1a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f0e 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c1a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3f0f 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3f10 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c1a0 principal evaluation fails +peer0.org2.example.com | [3f11 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c1a0 gate 1589998888191908500 evaluation fails +peer0.org2.example.com | [3f12 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3f13 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3f14 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f15 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c710 gate 1589998888192691100 evaluation starts +peer0.org2.example.com | [3f16 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c710 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f17 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c710 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3f18 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c710 principal matched by identity 0 +peer0.org2.example.com | [3f19 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3f1a 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3f1b 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c710 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f1c 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9c710 gate 1589998888192691100 evaluation succeeds +peer0.org2.example.com | [3f1d 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f1e 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f1f 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f20 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f21 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3f22 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3f23 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3e7f 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e80 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e81 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e82 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3e83 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc12c0 gate 1589998888384943800 evaluation starts +peer1.org2.example.com | [3e84 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc12c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e85 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc12c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3e86 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc12c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3e87 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc12c0 principal evaluation fails +peer1.org2.example.com | [3e88 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc12c0 gate 1589998888384943800 evaluation fails +peer1.org2.example.com | [3e89 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3e8a 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3e8b 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e8c 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1830 gate 1589998888387994500 evaluation starts +peer1.org2.example.com | [3e8d 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1830 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e8e 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1830 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3e8f 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1830 principal matched by identity 0 +peer1.org2.example.com | [3e90 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3e91 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3e92 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1830 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e93 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1830 gate 1589998888387994500 evaluation succeeds +peer1.org2.example.com | [3e94 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e95 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e96 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e97 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e98 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [3e99 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [3e9a 05-20 18:21:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e9b 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e9c 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e9d 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e9e 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e9f 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c26 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c27 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c28 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61c20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c29 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c2a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61c20 principal evaluation fails +peer1.org1.example.com | [3c2b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a61c20 gate 1589998895820444300 evaluation fails +peer1.org1.example.com | [3c2c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c2d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c2e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c2f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aae1b0 gate 1589998895820700000 evaluation starts +peer1.org1.example.com | [3c30 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aae1b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c31 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aae1b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c32 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [3c33 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3c34 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3c35 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aae1b0 principal matched by identity 0 +peer1.org1.example.com | [3c36 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [3c37 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [3c38 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aae1b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c39 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aae1b0 gate 1589998895820700000 evaluation succeeds +peer1.org1.example.com | [3c3a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c3b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c3c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c3d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c3e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c3f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c40 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c41 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c42 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c43 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3c44 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaef80 gate 1589998895826151100 evaluation starts +peer1.org1.example.com | [3c45 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaef80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c46 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaef80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c47 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaef80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3c48 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaef80 principal evaluation fails +peer1.org1.example.com | [3c49 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaef80 gate 1589998895826151100 evaluation fails +peer1.org1.example.com | [3c4a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c4b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c4c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c4d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf4f0 gate 1589998895826413600 evaluation starts +peer1.org1.example.com | [3c4e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf4f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c4f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf4f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c50 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf4f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c51 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf4f0 principal evaluation fails +peer1.org1.example.com | [3c52 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf4f0 gate 1589998895826413600 evaluation fails +peer1.org1.example.com | [3c53 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c54 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c55 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c56 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aafa60 gate 1589998895826649000 evaluation starts +peer1.org1.example.com | [3c57 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aafa60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f24 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3f25 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f26 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f27 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [3f28 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [3f29 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f2a 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f2b 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f2c 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f2d 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f2e 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f2f 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f30 05-20 18:21:28.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3f31 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebcf80 gate 1589998888199989100 evaluation starts +peer0.org2.example.com | [3f32 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebcf80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f33 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebcf80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3f34 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebcf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3f35 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebcf80 principal evaluation fails +peer0.org2.example.com | [3f36 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebcf80 gate 1589998888199989100 evaluation fails +peer0.org2.example.com | [3f37 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3f38 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3f39 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f3a 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd4f0 gate 1589998888201709600 evaluation starts +peer0.org2.example.com | [3f3b 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd4f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f3c 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd4f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3f3d 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd4f0 principal matched by identity 0 +peer0.org2.example.com | [3f3e 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [3f3f 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [3f40 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd4f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f41 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd4f0 gate 1589998888201709600 evaluation succeeds +peer1.org2.example.com | [3ea0 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ea1 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ea2 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ea3 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ea4 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3ea5 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3a0 gate 1589998888396174600 evaluation starts +peer1.org2.example.com | [3ea6 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ea7 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ea8 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3ea9 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3a0 principal evaluation fails +peer1.org2.example.com | [3eaa 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3a0 gate 1589998888396174600 evaluation fails +peer1.org2.example.com | [3eab 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3eac 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ead 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3eae 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb910 gate 1589998888399484700 evaluation starts +peer1.org2.example.com | [3eaf 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3eb0 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb910 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3eb1 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb910 principal matched by identity 0 +peer1.org2.example.com | [3eb2 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3eb3 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3eb4 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb910 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3eb5 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb910 gate 1589998888399484700 evaluation succeeds +peer1.org2.example.com | [3eb6 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3eb7 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3eb8 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3eb9 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3eba 05-20 18:21:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ebb 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ebc 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ebd 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ebe 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ebf 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ec0 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ec1 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c9a 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c9b 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c9c 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c9d 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c9e 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c9f 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ca0 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 gate 1589998883576663700 evaluation starts +peer0.org1.example.com | [3ca1 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ca2 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3ca3 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 principal matched by identity 0 +peer0.org1.example.com | [3ca4 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [3ca5 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [3ca6 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3ca7 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 gate 1589998883576663700 evaluation succeeds +peer0.org1.example.com | [3ca8 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ca9 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3caa 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3cab 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3cac 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cad 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cae 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3caf 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3cb0 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3cb1 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3cb2 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3cb3 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3cb4 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 gate 1589998883578617400 evaluation starts +peer0.org1.example.com | [3cb5 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3cb6 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3cb7 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 principal matched by identity 0 +peer0.org1.example.com | [3cb8 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [3cb9 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [3cba 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3cbb 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 gate 1589998883578617400 evaluation succeeds +peer0.org1.example.com | [3cbc 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3cbd 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3cbe 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3cbf 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3cc0 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cc1 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cc2 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cc3 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cc4 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cc5 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cc6 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3cc7 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3cc8 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3cc9 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cca 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ccb 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ccd 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3cce 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ccf 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 gate 1589998883588818000 evaluation starts +peer0.org1.example.com | [3cd0 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3cd1 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3cd2 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ccc 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [3cd3 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 principal matched by identity 0 +peer0.org1.example.com | [3cd4 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cd6 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cd7 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3cd5 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [3cd8 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3cdc 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cd9 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3cdd 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cda 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cdb 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [3cde 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3cdf 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 gate 1589998883588818000 evaluation succeeds +peer0.org1.example.com | [3ce0 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ce1 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ce2 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3ce3 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3ce4 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [3ce5 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [3ce6 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ce7 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ce8 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ce9 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3cea 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ceb 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3cec 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ced 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3cee 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 gate 1589998883633776400 evaluation starts +peer0.org1.example.com | [3cef 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3cf0 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3cf1 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 principal matched by identity 0 +peer0.org1.example.com | [3cf2 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [3cf3 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [3cf4 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3cf5 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 gate 1589998883633776400 evaluation succeeds +peer0.org1.example.com | [3cf6 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3cf7 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3cf8 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3cf9 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3cfa 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [3cfb 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [3cfc 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cfd 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cfe 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cff 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d00 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d01 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d02 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d03 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d04 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d05 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d06 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d07 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 gate 1589998883642713600 evaluation starts +peer0.org1.example.com | [3d08 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d09 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3d0a 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 principal matched by identity 0 +peer0.org1.example.com | [3d0b 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [3d0c 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [3d0d 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ec2 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfcb10 gate 1589998888401721900 evaluation starts +peer1.org2.example.com | [3ec3 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfcb10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ec4 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfcb10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ec5 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfcb10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3ec6 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfcb10 principal evaluation fails +peer1.org2.example.com | [3ec7 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfcb10 gate 1589998888401721900 evaluation fails +peer1.org2.example.com | [3ec8 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ec9 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3eca 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ecb 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd080 gate 1589998888403185200 evaluation starts +peer1.org2.example.com | [3ecc 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd080 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ecd 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd080 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ece 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd080 principal matched by identity 0 +peer1.org2.example.com | [3ecf 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3ed0 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [3ed1 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd080 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ed2 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfd080 gate 1589998888403185200 evaluation succeeds +peer1.org2.example.com | [3ed3 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ed4 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ed5 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ed6 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ed7 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3ed8 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [3ed9 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [3eda 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [3edb 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3edc 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3edd 05-20 18:21:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ede 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3edf 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c58 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aafa60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c59 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aafa60 principal matched by identity 0 +peer1.org1.example.com | [3c5a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [3c5b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [3c5c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aafa60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c5d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aafa60 gate 1589998895826649000 evaluation succeeds +peer1.org1.example.com | [3c5e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c5f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c60 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c61 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c62 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c63 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c64 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [3c65 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [3c66 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c67 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c68 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c69 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c6a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3c6b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c6c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3c6d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad6d80 gate 1589998895828031700 evaluation starts +peer1.org1.example.com | [3c6e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad6d80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c6f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad6d80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c70 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad6d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [3c71 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad6d80 principal evaluation fails +peer1.org1.example.com | [3c72 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad6d80 gate 1589998895828031700 evaluation fails +peer1.org1.example.com | [3c73 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c74 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c75 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c76 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad7bd0 gate 1589998895828340400 evaluation starts +peer1.org1.example.com | [3c77 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad7bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c78 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad7bd0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c79 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [3c7a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3c7b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3c7c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad7bd0 principal matched by identity 0 +peer1.org1.example.com | [3c7d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [3c7e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [3c7f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad7bd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c80 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad7bd0 gate 1589998895828340400 evaluation succeeds +peer1.org1.example.com | [3c81 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c82 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c83 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c84 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c85 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c86 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c87 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c88 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c89 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c8a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c8b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c8c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3c8d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15060 gate 1589998895829905500 evaluation starts +peer1.org1.example.com | [3c8e 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15060 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c8f 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15060 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c90 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3c91 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15060 principal evaluation fails +peer1.org1.example.com | [3c92 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15060 gate 1589998895829905500 evaluation fails +peer1.org1.example.com | [3c93 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c94 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c95 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c96 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b155d0 gate 1589998895830798700 evaluation starts +peer1.org1.example.com | [3c97 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b155d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c98 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b155d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3c99 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b155d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c9a 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b155d0 principal evaluation fails +peer1.org1.example.com | [3c9b 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b155d0 gate 1589998895830798700 evaluation fails +peer1.org1.example.com | [3c9c 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c9d 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c9e 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c9f 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15b40 gate 1589998895831402900 evaluation starts +peer1.org1.example.com | [3ca0 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15b40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ca1 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15b40 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3ca2 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15b40 principal matched by identity 0 +peer1.org1.example.com | [3ca3 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [3ca4 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | [3ee0 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ee1 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ee2 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ee3 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ee4 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ee5 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3ee6 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d152b0 gate 1589998888410993400 evaluation starts +peer1.org2.example.com | [3ee7 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d152b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ee8 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d152b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ee9 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d152b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3eea 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d152b0 principal evaluation fails +peer1.org2.example.com | [3eeb 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d152b0 gate 1589998888410993400 evaluation fails +peer1.org2.example.com | [3eec 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3eed 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3eee 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3eef 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d15820 gate 1589998888412176200 evaluation starts +peer1.org2.example.com | [3ef0 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d15820 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ef1 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d15820 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ef2 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d15820 principal matched by identity 0 +peer1.org2.example.com | [3ef3 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [3ef4 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [3ef5 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d15820 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ef6 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d15820 gate 1589998888412176200 evaluation succeeds +peer1.org2.example.com | [3ef7 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ef8 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ef9 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3efa 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3efb 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3efc 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3efd 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3efe 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3eff 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f00 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f01 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f02 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3f03 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30a20 gate 1589998888413907700 evaluation starts +peer1.org2.example.com | [3f04 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30a20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f05 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30a20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3f06 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3f07 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30a20 principal evaluation fails +peer1.org2.example.com | [3f08 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30a20 gate 1589998888413907700 evaluation fails +peer1.org2.example.com | [3f09 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f0a 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f0b 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f0c 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30f90 gate 1589998888414799600 evaluation starts +peer1.org2.example.com | [3f0d 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30f90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f0e 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30f90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3f0f 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30f90 principal matched by identity 0 +peer1.org2.example.com | [3f10 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [3f11 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [3f12 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30f90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f13 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d30f90 gate 1589998888414799600 evaluation succeeds +peer1.org2.example.com | [3f14 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f15 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f16 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f17 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f18 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [3f19 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [3f1a 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [3f1b 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [3f1c 05-20 18:21:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f1d 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f1e 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f1f 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f20 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f21 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f22 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f23 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f24 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f25 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3f26 05-20 18:21:28.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f27 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f28 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f29 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d0e 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 gate 1589998883642713600 evaluation succeeds +peer0.org1.example.com | [3d0f 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d10 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d11 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d12 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d13 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [3d14 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [3d15 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [3d16 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [3d17 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d18 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d19 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d1a 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d1b 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d1c 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d1d 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d1e 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d1f 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 gate 1589998883653404300 evaluation starts +peer0.org1.example.com | [3d20 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d21 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3d22 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 principal matched by identity 0 +peer0.org1.example.com | [3d23 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [3d24 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [3d25 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d26 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 gate 1589998883653404300 evaluation succeeds +peer0.org1.example.com | [3d27 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d28 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d29 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d2a 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d2b 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d2c 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d2d 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d2e 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d2f 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [3ca5 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15b40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3ca6 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b15b40 gate 1589998895831402900 evaluation succeeds +peer1.org1.example.com | [3ca7 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ca8 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ca9 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3caa 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3cab 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cac 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cad 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cae 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3caf 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3cb0 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3cb1 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38680 gate 1589998895832418800 evaluation starts +peer1.org1.example.com | [3cb2 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38680 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cb3 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38680 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3cb4 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3cb5 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38680 principal evaluation fails +peer1.org1.example.com | [3cb6 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38680 gate 1589998895832418800 evaluation fails +peer1.org1.example.com | [3cb7 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3cb8 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3cb9 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3cba 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38bf0 gate 1589998895832702100 evaluation starts +peer1.org1.example.com | [3cbb 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cbc 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38bf0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3cbd 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3cbe 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38bf0 principal evaluation fails +peer1.org1.example.com | [3cbf 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b38bf0 gate 1589998895832702100 evaluation fails +peer1.org1.example.com | [3cc0 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cc1 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cc2 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3cc3 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39160 gate 1589998895832948200 evaluation starts +peer1.org1.example.com | [3cc4 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39160 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cc5 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39160 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3cc6 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39160 principal matched by identity 0 +peer1.org1.example.com | [3cc7 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [3cc8 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [3cc9 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39160 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3cca 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b39160 gate 1589998895832948200 evaluation succeeds +peer1.org1.example.com | [3ccb 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ccc 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ccd 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3cce 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ccf 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [3cd0 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [3cd1 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cd2 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f2a 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3f2b 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f2c 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f2d 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f2e 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f2f 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f30 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f31 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3f32 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f9a0 gate 1589998888630245600 evaluation starts +peer1.org2.example.com | [3f33 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f34 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f9a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3f35 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3f36 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f9a0 principal evaluation fails +peer1.org2.example.com | [3f37 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4f9a0 gate 1589998888630245600 evaluation fails +peer1.org2.example.com | [3f38 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f39 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f3a 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f3b 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ff10 gate 1589998888630609000 evaluation starts +peer1.org2.example.com | [3f3c 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ff10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f3d 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ff10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3f3e 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ff10 principal matched by identity 0 +peer1.org2.example.com | [3f3f 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer1.org2.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer1.org2.example.com | [3f40 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer1.org2.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer1.org2.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer1.org2.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer1.org2.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer1.org2.example.com | [3f41 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ff10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f42 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4ff10 gate 1589998888630609000 evaluation succeeds +peer1.org2.example.com | [3f43 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f44 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f45 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f46 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f47 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f48 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3f42 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f43 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f44 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f45 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f46 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [3f47 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [3f48 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f49 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f4a 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f4b 05-20 18:21:28.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f4c 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f4d 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f4e 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f4f 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3f50 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4de0 gate 1589998888173875200 evaluation starts +peer0.org2.example.com | [3f51 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4de0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f52 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4de0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3f53 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3f54 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4de0 principal evaluation fails +peer0.org2.example.com | [3f55 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed4de0 gate 1589998888173875200 evaluation fails +peer0.org2.example.com | [3f56 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3f57 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3f58 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f59 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5350 gate 1589998888175436200 evaluation starts +peer0.org2.example.com | [3f5a 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f5b 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5350 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3f5c 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5350 principal matched by identity 0 +peer0.org2.example.com | [3f5d 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [3f5e 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [3f5f 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5350 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f60 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed5350 gate 1589998888175436200 evaluation succeeds +peer0.org2.example.com | [3f61 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f62 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f63 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f64 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f65 05-20 18:21:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f66 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f67 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f68 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3f69 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f6a 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f6b 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3f6c 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f6d 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f6e 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f6f 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f70 05-20 18:21:28.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f71 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f72 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f73 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f74 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3f75 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f76 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f77 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f78 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f79 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f7a 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f7b 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3f7c 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc7e0 gate 1589998888334001000 evaluation starts +peer0.org2.example.com | [3f7d 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc7e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f7e 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc7e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3f7f 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc7e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3f80 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc7e0 principal evaluation fails +peer0.org2.example.com | [3f81 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efc7e0 gate 1589998888334001000 evaluation fails +peer0.org2.example.com | [3f82 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3f83 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f49 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3f4a 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3f4b 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3f4c 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f4d 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f4e 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f4f 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3f50 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f51 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f52 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f53 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3f54 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > alive:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > alive: alive: +peer1.org2.example.com | [3f55 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f56 05-20 18:21:28.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f57 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f58 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f59 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f5a 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f5b 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3f5c 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 25 c1 a0 94 7e 60 34 8e 31 4c 35 2f 35 77 91 |K%...~`4.1L5/5w.| +peer1.org2.example.com | 00000010 b0 b5 05 2a 7e d6 75 24 44 f4 1d 18 c0 ee 0a 61 |...*~.u$D......a| +peer1.org2.example.com | [3f5d 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 8c 59 83 51 56 ab 18 ae f2 ec |0E.!...Y.QV.....| +peer1.org2.example.com | 00000010 89 66 e1 ed 13 1e f4 c0 00 11 f0 d6 a1 de e8 e5 |.f..............| +peer1.org2.example.com | 00000020 41 ab 99 45 db 02 20 68 de 29 84 16 d0 11 2f 31 |A..E.. h.)..../1| +peer1.org2.example.com | 00000030 70 57 84 92 a1 49 94 95 dc 82 87 cc 9c 49 44 f3 |pW...I.......ID.| +peer1.org2.example.com | 00000040 5d ef a4 a3 26 cd c6 |]...&..| +peer1.org2.example.com | [3f5e 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f5f 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3f60 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3f61 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3cd3 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3cd4 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cd5 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cd6 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3cd7 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3cd8 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3cd9 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66a50 gate 1589998895836896100 evaluation starts +peer1.org1.example.com | [3cda 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66a50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cdb 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66a50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3cdc 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3cdd 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66a50 principal evaluation fails +peer1.org1.example.com | [3cde 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66a50 gate 1589998895836896100 evaluation fails +peer1.org1.example.com | [3cdf 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3ce0 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3ce1 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3ce2 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66fc0 gate 1589998895837287400 evaluation starts +peer1.org1.example.com | [3ce3 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ce4 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66fc0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3ce5 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3ce6 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66fc0 principal evaluation fails +peer1.org1.example.com | [3ce7 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b66fc0 gate 1589998895837287400 evaluation fails +peer1.org1.example.com | [3ce8 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ce9 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cea 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ceb 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b67530 gate 1589998895837523400 evaluation starts +peer1.org1.example.com | [3cec 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b67530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ced 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b67530 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3cee 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b67530 principal matched by identity 0 +peer1.org1.example.com | [3cef 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [3cf0 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [3cf1 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b67530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d30 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3d31 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d32 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d33 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d34 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d35 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d36 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d37 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d38 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 gate 1589998883692264600 evaluation starts +peer0.org1.example.com | [3d39 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d3a 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3d3b 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 principal matched by identity 0 +peer0.org1.example.com | [3d3c 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 e9 73 9f 56 17 b9 e6 d3 0f 25 32 4b 95 c3 f5 |5.s.V.....%2K...| +peer0.org1.example.com | 00000010 8b c3 08 f1 84 c8 e6 e8 c1 7b 18 d9 2c 71 e0 22 |.........{..,q."| +peer0.org1.example.com | [3d3d 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 f5 62 e9 51 96 e5 13 e3 12 9b |0E.!...b.Q......| +peer0.org1.example.com | 00000010 03 8b 78 67 11 ef 40 46 cb 24 0b 3f 0d ab d9 72 |..xg..@F.$.?...r| +peer0.org1.example.com | 00000020 49 18 73 b9 3a 02 20 26 95 f9 43 b0 34 6f b1 d3 |I.s.:. &..C.4o..| +peer0.org1.example.com | 00000030 47 25 59 1c e4 17 64 e8 ec 18 2b c9 fb fd de 97 |G%Y...d...+.....| +peer0.org1.example.com | 00000040 1c 28 1e 1d 82 98 4d |.(....M| +peer0.org1.example.com | [3d3e 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d3f 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 gate 1589998883692264600 evaluation succeeds +peer0.org1.example.com | [3d40 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d41 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d42 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d43 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d44 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d45 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3f62 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3f63 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f64 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f65 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f66 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f67 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f68 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f69 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f6a 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f6b 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f6c 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f6d 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3f6e 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f6f 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3f70 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f71 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f72 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f73 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f74 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f75 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f76 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f77 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f78 05-20 18:21:28.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [3f79 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f7a 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f7b 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f7c 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3f7d 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f7e 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f7f 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f80 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f81 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f82 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f83 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f84 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f85 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f86 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3f87 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f88 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3f89 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161039 +peer1.org2.example.com | [3f8a 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 381E747C7EB9E39F9FA7FBF1A87DDFEE687E2A3F2E2B102E4A64BBD2E977F8A1 +peer1.org1.example.com | [3cf2 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b67530 gate 1589998895837523400 evaluation succeeds +peer1.org1.example.com | [3cf3 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3cf4 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3cf5 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3cf6 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3cf7 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cf8 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:38.115Z grpc.peer_address=172.18.0.5:37784 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=714.9µs +peer1.org1.example.com | [3cf9 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3cfa 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [3cfb 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [3cfc 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:37784 +peer1.org1.example.com | [3cfd 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:37784 +peer1.org1.example.com | [3cfe 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cff 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d00 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d01 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d02 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d03 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d04 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d05 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d06 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d07 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d08 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3d09 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53f70 gate 1589998896149761900 evaluation starts +peer1.org1.example.com | [3d0a 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53f70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d0b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53f70 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d0c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3d0d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53f70 principal evaluation fails +peer1.org1.example.com | [3d0e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a53f70 gate 1589998896149761900 evaluation fails +peer1.org1.example.com | [3d0f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d10 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d11 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3d12 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be84e0 gate 1589998896155546000 evaluation starts +peer1.org1.example.com | [3d13 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be84e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d14 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be84e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d15 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be84e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3d16 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be84e0 principal evaluation fails +peer1.org1.example.com | [3d17 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be84e0 gate 1589998896155546000 evaluation fails +peer1.org1.example.com | [3d18 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d19 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d1a 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d46 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3d47 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3d48 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3d49 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d4a 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d4b 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d4c 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d4d 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d4e 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d4f 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d50 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d51 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d52 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d53 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3d54 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d55 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3d56 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d57 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d58 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d59 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d5b 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d5d 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d5e 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d5f 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d5a 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d5c 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d60 05-20 18:21:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d61 05-20 18:21:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3d62 05-20 18:21:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d63 05-20 18:21:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d64 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d65 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d66 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3d67 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d68 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d69 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3d6a 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d6b 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d6c 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f8b 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3f8c 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3f8d 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3f8e 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3f8f 05-20 18:21:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f90 05-20 18:21:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f91 05-20 18:21:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f92 05-20 18:21:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3f93 05-20 18:21:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3f94 05-20 18:21:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f95 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f96 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f97 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3f98 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f99 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f9a 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f9b 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f9c 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f9d 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f9e 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3f9f 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fa0 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fa1 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3fa2 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fa3 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fa4 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fa5 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fa6 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fa7 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fa8 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016Y\275\311&\3479\314\364~A\206\330\253\251\260G\355\030\002 f\261e#*\010\345\027\317d\251S\2449{\370\027\276\003\315\232\030\361\273\250\336\334u\305\207\372`" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fa9 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\016Y\275\311&\3479\314\364~A\206\330\253\251\260G\355\030\002 f\261e#*\010\345\027\317d\251S\2449{\370\027\276\003\315\232\030\361\273\250\336\334u\305\207\372`" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3faa 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f84 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f85 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efcd50 gate 1589998888335698600 evaluation starts +peer0.org2.example.com | [3f86 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efcd50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f87 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efcd50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3f88 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efcd50 principal matched by identity 0 +peer0.org2.example.com | [3f89 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce ed 34 6b 9c 51 19 9a c6 0f 9a 68 d0 e0 3d b6 |..4k.Q.....h..=.| +peer0.org2.example.com | 00000010 47 f9 3a cc e9 16 f7 fb fd 63 7c 25 67 8a 8e b9 |G.:......c|%g...| +peer0.org2.example.com | [3f8a 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 24 ff 7f ca 7a b9 68 05 4b 1c |0E.!..$...z.h.K.| +peer0.org2.example.com | 00000010 02 3e 74 0f 29 b6 5e c5 ff 8a c6 a2 73 47 99 36 |.>t.).^.....sG.6| +peer0.org2.example.com | 00000020 36 f2 3a 88 bb 02 20 01 f2 a0 26 e0 25 f4 06 0f |6.:... ...&.%...| +peer0.org2.example.com | 00000030 8b 14 85 16 c0 12 fc f9 cd a7 be 08 10 c2 ca e5 |................| +peer0.org2.example.com | 00000040 31 0a 3c f0 1f bc 33 |1.<...3| +peer0.org2.example.com | [3f8b 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efcd50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f8c 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efcd50 gate 1589998888335698600 evaluation succeeds +peer0.org2.example.com | [3f8d 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f8e 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f8f 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f90 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f91 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f92 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3f93 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3f94 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3f95 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3f96 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f97 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f98 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f99 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f9a 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f9b 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3f9c 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f9d 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f9f 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3fa0 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fa1 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3fa2 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f9e 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa3 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa4 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa5 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa6 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa7 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa8 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3fa9 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3faa 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3d1b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be8a50 gate 1589998896155831700 evaluation starts +peer1.org1.example.com | [3d1c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be8a50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d1d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be8a50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d1e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be8a50 principal matched by identity 0 +peer1.org1.example.com | [3d1f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [3d20 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 d1 de 21 ea eb 0d 32 3e 98 7a 37 |0D. ...!...2>.z7| +peer1.org1.example.com | 00000010 56 8d 0c ff 1d b4 03 ef 67 cc 1c 5b f1 dd 13 26 |V.......g..[...&| +peer1.org1.example.com | 00000020 27 88 68 63 02 20 22 92 6b e0 25 82 ee 49 14 ed |'.hc. ".k.%..I..| +peer1.org1.example.com | 00000030 20 98 da 5f b0 01 d8 5b a9 25 d7 27 0f 64 21 54 | .._...[.%.'.d!T| +peer1.org1.example.com | 00000040 5e cd 90 e1 5b c2 |^...[.| +peer1.org1.example.com | [3d21 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be8a50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3d22 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be8a50 gate 1589998896155831700 evaluation succeeds +peer1.org1.example.com | [3d23 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d24 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d25 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d26 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d27 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:37784 +peer1.org1.example.com | [3d28 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:37784 +peer1.org1.example.com | [3d29 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d2a 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d2b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d2c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d2d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d2e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3d2f 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3d30 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d31 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d32 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d33 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d34 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d35 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d36 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3d37 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad1c0 gate 1589998896160453200 evaluation starts +peer1.org1.example.com | [3d38 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad1c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d6d 05-20 18:21:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d6e 05-20 18:21:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d6f 05-20 18:21:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d70 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d71 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d72 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d73 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d74 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d75 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d76 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d77 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d78 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d79 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3d7a 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d7b 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d7c 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d7d 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d7e 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d7f 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d80 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d81 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 gate 1589998883943017900 evaluation starts +peer0.org1.example.com | [3d82 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d83 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3d84 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 principal matched by identity 0 +peer0.org1.example.com | [3d85 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae ba aa f2 24 29 99 42 b5 68 89 5b a2 64 26 78 |....$).B.h.[.d&x| +peer0.org1.example.com | 00000010 51 13 28 2c 68 6a cd 60 8d 56 7d 83 b7 b3 1c 69 |Q.(,hj.`.V}....i| +peer0.org1.example.com | [3d86 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e d5 2e 0f fa 16 f4 f9 e6 69 36 bc |0D. .........i6.| +peer0.org1.example.com | 00000010 ef f8 a3 9a 55 37 19 71 17 ff 46 d7 3d ca 2d f3 |....U7.q..F.=.-.| +peer0.org1.example.com | 00000020 0f 7a 9f 9f 02 20 1a 1b 29 51 86 0f 02 b5 7e e9 |.z... ..)Q....~.| +peer0.org1.example.com | 00000030 95 84 e0 4a ff e1 b3 22 15 df 6b 07 ad fb 66 8d |...J..."..k...f.| +peer0.org1.example.com | 00000040 33 da f0 35 1e ad |3..5..| +peer0.org1.example.com | [3d87 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d88 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 gate 1589998883943017900 evaluation succeeds +peer0.org1.example.com | [3d89 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d8a 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d8b 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d8c 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d8d 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d8e 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3d8f 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3d90 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3d91 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3d92 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d93 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d94 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d95 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d96 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d97 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d98 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d99 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d9a 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d9b 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d9c 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d9d 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3d9e 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d9f 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da0 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da1 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da2 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da3 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da4 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da5 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3da6 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da7 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3da8 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3da9 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3daa 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dab 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fab 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3fac 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fad 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3fae 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3faf 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fb0 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fb1 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fb2 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fb3 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fb4 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fb5 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fb6 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fb7 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fb8 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fb9 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fba 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fbb 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [3fbc 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fbd 05-20 18:21:28.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [3fbe 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fbf 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fc0 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fc1 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3fc2 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fc3 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3fc4 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fc5 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fc6 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3fc7 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d39 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad1c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d3a 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3d3b 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad1c0 principal evaluation fails +peer1.org1.example.com | [3d3c 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad1c0 gate 1589998896160453200 evaluation fails +peer1.org1.example.com | [3d3d 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d3e 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d3f 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3d40 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad730 gate 1589998896160724500 evaluation starts +peer1.org1.example.com | [3d41 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad730 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d42 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad730 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d43 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3d44 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad730 principal evaluation fails +peer1.org1.example.com | [3d45 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bad730 gate 1589998896160724500 evaluation fails +peer1.org1.example.com | [3d46 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d47 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d48 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3d49 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003badca0 gate 1589998896160981400 evaluation starts +peer1.org1.example.com | [3d4a 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003badca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d4b 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003badca0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d4c 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003badca0 principal matched by identity 0 +peer1.org1.example.com | [3d4d 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [3d4e 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [3d4f 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003badca0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3d50 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003badca0 gate 1589998896160981400 evaluation succeeds +peer1.org1.example.com | [3d51 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d52 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d53 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d54 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d55 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d56 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d57 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3d58 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d59 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d5a 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d5b 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d5c 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d5d 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d5e 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3d5f 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c280 gate 1589998896162941100 evaluation starts +peer1.org1.example.com | [3d60 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c280 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d61 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c280 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d62 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3d63 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c280 principal evaluation fails +peer1.org1.example.com | [3d64 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c280 gate 1589998896162941100 evaluation fails +peer1.org1.example.com | [3d65 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d66 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d67 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3d68 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c7f0 gate 1589998896163593300 evaluation starts +peer1.org1.example.com | [3d69 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c7f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d6a 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c7f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d6b 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c7f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3d6c 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c7f0 principal evaluation fails +peer1.org1.example.com | [3d6d 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c7f0 gate 1589998896163593300 evaluation fails +peer1.org1.example.com | [3d6e 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d6f 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d70 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3d71 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1cd60 gate 1589998896164235800 evaluation starts +peer1.org1.example.com | [3d72 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1cd60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d73 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1cd60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d74 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1cd60 principal matched by identity 0 +peer1.org1.example.com | [3d75 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [3d76 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [3d77 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1cd60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3d78 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1cd60 gate 1589998896164235800 evaluation succeeds +peer1.org1.example.com | [3d79 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d7a 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d7b 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d7c 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d7d 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d7e 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d7f 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d80 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d81 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d82 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d83 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d84 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d85 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3d86 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3d87 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dac 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dad 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3dae 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161034 +peer0.org1.example.com | [3daf 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8CC96043DD5D6005B7FA4C05B57A1DE6D2FF2B4CF174E3EA2A7DFFDC7C998920 +peer0.org1.example.com | [3db0 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3db1 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3db2 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3db3 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3db4 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3db5 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3db6 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3db7 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3db8 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3db9 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dba 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3dbb 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3dbd 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dbc 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3dbf 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dbe 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3dc0 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dc1 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dc2 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dc3 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dc4 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dc5 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dc6 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dc7 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dc8 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dc9 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dca 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dcb 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dcc 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dcd 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dce 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dcf 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dd0 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3dd1 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dd2 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dd3 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dd4 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dd5 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3dd6 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dd7 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dd8 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dd9 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dda 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ddb 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3ddc 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer0.org1.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer0.org1.example.com | [3ddd 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer0.org1.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer0.org1.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer0.org1.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer0.org1.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer0.org1.example.com | [3dde 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3ddf 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 3a 6f 96 72 1d bd 6a f9 50 e0 |0E.!..:o.r..j.P.| +peer0.org1.example.com | 00000010 2d 9f d0 d9 6f ec 8c 62 05 c1 9c 67 4d de 0e 32 |-...o..b...gM..2| +peer0.org1.example.com | 00000020 10 ca 21 99 31 02 20 40 fa 15 5b 14 bc 3c 77 4d |..!.1. @..[.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3de1 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [3de2 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3de3 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3de4 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3de5 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3de6 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3de7 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3de8 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3de9 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dea 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3deb 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3fab 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016Y\275\311&\3479\314\364~A\206\330\253\251\260G\355\030\002 f\261e#*\010\345\027\317d\251S\2449{\370\027\276\003\315\232\030\361\273\250\336\334u\305\207\372`" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fac 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3fad 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer1.org2.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer1.org2.example.com | [3fae 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer1.org2.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer1.org2.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer1.org2.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer1.org2.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer1.org2.example.com | [3faf 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3fb0 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 57 ec d3 e5 c1 f1 7b 7b 17 0d |0E.!..W.....{{..| +peer1.org2.example.com | 00000010 9b 3e 0e 59 bd c9 26 e7 39 cc f4 7e 41 86 d8 ab |.>.Y..&.9..~A...| +peer1.org2.example.com | 00000020 a9 b0 47 ed 18 02 20 66 b1 65 23 2a 08 e5 17 cf |..G... f.e#*....| +peer1.org2.example.com | 00000030 64 a9 53 a4 39 7b f8 17 be 03 cd 9a 18 f1 bb a8 |d.S.9{..........| +peer1.org2.example.com | 00000040 de dc 75 c5 87 fa 60 |..u...`| +peer1.org2.example.com | [3fb1 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3fb2 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [3fb3 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3fb4 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3fb5 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3fb6 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fb7 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fb8 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fb9 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3fba 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbb 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbc 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3fbd 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\016Y\275\311&\3479\314\364~A\206\330\253\251\260G\355\030\002 f\261e#*\010\345\027\317d\251S\2449{\370\027\276\003\315\232\030\361\273\250\336\334u\305\207\372`" > > alive: +peer1.org2.example.com | [3fbe 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fbf 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fc0 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fc1 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d88 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d89 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d8a 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d8b 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d8c 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d8d 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3d8e 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09180 gate 1589998896391017500 evaluation starts +peer1.org1.example.com | [3d8f 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09180 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d90 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09180 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d91 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3d92 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09180 principal evaluation fails +peer1.org1.example.com | [3d93 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09180 gate 1589998896391017500 evaluation fails +peer1.org1.example.com | [3d94 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d95 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d96 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3d97 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c096f0 gate 1589998896393533900 evaluation starts +peer1.org1.example.com | [3d98 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c096f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d99 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c096f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3d9a 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c096f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3d9b 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c096f0 principal evaluation fails +peer1.org1.example.com | [3d9c 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c096f0 gate 1589998896393533900 evaluation fails +peer1.org1.example.com | [3d9d 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d9e 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d9f 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3da0 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09c60 gate 1589998896395173300 evaluation starts +peer1.org1.example.com | [3da1 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09c60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3da2 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09c60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3da3 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09c60 principal matched by identity 0 +peer1.org1.example.com | [3da4 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [3da5 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [3da6 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09c60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3da7 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c09c60 gate 1589998896395173300 evaluation succeeds +peer1.org1.example.com | [3da8 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3da9 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3daa 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3dab 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3dac 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3dad 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dae 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3daf 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3db0 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [3db1 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3db2 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3db3 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3db4 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3db5 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3db6 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3db7 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3db8 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3db9 05-20 18:21:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dba 05-20 18:21:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dbb 05-20 18:21:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dbc 05-20 18:21:36.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dbd 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3dbe 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3dbf 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3dc0 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3dc1 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dc2 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dc3 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dc4 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dc5 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dc6 05-20 18:21:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3dc7 05-20 18:21:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161045 +peer1.org1.example.com | [3dc8 05-20 18:21:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D6B1EACC314BA184F6A074F923C04EC0A7AE5723C0001F62EEC4EBDC3400A5B3 +peer1.org1.example.com | [3dc9 05-20 18:21:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3dca 05-20 18:21:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3dcb 05-20 18:21:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3dcc 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fc2 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fc3 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3fc4 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fc5 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3fc6 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fc7 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fc8 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3fc9 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3fca 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3fcb 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003decf70 gate 1589998889003329900 evaluation starts +peer1.org2.example.com | [3fcc 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003decf70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fcd 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003decf70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3fce 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003decf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3fcf 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003decf70 principal evaluation fails +peer1.org2.example.com | [3fd0 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003decf70 gate 1589998889003329900 evaluation fails +peer1.org2.example.com | [3fd1 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3fd2 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3fd3 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3fd4 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ded4e0 gate 1589998889003907600 evaluation starts +peer1.org2.example.com | [3fd5 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ded4e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fd6 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ded4e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3fd7 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ded4e0 principal matched by identity 0 +peer1.org2.example.com | [3fd8 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +peer1.org2.example.com | 00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +peer1.org2.example.com | [3fd9 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +peer1.org2.example.com | 00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +peer1.org2.example.com | 00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +peer1.org2.example.com | 00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +peer1.org2.example.com | 00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +peer1.org2.example.com | [3fda 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ded4e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3fdb 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ded4e0 gate 1589998889003907600 evaluation succeeds +peer1.org2.example.com | [3fdc 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fdd 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fde 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3fdf 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3fe0 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fe1 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3dec 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +peer0.org1.example.com | [3ded 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dee 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3def 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3df0 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3df1 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3df2 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df3 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df4 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df5 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df6 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df7 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df8 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3df9 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dfa 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3dfb 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3dfc 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3dfd 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3dff 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3e00 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e01 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e02 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e03 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e04 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dfe 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e05 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e06 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e07 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e08 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e09 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dcd 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3dce 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3dcf 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dd0 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dd1 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dd2 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dd3 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dd4 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dd5 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dd6 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3dd7 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +peer1.org1.example.com | 00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +peer1.org1.example.com | [3dd8 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +peer1.org1.example.com | 00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +peer1.org1.example.com | 00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +peer1.org1.example.com | 00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +peer1.org1.example.com | 00000040 e0 0a 77 e4 aa d8 81 |..w....| +peer1.org1.example.com | [3dd9 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3dda 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 43 36 2c 59 3f 58 4a bf 2e 0b |0E.!..C6,Y?XJ...| +peer1.org1.example.com | 00000010 fb 6b 5d ff 01 89 c6 8d f7 0e 34 c0 a2 61 84 57 |.k].......4..a.W| +peer1.org1.example.com | 00000020 ab ee 94 55 c9 02 20 71 55 8b 1b 85 02 4c 85 97 |...U.. qU....L..| +peer1.org1.example.com | 00000030 fc f1 27 9d 99 58 08 0a 6a 86 8e 4c 50 5d 95 6c |..'..X..j..LP].l| +peer1.org1.example.com | 00000040 9b 22 85 47 6f 16 01 |.".Go..| +peer1.org1.example.com | [3ddb 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3ddc 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3ddd 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dde 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ddf 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3de0 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3de1 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3de2 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3de3 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3de4 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +peer1.org1.example.com | 00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +peer1.org1.example.com | [3de5 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +peer1.org1.example.com | 00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +peer1.org1.example.com | 00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +peer1.org1.example.com | 00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +peer1.org1.example.com | 00000040 e0 0a 77 e4 aa d8 81 |..w....| +peer0.org2.example.com | [3fc8 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3fc9 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d3b0 gate 1589998888613606800 evaluation starts +peer0.org2.example.com | [3fca 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d3b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fcb 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d3b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3fcc 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3fcd 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d3b0 principal evaluation fails +peer0.org2.example.com | [3fce 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d3b0 gate 1589998888613606800 evaluation fails +peer0.org2.example.com | [3fcf 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3fd0 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3fd1 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3fd2 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d920 gate 1589998888614379000 evaluation starts +peer0.org2.example.com | [3fd3 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d920 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fd4 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d920 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [3fd5 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d920 principal matched by identity 0 +peer0.org2.example.com | [3fd6 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer0.org2.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer0.org2.example.com | [3fd7 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer0.org2.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer0.org2.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer0.org2.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer0.org2.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer0.org2.example.com | [3fd8 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d920 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3fd9 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d920 gate 1589998888614379000 evaluation succeeds +peer0.org2.example.com | [3fda 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fdb 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fdc 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3fdd 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3fde 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3fdf 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3fe0 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3fe1 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3fe2 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3fe3 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fe4 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fe5 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fe6 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3fe7 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fe8 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fe9 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fea 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3feb 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > alive: +peer0.org2.example.com | [3fec 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fed 05-20 18:21:28.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fee 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3fef 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161037 +peer0.org2.example.com | [3ff0 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4B25C1A0947E60348E314C352F357791B0B5052A7ED6752444F41D18C0EE0A61 +peer0.org2.example.com | [3ff1 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3ff2 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3ff3 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3ff4 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [3ff5 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ff6 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ff7 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ff8 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3ff9 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3ffa 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ffb 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3ffc 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ffd 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ffe 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3fff 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4000 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4001 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4002 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4003 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4004 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [4005 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4006 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4007 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4008 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4009 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [400a 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [400b 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [400c 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [400d 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [400e 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [400f 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3de6 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3de7 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3de8 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3de9 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dea 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3deb 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dec 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ded 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3dee 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3def 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df0 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df1 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df2 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3df3 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3df4 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3df5 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3df6 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3df7 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3df8 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3df9 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dfa 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3dfb 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dfc 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3dfd 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3dfe 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3dff 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e00 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3e01 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3e02 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3e03 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93430 gate 1589998896929770100 evaluation starts +peer1.org1.example.com | [3e04 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93430 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e05 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93430 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3e06 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3e07 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93430 principal evaluation fails +peer1.org1.example.com | [3e08 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93430 gate 1589998896929770100 evaluation fails +peer1.org1.example.com | [3e09 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e0a 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e0b 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3e0c 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c939a0 gate 1589998896930062800 evaluation starts +peer1.org1.example.com | [3e0d 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c939a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e0e 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c939a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3e0f 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c939a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3e10 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c939a0 principal evaluation fails +peer1.org1.example.com | [3e11 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c939a0 gate 1589998896930062800 evaluation fails +peer1.org1.example.com | [3e12 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e13 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e14 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3e15 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93f10 gate 1589998896930435500 evaluation starts +peer1.org1.example.com | [3e16 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93f10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e17 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93f10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3e18 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93f10 principal matched by identity 0 +peer1.org1.example.com | [3e19 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer1.org1.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer1.org1.example.com | [3e1a 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer1.org1.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer1.org1.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer1.org1.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer1.org1.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer1.org1.example.com | [3e1b 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93f10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3e1c 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c93f10 gate 1589998896930435500 evaluation succeeds +peer1.org1.example.com | [3e1d 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e1e 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e1f 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3e20 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3e21 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e22 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1589998788646755100 64 {} [] 0} +peer1.org1.example.com | [3e23 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e24 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e25 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e26 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3e27 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e28 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e29 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e2a 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e0a 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e0b 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e0c 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e0d 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e0e 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e0f 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e10 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e11 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e12 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e13 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e14 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e15 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e16 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3e17 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e18 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e19 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e1a 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e1b 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3e1c 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3e1d 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3e1e 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 gate 1589998884934275500 evaluation starts +peer0.org1.example.com | [3e1f 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e20 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3e21 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 principal matched by identity 0 +peer0.org1.example.com | [3e22 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer0.org1.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer0.org1.example.com | [3e23 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer0.org1.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer0.org1.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer0.org1.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer0.org1.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer0.org1.example.com | [3e24 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e25 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 gate 1589998884934275500 evaluation succeeds +peer0.org1.example.com | [3e26 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e27 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e28 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e29 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e2a 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e2b 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3e2c 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3e2d 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3e2e 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3e2f 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e30 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e31 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e32 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [3e33 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e34 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e35 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e36 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e37 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > alive: alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +peer0.org1.example.com | [3e38 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e39 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e3a 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3e2b 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [3e2c 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e2d 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e2e 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\364.\033B&" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e2f 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e30 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364.\033B&" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e31 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3e32 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +peer1.org1.example.com | 00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +peer1.org1.example.com | [3e33 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +peer1.org1.example.com | 00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +peer1.org1.example.com | 00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +peer1.org1.example.com | 00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +peer1.org1.example.com | 00000040 3e f4 2e 1b 42 26 |>...B&| +peer1.org1.example.com | [3e34 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3e35 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 5b 71 c9 07 f3 23 81 a7 2b 11 b2 |0D. .[q...#..+..| +peer1.org1.example.com | 00000010 dc 11 ac f2 1b 4c c6 59 9e f3 ec c9 5a a5 df 52 |.....L.Y....Z..R| +peer1.org1.example.com | 00000020 4c ae 3c 45 02 20 21 8f 82 7c f7 d4 e4 c4 2a 03 |L. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3e37 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [3e38 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3e39 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3e3a 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3e3b 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e3c 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e3d 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e3e 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [3e3f 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e40 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e41 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4010 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4011 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4012 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4013 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4014 05-20 18:21:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4015 05-20 18:21:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4016 05-20 18:21:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4017 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4018 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4019 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [401a 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [401b 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [401c 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [401d 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [401e 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [401f 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [4020 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4021 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4022 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4023 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4024 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4025 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 1e 74 7c 7e b9 e3 9f 9f a7 fb f1 a8 7d df ee |8.t|~........}..| +peer0.org2.example.com | 00000010 68 7e 2a 3f 2e 2b 10 2e 4a 64 bb d2 e9 77 f8 a1 |h~*?.+..Jd...w..| +peer0.org2.example.com | [4026 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 fd cd 4c f8 c1 51 90 7e 36 0b |0E.!....L..Q.~6.| +peer0.org2.example.com | 00000010 42 28 0c 3a 7b e5 84 a3 1f e3 88 4e 2f 01 3c e7 |B(.:{......N/.<.| +peer0.org2.example.com | 00000020 0e d1 cb fe 77 02 20 34 5c 17 c5 c1 40 1b e9 55 |....w. 4\...@..U| +peer0.org2.example.com | 00000030 89 dd ae 66 19 2c a2 ff 23 2b 86 b5 9e 5c d7 02 |...f.,..#+...\..| +peer0.org2.example.com | 00000040 ee 64 9e 75 a1 03 51 |.d.u..Q| +peer0.org2.example.com | [4027 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4028 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4029 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [402a 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3fe2 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3fe3 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3fe4 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3fe5 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fe6 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fe7 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3fe8 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fe9 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fea 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3feb 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3fec 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [3fed 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fee 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fef 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ff0 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ff1 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ff2 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ff3 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3ff4 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ff5 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ff6 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ff7 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e3b 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161035 +peer0.org1.example.com | [3e3c 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3D0A95993D0E77D691A7A148CF3680F4A27DEF2CF051658036C329E8F5E17F54 +peer0.org1.example.com | [3e3d 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e3e 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3e3f 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3e40 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e41 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e42 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e44 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e45 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e47 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e43 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e46 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e48 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e49 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e4a 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e4b 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e4c 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e4d 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e4e 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e4f 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3e50 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer0.org1.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer0.org1.example.com | [3e51 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer0.org1.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer0.org1.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer0.org1.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer0.org1.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer0.org1.example.com | [3e52 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e53 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e54 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [3e55 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 3d 9f c4 1d b5 e6 49 a1 c7 04 af |0D. 1=.....I....| +peer0.org2.example.com | [402b 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [402c 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [402d 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [402e 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [402f 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4030 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4031 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4032 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4033 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4034 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4035 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4036 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4037 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4038 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4039 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [403a 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161038 +peer0.org2.example.com | [403b 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7D95C0007AAA1CD1220884A2543A9A3B85BB0902E9D850FBEDD4739863F82965 +peer0.org2.example.com | [403c 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [403d 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [403e 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [403f 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4040 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4041 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4042 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4043 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4044 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4046 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4047 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4045 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\016Y\275\311&\3479\314\364~A\206\330\253\251\260G\355\030\002 f\261e#*\010\345\027\317d\251S\2449{\370\027\276\003\315\232\030\361\273\250\336\334u\305\207\372`" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4048 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4049 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ff8 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ff9 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ffa 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3ffb 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcf890 gate 1589998889032319600 evaluation starts +peer1.org2.example.com | [3ffc 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcf890 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ffd 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcf890 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [3ffe 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcf890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3fff 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcf890 principal evaluation fails +peer1.org2.example.com | [4000 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcf890 gate 1589998889032319600 evaluation fails +peer1.org2.example.com | [4001 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4002 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4003 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4004 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcfe00 gate 1589998889035571700 evaluation starts +peer1.org2.example.com | [4005 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcfe00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4006 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcfe00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4007 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcfe00 principal matched by identity 0 +peer1.org2.example.com | [4009 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 06 9e ab 2f 17 ac 20 ac ac 13 e8 81 39 87 ba |..../.. .....9..| +peer1.org2.example.com | 00000010 1b 35 ba d6 ed bc 07 a3 94 fc 64 7c c6 6f e6 4d |.5........d|.o.M| +peer1.org2.example.com | [400a 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 a6 41 a7 ed f6 df 93 cc c4 23 ff |0D. U.A.......#.| +peer1.org2.example.com | 00000010 ab 35 79 86 4d a2 ec ba 68 ab 46 ee 77 d9 4f de |.5y.M...h.F.w.O.| +peer1.org2.example.com | 00000020 14 33 f8 83 02 20 42 7d bd a7 6a f0 a9 5a a6 9b |.3... B}..j..Z..| +peer1.org2.example.com | 00000030 c1 3c 5f 08 51 b8 75 f9 f1 fe 30 e4 df c2 a3 2e |.<_.Q.u...0.....| +peer1.org2.example.com | 00000040 14 79 20 a4 a5 97 |.y ...| +peer1.org2.example.com | [4008 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [400b 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [400c 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcfe00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [400d 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcfe00 gate 1589998889035571700 evaluation succeeds +peer1.org2.example.com | [400e 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [400f 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4010 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4011 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4012 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4013 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4014 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4015 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4016 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4017 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4018 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4019 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [401a 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [401b 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [401c 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [401d 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [401e 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [404a 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [404b 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [404c 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [404d 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [404e 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [404f 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4050 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4051 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4052 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4053 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4054 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4055 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4056 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4057 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4058 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4059 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [405a 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [405b 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8b960 gate 1589998888926818900 evaluation starts +peer0.org2.example.com | [405e 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8b960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [405f 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8b960 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [405c 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\016Y\275\311&\3479\314\364~A\206\330\253\251\260G\355\030\002 f\261e#*\010\345\027\317d\251S\2449{\370\027\276\003\315\232\030\361\273\250\336\334u\305\207\372`" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [4060 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [405d 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4061 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8b960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [4062 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8b960 principal evaluation fails +peer0.org2.example.com | [4063 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8b960 gate 1589998888926818900 evaluation fails +peer0.org2.example.com | [4064 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e42 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\364.\033B&" secret_envelope: > alive: +peer1.org1.example.com | [3e43 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e44 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e45 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e46 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e47 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e48 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e49 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e4a 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e4b 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e4c 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e4d 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e4e 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [3e4f 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e50 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e51 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e52 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e53 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e54 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3e55 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e56 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 f9 a8 0d d0 37 b4 21 df ae 99 8c 00 7b 96 50 cd |....7.!.....{.P.| +peer0.org1.example.com | 00000020 71 40 a3 1b 02 20 13 4b d0 c2 9c cb 9d 40 1f 58 |q@... .K.....@.X| +peer0.org1.example.com | 00000030 6b ae db 46 f7 cb c4 1b d8 28 1f 07 e7 93 a1 9a |k..F.....(......| +peer0.org1.example.com | 00000040 af fe aa 58 f2 69 |...X.i| +peer0.org1.example.com | [3e56 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3e57 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3e58 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e59 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e5a 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e5b 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3e5c 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e5d 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e5e 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e5f 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e60 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e61 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3e62 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3e63 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3e64 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 gate 1589998885058007200 evaluation starts +peer0.org1.example.com | [3e65 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e66 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3e67 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 principal matched by identity 0 +peer0.org1.example.com | [3e68 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +peer0.org1.example.com | 00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +peer0.org1.example.com | [3e69 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +peer0.org1.example.com | 00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +peer0.org1.example.com | 00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +peer0.org1.example.com | 00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +peer0.org1.example.com | 00000040 fe 14 6f 1a 6f 3b |..o.o;| +peer0.org1.example.com | [3e6a 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e6b 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 gate 1589998885058007200 evaluation succeeds +peer0.org1.example.com | [3e6d 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e6e 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e6c 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e70 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e6f 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e71 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [401f 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4020 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4021 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4022 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4023 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4024 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4025 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4026 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4027 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4028 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4029 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [402a 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [402b 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [402c 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [402d 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [402e 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [402f 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [4030 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4031 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [4032 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4033 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [4034 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4035 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4036 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4037 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4038 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4039 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [403a 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [403b 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [403c 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [403d 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [403e 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4065 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4066 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4067 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8bed0 gate 1589998888945053100 evaluation starts +peer0.org2.example.com | [4068 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8bed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4069 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8bed0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [406a 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8bed0 principal matched by identity 0 +peer0.org2.example.com | [406b 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer0.org2.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer0.org2.example.com | [406c 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer0.org2.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer0.org2.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer0.org2.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer0.org2.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer0.org2.example.com | [406d 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8bed0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [406e 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8bed0 gate 1589998888945053100 evaluation succeeds +peer0.org2.example.com | [406f 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4070 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4071 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4072 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4073 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4074 05-20 18:21:28.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4075 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4076 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer0.org2.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer0.org2.example.com | [4077 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer0.org2.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer0.org2.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer0.org2.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer0.org2.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer0.org2.example.com | [4078 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4079 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [407a 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [407b 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [407c 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [407d 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [407e 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [407f 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4080 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4081 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [4082 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4083 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4084 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4085 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4086 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4087 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4088 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4089 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [408a 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [408b 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0190 gate 1589998888954513600 evaluation starts +peer0.org2.example.com | [408c 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [408d 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0190 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [408e 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [408f 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0190 principal evaluation fails +peer0.org2.example.com | [4090 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0190 gate 1589998888954513600 evaluation fails +peer0.org2.example.com | [4091 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4092 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4093 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4094 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0700 gate 1589998888955452800 evaluation starts +peer0.org2.example.com | [4095 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4096 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0700 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4097 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0700 principal matched by identity 0 +peer0.org2.example.com | [4098 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer0.org2.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer0.org2.example.com | [4099 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer0.org2.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer0.org2.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer0.org2.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer0.org2.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer0.org2.example.com | [409a 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0700 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [409b 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff0700 gate 1589998888955452800 evaluation succeeds +peer0.org2.example.com | [409c 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [409d 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [409e 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [409f 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [40a0 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40a1 05-20 18:21:28.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40a2 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [40a3 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer0.org1.example.com | [3e72 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e73 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e74 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3e75 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer0.org1.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer0.org1.example.com | [3e76 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer0.org1.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer0.org1.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer0.org1.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer0.org1.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer0.org1.example.com | [3e77 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e78 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e79 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e7a 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3e7b 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer0.org1.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer0.org1.example.com | [3e7c 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer0.org1.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer0.org1.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer0.org1.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer0.org1.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer0.org1.example.com | [3e7d 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3e7e 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e7f 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e80 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e82 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3e83 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +peer0.org1.example.com | 00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +peer0.org1.example.com | [3e84 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +peer0.org1.example.com | 00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +peer0.org1.example.com | 00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +peer0.org1.example.com | 00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +peer0.org1.example.com | 00000040 17 32 b4 90 25 64 99 |.2..%d.| +peer0.org1.example.com | [3e81 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e85 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3e86 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e87 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3e88 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +peer0.org1.example.com | 00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +peer0.org1.example.com | [3e89 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +peer0.org1.example.com | 00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +peer0.org1.example.com | 00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +peer0.org1.example.com | 00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +peer0.org1.example.com | 00000040 bd e8 97 78 5b 4c |...x[L| +peer0.org1.example.com | [3e8a 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e8b 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e8c 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e8d 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e8e 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e8f 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e57 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e58 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e59 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3e5a 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3e5b 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3e5c 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca51a0 gate 1589998897195750600 evaluation starts +peer1.org1.example.com | [3e5d 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca51a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e5e 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca51a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3e5f 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca51a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3e60 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca51a0 principal evaluation fails +peer1.org1.example.com | [3e61 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca51a0 gate 1589998897195750600 evaluation fails +peer1.org1.example.com | [3e62 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e63 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e64 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3e65 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5710 gate 1589998897198577000 evaluation starts +peer1.org1.example.com | [3e66 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5710 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e67 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5710 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3e68 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3e69 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5710 principal evaluation fails +peer1.org1.example.com | [3e6a 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5710 gate 1589998897198577000 evaluation fails +peer1.org1.example.com | [3e6b 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e6c 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e6d 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3e6e 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5c80 gate 1589998897201950100 evaluation starts +peer1.org1.example.com | [3e6f 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5c80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e70 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5c80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3e71 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5c80 principal matched by identity 0 +peer1.org1.example.com | [3e72 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 11 3f d7 a4 00 f7 4e 9d cb af d7 2f c5 f6 25 |..?....N..../..%| +peer1.org1.example.com | 00000010 71 2b c5 89 c1 36 c3 82 83 b7 2a 73 6f 30 42 92 |q+...6....*so0B.| +peer1.org1.example.com | [3e73 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 fc 7c ce 9e 88 61 08 c3 5d ce |0E.!...|...a..].| +peer1.org1.example.com | 00000010 26 19 a5 e3 4e e9 73 09 8a d5 6e 0c 40 76 d0 6c |&...N.s...n.@v.l| +peer1.org1.example.com | 00000020 2b fd b8 c5 c3 02 20 27 09 ea e2 44 a2 e8 55 5a |+..... '...D..UZ| +peer1.org1.example.com | 00000030 e1 29 e0 aa 3d bf eb b8 9a 06 bf aa 2a de 1e ec |.)..=.......*...| +peer1.org1.example.com | 00000040 a1 18 53 1f 04 82 f0 |..S....| +peer1.org1.example.com | [3e74 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5c80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3e75 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5c80 gate 1589998897201950100 evaluation succeeds +peer1.org1.example.com | [3e76 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e77 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e78 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3e79 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3e7a 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e7b 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3e7c 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3e7d 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3e7e 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3e7f 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e80 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e81 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e82 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [3e83 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e84 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [403f 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4040 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4041 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4042 05-20 18:21:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4043 05-20 18:21:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4044 05-20 18:21:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4045 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4046 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816103A +peer1.org2.example.com | [4047 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1D96A5BFE161BA4751D6FF3F2BB4EC883899701A2EDCE04C683D8D0C96E08703 +peer1.org2.example.com | [4048 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4049 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [404a 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [404b 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [404c 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [404d 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [404e 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [404f 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4050 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4051 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4052 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4053 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e90 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e91 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e92 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e93 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e94 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e95 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e96 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e97 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3e98 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e99 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e9a 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e9b 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e9c 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e9d 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3e9e 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e9f 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ea0 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ea1 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ea2 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ea3 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ea4 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ea5 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 gate 1589998885216571000 evaluation starts +peer0.org1.example.com | [3ea6 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ea7 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3ea8 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 principal matched by identity 0 +peer0.org1.example.com | [3ea9 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 17 ca 1c e9 94 63 04 ee b0 29 0d 30 67 8d 01 |......c...).0g..| +peer0.org1.example.com | 00000010 1d 4b 42 72 7c 6f 36 9b 97 86 eb 47 d9 8e f0 2d |.KBr|o6....G...-| +peer0.org1.example.com | [3eaa 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8e dd 23 fa 21 3c f0 19 20 e2 |0E.!....#.!<.. .| +peer0.org1.example.com | 00000010 b5 34 85 9e a9 24 67 bb 0c b5 51 ba 8d d2 c0 46 |.4...$g...Q....F| +peer0.org1.example.com | 00000020 25 5d fc 57 58 02 20 65 dd ea c7 45 18 d0 0a b3 |%].WX. e...E....| +peer0.org1.example.com | 00000030 3d 15 ce bc 17 04 6f ff 99 5b 87 e8 95 9f 51 61 |=.....o..[....Qa| +peer0.org2.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer0.org2.example.com | [40a4 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer0.org2.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer0.org2.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer0.org2.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer0.org2.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer0.org2.example.com | [40a5 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40a6 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40a7 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40a8 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40a9 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [40aa 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e85 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e86 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3e87 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\364.\033B&" > alive: alive: alive: +peer1.org1.example.com | [3e88 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e89 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e8a 05-20 18:21:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3e8b 05-20 18:21:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161046 +peer1.org1.example.com | [3e8c 05-20 18:21:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 088251E7CF80B556B93FD3C0218D63FEFF9575D07B648D532822D843C2AA008F +peer1.org1.example.com | [3e8d 05-20 18:21:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3e8e 05-20 18:21:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3e8f 05-20 18:21:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3e90 05-20 18:21:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3e91 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e92 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e93 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e94 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3e95 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3e96 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e97 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3e98 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e99 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e9a 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e9b 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e9c 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e9d 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e9e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e9f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4054 05-20 18:21:29.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [4055 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4056 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4057 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4058 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4059 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [405a 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer1.org2.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer1.org2.example.com | [405b 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [405c 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [405d 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer1.org2.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer1.org2.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer1.org2.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer1.org2.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer1.org2.example.com | [405e 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [405f 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4060 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4061 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer1.org2.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer1.org2.example.com | [4062 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer1.org2.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer1.org2.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer1.org2.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer1.org2.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer1.org2.example.com | [4063 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4064 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4065 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4066 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4067 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4068 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4069 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer1.org2.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer1.org2.example.com | [406a 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer1.org2.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer1.org2.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer1.org2.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer1.org2.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer1.org2.example.com | [406b 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [406c 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 eb 7d b9 82 f3 e1 55 5d 91 de |0E.!...}....U]..| +peer1.org2.example.com | 00000010 f6 56 ba d4 5b 5e 30 5d d7 ea be bc 7e ac 0c 40 |.V..[^0]....~..@| +peer1.org2.example.com | 00000020 56 1c 33 87 2b 02 20 3d 1a 90 f1 1e 59 db bf c4 |V.3.+. =....Y...| +peer1.org2.example.com | 00000030 a4 2d 9b a3 41 5d 5a 2f 11 bd 7c e8 26 f1 d2 f1 |.-..A]Z/..|.&...| +peer1.org2.example.com | 00000040 54 4a 92 d6 75 c6 ea |TJ..u..| +peer1.org2.example.com | [406d 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [406e 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [406f 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4070 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4071 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4072 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4073 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4074 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4075 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4076 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4077 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4078 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4079 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [407a 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [407b 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [407c 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [407d 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b550 gate 1589998889204360100 evaluation starts +peer1.org2.example.com | [407e 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [407f 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b550 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4080 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4081 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b550 principal evaluation fails +peer1.org2.example.com | [4082 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b550 gate 1589998889204360100 evaluation fails +peer1.org2.example.com | [4083 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4084 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4085 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4086 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8bac0 gate 1589998889206057300 evaluation starts +peer1.org2.example.com | [4087 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8bac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4088 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8bac0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4089 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8bac0 principal matched by identity 0 +peer1.org2.example.com | [408a 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer1.org2.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer1.org2.example.com | [408b 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer1.org2.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer1.org2.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer1.org2.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer0.org2.example.com | [40ab 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [40ac 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer0.org2.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer0.org2.example.com | [40ad 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer0.org2.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer0.org2.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer0.org2.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer0.org2.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer0.org2.example.com | [40ae 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [40af 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 57 ec d3 e5 c1 f1 7b 7b 17 0d |0E.!..W.....{{..| +peer0.org2.example.com | 00000010 9b 3e 0e 59 bd c9 26 e7 39 cc f4 7e 41 86 d8 ab |.>.Y..&.9..~A...| +peer0.org2.example.com | 00000020 a9 b0 47 ed 18 02 20 66 b1 65 23 2a 08 e5 17 cf |..G... f.e#*....| +peer0.org2.example.com | 00000030 64 a9 53 a4 39 7b f8 17 be 03 cd 9a 18 f1 bb a8 |d.S.9{..........| +peer0.org2.example.com | 00000040 de dc 75 c5 87 fa 60 |..u...`| +peer0.org2.example.com | [40b0 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [40b1 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [40b2 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b3 05-20 18:21:28.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b4 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [40b5 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b6 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [40b7 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [40b8 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40b9 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [40ba 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40bb 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40bc 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [40bd 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [40be 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [40bf 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020680 gate 1589998889003364100 evaluation starts +peer1.org2.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer1.org2.example.com | [408c 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8bac0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [408d 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8bac0 gate 1589998889206057300 evaluation succeeds +peer1.org2.example.com | [408e 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [408f 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4090 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [40c0 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020680 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40c1 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020680 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [40c2 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [40c3 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020680 principal evaluation fails +peer0.org2.example.com | [40c4 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020680 gate 1589998889003364100 evaluation fails +peer0.org2.example.com | [40c5 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [40c6 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [40c7 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [40c8 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020bf0 gate 1589998889003645800 evaluation starts +peer0.org2.example.com | [40c9 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40ca 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020bf0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [40cb 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020bf0 principal matched by identity 0 +peer0.org2.example.com | [40cc 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +peer0.org2.example.com | 00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +peer0.org2.example.com | [40cd 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +peer0.org2.example.com | 00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +peer0.org2.example.com | 00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +peer0.org2.example.com | 00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +peer0.org2.example.com | 00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +peer0.org2.example.com | [40ce 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020bf0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [40cf 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004020bf0 gate 1589998889003645800 evaluation succeeds +peer0.org2.example.com | [40d0 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [40d1 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [40d2 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [40d3 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [40d4 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40d5 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [40d6 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [40d7 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [40d8 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [40d9 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40da 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40db 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40dc 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [40dd 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40de 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40df 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40e0 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000040 f5 4c ff 9c 63 33 48 |.L..c3H| +peer0.org1.example.com | [3eab 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3eac 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 gate 1589998885216571000 evaluation succeeds +peer0.org1.example.com | [3ead 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3eae 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3eaf 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3eb0 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3eb1 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3eb2 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3eb3 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3eb4 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3eb5 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3eb6 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3eb7 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3eb8 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3eb9 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3eba 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ebb 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ebc 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ebd 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3ebe 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > alive: alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +peer0.org1.example.com | [3ebf 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ec0 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ec1 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [3ec2 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [3ec3 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3ec4 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610121801 +peer0.org1.example.com | [3ec5 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BFBB526AE637BF39588E041A31529426104E84EB02F04D014FA825B8F8F5F27D +peer0.org1.example.com | [3ec6 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [3ec7 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ec8 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ec9 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3eca 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ecb 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3ecc 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ecd 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ece 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [40e1 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [40e2 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [40e3 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40e4 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [40e5 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40e6 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [40e7 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [40e8 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40e9 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [40ea 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40eb 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40ec 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [40ed 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [40ee 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [40ef 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004046b00 gate 1589998889028600100 evaluation starts +peer0.org2.example.com | [40f0 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004046b00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40f1 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004046b00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [40f2 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004046b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [40f3 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004046b00 principal evaluation fails +peer0.org2.example.com | [40f4 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004046b00 gate 1589998889028600100 evaluation fails +peer0.org2.example.com | [40f5 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [40f6 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [40f7 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [40f8 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004047070 gate 1589998889031519100 evaluation starts +peer0.org2.example.com | [40f9 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004047070 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40fa 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004047070 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [40fb 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004047070 principal matched by identity 0 +peer0.org2.example.com | [40fc 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 06 9e ab 2f 17 ac 20 ac ac 13 e8 81 39 87 ba |..../.. .....9..| +peer0.org2.example.com | 00000010 1b 35 ba d6 ed bc 07 a3 94 fc 64 7c c6 6f e6 4d |.5........d|.o.M| +peer0.org2.example.com | [40fd 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 a6 41 a7 ed f6 df 93 cc c4 23 ff |0D. U.A.......#.| +peer0.org2.example.com | 00000010 ab 35 79 86 4d a2 ec ba 68 ab 46 ee 77 d9 4f de |.5y.M...h.F.w.O.| +peer0.org2.example.com | 00000020 14 33 f8 83 02 20 42 7d bd a7 6a f0 a9 5a a6 9b |.3... B}..j..Z..| +peer0.org2.example.com | 00000030 c1 3c 5f 08 51 b8 75 f9 f1 fe 30 e4 df c2 a3 2e |.<_.Q.u...0.....| +peer0.org2.example.com | 00000040 14 79 20 a4 a5 97 |.y ...| +peer0.org2.example.com | [40fe 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004047070 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [40ff 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004047070 gate 1589998889031519100 evaluation succeeds +peer0.org2.example.com | [4100 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4101 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4102 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4103 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4104 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4105 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4106 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4107 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4108 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4109 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [410a 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [410b 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [410c 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ea0 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ea1 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3ea2 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ea3 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ea4 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ea5 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ea6 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ea7 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ea8 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3ea9 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0df60 gate 1589998898653129500 evaluation starts +peer1.org1.example.com | [3eaa 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0df60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3eab 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0df60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3eac 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0df60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3ead 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0df60 principal evaluation fails +peer1.org1.example.com | [3eae 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d0df60 gate 1589998898653129500 evaluation fails +peer1.org1.example.com | [3eaf 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3eb0 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3eb1 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3eb2 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d324d0 gate 1589998898655227100 evaluation starts +peer1.org1.example.com | [3eb3 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d324d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3eb4 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d324d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3eb5 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d324d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3eb6 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d324d0 principal evaluation fails +peer1.org1.example.com | [3eb7 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d324d0 gate 1589998898655227100 evaluation fails +peer1.org1.example.com | [3eb8 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3eb9 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3eba 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ebb 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32a40 gate 1589998898658745800 evaluation starts +peer1.org1.example.com | [3ebc 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32a40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ebd 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32a40 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3ebe 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32a40 principal matched by identity 0 +peer1.org1.example.com | [3ebf 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 09 99 50 89 ca 76 a5 96 7b d2 84 6e 28 36 95 |9..P..v..{..n(6.| +peer1.org1.example.com | 00000010 97 b8 5f ac 2f 19 53 1d ce c6 55 32 15 45 6b 53 |.._./.S...U2.EkS| +peer1.org1.example.com | [3ec0 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 eb 65 95 8e ae 99 55 73 35 65 |0E.!...e....Us5e| +peer1.org1.example.com | 00000010 84 6b fa 18 b7 70 05 e9 52 fb 9e 58 d2 72 a5 9d |.k...p..R..X.r..| +peer1.org1.example.com | 00000020 f0 65 75 9d d6 02 20 09 0f a7 3e 2e f1 c8 80 d7 |.eu... ...>.....| +peer1.org1.example.com | 00000030 f4 86 a1 27 58 c9 ef 02 b9 11 c5 69 84 27 38 72 |...'X......i.'8r| +peer1.org1.example.com | 00000040 66 17 8e c2 0a ea 8a |f......| +peer1.org1.example.com | [3ec1 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32a40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [410d 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [410e 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [410f 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4110 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4111 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4112 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4113 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4114 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4115 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4116 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4117 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4118 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4119 05-20 18:21:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [411a 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [411b 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [411c 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [411d 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [411e 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [411f 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4091 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4092 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4093 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4094 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4095 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer1.org2.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer1.org2.example.com | [4096 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer1.org2.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer1.org2.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer1.org2.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer1.org2.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer1.org2.example.com | [4097 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4098 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4099 05-20 18:21:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [409a 05-20 18:21:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer1.org2.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer1.org2.example.com | [409b 05-20 18:21:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer1.org2.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer1.org2.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer1.org2.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer1.org2.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer1.org2.example.com | [409c 05-20 18:21:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [409d 05-20 18:21:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [409e 05-20 18:21:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [409f 05-20 18:21:29.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40a0 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [40a1 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [40a2 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [40a3 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610131801 +peer1.org2.example.com | [40a4 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A48B798AE223BB62883FCE16FBC5DE0FCDA57625585D1446DD45FC8BD6025EC6 +peer1.org2.example.com | [40a5 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [40a6 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40a7 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40a8 05-20 18:21:31.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40a9 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40aa 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [40ab 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ac 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ad 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [40ae 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40af 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40b0 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b1 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b2 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b3 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40b4 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40b5 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b6 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b7 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40b8 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4120 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4121 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4122 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4123 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4124 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [4125 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4126 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4127 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4128 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4129 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [412a 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer0.org2.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer0.org2.example.com | [412b 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer0.org2.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer0.org2.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer0.org2.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer0.org2.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer0.org2.example.com | [412c 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [412d 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 eb 7d b9 82 f3 e1 55 5d 91 de |0E.!...}....U]..| +peer0.org2.example.com | 00000010 f6 56 ba d4 5b 5e 30 5d d7 ea be bc 7e ac 0c 40 |.V..[^0]....~..@| +peer0.org2.example.com | 00000020 56 1c 33 87 2b 02 20 3d 1a 90 f1 1e 59 db bf c4 |V.3.+. =....Y...| +peer0.org2.example.com | 00000030 a4 2d 9b a3 41 5d 5a 2f 11 bd 7c e8 26 f1 d2 f1 |.-..A]Z/..|.&...| +peer0.org2.example.com | 00000040 54 4a 92 d6 75 c6 ea |TJ..u..| +peer0.org2.example.com | [412e 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [412f 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [4130 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4131 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4132 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4133 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4134 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4135 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4136 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [4137 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4138 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4139 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ec2 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d32a40 gate 1589998898658745800 evaluation succeeds +peer1.org1.example.com | [3ec3 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ec4 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ec5 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ec6 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ec7 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ec8 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3ec9 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3eca 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3ecb 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3ecc 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ecd 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ece 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ecf 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ed0 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ed1 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ed2 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ed3 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ed4 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ed5 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ed6 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ed7 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ed8 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ed9 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eda 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3edb 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3edc 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3edd 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ede 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3edf 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3ee0 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ee1 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ee2 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ee3 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ee4 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ee5 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [413a 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [413b 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [413c 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [413d 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [413e 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 8b 79 8a e2 23 bb 62 88 3f ce 16 fb c5 de 0f |..y..#.b.?......| +peer0.org2.example.com | 00000010 cd a5 76 25 58 5d 14 46 dd 45 fc 8b d6 02 5e c6 |..v%X].F.E....^.| +peer0.org2.example.com | [413f 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 aa f0 36 87 ee 5f f6 c1 5a 17 26 |0D. $..6.._..Z.&| +peer0.org2.example.com | 00000010 fb fd 7b 60 f6 7c de 3a a7 ed 51 6f b5 a1 93 10 |..{`.|.:..Qo....| +peer0.org2.example.com | 00000020 af f3 ff c9 02 20 57 d5 be 16 a8 46 49 75 e5 22 |..... W....FIu."| +peer0.org2.example.com | 00000030 78 ff d1 30 e3 a7 88 05 06 d0 57 5d 70 b5 17 85 |x..0......W]p...| +peer0.org2.example.com | 00000040 1c cc 80 21 48 3b |...!H;| +peer0.org2.example.com | [4140 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4141 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4142 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4143 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [4144 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [4145 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [4146 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [4147 05-20 18:21:31.20 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [4148 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4149 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [414a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [414b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [414c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [414d 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [414e 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [414f 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4150 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4151 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4152 05-20 18:21:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4153 05-20 18:21:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4154 05-20 18:21:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [4155 05-20 18:21:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40b9 05-20 18:21:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40ba 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40bb 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40bc 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40bd 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40be 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [40bf 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [40c0 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [40c1 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [40c2 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c3 05-20 18:21:32.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c4 05-20 18:21:32.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c5 05-20 18:21:32.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [40c6 05-20 18:21:32.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40c7 05-20 18:21:32.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c8 05-20 18:21:32.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40c9 05-20 18:21:32.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ca 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40cb 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40cc 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [40cd 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ce 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40cf 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40d0 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [40d1 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40d2 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40d3 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [40d4 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [40d5 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [40d6 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7950 gate 1589998892385610200 evaluation starts +peer1.org2.example.com | [40d7 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40d8 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7950 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [40d9 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3ecf 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ed0 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ed1 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ed2 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3ed3 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ed4 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ed5 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ed6 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ed7 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ed8 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ed9 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3eda 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3edb 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [3edc 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [3edd 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [3ede 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [3edf 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee0 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee1 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ee2 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ee3 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ee4 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ee5 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ee6 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ee7 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 gate 1589998887574997100 evaluation starts +peer0.org1.example.com | [3ee8 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ee9 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3eea 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 principal matched by identity 0 +peer0.org2.example.com | [4156 05-20 18:21:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4157 05-20 18:21:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4158 05-20 18:21:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4159 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [415a 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [415b 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [415c 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [415d 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [415e 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [415f 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4160 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4161 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4162 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4163 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4164 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4165 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4166 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d0430 gate 1589998892086600100 evaluation starts +peer0.org2.example.com | [4167 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d0430 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4168 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d0430 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4169 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d0430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [416a 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d0430 principal evaluation fails +peer0.org2.example.com | [416b 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d0430 gate 1589998892086600100 evaluation fails +peer0.org2.example.com | [416c 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [416d 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [416e 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [416f 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d09a0 gate 1589998892089841200 evaluation starts +peer0.org2.example.com | [4170 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d09a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4171 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d09a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4172 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d09a0 principal matched by identity 0 +peer0.org2.example.com | [4173 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [4174 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [4175 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d09a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4176 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d09a0 gate 1589998892089841200 evaluation succeeds +peer0.org2.example.com | [4177 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4178 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4179 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [417a 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [417b 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [417c 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [417d 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [417e 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [417f 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4180 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4181 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4182 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4183 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4184 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4185 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2290 gate 1589998892095627400 evaluation starts +peer0.org2.example.com | [4186 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2290 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4187 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2290 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4188 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [4189 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2290 principal evaluation fails +peer0.org2.example.com | [418a 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2290 gate 1589998892095627400 evaluation fails +peer0.org2.example.com | [418b 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [418c 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [418d 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [418e 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2800 gate 1589998892096846100 evaluation starts +peer0.org2.example.com | [418f 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4190 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2800 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4191 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2800 principal matched by identity 0 +peer0.org2.example.com | [4192 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [4193 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [4194 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2800 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4195 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f2800 gate 1589998892096846100 evaluation succeeds +peer0.org2.example.com | [4196 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4197 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4198 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4199 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [419a 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [419b 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [419c 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [419d 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [419e 05-20 18:21:32.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [419f 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [41a0 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41a1 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41a2 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41a3 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [41a4 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [41a5 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f3c50 gate 1589998892102091700 evaluation starts +peer0.org2.example.com | [41a6 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f3c50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41a7 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f3c50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [41a8 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f3c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [41a9 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f3c50 principal evaluation fails +peer0.org2.example.com | [41aa 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f3c50 gate 1589998892102091700 evaluation fails +peer0.org2.example.com | [41ab 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [41ac 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [41ad 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41ae 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041121c0 gate 1589998892103995600 evaluation starts +peer0.org2.example.com | [41af 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041121c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41b0 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041121c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [41b1 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041121c0 principal matched by identity 0 +peer0.org2.example.com | [41b2 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [41b3 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [41b4 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041121c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41b5 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041121c0 gate 1589998892103995600 evaluation succeeds +peer0.org2.example.com | [41b6 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41b7 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41b8 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ee6 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ee7 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ee8 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ee9 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3eea 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3eeb 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eec 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3eed 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3eee 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3eef 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ef0 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ef1 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3ef2 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64ca0 gate 1589998898905003900 evaluation starts +peer1.org1.example.com | [3ef3 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ef4 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64ca0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3ef5 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3ef6 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64ca0 principal evaluation fails +peer1.org1.example.com | [3ef7 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64ca0 gate 1589998898905003900 evaluation fails +peer1.org1.example.com | [3ef8 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3ef9 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3efa 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3efb 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65210 gate 1589998898905442800 evaluation starts +peer1.org1.example.com | [3efc 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65210 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3efd 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65210 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3efe 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3eff 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65210 principal evaluation fails +peer1.org1.example.com | [3f00 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65210 gate 1589998898905442800 evaluation fails +peer1.org1.example.com | [3f01 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f02 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f03 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f04 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f05 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65780 gate 1589998898910327400 evaluation starts +peer1.org2.example.com | [40da 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7950 principal evaluation fails +peer1.org2.example.com | [40db 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7950 gate 1589998892385610200 evaluation fails +peer1.org2.example.com | [40dc 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [40dd 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [40de 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [40df 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7ec0 gate 1589998892386390200 evaluation starts +peer1.org2.example.com | [40e0 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7ec0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40e1 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7ec0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [40e2 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7ec0 principal matched by identity 0 +peer1.org2.example.com | [40e3 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [40e4 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [40e5 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7ec0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [40e6 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed7ec0 gate 1589998892386390200 evaluation succeeds +peer1.org2.example.com | [40e7 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40e8 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40e9 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [40ea 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [40eb 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ec 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ed 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [40ee 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40ef 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40f0 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [40f1 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [40f2 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [40f3 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd0c0 gate 1589998892389275100 evaluation starts +peer1.org2.example.com | [40f4 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd0c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40f5 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd0c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [40f6 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [40f7 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd0c0 principal evaluation fails +peer1.org2.example.com | [40f8 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd0c0 gate 1589998892389275100 evaluation fails +peer1.org2.example.com | [40f9 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [40fa 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [40fb 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [40fc 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd630 gate 1589998892390063600 evaluation starts +peer1.org2.example.com | [40fd 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd630 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f06 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f07 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65780 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3f08 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65780 principal matched by identity 0 +peer1.org1.example.com | [3f09 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 26 a8 89 be 83 3f 9b fe bf 72 c9 ef ff 7c 93 |.&....?...r...|.| +peer1.org1.example.com | 00000010 67 5c 9c ae a9 c4 ab 34 9e a4 f7 94 c8 83 98 05 |g\.....4........| +peer1.org1.example.com | [3f0a 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cb ec 37 a8 5c 24 78 2c e4 f5 |0E.!....7.\$x,..| +peer1.org1.example.com | 00000010 ce 50 b4 f7 d1 6c 0d d6 51 67 20 fb a1 76 75 3e |.P...l..Qg ..vu>| +peer1.org1.example.com | 00000020 ad 42 a9 9f 7e 02 20 75 fa e6 bf cb 3e 60 4e 42 |.B..~. u....>`NB| +peer1.org1.example.com | 00000030 88 a2 b2 4f e8 f2 9d aa ec 98 89 92 45 b9 cb 8c |...O........E...| +peer1.org1.example.com | 00000040 4e 65 8a 37 a0 53 57 |Ne.7.SW| +peer1.org1.example.com | [3f0b 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65780 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f0c 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65780 gate 1589998898910327400 evaluation succeeds +peer1.org1.example.com | [3f0d 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f0e 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f0f 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f10 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f11 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f12 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3f13 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3f14 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3f15 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3f16 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f17 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f18 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f19 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f1a 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f1b 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f1c 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f1d 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f1e 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f1f 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f21 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f20 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f23 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f22 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f24 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f25 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f26 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f27 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3f28 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f29 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f2a 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f2b 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3f2c 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f2d 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f2e 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f2f 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f30 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f31 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3f32 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd e8 33 44 07 c3 e8 65 be a1 89 ef b8 78 4c 67 |..3D...e.....xLg| +peer1.org1.example.com | 00000010 ab 5e 8a 6a 5d 26 6a cf 85 bc 60 f7 57 ca ad 7e |.^.j]&j...`.W..~| +peer1.org1.example.com | [3f33 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 45 15 f2 f6 45 a4 92 3a b9 a1 2a |0D. .E...E..:..*| +peer1.org1.example.com | 00000010 aa 13 89 d2 6d a3 50 fc 08 17 a1 dc 3d bb 3f 73 |....m.P.....=.?s| +peer1.org1.example.com | 00000020 ed 38 7b 9b 02 20 0c ec 28 8a b9 95 56 58 d4 95 |.8{.. ..(...VX..| +peer1.org1.example.com | 00000030 c0 4c 6b a9 18 33 38 7f 30 70 f8 6a b6 ac 75 d0 |.Lk..38.0p.j..u.| +peer1.org1.example.com | 00000040 41 1f d0 af da c2 |A.....| +peer1.org1.example.com | [3f34 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f35 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3f36 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3f37 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [41b9 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [41ba 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41bb 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41bc 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [41bd 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41be 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41bf 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41c0 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [41c1 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [41c2 05-20 18:21:32.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041133c0 gate 1589998892109712200 evaluation starts +peer0.org2.example.com | [41c3 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041133c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41c4 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041133c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [41c5 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041133c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [41c6 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041133c0 principal evaluation fails +peer0.org2.example.com | [41c7 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041133c0 gate 1589998892109712200 evaluation fails +peer0.org2.example.com | [41c8 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [41c9 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [41ca 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41cb 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113930 gate 1589998892112482600 evaluation starts +peer0.org2.example.com | [41cc 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41cd 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113930 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [41ce 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113930 principal matched by identity 0 +peer0.org2.example.com | [41cf 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [41d0 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [41d1 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113930 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41d2 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004113930 gate 1589998892112482600 evaluation succeeds +peer0.org2.example.com | [41d3 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41d4 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41d5 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [41d6 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [41d7 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [41d8 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [41d9 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | [40fe 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd630 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [40ff 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd630 principal matched by identity 0 +peer1.org2.example.com | [4100 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [4101 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [4103 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd630 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4104 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efd630 gate 1589998892390063600 evaluation succeeds +peer1.org2.example.com | [4105 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4106 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4107 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4108 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4109 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [410a 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [410b 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [410c 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [4102 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [410d 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [410e 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [410f 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4110 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4111 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4112 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4113 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4114 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4115 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4116 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4117 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4118 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d860 gate 1589998892394067500 evaluation starts +peer1.org2.example.com | [4119 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [411a 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d860 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [411b 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [411c 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d860 principal evaluation fails +peer1.org2.example.com | [411d 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1d860 gate 1589998892394067500 evaluation fails +peer1.org2.example.com | [411e 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [411f 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4120 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4121 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ddd0 gate 1589998892395049000 evaluation starts +peer1.org2.example.com | [4122 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ddd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4123 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ddd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4124 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ddd0 principal matched by identity 0 +peer1.org2.example.com | [4125 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [4126 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [4127 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ddd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4128 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ddd0 gate 1589998892395049000 evaluation succeeds +peer1.org2.example.com | [4129 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [412a 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [412b 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [412c 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [412d 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [412e 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [412f 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4130 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4131 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4132 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4133 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4134 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4135 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f38fd0 gate 1589998892396957000 evaluation starts +peer1.org2.example.com | [4136 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f38fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4137 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f38fd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4138 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f38fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4139 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f38fd0 principal evaluation fails +peer1.org2.example.com | [413a 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f38fd0 gate 1589998892396957000 evaluation fails +peer1.org2.example.com | [413b 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [413c 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [413d 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [413e 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39540 gate 1589998892398420400 evaluation starts +peer0.org1.example.com | [3eeb 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [3eec 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [3eed 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3eee 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 gate 1589998887574997100 evaluation succeeds +peer0.org1.example.com | [3eef 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ef0 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ef1 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3ef2 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3ef3 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ef4 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ef5 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ef6 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ef7 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ef8 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ef9 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3efa 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3efb 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 gate 1589998887576045200 evaluation starts +peer0.org1.example.com | [3efc 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3efd 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3efe 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 principal matched by identity 0 +peer0.org1.example.com | [3eff 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [3f00 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [3f01 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f02 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 gate 1589998887576045200 evaluation succeeds +peer0.org1.example.com | [3f03 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f04 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f05 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f06 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f07 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f08 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f09 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f0a 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f0b 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [413f 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39540 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4140 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39540 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4141 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39540 principal matched by identity 0 +peer1.org2.example.com | [4142 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [4143 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [4144 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39540 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4145 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39540 gate 1589998892398420400 evaluation succeeds +peer1.org2.example.com | [4146 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4147 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4148 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4149 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [414a 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [414b 05-20 18:21:32.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [414c 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [414d 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [414e 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [414f 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4150 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [4151 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [4152 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4153 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4154 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4155 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4156 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4157 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4158 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f38 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3f39 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f3a 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f3b 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f3c 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f3d 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f3e 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f3f 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3f40 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f41 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3f42 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f43 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f44 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f45 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f46 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f47 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f48 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f49 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f4a 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f4b 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f4c 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f4d 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f0c 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f0d 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f0e 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f0f 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f10 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f11 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f12 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f13 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f14 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 gate 1589998887579324100 evaluation starts +peer0.org1.example.com | [3f15 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f16 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3f17 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 principal matched by identity 0 +peer0.org1.example.com | [3f18 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [3f19 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [3f1a 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f1b 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 gate 1589998887579324100 evaluation succeeds +peer0.org1.example.com | [3f1c 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f1d 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f1e 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f1f 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f20 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [3f21 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [3f22 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f23 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [41da 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [41db 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41dc 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [41dd 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41de 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41df 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41e0 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [41e1 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41e2 05-20 18:21:32.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41e3 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41e4 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [41e5 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [41e6 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bb60 gate 1589998892120908900 evaluation starts +peer0.org2.example.com | [41e7 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bb60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41e8 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bb60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [41e9 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [41ea 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bb60 principal evaluation fails +peer0.org2.example.com | [41eb 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bb60 gate 1589998892120908900 evaluation fails +peer0.org2.example.com | [41ec 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [41ed 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [41ee 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41ef 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041420d0 gate 1589998892122471400 evaluation starts +peer0.org2.example.com | [41f0 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041420d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41f1 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041420d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [41f2 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041420d0 principal matched by identity 0 +peer0.org2.example.com | [41f3 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [41f4 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [41f5 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041420d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41f6 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041420d0 gate 1589998892122471400 evaluation succeeds +peer0.org2.example.com | [41f7 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41f8 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41f9 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [41fa 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f24 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f25 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f26 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f27 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f28 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f29 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f2a 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 gate 1589998887581571100 evaluation starts +peer0.org1.example.com | [3f2b 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f2c 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3f2d 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 principal matched by identity 0 +peer0.org1.example.com | [3f2e 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [3f2f 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [3f30 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f31 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 gate 1589998887581571100 evaluation succeeds +peer0.org1.example.com | [3f32 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f33 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f34 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f35 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f36 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [3f37 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [3f38 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f39 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f3a 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f3b 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f3c 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f3d 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f3e 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f3f 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f40 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f41 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f42 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f43 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 gate 1589998887583078200 evaluation starts +peer0.org1.example.com | [3f44 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f45 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3f46 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 principal matched by identity 0 +peer0.org1.example.com | [3f47 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [3f48 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [3f49 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f4a 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 gate 1589998887583078200 evaluation succeeds +peer0.org1.example.com | [3f4b 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f4c 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f4d 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f4e 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f4f 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [3f50 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [3f51 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [3f52 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [3f53 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f54 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f4e 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f4f 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f50 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [3f51 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [3f52 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f53 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f54 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f55 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 2 1 3 4 5] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3f56 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f57 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f58 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f59 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [3f5a 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f5c 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f5b 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f5e 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f5f 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f60 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [3f61 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [3f62 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f63 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f64 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f65 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f66 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f67 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41fb 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41fc 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41fd 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [41fe 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41ff 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4200 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4201 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4202 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4203 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041432d0 gate 1589998892125257400 evaluation starts +peer0.org2.example.com | [4204 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041432d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4205 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041432d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4206 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041432d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [4207 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041432d0 principal evaluation fails +peer0.org2.example.com | [4208 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041432d0 gate 1589998892125257400 evaluation fails +peer0.org2.example.com | [4209 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [420a 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [420b 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [420c 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143840 gate 1589998892127580300 evaluation starts +peer0.org2.example.com | [420d 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143840 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [420e 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143840 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [420f 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143840 principal matched by identity 0 +peer0.org2.example.com | [4210 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [4211 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [4212 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143840 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4213 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143840 gate 1589998892127580300 evaluation succeeds +peer0.org2.example.com | [4214 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4215 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4216 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4217 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4218 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [4219 05-20 18:21:32.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [421a 05-20 18:21:32.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [421b 05-20 18:21:32.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [421c 05-20 18:21:32.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [421d 05-20 18:21:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [421e 05-20 18:21:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [421f 05-20 18:21:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4220 05-20 18:21:32.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4221 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4222 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4223 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4224 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4225 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [4226 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [4227 05-20 18:21:32.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4228 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4229 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [422a 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [422b 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [422c 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [422d 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [422e 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [422f 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4230 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4231 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4232 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4233 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4234 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [4235 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4236 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\247\233;" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4237 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4238 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247\233;" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4239 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [423a 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [423b 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [423c 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [423d 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [423e 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [423f 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4240 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4241 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c60 gate 1589998892626613400 evaluation starts +peer0.org2.example.com | [4242 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4243 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4244 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [4245 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c60 principal evaluation fails +peer0.org2.example.com | [4246 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004188c60 gate 1589998892626613400 evaluation fails +peer0.org2.example.com | [4247 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4248 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4249 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [424a 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041891d0 gate 1589998892627149900 evaluation starts +peer0.org2.example.com | [424b 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041891d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [424c 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041891d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [424d 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041891d0 principal matched by identity 0 +peer0.org2.example.com | [424e 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer0.org2.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer0.org2.example.com | [424f 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer0.org2.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer0.org2.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer0.org2.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer0.org2.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer0.org2.example.com | [4250 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041891d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4251 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041891d0 gate 1589998892627149900 evaluation succeeds +peer0.org2.example.com | [4252 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4159 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [415a 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ddb0 gate 1589998892402558500 evaluation starts +peer1.org2.example.com | [415b 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ddb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [415c 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ddb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [415d 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ddb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [415e 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ddb0 principal evaluation fails +peer1.org2.example.com | [415f 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ddb0 gate 1589998892402558500 evaluation fails +peer1.org2.example.com | [4160 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4161 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4162 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4163 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6c320 gate 1589998892403208500 evaluation starts +peer1.org2.example.com | [4164 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6c320 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4165 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6c320 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4166 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6c320 principal matched by identity 0 +peer1.org2.example.com | [4167 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [4168 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [4169 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6c320 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [416a 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6c320 gate 1589998892403208500 evaluation succeeds +peer1.org2.example.com | [416b 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [416c 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [416d 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [416e 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [416f 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4170 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4171 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4172 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4173 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4174 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4175 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4176 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4177 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6d520 gate 1589998892404874500 evaluation starts +peer1.org2.example.com | [4178 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6d520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4179 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6d520 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [417a 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6d520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [417b 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6d520 principal evaluation fails +peer1.org2.example.com | [417c 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6d520 gate 1589998892404874500 evaluation fails +peer1.org2.example.com | [417d 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [417e 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [417f 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4180 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6da90 gate 1589998892405386100 evaluation starts +peer1.org2.example.com | [4181 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6da90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4182 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6da90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4183 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6da90 principal matched by identity 0 +peer1.org2.example.com | [4184 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [4185 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [4186 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6da90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4187 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6da90 gate 1589998892405386100 evaluation succeeds +peer1.org2.example.com | [4188 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4189 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [418a 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [418b 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [418c 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer1.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer1.org2.example.com | [418d 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer1.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer1.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer1.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer1.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer1.org2.example.com | [418e 05-20 18:21:32.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [418f 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4190 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4191 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4192 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4193 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4194 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4195 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4196 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4197 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [4198 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4199 05-20 18:21:32.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\247\233;" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [419a 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [419b 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247\233;" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [419c 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [419d 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f68 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f5d 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f69 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f6a 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3f6b 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6ee0 gate 1589998899814827100 evaluation starts +peer1.org1.example.com | [3f6c 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f6d 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6ee0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3f6e 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f6f 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3f70 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6ee0 principal evaluation fails +peer1.org1.example.com | [3f71 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd6ee0 gate 1589998899814827100 evaluation fails +peer1.org1.example.com | [3f72 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f73 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f74 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f75 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7450 gate 1589998899820421300 evaluation starts +peer1.org1.example.com | [3f76 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7450 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f77 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7450 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3f78 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f79 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7450 principal evaluation fails +peer1.org1.example.com | [3f7a 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7450 gate 1589998899820421300 evaluation fails +peer1.org1.example.com | [3f7b 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f7c 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f7d 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f7e 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd79c0 gate 1589998899825858400 evaluation starts +peer1.org1.example.com | [3f7f 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd79c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f80 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd79c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3f81 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd79c0 principal matched by identity 0 +peer1.org1.example.com | [3f82 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [3f83 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [3f84 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd79c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f85 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd79c0 gate 1589998899825858400 evaluation succeeds +peer1.org1.example.com | [3f86 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f87 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f88 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f89 05-20 18:21:39.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f8a 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [3f8b 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [3f8c 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f8d 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f8e 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f8f 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f90 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f91 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f92 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f93 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3f94 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df72b0 gate 1589998899835012000 evaluation starts +peer1.org1.example.com | [3f95 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df72b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f96 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df72b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3f97 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df72b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3f98 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df72b0 principal evaluation fails +peer1.org1.example.com | [3f99 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df72b0 gate 1589998899835012000 evaluation fails +peer1.org1.example.com | [3f9a 05-20 18:21:39.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f9b 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f9c 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f9d 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7820 gate 1589998899840727600 evaluation starts +peer1.org1.example.com | [3f9e 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7820 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f9f 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7820 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3fa0 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3fa1 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7820 principal evaluation fails +peer1.org1.example.com | [3fa2 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7820 gate 1589998899840727600 evaluation fails +peer1.org1.example.com | [3fa3 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fa4 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fa5 05-20 18:21:39.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3fa6 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7d90 gate 1589998899851527500 evaluation starts +peer1.org1.example.com | [3fa7 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7d90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fa8 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7d90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3fa9 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7d90 principal matched by identity 0 +peer1.org1.example.com | [3faa 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [3fab 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [3fac 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7d90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3fad 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df7d90 gate 1589998899851527500 evaluation succeeds +peer1.org1.example.com | [3fae 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3faf 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3fb0 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3fb1 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3fb2 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fb3 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3fb4 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb5 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb6 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb7 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3fb8 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fb9 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fba 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3fbb 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3fbc 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3fbd 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f1e0 gate 1589998899858398200 evaluation starts +peer1.org1.example.com | [3fbe 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f1e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fbf 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f1e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3fc0 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f1e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3fc1 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f1e0 principal evaluation fails +peer1.org1.example.com | [3fc2 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f1e0 gate 1589998899858398200 evaluation fails +peer1.org1.example.com | [3fc3 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3fc4 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3fc5 05-20 18:21:39.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3fc6 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f750 gate 1589998899860529700 evaluation starts +peer1.org1.example.com | [3fc7 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f750 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fc8 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f750 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3fc9 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3fca 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f750 principal evaluation fails +peer1.org1.example.com | [3fcb 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0f750 gate 1589998899860529700 evaluation fails +peer1.org1.example.com | [3fcc 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fcd 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fce 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3fcf 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fcc0 gate 1589998899862527800 evaluation starts +peer1.org1.example.com | [3fd0 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fcc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fd1 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fcc0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3fd2 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fcc0 principal matched by identity 0 +peer1.org1.example.com | [3fd3 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [3fd4 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [3fd5 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fcc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4253 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4254 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4255 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4256 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4257 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4258 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4259 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [425a 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [425b 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [425c 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [425d 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [425e 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [425f 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4260 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4261 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4262 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4263 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4264 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4265 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\247\233;" > alive: alive: +peer0.org2.example.com | [4266 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4267 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4268 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4269 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [426a 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [426b 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [426c 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [426d 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [426e 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [426f 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4270 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4271 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4272 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4273 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4274 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4275 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4276 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4277 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4278 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4279 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [427a 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [427b 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [427c 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [427d 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [427e 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [427f 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4280 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4281 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4282 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4283 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [3f55 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f56 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f57 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f58 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f59 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f5a 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f5b 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 gate 1589998887584613100 evaluation starts +peer0.org1.example.com | [3f5c 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f5d 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3f5e 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 principal matched by identity 0 +peer0.org1.example.com | [3f5f 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [3f60 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [3f61 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f62 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 gate 1589998887584613100 evaluation succeeds +peer0.org1.example.com | [3f63 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f64 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f65 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f66 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f67 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f68 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f69 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f6a 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3f6b 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f6c 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f6d 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f6e 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f6f 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f70 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f71 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f72 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f73 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f74 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f75 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f76 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f77 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f78 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f79 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f7a 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f7b 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7c 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7d 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7e 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fd6 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fcc0 gate 1589998899862527800 evaluation succeeds +peer1.org1.example.com | [3fd7 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3fd8 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3fd9 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3fda 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3fdb 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [3fdc 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [3fdd 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fde 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fdf 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3fe0 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fe1 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fe2 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3fe3 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3fe4 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3fe5 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f5b0 gate 1589998899867716500 evaluation starts +peer1.org1.example.com | [3fe6 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fe7 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f5b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3fe8 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3fe9 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f5b0 principal evaluation fails +peer1.org1.example.com | [3fea 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2f5b0 gate 1589998899867716500 evaluation fails +peer1.org1.example.com | [3feb 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3fec 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3fed 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3fee 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2fb20 gate 1589998899868745900 evaluation starts +peer1.org1.example.com | [3fef 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2fb20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ff0 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2fb20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [3ff1 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2fb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3ff2 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2fb20 principal evaluation fails +peer1.org1.example.com | [3ff3 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2fb20 gate 1589998899868745900 evaluation fails +peer1.org1.example.com | [3ff4 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ff5 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ff6 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ff7 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e42090 gate 1589998899869750300 evaluation starts +peer1.org1.example.com | [3ff8 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e42090 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ff9 05-20 18:21:39.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e42090 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [419e 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [419f 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [41a0 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [41a1 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [41a2 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [41a3 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [41a4 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87640 gate 1589998892621956500 evaluation starts +peer1.org2.example.com | [41a5 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87640 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41a6 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87640 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [41a7 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [41a8 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87640 principal evaluation fails +peer1.org2.example.com | [41a9 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87640 gate 1589998892621956500 evaluation fails +peer1.org2.example.com | [41aa 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [41ab 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [41ac 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [41ad 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87bb0 gate 1589998892623528800 evaluation starts +peer1.org2.example.com | [41ae 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41af 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87bb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [41b0 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87bb0 principal matched by identity 0 +peer1.org2.example.com | [41b1 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer1.org2.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer1.org2.example.com | [41b2 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer1.org2.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer1.org2.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer1.org2.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer1.org2.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer1.org2.example.com | [41b3 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87bb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [41b4 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f87bb0 gate 1589998892623528800 evaluation succeeds +peer1.org2.example.com | [41b5 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [41b6 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [41b7 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [41b8 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [41b9 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41ba 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [41bb 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [41bc 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [41bd 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [41be 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41bf 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41c0 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [41c1 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41c2 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41c3 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41c4 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [41c5 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\247\233;" > alive: +peer1.org2.example.com | [41c6 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [41c7 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41c8 05-20 18:21:32.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41c9 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [41ca 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [41cb 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [41cc 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [41cd 05-20 18:21:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41ce 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [41cf 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [41d0 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41d1 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41d2 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41d3 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41d4 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41d5 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41d6 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [41d7 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41d8 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [41d9 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [41da 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41db 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [41dc 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [41dd 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer1.org2.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer1.org2.example.com | [41de 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer1.org2.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer1.org2.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer1.org2.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer1.org2.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer1.org2.example.com | [41df 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [41e0 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 78 62 be 5c 71 8a 73 ed 62 7c 00 |0D. .xb.\q.s.b|.| +peer1.org2.example.com | 00000010 3f 3f 34 d5 1e 8c 3f 1b 59 87 cb bd 50 a8 ca 65 |??4...?.Y...P..e| +peer1.org2.example.com | 00000020 f7 52 d8 c7 02 20 0d db ed 44 e6 58 ee 1e 11 03 |.R... ...D.X....| +peer1.org2.example.com | 00000030 56 d1 29 00 36 4c 6a 2f d4 d1 4c 52 76 5f df 3c |V.).6Lj/..LRv_.<| +peer1.org2.example.com | 00000040 b5 6d 15 8a 6e 70 |.m..np| +peer1.org2.example.com | [41e1 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [41e2 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [41e3 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [41e4 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [41e5 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [41e6 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e7 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e8 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e9 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [41ea 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41eb 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ec 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ed 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ee 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [41ef 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [41f0 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [41f1 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41f2 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [41f3 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41f4 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41f5 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [41f6 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [41f7 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41f8 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [41f9 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [41fa 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [41fb 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41fc 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [41fd 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41fe 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [41ff 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4200 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4201 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4202 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4203 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4204 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4205 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4206 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4207 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000fb0 gate 1589998893010810600 evaluation starts +peer1.org2.example.com | [4208 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4209 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000fb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [420a 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [420b 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000fb0 principal evaluation fails +peer1.org2.example.com | [420c 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004000fb0 gate 1589998893010810600 evaluation fails +peer1.org2.example.com | [420d 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [420e 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [420f 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4210 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004001520 gate 1589998893011582100 evaluation starts +peer1.org2.example.com | [4211 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004001520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4212 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004001520 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4213 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004001520 principal matched by identity 0 +peer1.org2.example.com | [4214 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +peer1.org2.example.com | 00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +peer1.org2.example.com | [4215 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +peer1.org2.example.com | 00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +peer1.org2.example.com | 00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +peer1.org2.example.com | 00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +peer1.org2.example.com | 00000040 5c 0c f4 3b 58 db 03 |\..;X..| +peer1.org2.example.com | [4216 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004001520 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4284 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4285 05-20 18:21:32.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4286 05-20 18:21:32.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161039 +peer0.org2.example.com | [4287 05-20 18:21:32.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2DB08871CDEFE906FC789E64AFFF57DAB537955C7B1299B6857C3A7DC11C21D5 +peer0.org2.example.com | [4288 05-20 18:21:32.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4289 05-20 18:21:32.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [428a 05-20 18:21:32.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [428b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [428c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [428d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [428e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [428f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4290 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4291 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ffa 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e42090 principal matched by identity 0 +peer1.org1.example.com | [3ffb 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [3ffc 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [3ffd 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e42090 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3ffe 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e42090 gate 1589998899869750300 evaluation succeeds +peer1.org1.example.com | [3fff 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4000 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4001 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4002 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4003 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [4004 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [4005 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4006 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [4007 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4008 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4009 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [400a 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [400b 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [400c 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [400d 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [400e 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [400f 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4010 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43bd0 gate 1589998899874383600 evaluation starts +peer1.org1.example.com | [4011 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4012 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43bd0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4013 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4014 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43bd0 principal evaluation fails +peer1.org1.example.com | [4015 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e43bd0 gate 1589998899874383600 evaluation fails +peer1.org1.example.com | [4016 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4017 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4018 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4019 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e60140 gate 1589998899874681600 evaluation starts +peer1.org1.example.com | [401a 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e60140 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [401b 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e60140 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [401c 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e60140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [401d 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e60140 principal evaluation fails +peer1.org1.example.com | [401e 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e60140 gate 1589998899874681600 evaluation fails +peer1.org1.example.com | [401f 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4020 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4021 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4022 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e606b0 gate 1589998899874964300 evaluation starts +peer1.org1.example.com | [4023 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e606b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4024 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e606b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4025 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e606b0 principal matched by identity 0 +peer1.org1.example.com | [4026 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [4027 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [4028 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e606b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4029 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e606b0 gate 1589998899874964300 evaluation succeeds +peer1.org1.example.com | [402a 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [402b 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [402c 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [402d 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [402e 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [402f 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [4030 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [4031 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [4032 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4033 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4034 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4035 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4036 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4037 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4038 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4292 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4293 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4294 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4295 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4296 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [4297 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4298 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4299 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [429a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [429b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [429c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [429d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [429f 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [429e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer0.org2.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer0.org2.example.com | [42a0 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer0.org2.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer0.org2.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer0.org2.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer0.org2.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer0.org2.example.com | [42a1 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [42a2 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 78 62 be 5c 71 8a 73 ed 62 7c 00 |0D. .xb.\q.s.b|.| +peer0.org2.example.com | 00000010 3f 3f 34 d5 1e 8c 3f 1b 59 87 cb bd 50 a8 ca 65 |??4...?.Y...P..e| +peer0.org2.example.com | 00000020 f7 52 d8 c7 02 20 0d db ed 44 e6 58 ee 1e 11 03 |.R... ...D.X....| +peer0.org2.example.com | 00000030 56 d1 29 00 36 4c 6a 2f d4 d1 4c 52 76 5f df 3c |V.).6Lj/..LRv_.<| +peer0.org2.example.com | 00000040 b5 6d 15 8a 6e 70 |.m..np| +peer0.org2.example.com | [42a3 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [42a4 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [42a5 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42a6 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42a7 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [42a8 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [42a9 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer0.org2.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer0.org2.example.com | [42aa 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer0.org2.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer0.org2.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer0.org2.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer0.org2.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer0.org2.example.com | [42ab 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [42ac 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42ad 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [42ae 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4217 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004001520 gate 1589998893011582100 evaluation succeeds +peer1.org2.example.com | [4218 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4219 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [421a 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [421b 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [421c 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [421d 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [421e 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [421f 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4220 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4221 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4222 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4223 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4224 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [4225 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4226 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4227 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4228 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4229 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\247\233;" > alive: +peer1.org2.example.com | [422a 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [422b 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [422c 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [422d 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [422e 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [422f 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4230 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [4231 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4232 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4233 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4234 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4235 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4236 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4237 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4039 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [403a 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7e690 gate 1589998899876673200 evaluation starts +peer1.org1.example.com | [403b 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7e690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [403c 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7e690 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [403d 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7e690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [403e 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7e690 principal evaluation fails +peer1.org1.example.com | [403f 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7e690 gate 1589998899876673200 evaluation fails +peer1.org1.example.com | [4040 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4041 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4042 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4043 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7ec00 gate 1589998899877024600 evaluation starts +peer1.org1.example.com | [4044 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7ec00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4045 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7ec00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4046 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7ec00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4047 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7ec00 principal evaluation fails +peer1.org1.example.com | [4048 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7ec00 gate 1589998899877024600 evaluation fails +peer1.org1.example.com | [4049 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [404a 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [404b 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [404c 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7f170 gate 1589998899877681400 evaluation starts +peer1.org1.example.com | [404d 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7f170 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [404e 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7f170 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [404f 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7f170 principal matched by identity 0 +peer1.org1.example.com | [4050 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [4051 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [4052 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7f170 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4053 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7f170 gate 1589998899877681400 evaluation succeeds +peer1.org1.example.com | [4054 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4055 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4056 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4057 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4058 05-20 18:21:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4059 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [405a 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [405b 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [405c 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [405d 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [405e 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [405f 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4060 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7f 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f80 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f81 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f82 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f83 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3f84 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce ed 34 6b 9c 51 19 9a c6 0f 9a 68 d0 e0 3d b6 |..4k.Q.....h..=.| +peer0.org1.example.com | 00000010 47 f9 3a cc e9 16 f7 fb fd 63 7c 25 67 8a 8e b9 |G.:......c|%g...| +peer0.org1.example.com | [3f85 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 24 ff 7f ca 7a b9 68 05 4b 1c |0E.!..$...z.h.K.| +peer0.org1.example.com | 00000010 02 3e 74 0f 29 b6 5e c5 ff 8a c6 a2 73 47 99 36 |.>t.).^.....sG.6| +peer0.org1.example.com | 00000020 36 f2 3a 88 bb 02 20 01 f2 a0 26 e0 25 f4 06 0f |6.:... ...&.%...| +peer0.org1.example.com | 00000030 8b 14 85 16 c0 12 fc f9 cd a7 be 08 10 c2 ca e5 |................| +peer0.org1.example.com | 00000040 31 0a 3c f0 1f bc 33 |1.<...3| +peer0.org1.example.com | [3f86 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f87 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3f88 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3f89 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3f8a 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3f8b 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8c 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8d 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8e 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f8f 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f90 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f91 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3f92 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f93 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3f94 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f95 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f96 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f97 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f98 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f99 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f9a 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f9b 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f9c 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f9d 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f9e 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f9f 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fa0 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fa1 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fa2 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fa3 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fa4 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fa5 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fa6 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fa7 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fa8 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fa9 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3faa 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fab 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3fac 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fad 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fae 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3faf 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fb0 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3fb1 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fb2 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fb3 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fb4 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fb5 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fb6 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3fb7 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer0.org1.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer0.org1.example.com | [3fb8 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer0.org1.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer0.org1.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer0.org1.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer0.org1.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer0.org1.example.com | [3fb9 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3fba 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf e6 0f fb f5 4d f0 04 22 c8 22 |0E.!......M.."."| +peer0.org1.example.com | 00000010 0e 55 75 77 02 40 0c b6 fc 3f 2b 66 31 2b d6 26 |.Uuw.@...?+f1+.&| +peer0.org1.example.com | 00000020 ee d9 99 f2 fd 02 20 2a 11 c9 45 25 9e ff 78 8c |...... *..E%..x.| +peer0.org1.example.com | 00000030 60 71 67 87 85 5b 3a 75 c7 a4 0a 72 fe ef d9 23 |`qg..[:u...r...#| +peer0.org1.example.com | 00000040 b4 9b f7 07 dd cc 41 |......A| +peer0.org1.example.com | [3fbb 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [42af 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [42b0 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42b1 05-20 18:21:32.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42b2 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [42b3 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [42b4 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [42b5 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5d00 gate 1589998892932552600 evaluation starts +peer0.org2.example.com | [42b6 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5d00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42b7 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5d00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [42b8 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [42b9 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5d00 principal evaluation fails +peer0.org2.example.com | [42ba 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5d00 gate 1589998892932552600 evaluation fails +peer0.org2.example.com | [42bb 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [42bc 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [42bd 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [42be 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004208270 gate 1589998892932863300 evaluation starts +peer0.org2.example.com | [42bf 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004208270 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42c0 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004208270 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [42c1 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004208270 principal matched by identity 0 +peer0.org2.example.com | [42c2 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer0.org2.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer0.org2.example.com | [42c3 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer0.org2.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer0.org2.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer0.org2.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer0.org2.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer0.org2.example.com | [42c4 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004208270 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [42c5 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004208270 gate 1589998892932863300 evaluation succeeds +peer0.org2.example.com | [42c6 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42c7 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42c8 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [42c9 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [42ca 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [42cb 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42cc 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [42cd 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer0.org2.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer0.org2.example.com | [42ce 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer0.org2.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer0.org2.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer0.org2.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer0.org2.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer0.org2.example.com | [42cf 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [42d0 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [42d1 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42d2 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42d3 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42d4 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [42d5 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42d6 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [42d7 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [42d8 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer0.org2.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer0.org2.example.com | [42d9 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer0.org2.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer0.org2.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer0.org2.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer0.org2.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer0.org2.example.com | [42da 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [42db 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [42dc 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42dd 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [42de 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer0.org2.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer0.org2.example.com | [42df 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer0.org2.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer0.org2.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer0.org2.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer0.org2.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer0.org2.example.com | [42e0 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [42e1 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42e2 05-20 18:21:32.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42e3 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [42e4 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42e5 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [42e6 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [42e7 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4061 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4062 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4063 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4064 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [4065 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4066 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [4067 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4068 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [4069 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [406a 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [406b 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [406c 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [406d 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [406e 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [406f 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4070 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4071 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4072 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4073 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4074 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4075 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4076 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4077 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4078 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4079 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [407a 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [407b 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [407c 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [407d 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [407e 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [407f 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4080 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [4081 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4082 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [4083 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [4084 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4085 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4086 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161047 +peer1.org1.example.com | [4087 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4602A17D76CFCDF2778A4C073C751808E2735A1CDB61C68F9280F11CB2F9C50B +peer1.org1.example.com | [4088 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4089 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [408a 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [408b 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [408c 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [408e 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [408d 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [408f 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4090 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4092 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4091 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4093 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4094 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4095 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4096 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [4097 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [4098 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4099 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [409a 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [409b 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer1.org1.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer1.org1.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer1.org1.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer1.org1.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer1.org1.example.com | [409d 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [409e 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [409f 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [40a0 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40a1 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40a2 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [40a3 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4238 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4239 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [423a 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [423b 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [423c 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [423d 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [423e 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [423f 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4240 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4241 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4242 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4243 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816103B +peer1.org2.example.com | [4244 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 34530B00F789A5EB6A24A7C9743868F1041D36BB9CC6AA1831CB8F86E3B5667E +peer1.org2.example.com | [4245 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4246 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4247 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4248 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4249 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [424a 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [424b 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [424c 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [42e8 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [42e9 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42ea 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42eb 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [42ec 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [42ed 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [42ee 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c210 gate 1589998893028237700 evaluation starts +peer0.org2.example.com | [42ef 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42f0 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c210 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [42f1 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [42f2 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c210 principal evaluation fails +peer0.org2.example.com | [42f3 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c210 gate 1589998893028237700 evaluation fails +peer0.org2.example.com | [42f4 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [42f5 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [42f6 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [42f7 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c780 gate 1589998893029495500 evaluation starts +peer0.org2.example.com | [42f8 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42f9 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c780 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [42fa 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c780 principal matched by identity 0 +peer0.org2.example.com | [42fb 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +peer0.org2.example.com | 00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +peer0.org2.example.com | [42fc 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +peer0.org2.example.com | 00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +peer0.org2.example.com | 00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +peer0.org2.example.com | 00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +peer0.org2.example.com | 00000040 5c 0c f4 3b 58 db 03 |\..;X..| +peer0.org2.example.com | [42fd 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c780 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [42fe 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00422c780 gate 1589998893029495500 evaluation succeeds +peer0.org2.example.com | [42ff 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4300 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4301 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4302 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4303 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4304 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4305 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4306 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3fbc 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [3fbd 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3fbe 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3fbf 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3fc0 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fc1 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fc2 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fc3 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3fc4 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fc5 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fc6 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3fc7 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +peer0.org1.example.com | [3fc8 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fc9 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fca 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fcb 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fcc 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fcd 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fce 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3fcf 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40a4 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [40a5 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer1.org1.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer1.org1.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer1.org1.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer1.org1.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer1.org1.example.com | [40a7 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [40a8 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 53 2a bc 7f 21 c4 d9 ff 88 46 |0E.!..S*..!....F| +peer1.org1.example.com | 00000010 dc 07 62 94 05 3f 03 90 11 6d 38 b7 4c 55 1b d4 |..b..?...m8.LU..| +peer1.org1.example.com | 00000020 db c0 81 88 5d 02 20 63 83 84 14 eb ad ba 54 dc |....]. c......T.| +peer1.org1.example.com | 00000030 31 f6 cd 62 4e 2d c3 b4 b1 b3 01 25 6e 6a 5c b8 |1..bN-.....%nj\.| +peer1.org1.example.com | 00000040 11 13 c5 1b ac e7 6b |......k| +peer1.org1.example.com | [40a9 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [40aa 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [40ab 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40ac 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40ad 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [40ae 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 21 18 77 0f 38 c7 5c b3 37 f7 ea 62 34 0c 73 |?!.w.8.\.7..b4.s| +peer1.org1.example.com | 00000010 57 b7 38 b1 65 26 4a 29 c1 e1 6f 69 c6 24 3a 71 |W.8.e&J)..oi.$:q| +peer1.org1.example.com | [40af 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 a2 c1 45 6f f3 5b 9b 9d f6 ea |0E.!....Eo.[....| +peer1.org1.example.com | 00000010 7c 3e 38 1c 36 f1 13 84 bb c9 38 d8 7b f1 33 8d ||>8.6.....8.{.3.| +peer1.org1.example.com | 00000020 df 8f 22 b7 38 02 20 3b 07 90 34 bd 93 27 15 d7 |..".8. ;..4..'..| +peer1.org1.example.com | 00000030 a1 ab 5c 5b c8 32 b4 7f 11 db 45 d7 23 3a 2a 2c |..\[.2....E.#:*,| +peer1.org1.example.com | 00000040 47 cb a3 60 6a 7a 2a |G..`jz*| +peer1.org1.example.com | [40b0 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40b1 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40b2 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40b4 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [40b3 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [40b5 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40b6 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [40b7 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [424d 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [424e 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [424f 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [4250 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4251 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4252 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4253 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [4254 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4255 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [4256 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4257 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4258 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4259 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [425a 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [425b 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [425c 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [425d 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [425e 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004052dc0 gate 1589998893193226600 evaluation starts +peer1.org2.example.com | [425f 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004052dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4260 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004052dc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4261 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004052dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4262 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004052dc0 principal evaluation fails +peer1.org2.example.com | [4263 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004052dc0 gate 1589998893193226600 evaluation fails +peer1.org2.example.com | [4264 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4265 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4266 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4267 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004053330 gate 1589998893193566100 evaluation starts +peer1.org2.example.com | [4268 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004053330 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4307 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4308 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4309 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [430a 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [430b 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [430c 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [430d 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [430e 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [430f 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4310 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\247\233;" > alive: alive: +peer0.org2.example.com | [4311 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4312 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4313 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4314 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4315 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [4316 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4317 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [4318 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4319 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [431a 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [431b 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 53 0b 00 f7 89 a5 eb 6a 24 a7 c9 74 38 68 f1 |4S......j$..t8h.| +peer0.org2.example.com | 00000010 04 1d 36 bb 9c c6 aa 18 31 cb 8f 86 e3 b5 66 7e |..6.....1.....f~| +peer0.org2.example.com | [431c 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a5 74 b6 f9 29 0d 09 5e 35 99 d9 |0D. &.t..)..^5..| +peer0.org2.example.com | 00000010 c8 29 65 f1 b3 f7 14 c1 19 e2 72 cc 9e 56 a3 83 |.)e.......r..V..| +peer0.org2.example.com | 00000020 9c db 2e 98 02 20 37 8d 3b 4f fa c7 9a 97 c1 ee |..... 7.;O......| +peer0.org2.example.com | 00000030 fe 46 6d 7e b5 69 19 59 ba 22 cc 4e 33 2c 93 cf |.Fm~.i.Y.".N3,..| +peer0.org2.example.com | 00000040 a0 10 16 eb 60 1f |....`.| +peer0.org1.example.com | [3fd0 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3fd1 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fd2 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fd3 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3fd4 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3fd5 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3fd6 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 gate 1589998888647690600 evaluation starts +peer0.org1.example.com | [3fd7 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fd8 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [3fd9 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 principal matched by identity 0 +peer0.org1.example.com | [3fda 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 25 c1 a0 94 7e 60 34 8e 31 4c 35 2f 35 77 91 |K%...~`4.1L5/5w.| +peer0.org1.example.com | 00000010 b0 b5 05 2a 7e d6 75 24 44 f4 1d 18 c0 ee 0a 61 |...*~.u$D......a| +peer0.org1.example.com | [3fdb 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 8c 59 83 51 56 ab 18 ae f2 ec |0E.!...Y.QV.....| +peer0.org1.example.com | 00000010 89 66 e1 ed 13 1e f4 c0 00 11 f0 d6 a1 de e8 e5 |.f..............| +peer0.org1.example.com | 00000020 41 ab 99 45 db 02 20 68 de 29 84 16 d0 11 2f 31 |A..E.. h.)..../1| +peer0.org1.example.com | 00000030 70 57 84 92 a1 49 94 95 dc 82 87 cc 9c 49 44 f3 |pW...I.......ID.| +peer0.org1.example.com | 00000040 5d ef a4 a3 26 cd c6 |]...&..| +peer0.org1.example.com | [3fdc 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3fdd 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 gate 1589998888647690600 evaluation succeeds +peer0.org1.example.com | [3fde 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3fdf 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3fe0 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3fe1 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3fe2 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fe3 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3fe4 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3fe5 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3fe6 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3fe7 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fe8 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fe9 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fea 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3feb 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fec 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fed 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fee 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fef 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ff0 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ff1 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3ff2 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ff3 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3ff4 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ff5 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ff6 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ff7 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ff8 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ff9 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ffa 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ffb 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ffc 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ffd 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ffe 05-20 18:21:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3fff 05-20 18:21:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4000 05-20 18:21:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4001 05-20 18:21:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4002 05-20 18:21:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [4003 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4004 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4005 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4006 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4007 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4008 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4009 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [400a 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [400b 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [400c 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [400d 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [400e 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [400f 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4010 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4011 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4012 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4013 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4014 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4015 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4016 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4017 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4018 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4019 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [431d 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [431e 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 a8 50 d3 25 c8 a8 a6 1d 67 38 08 |0D. Q.P.%....g8.| +peer0.org2.example.com | 00000010 f5 c0 d9 81 4f 1a 17 51 b1 34 8f a0 98 74 c3 8d |....O..Q.4...t..| +peer0.org2.example.com | 00000020 1f 06 cd 96 02 20 66 e9 6b f4 de aa c9 48 75 e2 |..... f.k....Hu.| +peer0.org2.example.com | 00000030 38 0f dd 45 03 ea 93 da b0 e1 7e 67 8a 3f 01 cf |8..E......~g.?..| +peer0.org2.example.com | 00000040 58 38 a7 4b d5 e7 |X8.K..| +peer0.org2.example.com | [431f 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4320 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [4321 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4322 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4323 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4324 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4325 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4326 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4327 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [4328 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4329 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [432a 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [432b 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [432c 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [432d 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [432e 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [432f 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4330 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4331 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4332 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4333 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4334 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4335 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4336 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4337 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4338 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4339 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427a9e0 gate 1589998893327034100 evaluation starts +peer0.org2.example.com | [433a 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427a9e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [433b 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427a9e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [433c 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427a9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [433d 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427a9e0 principal evaluation fails +peer0.org2.example.com | [433e 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427a9e0 gate 1589998893327034100 evaluation fails +peer0.org2.example.com | [433f 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4340 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4341 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4342 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427af50 gate 1589998893327408000 evaluation starts +peer0.org2.example.com | [4343 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427af50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4344 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427af50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4345 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427af50 principal matched by identity 0 +peer0.org2.example.com | [4346 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 21 81 35 80 98 f0 d0 31 04 37 02 0e 74 1f 1a |.!.5....1.7..t..| +peer0.org2.example.com | 00000010 15 9a 2c a5 da 2c 90 32 99 f3 c9 81 0e a0 4f f6 |..,..,.2......O.| +peer0.org2.example.com | [4347 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 61 d6 7b ec af 4b cf d3 c9 71 4f |0D. 6a.{..K...qO| +peer0.org2.example.com | 00000010 6c 28 98 49 10 ae a8 27 e9 69 a8 bc 57 49 36 1f |l(.I...'.i..WI6.| +peer0.org2.example.com | 00000020 e4 8c ee 45 02 20 59 72 38 db a2 29 89 8f 97 52 |...E. Yr8..)...R| +peer0.org2.example.com | 00000030 95 29 e9 7e 53 56 c2 89 ab 42 a9 00 b0 2b 3d e6 |.).~SV...B...+=.| +peer0.org2.example.com | 00000040 22 6a 03 6c 28 06 |"j.l(.| +peer0.org2.example.com | [4348 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427af50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4349 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00427af50 gate 1589998893327408000 evaluation succeeds +peer0.org2.example.com | [434a 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [434b 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [434c 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [434d 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [434e 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [434f 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4350 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4351 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4352 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4353 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4354 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4355 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4356 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4357 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4358 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4359 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [435a 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [435b 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40b8 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer1.org1.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer1.org1.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer1.org1.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer1.org1.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer1.org1.example.com | [40ba 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [40bb 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [40bc 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40bd 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40be 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [40bf 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [40c0 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40c1 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40c2 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40c3 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40c4 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40c5 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40c6 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [40c7 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40c8 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40c9 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40ca 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [40cb 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40cc 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [40cd 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40ce 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [40cf 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [40d0 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40d1 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [40d2 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [40d3 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [40d4 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [40d5 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [40d6 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [40d7 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c310 gate 1589998900924752000 evaluation starts +peer1.org1.example.com | [40d8 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c310 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [40d9 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c310 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [40da 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [40db 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c310 principal evaluation fails +peer1.org1.example.com | [40dc 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c310 gate 1589998900924752000 evaluation fails +peer1.org1.example.com | [40dd 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [40de 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [40df 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [40e0 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c880 gate 1589998900925925800 evaluation starts +peer1.org1.example.com | [40e1 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c880 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [40e2 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c880 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [40e3 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [40e4 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c880 principal evaluation fails +peer1.org1.example.com | [40e5 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1c880 gate 1589998900925925800 evaluation fails +peer1.org1.example.com | [40e6 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [40e7 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [40e8 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4269 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004053330 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [426a 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004053330 principal matched by identity 0 +peer1.org2.example.com | [426b 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer1.org2.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer1.org2.example.com | [426c 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer1.org2.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer1.org2.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer1.org2.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer1.org2.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer1.org2.example.com | [426d 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004053330 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [426e 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004053330 gate 1589998893193566100 evaluation succeeds +peer1.org2.example.com | [426f 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4270 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4271 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4272 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4273 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4274 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4275 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4276 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer1.org2.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer1.org2.example.com | [4277 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer1.org2.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer1.org2.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer1.org2.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer1.org2.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer1.org2.example.com | [4278 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4279 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [427a 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [427b 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 53 0b 00 f7 89 a5 eb 6a 24 a7 c9 74 38 68 f1 |4S......j$..t8h.| +peer1.org2.example.com | 00000010 04 1d 36 bb 9c c6 aa 18 31 cb 8f 86 e3 b5 66 7e |..6.....1.....f~| +peer1.org2.example.com | [427c 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a5 74 b6 f9 29 0d 09 5e 35 99 d9 |0D. &.t..)..^5..| +peer1.org2.example.com | 00000010 c8 29 65 f1 b3 f7 14 c1 19 e2 72 cc 9e 56 a3 83 |.)e.......r..V..| +peer1.org2.example.com | 00000020 9c db 2e 98 02 20 37 8d 3b 4f fa c7 9a 97 c1 ee |..... 7.;O......| +peer1.org2.example.com | 00000030 fe 46 6d 7e b5 69 19 59 ba 22 cc 4e 33 2c 93 cf |.Fm~.i.Y.".N3,..| +peer1.org2.example.com | 00000040 a0 10 16 eb 60 1f |....`.| +peer1.org2.example.com | [427d 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [427e 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [427f 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4280 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4281 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4282 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4283 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4285 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4284 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4286 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [435c 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [435d 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [435e 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [435f 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4360 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4361 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4362 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4363 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4364 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4365 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4366 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4367 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4368 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4369 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [436a 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [436b 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [436c 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [436d 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816103A +peer0.org2.example.com | [436e 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1F2E5D5F01693B832571A891351EC27F1C5BF61AB82A22F36FD80528C1959E5A +peer0.org2.example.com | [436f 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4370 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4371 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4372 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [4373 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4374 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4375 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4376 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4377 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4378 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4379 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [437a 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [437b 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [437c 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [437d 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [437e 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4287 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4288 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4289 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [428a 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [428b 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [428c 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [428d 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [428e 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067a40 gate 1589998893205821800 evaluation starts +peer1.org2.example.com | [428f 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067a40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4290 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067a40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4291 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4292 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067a40 principal evaluation fails +peer1.org2.example.com | [4293 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067a40 gate 1589998893205821800 evaluation fails +peer1.org2.example.com | [4294 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4295 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4296 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4297 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067fb0 gate 1589998893206491600 evaluation starts +peer1.org2.example.com | [4298 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4299 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067fb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [429a 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067fb0 principal matched by identity 0 +peer1.org2.example.com | [429b 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +peer1.org2.example.com | 00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +peer1.org2.example.com | [429c 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +peer1.org2.example.com | 00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +peer1.org2.example.com | 00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +peer1.org2.example.com | 00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +peer1.org2.example.com | 00000040 5c 0c f4 3b 58 db 03 |\..;X..| +peer1.org2.example.com | [429d 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067fb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [429e 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004067fb0 gate 1589998893206491600 evaluation succeeds +peer1.org2.example.com | [429f 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42a0 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42a1 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [42a2 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [42a3 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [42a4 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42a5 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [42a6 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer1.org2.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer1.org2.example.com | [42a7 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer1.org2.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer1.org2.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer1.org2.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer1.org2.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer1.org2.example.com | [42a8 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42a9 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42aa 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [42ab 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 53 0b 00 f7 89 a5 eb 6a 24 a7 c9 74 38 68 f1 |4S......j$..t8h.| +peer1.org2.example.com | 00000010 04 1d 36 bb 9c c6 aa 18 31 cb 8f 86 e3 b5 66 7e |..6.....1.....f~| +peer1.org2.example.com | [42ac 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a5 74 b6 f9 29 0d 09 5e 35 99 d9 |0D. &.t..)..^5..| +peer1.org2.example.com | 00000010 c8 29 65 f1 b3 f7 14 c1 19 e2 72 cc 9e 56 a3 83 |.)e.......r..V..| +peer1.org2.example.com | 00000020 9c db 2e 98 02 20 37 8d 3b 4f fa c7 9a 97 c1 ee |..... 7.;O......| +peer1.org2.example.com | 00000030 fe 46 6d 7e b5 69 19 59 ba 22 cc 4e 33 2c 93 cf |.Fm~.i.Y.".N3,..| +peer1.org2.example.com | 00000040 a0 10 16 eb 60 1f |....`.| +peer1.org2.example.com | [42ad 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42ae 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42af 05-20 18:21:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42b0 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42b1 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42b2 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [42b3 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [42b4 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 53 0b 00 f7 89 a5 eb 6a 24 a7 c9 74 38 68 f1 |4S......j$..t8h.| +peer1.org2.example.com | 00000010 04 1d 36 bb 9c c6 aa 18 31 cb 8f 86 e3 b5 66 7e |..6.....1.....f~| +peer1.org2.example.com | [42b5 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a5 74 b6 f9 29 0d 09 5e 35 99 d9 |0D. &.t..)..^5..| +peer1.org2.example.com | 00000010 c8 29 65 f1 b3 f7 14 c1 19 e2 72 cc 9e 56 a3 83 |.)e.......r..V..| +peer1.org2.example.com | 00000020 9c db 2e 98 02 20 37 8d 3b 4f fa c7 9a 97 c1 ee |..... 7.;O......| +peer1.org2.example.com | 00000030 fe 46 6d 7e b5 69 19 59 ba 22 cc 4e 33 2c 93 cf |.Fm~.i.Y.".N3,..| +peer1.org2.example.com | 00000040 a0 10 16 eb 60 1f |....`.| +peer1.org2.example.com | [42b6 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [42b7 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 a8 50 d3 25 c8 a8 a6 1d 67 38 08 |0D. Q.P.%....g8.| +peer1.org2.example.com | 00000010 f5 c0 d9 81 4f 1a 17 51 b1 34 8f a0 98 74 c3 8d |....O..Q.4...t..| +peer1.org2.example.com | 00000020 1f 06 cd 96 02 20 66 e9 6b f4 de aa c9 48 75 e2 |..... f.k....Hu.| +peer1.org2.example.com | 00000030 38 0f dd 45 03 ea 93 da b0 e1 7e 67 8a 3f 01 cf |8..E......~g.?..| +peer1.org2.example.com | 00000040 58 38 a7 4b d5 e7 |X8.K..| +peer1.org2.example.com | [42b8 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [42b9 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [42ba 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42bb 05-20 18:21:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42bc 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42bd 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42be 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42bf 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [42c0 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42c1 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [42c2 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [42c3 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [42c4 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [42c5 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [42c6 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [42c7 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409fa30 gate 1589998893348880700 evaluation starts +peer1.org2.example.com | [42c8 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409fa30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42c9 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409fa30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [42ca 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409fa30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [42cb 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409fa30 principal evaluation fails +peer1.org2.example.com | [42cc 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409fa30 gate 1589998893348880700 evaluation fails +peer1.org2.example.com | [42cd 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [42ce 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [42cf 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [42d0 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409ffa0 gate 1589998893349266000 evaluation starts +peer1.org2.example.com | [42d1 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409ffa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42d2 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409ffa0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [42d3 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409ffa0 principal matched by identity 0 +peer1.org2.example.com | [42d4 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 21 81 35 80 98 f0 d0 31 04 37 02 0e 74 1f 1a |.!.5....1.7..t..| +peer1.org2.example.com | 00000010 15 9a 2c a5 da 2c 90 32 99 f3 c9 81 0e a0 4f f6 |..,..,.2......O.| +peer1.org2.example.com | [42d5 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 61 d6 7b ec af 4b cf d3 c9 71 4f |0D. 6a.{..K...qO| +peer1.org2.example.com | 00000010 6c 28 98 49 10 ae a8 27 e9 69 a8 bc 57 49 36 1f |l(.I...'.i..WI6.| +peer1.org2.example.com | 00000020 e4 8c ee 45 02 20 59 72 38 db a2 29 89 8f 97 52 |...E. Yr8..)...R| +peer1.org2.example.com | 00000030 95 29 e9 7e 53 56 c2 89 ab 42 a9 00 b0 2b 3d e6 |.).~SV...B...+=.| +peer1.org2.example.com | 00000040 22 6a 03 6c 28 06 |"j.l(.| +peer1.org2.example.com | [42d6 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409ffa0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [42d7 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409ffa0 gate 1589998893349266000 evaluation succeeds +peer1.org2.example.com | [42d8 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42d9 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42da 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [42db 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [42dc 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42dd 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42de 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42df 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [42e0 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [42e1 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [42e2 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [42e3 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e4 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e5 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e6 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42e7 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e8 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e9 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42ea 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42eb 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42ec 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42ed 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42ee 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42ef 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f0 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f1 05-20 18:21:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f2 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f3 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f4 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [42f5 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f6 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [42f7 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42f8 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42f9 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42fa 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42fb 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42fc 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42fd 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42fe 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [42ff 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4300 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 2e 5d 5f 01 69 3b 83 25 71 a8 91 35 1e c2 7f |..]_.i;.%q..5...| +peer1.org2.example.com | 00000010 1c 5b f6 1a b8 2a 22 f3 6f d8 05 28 c1 95 9e 5a |.[...*".o..(...Z| +peer1.org2.example.com | [4301 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 da 1b 61 14 be 37 c0 12 2f cc b2 |0D. 0..a..7../..| +peer1.org2.example.com | 00000010 39 66 1e 18 39 19 ed ad 44 02 51 66 6a c6 09 37 |9f..9...D.Qfj..7| +peer1.org2.example.com | 00000020 d9 a9 a6 e3 02 20 41 36 56 18 0b 4e 83 90 d7 dd |..... A6V..N....| +peer1.org2.example.com | 00000030 eb c5 67 42 bc 75 ae 58 55 79 f4 cd ae 33 80 dd |..gB.u.XUy...3..| +peer1.org2.example.com | 00000040 e2 02 0f e5 5b e4 |....[.| +peer1.org2.example.com | [4302 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4303 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4304 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4305 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [437f 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4380 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4381 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4382 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4383 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4384 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 40 5e d8 c2 f2 23 07 a8 9e 95 1f e2 cc be 4f |r@^...#........O| +peer0.org2.example.com | 00000010 eb 2d 03 a9 44 50 df 1c 22 f9 bd 8e 2f 09 4f 0b |.-..DP..".../.O.| +peer0.org2.example.com | [4385 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 ec 28 4d b9 67 61 5f 45 e3 c3 |0E.!...(M.ga_E..| +peer0.org2.example.com | 00000010 87 71 18 3f e3 14 d2 9c c2 16 e7 10 b3 46 1c 1a |.q.?.........F..| +peer0.org2.example.com | 00000020 27 a9 50 fc 0f 02 20 00 b1 c1 a8 fb 8f 39 28 e7 |'.P... ......9(.| +peer0.org2.example.com | 00000030 d5 a5 45 61 49 b5 ba 66 6d f5 b4 8f bf 86 20 d8 |..EaI..fm..... .| +peer0.org2.example.com | 00000040 97 55 fe 9a 6d 5d ce |.U..m].| +peer0.org2.example.com | [4386 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4387 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4388 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4389 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [438a 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [438b 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [438c 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [438d 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [438e 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [438f 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4390 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4391 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4392 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4393 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4394 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4395 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4396 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4397 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4398 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4399 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [439a 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [439b 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [439c 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [439d 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [439e 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [439f 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43a0 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34588 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43a1 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43a2 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43a3 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [43a4 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43a5 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [43a6 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [43a7 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [43a8 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [43a9 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [43aa 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [43ab 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dabe0 gate 1589998894027179100 evaluation starts +peer0.org2.example.com | [43ac 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dabe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [43ad 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dabe0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [40e9 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1cdf0 gate 1589998900927027900 evaluation starts +peer1.org1.example.com | [40ea 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1cdf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [40eb 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1cdf0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [40ec 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1cdf0 principal matched by identity 0 +peer1.org1.example.com | [40ed 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer1.org1.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer1.org1.example.com | [40ee 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer1.org1.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer1.org1.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer1.org1.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer1.org1.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer1.org1.example.com | [40ef 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1cdf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [40f0 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1cdf0 gate 1589998900927027900 evaluation succeeds +peer1.org1.example.com | [40f1 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [40f2 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [40f3 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [40f4 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [40f5 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [40f6 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [40f7 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [40f8 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [40f9 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [40fa 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40fb 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40fc 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40fd 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [40fe 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40ff 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4100 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4101 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4102 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [4103 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4104 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\255B\251\237~\002 u\372\346\277\313>`NB\210\242\262O\350\362\235\252\354\230\211\222E\271\313\214Ne\2127\240SW" > alive:\0243\272\346WVeP\004\241\304.\031\272\200\371\266%\334" > +peer1.org1.example.com | [4105 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [4106 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4107 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [4108 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4109 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +peer1.org1.example.com | 00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +peer1.org1.example.com | [410a 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +peer1.org1.example.com | 00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +peer1.org1.example.com | 00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +peer1.org1.example.com | 00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +peer1.org1.example.com | 00000040 14 88 56 f5 8e 65 |..V..e| +peer1.org1.example.com | [410b 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [410c 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 9d 63 71 44 49 97 52 4a 24 a0 dc |0D. 1.cqDI.RJ$..| +peer1.org1.example.com | 00000010 d3 9b ab 37 13 20 15 8f 0b 05 11 d7 24 7c f8 54 |...7. ......$|.T| +peer1.org1.example.com | 00000020 73 dd 9a b8 02 20 54 a9 2d b3 76 9c b9 f6 5c 33 |s.... T.-.v...\3| +peer1.org1.example.com | 00000030 6a bd dd ef 84 f4 e2 54 1e 4d 0e 65 de 6a 35 fd |j......T.M.e.j5.| +peer1.org1.example.com | 00000040 f7 f0 b2 11 90 c9 |......| +peer1.org1.example.com | [410d 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [410e 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [43ae 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dabe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [43af 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dabe0 principal evaluation fails +peer0.org2.example.com | [43b0 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042dabe0 gate 1589998894027179100 evaluation fails +peer0.org2.example.com | [43b1 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [43b2 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [43b3 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [43b4 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042db150 gate 1589998894035955200 evaluation starts +peer0.org2.example.com | [43b5 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042db150 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [43b6 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042db150 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [43b7 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042db150 principal matched by identity 0 +peer0.org2.example.com | [43b8 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 54 a7 27 ac c3 28 b5 79 9b b5 2e e8 e5 61 3f |.T.'..(.y.....a?| +peer0.org2.example.com | 00000010 36 d6 d5 19 3e 0a 9a 31 c1 96 9d 84 ce bc 04 29 |6...>..1.......)| +peer0.org2.example.com | [43b9 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 f8 03 37 d7 bf 8c 2e 25 32 dc c9 |0D. ...7....%2..| +peer0.org2.example.com | 00000010 23 d9 07 77 e8 33 7f ef 72 02 d1 2f eb 80 65 7a |#..w.3..r../..ez| +peer0.org2.example.com | 00000020 db bd 58 7a 02 20 6b b0 4d 66 c0 d3 ca 49 e0 ed |..Xz. k.Mf...I..| +peer0.org2.example.com | 00000030 04 bd c3 d8 55 c6 36 d6 64 c1 17 7f 41 07 1f 25 |....U.6.d...A..%| +peer0.org2.example.com | 00000040 89 a8 10 dc 74 30 |....t0| +peer0.org2.example.com | [43ba 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042db150 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [43bb 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042db150 gate 1589998894035955200 evaluation succeeds +peer0.org2.example.com | [43bc 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [43bd 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4306 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4307 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4308 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4309 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [430a 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [430b 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [430c 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [430d 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [430e 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [430f 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4310 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4311 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4312 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4313 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4314 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4315 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4316 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4317 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4318 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4319 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [431a 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [431b 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [431c 05-20 18:21:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [431d 05-20 18:21:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816103C +peer1.org2.example.com | [431e 05-20 18:21:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 72405ED8C2F22307A89E951FE2CCBE4FEB2D03A94450DF1C22F9BD8E2F094F0B +peer1.org2.example.com | [431f 05-20 18:21:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4320 05-20 18:21:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4321 05-20 18:21:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4322 05-20 18:21:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [4323 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4324 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4325 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4326 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4327 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4328 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4329 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [432a 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [432b 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [432d 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [432c 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [432e 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [432f 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4330 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4331 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4332 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4333 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4334 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43be 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [43bf 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [43c0 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43c1 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [43c2 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [43c3 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [43c4 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [43c5 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43c6 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43c7 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43c8 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43c9 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43ca 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43cb 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43cc 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43cd 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43ce 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43cf 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [43d0 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43d1 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [43d2 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43d3 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43d4 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43d5 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43d6 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43d7 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43d8 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43d9 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43da 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52574 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43db 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43dc 05-20 18:21:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [43dd 05-20 18:21:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43de 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:43234 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes +peer0.org2.example.com | [43df 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [43e0 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [43e1 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [43e2 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [43e3 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [43e4 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4a50 gate 1589998895249759300 evaluation starts +peer0.org2.example.com | [43e5 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4a50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [43e6 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4a50 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [43e7 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4a50 principal matched by identity 0 +peer0.org2.example.com | [43e8 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 87 87 7f 13 5e f6 db 66 b0 b1 bd 66 9e 18 bc |.....^..f...f...| +peer0.org2.example.com | 00000010 13 91 ed 8a 3e 67 f7 03 4c ad 6d 05 df 46 a9 d9 |....>g..L.m..F..| +peer0.org2.example.com | [43e9 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 e0 45 06 b2 29 ae 57 9a fc 76 4e |0D. s.E..).W..vN| +peer0.org2.example.com | 00000010 5c 64 0c b0 3c 09 f7 2a f4 bc e4 e5 89 75 c1 d1 |\d..<..*.....u..| +peer0.org2.example.com | 00000020 5e 26 5e 2f 02 20 2c 28 c9 85 45 c5 aa 13 24 53 |^&^/. ,(..E...$S| +peer0.org2.example.com | 00000030 60 fe 99 55 99 cc 33 f0 40 a6 78 f7 f7 58 04 a9 |`..U..3.@.x..X..| +peer1.org1.example.com | [410f 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4110 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4111 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4112 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4113 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4114 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4115 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [4116 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4117 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4118 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4119 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [411a 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [411b 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\0243\272\346WVeP\004\241\304.\031\272\200\371\266%\334" > +peer1.org1.example.com | [411c 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [411d 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [411e 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [411f 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4120 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4121 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4122 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4123 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4124 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4125 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [4126 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4127 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4128 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4129 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [412a 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [412b 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [412c 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [401a 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [401b 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [401c 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [401d 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [401e 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [401f 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4020 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4021 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4022 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4023 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4024 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4025 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4026 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4027 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4028 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4029 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [402a 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [402b 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4335 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4336 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4337 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4338 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4339 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [433a 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [433b 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e76c0 gate 1589998894031658400 evaluation starts +peer1.org2.example.com | [433c 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e76c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [433d 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e76c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [433e 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e76c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [433f 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e76c0 principal evaluation fails +peer1.org2.example.com | [4340 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e76c0 gate 1589998894031658400 evaluation fails +peer1.org2.example.com | [4341 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4342 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4343 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4344 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e7c30 gate 1589998894038521600 evaluation starts +peer1.org2.example.com | [4345 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e7c30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4346 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e7c30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4347 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e7c30 principal matched by identity 0 +peer1.org2.example.com | [4348 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 54 a7 27 ac c3 28 b5 79 9b b5 2e e8 e5 61 3f |.T.'..(.y.....a?| +peer1.org2.example.com | 00000010 36 d6 d5 19 3e 0a 9a 31 c1 96 9d 84 ce bc 04 29 |6...>..1.......)| +peer1.org2.example.com | [4349 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 f8 03 37 d7 bf 8c 2e 25 32 dc c9 |0D. ...7....%2..| +peer1.org2.example.com | 00000010 23 d9 07 77 e8 33 7f ef 72 02 d1 2f eb 80 65 7a |#..w.3..r../..ez| +peer1.org2.example.com | 00000020 db bd 58 7a 02 20 6b b0 4d 66 c0 d3 ca 49 e0 ed |..Xz. k.Mf...I..| +peer1.org2.example.com | 00000030 04 bd c3 d8 55 c6 36 d6 64 c1 17 7f 41 07 1f 25 |....U.6.d...A..%| +peer1.org2.example.com | 00000040 89 a8 10 dc 74 30 |....t0| +peer1.org2.example.com | [434a 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e7c30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [434b 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e7c30 gate 1589998894038521600 evaluation succeeds +peer1.org2.example.com | [434c 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [434d 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [434e 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [434f 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4350 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4351 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4352 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4353 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4354 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4355 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4356 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4357 05-20 18:21:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4358 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4359 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [435a 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [435b 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [435c 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [435d 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [435e 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [435f 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4360 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [402c 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [402d 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [402e 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [402f 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4031 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4032 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4030 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4033 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 gate 1589998888908133600 evaluation starts +peer0.org1.example.com | [4034 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4035 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4037 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4038 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4036 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4039 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 principal matched by identity 0 +peer0.org1.example.com | [403a 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 1e 74 7c 7e b9 e3 9f 9f a7 fb f1 a8 7d df ee |8.t|~........}..| +peer0.org1.example.com | 00000010 68 7e 2a 3f 2e 2b 10 2e 4a 64 bb d2 e9 77 f8 a1 |h~*?.+..Jd...w..| +peer0.org1.example.com | [403b 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 fd cd 4c f8 c1 51 90 7e 36 0b |0E.!....L..Q.~6.| +peer0.org1.example.com | 00000010 42 28 0c 3a 7b e5 84 a3 1f e3 88 4e 2f 01 3c e7 |B(.:{......N/.<.| +peer0.org1.example.com | 00000020 0e d1 cb fe 77 02 20 34 5c 17 c5 c1 40 1b e9 55 |....w. 4\...@..U| +peer0.org1.example.com | 00000030 89 dd ae 66 19 2c a2 ff 23 2b 86 b5 9e 5c d7 02 |...f.,..#+...\..| +peer0.org1.example.com | 00000040 ee 64 9e 75 a1 03 51 |.d.u..Q| +peer0.org1.example.com | [403c 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [403d 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 gate 1589998888908133600 evaluation succeeds +peer0.org1.example.com | [403e 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [403f 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4040 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4041 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4042 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4043 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4044 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4045 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4046 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4047 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4048 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4049 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [404a 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [404b 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [404c 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [404d 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [404e 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [404f 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4050 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4051 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4052 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4053 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4055 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4056 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4054 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4057 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4058 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4059 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [405a 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [405b 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [405d 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [405c 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [405e 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [405f 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4060 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4061 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 f3 97 5b 74 de 1b |..[t..| +peer0.org2.example.com | [43ea 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4a50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [43eb 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4a50 gate 1589998895249759300 evaluation succeeds +peer0.org2.example.com | [43ec 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [43ed 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [43ee 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [43ef 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [43f0 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [43f1 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer0.org2.example.com | [43f2 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43f3 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [43f4 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org2.example.com | [43f5 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [43f6 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer0.org2.example.com | [43f7 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer0.org2.example.com | [43f8 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org2.example.com | [43f9 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer0.org2.example.com | [43fa 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org2.example.com | [43fb 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [43fc 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004216700 env 0xc00425d7c0 txn 0 +peer0.org2.example.com | [43fd 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00425d7c0 +peer0.org2.example.com | [43fe 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +peer0.org2.example.com | [43ff 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [4400 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [4401 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [4402 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4403 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [4404 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [4405 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [4406 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [4407 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [4408 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 49 4f 23 4c 66 ab 43 40 69 01 b9 28 34 2c |.IIO#Lf.C@i..(4,| +peer0.org2.example.com | 00000010 71 2d cf eb 11 06 d8 cc 15 14 32 60 e9 81 58 21 |q-........2`..X!| +peer0.org2.example.com | [4409 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 51 e2 c7 48 26 65 f8 8c 6e 5a 85 |0D. .Q..H&e..nZ.| +peer0.org2.example.com | 00000010 8a 41 ca a0 4b 9c 5c 82 d8 9b c8 b3 00 54 02 d4 |.A..K.\......T..| +peer0.org2.example.com | 00000020 81 5b 50 d2 02 20 01 14 a5 f1 ad ed ae d1 ee fd |.[P.. ..........| +peer0.org2.example.com | 00000030 6f ef 05 30 85 7c 16 66 26 77 a5 98 56 0f 7e 61 |o..0.|.f&w..V.~a| +peer0.org2.example.com | 00000040 43 ae 34 84 59 de |C.4.Y.| +peer0.org2.example.com | [440a 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [4062 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4063 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4064 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4065 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4066 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4067 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 gate 1589998888928027200 evaluation starts +peer0.org1.example.com | [4068 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4069 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [406a 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 principal matched by identity 0 +peer0.org1.example.com | [406b 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer0.org1.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer0.org1.example.com | [406c 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer0.org1.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer0.org1.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer0.org1.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer0.org1.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer0.org1.example.com | [406d 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [406e 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 gate 1589998888928027200 evaluation succeeds +peer0.org1.example.com | [406f 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4070 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4071 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4072 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4073 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4074 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4075 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4076 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4077 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4078 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4079 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [407a 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [407b 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [407c 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [407d 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [407e 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [407f 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4080 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4081 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4082 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4361 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4362 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4363 05-20 18:21:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4364 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4365 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4366 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4367 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4368 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4369 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [436a 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [436b 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [436c 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [436d 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [436e 05-20 18:21:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [436f 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4370 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4371 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [4372 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4373 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [4374 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e250 gate 1589998895224003400 evaluation starts +peer1.org2.example.com | [4375 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4376 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e250 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4377 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e250 principal matched by identity 0 +peer1.org2.example.com | [4378 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 87 87 7f 13 5e f6 db 66 b0 b1 bd 66 9e 18 bc |.....^..f...f...| +peer1.org2.example.com | 00000010 13 91 ed 8a 3e 67 f7 03 4c ad 6d 05 df 46 a9 d9 |....>g..L.m..F..| +peer1.org2.example.com | [4379 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 e0 45 06 b2 29 ae 57 9a fc 76 4e |0D. s.E..).W..vN| +peer1.org2.example.com | 00000010 5c 64 0c b0 3c 09 f7 2a f4 bc e4 e5 89 75 c1 d1 |\d..<..*.....u..| +peer1.org2.example.com | 00000020 5e 26 5e 2f 02 20 2c 28 c9 85 45 c5 aa 13 24 53 |^&^/. ,(..E...$S| +peer1.org2.example.com | 00000030 60 fe 99 55 99 cc 33 f0 40 a6 78 f7 f7 58 04 a9 |`..U..3.@.x..X..| +peer1.org2.example.com | 00000040 f3 97 5b 74 de 1b |..[t..| +peer1.org2.example.com | [437a 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e250 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [437b 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e250 gate 1589998895224003400 evaluation succeeds +peer1.org2.example.com | [437c 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [437d 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [437e 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [437f 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [4380 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org2.example.com | [4381 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org2.example.com | [4382 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [4384 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +peer1.org2.example.com | [4385 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [4383 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer1.org2.example.com | [4386 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer1.org2.example.com | [4387 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer1.org2.example.com | [4388 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org2.example.com | [4389 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer1.org2.example.com | [438a 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer1.org2.example.com | [438b 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00400b200 env 0xc003fdd400 txn 0 +peer1.org2.example.com | [438c 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003fdd400 +peer1.org2.example.com | [438d 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +peer1.org2.example.com | [438e 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [438f 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [4390 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [4391 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4392 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | [412d 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [412e 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [412f 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4130 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4131 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4132 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4133 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d7c0 gate 1589998901203577000 evaluation starts +peer1.org1.example.com | [4134 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d7c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4135 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d7c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4136 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4137 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d7c0 principal evaluation fails +peer1.org1.example.com | [4138 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d7c0 gate 1589998901203577000 evaluation fails +peer1.org1.example.com | [4139 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [413a 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [413b 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [413c 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3dd30 gate 1589998901204846000 evaluation starts +peer1.org1.example.com | [413d 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3dd30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [413e 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3dd30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [413f 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3dd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4140 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3dd30 principal evaluation fails +peer1.org1.example.com | [4141 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3dd30 gate 1589998901204846000 evaluation fails +peer1.org1.example.com | [4142 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4143 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4144 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4145 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e2a0 gate 1589998901205199200 evaluation starts +peer1.org1.example.com | [4146 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e2a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4147 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e2a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4148 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e2a0 principal matched by identity 0 +peer1.org1.example.com | [4149 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 73 82 1e c1 5a 80 c0 69 90 25 27 15 6f d8 ea |os...Z..i.%'.o..| +peer1.org1.example.com | 00000010 c0 35 2c 6d c9 80 35 12 85 e1 b5 74 80 a0 93 29 |.5,m..5....t...)| +peer1.org1.example.com | [414a 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 5a 29 65 a2 f7 7e 5b de e0 85 |0E.!..Z)e..~[...| +peer1.org1.example.com | 00000010 18 f5 1b bf 8d 7a 8f 3f af 34 53 df fe 45 23 ed |.....z.?.4S..E#.| +peer1.org1.example.com | 00000020 8d 59 58 4c ca 02 20 4e fb f7 56 49 f9 05 19 33 |.YXL.. N..VI...3| +peer1.org1.example.com | 00000030 65 72 94 04 07 dc e7 fb b5 87 b1 2a 38 19 b6 27 |er.........*8..'| +peer1.org1.example.com | 00000040 62 a1 6d e9 cb 41 98 |b.m..A.| +peer1.org1.example.com | [414b 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e2a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [414c 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e2a0 gate 1589998901205199200 evaluation succeeds +peer1.org1.example.com | [414d 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [414e 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [414f 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4150 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4151 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4152 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [4153 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4154 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4155 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [4156 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4157 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4158 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4159 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [415a 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [415b 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [415c 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [415d 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [415e 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\0243\272\346WVeP\004\241\304.\031\272\200\371\266%\334" > +peer1.org1.example.com | [415f 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [4160 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4161 05-20 18:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4162 05-20 18:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161048 +peer1.org1.example.com | [4163 05-20 18:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 634B2B9F23A7436FBEA16B0BB10F0C16BABC0F7B1B6ED19BFDA5D5B769DD65A8 +peer1.org1.example.com | [4164 05-20 18:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4165 05-20 18:21:43.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [4166 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [4167 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [4168 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4169 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [416a 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [416b 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [416c 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [416d 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [416e 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [416f 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4170 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4171 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4172 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4173 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4174 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4175 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4176 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4177 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4178 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4179 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [417a 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [417b 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [417c 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [417d 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [417e 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [417f 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4180 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4181 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4182 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4183 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4184 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ff70 gate 1589998903652992500 evaluation starts +peer1.org1.example.com | [4185 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ff70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4186 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ff70 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4187 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ff70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4188 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ff70 principal evaluation fails +peer1.org1.example.com | [4189 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6ff70 gate 1589998903652992500 evaluation fails +peer1.org1.example.com | [418a 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [418b 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [418c 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [418d 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa64e0 gate 1589998903653314600 evaluation starts +peer1.org1.example.com | [418e 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa64e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [418f 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa64e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4190 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa64e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4191 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa64e0 principal evaluation fails +peer1.org1.example.com | [4192 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa64e0 gate 1589998903653314600 evaluation fails +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4393 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org2.example.com | [4394 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [4395 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [4396 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [4397 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 49 4f 23 4c 66 ab 43 40 69 01 b9 28 34 2c |.IIO#Lf.C@i..(4,| +peer1.org2.example.com | 00000010 71 2d cf eb 11 06 d8 cc 15 14 32 60 e9 81 58 21 |q-........2`..X!| +peer1.org2.example.com | [4398 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 51 e2 c7 48 26 65 f8 8c 6e 5a 85 |0D. .Q..H&e..nZ.| +peer1.org2.example.com | 00000010 8a 41 ca a0 4b 9c 5c 82 d8 9b c8 b3 00 54 02 d4 |.A..K.\......T..| +peer1.org2.example.com | 00000020 81 5b 50 d2 02 20 01 14 a5 f1 ad ed ae d1 ee fd |.[P.. ..........| +peer1.org2.example.com | 00000030 6f ef 05 30 85 7c 16 66 26 77 a5 98 56 0f 7e 61 |o..0.|.f&w..V.~a| +peer1.org2.example.com | 00000040 43 ae 34 84 59 de |C.4.Y.| +peer1.org2.example.com | [4399 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [439a 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0041c0000, header channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +peer1.org2.example.com | [439b 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [439c 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [439d 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [439e 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [439f 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [43a0 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [43a1 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [43a2 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [43a4 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [43a3 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43a5 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [43a6 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [43a7 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43a8 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [43a9 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [43aa 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [43ab 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [43ac 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [43ad 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43ae 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [43af 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [43b0 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43b1 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [43b2 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [43b3 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [43b4 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [43b5 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43b6 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [43b7 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [440b 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00438a000, header channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +peer0.org2.example.com | [440c 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [440d 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [440e 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [440f 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [4410 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4412 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4413 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4414 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4411 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [4415 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [4416 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [4417 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [4418 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [4419 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [441a 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [441b 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [441c 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [441d 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [441e 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [441f 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [4420 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [4421 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [4422 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [4423 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [4424 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4425 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [4426 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [4427 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [4428 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [4429 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [442a 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [442b 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [442c 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [442d 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [442e 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [442f 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [4430 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [4431 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer0.org2.example.com | [4432 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer0.org2.example.com | [4433 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer0.org2.example.com | [4434 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4435 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4436 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [4437 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4438 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4439 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [443a 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [443b 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [443c 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer0.org2.example.com | [443d 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [443e 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org2.example.com | [443f 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [4440 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d3740 gate 1589998895284420900 evaluation starts +peer0.org2.example.com | [4441 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d3740 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [4193 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4194 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4195 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4196 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa6a50 gate 1589998903653587900 evaluation starts +peer1.org1.example.com | [4197 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa6a50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4198 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa6a50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4199 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa6a50 principal matched by identity 0 +peer1.org1.example.com | [419a 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 7e 05 ba df ab bc 44 10 f3 cf 33 c6 58 33 1c |+~.....D...3.X3.| +peer1.org1.example.com | 00000010 05 5a 6c f6 c2 ad 21 05 03 05 3a c1 7b c4 5d 04 |.Zl...!...:.{.].| +peer1.org1.example.com | [419b 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c2 02 c9 a5 53 05 3e 8f 82 fa 1b |0D. *....S.>....| +peer1.org1.example.com | 00000010 b6 f8 ba e7 37 97 2a a4 f4 bc bd c4 af 50 f9 52 |....7.*......P.R| +peer1.org1.example.com | 00000020 37 f8 1f 89 02 20 6c 9a f0 e3 0f 86 b2 6e b8 f6 |7.... l......n..| +peer1.org1.example.com | 00000030 d2 8a 47 1d 5a 07 25 b1 89 13 37 c4 51 20 f2 9c |..G.Z.%...7.Q ..| +peer1.org1.example.com | 00000040 37 f3 17 03 6b c0 |7...k.| +peer1.org1.example.com | [419c 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa6a50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [419d 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa6a50 gate 1589998903653587900 evaluation succeeds +peer1.org1.example.com | [419e 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [419f 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41a0 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [41a1 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41a2 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [41a3 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [41a4 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [41a5 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [41a6 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [41a7 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41a8 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41a9 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41aa 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [41ab 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41ac 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [41ad 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41ae 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41af 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41b0 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [41b1 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41b2 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41b3 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41b4 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41b5 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41b6 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [41b7 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41b8 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [41b9 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [41ba 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41bb 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [41bc 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41bd 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [41be 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41bf 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [41c0 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41c1 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [41c2 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [41c3 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 2 1 3 4 5] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [41c4 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41c5 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41c6 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41c7 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [41c8 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [41c9 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41ca 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [41cb 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41cc 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [41cd 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41ce 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [41cf 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [41d0 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | [43b8 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43b9 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [43ba 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [43bb 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [43bc 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes +peer1.org2.example.com | [43bd 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [43be 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43bf 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [43c0 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [43c1 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [43c2 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [43c3 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [43c4 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer1.org2.example.com | [43c5 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer1.org2.example.com | [43c6 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org2.example.com | [43c7 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [43c8 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [43c9 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [43ca 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [43cb 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [43cc 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [43cd 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [43ce 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [43cf 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer1.org2.example.com | [43d0 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [43d1 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org2.example.com | [43d2 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org2.example.com | [43d3 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c060 gate 1589998895245907200 evaluation starts +peer1.org2.example.com | [43d4 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c060 signed by 0 principal evaluation starts (used [false false false]) +peer1.org2.example.com | [43d5 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c060 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [43d6 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [43d7 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c060 processing identity 1 with bytes of 115a110 +peer1.org2.example.com | [43d8 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [43d9 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [43da 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [43db 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [43dc 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [43dd 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [43de 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c060 principal matched by identity 1 +peer1.org2.example.com | [43df 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +peer1.org2.example.com | 00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..| +peer1.org2.example.com | [43e0 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +peer1.org2.example.com | 00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +peer1.org2.example.com | 00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +peer1.org2.example.com | 00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +peer1.org2.example.com | 00000040 72 24 fc be df 99 95 |r$.....| +peer1.org2.example.com | [43e1 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c060 principal evaluation succeeds for identity 1 +peer1.org2.example.com | [43e2 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c060 gate 1589998895245907200 evaluation succeeds +peer1.org2.example.com | [43e3 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [43e4 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [43e5 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org2.example.com | [43e6 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org2.example.com | [43e7 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c990 gate 1589998895262018500 evaluation starts +peer1.org2.example.com | [43e8 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c990 signed by 0 principal evaluation starts (used [false false false]) +peer1.org2.example.com | [43e9 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c990 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [43ea 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c990 principal matched by identity 0 +peer1.org2.example.com | [43eb 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +peer1.org2.example.com | 00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.| +peer1.org2.example.com | [43ec 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +peer1.org2.example.com | 00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +peer1.org2.example.com | 00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +peer1.org2.example.com | 00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +peer1.org2.example.com | 00000040 61 03 26 ae cc 43 |a.&..C| +peer1.org2.example.com | [43ed 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c990 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [43ee 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425c990 gate 1589998895262018500 evaluation succeeds +peer1.org2.example.com | [43ef 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [43f0 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [43f1 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer1.org2.example.com | [43f2 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org2.example.com | [4442 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d3740 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4443 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [4444 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d3740 processing identity 1 with bytes of 115a110 +peer0.org2.example.com | [4445 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org2.example.com | [4446 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org2.example.com | [4447 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [4448 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [4449 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org2.example.com | [444a 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [444b 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d3740 principal matched by identity 1 +peer0.org2.example.com | [444c 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +peer0.org2.example.com | 00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..| +peer0.org2.example.com | [444d 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +peer0.org2.example.com | 00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +peer0.org2.example.com | 00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +peer0.org2.example.com | 00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +peer0.org2.example.com | 00000040 72 24 fc be df 99 95 |r$.....| +peer0.org2.example.com | [444e 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d3740 principal evaluation succeeds for identity 1 +peer0.org2.example.com | [444f 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d3740 gate 1589998895284420900 evaluation succeeds +peer0.org2.example.com | [4450 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [4451 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [4452 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org2.example.com | [4453 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [4454 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043fe090 gate 1589998895294385600 evaluation starts +peer0.org2.example.com | [4455 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043fe090 signed by 0 principal evaluation starts (used [false false false]) +peer0.org2.example.com | [4456 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043fe090 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4457 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043fe090 principal matched by identity 0 +peer0.org2.example.com | [4458 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +peer0.org2.example.com | 00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.| +peer0.org2.example.com | [4459 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +peer0.org2.example.com | 00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +peer0.org2.example.com | 00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +peer0.org2.example.com | 00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +peer0.org2.example.com | 00000040 61 03 26 ae cc 43 |a.&..C| +peer0.org2.example.com | [445a 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043fe090 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [445b 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043fe090 gate 1589998895294385600 evaluation succeeds +peer0.org2.example.com | [445c 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [445d 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [445e 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org2.example.com | [445f 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org2.example.com | [4460 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [4461 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [4462 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4463 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [4464 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [4465 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [4466 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [4467 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [41d1 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41d2 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4083 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +peer0.org1.example.com | [4084 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4085 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4086 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4087 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161036 +peer0.org1.example.com | [4088 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D563CD7111F2668C92FA2EBB3F29B84EAB965F683633BDDA154C56D3F4DFC433 +peer0.org1.example.com | [4089 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [408a 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [408b 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [408c 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [408d 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [408e 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [408f 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4090 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4091 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4092 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4093 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4094 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4095 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4096 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4097 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4098 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161037 +peer0.org1.example.com | [4099 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1C069EAB2F17AC20ACAC13E8813987BA1B35BAD6EDBC07A394FC647CC66FE64D +peer0.org1.example.com | [409a 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [409b 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [409c 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [409d 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [409e 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [409f 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40a0 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40a1 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [40a2 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40a3 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [40a4 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [40a5 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [40a6 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40a7 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [40a8 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [40a9 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40aa 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [40ab 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40ac 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [40ae 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40ad 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [40af 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [40b0 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [40b1 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [40b2 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer0.org1.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer0.org1.example.com | [40b3 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer0.org1.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer0.org1.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer0.org1.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer0.org1.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer0.org1.example.com | [40b4 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [40b5 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40b6 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40b7 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [40b8 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +peer0.org1.example.com | 00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +peer0.org1.example.com | [40b9 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +peer0.org1.example.com | 00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +peer0.org1.example.com | 00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +peer0.org1.example.com | 00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +peer0.org1.example.com | 00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +peer0.org1.example.com | [40ba 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40bb 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40bc 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40bd 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40be 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [40bf 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [40c0 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40c1 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [40c2 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40c3 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40c4 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [40c5 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [40c6 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [40c7 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 gate 1589998889026867800 evaluation starts +peer0.org1.example.com | [40c9 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40c8 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40cb 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [40cc 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 principal matched by identity 0 +peer0.org1.example.com | [40cd 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +peer0.org1.example.com | 00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +peer1.org2.example.com | [43f3 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [43f4 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [43f5 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [43f6 05-20 18:21:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [43f7 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [43f8 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [43f9 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [43fa 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [43fb 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [43fc 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [43fd 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [43fe 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [43ff 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4400 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4401 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [4402 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [4403 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [4404 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer1.org2.example.com | [4405 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org2.example.com | [4406 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4407 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4408 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4409 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [440a 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [440b 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [440c 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [440d 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [440e 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [440f 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4410 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [4411 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [4412 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [4413 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [4414 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [4415 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [4416 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [4417 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [4418 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [4419 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [441a 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [441b 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [441c 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [441d 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org2.example.com | [441e 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [441f 05-20 18:21:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [4420 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [4421 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [4422 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4423 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [4424 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [4425 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [4426 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [41d3 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [41d4 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41d5 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41d6 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [41d7 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [41d8 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [41d9 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcfd70 gate 1589998903806332600 evaluation starts +peer1.org1.example.com | [41da 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcfd70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41db 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcfd70 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [41dc 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcfd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [41dd 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcfd70 principal evaluation fails +peer1.org1.example.com | [41de 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcfd70 gate 1589998903806332600 evaluation fails +peer1.org1.example.com | [41df 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [41e0 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [41e1 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [41e2 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa2e0 gate 1589998903806602000 evaluation starts +peer1.org1.example.com | [41e3 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa2e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41e4 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa2e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [41e5 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [41e6 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa2e0 principal evaluation fails +peer1.org1.example.com | [41e7 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa2e0 gate 1589998903806602000 evaluation fails +peer1.org1.example.com | [41e8 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41e9 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41ea 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [41eb 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa850 gate 1589998903807047500 evaluation starts +peer1.org1.example.com | [41ec 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa850 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41ed 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa850 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [41ee 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa850 principal matched by identity 0 +peer1.org1.example.com | [41ef 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [41f0 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [41f1 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [41f2 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa850 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [41f3 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffa850 gate 1589998903807047500 evaluation succeeds +peer1.org1.example.com | [41f4 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41f5 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41f6 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [41f7 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41f8 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [41f9 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [41fa 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41fb 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4427 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org2.example.com | [4428 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org2.example.com | [4429 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [442a 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [442b 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org2.example.com | [442c 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org2.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer1.org2.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer1.org2.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [442d 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [442e 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [442f 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [4430 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [4431 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [4432 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [4433 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [4434 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [4435 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [4436 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4437 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [4438 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [4439 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [443a 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [443b 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [443c 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [443d 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [443e 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [443f 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [4440 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [4441 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [4442 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [4443 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [4444 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [4445 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [4446 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4447 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer1.org2.example.com | [4448 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer1.org2.example.com | [4449 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer1.org2.example.com | [444a 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer1.org2.example.com | [444b 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org2.example.com | [444c 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org2.example.com | [444d 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [444e 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [444f 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [4450 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [4451 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [4452 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [4453 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [4454 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [4455 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [4456 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [4457 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [4458 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [4459 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [445a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [445b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [445c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [445d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [445e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [445f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [4460 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [4461 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [4462 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [4463 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [4464 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [4465 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [4466 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [4467 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [4468 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [4469 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [446a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [446b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [446c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [446d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [446e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [446f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [4470 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [4471 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [4472 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4473 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4474 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [4475 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [4476 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [4477 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [40ce 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +peer0.org1.example.com | 00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +peer0.org1.example.com | 00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +peer0.org1.example.com | 00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +peer0.org1.example.com | 00000040 93 28 ee af 6b 85 c5 |.(..k..| +peer0.org1.example.com | [40ca 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [40cf 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [40d0 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 gate 1589998889026867800 evaluation succeeds +peer0.org1.example.com | [40d1 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40d2 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40d3 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [40d4 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [40d5 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40d6 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40d7 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [40d8 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +peer0.org1.example.com | 00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +peer0.org1.example.com | [40d9 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +peer0.org1.example.com | 00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +peer0.org1.example.com | 00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +peer0.org1.example.com | 00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +peer0.org1.example.com | 00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +peer0.org1.example.com | [40da 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40db 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40dc 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4468 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [4469 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [446a 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [446b 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [446c 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [446d 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [41fc 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [41fd 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41fe 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41ff 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4200 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4201 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4202 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012140 gate 1589998903818945100 evaluation starts +peer1.org1.example.com | [4203 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012140 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4204 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012140 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4205 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4206 05-20 18:21:43.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012140 principal evaluation fails +peer1.org1.example.com | [4207 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012140 gate 1589998903818945100 evaluation fails +peer1.org1.example.com | [4208 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4209 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [420a 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [420b 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040126b0 gate 1589998903822385400 evaluation starts +peer1.org1.example.com | [420c 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040126b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [420d 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040126b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [420e 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040126b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [420f 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040126b0 principal evaluation fails +peer1.org1.example.com | [4210 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040126b0 gate 1589998903822385400 evaluation fails +peer1.org1.example.com | [4211 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4212 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4213 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4214 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012c20 gate 1589998903824915200 evaluation starts +peer1.org1.example.com | [4215 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012c20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4216 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012c20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4217 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012c20 principal matched by identity 0 +peer1.org1.example.com | [4218 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [4219 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [421a 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012c20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [421b 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004012c20 gate 1589998903824915200 evaluation succeeds +peer1.org1.example.com | [421c 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [421d 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [421e 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [421f 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4220 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4221 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [4222 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4223 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4224 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [446e 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer0.org2.example.com | [446f 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer0.org2.example.com | [4470 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [4471 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [4472 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [4473 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [4474 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [4475 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [4476 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [4477 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [4478 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [4479 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [447a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [447b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [447c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [447d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [447e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [447f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [4480 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [4481 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [4482 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [4483 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [4484 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [4485 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [4486 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [4487 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [4488 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [4489 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [448a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer0.org2.example.com | [448b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer0.org2.example.com | [448c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [448d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [448e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer0.org2.example.com | [448f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer0.org2.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer0.org2.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer0.org2.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [4490 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [4491 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [4492 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [4493 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [4494 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [4495 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [4496 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [4225 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4226 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4227 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4228 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4229 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [422a 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [422b 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032070 gate 1589998903826709900 evaluation starts +peer1.org1.example.com | [422c 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [422d 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032070 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [422e 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [422f 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032070 principal evaluation fails +peer1.org1.example.com | [4230 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032070 gate 1589998903826709900 evaluation fails +peer1.org1.example.com | [4231 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4232 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4233 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4234 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040325e0 gate 1589998903827040400 evaluation starts +peer1.org1.example.com | [4235 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040325e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4236 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040325e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4237 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040325e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4238 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040325e0 principal evaluation fails +peer1.org1.example.com | [4239 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040325e0 gate 1589998903827040400 evaluation fails +peer1.org1.example.com | [423a 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [423b 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [423c 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [423d 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032b50 gate 1589998903828901000 evaluation starts +peer1.org1.example.com | [423e 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032b50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [423f 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032b50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4240 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032b50 principal matched by identity 0 +peer1.org1.example.com | [4241 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [4242 05-20 18:21:43.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [4243 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032b50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4244 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032b50 gate 1589998903828901000 evaluation succeeds +peer1.org1.example.com | [4245 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4246 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4247 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4248 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4249 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4478 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4479 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [447a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [447b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [447c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [447d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [447e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [447f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [4480 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [4481 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [4482 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [424a 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [424b 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [424c 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [424d 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [424e 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [424f 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4250 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4251 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4252 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4253 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4254 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4255 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404ab30 gate 1589998903834658700 evaluation starts +peer1.org1.example.com | [4256 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404ab30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4257 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404ab30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4258 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404ab30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4259 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404ab30 principal evaluation fails +peer1.org1.example.com | [425a 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404ab30 gate 1589998903834658700 evaluation fails +peer1.org1.example.com | [425b 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [425c 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [425d 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [425e 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b0a0 gate 1589998903834992300 evaluation starts +peer1.org1.example.com | [425f 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b0a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4260 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b0a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4261 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4262 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b0a0 principal evaluation fails +peer1.org1.example.com | [4263 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b0a0 gate 1589998903834992300 evaluation fails +peer1.org1.example.com | [4264 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4265 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4266 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4267 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b610 gate 1589998903836149800 evaluation starts +peer1.org1.example.com | [4268 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b610 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4269 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b610 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [426a 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b610 principal matched by identity 0 +peer1.org1.example.com | [426b 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [426c 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [426d 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b610 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [426e 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404b610 gate 1589998903836149800 evaluation succeeds +peer1.org1.example.com | [426f 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4270 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4271 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4272 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4273 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4274 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [4275 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4276 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4277 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4278 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4279 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [427a 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [427b 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [427c 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [427d 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [427e 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068a60 gate 1589998903838461800 evaluation starts +peer1.org1.example.com | [427f 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068a60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4280 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068a60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4281 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4282 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068a60 principal evaluation fails +peer1.org1.example.com | [4283 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068a60 gate 1589998903838461800 evaluation fails +peer1.org1.example.com | [4284 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4285 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4286 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4287 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068fd0 gate 1589998903839160800 evaluation starts +peer1.org1.example.com | [4288 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4289 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068fd0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [428a 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [428b 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068fd0 principal evaluation fails +peer1.org1.example.com | [428c 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004068fd0 gate 1589998903839160800 evaluation fails +peer1.org1.example.com | [428d 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [428e 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [428f 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4497 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [4498 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [4499 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [449a 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [449b 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [449c 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [449d 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [449e 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org2.example.com | [449f 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [44a0 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [44a1 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [44a2 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [44a3 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [44a4 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [44a5 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [44a6 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [44a7 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [44a8 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [44a9 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [44aa 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [44ab 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [44ac 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [44ad 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [44ae 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [44af 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [44b0 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [44b1 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [44b2 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [44b3 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [44b4 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org2.example.com | [44b5 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org2.example.com | [44b6 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer0.org1.example.com | [40dd 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [40de 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +peer0.org1.example.com | 00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +peer0.org1.example.com | [40df 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +peer0.org1.example.com | 00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +peer0.org1.example.com | 00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +peer0.org1.example.com | 00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +peer0.org1.example.com | 00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +peer0.org1.example.com | [40e0 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40e1 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e2 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e3 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [40e4 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e5 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [40e6 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +peer0.org1.example.com | 00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +peer0.org1.example.com | [40e7 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +peer0.org1.example.com | 00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +peer0.org1.example.com | 00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +peer0.org1.example.com | 00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +peer0.org1.example.com | 00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +peer0.org1.example.com | [40e8 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [40e9 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 11 98 1b 55 1e cf f6 ce 72 7b 22 |0D. ....U....r{"| +peer0.org1.example.com | 00000010 56 84 9b 3f 78 85 77 76 3b ae 0d f9 97 06 9f cc |V..?x.wv;.......| +peer0.org1.example.com | 00000020 55 f2 4c 96 02 20 74 17 9a 84 9f 54 39 f5 ab d6 |U.L.. t....T9...| +peer0.org1.example.com | 00000030 c4 33 02 41 f0 b1 ea 75 12 9f fc 0b 4b b0 9f 0c |.3.A...u....K...| +peer0.org1.example.com | 00000040 76 8d 8f ef 4e b0 |v...N.| +peer0.org1.example.com | [40ea 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [40eb 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [40ec 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40ed 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40ee 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [40ef 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f0 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f1 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40f2 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40f3 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40f4 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40f5 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40f6 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40f7 05-20 18:21:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [40f8 05-20 18:21:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40f9 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [40fa 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [40fb 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40fc 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [40fd 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [40fe 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40ff 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4100 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4101 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4102 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4103 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4104 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4105 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 gate 1589998889187919100 evaluation starts +peer0.org1.example.com | [4106 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4107 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4108 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 principal matched by identity 0 +peer0.org1.example.com | [4109 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer0.org1.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer0.org1.example.com | [410a 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer0.org1.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer0.org1.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer0.org1.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer0.org1.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer0.org1.example.com | [410b 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [410c 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 gate 1589998889187919100 evaluation succeeds +peer0.org1.example.com | [410d 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [410e 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [410f 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4110 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4111 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4112 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4113 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4114 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4115 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4483 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [4484 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [4485 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [4486 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [4487 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [4488 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [4489 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [448a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [448b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [448c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [448d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [448e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [448f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [4490 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [4491 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [4492 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [4493 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [4494 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [4495 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [4496 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [4497 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [4498 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [4499 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [449a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [449b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [449c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [449d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [449e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer1.org2.example.com | [449f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [44a0 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [44a1 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [44a2 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [44a3 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [44a4 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [44a5 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [44a6 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [44a7 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [44a8 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [44a9 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [44aa 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [44ab 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [44ac 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [44ad 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [44ae 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [44af 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [44b0 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [44b1 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [44b2 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org2.example.com | [44b3 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [44b4 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [44b5 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44b6 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44b7 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44b8 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [44b9 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [44ba 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [44bb 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004366f90 gate 1589998895338200500 evaluation starts +peer1.org2.example.com | [44bc 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004366f90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44bd 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004366f90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [44b7 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer0.org2.example.com | [44b8 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer0.org2.example.com | [44b9 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer0.org2.example.com | [44ba 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [44bb 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [44bc 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [44bd 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [44be 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [44bf 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [44c0 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [44c1 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [44c2 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [44c3 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [44c4 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [44c5 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [44c6 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [44c7 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [44c8 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [44c9 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [44ca 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [44cb 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [44cc 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [44cd 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [44ce 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [44cf 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [44d0 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [44d1 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [44d2 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [44d3 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [44d4 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [44d5 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [44d6 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [44d7 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [44d8 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [44d9 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [44da 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [44db 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [44dc 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [44dd 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [44de 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [44df 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [44e0 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [44e1 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [44e2 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [44e3 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [44e4 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [44e5 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [44e6 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [44e7 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [44e8 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [44e9 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [44ea 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [44eb 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [44ec 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [44ed 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [44ee 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [44ef 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [44f0 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [44f1 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [44f2 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [44f3 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [44f4 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [44f5 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [44f6 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [44f7 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [44f8 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [44f9 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [44fa 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [44fb 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [44fc 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [44fd 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [44fe 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [44ff 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [4500 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [4501 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [4502 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [4503 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [4504 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [4505 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [4506 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [4290 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069540 gate 1589998903839409400 evaluation starts +peer1.org1.example.com | [4291 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4292 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069540 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4293 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069540 principal matched by identity 0 +peer1.org1.example.com | [4294 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [4295 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [4296 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069540 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4297 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004069540 gate 1589998903839409400 evaluation succeeds +peer1.org1.example.com | [4298 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4299 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [429a 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [429b 05-20 18:21:43.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [429c 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [429d 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [429e 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [429f 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42a0 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [42a1 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [42a2 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [42a3 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [42a4 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [42a5 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [42a6 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084e30 gate 1589998903842960900 evaluation starts +peer1.org1.example.com | [42a7 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084e30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [42a8 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084e30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [42a9 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [42aa 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084e30 principal evaluation fails +peer1.org1.example.com | [42ab 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004084e30 gate 1589998903842960900 evaluation fails +peer1.org1.example.com | [42ac 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [42ad 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [42ae 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [42af 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040853a0 gate 1589998903845510200 evaluation starts +peer1.org1.example.com | [42b0 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040853a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [42b1 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040853a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [42b2 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040853a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [42b3 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040853a0 principal evaluation fails +peer1.org1.example.com | [42b4 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040853a0 gate 1589998903845510200 evaluation fails +peer1.org1.example.com | [42b5 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [42b6 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [42b7 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [42b8 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085910 gate 1589998903845803000 evaluation starts +peer1.org1.example.com | [42b9 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085910 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [42ba 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085910 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [42bb 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085910 principal matched by identity 0 +peer1.org1.example.com | [42bc 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [42bd 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [42be 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085910 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [42bf 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004085910 gate 1589998903845803000 evaluation succeeds +peer1.org1.example.com | [42c0 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [42c1 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [42c2 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [42c3 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [42c4 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [42c5 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [42c6 05-20 18:21:43.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42c7 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [42c8 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [42c9 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42ca 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [42cb 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [42cc 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4116 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4117 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44be 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004366f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [44bf 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004366f90 principal evaluation fails +peer1.org2.example.com | [44c0 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004366f90 gate 1589998895338200500 evaluation fails +peer1.org2.example.com | [44c1 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44c2 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44c3 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [44c4 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367500 gate 1589998895346687600 evaluation starts +peer1.org2.example.com | [44c5 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367500 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44c6 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367500 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [44c7 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367500 principal matched by identity 0 +peer1.org2.example.com | [44c8 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer1.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer1.org2.example.com | [44c9 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer1.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer1.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer1.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer1.org2.example.com | [44ca 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367500 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44cb 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367500 gate 1589998895346687600 evaluation succeeds +peer1.org2.example.com | [44cc 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44cd 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44ce 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [44cf 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [44d0 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44d1 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44d2 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [44d3 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [44d4 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [44d5 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367f90 gate 1589998895350447500 evaluation starts +peer1.org2.example.com | [44d6 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367f90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44d7 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367f90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [44d8 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367f90 principal matched by identity 0 +peer1.org2.example.com | [44d9 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer1.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer1.org2.example.com | [44da 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer1.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer1.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer1.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer1.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer1.org2.example.com | [44db 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367f90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44dc 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004367f90 gate 1589998895350447500 evaluation succeeds +peer1.org2.example.com | [44dd 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44de 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44df 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [44e0 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [44e1 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44e2 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44e3 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44e4 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [44e5 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [44e6 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [44e7 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378ad0 gate 1589998895351343400 evaluation starts +peer0.org2.example.com | [4507 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [4508 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4509 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [450a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [450b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [450c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org2.example.com | [450d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [450e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [450f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [4510 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [4511 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [4512 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4513 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4514 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [4515 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [4516 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [4517 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [4518 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [4519 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [451a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [451b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [451c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [451d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [451e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer0.org2.example.com | [451f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [4520 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org2.example.com | [4521 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [4522 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4523 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4524 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4525 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4526 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4527 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4528 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a2d0 gate 1589998895346035300 evaluation starts +peer0.org2.example.com | [4529 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a2d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [452a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a2d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [452b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a2d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [452c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a2d0 principal evaluation fails +peer0.org2.example.com | [452d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a2d0 gate 1589998895346035300 evaluation fails +peer0.org2.example.com | [452e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [452f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4530 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4531 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a840 gate 1589998895347355300 evaluation starts +peer0.org2.example.com | [4532 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a840 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4533 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a840 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4534 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a840 principal matched by identity 0 +peer0.org2.example.com | [4535 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org2.example.com | [4536 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer1.org2.example.com | [44e8 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378ad0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44e9 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378ad0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [44ea 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [44eb 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378ad0 principal evaluation fails +peer1.org2.example.com | [44ec 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378ad0 gate 1589998895351343400 evaluation fails +peer1.org2.example.com | [44ed 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44ee 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44ef 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [44f0 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004379040 gate 1589998895351711300 evaluation starts +peer1.org2.example.com | [44f1 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004379040 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44f2 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004379040 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [44f3 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004379040 principal matched by identity 0 +peer1.org2.example.com | [44f4 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer1.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer1.org2.example.com | [44f5 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer1.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer1.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer1.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer1.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer1.org2.example.com | [44f6 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004379040 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44f7 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004379040 gate 1589998895351711300 evaluation succeeds +peer1.org2.example.com | [44f8 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44f9 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44fa 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [44fb 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [44fc 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org2.example.com | [44fd 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [44fe 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [44ff 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4500 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [4501 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [4502 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4503 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org2.example.com | [4504 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [4505 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4506 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4507 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42cd 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [42ce 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [42cf 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [42d0 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [42d1 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [42d2 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [42d3 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409d540 gate 1589998903898143800 evaluation starts +peer1.org1.example.com | [42d4 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409d540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [42d5 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409d540 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [42d6 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409d540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [42d7 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409d540 principal evaluation fails +peer1.org1.example.com | [42d8 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409d540 gate 1589998903898143800 evaluation fails +peer1.org1.example.com | [42d9 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [42da 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [42db 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [42dc 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409dab0 gate 1589998903898719900 evaluation starts +peer1.org1.example.com | [42dd 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409dab0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [42de 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409dab0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [42df 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409dab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [42e0 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409dab0 principal evaluation fails +peer1.org1.example.com | [42e1 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409dab0 gate 1589998903898719900 evaluation fails +peer1.org1.example.com | [42e2 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [42e3 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [42e4 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [42e5 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b6020 gate 1589998903899345700 evaluation starts +peer1.org1.example.com | [42e6 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b6020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [42e7 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b6020 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [42e8 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b6020 principal matched by identity 0 +peer1.org1.example.com | [42e9 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d ba 8c 28 4e d0 9c c1 ca 80 f9 b5 1b 29 85 cd |=..(N........)..| +peer1.org1.example.com | 00000010 db 85 4f c2 bb ed 7f e4 80 43 15 ef d4 92 d5 7c |..O......C.....|| +peer1.org1.example.com | [42ea 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 98 2b fd 76 99 5b 26 b8 51 91 06 |0D. z.+.v.[&.Q..| +peer1.org1.example.com | 00000010 96 f7 2a 73 51 e9 e0 6d e3 b8 54 b1 74 a6 0a ff |..*sQ..m..T.t...| +peer1.org1.example.com | 00000020 cf cd 3e b3 02 20 7d ad 8f d6 d3 86 83 b6 2c 62 |..>.. }.......,b| +peer1.org1.example.com | 00000030 96 61 2f b2 d6 c7 33 66 b5 f5 0a e3 2d 85 c1 95 |.a/...3f....-...| +peer1.org1.example.com | 00000040 25 01 3a 4a 9b f6 |%.:J..| +peer1.org1.example.com | [42eb 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b6020 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [42ec 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b6020 gate 1589998903899345700 evaluation succeeds +peer1.org1.example.com | [42ed 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [42ee 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [42ef 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [42f0 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [42f1 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [42f2 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [42f3 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [42f4 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [42f5 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [42f6 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42f7 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42f8 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42f9 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [42fa 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42fb 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [42fc 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42fd 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42fe 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42ff 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4300 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4301 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4302 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4303 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4304 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4305 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4306 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4307 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4308 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4309 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [430a 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [430b 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [430c 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [430d 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [430e 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [430f 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4310 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4311 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4312 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4313 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 34 74 ba 29 4b d0 12 ce 33 3d ac 81 b5 fd 6a |.4t.)K...3=....j| +peer1.org1.example.com | 00000010 c2 b7 7a 09 dc 99 34 e4 3f 32 e5 b5 08 46 c3 99 |..z...4.?2...F..| +peer1.org1.example.com | [4314 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 62 67 12 89 a7 a3 e1 e4 5d 38 |0E.!..bg......]8| +peer1.org1.example.com | 00000010 9f d4 25 bb de 04 54 ce f2 c8 aa ff ec 3d c9 2d |..%...T......=.-| +peer1.org2.example.com | [4508 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4509 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [450a 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [450b 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [450c 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [450d 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [450e 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0043badc0, CONNECTING +peer1.org2.example.com | [450f 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [4510 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [4511 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [4512 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [4513 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0043f44a0, CONNECTING +peer1.org2.example.com | [4514 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0043badc0, READY +peer1.org2.example.com | [4515 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0043f44a0, READY +peer1.org2.example.com | [4516 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4517 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [4518 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [4519 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [451a 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [451b 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [451c 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer1.org2.example.com | [451d 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer0.org1.example.com | [4118 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [4119 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [411a 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [411b 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [411c 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [411d 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [411e 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [411f 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4120 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4121 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [4122 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [4123 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4124 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610131801 +peer0.org1.example.com | [4125 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C6C6791CF057AB8A95EAEE0C0E4A0DA8ED077EC2F3BC41BDB9629FE61AB2ADC1 +peer0.org1.example.com | [4126 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [4127 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4128 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4129 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [412a 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [412b 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [412c 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [412d 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [412e 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [412f 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4130 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4131 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4132 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [4133 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4134 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4135 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4136 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4137 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4138 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4139 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [413a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [413b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org2.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org2.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org2.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org2.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org2.example.com | [4537 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a840 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4538 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450a840 gate 1589998895347355300 evaluation succeeds +peer0.org2.example.com | [4539 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [453a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [453b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [453c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [453d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [453e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [453f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4540 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4541 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4542 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4543 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b380 gate 1589998895347981300 evaluation starts +peer0.org2.example.com | [4544 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b380 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4545 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b380 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4546 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [4547 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b380 principal evaluation fails +peer0.org2.example.com | [4548 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b380 gate 1589998895347981300 evaluation fails +peer0.org2.example.com | [4549 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [454a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [454b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [454c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b8f0 gate 1589998895348274200 evaluation starts +peer0.org2.example.com | [454d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b8f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [454e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b8f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [454f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b8f0 principal matched by identity 0 +peer0.org2.example.com | [4550 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [4551 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [4552 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b8f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4553 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b8f0 gate 1589998895348274200 evaluation succeeds +peer0.org2.example.com | [4554 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4555 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4556 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4557 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4558 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4559 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [455a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [455b 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [455c 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [455d 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522380 gate 1589998895348860100 evaluation starts +peer0.org2.example.com | [455e 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522380 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [455f 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522380 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4560 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522380 principal matched by identity 0 +peer0.org2.example.com | [4561 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org2.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org2.example.com | [4562 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org2.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org2.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org2.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org2.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org2.example.com | [4563 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522380 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4564 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004522380 gate 1589998895348860100 evaluation succeeds +peer0.org2.example.com | [4565 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 d8 14 f8 25 c3 02 20 10 3a 80 aa a6 f3 d3 1e e7 |...%.. .:.......| +peer1.org1.example.com | 00000030 66 39 80 69 ef fe 79 47 3b 55 45 d1 fa 70 1e e2 |f9.i..yG;UE..p..| +peer1.org1.example.com | 00000040 54 bc 65 a5 93 3d d4 |T.e..=.| +peer1.org1.example.com | [4315 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4316 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [4317 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4318 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4319 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [431a 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [431b 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [431c 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [431d 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [431e 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [431f 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4320 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4321 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4322 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4323 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4324 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4325 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4326 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4327 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4328 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4329 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [432a 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [432b 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [432c 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [432d 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [432e 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [432f 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4330 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4331 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4332 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4333 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4334 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4335 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4336 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4337 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4338 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4339 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [433a 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [433b 05-20 18:21:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [433c 05-20 18:21:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [433d 05-20 18:21:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [433f 05-20 18:21:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [4340 05-20 18:21:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [433e 05-20 18:21:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4341 05-20 18:21:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [4342 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [413c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [413d 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [413e 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [413f 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4140 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4141 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4142 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4143 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4144 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4145 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4146 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4147 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 gate 1589998891544892900 evaluation starts +peer0.org1.example.com | [4148 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4149 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [414a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 principal matched by identity 0 +peer0.org1.example.com | [414b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [414c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [414d 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [414e 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 gate 1589998891544892900 evaluation succeeds +peer0.org1.example.com | [414f 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4150 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4151 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4152 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4153 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4154 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4155 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4156 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4157 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4158 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4159 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [415a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [415b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 gate 1589998891545743400 evaluation starts +peer0.org1.example.com | [415c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [415d 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [415e 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 principal matched by identity 0 +peer0.org1.example.com | [415f 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [4160 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [4161 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4162 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 gate 1589998891545743400 evaluation succeeds +peer0.org1.example.com | [4163 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4164 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4165 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4166 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4167 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4168 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4169 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [416a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [416b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [416c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [416d 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [416e 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [416f 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4170 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4171 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4172 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4173 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 gate 1589998891546862300 evaluation starts +peer0.org1.example.com | [4174 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4175 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4176 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 principal matched by identity 0 +peer0.org1.example.com | [4177 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [4178 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4179 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [417a 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [417b 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 gate 1589998891546862300 evaluation succeeds +peer0.org1.example.com | [417c 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [417d 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [417e 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [417f 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4180 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [4181 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [4182 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [4183 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [4184 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4185 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4186 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4187 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4188 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4189 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4343 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [4344 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4345 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [4346 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4347 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4348 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4349 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [434a 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [434c 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [434d 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [434b 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [434e 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [434f 05-20 18:21:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4350 05-20 18:21:44.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4351 05-20 18:21:44.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4352 05-20 18:21:44.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4353 05-20 18:21:44.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [4354 05-20 18:21:44.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4355 05-20 18:21:44.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4356 05-20 18:21:44.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4357 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [4358 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4359 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [435a 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [435b 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [435c 05-20 18:21:44.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [435d 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB388161049 +peer1.org1.example.com | [435e 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0F12B8CE278330EF0A655EDF795FA6D8F470943189BCDFA405162B3810EF7B0B +peer1.org1.example.com | [435f 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4360 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [451e 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer1.org2.example.com | [451f 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org2.example.com | [4520 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 f6 7d b9 dc 81 49 d4 4c f2 75 98 |0D. W.}...I.L.u.| +peer1.org2.example.com | 00000010 93 71 c7 78 b6 6a bd 5f 61 f7 36 cb fa ed 0a e6 |.q.x.j._a.6.....| +peer1.org2.example.com | 00000020 db a5 a0 6b 02 20 2b e2 3e ee 62 ce 5b 85 f8 99 |...k. +.>.b.[...| +peer1.org2.example.com | 00000030 42 1f bd 82 00 e1 4f 19 bb 51 37 ee 04 e7 12 21 |B.....O..Q7....!| +peer1.org2.example.com | 00000040 a0 78 0e 8b 5c 07 |.x..\.| +peer1.org2.example.com | [4521 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org2.example.com | [4522 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4523 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161042 +peer1.org2.example.com | [4524 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7C26FA477BAB7B19055F006AEF3D41704053E643261AEF5146CDE1E0DA407221 +peer1.org2.example.com | [4525 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4526 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4527 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4528 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:13324412957473810171 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4529 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:13324412957473810171 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org2.example.com | [452a 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [452b 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [452c 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org2.example.com | [452d 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [418a 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [418b 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [418c 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 gate 1589998891552992600 evaluation starts +peer0.org1.example.com | [418d 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [418e 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [418f 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 principal matched by identity 0 +peer0.org1.example.com | [4190 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [4191 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [4192 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4193 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 gate 1589998891552992600 evaluation succeeds +peer0.org1.example.com | [4194 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4195 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4196 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4197 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4198 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4199 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [419a 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [419b 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [419c 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [419d 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [419e 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [419f 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41a0 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [41a1 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [41a2 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [41a3 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 gate 1589998891556850200 evaluation starts +peer0.org1.example.com | [41a4 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41a5 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [41a6 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 principal matched by identity 0 +peer0.org1.example.com | [41a7 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [41a8 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [41a9 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4361 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [4362 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4363 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4364 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4366 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4367 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4368 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4369 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [436a 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4365 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [436c 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [436b 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [436d 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [436e 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [436f 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [4370 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [4371 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer1.org1.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer1.org1.example.com | [4374 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer1.org1.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer1.org1.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer1.org1.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer1.org1.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer1.org1.example.com | [4375 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [4376 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 18 e5 97 e0 1d da 2f 1a df 32 5b |0D. a....../..2[| +peer1.org1.example.com | 00000010 12 ec 93 30 3e 0d 70 a9 45 53 f3 f7 51 9e 9d 90 |...0>.p.ES..Q...| +peer1.org1.example.com | 00000020 63 bd 46 6a 02 20 39 36 bf 9a 98 aa 2d 8a 40 7f |c.Fj. 96....-.@.| +peer1.org1.example.com | 00000030 9f a9 f5 45 58 34 19 25 24 52 b8 bd 50 98 60 a6 |...EX4.%$R..P.`.| +peer1.org1.example.com | 00000040 a2 ac b2 8d 51 be |....Q.| +peer1.org1.example.com | [4372 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4373 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4377 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [4378 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [4379 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [437a 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [437b 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [437c 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [437d 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [437f 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer1.org1.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer1.org1.example.com | [437e 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4380 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer1.org1.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer1.org1.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer1.org1.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer1.org1.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer1.org1.example.com | [4381 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4382 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4383 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4384 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4385 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4386 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4387 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [4388 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer1.org1.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer1.org1.example.com | [4389 05-20 18:21:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer1.org1.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer1.org1.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer1.org1.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer1.org1.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer1.org1.example.com | [438a 05-20 18:21:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [438b 05-20 18:21:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [438c 05-20 18:21:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [438d 05-20 18:21:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [438e 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [438f 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4390 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4391 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4392 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4393 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4394 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4395 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4396 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [4397 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4398 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4399 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [439a 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [452e 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [452f 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4530 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4531 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4532 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4533 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4534 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4535 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4536 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4537 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4538 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9690 gate 1589998895456690800 evaluation starts +peer1.org2.example.com | [4539 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [453a 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9690 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [453b 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [453c 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9690 principal evaluation fails +peer1.org2.example.com | [453d 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9690 gate 1589998895456690800 evaluation fails +peer1.org2.example.com | [453e 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [453f 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4540 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [41aa 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 gate 1589998891556850200 evaluation succeeds +peer0.org1.example.com | [41ab 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4566 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4567 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4568 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4569 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org2.example.com | [456a 05-20 18:21:35.34 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org2.example.com | [456b 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [456c 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [456d 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [456e 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [456f 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [4570 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [4571 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [4572 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0045501f0, CONNECTING +peer0.org2.example.com | [4573 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [4574 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org2.example.com | [4575 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [4576 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer0.org2.example.com | [4577 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4578 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4579 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [457a 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [457b 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [457c 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0045501f0, READY +peer0.org2.example.com | [457d 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [457e 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [457f 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [4580 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [4583 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4584 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41ac 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41ad 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [41ae 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [41af 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [41b0 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [41b1 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41b2 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41b3 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [41b4 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41b5 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41b6 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [41b7 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [41b8 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [41b9 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 gate 1589998891558372000 evaluation starts +peer0.org1.example.com | [41ba 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41bb 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [41bc 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 principal matched by identity 0 +peer0.org1.example.com | [41bd 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [41be 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [41bf 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [41c0 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 gate 1589998891558372000 evaluation succeeds +peer0.org1.example.com | [41c1 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41c2 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41c3 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [41c4 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [41c5 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [41c6 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [41c7 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41c8 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41c9 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41ca 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [439b 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [439c 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [439d 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [439e 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [439f 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [43a0 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43a1 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [43a2 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [43a3 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [43a4 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [43a5 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [43a6 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [43a7 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ae30 gate 1589998904935414000 evaluation starts +peer1.org1.example.com | [43a8 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ae30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [43a9 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ae30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [43aa 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ae30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [43ab 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ae30 principal evaluation fails +peer1.org1.example.com | [43ac 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416ae30 gate 1589998904935414000 evaluation fails +peer1.org1.example.com | [43ad 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [43ae 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [43af 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [43b0 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b3a0 gate 1589998904936358800 evaluation starts +peer1.org1.example.com | [43b1 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [43b2 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b3a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [43b3 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b3a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [43b4 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b3a0 principal evaluation fails +peer1.org1.example.com | [43b5 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b3a0 gate 1589998904936358800 evaluation fails +peer1.org1.example.com | [43b6 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [43b7 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [43b8 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [43b9 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b910 gate 1589998904937307300 evaluation starts +peer1.org1.example.com | [43ba 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4541 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9c00 gate 1589998895457036700 evaluation starts +peer1.org2.example.com | [4542 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9c00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4543 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9c00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4544 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9c00 principal matched by identity 0 +peer1.org2.example.com | [4545 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [4546 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 bb bc b0 61 90 4e 13 90 31 37 |0E.!.....a.N..17| +peer1.org2.example.com | 00000010 61 57 21 c3 48 e1 ee bd 19 50 cf 3b 61 11 7c 90 |aW!.H....P.;a.|.| +peer1.org2.example.com | 00000020 93 2d b2 4e 30 02 20 56 3a 26 bc 5e 96 eb d3 31 |.-.N0. V:&.^...1| +peer1.org2.example.com | 00000030 41 9a 74 62 62 d1 b9 64 01 e1 53 26 1f 25 17 62 |A.tbb..d..S&.%.b| +peer1.org2.example.com | 00000040 85 d1 49 a5 dc e2 f5 |..I....| +peer1.org2.example.com | [4547 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9c00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4548 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a9c00 gate 1589998895457036700 evaluation succeeds +peer1.org2.example.com | [4549 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [454a 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [454b 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [454c 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [454d 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [454e 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [454f 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4550 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161043 +peer1.org2.example.com | [4551 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E280BC9CD3E1C7CE87BCEB9900FA861C587CB08BF36E4EBAE9094DA02B35B28C +peer1.org2.example.com | [4552 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4553 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4554 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4555 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4556 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:17654572624681692194 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4557 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:17654572624681692194 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | [4558 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4559 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [455a 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [455b 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [455c 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org2.example.com | [455d 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org2.example.com | [455e 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [455f 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [4560 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [4561 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00400b200 env 0xc003fdd400 txn 0 +peer1.org2.example.com | [4562 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [4563 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 229ms +peer1.org2.example.com | [4564 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [4565 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [4566 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [4567 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer1.org2.example.com | [4568 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [4569 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [456a 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [456b 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer1.org2.example.com | [456c 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [456d 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [456e 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [456f 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [4570 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [4571 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [4572 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [43bb 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b910 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [43bc 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b910 principal matched by identity 0 +peer1.org1.example.com | [43bd 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer1.org1.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer1.org1.example.com | [43be 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer1.org1.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer1.org1.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer1.org1.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer1.org1.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer1.org1.example.com | [43bf 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b910 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [43c0 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b910 gate 1589998904937307300 evaluation succeeds +peer1.org1.example.com | [43c1 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [43c2 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [43c3 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [43c4 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [43c5 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [43c6 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [43c7 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [43c8 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [43c9 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [43ca 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43cb 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43cc 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [43cd 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43ce 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43cf 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43d0 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [43d1 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > alive:`X\303\3038\365\207\200" > +peer1.org1.example.com | [43d2 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [43d3 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43d4 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43d5 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [43d6 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41cb 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41cc 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41cd 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [41ce 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [41cf 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d0 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [41d1 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [41d2 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [41d3 05-20 18:21:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d4 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41d5 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41d6 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41d7 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41d8 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d9 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41da 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41db 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41dc 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41dd 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41de 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41df 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41e0 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41e1 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41e2 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41e3 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41e4 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41e5 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [41e6 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [41e7 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [41e8 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [41e9 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ea 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [41eb 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4585 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4586 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4587 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [4588 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer0.org2.example.com | [4589 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [458a 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [458b 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [458c 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [458f 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004216700 env 0xc00425d7c0 txn 0 +peer0.org2.example.com | [458d 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [458e 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.406Z grpc.peer_address=172.18.0.6:43390 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=116.7µs +peer0.org2.example.com | [4590 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [4591 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4593 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4594 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4595 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4596 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4597 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4592 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 158ms +peer0.org2.example.com | [4598 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [4599 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [459a 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [459b 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [459c 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer0.org2.example.com | [459d 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [459e 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1180 gate 1589998895414785200 evaluation starts +peer0.org2.example.com | [459f 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [45a0 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1180 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [45a1 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [45a2 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer0.org2.example.com | [45a3 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1180 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [45a4 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [45a5 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [45a6 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [43d7 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [43d8 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [43d9 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer1.org1.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer1.org1.example.com | [43da 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer1.org1.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer1.org1.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer1.org1.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer1.org1.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer1.org1.example.com | [43db 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [43dc 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 95 32 d0 b5 b7 47 dc 74 76 6e |0E.!...2...G.tvn| +peer1.org1.example.com | 00000010 42 7e 9b d9 0b fa c0 b3 12 0f a3 2b 62 a9 5a 16 |B~.........+b.Z.| +peer1.org1.example.com | 00000020 4e 85 0b b3 7a 02 20 0c ef de a7 07 9e 0f ff cd |N...z. .........| +peer1.org1.example.com | 00000030 f6 f1 7b c9 74 b6 1e 19 30 c7 f8 23 3b ab c5 53 |..{.t...0..#;..S| +peer1.org1.example.com | 00000040 18 0a 18 5a c9 9c 58 |...Z..X| +peer1.org1.example.com | [43dd 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [43de 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [43df 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [43e0 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [43e1 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [43e2 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43e3 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43e4 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43e5 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [43e6 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43e7 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43e8 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [43e9 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" secret_envelope: > alive:`X\303\3038\365\207\200" > +peer1.org1.example.com | [43ea 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [43eb 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43ec 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [43ed 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [43ee 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [43ef 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43f0 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43f1 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43f2 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43f3 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43f4 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43f5 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [43f6 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43f7 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [43f8 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [43f9 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [43fa 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [43fb 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [43fc 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [43fd 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [43fe 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [43ff 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4400 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4401 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4402 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4403 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f8c0 gate 1589998905211221500 evaluation starts +peer1.org1.example.com | [4404 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f8c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4405 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f8c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4406 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4407 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f8c0 principal evaluation fails +peer1.org1.example.com | [4408 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417f8c0 gate 1589998905211221500 evaluation fails +peer1.org1.example.com | [4409 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [440a 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [440b 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [440c 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fe30 gate 1589998905212097500 evaluation starts +peer1.org1.example.com | [440d 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fe30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [440e 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fe30 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [440f 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fe30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4410 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fe30 principal evaluation fails +peer1.org1.example.com | [4411 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fe30 gate 1589998905212097500 evaluation fails +peer1.org1.example.com | [4412 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4413 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4414 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4415 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041de3a0 gate 1589998905212968400 evaluation starts +peer1.org1.example.com | [4416 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041de3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4417 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041de3a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4418 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041de3a0 principal matched by identity 0 +peer1.org1.example.com | [4419 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 a3 d6 57 4e 31 8d b9 e2 17 a5 a0 83 3f 8a 0d |...WN1.......?..| +peer1.org1.example.com | 00000010 1e 20 7a aa 5d 22 69 0d f6 61 ec a7 e0 23 65 be |. z.]"i..a...#e.| +peer1.org1.example.com | [441a 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 0f 6b ef e4 55 02 49 7d a2 e3 |0E.!...k..U.I}..| +peer1.org1.example.com | 00000010 e4 03 09 9e 29 d9 f0 c0 6f c6 e5 09 cc 49 eb f1 |....)...o....I..| +peer1.org1.example.com | 00000020 22 61 ce a1 5e 02 20 13 1a e8 d0 b8 0f e6 11 a7 |"a..^. .........| +peer1.org1.example.com | 00000030 c8 81 db e2 b0 04 22 06 21 b4 cf c6 f0 d1 e9 7e |......".!......~| +peer1.org1.example.com | 00000040 f3 d7 cd 17 ec 98 5d |......]| +peer1.org1.example.com | [441b 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041de3a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [441c 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041de3a0 gate 1589998905212968400 evaluation succeeds +peer1.org1.example.com | [441d 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [441e 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [441f 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4420 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4421 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4422 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [4423 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4424 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4425 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4426 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4427 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4428 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4429 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [442a 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [442b 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [442c 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [442d 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [442e 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > alive: alive:`X\303\3038\365\207\200" > +peer1.org1.example.com | [442f 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [4430 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4431 05-20 18:21:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [4432 05-20 18:21:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [4433 05-20 18:21:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [4434 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [4435 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a 84 f5 aa 90 5f cc 58 30 18 07 a5 32 81 46 ac |....._.X0...2.F.| +peer0.org1.example.com | [41ec 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [41ed 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [41ee 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ef 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247\233;" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [41f0 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\247\233;" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [41f1 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41f2 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247\233;" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [41f3 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [41f4 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer0.org1.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer0.org1.example.com | [41f5 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer0.org1.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer0.org1.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer0.org1.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer0.org1.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer0.org1.example.com | [41f6 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [41f7 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 97 fb c0 74 25 c8 28 41 0b e2 |0E.!.....t%.(A..| +peer0.org1.example.com | 00000010 e8 9c 0d 61 d8 35 67 28 38 1c 05 db 44 19 d6 27 |...a.5g(8...D..'| +peer0.org1.example.com | 00000020 d7 09 5e 6c be 02 20 04 d1 2f da 94 0a 82 ed b1 |..^l.. ../......| +peer0.org1.example.com | 00000030 bf f9 6c 69 50 4c 3f 8c a2 13 4d a0 df f6 14 74 |..liPL?...M....t| +peer0.org1.example.com | 00000040 cf 86 49 9b 5f 6d b6 |..I._m.| +peer0.org1.example.com | [41f8 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [41f9 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [41fa 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [41fb 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [41fc 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [41fd 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41fe 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ff 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4200 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [4201 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4202 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4203 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4204 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\247\233;" secret_envelope: > alive: +peer0.org1.example.com | [4205 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4206 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4207 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4208 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4209 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [420a 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [420b 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [420c 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [420d 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [420e 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [420f 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4210 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [4211 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4212 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4213 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4214 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4215 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4216 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4217 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4218 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4219 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [421a 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [421b 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [421c 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [421d 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [421e 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [421f 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4220 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4221 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4222 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 8a 54 5a b5 b5 ca 6f 71 f3 7e 95 cb 31 18 4f 53 |.TZ...oq.~..1.OS| +peer1.org1.example.com | [4436 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 55 66 be 51 a1 d6 5f 94 6b 69 28 |0D. vUf.Q.._.ki(| +peer1.org1.example.com | 00000010 f6 32 53 13 2e a0 62 1d 96 57 a0 0a 59 5b 5e 76 |.2S...b..W..Y[^v| +peer1.org1.example.com | 00000020 98 ed a5 e2 02 20 62 26 42 49 88 69 ca 6f 8b e8 |..... b&BI.i.o..| +peer1.org1.example.com | 00000030 65 70 64 3f f1 ac 53 08 53 5d 81 91 fe 34 1e 1b |epd?..S.S]...4..| +peer1.org1.example.com | 00000040 40 7b d1 f4 d1 e0 |@{....| +peer1.org1.example.com | [4437 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4438 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4439 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [443a 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [443b 05-20 18:21:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47922 +peer1.org1.example.com | [443c 05-20 18:21:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0041bb630 +peer1.org1.example.com | [443d 05-20 18:21:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [443e 05-20 18:21:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [443f 05-20 18:21:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [4440 05-20 18:21:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [4441 05-20 18:21:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 77 43 e8 00 6b fc 54 4c 65 ef a9 30 5d 53 cf |$wC..k.TLe..0]S.| +peer1.org1.example.com | 00000010 4a a7 a4 56 ba f1 c2 b2 2e 64 e1 a4 06 87 78 8e |J..V.....d....x.| +peer1.org1.example.com | [4442 05-20 18:21:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 48 32 f2 ab 83 97 59 16 1d 23 e5 |0D. .H2....Y..#.| +peer1.org1.example.com | 00000010 5a 0a a7 20 4a bc 4a 4d 68 0e d8 ef 42 c1 5f 2c |Z.. J.JMh...B._,| +peer1.org1.example.com | 00000020 53 5a 01 a8 02 20 4a 87 99 38 ba 08 9f f4 dd 38 |SZ... J..8.....8| +peer1.org1.example.com | 00000030 35 bf e6 ef b4 74 df 85 7b 7f bd c6 03 7c 16 62 |5....t..{....|.b| +peer1.org1.example.com | 00000040 f3 37 07 61 22 ed |.7.a".| +peer1.org1.example.com | [4443 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [4444 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0041d2460, header 0xc0041bba40 +peer1.org1.example.com | [4445 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [4446 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU [][9372f8da] processing txid: 9372f8da670f912a86f3b67356312b846bbe2d8cebee3ea562847b63f0909efe +peer1.org1.example.com | [4447 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU [][9372f8da] Entry chaincode: name:"cscc" +peer1.org1.example.com | [4448 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> INFO [][9372f8da] Entry chaincode: name:"cscc" +peer1.org1.example.com | [4449 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [444a 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org1.example.com | [444b 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 77 43 e8 00 6b fc 54 4c 65 ef a9 30 5d 53 cf |$wC..k.TLe..0]S.| +peer1.org1.example.com | 00000010 4a a7 a4 56 ba f1 c2 b2 2e 64 e1 a4 06 87 78 8e |J..V.....d....x.| +peer1.org1.example.com | [444c 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 48 32 f2 ab 83 97 59 16 1d 23 e5 |0D. .H2....Y..#.| +peer1.org1.example.com | 00000010 5a 0a a7 20 4a bc 4a 4d 68 0e d8 ef 42 c1 5f 2c |Z.. J.JMh...B._,| +peer1.org1.example.com | 00000020 53 5a 01 a8 02 20 4a 87 99 38 ba 08 9f f4 dd 38 |SZ... J..8.....8| +peer1.org1.example.com | 00000030 35 bf e6 ef b4 74 df 85 7b 7f bd c6 03 7c 16 62 |5....t..{....|.b| +peer1.org1.example.com | 00000040 f3 37 07 61 22 ed |.7.a".| +peer1.org1.example.com | [444d 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU [9372f8da] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [444e 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU [9372f8da] notifying Txid:9372f8da670f912a86f3b67356312b846bbe2d8cebee3ea562847b63f0909efe, channelID: +peer1.org1.example.com | [444f 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [4450 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> INFO [][9372f8da] Exit chaincode: name:"cscc" (3ms) +peer1.org1.example.com | [4451 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU [][9372f8da] Exit +peer1.org1.example.com | [4452 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47922 +peer1.org1.example.com | [4453 05-20 18:21:46.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47922 grpc.code=OK grpc.call_duration=9.9905ms +peer1.org1.example.com | [4454 05-20 18:21:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [4455 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4456 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4457 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4458 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4459 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [445a 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [445b 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1 3 4 5 6] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [445c 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [445d 05-20 18:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [445e 05-20 18:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [445f 05-20 18:21:47.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [4460 05-20 18:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4461 05-20 18:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4462 05-20 18:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4463 05-20 18:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4464 05-20 18:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4465 05-20 18:21:47.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4466 05-20 18:21:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [4467 05-20 18:21:47.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [4468 05-20 18:21:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4469 05-20 18:21:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [446a 05-20 18:21:47.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [446b 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [446c 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [446d 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [446e 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [446f 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4470 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4471 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f210 gate 1589998907874828100 evaluation starts +peer1.org1.example.com | [4472 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f210 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4473 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f210 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4474 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4475 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f210 principal evaluation fails +peer1.org1.example.com | [4476 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f210 gate 1589998907874828100 evaluation fails +peer1.org1.example.com | [4477 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4478 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4479 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [447a 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f780 gate 1589998907878853600 evaluation starts +peer1.org1.example.com | [447b 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [447c 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f780 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [447d 05-20 18:21:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [447e 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f780 principal evaluation fails +peer1.org1.example.com | [447f 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423f780 gate 1589998907878853600 evaluation fails +peer1.org1.example.com | [4480 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4481 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4482 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4483 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423fcf0 gate 1589998907880981300 evaluation starts +peer1.org1.example.com | [4484 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423fcf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4485 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423fcf0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4486 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423fcf0 principal matched by identity 0 +peer1.org1.example.com | [4487 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [4488 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [4489 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423fcf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [448a 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423fcf0 gate 1589998907880981300 evaluation succeeds +peer1.org1.example.com | [448b 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [448c 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [448d 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [448e 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [448f 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [4490 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [4491 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4492 05-20 18:21:47.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4493 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4494 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4495 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4496 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4497 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4498 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4499 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042615e0 gate 1589998907895191600 evaluation starts +peer1.org1.example.com | [449a 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042615e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [449b 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042615e0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [449c 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042615e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [449d 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042615e0 principal evaluation fails +peer1.org1.example.com | [449e 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042615e0 gate 1589998907895191600 evaluation fails +peer1.org1.example.com | [449f 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45a7 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1180 principal evaluation fails +peer0.org2.example.com | [45a8 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [45a9 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1180 gate 1589998895414785200 evaluation fails +peer0.org2.example.com | [45ab 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [45aa 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45ac 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [45ad 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45ae 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [45af 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [45b0 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [45b1 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1fd0 gate 1589998895415054300 evaluation starts +peer0.org2.example.com | [45b2 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [45b3 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1fd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [45b4 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [45b5 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [45b6 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [44a0 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [44a1 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [44a2 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261b50 gate 1589998907895931100 evaluation starts +peer1.org1.example.com | [44a3 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261b50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [44a4 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261b50 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [44a5 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [44a6 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261b50 principal evaluation fails +peer1.org1.example.com | [44a7 05-20 18:21:47.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004261b50 gate 1589998907895931100 evaluation fails +peer1.org1.example.com | [44a8 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [44a9 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [44aa 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [44ab 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042760c0 gate 1589998907901759300 evaluation starts +peer1.org1.example.com | [44ac 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042760c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [44ad 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042760c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [44ae 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042760c0 principal matched by identity 0 +peer1.org1.example.com | [44af 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [44b0 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [44b1 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042760c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [44b2 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042760c0 gate 1589998907901759300 evaluation succeeds +peer1.org1.example.com | [44b3 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [44b4 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [44b5 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [44b6 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [44b7 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [44b8 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [44b9 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [44ba 05-20 18:21:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [44bb 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [44bc 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [44bd 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [44be 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4223 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4224 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4225 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4226 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4227 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4228 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4229 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [422a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [422b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [422c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [422d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [422e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [422f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [44bf 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [44c0 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [44c1 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [44c2 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [44c3 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [44c4 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [44c5 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298240 gate 1589998907913947800 evaluation starts +peer1.org1.example.com | [44c6 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298240 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [44c7 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298240 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [44c8 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [44c9 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298240 principal evaluation fails +peer1.org1.example.com | [44ca 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298240 gate 1589998907913947800 evaluation fails +peer1.org1.example.com | [44cb 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [44cc 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [44cd 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [44ce 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042987b0 gate 1589998907914472400 evaluation starts +peer1.org1.example.com | [44cf 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042987b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [44d0 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042987b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [44d1 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042987b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [44d2 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042987b0 principal evaluation fails +peer1.org1.example.com | [44d3 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042987b0 gate 1589998907914472400 evaluation fails +peer1.org1.example.com | [44d4 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [44d5 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [44d6 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [44d7 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298d20 gate 1589998907914971400 evaluation starts +peer1.org1.example.com | [44d8 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298d20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [44d9 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298d20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [44da 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298d20 principal matched by identity 0 +peer1.org1.example.com | [44db 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [44dc 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [44dd 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298d20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [44de 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004298d20 gate 1589998907914971400 evaluation succeeds +peer1.org1.example.com | [44df 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [44e0 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [44e1 05-20 18:21:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [44e2 05-20 18:21:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [44e3 05-20 18:21:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [44e4 05-20 18:21:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | [4230 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4231 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4232 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4233 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4234 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4235 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4236 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 gate 1589998892913712300 evaluation starts +peer0.org1.example.com | [4237 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4238 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4239 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 principal matched by identity 0 +peer0.org1.example.com | [423a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer0.org1.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer0.org1.example.com | [423b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer0.org1.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer0.org1.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer0.org1.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer0.org1.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer0.org1.example.com | [423c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [423d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 gate 1589998892913712300 evaluation succeeds +peer0.org1.example.com | [423e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [423f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4240 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4241 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4242 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4243 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4244 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4245 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4246 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4247 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4248 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4249 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [424a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [424b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [424c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [424d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [424e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [424f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\247\233;" > alive: alive: +peer0.org1.example.com | [4250 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4251 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4252 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4253 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161038 +peer0.org1.example.com | [4254 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A77BCBE7D8744E6863FA425A2DC9F43AD1E2395188C809C1610BE07377237BAB +peer0.org1.example.com | [4255 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4256 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4257 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4258 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4259 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [425a 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [425b 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [425c 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [44e5 05-20 18:21:47.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [44e6 05-20 18:21:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [44e7 05-20 18:21:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [44e8 05-20 18:21:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [44e9 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [44ea 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [44eb 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [44ec 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [44ed 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2610 gate 1589998907960496100 evaluation starts +peer1.org1.example.com | [44ee 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2610 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [44ef 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2610 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [44f0 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [44f1 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2610 principal evaluation fails +peer1.org1.example.com | [44f2 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2610 gate 1589998907960496100 evaluation fails +peer1.org1.example.com | [44f3 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [44f4 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [44f5 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [44f6 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2b80 gate 1589998907960975300 evaluation starts +peer1.org1.example.com | [44f7 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2b80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [44f8 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2b80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [44f9 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [44fa 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2b80 principal evaluation fails +peer1.org1.example.com | [44fb 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b2b80 gate 1589998907960975300 evaluation fails +peer1.org1.example.com | [44fc 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [44fd 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [44fe 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [44ff 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b30f0 gate 1589998907961685400 evaluation starts +peer1.org1.example.com | [4500 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b30f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4501 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b30f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4502 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b30f0 principal matched by identity 0 +peer1.org1.example.com | [4503 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [4504 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [4505 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b30f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4506 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b30f0 gate 1589998907961685400 evaluation succeeds +peer1.org1.example.com | [4507 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4508 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4509 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [450a 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [450b 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [450c 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [450d 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [450e 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [450f 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [425d 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [425e 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [425f 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4260 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4261 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [4262 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4263 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4264 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4265 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4266 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4267 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4268 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4510 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4511 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4512 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4513 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4514 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4515 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4516 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ce540 gate 1589998907963862400 evaluation starts +peer1.org1.example.com | [4517 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ce540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4518 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ce540 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4519 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ce540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [451a 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ce540 principal evaluation fails +peer1.org1.example.com | [451b 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ce540 gate 1589998907963862400 evaluation fails +peer1.org1.example.com | [451c 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [451d 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [451e 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [451f 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ceab0 gate 1589998907964354200 evaluation starts +peer1.org1.example.com | [4520 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ceab0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4521 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ceab0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4522 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ceab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4523 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ceab0 principal evaluation fails +peer1.org1.example.com | [4524 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ceab0 gate 1589998907964354200 evaluation fails +peer1.org1.example.com | [4525 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4526 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4527 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4528 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cf020 gate 1589998907964878600 evaluation starts +peer1.org1.example.com | [4529 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cf020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [452a 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cf020 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [452b 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cf020 principal matched by identity 0 +peer1.org1.example.com | [452c 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [452d 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [452e 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cf020 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [452f 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cf020 gate 1589998907964878600 evaluation succeeds +peer1.org1.example.com | [4530 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4531 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4532 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4533 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4534 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [45b7 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [45b8 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [45b9 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [45ba 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [45bb 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1fd0 principal matched by identity 0 +peer0.org2.example.com | [45bd 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [45be 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [45c0 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [45c1 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [45bf 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 5a fa c5 72 6b 25 3f 11 3e 07 79 |0D. :Z..rk%?.>.y| +peer0.org2.example.com | 00000010 5a 82 b5 bb f6 8e b9 51 b7 c4 d1 93 11 c7 91 9c |Z......Q........| +peer0.org2.example.com | 00000020 7c fa be 6a 02 20 39 0d 2a c1 0c c6 76 45 75 45 ||..j. 9.*...vEuE| +peer0.org2.example.com | 00000030 93 ad 84 19 9b 29 85 ea 7f ce 55 d6 b7 d8 59 b4 |.....)....U...Y.| +peer0.org2.example.com | 00000040 d6 a8 95 8b 47 57 |....GW| +peer0.org2.example.com | [45c2 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Closing writing to stream +peer0.org2.example.com | [45c3 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1fd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [45c9 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d1fd0 gate 1589998895415054300 evaluation succeeds +peer0.org2.example.com | [45ca 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45cb 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45cc 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [45cd 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [45ce 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [4535 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [4536 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [4537 05-20 18:21:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [4538 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4539 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [453a 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [453b 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [453c 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [453d 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [453e 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [453f 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4540 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3000 gate 1589998907977988600 evaluation starts +peer1.org1.example.com | [4541 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3000 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4542 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3000 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4543 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4544 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3000 principal evaluation fails +peer1.org1.example.com | [4545 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3000 gate 1589998907977988600 evaluation fails +peer1.org1.example.com | [4546 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4547 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4548 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4549 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3570 gate 1589998907978259200 evaluation starts +peer1.org1.example.com | [454a 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3570 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [454b 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3570 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [454c 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [454d 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3570 principal evaluation fails +peer1.org1.example.com | [454e 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3570 gate 1589998907978259200 evaluation fails +peer1.org1.example.com | [454f 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4550 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4551 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4552 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3ae0 gate 1589998907978504700 evaluation starts +peer1.org1.example.com | [4553 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4554 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3ae0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4555 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3ae0 principal matched by identity 0 +peer1.org1.example.com | [4556 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | [4573 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [4574 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com |[0m [4575 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [4576 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [4577 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc004495480)} +peer1.org2.example.com | [4578 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [4579 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [457a 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [457b 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org2.example.com | [457c 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org2.example.com | [457d 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org2.example.com | [457e 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org2.example.com | [457f 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xd4, 0xd4, 0x5b, 0x4, 0x4e, 0x8a, 0x13, 0x2b, 0x2, 0xd9, 0x3, 0xc3, 0x1e, 0x8, 0xa3, 0x0, 0x38, 0xa2, 0x72, 0xe6, 0xd8, 0x7f, 0xf1, 0x5f, 0x4f, 0x51, 0x17, 0xe3, 0xb7, 0xa8, 0x82, 0xb3} txOffsets= +peer1.org2.example.com | txId=987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2 locPointer=offset=71, bytesLength=40146 +peer1.org2.example.com | ] +peer1.org2.example.com | [4580 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97620, bytesLength=40146] for tx ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to txid-index +peer1.org2.example.com | [4581 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97620, bytesLength=40146] for tx number:[0] ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to blockNumTranNum index +peer1.org2.example.com | [4582 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138758], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org2.example.com | [4583 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org2.example.com | [4584 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org2.example.com | [4585 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer1.org2.example.com | [4586 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [4587 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [4588 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [4589 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [458a 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [458b 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [458c 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer0.org1.example.com | [4269 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [426a 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [426b 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [426c 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [426d 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [426e 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [426f 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 gate 1589998893016570300 evaluation starts +peer0.org1.example.com | [4270 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4271 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4272 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 principal matched by identity 0 +peer0.org1.example.com | [4273 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +peer0.org1.example.com | 00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +peer0.org1.example.com | [4274 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +peer0.org1.example.com | 00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +peer0.org1.example.com | 00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +peer0.org1.example.com | 00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +peer0.org1.example.com | 00000040 2d 5b 92 8e 73 ae |-[..s.| +peer0.org1.example.com | [4275 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4276 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 gate 1589998893016570300 evaluation succeeds +peer0.org1.example.com | [4277 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4278 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4279 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [427a 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [427b 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [427c 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [427d 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [427e 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [427f 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4280 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +peer0.org1.example.com | 00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +peer0.org1.example.com | [4281 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +peer0.org1.example.com | 00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +peer0.org1.example.com | 00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +peer0.org1.example.com | 00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +peer0.org1.example.com | 00000040 5c 0c f4 3b 58 db 03 |\..;X..| +peer0.org1.example.com | [4282 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4283 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4284 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4285 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4286 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer0.org1.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer0.org1.example.com | [4287 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer0.org1.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer0.org1.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer0.org1.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer0.org1.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer0.org1.example.com | [4288 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4289 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [428a 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [428b 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [428c 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [428d 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [428e 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +peer0.org1.example.com | 00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +peer0.org1.example.com | [428f 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +peer0.org1.example.com | 00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +peer0.org1.example.com | 00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +peer0.org1.example.com | 00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +peer0.org1.example.com | 00000040 5c 0c f4 3b 58 db 03 |\..;X..| +peer0.org1.example.com | [4290 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [4291 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 58 72 83 0f a2 1c 38 74 20 70 |0E.!..Xr....8t p| +peer0.org1.example.com | 00000010 48 2a ef 7f d5 22 08 66 f3 65 87 9f 7d 24 8f 31 |H*...".f.e..}$.1| +peer0.org1.example.com | 00000020 74 9c d3 cb 3a 02 20 71 30 8f 95 07 cf aa 90 5c |t...:. q0......\| +peer0.org1.example.com | 00000030 ed 23 20 ea 65 1e e0 26 4d b5 59 47 a5 3b f2 0a |.# .e..&M.YG.;..| +peer0.org1.example.com | 00000040 bc 73 67 43 ad 88 a4 |.sgC...| +peer0.org1.example.com | [4292 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [4293 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [4294 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4295 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4296 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4297 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4298 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4299 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [429a 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [429b 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [458d 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org2.example.com | [458e 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org2.example.com | [458f 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [4590 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org2.example.com | [4591 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org2.example.com | [4592 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [4593 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer1.org2.example.com | [4594 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 26ms (state_validation=3ms block_and_pvtdata_commit=17ms state_commit=3ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer1.org2.example.com | [4595 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4596 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F8B6E8FEC1EFB38816...08071A0C0A0565787030321203312E30 +peer1.org2.example.com | [4597 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D73CCD949F09DCA127F583EDD370FB3077C74C83979DC63515F82A9AE008F642 +peer1.org2.example.com | [4598 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer1.org2.example.com | [4599 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46046 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 17654572624681692194, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [459a 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [459b 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17654572624681692194, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [459c 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [459d 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +peer1.org2.example.com | 00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +peer1.org2.example.com | [459e 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +peer1.org2.example.com | 00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +peer1.org2.example.com | 00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +peer1.org2.example.com | 00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +peer1.org2.example.com | 00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +peer1.org2.example.com | [459f 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [45a0 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [45a1 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45a2 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45a3 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [45a4 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:46046 disconnected +peer1.org2.example.com | [45a5 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:46046 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m27.9863793s +peer1.org2.example.com | [45a6 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [45a7 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [45a8 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.607Z grpc.peer_address=172.18.0.7:46212 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=111.2µs +peer1.org2.example.com | [45a9 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [45aa 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [45ab 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [45ac 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:46212 +peer0.org2.example.com | [45cf 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:43390 +peer0.org2.example.com | [45d0 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45d1 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [45d2 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB38816103F +peer0.org2.example.com | [45d3 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82FFD0BE02D5D361BF0B8A9B394C449C6A4B01A2B47D058B565DA27F5A5DF55B +peer0.org2.example.com | [45d4 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [45d5 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [45d6 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [45d7 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [45d8 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 6a 6e 1b 2d f1 ea a6 df a5 a5 85 |0D. Rjn.-.......| +peer0.org2.example.com | 00000010 ff ea 30 55 3f cb 73 c9 b0 2d e8 5b eb 05 ae 28 |..0U?.s..-.[...(| +peer0.org2.example.com | 00000020 9a b2 65 73 02 20 00 dd 52 21 2d e2 39 f9 c2 79 |..es. ..R!-.9..y| +peer0.org2.example.com | 00000030 1b 3c 5e a0 e0 42 d1 bd aa 04 ab ab c6 ec 1c dc |.<^..B..........| +peer0.org2.example.com | 00000040 b9 fe cc 04 17 4f |.....O| +peer0.org2.example.com | [45d9 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45da 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:43390 +peer0.org2.example.com | [45db 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:43390 +peer0.org2.example.com | [45dc 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:17781309580720699216 tag:EMPTY mem_req:\t\276\236\206\335\377\022\337\233\236Z\032\206 \230\314\263+\035\001\266_\3230\007\270\n\333\330]3" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [45dd 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:43234 disconnected +peer0.org2.example.com | [45de 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:43234 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m28.7139575s +peer0.org2.example.com | [45df 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:17781309580720699216 tag:EMPTY mem_req:\t\276\236\206\335\377\022\337\233\236Z\032\206 \230\314\263+\035\001\266_\3230\007\270\n\333\330]3" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [45e0 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [45e1 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [45e2 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [45e3 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:43390 disconnected +peer0.org2.example.com | [45e4 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.427Z grpc.peer_address=172.18.0.6:43390 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=22.2661ms +peer0.org2.example.com | [45e5 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org2.example.com | [45e6 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [45e7 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.474Z grpc.peer_address=172.18.0.8:52754 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=142.3µs +peer0.org2.example.com | [45c4 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [45e8 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [45ea 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [45bc 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc004615d80)} +peer0.org2.example.com | [45e9 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [45eb 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [45ec 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [45ee 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00474f7b0, CONNECTING +peer0.org2.example.com | [45ed 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [45ef 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [45f0 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [45f1 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer0.org2.example.com | [45f2 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer0.org2.example.com | [45f3 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer0.org2.example.com | [45f4 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [45f5 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [45f6 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [45f7 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [45fb 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45fc 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [45fd 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [45fe 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [45ff 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4600 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [429c 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [429d 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [429e 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [429f 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42a0 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [42a1 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [42a2 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 gate 1589998893031913800 evaluation starts +peer0.org1.example.com | [42a3 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42a4 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [42a5 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 principal matched by identity 0 +peer0.org1.example.com | [42a6 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +peer0.org1.example.com | 00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +peer0.org1.example.com | [42a7 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +peer0.org1.example.com | 00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +peer0.org1.example.com | 00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +peer0.org1.example.com | 00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +peer0.org1.example.com | 00000040 c8 23 ab 1d 51 fb |.#..Q.| +peer0.org1.example.com | [42a8 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42a9 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 gate 1589998893031913800 evaluation succeeds +peer0.org1.example.com | [42aa 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42ab 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42ac 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [42ad 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [42ae 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [42af 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42b0 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [42b1 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +peer0.org1.example.com | 00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +peer0.org1.example.com | [42b2 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +peer0.org1.example.com | 00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +peer0.org1.example.com | 00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +peer0.org1.example.com | 00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +peer0.org1.example.com | 00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +peer0.org1.example.com | [42b3 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [42b4 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42b5 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [42b6 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +peer0.org1.example.com | 00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +peer0.org1.example.com | [42b7 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +peer0.org1.example.com | 00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +peer0.org1.example.com | 00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +peer0.org1.example.com | 00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +peer0.org1.example.com | 00000040 5c 0c f4 3b 58 db 03 |\..;X..| +peer0.org1.example.com | [42b8 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [42b9 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [42ba 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42bb 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42bc 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [42bd 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [4557 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [4558 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3ae0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4559 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e3ae0 gate 1589998907978504700 evaluation succeeds +peer1.org1.example.com | [455a 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [455b 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [455c 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [455d 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [455e 05-20 18:21:47.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [455f 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4560 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4561 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4562 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4563 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4564 05-20 18:21:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4565 05-20 18:21:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816104A +peer1.org1.example.com | [4566 05-20 18:21:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C6A701AFE841B45F350451144D3B2DAB7C178C4C41E555518E4C03A2EEC21BD5 +peer1.org1.example.com | [4567 05-20 18:21:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4568 05-20 18:21:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [4569 05-20 18:21:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [456a 05-20 18:21:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [456b 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [456c 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [456d 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [456e 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [456f 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4570 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4571 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4572 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4573 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4574 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4575 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4576 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4577 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4578 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4579 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [457a 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [457b 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [457c 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [457d 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [457e 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [45ad 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:46212 +peer1.org2.example.com | [45ae 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45af 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b0 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [45b1 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [45b2 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [45b3 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [45b4 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b5 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [45b6 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42be 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [42bf 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42c0 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42c1 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42c2 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42c3 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42c4 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42c5 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [42c6 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42c7 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [42c8 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [42c9 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42ca 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [42cb 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [42cc 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42cd 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42ce 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42cf 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42d0 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42d1 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [42d2 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [42d3 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 gate 1589998893185933600 evaluation starts +peer0.org1.example.com | [42d4 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42d5 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [42d6 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 principal matched by identity 0 +peer0.org1.example.com | [42d7 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 53 0b 00 f7 89 a5 eb 6a 24 a7 c9 74 38 68 f1 |4S......j$..t8h.| +peer0.org1.example.com | 00000010 04 1d 36 bb 9c c6 aa 18 31 cb 8f 86 e3 b5 66 7e |..6.....1.....f~| +peer0.org1.example.com | [42d8 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a5 74 b6 f9 29 0d 09 5e 35 99 d9 |0D. &.t..)..^5..| +peer0.org1.example.com | 00000010 c8 29 65 f1 b3 f7 14 c1 19 e2 72 cc 9e 56 a3 83 |.)e.......r..V..| +peer0.org1.example.com | 00000020 9c db 2e 98 02 20 37 8d 3b 4f fa c7 9a 97 c1 ee |..... 7.;O......| +peer0.org1.example.com | 00000030 fe 46 6d 7e b5 69 19 59 ba 22 cc 4e 33 2c 93 cf |.Fm~.i.Y.".N3,..| +peer0.org2.example.com | [4601 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4602 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4604 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4605 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4606 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4607 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4608 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4609 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4603 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xd4, 0xd4, 0x5b, 0x4, 0x4e, 0x8a, 0x13, 0x2b, 0x2, 0xd9, 0x3, 0xc3, 0x1e, 0x8, 0xa3, 0x0, 0x38, 0xa2, 0x72, 0xe6, 0xd8, 0x7f, 0xf1, 0x5f, 0x4f, 0x51, 0x17, 0xe3, 0xb7, 0xa8, 0x82, 0xb3} txOffsets= +peer0.org2.example.com | txId=987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2 locPointer=offset=71, bytesLength=40146 +peer0.org2.example.com | ] +peer0.org2.example.com | [460a 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b0f0 gate 1589998895504067100 evaluation starts +peer0.org2.example.com | [460c 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b0f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [460d 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b0f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [460b 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97627, bytesLength=40146] for tx ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to txid-index +peer0.org2.example.com | [460e 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [460f 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b0f0 principal evaluation fails +peer0.org2.example.com | [4610 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b0f0 gate 1589998895504067100 evaluation fails +peer0.org2.example.com | [4611 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97627, bytesLength=40146] for tx number:[0] ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to blockNumTranNum index +peer0.org2.example.com | [4612 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4613 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4614 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4615 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b730 gate 1589998895505639900 evaluation starts +peer0.org2.example.com | [4616 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4617 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b730 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4618 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [4619 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [461a 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [461b 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b730 principal matched by identity 0 +peer0.org2.example.com | [461c 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [461d 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 e6 b3 c6 eb 48 87 0c 6e a3 23 |0E.!......H..n.#| +peer0.org2.example.com | 00000010 19 42 cb 86 40 c7 0a 74 bf 99 6b b6 83 8b e7 d2 |.B..@..t..k.....| +peer0.org2.example.com | 00000020 9f a4 75 fc ed 02 20 4c 19 27 a9 d1 4f 09 5d c9 |..u... L.'..O.].| +peer0.org2.example.com | 00000030 26 c3 1c 0c a8 6b 34 f0 9a b8 57 fa c5 0f 5e 90 |&....k4...W...^.| +peer0.org2.example.com | 00000040 58 b1 75 ed 6d 64 c0 |X.u.md.| +peer0.org2.example.com | [461e 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b730 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [461f 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b730 gate 1589998895505639900 evaluation succeeds +peer0.org2.example.com | [4620 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4621 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4622 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4623 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4624 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52754 +peer0.org2.example.com | [4625 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52754 +peer0.org2.example.com | [4626 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52574 disconnected +peer0.org2.example.com | [4627 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:52574 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m29.519836s +peer0.org2.example.com | [4628 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138765], isChainEmpty=[false], lastBlockNumber=[6] +peer0.org2.example.com | [4629 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer0.org2.example.com | [462a 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [462b 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [462c 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52754 disconnected +peer0.org2.example.com | [462d 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.49Z grpc.peer_address=172.18.0.8:52754 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.009ms +peer0.org2.example.com | [462e 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org2.example.com | [462f 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer0.org2.example.com | [4630 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer0.org2.example.com | [4631 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [4632 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [4633 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [4634 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [4635 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [4637 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [4636 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [4638 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [4639 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00474f7b0, READY +peer0.org2.example.com | [463a 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer0.org2.example.com | [463b 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer0.org2.example.com | [463d 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer0.org2.example.com | [463c 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [463e 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer0.org2.example.com | [463f 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org1.example.com | [457f 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4580 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [4581 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4582 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4583 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47930 +peer1.org1.example.com | [4584 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0042e0c80 +peer1.org1.example.com | [4585 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [4586 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [4587 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [458a 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [458b 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 1c 4f 27 21 66 5a e0 93 1a 07 93 8d b8 37 0a |[.O'!fZ.......7.| +peer1.org1.example.com | 00000010 3f 39 f0 eb cd 4a 0e f5 23 f7 13 f7 f9 4d e7 13 |?9...J..#....M..| +peer1.org1.example.com | [458c 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 1d 54 7e 0c e4 0d b5 78 8d 6b |0E.!...T~....x.k| +peer1.org1.example.com | 00000010 aa fd 61 f9 e2 7c 10 7f ab a3 61 da dd e6 dd e1 |..a..|....a.....| +peer1.org1.example.com | 00000020 a1 b8 00 c8 87 02 20 7a db 53 78 0b 7a 4a 1e 62 |...... z.Sx.zJ.b| +peer1.org1.example.com | 00000030 83 43 12 b7 bf 1e d6 9d 7a 18 30 87 9b ee 0b 38 |.C......z.0....8| +peer1.org1.example.com | 00000040 3e bb 23 5c 64 fb d3 |>.#\d..| +peer1.org1.example.com | [4588 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4589 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [458d 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [458e 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [4590 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4591 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [458f 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4592 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4593 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4594 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4595 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [4596 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0041d2ee0, header 0xc0042e1090 +peer1.org1.example.com | [4597 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org1.example.com | [4598 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU [][7002f7d8] processing txid: 7002f7d82f088a0070a592b733d74ae81a86e4b012173d054b88f32dcfe4a214 +peer1.org1.example.com | [4599 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU [][7002f7d8] Entry chaincode: name:"qscc" +peer1.org1.example.com | [459a 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> INFO [][7002f7d8] Entry chaincode: name:"qscc" +peer1.org1.example.com | [459b 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [459c 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org1.example.com | [459d 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org1.example.com | [459f 05-20 18:21:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [45a0 05-20 18:21:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [45a1 05-20 18:21:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [45a2 05-20 18:21:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [45a3 05-20 18:21:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [45a4 05-20 18:21:48.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | [4640 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [4641 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org2.example.com | [4642 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 142ms (state_validation=70ms block_and_pvtdata_commit=24ms state_commit=32ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org2.example.com | [4643 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4644 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408CC93F4F0C0EFB38816...08071A0C0A0565787030321203312E30 +peer0.org2.example.com | [4645 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F1241158094C1C3F65008F0775E56AB0F28A47304B2AA67F7DDC6A42650A5249 +peer0.org2.example.com | [4646 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4647 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [4648 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [4649 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [464d 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [464e 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [464f 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4650 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4651 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4652 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4653 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4654 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4655 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4656 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4657 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4658 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4659 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7a60 gate 1589998895573388600 evaluation starts +peer0.org2.example.com | [465a 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7a60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [465b 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7a60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [465c 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [465d 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7a60 principal evaluation fails +peer0.org2.example.com | [465e 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7a60 gate 1589998895573388600 evaluation fails +peer0.org2.example.com | [465f 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4660 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4661 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4662 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7fd0 gate 1589998895575145500 evaluation starts +peer0.org2.example.com | [4663 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4664 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7fd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4665 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7fd0 principal matched by identity 0 +peer0.org2.example.com | [4666 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [4667 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 33 b2 bb d0 74 e2 de 9d 48 96 14 |0D. S3...t...H..| +peer0.org2.example.com | 00000010 11 e7 9a b7 e6 b0 a9 cf 43 93 80 29 cb 16 39 24 |........C..)..9$| +peer0.org2.example.com | 00000020 09 98 3f f6 02 20 3d 51 ef d4 e3 84 58 6d 04 89 |..?.. =Q....Xm..| +peer0.org2.example.com | 00000030 c2 3f ed c7 ac 59 62 24 58 b9 48 ed 25 71 62 30 |.?...Yb$X.H.%qb0| +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [45a5 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305940 gate 1589998908590460600 evaluation starts +peer1.org1.example.com | [45a6 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [45a7 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305940 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [45a8 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [45a9 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305940 principal evaluation fails +peer1.org1.example.com | [459e 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [45aa 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004305940 gate 1589998908590460600 evaluation fails +peer1.org1.example.com | [45ac 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [45ad 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [45ae 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [45af 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a870 gate 1589998908594845300 evaluation starts +peer1.org1.example.com | [45b0 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a870 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [45b1 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a870 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [45b2 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [45b3 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [45b4 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [45ab 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [45b5 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [45b6 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [45b7 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [45b8 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [45b9 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [45ba 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45bb 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a870 principal matched by identity 0 +peer1.org1.example.com | [45bc 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [45bd 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [45be 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45bf 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 1c 4f 27 21 66 5a e0 93 1a 07 93 8d b8 37 0a |[.O'!fZ.......7.| +peer1.org1.example.com | 00000010 3f 39 f0 eb cd 4a 0e f5 23 f7 13 f7 f9 4d e7 13 |?9...J..#....M..| +peer1.org1.example.com | [45c0 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 1d 54 7e 0c e4 0d b5 78 8d 6b |0E.!...T~....x.k| +peer1.org1.example.com | 00000010 aa fd 61 f9 e2 7c 10 7f ab a3 61 da dd e6 dd e1 |..a..|....a.....| +peer1.org1.example.com | 00000020 a1 b8 00 c8 87 02 20 7a db 53 78 0b 7a 4a 1e 62 |...... z.Sx.zJ.b| +peer1.org1.example.com | 00000030 83 43 12 b7 bf 1e d6 9d 7a 18 30 87 9b ee 0b 38 |.C......z.0....8| +peer1.org1.example.com | 00000040 3e bb 23 5c 64 fb d3 |>.#\d..| +peer1.org1.example.com | [45c1 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a870 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [45c2 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436a870 gate 1589998908594845300 evaluation succeeds +peer1.org1.example.com | [45c3 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [45c4 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [45c5 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [45c6 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [45c7 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU [7002f7d8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [45c8 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU [7002f7d8] notifying Txid:7002f7d82f088a0070a592b733d74ae81a86e4b012173d054b88f32dcfe4a214, channelID: +peer1.org1.example.com | [45c9 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [45ca 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> INFO [][7002f7d8] Exit chaincode: name:"qscc" (34ms) +peer1.org1.example.com | [45cb 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU [][7002f7d8] Exit +peer0.org2.example.com | 00000040 b5 44 15 3c e8 4c |.D.<.L| +peer0.org2.example.com | [4668 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7fd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4669 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b7fd0 gate 1589998895575145500 evaluation succeeds +peer0.org2.example.com | [466a 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [466b 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [466c 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [466d 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [466e 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [466f 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4670 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [4671 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4672 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.579Z grpc.peer_address=172.18.0.7:34748 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.7µs +peer0.org2.example.com | [4673 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4674 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [4675 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [4676 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [4679 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [467a 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [467b 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [467c 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b7 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [45b8 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [45b9 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [45ba 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [45bb 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [45bc 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [45bd 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a67a0 gate 1589998895618545100 evaluation starts +peer1.org2.example.com | [45be 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a67a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45bf 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a67a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [45c0 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a67a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [45c1 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a67a0 principal evaluation fails +peer1.org2.example.com | [45c2 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a67a0 gate 1589998895618545100 evaluation fails +peer1.org2.example.com | [45c3 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45c4 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45c5 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [45c6 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a6d30 gate 1589998895619728500 evaluation starts +peer1.org2.example.com | [45c7 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a6d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45c8 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a6d30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [45c9 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [45ca 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [45cb 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [45cc 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a6d30 principal matched by identity 0 +peer1.org2.example.com | [45cd 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [45ce 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 5a 4e 0a b4 c0 16 d4 8e 16 b3 1d |0D. IZN.........| +peer1.org2.example.com | 00000010 b2 ca 3c 7f 68 59 61 dc d3 10 b5 77 4b 6d 90 3e |..<.hYa....wKm.>| +peer1.org2.example.com | 00000020 f8 73 a1 7c 02 20 13 e1 10 48 17 bd da fd 5e 93 |.s.|. ...H....^.| +peer1.org2.example.com | 00000030 01 2b 7c 52 9a 44 3d f3 42 8f 15 8c c3 a0 25 c0 |.+|R.D=.B.....%.| +peer1.org2.example.com | 00000040 93 ae da 32 b1 3a |...2.:| +peer1.org2.example.com | [45cf 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a6d30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [45d0 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a6d30 gate 1589998895619728500 evaluation succeeds +peer1.org2.example.com | [45d1 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [45d2 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [45d3 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [45d4 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [45d5 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:46212 +peer1.org2.example.com | [45d6 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:46212 +peer1.org2.example.com | [45d7 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [45d8 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45d9 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45da 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45db 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | [45cc 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47930 +peer1.org1.example.com | [45cd 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47930 grpc.code=OK grpc.call_duration=86.58ms +peer1.org1.example.com | [45ce 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [45cf 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816104B +peer1.org1.example.com | [45d0 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CAB7BE646E458BC845BF5E81007E1DADFD78A72BB16D59EEE4E4438F67D3E5D +peer1.org1.example.com | [45d1 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [45d2 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [45d3 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [45d4 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [45d5 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [45d6 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [45d7 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [45d8 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [45d9 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45da 05-20 18:21:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [45db 05-20 18:21:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [45df 05-20 18:21:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [45e0 05-20 18:21:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45dc 05-20 18:21:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [45e1 05-20 18:21:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45dd 05-20 18:21:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [45e2 05-20 18:21:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45de 05-20 18:21:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [45e3 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [45e4 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45e5 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [45e6 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [45e7 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [45e8 05-20 18:21:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer1.org1.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer1.org1.example.com | [45e9 05-20 18:21:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer1.org1.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer1.org1.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer1.org1.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer1.org1.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer1.org1.example.com | [45ea 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [45eb 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 73 9e ab d5 20 c7 6a 93 d0 f2 |0E.!..s... .j...| +peer0.org2.example.com | [467d 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [467e 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [467f 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4680 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4681 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4682 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4683 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491f580 gate 1589998895592949500 evaluation starts +peer0.org2.example.com | [4684 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491f580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4685 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491f580 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4686 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491f580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4687 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491f580 principal evaluation fails +peer0.org2.example.com | [4688 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491f580 gate 1589998895592949500 evaluation fails +peer0.org2.example.com | [4689 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [468a 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [468b 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [468c 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491faf0 gate 1589998895594581200 evaluation starts +peer0.org2.example.com | [468d 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491faf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [468e 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491faf0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [468f 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491faf0 principal matched by identity 0 +peer0.org2.example.com | [4690 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [4691 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 96 1f ee 96 af f3 d0 2d 9a 5a 63 |0D. ........-.Zc| +peer0.org2.example.com | 00000010 0f c9 2a 23 9e 0b e4 9f 9d f4 e4 e9 cc 6b da ef |..*#.........k..| +peer0.org2.example.com | 00000020 1c 30 23 03 02 20 64 9d 4f 10 0d 3f a7 b3 59 d4 |.0#.. d.O..?..Y.| +peer0.org2.example.com | 00000030 29 eb 98 46 ce f4 f5 f1 2d c2 6f f5 b9 69 6c d2 |)..F....-.o..il.| +peer0.org2.example.com | 00000040 98 34 72 56 8d 3b |.4rV.;| +peer0.org2.example.com | [4692 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491faf0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4693 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00491faf0 gate 1589998895594581200 evaluation succeeds +peer0.org2.example.com | [4694 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4695 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4696 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4697 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4698 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34748 +peer0.org2.example.com | [4699 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34748 +peer0.org2.example.com | [469a 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [469b 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c canceling read because closing +peer0.org2.example.com | [469c 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [469d 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [469e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:34748 disconnected +peer0.org2.example.com | [469f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.588Z grpc.peer_address=172.18.0.7:34748 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.7978ms +peer0.org1.example.com | 00000040 a0 10 16 eb 60 1f |....`.| +peer0.org1.example.com | [42d9 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42da 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 gate 1589998893185933600 evaluation succeeds +peer0.org1.example.com | [42db 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42dc 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42dd 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [42de 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [42df 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [42e0 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [42e1 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [42e2 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [42e3 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [42e4 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42e5 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42e6 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42e7 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [42e8 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42e9 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42ea 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42eb 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [42ec 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\247\233;" > alive: alive: alive: +peer0.org1.example.com | [42ed 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [42ee 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42ef 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [42f0 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [42f1 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42f2 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [42f3 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [42f4 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 21 81 35 80 98 f0 d0 31 04 37 02 0e 74 1f 1a |.!.5....1.7..t..| +peer0.org1.example.com | 00000010 15 9a 2c a5 da 2c 90 32 99 f3 c9 81 0e a0 4f f6 |..,..,.2......O.| +peer0.org1.example.com | [42f5 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 61 d6 7b ec af 4b cf d3 c9 71 4f |0D. 6a.{..K...qO| +peer0.org1.example.com | 00000010 6c 28 98 49 10 ae a8 27 e9 69 a8 bc 57 49 36 1f |l(.I...'.i..WI6.| +peer0.org1.example.com | 00000020 e4 8c ee 45 02 20 59 72 38 db a2 29 89 8f 97 52 |...E. Yr8..)...R| +peer0.org1.example.com | 00000030 95 29 e9 7e 53 56 c2 89 ab 42 a9 00 b0 2b 3d e6 |.).~SV...B...+=.| +peer0.org1.example.com | 00000040 22 6a 03 6c 28 06 |"j.l(.| +peer0.org1.example.com | [42f6 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [42f7 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [42f8 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [42f9 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [42fa 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [42fb 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42fc 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42fd 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42fe 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42ff 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4300 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4301 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4302 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4303 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4304 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4305 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4306 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4307 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4308 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4309 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [430a 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [430b 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [430c 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [430d 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [430e 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [430f 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4310 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4311 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4312 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4313 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4314 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4315 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4316 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4317 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4318 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4319 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [431a 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [431b 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [431c 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [431d 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [431e 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 gate 1589998893650847300 evaluation starts +peer0.org1.example.com | [431f 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4320 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4321 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 principal matched by identity 0 +peer0.org1.example.com | [4322 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4324 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4323 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 2e 5d 5f 01 69 3b 83 25 71 a8 91 35 1e c2 7f |..]_.i;.%q..5...| +peer0.org1.example.com | 00000010 1c 5b f6 1a b8 2a 22 f3 6f d8 05 28 c1 95 9e 5a |.[...*".o..(...Z| +peer0.org1.example.com | [4325 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 da 1b 61 14 be 37 c0 12 2f cc b2 |0D. 0..a..7../..| +peer0.org1.example.com | 00000010 39 66 1e 18 39 19 ed ad 44 02 51 66 6a c6 09 37 |9f..9...D.Qfj..7| +peer0.org1.example.com | 00000020 d9 a9 a6 e3 02 20 41 36 56 18 0b 4e 83 90 d7 dd |..... A6V..N....| +peer0.org1.example.com | 00000030 eb c5 67 42 bc 75 ae 58 55 79 f4 cd ae 33 80 dd |..gB.u.XUy...3..| +peer0.org1.example.com | 00000040 e2 02 0f e5 5b e4 |....[.| +peer0.org1.example.com | [4326 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4327 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 gate 1589998893650847300 evaluation succeeds +peer0.org1.example.com | [4328 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4329 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [432a 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [432b 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [432c 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [432d 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000010 a9 f2 4f 1c 05 98 2e 01 ca f1 2d dd f0 9c 2b 64 |..O.......-...+d| +peer1.org1.example.com | 00000020 1b e5 93 20 98 02 20 76 64 1b 1b af 08 e0 93 ff |... .. vd.......| +peer1.org1.example.com | 00000030 65 1d c4 67 00 17 d6 70 d7 b5 6f d1 61 2d e0 e7 |e..g...p..o.a-..| +peer1.org1.example.com | 00000040 f6 18 0b 99 92 53 27 |.....S'| +peer1.org1.example.com | [45ec 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [45ed 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [45ee 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45ef 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45f0 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45f1 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [45f2 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [45f4 05-20 18:21:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [45f5 05-20 18:21:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [45f6 05-20 18:21:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [45f7 05-20 18:21:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [45f3 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [45f8 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [45f9 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [45fa 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [45fb 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [45fc 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043ab940 gate 1589998908902740900 evaluation starts +peer1.org1.example.com | [45fd 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043ab940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [45fe 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043ab940 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [45ff 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043ab940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [46a0 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [46a1 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [46a2 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.603Z grpc.peer_address=172.18.0.7:34750 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.4µs +peer0.org2.example.com | [46a3 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [46a4 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [46a5 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [46a6 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [46a9 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [46aa 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [45dc 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45dd 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45de 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [45df 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45e0 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45e1 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45e2 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45e3 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [45e4 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45e5 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [45e6 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [45e7 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [45e8 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [45e9 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [45ea 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [45eb 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [45ec 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [45ed 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bf5d0 gate 1589998895822452200 evaluation starts +peer1.org2.example.com | [45ee 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bf5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45ef 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bf5d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [45f0 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bf5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [45f1 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bf5d0 principal evaluation fails +peer1.org2.example.com | [45f2 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bf5d0 gate 1589998895822452200 evaluation fails +peer1.org2.example.com | [45f3 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45f4 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45f5 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [45f6 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bfb60 gate 1589998895822933100 evaluation starts +peer1.org2.example.com | [45f7 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bfb60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45f8 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bfb60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [45f9 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [45fa 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [45fb 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [45fc 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bfb60 principal matched by identity 0 +peer1.org2.example.com | [45fd 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [45fe 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | [432e 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [432f 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4330 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4331 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4332 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4333 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4334 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4335 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4336 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4337 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4338 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4339 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [433a 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [433b 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [433c 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [433d 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [433e 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [433f 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4340 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4341 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4342 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4343 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4344 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4345 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4346 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4347 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4348 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4349 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [434a 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [434b 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [434c 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [434d 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [434e 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [434f 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4600 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043ab940 principal evaluation fails +peer1.org1.example.com | [4601 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043ab940 gate 1589998908902740900 evaluation fails +peer1.org1.example.com | [4602 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4603 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4604 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4605 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abeb0 gate 1589998908907686000 evaluation starts +peer1.org1.example.com | [4606 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abeb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4607 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abeb0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4608 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abeb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4609 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abeb0 principal evaluation fails +peer1.org1.example.com | [460a 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abeb0 gate 1589998908907686000 evaluation fails +peer1.org1.example.com | [460b 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [460c 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [460d 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [460e 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c0420 gate 1589998908916366100 evaluation starts +peer1.org1.example.com | [460f 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c0420 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4610 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c0420 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4611 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c0420 principal matched by identity 0 +peer1.org1.example.com | [4612 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 a3 d6 57 4e 31 8d b9 e2 17 a5 a0 83 3f 8a 0d |...WN1.......?..| +peer1.org1.example.com | 00000010 1e 20 7a aa 5d 22 69 0d f6 61 ec a7 e0 23 65 be |. z.]"i..a...#e.| +peer1.org1.example.com | [4613 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 0f 6b ef e4 55 02 49 7d a2 e3 |0E.!...k..U.I}..| +peer1.org1.example.com | 00000010 e4 03 09 9e 29 d9 f0 c0 6f c6 e5 09 cc 49 eb f1 |....)...o....I..| +peer1.org1.example.com | 00000020 22 61 ce a1 5e 02 20 13 1a e8 d0 b8 0f e6 11 a7 |"a..^. .........| +peer1.org1.example.com | 00000030 c8 81 db e2 b0 04 22 06 21 b4 cf c6 f0 d1 e9 7e |......".!......~| +peer1.org1.example.com | 00000040 f3 d7 cd 17 ec 98 5d |......]| +peer1.org1.example.com | [4614 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c0420 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4615 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c0420 gate 1589998908916366100 evaluation succeeds +peer1.org1.example.com | [4616 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4617 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4618 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4619 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [461a 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [461b 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [461c 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [461d 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [461e 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer1.org1.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer1.org1.example.com | [461f 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer1.org1.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer1.org1.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer1.org1.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer1.org1.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer1.org1.example.com | [4620 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4621 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4622 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4623 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4624 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer1.org1.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer1.org1.example.com | [4625 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer1.org1.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer1.org1.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer1.org1.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer1.org1.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer1.org1.example.com | [4626 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [45ff 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bfb60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4600 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bfb60 gate 1589998895822933100 evaluation succeeds +peer1.org2.example.com | [4601 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4602 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4603 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4604 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4605 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4606 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4607 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4608 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4609 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [460a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [460b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [460c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046de9e0 gate 1589998895826484200 evaluation starts +peer1.org2.example.com | [460d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046de9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [460e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046de9e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [460f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046de9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4610 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046de9e0 principal evaluation fails +peer1.org2.example.com | [4611 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046de9e0 gate 1589998895826484200 evaluation fails +peer1.org2.example.com | [4612 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4613 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4614 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4615 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046def50 gate 1589998895826713300 evaluation starts +peer1.org2.example.com | [4616 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046def50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4617 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046def50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4618 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046def50 principal matched by identity 0 +peer1.org2.example.com | [4619 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [461a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [461b 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046def50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [461c 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046def50 gate 1589998895826713300 evaluation succeeds +peer1.org2.example.com | [461d 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [461e 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [461f 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4620 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4621 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4622 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4623 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4624 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [4625 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4626 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4627 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [4628 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4629 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [462a 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [462b 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 isn't responsive: EOF +peer1.org1.example.com | [4627 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4628 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [4629 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [462a 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [462b 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [462c 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [462d 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [462e 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [462f 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4630 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043de9a0 gate 1589998908986060800 evaluation starts +peer1.org1.example.com | [4631 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043de9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4632 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043de9a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4633 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043de9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4634 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043de9a0 principal evaluation fails +peer1.org1.example.com | [4635 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043de9a0 gate 1589998908986060800 evaluation fails +peer1.org1.example.com | [4636 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4637 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4638 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4639 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [463a 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043def10 gate 1589998908986475600 evaluation starts +peer1.org1.example.com | [463b 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043def10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [463c 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043def10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [463d 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043def10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [463e 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043def10 principal evaluation fails +peer1.org1.example.com | [463f 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043def10 gate 1589998908986475600 evaluation fails +peer1.org1.example.com | [4640 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4641 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4642 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4643 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043df480 gate 1589998909004671400 evaluation starts +peer1.org1.example.com | [4644 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043df480 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4645 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043df480 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4646 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043df480 principal matched by identity 0 +peer1.org1.example.com | [4647 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 a4 c4 7f 81 30 05 a6 a4 40 bf 11 9b bb 91 df |'....0...@......| +peer1.org1.example.com | 00000010 52 5b 4d 1d dd f5 26 91 a6 c1 6f 9c 2e 1b e4 75 |R[M...&...o....u| +peer1.org1.example.com | [4648 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 60 c8 2c 6c 80 0b 87 74 0b 17 5b |0D. U`.,l...t..[| +peer1.org1.example.com | 00000010 72 1b aa 8b c2 6f 79 7a 13 07 70 6b d1 42 ec 25 |r....oyz..pk.B.%| +peer1.org1.example.com | 00000020 99 a9 7e ae 02 20 35 28 3e a3 1c bc 13 4d c3 fe |..~.. 5(>....M..| +peer1.org1.example.com | 00000030 53 61 4c 1e a2 55 ff 29 d9 cf 5a db 2f 17 09 c7 |SaL..U.)..Z./...| +peer1.org1.example.com | 00000040 31 0e 08 2a 96 7c |1..*.|| +peer0.org1.example.com | [4350 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4351 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4352 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4353 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4354 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4355 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4356 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 gate 1589998893887588700 evaluation starts +peer0.org1.example.com | [4357 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4358 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4359 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 principal matched by identity 0 +peer0.org1.example.com | [435a 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 40 5e d8 c2 f2 23 07 a8 9e 95 1f e2 cc be 4f |r@^...#........O| +peer0.org1.example.com | 00000010 eb 2d 03 a9 44 50 df 1c 22 f9 bd 8e 2f 09 4f 0b |.-..DP..".../.O.| +peer0.org1.example.com | [435b 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 ec 28 4d b9 67 61 5f 45 e3 c3 |0E.!...(M.ga_E..| +peer0.org1.example.com | 00000010 87 71 18 3f e3 14 d2 9c c2 16 e7 10 b3 46 1c 1a |.q.?.........F..| +peer0.org1.example.com | 00000020 27 a9 50 fc 0f 02 20 00 b1 c1 a8 fb 8f 39 28 e7 |'.P... ......9(.| +peer0.org1.example.com | 00000030 d5 a5 45 61 49 b5 ba 66 6d f5 b4 8f bf 86 20 d8 |..EaI..fm..... .| +peer0.org1.example.com | 00000040 97 55 fe 9a 6d 5d ce |.U..m].| +peer0.org1.example.com | [435c 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [435d 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 gate 1589998893887588700 evaluation succeeds +peer0.org1.example.com | [435e 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [435f 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4360 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4361 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4362 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4363 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4364 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4365 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4366 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4367 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4368 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4369 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [436a 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [436b 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [436c 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [436d 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [436e 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [436f 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4370 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4371 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4372 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46ab 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [46ac 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46ad 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [46ae 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [46af 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [46b0 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [46b1 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [46b2 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [46b3 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049582c0 gate 1589998895623735500 evaluation starts +peer0.org2.example.com | [46b4 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049582c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [46b5 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049582c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [46b6 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049582c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [46b7 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049582c0 principal evaluation fails +peer0.org2.example.com | [46b8 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049582c0 gate 1589998895623735500 evaluation fails +peer0.org2.example.com | [46b9 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [46ba 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [46bb 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [46bc 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004958830 gate 1589998895624135000 evaluation starts +peer0.org2.example.com | [46bd 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004958830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [46be 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004958830 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [46bf 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004958830 principal matched by identity 0 +peer0.org2.example.com | [46c0 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [46c1 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 ea 5f 8c 33 3b dd 3c a1 8d 37 0e |0D. E._.3;.<..7.| +peer0.org2.example.com | 00000010 74 e4 11 61 04 21 b7 5b 72 9a bb f2 d0 cf 26 11 |t..a.!.[r.....&.| +peer0.org2.example.com | 00000020 91 d8 28 6d 02 20 1c 45 21 05 1a 05 32 c8 12 59 |..(m. .E!...2..Y| +peer0.org2.example.com | 00000030 7e bd 23 9f 15 05 32 c4 07 fe 56 61 5e b0 d5 01 |~.#...2...Va^...| +peer0.org2.example.com | 00000040 20 93 e6 66 e9 cd | ..f..| +peer0.org2.example.com | [46c2 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004958830 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [46c3 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004958830 gate 1589998895624135000 evaluation succeeds +peer0.org2.example.com | [46c4 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [46c5 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [46c6 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [46c7 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [46c8 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:34750 +peer0.org2.example.com | [46c9 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:34750 +peer0.org2.example.com | [46ca 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4649 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043df480 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [464a 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043df480 gate 1589998909004671400 evaluation succeeds +peer1.org1.example.com | [464b 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [464c 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [464d 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [464e 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [464f 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4650 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [4651 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4652 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4653 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [4654 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4655 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4656 05-20 18:21:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4657 05-20 18:21:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4658 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4659 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [465a 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [465b 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [465c 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [465d 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [465e 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [465f 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4660 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4661 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [4662 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4663 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4664 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4665 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4666 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4667 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4668 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [4669 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [466a 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4374 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4373 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4375 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4376 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4377 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4378 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4379 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [437a 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [437b 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [437c 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [437d 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [437e 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [437f 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4380 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4381 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4382 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4383 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161039 +peer0.org1.example.com | [4384 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1954A727ACC328B5799BB52EE8E5613F36D6D5193E0A9A31C1969D84CEBC0429 +peer0.org1.example.com | [4385 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4386 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4387 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4388 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [4389 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [438a 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [438b 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [438c 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [438d 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [438e 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [438f 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4390 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4391 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4392 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4393 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4394 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4395 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [462c 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> WARN Entering [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] +peer1.org2.example.com | [462d 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: +peer1.org2.example.com | [462e 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [462f 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org2.example.com | [4630 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [4631 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:38.103Z grpc.peer_address=172.18.0.5:39572 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=110.6µs +peer1.org2.example.com | [4632 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4633 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [4634 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [4635 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:39572 +peer1.org2.example.com | [4636 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:39572 +peer1.org2.example.com | [4637 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org2.example.com | [4638 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 90 1c 5e 86 52 9e 7b f0 e8 02 |0E.!....^.R.{...| +peer1.org2.example.com | 00000010 6f 19 df a7 a0 13 ab 3e 9a 15 96 bd b4 16 13 fd |o......>........| +peer1.org2.example.com | 00000020 55 5f cf 3d e2 02 20 2e c6 b9 14 42 7e 38 0b 95 |U_.=.. ....B~8..| +peer1.org2.example.com | 00000030 c4 8e 8e 7e ea 29 ad bf 35 d7 99 31 0b ce e7 69 |...~.)..5..1...i| +peer1.org2.example.com | 00000040 4f 8c 6b 44 e3 79 c1 |O.kD.y.| +peer1.org2.example.com | [4639 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39572 +peer1.org2.example.com | [463a 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39572 +peer1.org2.example.com | [463b 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [463c 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [463d 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [463e 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [463f 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [4640 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4641 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4642 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4643 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4644 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4645 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4646 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4647 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4648 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4649 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a2e0 gate 1589998896133571800 evaluation starts +peer1.org2.example.com | [464a 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a2e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [464b 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a2e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [464c 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org2.example.com | [464d 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a2e0 principal evaluation fails +peer1.org2.example.com | [464e 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a2e0 gate 1589998896133571800 evaluation fails +peer1.org2.example.com | [464f 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4650 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4651 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4652 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b130 gate 1589998896136246000 evaluation starts +peer1.org2.example.com | [4653 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4654 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b130 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4655 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [4656 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b130 principal evaluation fails +peer1.org2.example.com | [4657 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b130 gate 1589998896136246000 evaluation fails +peer1.org2.example.com | [4658 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4659 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [465a 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [46cb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46cc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46cd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46ce 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46cf 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 17781309580720699216, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [46d0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46d1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17781309580720699216, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [46d2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [46d3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ff d0 be 02 d5 d3 61 bf 0b 8a 9b 39 4c 44 9c |.......a....9LD.| +peer0.org2.example.com | 00000010 6a 4b 01 a2 b4 7d 05 8b 56 5d a2 7f 5a 5d f5 5b |jK...}..V]..Z].[| +peer0.org2.example.com | [46d4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 2d b6 fc 61 be 82 8d 46 cb 12 29 |0D. +-..a...F..)| +peer0.org2.example.com | 00000010 27 dc 5b 1a df 0e 90 35 fd 07 ac 1a 79 07 83 b1 |'.[....5....y...| +peer0.org2.example.com | 00000020 9d fb 72 17 02 20 3e 09 be 9e 86 dd ff 12 df 9b |..r.. >.........| +peer0.org2.example.com | 00000030 9e 5a 1a 86 20 98 cc b3 2b 1d 01 b6 5f d3 30 07 |.Z.. ...+..._.0.| +peer0.org2.example.com | 00000040 b8 0a db d8 5d 33 |....]3| +peer0.org2.example.com | [46d5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [46d6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [46d7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46d8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [46d9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +peer0.org2.example.com | 00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +peer0.org2.example.com | [46da 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +peer0.org2.example.com | 00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +peer0.org2.example.com | 00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +peer0.org2.example.com | 00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +peer0.org2.example.com | 00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +peer0.org2.example.com | [46db 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [46dc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [46dd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [46de 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [46df 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [46e0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46e1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46e2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46e3 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: nonce:17748581153308284860 tag:EMPTY mem_req:" signature:"0E\002!\000\271\210\037e\224\346Lc\220\344/P==\313\222\252\234%\216G\006\217\367+\232\330_r\214\347\205\002 \036V,\256K\332\361\360\206\250\014\341\264\277^\253l\336Mei\313T\013K\1774(\220\004\342H" > > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org2.example.com | [46e4 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17748581153308284860 tag:EMPTY mem_req:" signature:"0E\002!\000\271\210\037e\224\346Lc\220\344/P==\313\222\252\234%\216G\006\217\367+\232\330_r\214\347\205\002 \036V,\256K\332\361\360\206\250\014\341\264\277^\253l\336Mei\313T\013K\1774(\220\004\342H" > > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org2.example.com | [46e5 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [46e6 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [466b 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [466c 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [466d 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [466e 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [466f 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4670 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4671 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4672 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4673 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f8c20 gate 1589998909058675400 evaluation starts +peer1.org1.example.com | [4674 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f8c20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4675 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f8c20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4676 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f8c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4677 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f8c20 principal evaluation fails +peer1.org1.example.com | [4678 05-20 18:21:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f8c20 gate 1589998909058675400 evaluation fails +peer1.org1.example.com | [4679 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [467a 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [467b 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [467c 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9190 gate 1589998909063883200 evaluation starts +peer1.org1.example.com | [467d 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9190 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [467e 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9190 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [467f 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4680 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9190 principal evaluation fails +peer1.org1.example.com | [4681 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9190 gate 1589998909063883200 evaluation fails +peer1.org1.example.com | [4682 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4683 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4684 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4685 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9700 gate 1589998909076951500 evaluation starts +peer1.org1.example.com | [4686 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9700 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4687 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9700 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4688 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9700 principal matched by identity 0 +peer1.org1.example.com | [4689 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 a4 c4 7f 81 30 05 a6 a4 40 bf 11 9b bb 91 df |'....0...@......| +peer1.org1.example.com | 00000010 52 5b 4d 1d dd f5 26 91 a6 c1 6f 9c 2e 1b e4 75 |R[M...&...o....u| +peer1.org1.example.com | [468a 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 60 c8 2c 6c 80 0b 87 74 0b 17 5b |0D. U`.,l...t..[| +peer1.org1.example.com | 00000010 72 1b aa 8b c2 6f 79 7a 13 07 70 6b d1 42 ec 25 |r....oyz..pk.B.%| +peer1.org1.example.com | 00000020 99 a9 7e ae 02 20 35 28 3e a3 1c bc 13 4d c3 fe |..~.. 5(>....M..| +peer1.org1.example.com | 00000030 53 61 4c 1e a2 55 ff 29 d9 cf 5a db 2f 17 09 c7 |SaL..U.)..Z./...| +peer1.org1.example.com | 00000040 31 0e 08 2a 96 7c |1..*.|| +peer1.org1.example.com | [468b 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9700 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [468c 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f9700 gate 1589998909076951500 evaluation succeeds +peer1.org1.example.com | [468d 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [468e 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4396 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4397 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4398 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [4399 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [439a 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [439b 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 gate 1589998895222381800 evaluation starts +peer0.org1.example.com | [439c 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [439d 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [439e 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 principal matched by identity 0 +peer0.org1.example.com | [439f 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 87 87 7f 13 5e f6 db 66 b0 b1 bd 66 9e 18 bc |.....^..f...f...| +peer0.org1.example.com | 00000010 13 91 ed 8a 3e 67 f7 03 4c ad 6d 05 df 46 a9 d9 |....>g..L.m..F..| +peer0.org1.example.com | [43a0 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 e0 45 06 b2 29 ae 57 9a fc 76 4e |0D. s.E..).W..vN| +peer0.org1.example.com | 00000010 5c 64 0c b0 3c 09 f7 2a f4 bc e4 e5 89 75 c1 d1 |\d..<..*.....u..| +peer0.org1.example.com | 00000020 5e 26 5e 2f 02 20 2c 28 c9 85 45 c5 aa 13 24 53 |^&^/. ,(..E...$S| +peer0.org1.example.com | 00000030 60 fe 99 55 99 cc 33 f0 40 a6 78 f7 f7 58 04 a9 |`..U..3.@.x..X..| +peer0.org1.example.com | 00000040 f3 97 5b 74 de 1b |..[t..| +peer0.org1.example.com | [43a1 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [43a2 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 gate 1589998895222381800 evaluation succeeds +peer0.org1.example.com | [43a3 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [43a4 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [43a5 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [43a6 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [43a7 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org1.example.com | [43a8 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org1.example.com | [43a9 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [43aa 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer0.org1.example.com | [43ab 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer0.org1.example.com | [43ac 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org1.example.com | [43ad 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer0.org1.example.com | [43ae 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org1.example.com | [43af 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [43b0 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0049486c0 env 0xc004901b30 txn 0 +peer0.org1.example.com | [43b1 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004901b30 +peer0.org1.example.com | [43b2 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +peer0.org1.example.com | [43b3 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [43b4 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [43b5 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [43b6 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43b7 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [43b8 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [43b9 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [43ba 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [43bb 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [43bc 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 49 4f 23 4c 66 ab 43 40 69 01 b9 28 34 2c |.IIO#Lf.C@i..(4,| +peer0.org1.example.com | 00000010 71 2d cf eb 11 06 d8 cc 15 14 32 60 e9 81 58 21 |q-........2`..X!| +peer0.org1.example.com | [43bd 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 51 e2 c7 48 26 65 f8 8c 6e 5a 85 |0D. .Q..H&e..nZ.| +peer0.org1.example.com | 00000010 8a 41 ca a0 4b 9c 5c 82 d8 9b c8 b3 00 54 02 d4 |.A..K.\......T..| +peer0.org1.example.com | 00000020 81 5b 50 d2 02 20 01 14 a5 f1 ad ed ae d1 ee fd |.[P.. ..........| +peer1.org1.example.com | [468f 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4690 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4691 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4692 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4693 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4694 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4695 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4696 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4697 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4698 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4699 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [469a 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [469b 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [469c 05-20 18:21:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer1.org1.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer1.org1.example.com | [469d 05-20 18:21:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer1.org1.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer1.org1.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer1.org1.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer1.org1.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer1.org1.example.com | [469e 05-20 18:21:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [469f 05-20 18:21:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46a0 05-20 18:21:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [46a1 05-20 18:21:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer1.org1.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer1.org1.example.com | [46a2 05-20 18:21:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer1.org1.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer1.org1.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer1.org1.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer1.org1.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer1.org1.example.com | [46a3 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [46a4 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [46a5 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46a6 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46a7 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [46a8 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [46e7 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [46e8 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [46e9 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [46ea 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [46eb 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [46ec 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [46ed 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004977370 gate 1589998895642196400 evaluation starts +peer0.org2.example.com | [46ee 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004977370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [46ef 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004977370 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [46f0 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004977370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [46f1 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004977370 principal evaluation fails +peer0.org2.example.com | [46f2 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004977370 gate 1589998895642196400 evaluation fails +peer0.org2.example.com | [46f3 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [46f4 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [46f5 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [46f6 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049778e0 gate 1589998895642449000 evaluation starts +peer0.org2.example.com | [46f7 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049778e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [46f8 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049778e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [46f9 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049778e0 principal matched by identity 0 +peer0.org2.example.com | [46fa 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 7a 2c ec a1 00 23 17 40 5a 90 0a 42 ce 8c 74 |.z,...#.@Z..B..t| +peer0.org2.example.com | 00000010 a9 00 63 c1 09 5f 89 94 a5 36 95 ed 62 69 5f 98 |..c.._...6..bi_.| +peer0.org2.example.com | [46fb 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 88 1f 65 94 e6 4c 63 90 e4 2f |0E.!....e..Lc../| +peer0.org2.example.com | 00000010 50 3d 3d cb 92 aa 9c 25 8e 47 06 8f f7 2b 9a d8 |P==....%.G...+..| +peer0.org2.example.com | 00000020 5f 72 8c e7 85 02 20 1e 56 2c ae 4b da f1 f0 86 |_r.... .V,.K....| +peer0.org2.example.com | 00000030 a8 0c e1 b4 bf 5e ab 6c de 4d 65 69 cb 54 0b 4b |.....^.l.Mei.T.K| +peer0.org2.example.com | 00000040 7f 34 28 90 04 e2 48 |.4(...H| +peer0.org2.example.com | [46fc 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049778e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [46fd 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049778e0 gate 1589998895642449000 evaluation succeeds +peer0.org2.example.com | [46fe 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [46ff 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4700 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4701 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4702 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4703 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4704 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4705 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4706 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000030 6f ef 05 30 85 7c 16 66 26 77 a5 98 56 0f 7e 61 |o..0.|.f&w..V.~a| +peer0.org1.example.com | 00000040 43 ae 34 84 59 de |C.4.Y.| +peer0.org1.example.com | [43be 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [43bf 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc004b1c000, header channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +peer0.org1.example.com | [43c0 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [43c1 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +peer0.org1.example.com | [43c2 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [43c3 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer0.org1.example.com | [43c4 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [43c5 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [43c6 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [43c7 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [43c8 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [43c9 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [43ca 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [43cb 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [43cc 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [43cd 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [43ce 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [43cf 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [43d1 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [43d0 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d2 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d3 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d4 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d5 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [43d6 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [43d7 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d8 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d9 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [43da 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [43db 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes +peer0.org1.example.com | [43dc 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43dd 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [43de 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [43df 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [43e0 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [43e1 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [43e2 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [43e3 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [43e4 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [43e5 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [43e6 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [43e7 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [43e8 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [43e9 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [43ea 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [43eb 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [43ec 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [43ed 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer0.org1.example.com | [43ee 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer0.org1.example.com | [43ef 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org2.example.com | [465b 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b6c0 gate 1589998896136599200 evaluation starts +peer1.org2.example.com | [465c 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b6c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [465d 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b6c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [465e 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [465f 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [4660 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4661 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b6c0 principal matched by identity 0 +peer1.org2.example.com | [4662 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4663 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4664 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b6c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4665 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475b6c0 gate 1589998896136599200 evaluation succeeds +peer1.org2.example.com | [4666 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4667 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4668 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4669 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [466a 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [466b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [466c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [466d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [466e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [466f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4670 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [4671 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [4672 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4673 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4674 05-20 18:21:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [4675 05-20 18:21:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [4676 05-20 18:21:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4677 05-20 18:21:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610141801 +peer1.org2.example.com | [4678 05-20 18:21:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6977DD862DB0958ABEEB6DD64C6CF187690503150A3CB9DEA7187CFBEEB2CC9A +peer1.org2.example.com | [4679 05-20 18:21:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [467a 05-20 18:21:36.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467b 05-20 18:21:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467c 05-20 18:21:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467d 05-20 18:21:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467e 05-20 18:21:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467f 05-20 18:21:36.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4680 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4681 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4682 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4683 05-20 18:21:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4684 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4685 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4686 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org2.example.com | [4687 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4688 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4689 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [468a 05-20 18:21:36.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [468b 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [468c 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [468d 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [468e 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [468f 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4690 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4693 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4694 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4695 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4696 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4707 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4708 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4709 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [470a 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [470b 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [470c 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [470d 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [470e 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 17748581153308284860, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [470f 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:" signature:"0E\002!\000\271\210\037e\224\346Lc\220\344/P==\313\222\252\234%\216G\006\217\367+\232\330_r\214\347\205\002 \036V,\256K\332\361\360\206\250\014\341\264\277^\253l\336Mei\313T\013K\1774(\220\004\342H" > alive: +peer0.org2.example.com | [4710 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17748581153308284860, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org2.example.com | [4711 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4712 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4713 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [4714 05-20 18:21:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4715 05-20 18:21:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4716 05-20 18:21:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [4717 05-20 18:21:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4718 05-20 18:21:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4719 05-20 18:21:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [471a 05-20 18:21:36.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [471b 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [471c 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [471d 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [471e 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [471f 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer0.org2.example.com | [4720 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [4721 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0049bdba0, CONNECTING +peer0.org2.example.com | [4722 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4723 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4724 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4725 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [4726 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [4727 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org2.example.com | [4728 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4729 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [472a 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0049f6820, CONNECTING +peer1.org1.example.com | [46a9 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46aa 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [46ab 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [46ac 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46ad 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [46ae 05-20 18:21:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [46af 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [46b0 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [46b1 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [46b2 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044423d0 gate 1589998909105841800 evaluation starts +peer1.org1.example.com | [46b3 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044423d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [46b4 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044423d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [46b5 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044423d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [46b6 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044423d0 principal evaluation fails +peer1.org1.example.com | [46b7 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044423d0 gate 1589998909105841800 evaluation fails +peer1.org1.example.com | [46b8 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [46b9 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [46ba 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [46bb 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442940 gate 1589998909106599300 evaluation starts +peer1.org1.example.com | [46bc 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [46bd 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442940 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [46be 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [46bf 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442940 principal evaluation fails +peer1.org1.example.com | [46c0 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442940 gate 1589998909106599300 evaluation fails +peer1.org1.example.com | [46c1 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [46c2 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [46c3 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [46c4 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442eb0 gate 1589998909107102000 evaluation starts +peer1.org1.example.com | [46c5 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [46c6 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442eb0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [46c7 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442eb0 principal matched by identity 0 +peer1.org1.example.com | [46c8 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer1.org1.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer1.org1.example.com | [46c9 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer1.org1.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer1.org1.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer1.org1.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer1.org1.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer1.org1.example.com | [46ca 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442eb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4697 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4698 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4699 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4691 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [469a 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [469b 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [469c 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047737c0 gate 1589998896387759200 evaluation starts +peer1.org2.example.com | [469e 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047737c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4692 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [469f 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46a0 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047737c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [46a1 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047737c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [46a2 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047737c0 principal evaluation fails +peer1.org2.example.com | [46a3 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047737c0 gate 1589998896387759200 evaluation fails +peer1.org2.example.com | [46a4 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46a5 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46a6 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [46a7 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004773d30 gate 1589998896399230900 evaluation starts +peer1.org2.example.com | [46a8 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004773d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46a9 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004773d30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [46aa 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004773d30 principal matched by identity 0 +peer1.org2.example.com | [46ab 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [46ac 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [46ad 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004773d30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [46ae 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004773d30 gate 1589998896399230900 evaluation succeeds +peer1.org2.example.com | [46af 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46b0 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46b1 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [46b2 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [46b3 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46b4 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46b5 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46b6 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [46b7 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [46b8 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [46b9 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba870 gate 1589998896403880200 evaluation starts +peer1.org2.example.com | [46ba 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46bb 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba870 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [46bc 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [46bd 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba870 principal evaluation fails +peer1.org2.example.com | [46be 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba870 gate 1589998896403880200 evaluation fails +peer1.org2.example.com | [46bf 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46c0 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46c1 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [46c2 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bade0 gate 1589998896404793600 evaluation starts +peer1.org2.example.com | [46c3 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bade0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46c4 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bade0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [43f0 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [43f1 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [43f2 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [43f3 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [43f4 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [43f5 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [43f6 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [43f7 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [43f8 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer0.org1.example.com | [43f9 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [43fa 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org1.example.com | [43fb 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org1.example.com | [43fc 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 gate 1589998895291193100 evaluation starts +peer0.org1.example.com | [43fd 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [43fe 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [43ff 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [4400 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 processing identity 1 with bytes of 115a110 +peer0.org1.example.com | [4401 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | [4402 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [4403 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [4404 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [4405 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | [4406 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [4407 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 principal matched by identity 1 +peer0.org1.example.com | [4408 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +peer0.org1.example.com | 00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..| +peer0.org1.example.com | [4409 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +peer0.org1.example.com | 00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +peer0.org1.example.com | 00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +peer0.org1.example.com | 00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +peer0.org1.example.com | 00000040 72 24 fc be df 99 95 |r$.....| +peer0.org1.example.com | [440a 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 principal evaluation succeeds for identity 1 +peer0.org1.example.com | [440b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 gate 1589998895291193100 evaluation succeeds +peer0.org1.example.com | [440c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [440d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [440e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [440f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org1.example.com | [4410 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 gate 1589998895306708900 evaluation starts +peer0.org1.example.com | [4411 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [4412 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4413 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 principal matched by identity 0 +peer0.org1.example.com | [4414 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +peer0.org1.example.com | 00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.| +peer0.org1.example.com | [4415 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +peer0.org1.example.com | 00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +peer0.org1.example.com | 00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +peer0.org1.example.com | 00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +peer0.org1.example.com | 00000040 61 03 26 ae cc 43 |a.&..C| +peer0.org1.example.com | [4416 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4417 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 gate 1589998895306708900 evaluation succeeds +peer0.org1.example.com | [4418 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [4419 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [441a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org1.example.com | [441b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org1.example.com | [441c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [441d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [441e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [441f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4420 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4421 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4422 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4423 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4424 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4425 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4426 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4427 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4428 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [4429 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [442a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [442b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer0.org1.example.com | [442c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer0.org1.example.com | [442d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [442e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [442f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4430 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4431 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [4432 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4433 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4434 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4435 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4436 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4437 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [4438 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [4439 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [443a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [443b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [443c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [443d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [443e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [443f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4440 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4441 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4442 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4443 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [472b 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [472c 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [472d 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [472e 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [472f 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4730 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4731 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc9a0 gate 1589998896088039900 evaluation starts +peer0.org2.example.com | [4732 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc9a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4733 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc9a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4734 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4735 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc9a0 principal evaluation fails +peer0.org2.example.com | [4736 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc9a0 gate 1589998896088039900 evaluation fails +peer0.org2.example.com | [4737 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4738 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4739 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [473a 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [473b 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [473d 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [473e 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [473f 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [473c 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4740 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [4741 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [4742 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fdf20 gate 1589998896095962200 evaluation starts +peer0.org2.example.com | [4745 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fdf20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4746 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fdf20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4747 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fdf20 principal matched by identity 0 +peer0.org2.example.com | [4748 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4749 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [474a 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fdf20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [474b 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fdf20 gate 1589998896095962200 evaluation succeeds +peer0.org2.example.com | [474c 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0049f6820, READY +peer0.org2.example.com | [474d 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [474e 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [474f 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4750 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4752 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4753 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4754 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4755 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4756 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4757 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4758 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44c20 gate 1589998896107751800 evaluation starts +peer0.org2.example.com | [4759 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44c20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [475a 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44c20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [475b 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [475c 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44c20 principal evaluation fails +peer0.org2.example.com | [475d 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a44c20 gate 1589998896107751800 evaluation fails +peer0.org2.example.com | [475e 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [475f 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4760 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4761 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45190 gate 1589998896109057900 evaluation starts +peer0.org2.example.com | [4762 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4763 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45190 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4764 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45190 principal matched by identity 0 +peer0.org2.example.com | [4765 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4766 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4767 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45190 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4768 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a45190 gate 1589998896109057900 evaluation succeeds +peer0.org2.example.com | [4769 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [476a 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [476b 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [476c 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [476d 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [476e 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [476f 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4770 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4751 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4771 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [4772 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [4773 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4774 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [4777 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 19 dc 05 84 4f 64 8c 88 14 c6 |0E.!......Od....| +peer0.org2.example.com | 00000010 80 dd 25 f8 c1 d8 72 c5 86 a2 3a 0b 02 b8 bd ef |..%...r...:.....| +peer0.org2.example.com | 00000020 87 f1 74 54 5a 02 20 55 22 da 16 95 8a 00 c3 60 |..tTZ. U"......`| +peer0.org2.example.com | 00000030 51 e9 fb b4 eb a7 d6 3d 99 b4 f4 5d a2 32 80 79 |Q......=...].2.y| +peer0.org2.example.com | 00000040 74 7f 51 f0 be 8d 34 |t.Q...4| +peer0.org2.example.com | [4778 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org2.example.com | [4779 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [477a 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [477b 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4743 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46cb 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004442eb0 gate 1589998909107102000 evaluation succeeds +peer1.org1.example.com | [46cc 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [46cd 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [46ce 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [46cf 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [46d0 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [46d1 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [46d2 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [46d3 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [46d4 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [46d5 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46d6 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46d7 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46d8 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [46d9 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [46da 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46db 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [46dc 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [46dd 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [46de 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [46df 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [46e0 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46e1 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46e2 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46e3 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [46c5 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bade0 principal matched by identity 0 +peer1.org2.example.com | [46c6 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [469d 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46c7 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [46c8 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bade0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [46c9 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bade0 gate 1589998896404793600 evaluation succeeds +peer1.org2.example.com | [46ca 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46cb 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46cc 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [46cd 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [46ce 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [46cf 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [46d0 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46d1 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46d2 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [46d3 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46d4 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46d5 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [46d6 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [46d7 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [46d8 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb5e0 gate 1589998896409798600 evaluation starts +peer1.org2.example.com | [46d9 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb5e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46da 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb5e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [46db 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [46dc 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb5e0 principal evaluation fails +peer1.org2.example.com | [46dd 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cb5e0 gate 1589998896409798600 evaluation fails +peer1.org2.example.com | [46de 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46df 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46e0 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [46e1 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbb50 gate 1589998896411051600 evaluation starts +peer1.org2.example.com | [46e2 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbb50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46e3 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbb50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [46e4 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbb50 principal matched by identity 0 +peer1.org2.example.com | [46e5 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [46e6 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [46e7 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbb50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [46e8 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cbb50 gate 1589998896411051600 evaluation succeeds +peer1.org2.example.com | [46e9 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46ea 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46eb 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [46ec 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [46ed 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [46ee 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [46ef 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46f0 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [46f1 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46f2 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46f3 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46f4 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [46f5 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46f6 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46f7 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [46f8 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [46f9 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [46fa 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eb690 gate 1589998896416228100 evaluation starts +peer1.org2.example.com | [46fb 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eb690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46fc 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eb690 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [46fd 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eb690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [46fe 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eb690 principal evaluation fails +peer0.org1.example.com | [4444 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer0.org1.example.com | [4445 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer0.org1.example.com | [4446 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4447 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4448 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer0.org1.example.com | [4449 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer0.org1.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer0.org1.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | [4744 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0049bdba0, READY +peer0.org2.example.com | [477c 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [477d 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [477e 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [477f 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4780 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4781 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4782 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab230 gate 1589998896116879200 evaluation starts +peer0.org2.example.com | [4783 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab230 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4784 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab230 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4785 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4786 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab230 principal evaluation fails +peer0.org2.example.com | [4787 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab230 gate 1589998896116879200 evaluation fails +peer0.org2.example.com | [4788 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4789 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [478a 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [478b 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab7a0 gate 1589998896118384100 evaluation starts +peer0.org2.example.com | [478c 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab7a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [478e 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab7a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [478d 05-20 18:21:36.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [478f 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [4792 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [4790 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab7a0 principal matched by identity 0 +peer0.org2.example.com | [4791 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [4793 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4794 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4795 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab7a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4796 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aab7a0 gate 1589998896118384100 evaluation succeeds +peer0.org2.example.com | [4797 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4798 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4799 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [479a 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [479b 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [479c 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [479d 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [479e 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [479f 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [47a0 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [47a1 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a994b0 gate 1589998896129470000 evaluation starts +peer0.org2.example.com | [47a2 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a994b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47a3 05-20 18:21:36.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a994b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [47a4 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a994b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [47a5 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a994b0 principal evaluation fails +peer0.org2.example.com | [47a6 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a994b0 gate 1589998896129470000 evaluation fails +peer0.org2.example.com | [47a7 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [47a8 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [47a9 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [47aa 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99a20 gate 1589998896130690100 evaluation starts +peer0.org2.example.com | [47ab 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99a20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47ac 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99a20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [47ad 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99a20 principal matched by identity 0 +peer0.org2.example.com | [47ae 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [47af 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [47b0 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99a20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [47b1 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99a20 gate 1589998896130690100 evaluation succeeds +peer0.org2.example.com | [47b2 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [47b3 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [47b4 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [47b5 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [47b6 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [47b7 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [47b8 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [47b9 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [47ba 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [47bb 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [47bc 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [47bd 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47be 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer0.org1.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [444a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [444b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [444c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [444d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [444e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [444f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [4450 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4451 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4452 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [4453 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4454 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4455 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4456 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4457 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4458 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org1.example.com | [4459 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [445a 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [445b 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [445c 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [445d 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [445e 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [445f 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [4460 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [4461 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [4462 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [4463 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [4464 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4465 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [4466 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [4467 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4468 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4469 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [446a 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [446b 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [446c 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [446d 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [446e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org1.example.com | [446f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org1.example.com | [4470 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [4471 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [4472 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [4473 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [4474 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [4475 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [4476 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer0.org1.example.com | [4477 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer0.org1.example.com | [4478 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer0.org1.example.com | [4479 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer0.org1.example.com | [447a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [447b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [447c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [447d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [447e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [447f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [4480 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [4481 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [4482 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [4483 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [4484 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [4485 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [4486 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [4487 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [4488 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [4489 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [448a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [448b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [448c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [448d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [448e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [448f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [4490 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [4491 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [4492 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4493 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [4494 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [4495 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [4496 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [4497 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [4498 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [4499 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [449a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [449b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [449c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [449d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [449e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [449f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [44a0 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [44a1 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [44a2 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [44a3 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [44a4 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [44a5 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [44a6 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [44a7 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [44a8 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [44a9 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [44aa 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [44ab 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [44ac 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [44ad 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [44ae 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [44af 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [44b0 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [46e4 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > alive: alive: alive:\255G\301\377\232\324j\032\331\207\273 \266\014\377R\205\366\002B\327y\240\354\376\323\016':\245" > +peer1.org1.example.com | [46e5 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [46e6 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46e7 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46e8 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46e9 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46ea 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46eb 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46ec 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46ed 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46ee 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [46ef 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [46f0 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [46f1 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [46f2 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46f3 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [46f4 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [46f5 05-20 18:21:49.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [46f6 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [46f7 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c7b0 gate 1589998909136091500 evaluation starts +peer1.org1.example.com | [46f8 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c7b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [46f9 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c7b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [46fa 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [46fb 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c7b0 principal evaluation fails +peer1.org1.example.com | [46fc 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c7b0 gate 1589998909136091500 evaluation fails +peer1.org1.example.com | [46fd 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [46fe 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [46ff 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4700 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445cd20 gate 1589998909139262300 evaluation starts +peer1.org1.example.com | [4701 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445cd20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4702 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445cd20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4703 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445cd20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4704 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445cd20 principal evaluation fails +peer1.org1.example.com | [4705 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445cd20 gate 1589998909139262300 evaluation fails +peer1.org1.example.com | [4706 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4707 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4708 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4709 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445d290 gate 1589998909140341800 evaluation starts +peer1.org1.example.com | [470a 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445d290 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [470b 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445d290 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [470c 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445d290 principal matched by identity 0 +peer1.org1.example.com | [470d 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 80 70 aa 7d 55 1d fd 38 8e 08 53 48 10 8a 61 |..p.}U..8..SH..a| +peer1.org1.example.com | 00000010 e3 ad e6 10 47 25 4c b1 61 4b e6 23 3d 3b 87 c3 |....G%L.aK.#=;..| +peer1.org1.example.com | [470e 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 fb 71 2b 8b 3a 90 f3 45 b4 e6 |0E.!...q+.:..E..| +peer1.org1.example.com | 00000010 c3 fe 0d 84 fa 40 cd 7e 3c bb 51 d9 f2 6b 55 82 |.....@.~<.Q..kU.| +peer1.org2.example.com | [46ff 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047eb690 gate 1589998896416228100 evaluation fails +peer1.org2.example.com | [4700 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4701 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4702 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4703 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ebc00 gate 1589998896417742300 evaluation starts +peer1.org2.example.com | [4704 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ebc00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [47bf 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adaba0 gate 1589998896134385800 evaluation starts +peer0.org2.example.com | [47c0 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adaba0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47c1 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adaba0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [47c2 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adaba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [47c3 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adaba0 principal evaluation fails +peer0.org2.example.com | [47c4 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adaba0 gate 1589998896134385800 evaluation fails +peer0.org2.example.com | [47c5 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [47c6 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [47c7 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [47c8 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb9f0 gate 1589998896136921000 evaluation starts +peer0.org2.example.com | [47c9 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb9f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47ca 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb9f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [47cb 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb9f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [47cc 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb9f0 principal evaluation fails +peer0.org2.example.com | [47cd 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adb9f0 gate 1589998896136921000 evaluation fails +peer0.org2.example.com | [47ce 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [47cf 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [47d0 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [47d1 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbf80 gate 1589998896138398200 evaluation starts +peer0.org2.example.com | [47d2 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbf80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47d3 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbf80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [47d4 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [47d5 05-20 18:21:36.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [47d6 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [47d7 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbf80 principal matched by identity 0 +peer0.org2.example.com | [47d8 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [47d9 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [47da 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbf80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [47db 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adbf80 gate 1589998896138398200 evaluation succeeds +peer0.org2.example.com | [47dc 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [47dd 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [47de 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [47df 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [47e0 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47e1 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 51 8f 6d 81 9b 02 20 51 7a 21 9d 30 4e 81 25 f9 |Q.m... Qz!.0N.%.| +peer1.org1.example.com | 00000030 3c c7 38 b5 c5 4d 90 35 cc d9 67 be 32 83 be a9 |<.8..M.5..g.2...| +peer1.org1.example.com | 00000040 bb 5d 86 86 59 0e 5c |.]..Y.\| +peer1.org1.example.com | [4710 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4711 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4712 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4713 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [470f 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445d290 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4714 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445d290 gate 1589998909140341800 evaluation succeeds +peer1.org1.example.com | [4715 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4716 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4717 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4718 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4719 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [471a 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [471b 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [471c 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [471d 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [471e 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [471f 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4720 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4721 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4722 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4723 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4724 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4725 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4726 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4727 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4728 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4729 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [472a 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [472b 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [472c 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [472d 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [472e 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [472f 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4730 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4731 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4732 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4733 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4734 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4735 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4736 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4737 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4738 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4739 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [473a 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [473b 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [473c 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [473d 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [473e 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [473f 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4740 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4741 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4742 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4743 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4744 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 08 60 40 d8 4d 09 7d ed 61 2f d1 77 df cf 5d |..`@.M.}.a/.w..]| +peer1.org1.example.com | 00000010 45 a2 fc a8 80 66 92 d4 e6 6a e3 61 8a 91 ce c5 |E....f...j.a....| +peer1.org1.example.com | [4745 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 72 05 3d b6 a2 a6 17 e8 27 31 |0E.!..r.=.....'1| +peer1.org1.example.com | 00000010 ec 3d e6 86 72 54 30 25 90 9b 24 a5 02 16 84 be |.=..rT0%..$.....| +peer1.org1.example.com | 00000020 13 f3 0b 55 5f 02 20 71 6a d1 8e bb d3 1c 5a e8 |...U_. qj.....Z.| +peer1.org1.example.com | 00000030 6d cf 5f 7f 64 14 e0 0f e0 b3 79 eb 43 40 ef 96 |m._.d.....y.C@..| +peer1.org1.example.com | 00000040 1c 5e 91 37 38 06 6b |.^.78.k| +peer1.org1.example.com | [4746 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4747 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [4748 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4749 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [474a 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [474b 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [474c 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [474d 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [474e 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [474f 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4750 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4751 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4752 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4753 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4754 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4755 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4756 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4757 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47e2 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org2.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org2.example.com | [47e3 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org2.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org2.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org2.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org2.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org2.example.com | [47e4 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47e5 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47e6 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [47e7 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [47e8 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [47e9 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [47ea 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [47eb 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [47ec 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afdca0 gate 1589998896141804400 evaluation starts +peer0.org2.example.com | [47ed 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afdca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47ee 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afdca0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [47ef 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [47f7 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47f8 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [47f9 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47fa 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [47fb 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47fc 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [47fd 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [47fe 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [47ff 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4800 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4801 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4802 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1d4a0 gate 1589998896144026700 evaluation starts +peer0.org2.example.com | [4803 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1d4a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4804 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1d4a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4805 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1d4a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4806 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1d4a0 principal evaluation fails +peer0.org2.example.com | [4807 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1d4a0 gate 1589998896144026700 evaluation fails +peer0.org2.example.com | [4808 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4809 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [480a 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [480b 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1da10 gate 1589998896145277700 evaluation starts +peer0.org2.example.com | [480c 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1da10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [480d 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1da10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [480e 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1da10 principal matched by identity 0 +peer0.org2.example.com | [480f 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [4810 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d1 6a ad 72 08 36 14 06 5a 0d 4b |0D. w.j.r.6..Z.K| +peer0.org2.example.com | 00000010 ff 3e 25 aa f1 13 c6 c5 40 dd ff b1 90 1d 4c 32 |.>%.....@.....L2| +peer0.org2.example.com | 00000020 97 b7 ba b4 02 20 0e 25 87 22 db c1 6e 28 b1 eb |..... .%."..n(..| +peer0.org2.example.com | 00000030 92 0b 1b e8 41 e8 98 c0 89 9c e4 16 42 62 4a a7 |....A.......BbJ.| +peer0.org2.example.com | 00000040 ae 4d fb 18 62 13 |.M..b.| +peer0.org2.example.com | [4811 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1da10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4812 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b1da10 gate 1589998896145277700 evaluation succeeds +peer0.org2.example.com | [4813 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4814 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4815 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4816 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4817 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org2.example.com | [4818 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4819 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [481a 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [481b 05-20 18:21:36.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16210 gate 1589998896142071500 evaluation starts +peer0.org2.example.com | [481c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [481d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16210 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [481e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16210 principal matched by identity 0 +peer0.org2.example.com | [481f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org2.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org2.example.com | [4820 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org2.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org2.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org2.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org2.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org2.example.com | [4821 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16210 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4822 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16210 gate 1589998896142071500 evaluation succeeds +peer0.org2.example.com | [4823 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4824 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4825 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4826 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4827 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4828 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4829 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [482a 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [482b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [482c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [482d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [482e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [482f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4830 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4831 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b17b00 gate 1589998896158648500 evaluation starts +peer0.org2.example.com | [4832 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b17b00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4833 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b17b00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4834 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b17b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4835 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b17b00 principal evaluation fails +peer0.org2.example.com | [4836 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b17b00 gate 1589998896158648500 evaluation fails +peer0.org2.example.com | [4837 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4838 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4839 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [483a 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b50070 gate 1589998896160949000 evaluation starts +peer0.org2.example.com | [483b 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b50070 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [483c 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b50070 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [483d 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b50070 principal matched by identity 0 +peer0.org2.example.com | [483e 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4840 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4841 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [483f 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4842 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b50070 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4843 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b50070 gate 1589998896160949000 evaluation succeeds +peer1.org2.example.com | [4705 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ebc00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4706 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ebc00 principal matched by identity 0 +peer1.org2.example.com | [4707 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4708 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4709 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ebc00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [470a 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ebc00 gate 1589998896417742300 evaluation succeeds +peer1.org2.example.com | [470b 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [470c 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [470d 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [470e 05-20 18:21:36.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [470f 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4710 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4711 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4712 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4713 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4714 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4715 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4716 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4717 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4718 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4719 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fd4f0 gate 1589998896422429700 evaluation starts +peer1.org2.example.com | [471a 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fd4f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [471b 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fd4f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [471c 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fd4f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [471d 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fd4f0 principal evaluation fails +peer1.org2.example.com | [471e 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fd4f0 gate 1589998896422429700 evaluation fails +peer1.org2.example.com | [471f 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4720 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4721 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4722 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fda60 gate 1589998896424195400 evaluation starts +peer1.org2.example.com | [4723 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fda60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4724 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fda60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4725 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fda60 principal matched by identity 0 +peer1.org1.example.com | [4758 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4759 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [475a 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [475b 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [475c 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [475d 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [475e 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [475f 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4760 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer1.org1.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer1.org1.example.com | [4761 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer1.org1.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer1.org1.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer1.org1.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer1.org1.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer1.org1.example.com | [4762 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4763 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4764 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [4765 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 38 5f c7 30 5b da ef 5c ef 94 |0E.!..8_.0[..\..| +peer1.org1.example.com | 00000010 fa 3a 3c a1 45 a8 84 89 12 c1 76 ed 60 c9 b5 43 |.:<.E.....v.`..C| +peer1.org1.example.com | 00000020 69 51 21 c9 7e 02 20 0d b8 7c 38 68 0f c8 da c6 |iQ!.~. ..|8h....| +peer1.org1.example.com | 00000030 d4 c0 6a 33 af 5b f3 7c e2 a1 a4 c3 54 7f fd 00 |..j3.[.|....T...| +peer1.org1.example.com | 00000040 c1 4d d9 46 03 28 54 |.M.F.(T| +peer1.org1.example.com | [4766 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [4767 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [4768 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4844 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4845 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4846 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4847 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4848 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4849 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [484a 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [484b 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [484c 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [484d 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [484e 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [484f 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4850 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4851 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4852 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4853 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b514c0 gate 1589998896165623800 evaluation starts +peer0.org2.example.com | [4854 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b514c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4855 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b514c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4856 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b514c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4857 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b514c0 principal evaluation fails +peer0.org2.example.com | [4858 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b514c0 gate 1589998896165623800 evaluation fails +peer0.org2.example.com | [4859 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [485a 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [485b 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [485c 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b51a30 gate 1589998896167875100 evaluation starts +peer0.org2.example.com | [485d 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b51a30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [485e 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b51a30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [485f 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b51a30 principal matched by identity 0 +peer0.org2.example.com | [4860 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4861 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4862 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b51a30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4863 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b51a30 gate 1589998896167875100 evaluation succeeds +peer0.org2.example.com | [4864 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4865 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4866 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4867 05-20 18:21:36.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4868 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4869 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [486a 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [486b 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44b1 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [44b2 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [44b3 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [44b4 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [44b5 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [44b6 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [44b7 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [44b8 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [44b9 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [44ba 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [44bb 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [44bc 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [44bd 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [44be 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [44bf 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [44c0 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [44c1 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [44c2 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [44c3 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [44c4 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [44c5 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [44c6 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [44c7 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org1.example.com | [44c8 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [44c9 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [44ca 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [44cb 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [44cc 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [44cd 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.375Z grpc.peer_address=172.18.0.5:34348 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=120.4µs +peer0.org1.example.com | [44ce 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [44cf 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [44d0 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [44d1 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:34348 +peer0.org1.example.com | [44d2 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34348 +peer0.org1.example.com | [44d4 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44d5 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [44d3 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [44d7 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [44d6 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44d8 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [44d9 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [44da 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [44db 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [44dc 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [44de 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44dd 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [44df 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [486c 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [486d 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [486e 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [486f 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4870 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4871 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4872 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75320 gate 1589998896172627400 evaluation starts +peer0.org2.example.com | [4873 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75320 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4874 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75320 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4875 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4876 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75320 principal evaluation fails +peer0.org2.example.com | [4877 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75320 gate 1589998896172627400 evaluation fails +peer0.org2.example.com | [4878 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4879 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [487a 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [487b 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75890 gate 1589998896174459000 evaluation starts +peer0.org2.example.com | [487c 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [487d 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75890 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [487e 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75890 principal matched by identity 0 +peer0.org2.example.com | [487f 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4880 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4881 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4882 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b75890 gate 1589998896174459000 evaluation succeeds +peer0.org2.example.com | [4883 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4884 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4885 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4886 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4887 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [4888 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [4889 05-20 18:21:36.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [488a 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [488b 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [488c 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [488d 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [488e 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [488f 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4890 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4891 05-20 18:21:36.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4892 05-20 18:21:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4893 05-20 18:21:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4894 05-20 18:21:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4895 05-20 18:21:36.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4896 05-20 18:21:36.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4897 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4898 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4899 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [489a 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [489b 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [489c 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [489d 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [489e 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [489f 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48a0 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [48a1 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48a2 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [48a3 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [48a4 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48a5 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [48a6 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [48a7 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [48a8 05-20 18:21:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48a9 05-20 18:21:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [48aa 05-20 18:21:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [48ab 05-20 18:21:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [48ac 05-20 18:21:36.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48ad 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [48ae 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [48af 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48b0 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48b1 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48b2 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48b3 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48b4 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48b5 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [48b6 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48b7 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [48b8 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161040 +peer0.org2.example.com | [48b9 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EC3C07F627A6D37B0A6B813B333563BE494C7245CBAABD8EF6A9484BC04C4C3C +peer0.org2.example.com | [48ba 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [48bb 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [48bc 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [48bd 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [48be 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48bf 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [48c0 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48c1 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [48c2 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [48c3 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48c5 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [48c6 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48c4 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [48c7 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48c8 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [44e1 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [44e2 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44e3 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44e4 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [44e5 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [44e6 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [44e0 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [44e7 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 gate 1589998895398067100 evaluation starts +peer0.org1.example.com | [44e9 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44e8 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [44ea 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [44ec 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer0.org1.example.com | [44ed 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [44ee 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org1.example.com | [44ef 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [44f0 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44f1 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44f2 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [44f3 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [44f4 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [44f5 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.401Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=577.6µs +peer0.org1.example.com | [44f6 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 gate 1589998895403264400 evaluation starts +peer0.org1.example.com | [44f7 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44f8 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [44f9 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [44fa 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 principal evaluation fails +peer0.org1.example.com | [44eb 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [44fc 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 principal matched by identity 0 +peer0.org1.example.com | [44fd 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [44fe 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc e8 90 f4 57 00 d9 e0 1b 08 5a |0E.!.....W.....Z| +peer0.org1.example.com | 00000010 23 42 af e5 0a 83 42 1a fe 37 73 aa 46 14 40 eb |#B....B..7s.F.@.| +peer0.org1.example.com | 00000020 c7 1e 93 66 a8 02 20 5a f5 91 e3 40 ba 06 a3 14 |...f.. Z...@....| +peer0.org1.example.com | 00000030 7c 11 74 80 06 7f 34 ab 57 cc 49 45 33 6b 49 8e ||.t...4.W.IE3kI.| +peer0.org1.example.com | 00000040 d7 04 1e 66 f3 b5 a9 |...f...| +peer0.org1.example.com | [44ff 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4500 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 gate 1589998895398067100 evaluation succeeds +peer0.org1.example.com | [4501 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4502 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4503 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4504 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4505 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34348 +peer0.org1.example.com | [4506 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34348 +peer0.org1.example.com | [44fb 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 gate 1589998895403264400 evaluation fails +peer0.org1.example.com | [4507 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4508 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4509 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [450a 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [450b 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [450c 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 gate 1589998895414067400 evaluation starts +peer0.org1.example.com | [450e 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [450d 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer0.org1.example.com | [450f 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4510 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 principal matched by identity 0 +peer0.org1.example.com | [4511 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [4512 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org2.example.com | [48c9 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [48ca 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48cb 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [48cc 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [48cd 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer0.org2.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer0.org2.example.com | [48ce 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer0.org2.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer0.org2.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer0.org2.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer0.org2.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer0.org2.example.com | [48cf 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [48d0 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc ab 26 46 a5 e2 d8 d4 e2 d3 bb |0E.!...&F.......| +peer0.org2.example.com | 00000010 5c 5e 49 72 0a 67 c0 53 16 3b f0 21 0e 02 81 45 |\^Ir.g.S.;.!...E| +peer0.org2.example.com | 00000020 f8 5b e8 61 ac 02 20 2e 46 3a 18 52 f4 6f ef 30 |.[.a.. .F:.R.o.0| +peer0.org2.example.com | 00000030 ba aa 21 7a 21 da 2d 17 9f d1 4d 89 2e b9 3f c6 |..!z!.-...M...?.| +peer0.org2.example.com | 00000040 3d 49 f1 84 00 19 2c |=I....,| +peer0.org2.example.com | [48d1 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [48d2 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [48d3 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48d4 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48d5 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [48d6 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [48d7 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48d8 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [48d9 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [48da 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer0.org2.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer0.org2.example.com | [48db 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer0.org2.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer0.org2.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer0.org2.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer0.org2.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer0.org2.example.com | [48dc 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [48dd 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [48de 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48df 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48e0 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [48e1 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48e2 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [48e3 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [48e4 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer0.org2.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer0.org2.example.com | [48e5 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer0.org2.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer0.org2.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer0.org2.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer0.org2.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer0.org2.example.com | [48e6 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [48e7 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [48e8 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48e9 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [48ea 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +peer0.org2.example.com | 00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +peer0.org2.example.com | [48eb 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +peer0.org2.example.com | 00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +peer0.org2.example.com | 00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +peer0.org2.example.com | 00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +peer0.org2.example.com | 00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +peer0.org2.example.com | [48ec 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [48ed 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48ee 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [48ef 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48f0 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [48f1 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [48f2 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [48f3 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [48f4 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [48f5 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [48f6 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c264c0 gate 1589998896949581500 evaluation starts +peer0.org2.example.com | [48f7 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c264c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [48f8 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c264c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [48f9 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c264c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [48fa 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c264c0 principal evaluation fails +peer0.org2.example.com | [48fb 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c264c0 gate 1589998896949581500 evaluation fails +peer0.org2.example.com | [48fc 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [48fd 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [48fe 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [48ff 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26a30 gate 1589998896951902900 evaluation starts +peer0.org2.example.com | [4900 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26a30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4901 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26a30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4902 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26a30 principal matched by identity 0 +peer0.org2.example.com | [4903 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +peer0.org2.example.com | 00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +peer1.org1.example.com | [4769 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [476a 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [476b 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [476c 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [476d 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [476e 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [476f 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4770 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4771 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\255G\301\377\232\324j\032\331\207\273 \266\014\377R\205\366\002B\327y\240\354\376\323\016':\245" > +peer1.org1.example.com | [4772 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [4773 05-20 18:21:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4774 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4776 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4777 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [4778 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4779 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [477a 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [477b 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [477c 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [477d 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [477e 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [477f 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045022d0 gate 1589998909375994100 evaluation starts +peer1.org1.example.com | [4780 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045022d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4781 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045022d0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4782 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045022d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org2.example.com | [4726 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4727 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4728 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fda60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4729 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047fda60 gate 1589998896424195400 evaluation succeeds +peer1.org2.example.com | [472a 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [472b 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [472c 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [472d 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [472e 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [472f 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4730 05-20 18:21:36.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4731 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4732 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4733 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4734 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4735 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4736 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4737 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4738 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4739 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [473a 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [473b 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [473c 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [473d 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [473e 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [473f 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4904 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +peer0.org2.example.com | 00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +peer1.org1.example.com | [4783 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045022d0 principal evaluation fails +peer1.org1.example.com | [4784 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045022d0 gate 1589998909375994100 evaluation fails +peer1.org1.example.com | [4785 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4786 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4787 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4788 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502840 gate 1589998909376594600 evaluation starts +peer1.org1.example.com | [4789 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502840 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [478a 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502840 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [478b 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [478c 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502840 principal evaluation fails +peer1.org1.example.com | [478d 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502840 gate 1589998909376594600 evaluation fails +peer1.org1.example.com | [478e 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [478f 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4790 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4791 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502db0 gate 1589998909379652500 evaluation starts +peer1.org1.example.com | [4792 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502db0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4793 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502db0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4794 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502db0 principal matched by identity 0 +peer1.org1.example.com | [4795 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer1.org1.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer1.org1.example.com | [4796 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer1.org1.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer1.org1.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer1.org1.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer1.org1.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer1.org1.example.com | [4797 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502db0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4798 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502db0 gate 1589998909379652500 evaluation succeeds +peer1.org1.example.com | [4799 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [479a 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [479b 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [479c 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [479d 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [479e 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [479f 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [47a0 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [47a1 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [47a2 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47a3 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47a4 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [4775 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [47a5 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47a6 05-20 18:21:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47a7 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47a8 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47a9 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47aa 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [4514 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4513 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4515 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 gate 1589998895414067400 evaluation succeeds +peer0.org1.example.com | [4516 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4517 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4518 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [451a 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [451b 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [451c 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [451d 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [451e 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [451f 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4520 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4521 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 gate 1589998895426137000 evaluation starts +peer0.org1.example.com | [4522 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4523 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4524 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 principal matched by identity 0 +peer0.org1.example.com | [4525 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [4526 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [4527 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4528 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 gate 1589998895426137000 evaluation succeeds +peer0.org1.example.com | [4529 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [452a 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [452b 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [452c 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4519 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [452d 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [452e 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:34150 +peer0.org1.example.com | [452f 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4530 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4531 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4533 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4532 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:34150 +peer0.org1.example.com | [4535 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4536 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4534 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.442Z grpc.peer_address=172.18.0.8:58136 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.1µs +peer0.org1.example.com | [4537 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4538 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 gate 1589998895444882600 evaluation starts +peer0.org1.example.com | [4539 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [453a 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [453b 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 principal matched by identity 0 +peer0.org1.example.com | [453c 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [453d 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [453e 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [453f 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4540 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 gate 1589998895444882600 evaluation succeeds +peer0.org1.example.com | [4541 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4542 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4543 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4544 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4547 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4545 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4546 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17654572624681692194 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [4548 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org1.example.com | [4549 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:17654572624681692194 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [454b 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [454c 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17654572624681692194 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [454d 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [454e 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [454f 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4550 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4551 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4552 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4553 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4554 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4555 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 gate 1589998895470006700 evaluation starts +peer0.org1.example.com | [4556 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [454a 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [4557 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [455c 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 principal matched by identity 0 +peer0.org1.example.com | [455d 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +peer0.org1.example.com | 00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +peer0.org1.example.com | [455e 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +peer0.org1.example.com | 00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +peer0.org1.example.com | 00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +peer0.org1.example.com | 00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +peer0.org1.example.com | 00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +peer0.org1.example.com | [455f 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4558 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org1.example.com | [4559 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [455a 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34348 disconnected +peer0.org1.example.com | [455b 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4560 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 gate 1589998895470006700 evaluation succeeds +peer0.org1.example.com | [4561 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [4562 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.378Z grpc.peer_address=172.18.0.5:34348 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=104.7331ms +peer0.org1.example.com | [4563 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [4564 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4565 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [4566 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4567 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4568 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [456a 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [456b 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [456c 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [456d 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [456e 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [456f 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4570 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4571 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4572 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4573 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [47ab 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\255G\301\377\232\324j\032\331\207\273 \266\014\377R\205\366\002B\327y\240\354\376\323\016':\245" > +peer1.org1.example.com | [47ac 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [47ad 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47ae 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [47af 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47b0 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [47b1 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47b2 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [47b3 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47b4 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [47b5 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47b6 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [47b7 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 1b 2b 9f 8e 03 95 a5 1a 4c 26 3d e3 70 b5 e9 |Z.+......L&=.p..| +peer1.org1.example.com | 00000010 2d 28 02 ed 7d 7c eb 34 6e bd 7d da 14 15 d1 7d |-(..}|.4n.}....}| +peer1.org1.example.com | [47b8 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 19 99 ab ef 06 78 85 1f 15 7f 33 |0D. ......x....3| +peer1.org1.example.com | 00000010 21 c3 15 69 04 12 73 3b a6 90 f4 e5 62 3e 42 72 |!..i..s;....b>Br| +peer1.org1.example.com | 00000020 9a c4 1b a2 02 20 07 61 b3 f7 22 ba ee 9e 21 bd |..... .a.."...!.| +peer1.org1.example.com | 00000030 01 53 43 fc 74 a2 a6 60 cb 11 45 a4 7b 45 0c fb |.SC.t..`..E.{E..| +peer1.org1.example.com | 00000040 a8 b6 c2 33 21 51 |...3!Q| +peer1.org1.example.com | [47b9 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47ba 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47bb 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47bc 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [47bd 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [47be 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47bf 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47c0 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47c1 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [47c2 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [47c3 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 2 1 3 4 5] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [47c4 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47c5 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47c6 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47c7 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [47c8 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [47c9 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47ca 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4740 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4741 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4742 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4743 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4744 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4745 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4746 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481bd80 gate 1589998896632423600 evaluation starts +peer1.org2.example.com | [4747 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481bd80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4748 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481bd80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4749 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481bd80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [474a 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481bd80 principal evaluation fails +peer1.org2.example.com | [474b 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481bd80 gate 1589998896632423600 evaluation fails +peer1.org2.example.com | [474c 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [474d 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [474e 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [474f 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048362f0 gate 1589998896634203100 evaluation starts +peer1.org2.example.com | [4750 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048362f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4751 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048362f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4752 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048362f0 principal matched by identity 0 +peer1.org2.example.com | [4753 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +peer1.org2.example.com | 00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +peer1.org2.example.com | [4754 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +peer1.org2.example.com | 00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +peer1.org2.example.com | 00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +peer1.org2.example.com | 00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +peer1.org2.example.com | 00000040 e0 0a 77 e4 aa d8 81 |..w....| +peer1.org2.example.com | [4755 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048362f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4756 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048362f0 gate 1589998896634203100 evaluation succeeds +peer1.org2.example.com | [4757 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4758 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4759 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [475a 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [475b 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [475c 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [475d 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [475e 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [475f 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4760 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4761 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4762 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4763 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [4764 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4765 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4766 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4767 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +peer0.org2.example.com | 00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +peer0.org2.example.com | 00000040 e0 0a 77 e4 aa d8 81 |..w....| +peer0.org2.example.com | [4905 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26a30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4906 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26a30 gate 1589998896951902900 evaluation succeeds +peer0.org2.example.com | [4907 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4908 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4909 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [490a 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [490b 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [490c 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [490d 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [490e 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [490f 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4910 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4911 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4912 05-20 18:21:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4913 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4914 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4915 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4916 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4917 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4918 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4919 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [491a 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [491b 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [491c 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [491d 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [47cb 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47cc 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [47cd 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [47ce 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [47cf 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47d0 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47d1 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47d2 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [47d3 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [47d4 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [47d5 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [47d6 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [47d7 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [47d8 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454a8b0 gate 1589998911811450000 evaluation starts +peer1.org1.example.com | [47d9 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454a8b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [47da 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454a8b0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [47db 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454a8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [47dc 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454a8b0 principal evaluation fails +peer1.org1.example.com | [47dd 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454a8b0 gate 1589998911811450000 evaluation fails +peer1.org1.example.com | [47de 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [47df 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [47e0 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [47e1 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ae20 gate 1589998911812172200 evaluation starts +peer1.org1.example.com | [47e2 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ae20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [47e3 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ae20 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [47e4 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ae20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [47e5 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ae20 principal evaluation fails +peer1.org1.example.com | [47e6 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454ae20 gate 1589998911812172200 evaluation fails +peer1.org1.example.com | [47e7 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [47e8 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [47e9 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [47ea 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454b390 gate 1589998911812566700 evaluation starts +peer1.org1.example.com | [47eb 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454b390 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [47ec 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454b390 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [47ed 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454b390 principal matched by identity 0 +peer1.org1.example.com | [47ee 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [47ef 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | [4574 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4575 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4576 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4569 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org1.example.com | [4577 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [4578 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 17654572624681692194, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4579 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [457a 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17654572624681692194, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [457b 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [457c 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [457d 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [457e 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [457f 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [4580 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [4581 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d876c0, CONNECTING +peer0.org2.example.com | [491e 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3e560 gate 1589998897030600300 evaluation starts +peer0.org2.example.com | [491f 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3e560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4920 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3e560 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4921 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3e560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4922 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3e560 principal evaluation fails +peer0.org2.example.com | [4923 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3e560 gate 1589998897030600300 evaluation fails +peer0.org2.example.com | [4924 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4925 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4926 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4927 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ead0 gate 1589998897031941100 evaluation starts +peer0.org2.example.com | [4928 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ead0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4929 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ead0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [492a 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ead0 principal matched by identity 0 +peer0.org2.example.com | [492b 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +peer0.org2.example.com | 00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +peer0.org2.example.com | [492c 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +peer0.org2.example.com | 00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +peer0.org2.example.com | 00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +peer0.org2.example.com | 00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +peer0.org2.example.com | 00000040 3e f4 2e 1b 42 26 |>...B&| +peer0.org2.example.com | [492d 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ead0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [492e 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ead0 gate 1589998897031941100 evaluation succeeds +peer0.org2.example.com | [492f 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4930 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4931 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4932 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4933 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4934 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4935 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4936 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4937 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4938 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4939 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [493a 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [493b 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [493c 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [493d 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [493e 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [493f 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4940 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4941 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4942 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\364.\033B&" > alive: +peer0.org2.example.com | [4943 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4944 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4945 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4946 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [4947 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4948 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4949 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [494a 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [494b 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [494c 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [494d 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 11 3f d7 a4 00 f7 4e 9d cb af d7 2f c5 f6 25 |..?....N..../..%| +peer0.org2.example.com | 00000010 71 2b c5 89 c1 36 c3 82 83 b7 2a 73 6f 30 42 92 |q+...6....*so0B.| +peer0.org2.example.com | [494e 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 fc 7c ce 9e 88 61 08 c3 5d ce |0E.!...|...a..].| +peer0.org2.example.com | 00000010 26 19 a5 e3 4e e9 73 09 8a d5 6e 0c 40 76 d0 6c |&...N.s...n.@v.l| +peer0.org2.example.com | 00000020 2b fd b8 c5 c3 02 20 27 09 ea e2 44 a2 e8 55 5a |+..... '...D..UZ| +peer0.org2.example.com | 00000030 e1 29 e0 aa 3d bf eb b8 9a 06 bf aa 2a de 1e ec |.)..=.......*...| +peer0.org2.example.com | 00000040 a1 18 53 1f 04 82 f0 |..S....| +peer0.org2.example.com | [494f 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [4950 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 57 bd 65 26 a1 ba dc 29 73 6c 0c |0D. .W.e&...)sl.| +peer0.org2.example.com | 00000010 fa 1e 4b aa e5 8d 25 e2 7d f8 16 61 15 94 4b 14 |..K...%.}..a..K.| +peer0.org2.example.com | 00000020 12 61 8c 4d 02 20 4b cc 1f a6 b7 e0 eb 59 65 c8 |.a.M. K......Ye.| +peer0.org2.example.com | 00000030 e1 2b 95 c9 d7 0f d6 38 a9 84 89 c7 f6 87 f5 18 |.+.....8........| +peer0.org2.example.com | 00000040 c1 3f 55 79 ff 60 |.?Uy.`| +peer0.org2.example.com | [4951 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4952 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [4953 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4954 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4955 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4956 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4957 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4958 05-20 18:21:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4959 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [495a 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [495b 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [495c 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [495d 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [495e 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [495f 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [4960 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4961 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4962 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4963 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4964 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4965 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4966 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4967 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4968 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4969 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [496a 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [496b 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [496c 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78de0 gate 1589998898343572300 evaluation starts +peer0.org2.example.com | [496d 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78de0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [496e 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78de0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [496f 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4970 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78de0 principal evaluation fails +peer0.org2.example.com | [4971 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78de0 gate 1589998898343572300 evaluation fails +peer0.org2.example.com | [4972 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4973 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4974 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4975 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4976 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79350 gate 1589998898346765300 evaluation starts +peer0.org2.example.com | [4977 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4978 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79350 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4979 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79350 principal matched by identity 0 +peer0.org2.example.com | [497a 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 82 51 e7 cf 80 b5 56 b9 3f d3 c0 21 8d 63 fe |..Q....V.?..!.c.| +peer0.org2.example.com | 00000010 ff 95 75 d0 7b 64 8d 53 28 22 d8 43 c2 aa 00 8f |..u.{d.S(".C....| +peer0.org2.example.com | [497b 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 b2 c5 04 0c 4f dc 56 0c bc 68 |0E.!......O.V..h| +peer0.org2.example.com | 00000010 e2 d2 89 56 cb 33 e7 aa a4 7d 85 b2 ce 03 fc fd |...V.3...}......| +peer0.org2.example.com | 00000020 b2 9b fb b1 e5 02 20 26 1e 92 c1 a0 4e d2 4b f5 |...... &....N.K.| +peer0.org2.example.com | 00000030 7a 10 59 3e 14 33 ba e6 57 56 65 50 04 a1 c4 2e |z.Y>.3..WVeP....| +peer0.org2.example.com | 00000040 19 ba 80 f9 b6 25 dc |.....%.| +peer0.org2.example.com | [497c 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79350 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [497d 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c79350 gate 1589998898346765300 evaluation succeeds +peer0.org2.example.com | [497e 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [497f 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4980 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4981 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4982 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [47f0 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454b390 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [47f2 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454b390 gate 1589998911812566700 evaluation succeeds +peer1.org1.example.com | [47f3 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [47f4 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [47f1 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [47f5 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [47f6 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [47f7 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [47f8 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [47f9 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [47fa 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [47fb 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47fc 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47fd 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [47fe 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [47ff 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4800 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4801 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4802 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4803 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045613a0 gate 1589998911821976500 evaluation starts +peer1.org1.example.com | [4804 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045613a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4805 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045613a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4806 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045613a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4807 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045613a0 principal evaluation fails +peer1.org1.example.com | [4808 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045613a0 gate 1589998911821976500 evaluation fails +peer1.org1.example.com | [4809 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [480a 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [480b 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [480c 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561910 gate 1589998911822296700 evaluation starts +peer1.org1.example.com | [480d 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561910 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [480e 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561910 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [480f 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4810 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561910 principal evaluation fails +peer1.org1.example.com | [4811 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561910 gate 1589998911822296700 evaluation fails +peer1.org1.example.com | [4812 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4813 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4814 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4815 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561e80 gate 1589998911823061600 evaluation starts +peer1.org1.example.com | [4816 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561e80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4817 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561e80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4818 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561e80 principal matched by identity 0 +peer1.org1.example.com | [4819 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [481a 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [481b 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561e80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [481c 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004561e80 gate 1589998911823061600 evaluation succeeds +peer1.org1.example.com | [481d 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [481e 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [481f 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4820 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4821 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4822 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [4823 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [4824 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [4825 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4826 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4827 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4828 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4829 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [482a 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [482b 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [482c 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [482d 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d910 gate 1589998911829572000 evaluation starts +peer1.org1.example.com | [482e 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d910 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [482f 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d910 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4830 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4831 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d910 principal evaluation fails +peer1.org1.example.com | [4832 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d910 gate 1589998911829572000 evaluation fails +peer1.org1.example.com | [4833 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4834 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4835 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4836 05-20 18:21:51.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457de80 gate 1589998911829971300 evaluation starts +peer1.org1.example.com | [4837 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457de80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4838 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457de80 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4839 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457de80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [483a 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457de80 principal evaluation fails +peer1.org1.example.com | [483b 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457de80 gate 1589998911829971300 evaluation fails +peer1.org1.example.com | [483c 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [483d 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [483e 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [483f 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c3f0 gate 1589998911830308100 evaluation starts +peer1.org1.example.com | [4840 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c3f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4841 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c3f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4842 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c3f0 principal matched by identity 0 +peer1.org1.example.com | [4843 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [4844 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [4845 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c3f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4846 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c3f0 gate 1589998911830308100 evaluation succeeds +peer1.org2.example.com | [4768 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: dead: +peer1.org2.example.com | [4769 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [476a 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [476b 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [476c 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [476d 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [476e 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [476f 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4770 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4771 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4772 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4773 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4774 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4775 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4776 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4777 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [4778 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4779 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [477a 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [477b 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [477c 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [477d 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [477e 05-20 18:21:36.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [477f 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer1.org2.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer1.org2.example.com | [4780 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer1.org2.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer1.org2.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer1.org2.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer1.org2.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer1.org2.example.com | [4781 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [4782 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc ab 26 46 a5 e2 d8 d4 e2 d3 bb |0E.!...&F.......| +peer1.org2.example.com | 00000010 5c 5e 49 72 0a 67 c0 53 16 3b f0 21 0e 02 81 45 |\^Ir.g.S.;.!...E| +peer1.org2.example.com | 00000020 f8 5b e8 61 ac 02 20 2e 46 3a 18 52 f4 6f ef 30 |.[.a.. .F:.R.o.0| +peer1.org2.example.com | 00000030 ba aa 21 7a 21 da 2d 17 9f d1 4d 89 2e b9 3f c6 |..!z!.-...M...?.| +peer1.org2.example.com | 00000040 3d 49 f1 84 00 19 2c |=I....,| +peer1.org2.example.com | [4783 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [4784 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes t: {1589998788646755100 64 {} [] 0} +peer1.org2.example.com | [4785 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4786 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4787 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4788 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [4789 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [478a 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [478b 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [478d 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [478e 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [478c 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [478f 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4790 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4791 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4792 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4793 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4794 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4795 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4796 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4797 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4798 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4799 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [479a 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048868d0 gate 1589998897014838600 evaluation starts +peer1.org2.example.com | [479b 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048868d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [479c 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048868d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [479d 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048868d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [479e 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048868d0 principal evaluation fails +peer1.org2.example.com | [479f 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048868d0 gate 1589998897014838600 evaluation fails +peer1.org2.example.com | [47a0 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [47a1 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [47a2 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [47a3 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004886e40 gate 1589998897016540300 evaluation starts +peer1.org2.example.com | [47a4 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004886e40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [47a5 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004886e40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [47a6 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004886e40 principal matched by identity 0 +peer1.org2.example.com | [47a7 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +peer1.org2.example.com | 00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +peer1.org2.example.com | [47a8 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +peer1.org2.example.com | 00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +peer1.org2.example.com | 00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +peer1.org2.example.com | 00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +peer1.org2.example.com | 00000040 3e f4 2e 1b 42 26 |>...B&| +peer1.org2.example.com | [47a9 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004886e40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [47aa 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004886e40 gate 1589998897016540300 evaluation succeeds +peer1.org2.example.com | [47ab 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [47ac 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [47ad 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [47ae 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [47af 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [47b0 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [47b1 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [47b2 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [47b3 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [47b4 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47b5 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47b6 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47b7 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [47b8 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47b9 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47ba 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47bb 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47bd 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [47be 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4582 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4583 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4584 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [4585 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [4586 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4587 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:58136 +peer0.org1.example.com | [4588 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:58136 +peer0.org1.example.com | [4589 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [458a 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [458b 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [458c 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [458d 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd a9 08 66 c5 36 b5 3b 9e f5 a4 |0E.!....f.6.;...| +peer0.org1.example.com | 00000010 3f c7 f0 4a 35 0f d9 0e 8d 8a 44 cc d4 ea 8d ab |?..J5.....D.....| +peer0.org1.example.com | 00000020 75 2c 62 a6 36 02 20 20 2e 77 e7 8a 70 71 47 5e |u,b.6. .w..pqG^| +peer0.org1.example.com | 00000030 80 c9 2f 49 9f a8 4a 15 98 79 19 fb b7 52 7c 10 |../I..J..y...R|.| +peer0.org1.example.com | 00000040 ef b5 a2 1e b9 57 82 |.....W.| +peer0.org1.example.com | [458e 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:58136 +peer0.org1.example.com | [458f 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:58136 +peer0.org1.example.com | [4590 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4591 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4592 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4593 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4594 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4595 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4596 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4597 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 gate 1589998895535493100 evaluation starts +peer0.org1.example.com | [4598 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4599 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [459a 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 principal matched by identity 0 +peer0.org1.example.com | [459b 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [459c 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 7e f8 f7 38 97 4d 3c 2f e6 bb ae |0D. .~..8.M DEBU 0xc004e0e5c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [459e 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 gate 1589998895535493100 evaluation succeeds +peer0.org1.example.com | [459f 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45a0 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45a1 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [45a2 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [45a3 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:34150 +peer0.org1.example.com | [45a4 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:34150 +peer0.org1.example.com | [45a5 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [45a6 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org1.example.com | [45a7 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [45a8 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org1.example.com | [45a9 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [45aa 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:34150 disconnected +peer1.org2.example.com | [47bc 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\364.\033B&" > alive: alive: +peer1.org2.example.com | [47bf 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [47c0 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47c1 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [47c2 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47c3 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [47c5 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47c6 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [47c7 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47c4 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [47c8 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47c9 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [47ca 05-20 18:21:37.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47cb 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [47cc 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [47cd 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47ce 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [47cf 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [47d0 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47d1 05-20 18:21:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [47d2 05-20 18:21:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [47d3 05-20 18:21:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47d4 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [47d5 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161044 +peer1.org2.example.com | [47d6 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F3113FD7A400F74E9DCBAFD72FC5F625712BC589C136C38283B72A736F304292 +peer1.org2.example.com | [47d7 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [47d8 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [47d9 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [47da 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4847 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4848 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4849 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [484a 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [484b 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [484c 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [484d 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [484e 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4983 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4984 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4985 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4986 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4987 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4988 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4989 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [498a 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [498b 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [498c 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [498d 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [498e 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [498f 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4990 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4991 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4992 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4993 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4994 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4995 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4996 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4997 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45ab 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.422Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=123.7346ms +peer0.org1.example.com | [45ac 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [45ad 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [45ae 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [45af 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [45b0 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [45b1 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.55Z grpc.peer_address=172.18.0.5:34358 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=314.5µs +peer0.org1.example.com | [45b2 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b3 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b4 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [45b5 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [45b6 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [45b7 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [45b8 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer0.org1.example.com | [45b9 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [45ba 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [45bb 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:58136 disconnected +peer0.org1.example.com | [45bc 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.514Z grpc.peer_address=172.18.0.8:58136 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.7427ms +peer0.org1.example.com | [45bd 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [45be 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [45bf 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [45c0 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [45c1 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [45c2 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer0.org1.example.com | [45c3 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [45c4 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e88880, CONNECTING +peer0.org1.example.com | [45c5 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [45c6 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [45c7 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [45c8 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [45c9 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [45cc 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [45cd 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d876c0, READY +peer0.org1.example.com | [45cb 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [45ce 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e8cb20, CONNECTING +peer0.org1.example.com | [45ca 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [45cf 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [45d0 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org1.example.com | [45d1 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [45d2 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e8ce00, CONNECTING +peer0.org1.example.com | [45d3 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [45d4 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [45d5 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [45d6 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:34358 +peer0.org1.example.com | [45d7 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34358 +peer0.org1.example.com | [45d8 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45d9 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [45da 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45db 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [45dc 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45dd 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [45de 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45df 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45e0 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [45e1 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [45e2 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [45e3 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 gate 1589998895569020200 evaluation starts +peer0.org1.example.com | [45e4 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45e5 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [45e6 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 principal matched by identity 0 +peer0.org1.example.com | [45e7 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [45e8 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 f7 29 0e 20 12 7b 7c a0 93 b3 |0E.!...). .{|...| +peer0.org1.example.com | 00000010 50 24 08 5d b1 09 e5 b7 d4 cb b0 35 3f 19 b4 d1 |P$.].......5?...| +peer0.org1.example.com | 00000020 44 33 eb 6b c2 02 20 5e 53 79 79 de a8 e7 36 38 |D3.k.. ^Syy...68| +peer0.org1.example.com | 00000030 0c 4a c9 14 7f 71 6c 5c 49 be 9b c0 10 8d c7 10 |.J...ql\I.......| +peer0.org1.example.com | 00000040 b5 2d 37 bf 46 c4 10 |.-7.F..| +peer0.org1.example.com | [45e9 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [45ea 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 gate 1589998895569020200 evaluation succeeds +peer0.org1.example.com | [45eb 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45ec 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45ed 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [45ee 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [45ef 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34358 +peer0.org1.example.com | [45f0 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34358 +peer0.org1.example.com | [45f1 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [45f2 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0049486c0 env 0xc004901b30 txn 0 +peer0.org1.example.com | [45f3 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [45f4 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 336ms +peer0.org1.example.com | [45f5 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [45f6 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [45f7 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [45f8 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer0.org1.example.com | [45f9 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [45fa 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [45fb 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [45fc 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer0.org1.example.com | [45fd 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [45fe 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:34358 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:17781309580720699216 tag:EMPTY mem_req:\t\276\236\206\335\377\022\337\233\236Z\032\206 \230\314\263+\035\001\266_\3230\007\270\n\333\330]3" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ff 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4600 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17781309580720699216 tag:EMPTY mem_req:\t\276\236\206\335\377\022\337\233\236Z\032\206 \230\314\263+\035\001\266_\3230\007\270\n\333\330]3" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [4601 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4602 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4603 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4604 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4605 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [4606 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [4607 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4608 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4609 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [460a 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [460b 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [460c 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [460d 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 gate 1589998895583052600 evaluation starts +peer0.org1.example.com | [460e 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [460f 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4610 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4611 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 principal evaluation fails +peer0.org1.example.com | [4612 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 gate 1589998895583052600 evaluation fails +peer0.org1.example.com | [4613 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4614 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4615 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4616 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 gate 1589998895583830800 evaluation starts +peer0.org1.example.com | [4617 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4618 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4619 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [461a 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [461b 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [47db 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47dc 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47dd 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47de 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47e0 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [47e1 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [47e3 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47df 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [47e2 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47e4 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47e5 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [47e6 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47e7 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [47e8 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [47e9 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 11 3f d7 a4 00 f7 4e 9d cb af d7 2f c5 f6 25 |..?....N..../..%| +peer1.org2.example.com | 00000010 71 2b c5 89 c1 36 c3 82 83 b7 2a 73 6f 30 42 92 |q+...6....*so0B.| +peer1.org2.example.com | [47ea 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 fc 7c ce 9e 88 61 08 c3 5d ce |0E.!...|...a..].| +peer1.org2.example.com | 00000010 26 19 a5 e3 4e e9 73 09 8a d5 6e 0c 40 76 d0 6c |&...N.s...n.@v.l| +peer1.org2.example.com | 00000020 2b fd b8 c5 c3 02 20 27 09 ea e2 44 a2 e8 55 5a |+..... '...D..UZ| +peer1.org2.example.com | 00000030 e1 29 e0 aa 3d bf eb b8 9a 06 bf aa 2a de 1e ec |.)..=.......*...| +peer1.org2.example.com | 00000040 a1 18 53 1f 04 82 f0 |..S....| +peer1.org2.example.com | [47eb 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [47ec 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 57 bd 65 26 a1 ba dc 29 73 6c 0c |0D. .W.e&...)sl.| +peer1.org2.example.com | 00000010 fa 1e 4b aa e5 8d 25 e2 7d f8 16 61 15 94 4b 14 |..K...%.}..a..K.| +peer1.org2.example.com | 00000020 12 61 8c 4d 02 20 4b cc 1f a6 b7 e0 eb 59 65 c8 |.a.M. K......Ye.| +peer1.org2.example.com | 00000030 e1 2b 95 c9 d7 0f d6 38 a9 84 89 c7 f6 87 f5 18 |.+.....8........| +peer1.org2.example.com | 00000040 c1 3f 55 79 ff 60 |.?Uy.`| +peer1.org2.example.com | [47ed 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [47ee 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [47ef 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47f0 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47f1 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [484f 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4850 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4851 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4852 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4853 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4854 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4855 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459dce0 gate 1589998911831561600 evaluation starts +peer1.org1.example.com | [4856 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459dce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4857 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459dce0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4858 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459dce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4859 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459dce0 principal evaluation fails +peer1.org1.example.com | [485a 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459dce0 gate 1589998911831561600 evaluation fails +peer1.org1.example.com | [485b 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [485c 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [485d 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [485e 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be250 gate 1589998911831884200 evaluation starts +peer1.org1.example.com | [485f 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be250 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4860 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be250 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4861 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4862 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be250 principal evaluation fails +peer1.org1.example.com | [4863 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be250 gate 1589998911831884200 evaluation fails +peer1.org1.example.com | [4864 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4865 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4866 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4867 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be7c0 gate 1589998911832491000 evaluation starts +peer1.org1.example.com | [4868 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be7c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4869 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be7c0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [486a 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be7c0 principal matched by identity 0 +peer1.org1.example.com | [486b 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [486c 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [486d 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be7c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [486e 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045be7c0 gate 1589998911832491000 evaluation succeeds +peer1.org1.example.com | [486f 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4870 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4871 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4872 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4873 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4874 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [4875 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4876 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4877 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4878 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4879 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [487a 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [487b 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [487c 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [487d 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [487e 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfc10 gate 1589998911833971700 evaluation starts +peer1.org1.example.com | [487f 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfc10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4880 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfc10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4881 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfc10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4882 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfc10 principal evaluation fails +peer1.org1.example.com | [4883 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfc10 gate 1589998911833971700 evaluation fails +peer1.org1.example.com | [4884 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4885 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4886 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4887 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8180 gate 1589998911834497700 evaluation starts +peer1.org1.example.com | [4888 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8180 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4889 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8180 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [488a 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [488b 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8180 principal evaluation fails +peer1.org1.example.com | [488c 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8180 gate 1589998911834497700 evaluation fails +peer1.org1.example.com | [488d 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [488e 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [488f 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4890 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d86f0 gate 1589998911834794500 evaluation starts +peer1.org1.example.com | [4891 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d86f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4892 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d86f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4893 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d86f0 principal matched by identity 0 +peer1.org1.example.com | [4894 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org1.example.com | [4895 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | [461c 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 principal matched by identity 0 +peer0.org1.example.com | [461d 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ff d0 be 02 d5 d3 61 bf 0b 8a 9b 39 4c 44 9c |.......a....9LD.| +peer0.org1.example.com | 00000010 6a 4b 01 a2 b4 7d 05 8b 56 5d a2 7f 5a 5d f5 5b |jK...}..V]..Z].[| +peer0.org1.example.com | [461e 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 2d b6 fc 61 be 82 8d 46 cb 12 29 |0D. +-..a...F..)| +peer0.org1.example.com | 00000010 27 dc 5b 1a df 0e 90 35 fd 07 ac 1a 79 07 83 b1 |'.[....5....y...| +peer0.org1.example.com | 00000020 9d fb 72 17 02 20 3e 09 be 9e 86 dd ff 12 df 9b |..r.. >.........| +peer0.org1.example.com | 00000030 9e 5a 1a 86 20 98 cc b3 2b 1d 01 b6 5f d3 30 07 |.Z.. ...+..._.0.| +peer0.org1.example.com | 00000040 b8 0a db d8 5d 33 |....]3| +peer0.org1.example.com | [461f 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4620 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 gate 1589998895583830800 evaluation succeeds +peer0.org1.example.com | [4621 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4623 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4624 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4625 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4626 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4627 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [4628 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [4629 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [462a 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer0.org1.example.com | [462b 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [462c 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [462e 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e8cb20, READY +peer0.org1.example.com | [4631 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer0.org1.example.com | [4632 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [462d 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e88880, READY +peer1.org2.example.com | [47f2 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47f3 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [47f4 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [47f5 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47f6 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [47f7 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [47f8 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [47f9 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [47fa 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [47fb 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [47fc 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dacd0 gate 1589998897212935500 evaluation starts +peer1.org2.example.com | [47fd 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dacd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [47fe 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dacd0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [47ff 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dacd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4800 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dacd0 principal evaluation fails +peer1.org2.example.com | [4801 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dacd0 gate 1589998897212935500 evaluation fails +peer1.org2.example.com | [4802 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4803 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4804 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4805 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048db240 gate 1589998897215874700 evaluation starts +peer1.org2.example.com | [4806 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048db240 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4807 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048db240 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4808 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048db240 principal matched by identity 0 +peer1.org2.example.com | [4809 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +peer1.org2.example.com | 00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +peer1.org2.example.com | [480a 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +peer1.org2.example.com | 00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +peer1.org2.example.com | 00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +peer1.org2.example.com | 00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +peer1.org2.example.com | 00000040 3e f4 2e 1b 42 26 |>...B&| +peer1.org2.example.com | [480b 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048db240 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [480c 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048db240 gate 1589998897215874700 evaluation succeeds +peer1.org2.example.com | [480d 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [480e 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [480f 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4810 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4811 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4812 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4633 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4634 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4635 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4636 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4637 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4638 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4639 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [463a 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [463b 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [463c 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [463d 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 gate 1589998895599956500 evaluation starts +peer0.org1.example.com | [463e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [463f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4640 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4641 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 principal evaluation fails +peer0.org1.example.com | [4642 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 gate 1589998895599956500 evaluation fails +peer0.org1.example.com | [4643 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4644 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4645 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4646 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 gate 1589998895600772900 evaluation starts +peer1.org2.example.com | [4813 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4814 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4815 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer1.org2.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer1.org2.example.com | [4816 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer1.org2.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer1.org2.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer1.org2.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer1.org2.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer1.org2.example.com | [4817 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4818 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4819 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [481a 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 11 3f d7 a4 00 f7 4e 9d cb af d7 2f c5 f6 25 |..?....N..../..%| +peer1.org2.example.com | 00000010 71 2b c5 89 c1 36 c3 82 83 b7 2a 73 6f 30 42 92 |q+...6....*so0B.| +peer1.org2.example.com | [481b 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 fc 7c ce 9e 88 61 08 c3 5d ce |0E.!...|...a..].| +peer1.org2.example.com | 00000010 26 19 a5 e3 4e e9 73 09 8a d5 6e 0c 40 76 d0 6c |&...N.s...n.@v.l| +peer1.org2.example.com | 00000020 2b fd b8 c5 c3 02 20 27 09 ea e2 44 a2 e8 55 5a |+..... '...D..UZ| +peer1.org2.example.com | 00000030 e1 29 e0 aa 3d bf eb b8 9a 06 bf aa 2a de 1e ec |.)..=.......*...| +peer1.org2.example.com | 00000040 a1 18 53 1f 04 82 f0 |..S....| +peer1.org2.example.com | [481c 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [481d 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [481e 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [481f 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4820 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4821 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4822 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4823 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4824 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4825 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4826 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4827 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4828 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4829 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [482a 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9950 gate 1589998897225807900 evaluation starts +peer1.org2.example.com | [482b 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [482c 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9950 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [482d 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4998 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4999 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [499a 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [499c 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [499b 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [499e 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [499d 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [499f 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49a0 05-20 18:21:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [49a1 05-20 18:21:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161041 +peer0.org2.example.com | [49a2 05-20 18:21:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3909995089CA76A5967BD2846E28369597B85FAC2F19531DCEC6553215456B53 +peer0.org2.example.com | [49a3 05-20 18:21:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [49a4 05-20 18:21:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [49a5 05-20 18:21:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [49a6 05-20 18:21:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [49a7 05-20 18:21:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49a8 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49a9 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49aa 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [49ab 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49ac 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [49ad 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49ae 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49af 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [49b0 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49b1 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49b2 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49b3 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49b4 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49b5 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49b6 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49b7 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49b8 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [49b9 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 26 a8 89 be 83 3f 9b fe bf 72 c9 ef ff 7c 93 |.&....?...r...|.| +peer0.org2.example.com | 00000010 67 5c 9c ae a9 c4 ab 34 9e a4 f7 94 c8 83 98 05 |g\.....4........| +peer0.org2.example.com | [49ba 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cb ec 37 a8 5c 24 78 2c e4 f5 |0E.!....7.\$x,..| +peer0.org2.example.com | 00000010 ce 50 b4 f7 d1 6c 0d d6 51 67 20 fb a1 76 75 3e |.P...l..Qg ..vu>| +peer0.org2.example.com | 00000020 ad 42 a9 9f 7e 02 20 75 fa e6 bf cb 3e 60 4e 42 |.B..~. u....>`NB| +peer0.org2.example.com | 00000030 88 a2 b2 4f e8 f2 9d aa ec 98 89 92 45 b9 cb 8c |...O........E...| +peer0.org2.example.com | 00000040 4e 65 8a 37 a0 53 57 |Ne.7.SW| +peer1.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org1.example.com | [4896 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d86f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4897 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d86f0 gate 1589998911834794500 evaluation succeeds +peer1.org1.example.com | [4898 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4899 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [489a 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4647 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4648 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4649 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 principal matched by identity 0 +peer0.org1.example.com | [464a 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [464b 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 a0 b2 67 7a 45 fc 40 6c 44 f8 |0E.!....gzE.@lD.| +peer0.org1.example.com | 00000010 a5 3a ab ca 50 c3 4c 3f b6 08 d5 67 ed 67 9f 05 |.:..P.L?...g.g..| +peer0.org1.example.com | 00000020 ff 52 49 39 26 02 20 5a 9b 3e 54 15 b4 74 e1 e7 |.RI9&. Z.>T..t..| +peer0.org1.example.com | 00000030 63 a8 d5 93 56 94 c6 75 d0 7c ca 02 4e f0 3b 41 |c...V..u.|..N.;A| +peer0.org1.example.com | 00000040 90 96 7a 6e df b4 b0 |..zn...| +peer0.org1.example.com | [464c 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [464d 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 gate 1589998895600772900 evaluation succeeds +peer0.org1.example.com | [464e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [464f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4650 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4651 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4652 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org1.example.com | [4653 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4654 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [462f 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4630 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [4622 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e8ce00, READY +peer0.org1.example.com | [4655 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4656 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org1.example.com | [4657 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34358 disconnected +peer0.org1.example.com | [4658 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4659 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [465a 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [465f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4660 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4661 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [4662 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4663 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4664 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4665 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4666 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4667 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 17781309580720699216, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4668 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\t\276\236\206\335\377\022\337\233\236Z\032\206 \230\314\263+\035\001\266_\3230\007\270\n\333\330]3" > alive: alive: alive: +peer0.org1.example.com | [4669 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17781309580720699216, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer1.org2.example.com | [482e 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9950 principal evaluation fails +peer1.org2.example.com | [482f 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9950 gate 1589998897225807900 evaluation fails +peer1.org2.example.com | [4830 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4831 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4832 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4833 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9ec0 gate 1589998897226910400 evaluation starts +peer1.org2.example.com | [4834 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9ec0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4835 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9ec0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4836 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9ec0 principal matched by identity 0 +peer1.org2.example.com | [4837 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +peer1.org2.example.com | 00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +peer1.org2.example.com | [4838 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +peer1.org2.example.com | 00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +peer1.org2.example.com | 00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +peer1.org2.example.com | 00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +peer1.org2.example.com | 00000040 e0 0a 77 e4 aa d8 81 |..w....| +peer1.org2.example.com | [4839 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9ec0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [483a 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9ec0 gate 1589998897226910400 evaluation succeeds +peer1.org2.example.com | [483b 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [483c 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [483d 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [483e 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [483f 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4840 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4841 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4842 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer1.org2.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer1.org2.example.com | [4843 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer1.org2.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer1.org2.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer1.org2.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer1.org2.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer1.org2.example.com | [4844 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4845 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4846 05-20 18:21:37.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4847 05-20 18:21:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 11 3f d7 a4 00 f7 4e 9d cb af d7 2f c5 f6 25 |..?....N..../..%| +peer1.org2.example.com | 00000010 71 2b c5 89 c1 36 c3 82 83 b7 2a 73 6f 30 42 92 |q+...6....*so0B.| +peer1.org2.example.com | [4848 05-20 18:21:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 fc 7c ce 9e 88 61 08 c3 5d ce |0E.!...|...a..].| +peer1.org2.example.com | 00000010 26 19 a5 e3 4e e9 73 09 8a d5 6e 0c 40 76 d0 6c |&...N.s...n.@v.l| +peer1.org2.example.com | 00000020 2b fd b8 c5 c3 02 20 27 09 ea e2 44 a2 e8 55 5a |+..... '...D..UZ| +peer1.org2.example.com | 00000030 e1 29 e0 aa 3d bf eb b8 9a 06 bf aa 2a de 1e ec |.)..=.......*...| +peer1.org2.example.com | 00000040 a1 18 53 1f 04 82 f0 |..S....| +peer1.org2.example.com | [4849 05-20 18:21:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [484a 05-20 18:21:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [484b 05-20 18:21:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [484c 05-20 18:21:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [484d 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [484e 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [484f 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4850 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4852 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4853 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4851 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4854 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4855 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4856 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4857 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4858 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4859 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d29e0 gate 1589998898353607200 evaluation starts +peer1.org2.example.com | [485a 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d29e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [485b 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d29e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [485c 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d29e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [485d 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d29e0 principal evaluation fails +peer1.org2.example.com | [485e 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d29e0 gate 1589998898353607200 evaluation fails +peer1.org2.example.com | [485f 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4860 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4861 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4862 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d2f50 gate 1589998898356268800 evaluation starts +peer1.org2.example.com | [4863 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d2f50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4864 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d2f50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4865 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d2f50 principal matched by identity 0 +peer1.org2.example.com | [4866 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 82 51 e7 cf 80 b5 56 b9 3f d3 c0 21 8d 63 fe |..Q....V.?..!.c.| +peer1.org2.example.com | 00000010 ff 95 75 d0 7b 64 8d 53 28 22 d8 43 c2 aa 00 8f |..u.{d.S(".C....| +peer1.org2.example.com | [4867 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 b2 c5 04 0c 4f dc 56 0c bc 68 |0E.!......O.V..h| +peer1.org2.example.com | 00000010 e2 d2 89 56 cb 33 e7 aa a4 7d 85 b2 ce 03 fc fd |...V.3...}......| +peer1.org2.example.com | 00000020 b2 9b fb b1 e5 02 20 26 1e 92 c1 a0 4e d2 4b f5 |...... &....N.K.| +peer1.org2.example.com | 00000030 7a 10 59 3e 14 33 ba e6 57 56 65 50 04 a1 c4 2e |z.Y>.3..WVeP....| +peer1.org2.example.com | 00000040 19 ba 80 f9 b6 25 dc |.....%.| +peer1.org2.example.com | [4868 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d2f50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4869 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d2f50 gate 1589998898356268800 evaluation succeeds +peer1.org2.example.com | [486a 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [486b 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [486c 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [486d 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [486e 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [486f 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4870 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4871 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4872 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4873 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4874 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4875 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4876 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4878 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4877 05-20 18:21:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4879 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [487a 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [487b 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [487c 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [487d 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [487e 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [487f 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4880 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4881 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4882 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4883 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4884 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4885 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4886 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4887 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4888 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4889 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [488a 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [488b 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [488c 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [488d 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [488e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [488f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 09 99 50 89 ca 76 a5 96 7b d2 84 6e 28 36 95 |9..P..v..{..n(6.| +peer1.org2.example.com | 00000010 97 b8 5f ac 2f 19 53 1d ce c6 55 32 15 45 6b 53 |.._./.S...U2.EkS| +peer1.org2.example.com | [4890 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 eb 65 95 8e ae 99 55 73 35 65 |0E.!...e....Us5e| +peer1.org2.example.com | 00000010 84 6b fa 18 b7 70 05 e9 52 fb 9e 58 d2 72 a5 9d |.k...p..R..X.r..| +peer1.org2.example.com | 00000020 f0 65 75 9d d6 02 20 09 0f a7 3e 2e f1 c8 80 d7 |.eu... ...>.....| +peer1.org2.example.com | 00000030 f4 86 a1 27 58 c9 ef 02 b9 11 c5 69 84 27 38 72 |...'X......i.'8r| +peer1.org2.example.com | 00000040 66 17 8e c2 0a ea 8a |f......| +peer1.org2.example.com | [4891 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4892 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [49bb 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49bc 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [49bd 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [49be 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [49bf 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [49c0 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49c1 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49c2 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49c3 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49c4 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49c5 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49c6 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [49c7 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49c8 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [49c9 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49ca 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49cb 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49cc 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49cd 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49ce 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49cf 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49d0 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49d1 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49d2 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49d3 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49d4 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [49d5 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49d6 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49d7 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49d8 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49d9 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [489b 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [489c 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org1.example.com | [489d 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org1.example.com | [489e 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [489f 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48a0 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [48a1 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [48a2 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [48a3 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [48a4 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [48a5 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [48a6 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9fe0 gate 1589998911839520300 evaluation starts +peer1.org1.example.com | [48a7 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [48a8 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9fe0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [48a9 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [48aa 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9fe0 principal evaluation fails +peer1.org1.example.com | [48ab 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9fe0 gate 1589998911839520300 evaluation fails +peer1.org1.example.com | [48ac 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [48ad 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [48ae 05-20 18:21:51.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [48af 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4550 gate 1589998911844525500 evaluation starts +peer1.org1.example.com | [48b0 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4550 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [48b1 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4550 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [48b2 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [48b3 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4550 principal evaluation fails +peer1.org1.example.com | [48b4 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4550 gate 1589998911844525500 evaluation fails +peer1.org1.example.com | [48b5 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [48b6 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [48b7 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [48b8 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4ac0 gate 1589998911844969300 evaluation starts +peer1.org1.example.com | [48b9 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [48ba 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4ac0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [48bb 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4ac0 principal matched by identity 0 +peer1.org1.example.com | [48bc 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [48bd 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org1.example.com | [48be 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4ac0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [48bf 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045f4ac0 gate 1589998911844969300 evaluation succeeds +peer1.org1.example.com | [48c0 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [48c1 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [48c2 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [48c3 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [48c4 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org1.example.com | [48c5 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org1.example.com | [48c6 05-20 18:21:51.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48c7 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [48c8 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48c9 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48ca 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48cb 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48cc 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [48cd 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [48ce 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48cf 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48d0 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48d1 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48d2 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [48d3 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [48d4 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [48d5 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [48d6 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [48d7 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [48d8 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [48d9 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48da 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [48db 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48dc 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [48dd 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48de 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [48df 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [48e0 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48e1 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [49da 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [49db 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49dc 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [49dd 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [49de 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [49df 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [49e0 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [49e1 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [49e2 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceab90 gate 1589998899035365900 evaluation starts +peer0.org2.example.com | [49e3 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceab90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [49e4 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceab90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [49e5 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceab90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [49e6 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceab90 principal evaluation fails +peer0.org2.example.com | [49e7 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceab90 gate 1589998899035365900 evaluation fails +peer0.org2.example.com | [49e8 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [49e9 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [49ea 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [49eb 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceb100 gate 1589998899035983300 evaluation starts +peer0.org2.example.com | [49ec 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceb100 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [49ed 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49ee 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceb100 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [49ef 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceb100 principal matched by identity 0 +peer0.org2.example.com | [49f0 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd e8 33 44 07 c3 e8 65 be a1 89 ef b8 78 4c 67 |..3D...e.....xLg| +peer0.org2.example.com | 00000010 ab 5e 8a 6a 5d 26 6a cf 85 bc 60 f7 57 ca ad 7e |.^.j]&j...`.W..~| +peer0.org2.example.com | [49f1 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 45 15 f2 f6 45 a4 92 3a b9 a1 2a |0D. .E...E..:..*| +peer0.org2.example.com | 00000010 aa 13 89 d2 6d a3 50 fc 08 17 a1 dc 3d bb 3f 73 |....m.P.....=.?s| +peer0.org2.example.com | 00000020 ed 38 7b 9b 02 20 0c ec 28 8a b9 95 56 58 d4 95 |.8{.. ..(...VX..| +peer0.org2.example.com | 00000030 c0 4c 6b a9 18 33 38 7f 30 70 f8 6a b6 ac 75 d0 |.Lk..38.0p.j..u.| +peer0.org2.example.com | 00000040 41 1f d0 af da c2 |A.....| +peer0.org2.example.com | [49f2 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceb100 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [49f3 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ceb100 gate 1589998899035983300 evaluation succeeds +peer0.org2.example.com | [49f4 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [49f5 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [49f6 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [49f7 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [49f8 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49f9 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [49fa 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [49fb 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [49fc 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [49fd 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49fe 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49ff 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a00 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4a01 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a02 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a03 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a04 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a05 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a06 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a07 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a08 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a09 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4a0a 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a0b 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a0c 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4a0d 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4a0e 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a0f 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4a10 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a11 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4a12 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4a13 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a14 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4a15 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a16 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a17 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a18 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a19 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a1a 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a1b 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [4a1c 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a1d 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4a1e 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a1f 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a20 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4a21 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4a22 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4a23 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d03b10 gate 1589998899565813100 evaluation starts +peer0.org2.example.com | [4a24 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d03b10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a25 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d03b10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4a26 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d03b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4a27 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d03b10 principal evaluation fails +peer0.org2.example.com | [4a28 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d03b10 gate 1589998899565813100 evaluation fails +peer0.org2.example.com | [4a29 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a2a 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a2b 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4a2c 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a080 gate 1589998899566717400 evaluation starts +peer0.org2.example.com | [4a2d 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a080 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a2e 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a080 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4a2f 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a080 principal matched by identity 0 +peer0.org2.example.com | [4a30 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4a31 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4a32 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a080 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4a33 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d3a080 gate 1589998899566717400 evaluation succeeds +peer0.org2.example.com | [4a34 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a35 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a36 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4a37 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4a38 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a39 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [465b 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [466a 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816103E +peer0.org1.example.com | [466b 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC7A2CECA1002317405A900A42CE8C74A90063C1095F8994A53695ED62695F98 +peer0.org1.example.com | [466c 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [466d 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [466e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4670 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [4671 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [4672 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer0.org1.example.com | [466f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4673 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4674 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4675 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [4676 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [4677 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:17748581153308284860 tag:EMPTY mem_req:" signature:"0E\002!\000\271\210\037e\224\346Lc\220\344/P==\313\222\252\234%\216G\006\217\367+\232\330_r\214\347\205\002 \036V,\256K\332\361\360\206\250\014\341\264\277^\253l\336Mei\313T\013K\1774(\220\004\342H" > > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4678 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:7051 +peer0.org1.example.com | [4679 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:17748581153308284860 tag:EMPTY mem_req:" signature:"0E\002!\000\271\210\037e\224\346Lc\220\344/P==\313\222\252\234%\216G\006\217\367+\232\330_r\214\347\205\002 \036V,\256K\332\361\360\206\250\014\341\264\277^\253l\336Mei\313T\013K\1774(\220\004\342H" > > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [465c 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:34358 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=39.0283ms +peer0.org1.example.com | [467a 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [467b 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [467c 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [467d 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer0.org1.example.com | [465d 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [465e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [467e 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [467f 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [4680 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [4893 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4894 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4895 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4896 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4897 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4898 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4899 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [489a 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [489b 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [489c 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [489d 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [489e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [489f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48a0 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48a1 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48a2 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48a3 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48a4 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48a5 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48a6 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48a7 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48a8 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48a9 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48aa 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48ab 05-20 18:21:38.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [48ac 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161045 +peer1.org2.example.com | [48ad 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0A26A889BE833F9BFEBF72C9EFFF7C93675C9CAEA9C4AB349EA4F794C8839805 +peer1.org2.example.com | [48ae 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [48af 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [48b0 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [48b1 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [48b2 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48b3 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48b4 05-20 18:21:38.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48b5 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [48b6 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48b7 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48b8 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48b9 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [48ba 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48bb 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48bc 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [48bd 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [48be 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48bf 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [48c0 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48c1 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [48c2 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [48c3 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48c4 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [48c5 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [48c6 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [48c7 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [48c8 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [48c9 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [48ca 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004969cf0 gate 1589998899031417100 evaluation starts +peer1.org2.example.com | [48cb 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004969cf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [48cc 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004969cf0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [48cd 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004969cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [48ce 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004969cf0 principal evaluation fails +peer1.org2.example.com | [48cf 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004969cf0 gate 1589998899031417100 evaluation fails +peer1.org2.example.com | [48d0 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [48d1 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [48d2 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [48d3 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994260 gate 1589998899031851000 evaluation starts +peer1.org2.example.com | [48d4 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994260 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [48d5 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994260 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [48d6 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994260 principal matched by identity 0 +peer1.org2.example.com | [48d7 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd e8 33 44 07 c3 e8 65 be a1 89 ef b8 78 4c 67 |..3D...e.....xLg| +peer1.org2.example.com | 00000010 ab 5e 8a 6a 5d 26 6a cf 85 bc 60 f7 57 ca ad 7e |.^.j]&j...`.W..~| +peer1.org2.example.com | [48d8 05-20 18:21:39.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 45 15 f2 f6 45 a4 92 3a b9 a1 2a |0D. .E...E..:..*| +peer1.org2.example.com | 00000010 aa 13 89 d2 6d a3 50 fc 08 17 a1 dc 3d bb 3f 73 |....m.P.....=.?s| +peer1.org2.example.com | 00000020 ed 38 7b 9b 02 20 0c ec 28 8a b9 95 56 58 d4 95 |.8{.. ..(...VX..| +peer1.org2.example.com | 00000030 c0 4c 6b a9 18 33 38 7f 30 70 f8 6a b6 ac 75 d0 |.Lk..38.0p.j..u.| +peer1.org2.example.com | 00000040 41 1f d0 af da c2 |A.....| +peer1.org2.example.com | [48d9 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [48da 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994260 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [48db 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994260 gate 1589998899031851000 evaluation succeeds +peer1.org2.example.com | [48dc 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [48dd 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [48de 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [48df 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [48e0 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [48e1 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [48e2 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [48e3 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [48e4 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [48e5 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48e6 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48e7 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48e8 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [48ea 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48e9 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48e2 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [48e3 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48e4 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [48e5 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [48e6 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [48e7 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48e8 05-20 18:21:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48e9 05-20 18:21:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48ea 05-20 18:21:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [48eb 05-20 18:21:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48ec 05-20 18:21:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48ed 05-20 18:21:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [48ee 05-20 18:21:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [48ef 05-20 18:21:52.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48f0 05-20 18:21:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [48f1 05-20 18:21:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [48f2 05-20 18:21:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [48f3 05-20 18:21:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [48f4 05-20 18:21:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816104C +peer1.org1.example.com | [48f5 05-20 18:21:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B1E051A154DB1FC0854F0F8BBF7C71151CFEC987FC2650A47DC28A940E304D2B +peer1.org1.example.com | [48f6 05-20 18:21:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [48f7 05-20 18:21:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [48f8 05-20 18:21:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [48f9 05-20 18:21:52.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48fa 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [48fb 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [48fc 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [48fd 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a3a 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a3b 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a3c 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a3d 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a3e 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a3f 05-20 18:21:39.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a40 05-20 18:21:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a41 05-20 18:21:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a42 05-20 18:21:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [4a43 05-20 18:21:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a45 05-20 18:21:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a44 05-20 18:21:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a46 05-20 18:21:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a47 05-20 18:21:40.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a48 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a4a 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a49 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a4b 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4a4c 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4a4d 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a4e 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a4f 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a50 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4a51 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a52 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a53 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4a54 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4a55 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4a56 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5cc90 gate 1589998900087299700 evaluation starts +peer0.org2.example.com | [4a57 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5cc90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [48eb 05-20 18:21:39.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48ec 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48ed 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48ee 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48ef 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48f0 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48f1 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48f2 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [48f3 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [48f4 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48f5 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48f6 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [48f7 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [48f8 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48f9 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [48fa 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48fb 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [48fe 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [48ff 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4900 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [4903 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4901 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [4902 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [4904 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [4905 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4906 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4908 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [4907 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [4909 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [490a 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [490b 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [490c 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [490d 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [490e 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [490f 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4910 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4911 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046317a0 gate 1589998912745752800 evaluation starts +peer1.org1.example.com | [4912 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046317a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4913 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046317a0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4914 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046317a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4915 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046317a0 principal evaluation fails +peer1.org1.example.com | [4916 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046317a0 gate 1589998912745752800 evaluation fails +peer1.org1.example.com | [4917 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4918 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a58 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5cc90 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4a59 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5cc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4a5a 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5cc90 principal evaluation fails +peer0.org2.example.com | [4a5b 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5cc90 gate 1589998900087299700 evaluation fails +peer0.org2.example.com | [4a5c 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a5d 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a5e 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4a5f 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d200 gate 1589998900088367500 evaluation starts +peer0.org2.example.com | [4a60 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a61 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d200 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4a62 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d200 principal matched by identity 0 +peer0.org2.example.com | [4a63 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4a64 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4a65 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d200 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4a66 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d200 gate 1589998900088367500 evaluation succeeds +peer0.org2.example.com | [4a67 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a68 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a69 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4a6a 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4a6b 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [4a6c 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [4a6d 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a6e 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a6f 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4a70 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a71 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a72 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4a73 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4a74 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4a75 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d82af0 gate 1589998900092259000 evaluation starts +peer0.org2.example.com | [4a76 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d82af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a77 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d82af0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4a78 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d82af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [48fc 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [48fd 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [48fe 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48ff 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4900 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4901 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4902 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [4903 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4904 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4905 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4906 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4907 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4908 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4909 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [490a 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049cc720 gate 1589998899556878700 evaluation starts +peer1.org2.example.com | [490b 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049cc720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [490c 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049cc720 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [490d 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049cc720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [490e 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049cc720 principal evaluation fails +peer1.org2.example.com | [490f 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049cc720 gate 1589998899556878700 evaluation fails +peer1.org2.example.com | [4910 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4911 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4912 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4913 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ccc90 gate 1589998899558297700 evaluation starts +peer1.org2.example.com | [4914 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ccc90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4915 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ccc90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4916 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ccc90 principal matched by identity 0 +peer1.org2.example.com | [4917 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4918 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4919 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ccc90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [491a 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ccc90 gate 1589998899558297700 evaluation succeeds +peer1.org2.example.com | [491b 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [491c 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4919 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [491a 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004631d10 gate 1589998912746021400 evaluation starts +peer1.org1.example.com | [491b 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004631d10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [491c 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004631d10 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [491d 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004631d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [491e 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004631d10 principal evaluation fails +peer1.org1.example.com | [491f 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004631d10 gate 1589998912746021400 evaluation fails +peer1.org1.example.com | [4920 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4921 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4922 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4923 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004660280 gate 1589998912746354600 evaluation starts +peer1.org1.example.com | [4924 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004660280 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4925 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004660280 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4926 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004660280 principal matched by identity 0 +peer1.org1.example.com | [4927 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer1.org1.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer1.org1.example.com | [4928 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer1.org1.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer1.org1.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer1.org1.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer1.org1.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer1.org1.example.com | [4929 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004660280 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [492a 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004660280 gate 1589998912746354600 evaluation succeeds +peer1.org1.example.com | [492b 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [492c 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [492d 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [492e 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [492f 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4930 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4931 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [4932 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer1.org1.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer1.org1.example.com | [4933 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer1.org1.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer1.org1.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer1.org1.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer1.org1.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer1.org1.example.com | [4934 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4935 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4936 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4937 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4938 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer1.org1.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer1.org1.example.com | [4939 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer1.org1.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer1.org1.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer1.org1.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer1.org1.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer1.org1.example.com | [493a 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [493b 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [493c 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [493d 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [493e 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [493f 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a79 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d82af0 principal evaluation fails +peer0.org2.example.com | [4a7a 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d82af0 gate 1589998900092259000 evaluation fails +peer0.org2.example.com | [4a7b 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a7c 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a7d 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4a7e 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d83060 gate 1589998900093159000 evaluation starts +peer0.org2.example.com | [4a7f 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d83060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a80 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d83060 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4a81 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d83060 principal matched by identity 0 +peer0.org2.example.com | [4a82 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4a83 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4a84 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d83060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4a85 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d83060 gate 1589998900093159000 evaluation succeeds +peer0.org2.example.com | [4a86 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a87 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a88 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4a89 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4a8a 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a8b 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a8c 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a8d 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a8e 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a8f 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4a90 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a91 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a92 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4a93 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4a94 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4a95 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da24b0 gate 1589998900097129000 evaluation starts +peer0.org2.example.com | [4a96 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da24b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a97 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da24b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4a98 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da24b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4a99 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da24b0 principal evaluation fails +peer0.org2.example.com | [4a9a 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da24b0 gate 1589998900097129000 evaluation fails +peer0.org2.example.com | [4a9b 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a9c 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a9d 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4a9e 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da2a20 gate 1589998900099412500 evaluation starts +peer0.org2.example.com | [4a9f 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da2a20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4aa0 05-20 18:21:40.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da2a20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4aa1 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da2a20 principal matched by identity 0 +peer0.org2.example.com | [4aa2 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4aa3 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4aa4 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da2a20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4aa5 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da2a20 gate 1589998900099412500 evaluation succeeds +peer0.org2.example.com | [4aa6 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4aa7 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4aa8 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4aa9 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4aaa 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [4aab 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [4aac 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4aad 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4aae 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4aaf 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4ab0 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4ab1 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4ab2 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4ab3 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4ab4 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca310 gate 1589998900106479700 evaluation starts +peer0.org2.example.com | [4ab5 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca310 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ab6 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca310 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ab7 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4ab8 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca310 principal evaluation fails +peer0.org2.example.com | [4ab9 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca310 gate 1589998900106479700 evaluation fails +peer0.org2.example.com | [4aba 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4abb 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4abc 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4abd 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca880 gate 1589998900108006000 evaluation starts +peer0.org2.example.com | [4abe 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca880 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4abf 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca880 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ac0 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca880 principal matched by identity 0 +peer0.org2.example.com | [4ac1 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4ac2 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4ac3 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca880 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4ac4 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dca880 gate 1589998900108006000 evaluation succeeds +peer0.org2.example.com | [4ac5 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4ac6 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4ac7 05-20 18:21:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4ac8 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4ac9 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4aca 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4acb 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4acc 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4acd 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ace 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4acf 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ad0 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4ad1 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4ad2 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4ad3 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4ad4 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4ad5 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4ad6 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de83c0 gate 1589998900112909000 evaluation starts +peer1.org2.example.com | [491d 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [491e 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [491f 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4920 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4921 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4922 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4923 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4924 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4925 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4926 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4927 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4928 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4929 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [492a 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [492b 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [492c 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [492d 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [492e 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [492f 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4930 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [4931 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4932 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4933 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4934 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4935 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4936 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4937 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4938 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4939 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [493a 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [493b 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4940 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4941 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4942 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4943 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4944 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4945 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4946 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670990 gate 1589998912748086200 evaluation starts +peer1.org1.example.com | [4947 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670990 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4948 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670990 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4949 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [494a 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670990 principal evaluation fails +peer1.org1.example.com | [494c 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670990 gate 1589998912748086200 evaluation fails +peer1.org1.example.com | [494b 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [494d 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [494e 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [494f 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4950 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4951 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670f00 gate 1589998912762616100 evaluation starts +peer1.org1.example.com | [4952 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670f00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4953 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670f00 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4954 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4955 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670f00 principal evaluation fails +peer1.org1.example.com | [4956 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004670f00 gate 1589998912762616100 evaluation fails +peer1.org1.example.com | [4957 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4958 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4959 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [495a 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004671470 gate 1589998912764042200 evaluation starts +peer1.org1.example.com | [495b 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004671470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [495c 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004671470 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [495d 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004671470 principal matched by identity 0 +peer1.org1.example.com | [495e 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer1.org1.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer1.org1.example.com | [495f 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer1.org1.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer1.org1.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer1.org1.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer1.org1.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer1.org1.example.com | [4960 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004671470 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4961 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004671470 gate 1589998912764042200 evaluation succeeds +peer1.org1.example.com | [4962 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4963 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4964 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4965 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4966 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4967 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4968 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4969 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer1.org1.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer1.org1.example.com | [496a 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer1.org1.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer1.org1.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer1.org1.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer1.org1.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer1.org1.example.com | [496b 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [496c 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [496d 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [496e 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer1.org1.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer1.org1.example.com | [496f 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer1.org1.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer1.org1.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer1.org1.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer1.org1.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer1.org1.example.com | [4970 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4971 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4972 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4973 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4974 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [4975 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4976 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [4977 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer1.org1.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer1.org1.example.com | [4978 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer1.org1.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer1.org1.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer1.org1.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer1.org1.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer1.org1.example.com | [4979 05-20 18:21:52.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [497a 05-20 18:21:52.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 82 af ff e5 1d 51 5c 74 f9 dc |0E.!.......Q\t..| +peer1.org1.example.com | 00000010 1f 8d 1f b2 98 9b 2d b0 dd 49 bf be 33 63 9d 6b |......-..I..3c.k| +peer1.org1.example.com | 00000020 72 a6 c1 f7 74 02 20 3d 3d 80 44 8a 56 88 41 e4 |r...t. ==.D.V.A.| +peer1.org1.example.com | 00000030 de c2 83 fd 27 99 6d 51 2e cb 52 9c 8b 2a 7f 07 |....'.mQ..R..*..| +peer1.org1.example.com | 00000040 66 77 85 02 2a 24 2a |fw..*$*| +peer1.org1.example.com | [497b 05-20 18:21:52.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [497c 05-20 18:21:52.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [497d 05-20 18:21:52.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [497e 05-20 18:21:52.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [497f 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4980 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4981 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4982 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [493c 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [493d 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [493e 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [493f 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4940 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4941 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4942 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fb5e0 gate 1589998900385281800 evaluation starts +peer1.org2.example.com | [4943 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fb5e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4944 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fb5e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4945 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fb5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4946 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fb5e0 principal evaluation fails +peer1.org2.example.com | [4947 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fb5e0 gate 1589998900385281800 evaluation fails +peer1.org2.example.com | [4948 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4949 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [494a 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [494b 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fbb50 gate 1589998900387409900 evaluation starts +peer1.org2.example.com | [494c 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fbb50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [494d 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fbb50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [494e 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fbb50 principal matched by identity 0 +peer1.org2.example.com | [494f 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4950 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4951 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fbb50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4952 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fbb50 gate 1589998900387409900 evaluation succeeds +peer1.org2.example.com | [4953 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4954 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4955 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4956 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4957 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4958 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4959 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [495a 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [495b 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [495c 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [495d 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [495e 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [495f 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ed50 gate 1589998900395134200 evaluation starts +peer1.org2.example.com | [4960 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ed50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4961 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ed50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4962 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ed50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4963 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ed50 principal evaluation fails +peer1.org2.example.com | [4964 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ed50 gate 1589998900395134200 evaluation fails +peer1.org2.example.com | [4965 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4966 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4967 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4968 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1f2c0 gate 1589998900395926600 evaluation starts +peer1.org2.example.com | [4969 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1f2c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [496a 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1f2c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [496b 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1f2c0 principal matched by identity 0 +peer1.org2.example.com | [496c 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [496d 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [496e 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1f2c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [496f 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1f2c0 gate 1589998900395926600 evaluation succeeds +peer1.org2.example.com | [4970 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4971 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4972 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4973 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4974 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4975 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4976 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4977 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4978 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4979 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [497a 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [497b 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [497c 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [497d 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [497e 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [497f 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4980 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4981 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3ce00 gate 1589998900399045200 evaluation starts +peer1.org2.example.com | [4982 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3ce00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4983 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3ce00 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4984 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3ce00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4985 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3ce00 principal evaluation fails +peer1.org2.example.com | [4986 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3ce00 gate 1589998900399045200 evaluation fails +peer1.org2.example.com | [4987 05-20 18:21:40.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4988 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4989 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [498a 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3d370 gate 1589998900400265400 evaluation starts +peer1.org2.example.com | [498b 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3d370 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [498c 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3d370 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [498d 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3d370 principal matched by identity 0 +peer1.org2.example.com | [498e 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [498f 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4990 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3d370 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4991 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a3d370 gate 1589998900400265400 evaluation succeeds +peer1.org2.example.com | [4992 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4993 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4994 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4995 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4996 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4997 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4998 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4999 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [499a 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [499b 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [499c 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [499d 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4ad7 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de83c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ad8 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de83c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ad9 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de83c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4ada 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de83c0 principal evaluation fails +peer0.org2.example.com | [4adb 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de83c0 gate 1589998900112909000 evaluation fails +peer0.org2.example.com | [4adc 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4add 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4ade 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4adf 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de8930 gate 1589998900114684100 evaluation starts +peer0.org2.example.com | [4ae0 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de8930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ae1 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de8930 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ae2 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de8930 principal matched by identity 0 +peer0.org2.example.com | [4ae3 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4ae4 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4ae5 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de8930 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4ae6 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de8930 gate 1589998900114684100 evaluation succeeds +peer0.org2.example.com | [4ae7 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4ae8 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4ae9 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4aea 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4aeb 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4aec 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4aed 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4aee 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4aef 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4af0 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4af1 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4af2 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4af3 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4af4 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4af5 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a220 gate 1589998900119427500 evaluation starts +peer0.org2.example.com | [4af6 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4af7 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a220 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4983 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4984 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4985 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4986 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4987 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [4988 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4989 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [498a 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [498b 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [498c 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [498d 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [498e 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [498f 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [4990 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [4991 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4992 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4993 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4994 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4995 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4996 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4997 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4998 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca570 gate 1589998913006537600 evaluation starts +peer1.org1.example.com | [4999 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca570 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [499a 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca570 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [499b 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [499c 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca570 principal evaluation fails +peer1.org1.example.com | [499d 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ca570 gate 1589998913006537600 evaluation fails +peer1.org1.example.com | [499e 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [499f 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [49a0 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [49a1 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046caae0 gate 1589998913007493500 evaluation starts +peer1.org1.example.com | [49a2 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046caae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [49a3 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046caae0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [49a4 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046caae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [49a5 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046caae0 principal evaluation fails +peer1.org1.example.com | [49a6 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046caae0 gate 1589998913007493500 evaluation fails +peer1.org1.example.com | [49a7 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [49a8 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [49a9 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [49aa 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb050 gate 1589998913008495700 evaluation starts +peer1.org1.example.com | [49ab 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [49ac 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb050 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [49ad 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb050 principal matched by identity 0 +peer1.org1.example.com | [49ae 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer1.org1.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer1.org1.example.com | [49af 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer1.org1.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer1.org1.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer1.org1.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer1.org1.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer1.org1.example.com | [49b0 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [49b1 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cb050 gate 1589998913008495700 evaluation succeeds +peer1.org1.example.com | [49b2 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [49b3 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [49b4 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [49b5 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [49b6 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [49b7 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [49b8 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [49b9 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [49ba 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [49bb 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [49bc 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [49bd 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [49be 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [49bf 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49c0 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49c1 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49c2 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [49c3 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\255G\301\377\232\324j\032\331\207\273 \266\014\377R\205\366\002B\327y\240\354\376\323\016':\245" > +peer1.org1.example.com | [49c4 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [49c5 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [49c6 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [49c7 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [49c8 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [49c9 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49ca 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49cb 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49cc 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49cd 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49ce 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49cf 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [49d0 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [49d1 05-20 18:21:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [49d2 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [49d3 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [49d4 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [49d5 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [49d6 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49d7 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [49d8 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [49d9 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [49da 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [49db 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4681 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [4682 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [4683 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [4684 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [4685 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc005059240)} +peer0.org1.example.com | [4686 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [4687 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [4688 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [4689 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer0.org1.example.com | [468a 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer0.org1.example.com | [468b 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer0.org1.example.com | [468c 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +peer0.org1.example.com | [468d 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [468e 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [468f 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4690 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4691 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4692 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4693 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4694 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4695 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4696 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4697 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4698 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 gate 1589998895628728900 evaluation starts +peer0.org1.example.com | [4699 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [469a 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [469b 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [469c 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 principal evaluation fails +peer0.org1.example.com | [469d 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 gate 1589998895628728900 evaluation fails +peer0.org1.example.com | [469e 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [469f 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46a0 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [46a1 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 gate 1589998895628995700 evaluation starts +peer0.org1.example.com | [46a2 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46a3 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [46a4 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 principal matched by identity 0 +peer0.org1.example.com | [46a5 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [46a6 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 0e 1b 45 09 70 3a 55 5e 23 e2 b8 |0D. )..E.p:U^#..| +peer0.org1.example.com | 00000010 38 04 1a ed 49 fc 39 96 9f cd bc fb bf b5 27 ef |8...I.9.......'.| +peer0.org1.example.com | 00000020 0d cb ea 5c 02 20 38 ea 6a 80 01 19 87 90 92 19 |...\. 8.j.......| +peer0.org1.example.com | 00000030 53 5b 95 b6 30 5a b6 ea 2f ca 2f 21 3b 5c df a7 |S[..0Z.././!;\..| +peer0.org1.example.com | 00000040 10 f2 71 1c 45 cd |..q.E.| +peer0.org1.example.com | [46a7 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [46a8 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 gate 1589998895628995700 evaluation succeeds +peer0.org1.example.com | [46a9 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [46aa 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [46ab 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [46ac 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [46ad 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org1.example.com | [46ae 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46af 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [46b0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46b1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +peer0.org1.example.com | [46b2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46b3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer0.org1.example.com | [46b4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [46b5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [46b6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [46b7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46b8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [46b9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [49dc 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [49dd 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3500 gate 1589998913268593400 evaluation starts +peer1.org1.example.com | [49de 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3500 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [49df 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3500 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [49e0 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [49e1 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3500 principal evaluation fails +peer1.org1.example.com | [49e2 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3500 gate 1589998913268593400 evaluation fails +peer1.org1.example.com | [49e3 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [49e4 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [49e5 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [49e6 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3a70 gate 1589998913268948500 evaluation starts +peer1.org1.example.com | [49e7 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3a70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [49e8 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3a70 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [49e9 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [49ea 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3a70 principal evaluation fails +peer1.org1.example.com | [49eb 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3a70 gate 1589998913268948500 evaluation fails +peer1.org1.example.com | [49ec 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [49ed 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [49ee 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [49ef 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3fe0 gate 1589998913269197000 evaluation starts +peer1.org1.example.com | [49f0 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [49f1 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3fe0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [49f2 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [49f3 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [49f4 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3fe0 principal matched by identity 0 +peer1.org1.example.com | [49f5 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 93 10 7e c5 6a 94 13 20 70 14 c6 be ee a6 96 |...~.j.. p......| +peer1.org1.example.com | 00000010 98 d6 91 2d dd d0 b2 df d6 20 b1 dc d4 87 71 e2 |...-..... ....q.| +peer1.org1.example.com | [49f6 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 4c 4d ee e8 75 fc 6d 3c bd 5c |0E.!..LM..u.m<.\| +peer1.org1.example.com | 00000010 aa 07 8b 4f cd 23 49 1f 08 cb e3 96 01 ff ed 8c |...O.#I.........| +peer1.org1.example.com | 00000020 6c 7b a2 51 26 02 20 3f 17 9d 12 06 2a 84 9b 34 |l{.Q&. ?....*..4| +peer1.org1.example.com | 00000030 74 ea 6f fe 71 48 e8 12 af d5 5f 18 e6 ab 39 01 |t.o.qH...._...9.| +peer1.org1.example.com | 00000040 67 3b 35 a0 fd 4e 11 |g;5..N.| +peer1.org1.example.com | [49f7 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3fe0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [49f8 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3fe0 gate 1589998913269197000 evaluation succeeds +peer1.org1.example.com | [49f9 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [49fa 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [49fb 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [49fc 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [49fd 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [49fe 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [49ff 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4a00 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4a01 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [4a02 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a03 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a04 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a05 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [4a06 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4a07 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 31 cf b9 42 46 10 c5 7b 33 00 c9 4c 8a 12 2b |.1..BF..{3..L..+| +peer1.org1.example.com | 00000010 78 20 e6 6f d5 51 58 e1 ce 29 48 94 0c 87 ba e4 |x .o.QX..)H.....| +peer1.org1.example.com | [4a08 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c e0 45 06 d9 67 b3 83 6e f4 74 26 |0D. ,.E..g..n.t&| +peer1.org1.example.com | 00000010 13 44 e2 34 c0 5b e6 5c 12 92 2b 43 38 f7 c2 90 |.D.4.[.\..+C8...| +peer1.org1.example.com | 00000020 92 0e 34 a3 02 20 3d b6 d3 89 e5 f3 45 dd 48 37 |..4.. =.....E.H7| +peer1.org1.example.com | 00000030 57 2f 26 4b fc c4 5e 62 60 92 50 e1 5e 33 3e 26 |W/&K..^b`.P.^3>&| +peer1.org1.example.com | 00000040 6f ea 43 2b 75 f0 |o.C+u.| +peer1.org1.example.com | [4a09 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [4a0a 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 83 79 17 0c 8c a9 43 d3 a3 44 9e |0D. 7.y....C..D.| +peer1.org2.example.com | [499e 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [499f 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [49a0 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ac60 gate 1589998900406719900 evaluation starts +peer1.org2.example.com | [49a1 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ac60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [49a2 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ac60 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [49a3 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ac60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [49a4 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ac60 principal evaluation fails +peer1.org2.example.com | [49a5 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5ac60 gate 1589998900406719900 evaluation fails +peer1.org2.example.com | [49a6 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [49a7 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [49a8 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [49a9 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b1d0 gate 1589998900408751100 evaluation starts +peer1.org2.example.com | [49aa 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b1d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [49ab 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b1d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [49ac 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b1d0 principal matched by identity 0 +peer1.org2.example.com | [49ad 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [49ae 05-20 18:21:40.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [49af 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b1d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [49b0 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a5b1d0 gate 1589998900408751100 evaluation succeeds +peer1.org2.example.com | [49b1 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [49b2 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [49b3 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [49b4 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [49b5 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [49b6 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [49b7 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [49b8 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [49b9 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49ba 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49bb 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49bc 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [49bd 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [49be 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [49bf 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [49c0 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4af8 05-20 18:21:40.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4af9 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a220 principal evaluation fails +peer0.org2.example.com | [4afa 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a220 gate 1589998900119427500 evaluation fails +peer0.org2.example.com | [4afb 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4afc 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4afd 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4afe 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a790 gate 1589998900120686200 evaluation starts +peer0.org2.example.com | [4aff 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a790 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b00 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a790 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4b01 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a790 principal matched by identity 0 +peer0.org2.example.com | [4b02 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4b03 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4b04 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a790 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4b05 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0a790 gate 1589998900120686200 evaluation succeeds +peer0.org2.example.com | [4b06 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b07 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b08 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4b09 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4b0a 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [4b0b 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [4b0c 05-20 18:21:40.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b0d 05-20 18:21:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b0e 05-20 18:21:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b0f 05-20 18:21:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4b10 05-20 18:21:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b11 05-20 18:21:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b12 05-20 18:21:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b13 05-20 18:21:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b14 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b15 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b16 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b17 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b18 05-20 18:21:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b19 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b1a 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b1b 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b1c 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b1d 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b1e 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b1f 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b20 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b21 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b22 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 27 a2 27 a7 de e5 12 ae fd 5d 23 a4 8a cc 37 c0 |'.'......]#...7.| +peer1.org1.example.com | 00000020 c6 c4 08 fb 02 20 7c 71 34 d7 09 0d 96 37 d0 88 |..... |q4....7..| +peer1.org1.example.com | 00000030 a6 55 bf 07 2b 1c 01 40 9f af 15 c0 9f ca 77 49 |.U..+..@......wI| +peer1.org1.example.com | 00000040 66 72 19 93 0e 76 |fr...v| +peer1.org1.example.com | [4a0b 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [4a0c 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [4a0d 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4a0e 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4a0f 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [4a10 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [4a12 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a13 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a14 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a15 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a16 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4a17 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:&o\352C+u\360" > alive: alive: alive:\255G\301\377\232\324j\032\331\207\273 \266\014\377R\205\366\002B\327y\240\354\376\323\016':\245" > +peer1.org1.example.com | [4a18 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4a19 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a1a 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a1b 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a1c 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [4a11 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a1d 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a1e 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a1f 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4a20 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:&o\352C+u\360" secret_envelope: > alive:\255G\301\377\232\324j\032\331\207\273 \266\014\377R\205\366\002B\327y\240\354\376\323\016':\245" > +peer1.org1.example.com | [4a21 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [4a22 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a23 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4a24 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08B8E1F3CF94EFB38816104D +peer1.org1.example.com | [4a25 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 704635DDC7CC4B2F3D0C6B0F65B89DAC51D11512E7F046276748D739E790FF60 +peer1.org1.example.com | [4a26 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4a27 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [4a28 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [4a29 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [4a2a 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a2b 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a2c 05-20 18:21:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a2d 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4a2e 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4a2f 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4a31 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a30 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a32 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [4a33 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4a35 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a34 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4a36 05-20 18:21:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a37 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a38 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a39 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a3a 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [4a3b 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a3c 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4a3d 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4a3e 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4a3f 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4a40 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4a41 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4a42 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a4f0 gate 1589998913792005700 evaluation starts +peer1.org1.example.com | [4a43 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a4f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4a44 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a4f0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4a45 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a4f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4a46 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a4f0 principal evaluation fails +peer1.org1.example.com | [4a47 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475a4f0 gate 1589998913792005700 evaluation fails +peer1.org1.example.com | [4a48 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4a49 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4a4a 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4a4b 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475aa60 gate 1589998913792382100 evaluation starts +peer1.org1.example.com | [4a4c 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475aa60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4a4d 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475aa60 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4a4e 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475aa60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4a4f 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475aa60 principal evaluation fails +peer1.org1.example.com | [4a50 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475aa60 gate 1589998913792382100 evaluation fails +peer1.org1.example.com | [4a51 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4a52 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4a53 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4a54 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475afd0 gate 1589998913792763100 evaluation starts +peer1.org1.example.com | [4a55 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475afd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4a56 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475afd0 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4a57 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475afd0 principal matched by identity 0 +peer1.org1.example.com | [4a58 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 9f 09 c4 c0 52 33 b6 90 ee 6d 28 98 93 cb 1a |.....R3...m(....| +peer1.org1.example.com | 00000010 b3 66 e0 b8 d1 2d d4 ee 56 22 12 af a9 87 7f 74 |.f...-..V".....t| +peer1.org1.example.com | [4a59 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 6a 87 ec da c0 91 be 82 e6 4c cc |0D. 3j........L.| +peer1.org1.example.com | 00000010 68 c7 43 8d 4d 19 f8 cd 66 ce d4 23 50 dd 43 8e |h.C.M...f..#P.C.| +peer1.org1.example.com | 00000020 98 82 a7 d4 02 20 64 48 a3 8a d7 62 02 23 02 7d |..... dH...b.#.}| +peer1.org1.example.com | 00000030 0e cb 91 9b ae 82 b9 f4 36 04 32 dc 00 5a 86 66 |........6.2..Z.f| +peer1.org1.example.com | 00000040 e3 6d c0 d9 aa 70 |.m...p| +peer1.org1.example.com | [4a5a 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475afd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4a5b 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00475afd0 gate 1589998913792763100 evaluation succeeds +peer1.org1.example.com | [4a5c 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4a5d 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4a5e 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [46ba 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [46bb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [46bc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [46bd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [46be 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [46bf 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [46c0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 gate 1589998895631868900 evaluation starts +peer0.org1.example.com | [46c1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46c2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [46c3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [46c4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 principal evaluation fails +peer0.org1.example.com | [46c5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 gate 1589998895631868900 evaluation fails +peer0.org1.example.com | [46c6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46c7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46c8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [46c9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 gate 1589998895632326800 evaluation starts +peer0.org1.example.com | [46ca 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46cb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [46cc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xd4, 0xd4, 0x5b, 0x4, 0x4e, 0x8a, 0x13, 0x2b, 0x2, 0xd9, 0x3, 0xc3, 0x1e, 0x8, 0xa3, 0x0, 0x38, 0xa2, 0x72, 0xe6, 0xd8, 0x7f, 0xf1, 0x5f, 0x4f, 0x51, 0x17, 0xe3, 0xb7, 0xa8, 0x82, 0xb3} txOffsets= +peer0.org1.example.com | txId=987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2 locPointer=offset=71, bytesLength=40146 +peer0.org1.example.com | ] +peer0.org1.example.com | [46cd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [46ce 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97620, bytesLength=40146] for tx ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to txid-index +peer0.org1.example.com | [46cf 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [46d0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97620, bytesLength=40146] for tx number:[0] ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to blockNumTranNum index +peer0.org1.example.com | [46d1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [46d2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 principal matched by identity 0 +peer0.org1.example.com | [46d3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [46d4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 f1 b6 4a 11 98 ca 33 5c 3a 35 7d |0D. g..J...3\:5}| +peer0.org1.example.com | 00000010 ca 5a 5c cb 66 fa d6 07 1b b1 27 b4 c8 df 52 8e |.Z\.f.....'...R.| +peer0.org1.example.com | 00000020 e7 df 74 1a 02 20 50 47 a8 63 2a 73 34 a1 b7 9f |..t.. PG.c*s4...| +peer0.org1.example.com | 00000030 f2 0b ec 64 9f 44 35 0d 92 e3 9c 4b 84 12 ad 38 |...d.D5....K...8| +peer0.org1.example.com | 00000040 fe 97 ec 49 c0 a0 |...I..| +peer0.org1.example.com | [46d5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [46d6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 gate 1589998895632326800 evaluation succeeds +peer0.org1.example.com | [46d7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [46d8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [46d9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [46da 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [46db 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [46dc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46dd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [46de 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46df 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +peer0.org1.example.com | [46e0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [46e1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 88 7c 60 3d 90 2f f9 01 fd 8a ec |0D. ..|`=./.....| +peer0.org1.example.com | 00000010 6b f1 6d 8b d4 fd f2 dd 10 05 90 54 b5 cf 03 ab |k.m........T....| +peer0.org1.example.com | 00000020 a7 44 1b cf 02 20 2a a3 a6 0f 9a ca 15 e2 13 66 |.D... *........f| +peer0.org1.example.com | 00000030 8f 4a 33 18 cb 9c e9 87 01 e1 07 cd 70 92 8b 16 |.J3.........p...| +peer0.org1.example.com | 00000040 18 7c a1 54 f9 d7 |.|.T..| +peer0.org1.example.com | [46e2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138758], isChainEmpty=[false], lastBlockNumber=[6] +peer0.org1.example.com | [46e3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org1.example.com | [46e4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46e5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [46e6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer0.org1.example.com | [46e7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46e8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46e9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46ea 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [46eb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [46ec 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [46ed 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610141801 +peer0.org1.example.com | [46ee 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 140BE8723098DEC3191257F331FA04654B962DB74E276C643B290641149C7A38 +peer0.org1.example.com | [46ef 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [46f0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer0.org1.example.com | [46f1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer0.org1.example.com | [46f2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [46f3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [46f4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [46f5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [46f6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [46f7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [46f8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer0.org1.example.com | [46f9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer0.org1.example.com | [46fa 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer0.org1.example.com | [46fb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [46fc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer0.org1.example.com | [46fd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer0.org1.example.com | [46fe 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [46ff 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org1.example.com | [4700 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 61ms (state_validation=50ms block_and_pvtdata_commit=8ms state_commit=1ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org1.example.com | [4701 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4702 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08071A0C0A0565787030321203312E30 +peer0.org1.example.com | [4703 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E9683A820B1F519226D3E1D84070E94AA5FBE2B2E03CBDC211CB2DB98C53A82 +peer0.org1.example.com | [4704 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer0.org1.example.com | [4705 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4706 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4707 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4708 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4709 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [470a 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b23 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b24 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b25 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b26 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b27 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [4b28 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b29 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b2a 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b2b 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b2c 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b2d 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4b2e 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b2f 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4b30 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b31 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b32 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4b33 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4b34 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4b35 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3edd0 gate 1589998900639857300 evaluation starts +peer0.org2.example.com | [4b36 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3edd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b37 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3edd0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4b38 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3edd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4b39 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3edd0 principal evaluation fails +peer0.org2.example.com | [4b3a 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3edd0 gate 1589998900639857300 evaluation fails +peer0.org2.example.com | [4b3b 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b3c 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b3d 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4b3e 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3f340 gate 1589998900645542500 evaluation starts +peer0.org2.example.com | [4b3f 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3f340 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b40 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3f340 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4b41 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3f340 principal matched by identity 0 +peer0.org2.example.com | [4b42 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer0.org2.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer0.org2.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer0.org2.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer0.org2.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer0.org2.example.com | [4b44 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3f340 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4b45 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3f340 gate 1589998900645542500 evaluation succeeds +peer0.org2.example.com | [4b46 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b47 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b48 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4b49 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4b4a 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4b4b 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4b4c 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4b4d 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4b4e 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4b4f 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b50 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b51 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b52 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [4b53 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b54 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b55 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b56 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b57 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b58 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b59 05-20 18:21:40.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\255B\251\237~\002 u\372\346\277\313>`NB\210\242\262O\350\362\235\252\354\230\211\222E\271\313\214Ne\2127\240SW" > alive: alive: alive:.\361\310\200\327\364\206\241'X\311\357\002\271\021\305i\204'8rf\027\216\302\n\352\212" > +peer0.org2.example.com | [4b5a 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4b5b 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b5c 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4b5d 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b5e 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [470b 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [470c 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [470d 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [470e 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [470f 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17748581153308284860, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org1.example.com | [4710 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4711 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4712 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [4713 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [4714 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [4715 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [4716 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4717 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4718 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4719 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [471a 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [471b 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [471c 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [471d 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [471e 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 gate 1589998895648818500 evaluation starts +peer0.org1.example.com | [471f 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4720 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4721 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4722 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 principal evaluation fails +peer0.org1.example.com | [4723 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 gate 1589998895648818500 evaluation fails +peer0.org1.example.com | [4724 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4725 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4726 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4727 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 gate 1589998895649087800 evaluation starts +peer0.org1.example.com | [4728 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4a5f 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4a60 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a61 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [4a62 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4a63 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4a64 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4a65 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a66 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a67 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a68 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a69 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a6a 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a6b 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a6c 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a6d 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a6e 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a6f 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4a70 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a71 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a72 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4a73 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a74 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a75 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a76 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a77 05-20 18:21:53.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a78 05-20 18:21:53.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a79 05-20 18:21:53.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a7a 05-20 18:21:53.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a7b 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a7c 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a7d 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a7e 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a7f 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a80 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [49c1 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [49c2 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72d10 gate 1589998900416348300 evaluation starts +peer1.org2.example.com | [49c3 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72d10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [49c4 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72d10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [49c5 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [49c6 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72d10 principal evaluation fails +peer1.org2.example.com | [49c7 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a72d10 gate 1589998900416348300 evaluation fails +peer1.org2.example.com | [49c8 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [49c9 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [49ca 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [49cb 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73280 gate 1589998900417695200 evaluation starts +peer1.org2.example.com | [49cc 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [49cd 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73280 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [49ce 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73280 principal matched by identity 0 +peer1.org2.example.com | [49cf 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [49d0 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [49d1 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73280 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [49d2 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73280 gate 1589998900417695200 evaluation succeeds +peer1.org2.example.com | [49d3 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [49d4 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [49d5 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [49d6 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [49d7 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [49d8 05-20 18:21:40.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [49d9 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49da 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49db 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [49dc 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [49dd 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [49de 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [49df 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [49e0 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [49e1 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a92b70 gate 1589998900422789600 evaluation starts +peer1.org2.example.com | [49e2 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a92b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [49e3 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a92b70 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [49e4 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a92b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [49e5 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a92b70 principal evaluation fails +peer1.org2.example.com | [49e6 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a92b70 gate 1589998900422789600 evaluation fails +peer1.org2.example.com | [49e7 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [49e8 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [49e9 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [49ea 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a930e0 gate 1589998900424564900 evaluation starts +peer1.org2.example.com | [49eb 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a930e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [49ec 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a930e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [49ed 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a930e0 principal matched by identity 0 +peer1.org2.example.com | [49ee 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [49ef 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [49f0 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a930e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [49f1 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a930e0 gate 1589998900424564900 evaluation succeeds +peer1.org2.example.com | [49f2 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [49f3 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [49f4 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [49f5 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [49f6 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [49f7 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [49f8 05-20 18:21:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [49f9 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [49fa 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [49fb 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49fc 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49fd 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49fe 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [49ff 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a00 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a01 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [4a02 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a03 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a04 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a05 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a06 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4a07 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a08 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4a09 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4a0a 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4a0b 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4a0c 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4a0d 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4a0e 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4520 gate 1589998900632955900 evaluation starts +peer1.org2.example.com | [4a0f 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4a10 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4520 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4a11 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4a12 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4520 principal evaluation fails +peer1.org2.example.com | [4a13 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4520 gate 1589998900632955900 evaluation fails +peer0.org2.example.com | [4b5f 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b60 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b61 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b62 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b63 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b64 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b65 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b66 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b67 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b68 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b69 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b6a 05-20 18:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b6b 05-20 18:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b6c 05-20 18:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b6d 05-20 18:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b6e 05-20 18:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b6f 05-20 18:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b70 05-20 18:21:40.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b71 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b72 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b73 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b74 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b75 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b76 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b77 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b78 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4729 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [472a 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 principal matched by identity 0 +peer0.org1.example.com | [472b 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [472c 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [472d 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [472e 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 gate 1589998895649087800 evaluation succeeds +peer0.org1.example.com | [472f 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4730 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4731 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4732 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4733 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4734 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4735 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4736 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4737 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4738 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4739 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [473a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [473b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [473c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [473d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 gate 1589998895653462500 evaluation starts +peer0.org1.example.com | [473e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [473f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4740 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4741 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 principal evaluation fails +peer0.org1.example.com | [4742 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 gate 1589998895653462500 evaluation fails +peer0.org1.example.com | [4743 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4744 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4745 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4746 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 gate 1589998895654332700 evaluation starts +peer0.org1.example.com | [4747 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4748 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4749 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 principal matched by identity 0 +peer0.org1.example.com | [474a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org1.example.com | [4a81 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a82 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4a83 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4a84 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [4a85 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a86 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4a87 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4a88 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4a89 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4a8a 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4a8b 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4a8c 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a620 gate 1589998914127173300 evaluation starts +peer1.org1.example.com | [4a8d 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a620 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4a8e 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a620 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4a8f 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4a90 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a620 principal evaluation fails +peer1.org1.example.com | [4a91 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479a620 gate 1589998914127173300 evaluation fails +peer1.org1.example.com | [4a92 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4a93 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4a94 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4a95 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479ab90 gate 1589998914131340000 evaluation starts +peer1.org1.example.com | [4a96 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479ab90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4a97 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479ab90 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4a98 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479ab90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4a99 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479ab90 principal evaluation fails +peer1.org1.example.com | [4a9a 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479ab90 gate 1589998914131340000 evaluation fails +peer1.org1.example.com | [4a9b 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4a9c 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4a9d 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4a9e 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b100 gate 1589998914135819400 evaluation starts +peer1.org1.example.com | [4a9f 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4aa0 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b100 processing identity 0 with bytes of 115a110 +peer1.org1.example.com | [4aa1 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b100 principal matched by identity 0 +peer1.org1.example.com | [4aa2 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 bc 47 37 60 24 42 2c 17 73 70 82 86 cf fd c9 |..G7`$B,.sp.....| +peer0.org2.example.com | [4b79 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [4b7a 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b7b 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4b7c 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161042 +peer0.org2.example.com | [4b7d 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B3C678066B77D60A2F4E017172F620379ED82A40D573B44D7E235DF4359CDC7C +peer0.org2.example.com | [4b7e 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4b7f 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4b80 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4b81 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b82 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b83 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b84 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b85 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b86 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b87 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b89 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b88 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b8a 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b8b 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b8c 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b8d 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b8e 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b8f 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [4b90 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b91 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b92 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b93 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b94 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4b95 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b96 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4b97 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b98 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b99 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b9a 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b9b 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4b9c 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4b9d 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4b9e 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede830 gate 1589998900945381200 evaluation starts +peer0.org2.example.com | [4b9f 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ba0 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede830 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ba1 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4ba2 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede830 principal evaluation fails +peer0.org2.example.com | [4ba3 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ede830 gate 1589998900945381200 evaluation fails +peer0.org2.example.com | [4ba4 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4ba5 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4ba6 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4ba7 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ededa0 gate 1589998900948686300 evaluation starts +peer0.org2.example.com | [4ba8 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ededa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ba9 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ededa0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4baa 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ededa0 principal matched by identity 0 +peer0.org2.example.com | [4bab 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer0.org2.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer0.org2.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer0.org2.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer0.org2.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer1.org1.example.com | 00000010 fe ca 36 b2 6a e3 8c a4 b8 ac 7c 65 44 95 a2 fd |..6.j.....|eD...| +peer1.org1.example.com | [4aa3 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 a9 99 4a 97 fa 4d 43 48 f7 7c 5d |0D. s..J..MCH.|]| +peer1.org1.example.com | 00000010 ad 96 6e e3 77 91 a6 3d af b8 df f4 03 5e c1 6e |..n.w..=.....^.n| +peer1.org1.example.com | 00000020 38 fa 05 85 02 20 44 af b9 9c 50 71 8a 26 38 45 |8.... D...Pq.&8E| +peer1.org1.example.com | 00000030 fe 75 46 b6 7e 3b ba 4f 8d db ed 0c 36 61 bc 20 |.uF.~;.O....6a. | +peer1.org1.example.com | 00000040 f7 26 ba f8 ab 6c |.&...l| +peer1.org1.example.com | [4aa4 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4aa5 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4aa6 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479b100 gate 1589998914135819400 evaluation succeeds +peer1.org1.example.com | [4aa7 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4aa8 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4aa9 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4aaa 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4aab 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4aac 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [4aad 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4aae 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4aaf 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [4ab0 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ab1 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ab2 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ab3 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ab4 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ab5 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ab6 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ab7 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ab8 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ab9 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4aba 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4abb 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4abc 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4abd 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4abe 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4abf 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4ac0 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ac1 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ac2 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ac3 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ac4 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ac5 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ac6 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:33516 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ac7 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ac8 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ac9 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4aca 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4acb 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 6e 3d 42 44 13 e6 86 5e 35 a9 47 7f e6 09 cb |_n=BD...^5.G....| +peer1.org1.example.com | 00000010 e6 f1 97 8f 4e b4 37 8a a9 ea 72 66 93 6c 09 68 |....N.7...rf.l.h| +peer1.org1.example.com | [4acd 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f ca d0 08 4f e0 72 d2 9d b5 bc 1e |0D. o...O.r.....| +peer1.org1.example.com | 00000010 5f d3 c2 4b 97 a1 f7 f1 1f 12 4d 09 d2 05 30 f0 |_..K......M...0.| +peer1.org1.example.com | 00000020 ed 1b 06 a8 02 20 1d 0a af b4 7f 11 c0 a9 ef b1 |..... ..........| +peer1.org1.example.com | 00000030 99 5f 80 b4 c1 62 f6 eb f8 46 f8 ff 40 6b 5f 63 |._...b...F..@k_c| +peer1.org1.example.com | 00000040 94 9f 46 12 00 5a |..F..Z| +peer1.org1.example.com | [4acc 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ace 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4acf 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [4ad0 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4ad1 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4ad2 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4ad3 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ad4 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ad5 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ad6 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ad7 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ad8 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4ad9 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4ada 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4adb 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4adc 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4add 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ade 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4adf 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ae0 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ae1 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ae2 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ae3 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ae4 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4ae5 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:37784 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ae6 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a14 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4a15 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4a16 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4a17 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4a90 gate 1589998900634412800 evaluation starts +peer1.org2.example.com | [4a18 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4a90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4a19 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4a90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4a1a 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4a90 principal matched by identity 0 +peer1.org2.example.com | [4a1b 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer1.org2.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer1.org2.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer1.org2.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer1.org2.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer1.org2.example.com | [4a1d 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4a90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4a1e 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4a90 gate 1589998900634412800 evaluation succeeds +peer1.org2.example.com | [4a1f 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4a20 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4a21 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4a22 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4a23 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4a24 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4a25 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4a26 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4a27 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4a28 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a29 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bad 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ededa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4bae 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ededa0 gate 1589998900948686300 evaluation succeeds +peer0.org2.example.com | [4baf 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4bb0 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4bb1 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4bb2 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4bb3 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bb4 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4bb5 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bb6 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4bb7 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer0.org2.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer0.org2.example.com | [4bb8 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer0.org2.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer0.org2.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer0.org2.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer0.org2.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer0.org2.example.com | [4bb9 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4bba 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4bbb 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bbc 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bbd 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bbe 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bbf 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bc0 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4bc1 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer0.org2.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer0.org2.example.com | [4bc2 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer0.org2.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer0.org2.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer0.org2.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer0.org2.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer0.org2.example.com | [4bc3 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4bc4 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4bc5 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bc6 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bc7 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bc9 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4bc8 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bca 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer0.org2.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer0.org2.example.com | [4bcb 05-20 18:21:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer0.org2.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer0.org2.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer0.org2.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer0.org2.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer0.org2.example.com | [4bcc 05-20 18:21:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [4bcd 05-20 18:21:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 35 60 ab 8a 38 a2 a2 63 aa 66 62 |0D. *5`..8..c.fb| +peer0.org2.example.com | 00000010 96 6a 98 59 dd c9 cc 88 6a 55 6e b0 35 23 29 5d |.j.Y....jUn.5#)]| +peer0.org2.example.com | 00000020 f9 8d 6b 16 02 20 44 26 45 e1 3f 1d 9d 4d a4 f1 |..k.. D&E.?..M..| +peer0.org2.example.com | 00000030 90 f7 cb a4 1e b4 53 0d 57 bd 98 29 84 0b 71 62 |......S.W..)..qb| +peer0.org2.example.com | 00000040 9a dc aa 51 d2 de |...Q..| +peer1.org1.example.com | [4ae7 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4ae8 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a2a 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a2b 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [4a2c 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a2d 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a2e 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a2f 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4a30 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a31 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a32 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:.\361\310\200\327\364\206\241'X\311\357\002\271\021\305i\204'8rf\027\216\302\n\352\212" > alive: alive: alive:\255B\251\237~\002 u\372\346\277\313>`NB\210\242\262O\350\362\235\252\354\230\211\222E\271\313\214Ne\2127\240SW" > +peer1.org2.example.com | [4a33 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a34 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a35 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4a36 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a37 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a38 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a39 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a3a 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a3b 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a3c 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a3d 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a3e 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a3f 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [4a40 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a41 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a42 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a43 05-20 18:21:40.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [4a44 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a45 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a46 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4a47 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a48 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a49 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a4a 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bce 05-20 18:21:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4bcf 05-20 18:21:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4bd0 05-20 18:21:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bd1 05-20 18:21:40.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bd2 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bd3 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bd4 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bd5 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4bd6 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bd7 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4bd8 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4bd9 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4bda 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4bdb 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4bdc 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4bdd 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4eab0 gate 1589998901017280200 evaluation starts +peer0.org2.example.com | [4bde 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4eab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4bdf 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4eab0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4be0 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4eab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4be1 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4eab0 principal evaluation fails +peer0.org2.example.com | [4be2 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4eab0 gate 1589998901017280200 evaluation fails +peer0.org2.example.com | [4be3 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4be4 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4be5 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4be6 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4f020 gate 1589998901022070900 evaluation starts +peer0.org2.example.com | [4be7 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4f020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4be8 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4f020 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4be9 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4f020 principal matched by identity 0 +peer1.org2.example.com | [4a4b 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a4c 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4a4d 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer1.org2.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer1.org2.example.com | [4a4e 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer1.org2.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer1.org2.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer1.org2.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer1.org2.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer1.org2.example.com | [4a4f 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [4a50 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a51 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 35 60 ab 8a 38 a2 a2 63 aa 66 62 |0D. *5`..8..c.fb| +peer1.org2.example.com | 00000010 96 6a 98 59 dd c9 cc 88 6a 55 6e b0 35 23 29 5d |.j.Y....jUn.5#)]| +peer1.org2.example.com | 00000020 f9 8d 6b 16 02 20 44 26 45 e1 3f 1d 9d 4d a4 f1 |..k.. D&E.?..M..| +peer1.org2.example.com | 00000030 90 f7 cb a4 1e b4 53 0d 57 bd 98 29 84 0b 71 62 |......S.W..)..qb| +peer1.org2.example.com | 00000040 9a dc aa 51 d2 de |...Q..| +peer1.org2.example.com | [4a52 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a53 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a54 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [4a55 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [4a56 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4a57 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4a58 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4a59 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a5a 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a5b 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a5c 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [4a5d 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a5e 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a5f 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4a60 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\255B\251\237~\002 u\372\346\277\313>`NB\210\242\262O\350\362\235\252\354\230\211\222E\271\313\214Ne\2127\240SW" > +peer1.org2.example.com | [4a61 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a62 05-20 18:21:40.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [474b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [474c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [474d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 gate 1589998895654332700 evaluation succeeds +peer0.org1.example.com | [474e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [474f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4750 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4751 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4752 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4753 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4754 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4755 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4756 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4757 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4758 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 gate 1589998895655441100 evaluation starts +peer0.org1.example.com | [4759 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [475a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [475b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [475c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 principal evaluation fails +peer0.org1.example.com | [475d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 gate 1589998895655441100 evaluation fails +peer0.org1.example.com | [475e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [475f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4760 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4761 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 gate 1589998895655844500 evaluation starts +peer0.org1.example.com | [4762 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4763 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4764 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 principal matched by identity 0 +peer0.org1.example.com | [4765 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [4766 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [4767 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4768 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 gate 1589998895655844500 evaluation succeeds +peer0.org1.example.com | [4769 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [476a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [476b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [476c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [476d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [476e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 17748581153308284860, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org1.example.com | [476f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4770 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17748581153308284860, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org1.example.com | [4771 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4772 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bea 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +peer0.org2.example.com | 00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +peer0.org2.example.com | [4beb 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +peer0.org2.example.com | 00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +peer0.org2.example.com | 00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +peer0.org2.example.com | 00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +peer0.org2.example.com | 00000040 14 88 56 f5 8e 65 |..V..e| +peer0.org2.example.com | [4bec 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4f020 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4bed 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f4f020 gate 1589998901022070900 evaluation succeeds +peer0.org2.example.com | [4bee 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4bef 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4bf0 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4bf1 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4bf2 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4bf3 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4bf4 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4bf5 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4bf6 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4bf7 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bf8 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bf9 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [4bfa 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bfb 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bfc 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bfd 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4bff 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\255B\251\237~\002 u\372\346\277\313>`NB\210\242\262O\350\362\235\252\354\230\211\222E\271\313\214Ne\2127\240SW" > alive: alive: alive:.\361\310\200\327\364\206\241'X\311\357\002\271\021\305i\204'8rf\027\216\302\n\352\212" > +peer0.org2.example.com | [4c00 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c01 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bfe 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c02 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c03 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c04 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c05 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [4c06 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a63 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a64 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a65 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a66 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4a67 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a68 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4a69 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4a6a 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4a6b 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4a6c 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4a6d 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4a6e 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26540 gate 1589998901015055900 evaluation starts +peer1.org2.example.com | [4a6f 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26540 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4a70 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26540 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4a71 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4a72 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26540 principal evaluation fails +peer1.org2.example.com | [4a73 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26540 gate 1589998901015055900 evaluation fails +peer1.org2.example.com | [4a74 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4a75 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4a76 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4a77 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26ab0 gate 1589998901025053100 evaluation starts +peer1.org2.example.com | [4a78 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4a79 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26ab0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4a7a 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26ab0 principal matched by identity 0 +peer1.org2.example.com | [4a7b 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +peer1.org2.example.com | 00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +peer1.org2.example.com | [4a7c 05-20 18:21:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +peer1.org2.example.com | 00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +peer1.org2.example.com | 00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +peer1.org2.example.com | 00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +peer1.org2.example.com | 00000040 14 88 56 f5 8e 65 |..V..e| +peer1.org2.example.com | [4a7d 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26ab0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4a7e 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26ab0 gate 1589998901025053100 evaluation succeeds +peer1.org2.example.com | [4a7f 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4a80 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4a81 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4a82 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4a83 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4a84 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4a85 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4a86 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4a87 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4a88 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a89 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a8a 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a8b 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [4a8c 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a8d 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a8e 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4a8f 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4a90 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\255B\251\237~\002 u\372\346\277\313>`NB\210\242\262O\350\362\235\252\354\230\211\222E\271\313\214Ne\2127\240SW" > +peer1.org2.example.com | [4a91 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a92 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a93 05-20 18:21:41.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [4a94 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4a95 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [4a96 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a97 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a98 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4a99 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [4a9a 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a9b 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a9c 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4a9d 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4a9e 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4a9f 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4aa0 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4aa1 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4aa2 05-20 18:21:41.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4aa3 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4aa4 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4aa5 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4aa6 05-20 18:21:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4aa7 05-20 18:21:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4aa8 05-20 18:21:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4aa9 05-20 18:21:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161046 +peer1.org2.example.com | [4aaa 05-20 18:21:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6F73821EC15A80C069902527156FD8EAC0352C6DC980351285E1B57480A09329 +peer1.org2.example.com | [4aab 05-20 18:21:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4aac 05-20 18:21:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4aad 05-20 18:21:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4aae 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\201\352\203\345I\274c\034yv\002 G\334\372Ciw/\335|-\220\256\233\366\354\361\005U,\232V\272\357V\0331\004\207\037C\220\335" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4aaf 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ab0 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\201\352\203\345I\274c\034yv\002 G\334\372Ciw/\335|-\220\256\233\366\354\361\005U,\232V\272\357V\0331\004\207\037C\220\335" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ab1 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4ab2 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4ab3 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ab4 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4ab5 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4773 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4774 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4775 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4776 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4777 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4778 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4779 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 gate 1589998895657366900 evaluation starts +peer0.org1.example.com | [477a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [477b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [477c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [477d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 principal evaluation fails +peer0.org1.example.com | [477e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 gate 1589998895657366900 evaluation fails +peer0.org1.example.com | [477f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4780 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4781 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4782 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 gate 1589998895657666700 evaluation starts +peer0.org1.example.com | [4783 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4784 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4785 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 principal matched by identity 0 +peer0.org1.example.com | [4786 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +peer0.org1.example.com | 00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +peer0.org1.example.com | [4787 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +peer0.org1.example.com | 00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +peer0.org1.example.com | 00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +peer0.org1.example.com | 00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +peer0.org1.example.com | 00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +peer0.org1.example.com | [4788 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4789 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 gate 1589998895657666700 evaluation succeeds +peer0.org1.example.com | [478a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [478b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [478c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [478d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [478e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [478f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4790 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4791 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 7a 2c ec a1 00 23 17 40 5a 90 0a 42 ce 8c 74 |.z,...#.@Z..B..t| +peer0.org1.example.com | 00000010 a9 00 63 c1 09 5f 89 94 a5 36 95 ed 62 69 5f 98 |..c.._...6..bi_.| +peer0.org1.example.com | [4792 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 88 1f 65 94 e6 4c 63 90 e4 2f |0E.!....e..Lc../| +peer0.org1.example.com | 00000010 50 3d 3d cb 92 aa 9c 25 8e 47 06 8f f7 2b 9a d8 |P==....%.G...+..| +peer0.org1.example.com | 00000020 5f 72 8c e7 85 02 20 1e 56 2c ae 4b da f1 f0 86 |_r.... .V,.K....| +peer0.org1.example.com | 00000030 a8 0c e1 b4 bf 5e ab 6c de 4d 65 69 cb 54 0b 4b |.....^.l.Mei.T.K| +peer0.org1.example.com | 00000040 7f 34 28 90 04 e2 48 |.4(...H| +peer0.org1.example.com | [4793 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4794 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4795 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4796 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4797 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4798 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [4799 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [479a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [479b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [479c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [479d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [479e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [479f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [47a0 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [47a1 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [47a2 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 gate 1589998895659814800 evaluation starts +peer0.org1.example.com | [47a3 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47a4 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [47a5 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [47a6 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 principal evaluation fails +peer0.org1.example.com | [47a7 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 gate 1589998895659814800 evaluation fails +peer0.org1.example.com | [47a8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47a9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47aa 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [47ab 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 gate 1589998895660159200 evaluation starts +peer0.org1.example.com | [47ac 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47ad 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [47ae 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 principal matched by identity 0 +peer0.org1.example.com | [47af 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +peer0.org1.example.com | 00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +peer0.org1.example.com | [47b0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +peer0.org1.example.com | 00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +peer0.org1.example.com | 00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +peer0.org1.example.com | 00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +peer0.org1.example.com | 00000040 06 08 5c 29 da 83 b8 |..\)...| +peer0.org1.example.com | [47b1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [47b2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 gate 1589998895660159200 evaluation succeeds +peer0.org1.example.com | [47b3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47b4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47b5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [47b6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [47b7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47b8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ab6 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4ab7 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [4ab8 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ab9 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4aba 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [4abb 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4abc 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610151801 +peer1.org2.example.com | [4abd 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A147E33DBD408478DBC76011C08E61135CA1A02E64D3BAF7834F3F50C0630A5F +peer1.org2.example.com | [4abe 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [4abf 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ac0 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ac1 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ac2 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ac3 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4ac4 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ac5 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ac6 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [4ac7 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4ac8 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ac9 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4aca 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4acb 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4acc 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4acd 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4ace 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4acf 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ad0 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4ad1 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4ad2 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4ad3 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b676d0 gate 1589998901223424600 evaluation starts +peer1.org2.example.com | [4ad4 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b676d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4ad5 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b676d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4c07 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\201\352\203\345I\274c\034yv\002 G\334\372Ciw/\335|-\220\256\233\366\354\361\005U,\232V\272\357V\0331\004\207\037C\220\335" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c08 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\201\352\203\345I\274c\034yv\002 G\334\372Ciw/\335|-\220\256\233\366\354\361\005U,\232V\272\357V\0331\004\207\037C\220\335" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c09 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c0a 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\201\352\203\345I\274c\034yv\002 G\334\372Ciw/\335|-\220\256\233\366\354\361\005U,\232V\272\357V\0331\004\207\037C\220\335" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c0b 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4c0c 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 73 82 1e c1 5a 80 c0 69 90 25 27 15 6f d8 ea |os...Z..i.%'.o..| +peer0.org2.example.com | 00000010 c0 35 2c 6d c9 80 35 12 85 e1 b5 74 80 a0 93 29 |.5,m..5....t...)| +peer0.org2.example.com | [4c0d 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 5a 29 65 a2 f7 7e 5b de e0 85 |0E.!..Z)e..~[...| +peer0.org2.example.com | 00000010 18 f5 1b bf 8d 7a 8f 3f af 34 53 df fe 45 23 ed |.....z.?.4S..E#.| +peer0.org2.example.com | 00000020 8d 59 58 4c ca 02 20 4e fb f7 56 49 f9 05 19 33 |.YXL.. N..VI...3| +peer0.org2.example.com | 00000030 65 72 94 04 07 dc e7 fb b5 87 b1 2a 38 19 b6 27 |er.........*8..'| +peer0.org2.example.com | 00000040 62 a1 6d e9 cb 41 98 |b.m..A.| +peer0.org2.example.com | [4c0e 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [4c10 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [4c11 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [4c12 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [4c13 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [4c14 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4c15 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...9B28120C08B4D68C81C1EFB388161004 +peer0.org2.example.com | [4c16 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2D32E2FA8875C3C65D71EAD2DB2E34E1FD381C2596B9F2FABCCDDCAE5106BB10 +peer0.org2.example.com | [4c17 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [4c0f 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 3b 32 bb 93 48 54 35 8e 45 6f |0E.!..;2..HT5.Eo| +peer0.org2.example.com | 00000010 62 a9 40 14 16 6d 39 34 dd 36 3e 81 ea 83 e5 49 |b.@..m94.6>....I| +peer0.org2.example.com | 00000020 bc 63 1c 79 76 02 20 47 dc fa 43 69 77 2f dd 7c |.c.yv. G..Ciw/.|| +peer0.org2.example.com | 00000030 2d 90 ae 9b f6 ec f1 05 55 2c 9a 56 ba ef 56 1b |-.......U,.V..V.| +peer0.org2.example.com | 00000040 31 04 87 1f 43 90 dd |1...C..| +peer0.org2.example.com | [4c18 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c19 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c1a 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c1b 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c1c 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4c1d 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c1e 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c1f 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 71 bytes +peer0.org2.example.com | [4c20 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c21 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [4c22 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [4c23 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 47 e3 3d bd 40 84 78 db c7 60 11 c0 8e 61 13 |.G.=.@.x..`...a.| +peer0.org2.example.com | 00000010 5c a1 a0 2e 64 d3 ba f7 83 4f 3f 50 c0 63 0a 5f |\...d....O?P.c._| +peer0.org2.example.com | [4c24 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 88 51 cd 22 40 c9 84 d6 e5 ef |0E.!...Q."@.....| +peer0.org1.example.com | [47b9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [47ba 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47bb 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47bc 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [47bd 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [47be 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [47bf 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 gate 1589998895661226700 evaluation starts +peer0.org1.example.com | [47c0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47c1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [47c2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [47c3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 principal evaluation fails +peer0.org1.example.com | [47c4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 gate 1589998895661226700 evaluation fails +peer0.org1.example.com | [47c5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47c6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47c7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [47c8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 gate 1589998895661525800 evaluation starts +peer0.org1.example.com | [47c9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47ca 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [47cb 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 principal matched by identity 0 +peer0.org1.example.com | [47cc 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [47cd 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [47ce 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [47cf 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 gate 1589998895661525800 evaluation succeeds +peer0.org1.example.com | [47d0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47d1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47d2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [47d3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [47d4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [47d5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [47d6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47d7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47d8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4ad6 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b676d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4ad7 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b676d0 principal evaluation fails +peer1.org2.example.com | [4ad8 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b676d0 gate 1589998901223424600 evaluation fails +peer1.org2.example.com | [4ad9 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4ada 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4adb 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4adc 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67c40 gate 1589998901228428400 evaluation starts +peer1.org2.example.com | [4add 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4ade 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67c40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4adf 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67c40 principal matched by identity 0 +peer1.org2.example.com | [4ae0 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ae1 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +peer1.org2.example.com | 00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +peer1.org2.example.com | [4ae2 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +peer1.org2.example.com | 00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +peer1.org2.example.com | 00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +peer1.org2.example.com | 00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +peer1.org2.example.com | 00000040 14 88 56 f5 8e 65 |..V..e| +peer1.org2.example.com | [4ae3 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67c40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4ae4 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b67c40 gate 1589998901228428400 evaluation succeeds +peer1.org2.example.com | [4ae5 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ae6 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ae7 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4ae8 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4ae9 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4aea 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4aeb 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4aec 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer1.org2.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer1.org2.example.com | [4aed 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer1.org2.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer1.org2.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer1.org2.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer1.org2.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer1.org2.example.com | [4aee 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4aef 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4af0 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4af1 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 73 82 1e c1 5a 80 c0 69 90 25 27 15 6f d8 ea |os...Z..i.%'.o..| +peer1.org2.example.com | 00000010 c0 35 2c 6d c9 80 35 12 85 e1 b5 74 80 a0 93 29 |.5,m..5....t...)| +peer1.org2.example.com | [4af2 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 5a 29 65 a2 f7 7e 5b de e0 85 |0E.!..Z)e..~[...| +peer1.org2.example.com | 00000010 18 f5 1b bf 8d 7a 8f 3f af 34 53 df fe 45 23 ed |.....z.?.4S..E#.| +peer1.org2.example.com | 00000020 8d 59 58 4c ca 02 20 4e fb f7 56 49 f9 05 19 33 |.YXL.. N..VI...3| +peer1.org2.example.com | 00000030 65 72 94 04 07 dc e7 fb b5 87 b1 2a 38 19 b6 27 |er.........*8..'| +peer1.org2.example.com | 00000040 62 a1 6d e9 cb 41 98 |b.m..A.| +peer1.org2.example.com | [4af3 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4af4 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4af5 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4af6 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4af7 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4af8 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4af9 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 71 bytes +peer1.org2.example.com | [4afa 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4afc 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 32 e2 fa 88 75 c3 c6 5d 71 ea d2 db 2e 34 e1 |-2...u..]q....4.| +peer1.org2.example.com | 00000010 fd 38 1c 25 96 b9 f2 fa bc cd dc ae 51 06 bb 10 |.8.%........Q...| +peer1.org2.example.com | [4afd 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 5f 6a dd 99 59 2d b1 f1 dc f3 |0E.!.._j..Y-....| +peer1.org2.example.com | 00000010 00 a2 aa df 3c dd 03 48 11 5b 99 1e e2 e3 b1 b4 |....<..H.[......| +peer1.org2.example.com | 00000020 17 0b 09 66 81 02 20 75 ce 9f 94 16 2e c8 a2 d7 |...f.. u........| +peer1.org2.example.com | 00000030 7b 48 49 26 f3 1b d3 2d f4 22 e2 1f db 15 6e fb |{HI&...-."....n.| +peer1.org2.example.com | 00000040 87 34 4b a7 98 72 29 |.4K..r)| +peer1.org2.example.com | [4afb 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4afe 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4aff 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [4b00 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4b02 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b01 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4b04 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4b03 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b06 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us proposal +peer1.org2.example.com | [4b05 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4b07 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4b08 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4b09 05-20 18:21:41.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba8350 gate 1589998901249301600 evaluation starts +peer1.org2.example.com | [4b0a 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba8350 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4b0b 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba8350 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4b0c 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba8350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4b0d 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba8350 principal evaluation fails +peer1.org2.example.com | [4b0e 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba8350 gate 1589998901249301600 evaluation fails +peer1.org2.example.com | [4b0f 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4b10 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4b11 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4b12 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba88c0 gate 1589998901253589300 evaluation starts +peer1.org2.example.com | [4b13 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba88c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4b14 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba88c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4b15 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba88c0 principal matched by identity 0 +peer1.org2.example.com | [4b16 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer1.org2.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer1.org2.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer1.org2.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer1.org2.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer1.org2.example.com | [4b18 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba88c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4b19 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba88c0 gate 1589998901253589300 evaluation succeeds +peer1.org2.example.com | [4b1a 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4b1b 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4b1c 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4b1d 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4b1e 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4b1f 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b20 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4b21 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer1.org2.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer1.org2.example.com | [4b22 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer1.org2.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer1.org2.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer1.org2.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer1.org2.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer1.org2.example.com | [4b23 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4b24 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b25 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4b26 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 73 82 1e c1 5a 80 c0 69 90 25 27 15 6f d8 ea |os...Z..i.%'.o..| +peer1.org2.example.com | 00000010 c0 35 2c 6d c9 80 35 12 85 e1 b5 74 80 a0 93 29 |.5,m..5....t...)| +peer1.org2.example.com | [4b27 05-20 18:21:41.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 5a 29 65 a2 f7 7e 5b de e0 85 |0E.!..Z)e..~[...| +peer1.org2.example.com | 00000010 18 f5 1b bf 8d 7a 8f 3f af 34 53 df fe 45 23 ed |.....z.?.4S..E#.| +peer1.org2.example.com | 00000020 8d 59 58 4c ca 02 20 4e fb f7 56 49 f9 05 19 33 |.YXL.. N..VI...3| +peer1.org2.example.com | 00000030 65 72 94 04 07 dc e7 fb b5 87 b1 2a 38 19 b6 27 |er.........*8..'| +peer1.org2.example.com | 00000040 62 a1 6d e9 cb 41 98 |b.m..A.| +peer1.org2.example.com | [4b28 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4b29 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4b2a 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b2b 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b2c 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b2d 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [4b2e 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4b2f 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 73 82 1e c1 5a 80 c0 69 90 25 27 15 6f d8 ea |os...Z..i.%'.o..| +peer1.org2.example.com | 00000010 c0 35 2c 6d c9 80 35 12 85 e1 b5 74 80 a0 93 29 |.5,m..5....t...)| +peer1.org2.example.com | [4b30 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 5a 29 65 a2 f7 7e 5b de e0 85 |0E.!..Z)e..~[...| +peer1.org2.example.com | 00000010 18 f5 1b bf 8d 7a 8f 3f af 34 53 df fe 45 23 ed |.....z.?.4S..E#.| +peer1.org2.example.com | 00000020 8d 59 58 4c ca 02 20 4e fb f7 56 49 f9 05 19 33 |.YXL.. N..VI...3| +peer1.org2.example.com | 00000030 65 72 94 04 07 dc e7 fb b5 87 b1 2a 38 19 b6 27 |er.........*8..'| +peer1.org2.example.com | 00000040 62 a1 6d e9 cb 41 98 |b.m..A.| +peer1.org2.example.com | [4b31 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [4b32 05-20 18:21:41.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 3b 32 bb 93 48 54 35 8e 45 6f |0E.!..;2..HT5.Eo| +peer1.org2.example.com | 00000010 62 a9 40 14 16 6d 39 34 dd 36 3e 81 ea 83 e5 49 |b.@..m94.6>....I| +peer1.org2.example.com | 00000020 bc 63 1c 79 76 02 20 47 dc fa 43 69 77 2f dd 7c |.c.yv. G..Ciw/.|| +peer1.org2.example.com | 00000030 2d 90 ae 9b f6 ec f1 05 55 2c 9a 56 ba ef 56 1b |-.......U,.V..V.| +peer1.org2.example.com | 00000040 31 04 87 1f 43 90 dd |1...C..| +peer1.org2.example.com | [4b33 05-20 18:21:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | 00000010 2b 01 01 46 c2 91 4d 1f 7e 3a 08 8d dc 16 30 f6 |+..F..M.~:....0.| +peer0.org2.example.com | 00000020 34 c8 8c c7 26 02 20 3a 94 9a 95 5b a1 78 d6 54 |4...&. :...[.x.T| +peer0.org2.example.com | 00000030 1e c4 5b 94 a5 0a 18 bf 4a 31 5b e3 37 d9 14 0d |..[.....J1[.7...| +peer0.org2.example.com | 00000040 82 9c ed 26 b0 be b2 |...&...| +peer0.org2.example.com | [4c25 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c26 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c27 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c28 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [4c29 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [4c2a 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [4c2b 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> INFO a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Some peer is already a leader +peer0.org2.example.com | [4c2c 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [4c2d 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [4c2e 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [4c2f 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [4c30 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [4c31 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4c32 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4c33 05-20 18:21:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4c34 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c35 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c36 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c37 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [4c38 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c39 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c3a 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4c3b 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c3c 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c3d 05-20 18:21:41.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\201\352\203\345I\274c\034yv\002 G\334\372Ciw/\335|-\220\256\233\366\354\361\005U,\232V\272\357V\0331\004\207\037C\220\335" > > alive:.\361\310\200\327\364\206\241'X\311\357\002\271\021\305i\204'8rf\027\216\302\n\352\212" > +peer0.org2.example.com | [4c3e 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c3f 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c40 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c41 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c42 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4c43 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47d9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [47da 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [47db 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47dc 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [47dd 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 gate 1589998895663307400 evaluation starts +peer0.org1.example.com | [47de 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47df 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [47e0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [47e1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [47e2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [47e3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 principal matched by identity 0 +peer0.org1.example.com | [47e4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [47e5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [47e6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [47e7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 gate 1589998895663307400 evaluation succeeds +peer0.org1.example.com | [47e8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47e9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47ea 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [47eb 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [47ec 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47ed 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [47ee 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47ef 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +peer0.org1.example.com | 00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +peer0.org1.example.com | [47f0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +peer0.org1.example.com | 00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +peer0.org1.example.com | 00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +peer0.org1.example.com | 00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +peer0.org1.example.com | 00000040 11 94 cc da c0 51 37 |.....Q7| +peer0.org1.example.com | [47f1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47f2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47f3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [47f4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47f5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47f6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [47f7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [47f8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [47f9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 gate 1589998895665520900 evaluation starts +peer0.org1.example.com | [47fa 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47fb 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [47fc 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [47fd 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 principal evaluation fails +peer0.org1.example.com | [47fe 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 gate 1589998895665520900 evaluation fails +peer0.org1.example.com | [47ff 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4800 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4801 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4802 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 gate 1589998895665902200 evaluation starts +peer0.org1.example.com | [4803 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4804 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4805 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 principal matched by identity 0 +peer0.org1.example.com | [4806 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +peer0.org1.example.com | 00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +peer0.org1.example.com | [4807 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +peer0.org1.example.com | 00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +peer0.org1.example.com | 00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +peer0.org1.example.com | 00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +peer0.org1.example.com | 00000040 02 20 e5 4b b0 d8 |. .K..| +peer0.org1.example.com | [4808 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4809 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 gate 1589998895665902200 evaluation succeeds +peer0.org1.example.com | [480a 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [480b 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [480c 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [480d 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [480e 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +peer0.org1.example.com | 00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +peer0.org1.example.com | [480f 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +peer0.org1.example.com | 00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +peer0.org1.example.com | 00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +peer0.org1.example.com | 00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +peer0.org1.example.com | 00000040 b2 b9 f9 6c 2a cd |...l*.| +peer0.org1.example.com | [4810 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4811 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4812 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4813 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4814 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4815 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4c44 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4c45 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4c46 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4c47 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4c48 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4c49 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4c4a 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ded40 gate 1589998903350382600 evaluation starts +peer0.org2.example.com | [4c4b 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ded40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4c4c 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ded40 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4c4d 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ded40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4c4e 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ded40 principal evaluation fails +peer0.org2.example.com | [4c4f 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ded40 gate 1589998903350382600 evaluation fails +peer0.org2.example.com | [4c50 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4c51 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4c52 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4c53 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df2b0 gate 1589998903351328000 evaluation starts +peer0.org2.example.com | [4c54 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df2b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4c55 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df2b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4c56 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df2b0 principal matched by identity 0 +peer0.org2.example.com | [4c57 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 4b 2b 9f 23 a7 43 6f be a1 6b 0b b1 0f 0c 16 |cK+.#.Co..k.....| +peer0.org2.example.com | 00000010 ba bc 0f 7b 1b 6e d1 9b fd a5 d5 b7 69 dd 65 a8 |...{.n......i.e.| +peer0.org2.example.com | [4c58 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 00 f3 a7 29 10 8a f3 4c 82 bc 92 |0D. S...)...L...| +peer0.org2.example.com | 00000010 ae 04 32 ff 35 a2 9c a6 ee be 7c 17 2b f3 8e d3 |..2.5.....|.+...| +peer0.org2.example.com | 00000020 0c 14 f3 2d 02 20 35 53 21 9a 97 61 cd ac 4f 15 |...-. 5S!..a..O.| +peer0.org2.example.com | 00000030 ca e0 88 eb 61 de d8 b8 ff b7 94 86 7e 3e 60 58 |....a.......~>`X| +peer0.org2.example.com | 00000040 c3 c3 38 f5 87 80 |..8...| +peer0.org2.example.com | [4c59 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df2b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4c5a 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034df2b0 gate 1589998903351328000 evaluation succeeds +peer0.org2.example.com | [4c5b 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4c5c 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4c5d 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4816 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4817 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4818 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 gate 1589998895667800500 evaluation starts +peer0.org1.example.com | [4819 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [481a 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [481b 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [481c 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 principal evaluation fails +peer0.org1.example.com | [481d 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 gate 1589998895667800500 evaluation fails +peer0.org1.example.com | [481e 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [481f 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4820 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4821 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 gate 1589998895668233000 evaluation starts +peer0.org1.example.com | [4822 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4823 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4824 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 principal matched by identity 0 +peer0.org1.example.com | [4825 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4826 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4827 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4828 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 gate 1589998895668233000 evaluation succeeds +peer0.org1.example.com | [4829 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [482a 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [482b 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [482c 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [482d 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [482e 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [482f 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4830 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4831 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4832 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4833 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 gate 1589998895669075700 evaluation starts +peer0.org1.example.com | [4834 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4835 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4836 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4837 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 principal evaluation fails +peer0.org1.example.com | [4838 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 gate 1589998895669075700 evaluation fails +peer0.org1.example.com | [4839 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [483a 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [483b 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [483c 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 gate 1589998895669845900 evaluation starts +peer0.org1.example.com | [483d 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [483e 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [483f 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 principal matched by identity 0 +peer0.org1.example.com | [4840 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4841 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4842 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4843 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 gate 1589998895669845900 evaluation succeeds +peer0.org1.example.com | [4844 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4845 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4846 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4847 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4848 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4849 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [484a 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [484b 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [484c 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [484d 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [484e 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [484f 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4850 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4851 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4852 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4853 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4854 05-20 18:21:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4855 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4856 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4857 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4858 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4859 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [485a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [485b 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [485c 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [485d 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [485e 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [485f 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [4860 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [4861 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [4862 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [4863 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4864 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4865 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4b34 05-20 18:21:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [4b35 05-20 18:21:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b36 05-20 18:21:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b37 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b38 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b39 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b3a 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4b3b 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b3c 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4b3d 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4b3e 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4b3f 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4b40 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4b41 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4b42 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be8340 gate 1589998903338591800 evaluation starts +peer1.org2.example.com | [4b43 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be8340 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4b44 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be8340 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4b45 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be8340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4b46 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be8340 principal evaluation fails +peer1.org2.example.com | [4b47 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be8340 gate 1589998903338591800 evaluation fails +peer1.org2.example.com | [4b48 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4b49 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4b4a 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4b4b 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be88b0 gate 1589998903338979900 evaluation starts +peer1.org2.example.com | [4b4c 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be88b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4b4d 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be88b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4b4e 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be88b0 principal matched by identity 0 +peer1.org2.example.com | [4b4f 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 4b 2b 9f 23 a7 43 6f be a1 6b 0b b1 0f 0c 16 |cK+.#.Co..k.....| +peer1.org2.example.com | 00000010 ba bc 0f 7b 1b 6e d1 9b fd a5 d5 b7 69 dd 65 a8 |...{.n......i.e.| +peer1.org2.example.com | [4b50 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 00 f3 a7 29 10 8a f3 4c 82 bc 92 |0D. S...)...L...| +peer1.org2.example.com | 00000010 ae 04 32 ff 35 a2 9c a6 ee be 7c 17 2b f3 8e d3 |..2.5.....|.+...| +peer1.org2.example.com | 00000020 0c 14 f3 2d 02 20 35 53 21 9a 97 61 cd ac 4f 15 |...-. 5S!..a..O.| +peer1.org2.example.com | 00000030 ca e0 88 eb 61 de d8 b8 ff b7 94 86 7e 3e 60 58 |....a.......~>`X| +peer1.org2.example.com | 00000040 c3 c3 38 f5 87 80 |..8...| +peer1.org2.example.com | [4b51 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be88b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4b52 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be88b0 gate 1589998903338979900 evaluation succeeds +peer1.org2.example.com | [4b53 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4c5e 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4c5f 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c60 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4c61 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4c62 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4c63 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4c64 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c65 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c66 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c67 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c68 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c69 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c6a 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c6b 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c6c 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c6d 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c6e 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4c6f 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c70 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4c71 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c72 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c73 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c74 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c75 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c76 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c77 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c78 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c79 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c7a 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c7b 05-20 18:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c7c 05-20 18:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c7d 05-20 18:21:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c7e 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c7f 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c80 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c81 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c82 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c83 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4c84 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161043 +peer0.org2.example.com | [4c85 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2B7E05BADFABBC4410F3CF33C658331C055A6CF6C2AD210503053AC17BC45D04 +peer0.org2.example.com | [4c86 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4c87 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4c88 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4c89 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [4c8a 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c8b 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c8c 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4c8d 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c8e 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4c8f 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c90 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4c91 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c92 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c93 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c94 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c95 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c96 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c97 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c98 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4c99 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c9a 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c9b 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c9c 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4c9d 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c9e 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4c9f 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ca0 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4ca1 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4ca2 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d ba 8c 28 4e d0 9c c1 ca 80 f9 b5 1b 29 85 cd |=..(N........)..| +peer0.org2.example.com | 00000010 db 85 4f c2 bb ed 7f e4 80 43 15 ef d4 92 d5 7c |..O......C.....|| +peer0.org2.example.com | [4ca3 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 98 2b fd 76 99 5b 26 b8 51 91 06 |0D. z.+.v.[&.Q..| +peer0.org2.example.com | 00000010 96 f7 2a 73 51 e9 e0 6d e3 b8 54 b1 74 a6 0a ff |..*sQ..m..T.t...| +peer0.org2.example.com | 00000020 cf cd 3e b3 02 20 7d ad 8f d6 d3 86 83 b6 2c 62 |..>.. }.......,b| +peer0.org2.example.com | 00000030 96 61 2f b2 d6 c7 33 66 b5 f5 0a e3 2d 85 c1 95 |.a/...3f....-...| +peer0.org2.example.com | 00000040 25 01 3a 4a 9b f6 |%.:J..| +peer0.org2.example.com | [4ca4 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4ca5 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4b54 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4b55 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4b56 05-20 18:21:43.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4b57 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b58 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4b59 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4b5a 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4b5b 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4b5c 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b5d 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b5e 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b5f 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b60 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b61 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b62 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b63 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b64 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b65 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b66 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b67 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b68 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b69 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b6a 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4b6b 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b6c 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b6d 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b6e 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4b6f 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b70 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b71 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b72 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b73 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b74 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b75 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4b76 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b77 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b78 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b79 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4866 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4867 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4868 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4869 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [486a 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [486b 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [486c 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [486d 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [486e 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [486f 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4870 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4871 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4872 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4873 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4874 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 gate 1589998896099408700 evaluation starts +peer0.org1.example.com | [4875 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4876 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4877 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4878 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 principal evaluation fails +peer0.org1.example.com | [4879 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 gate 1589998896099408700 evaluation fails +peer0.org1.example.com | [487a 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [487b 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [487c 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [487d 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 gate 1589998896100427900 evaluation starts +peer0.org1.example.com | [487e 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [487f 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4880 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 principal matched by identity 0 +peer0.org1.example.com | [4881 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [4882 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [4883 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4884 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 gate 1589998896100427900 evaluation succeeds +peer0.org1.example.com | [4885 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4ca6 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4ca7 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4ca8 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4ca9 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4caa 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cab 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cac 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cad 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cae 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4caf 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4cb0 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cb1 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4cb2 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4cb3 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cb4 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4cb5 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cb6 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4cb7 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cb8 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4cb9 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cba 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4cbb 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4cbc 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cbd 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4cbe 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cbf 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4cc0 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cc1 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4cc2 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4cc3 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b7a 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b7b 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b7c 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b7d 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4b7e 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 7e 05 ba df ab bc 44 10 f3 cf 33 c6 58 33 1c |+~.....D...3.X3.| +peer1.org2.example.com | 00000010 05 5a 6c f6 c2 ad 21 05 03 05 3a c1 7b c4 5d 04 |.Zl...!...:.{.].| +peer1.org2.example.com | [4b7f 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c2 02 c9 a5 53 05 3e 8f 82 fa 1b |0D. *....S.>....| +peer1.org2.example.com | 00000010 b6 f8 ba e7 37 97 2a a4 f4 bc bd c4 af 50 f9 52 |....7.*......P.R| +peer1.org2.example.com | 00000020 37 f8 1f 89 02 20 6c 9a f0 e3 0f 86 b2 6e b8 f6 |7.... l......n..| +peer1.org2.example.com | 00000030 d2 8a 47 1d 5a 07 25 b1 89 13 37 c4 51 20 f2 9c |..G.Z.%...7.Q ..| +peer1.org2.example.com | 00000040 37 f3 17 03 6b c0 |7...k.| +peer1.org2.example.com | [4b80 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b81 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4b82 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4b83 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4b84 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4b85 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b86 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b87 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b88 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b89 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b8a 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b8b 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4b8c 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b8d 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4b8e 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b8f 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b90 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b91 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b92 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b93 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b94 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b95 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4886 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4887 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4888 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4889 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [488a 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [488b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [488c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [488d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [488e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [488f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4890 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4891 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4892 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4893 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4894 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 gate 1589998896153892400 evaluation starts +peer0.org1.example.com | [4895 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4896 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4897 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4898 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 principal evaluation fails +peer0.org1.example.com | [4899 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 gate 1589998896153892400 evaluation fails +peer0.org1.example.com | [489a 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [489b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [489c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [489d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 gate 1589998896154946400 evaluation starts +peer0.org1.example.com | [489e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [489f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [48a0 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 principal matched by identity 0 +peer0.org1.example.com | [48a1 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [48a2 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [48a3 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4cc4 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4cc5 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4cc6 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4cc7 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4cc8 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4cc9 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4cca 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467790 gate 1589998904024174300 evaluation starts +peer0.org2.example.com | [4ccb 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467790 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ccc 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467790 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ccd 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4cce 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467790 principal evaluation fails +peer0.org2.example.com | [4ccf 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467790 gate 1589998904024174300 evaluation fails +peer0.org2.example.com | [4cd0 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4cd1 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4cd2 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4cd3 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467d00 gate 1589998904024477700 evaluation starts +peer0.org2.example.com | [4cd4 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467d00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4cd5 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467d00 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4cd6 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467d00 principal matched by identity 0 +peer0.org2.example.com | [4cd7 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 34 74 ba 29 4b d0 12 ce 33 3d ac 81 b5 fd 6a |.4t.)K...3=....j| +peer0.org2.example.com | 00000010 c2 b7 7a 09 dc 99 34 e4 3f 32 e5 b5 08 46 c3 99 |..z...4.?2...F..| +peer0.org2.example.com | [4cd8 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 62 67 12 89 a7 a3 e1 e4 5d 38 |0E.!..bg......]8| +peer0.org2.example.com | 00000010 9f d4 25 bb de 04 54 ce f2 c8 aa ff ec 3d c9 2d |..%...T......=.-| +peer0.org2.example.com | 00000020 d8 14 f8 25 c3 02 20 10 3a 80 aa a6 f3 d3 1e e7 |...%.. .:.......| +peer0.org2.example.com | 00000030 66 39 80 69 ef fe 79 47 3b 55 45 d1 fa 70 1e e2 |f9.i..yG;UE..p..| +peer0.org2.example.com | 00000040 54 bc 65 a5 93 3d d4 |T.e..=.| +peer0.org2.example.com | [4cd9 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467d00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4cda 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467d00 gate 1589998904024477700 evaluation succeeds +peer0.org2.example.com | [4cdb 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4cdc 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4cdd 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4cde 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4cdf 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ce0 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4ce1 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4ce2 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4ce3 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4ce4 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ce5 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ce6 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ce7 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ce8 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ce9 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cea 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ceb 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cec 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ced 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cee 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cef 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cf0 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cf1 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cf2 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4cf3 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cf4 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4cf5 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4cf6 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4cf7 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cf8 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4cf9 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cfa 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4cfb 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4cfc 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cfd 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4cfe 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4cff 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d00 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d01 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [4d02 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4d03 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4d04 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4d05 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4d06 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4d07 05-20 18:21:44.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4d08 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4d09 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d0a 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d0b 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d0c 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4b96 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b97 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b98 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4b99 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b9a 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4b9b 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b9c 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b9d 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b9e 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4b9f 05-20 18:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4ba0 05-20 18:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161047 +peer1.org2.example.com | [4ba1 05-20 18:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3DBA8C284ED09CC1CA80F9B51B2985CDDB854FC2BBED7FE4804315EFD492D57C +peer1.org2.example.com | [4ba2 05-20 18:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4ba3 05-20 18:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4ba4 05-20 18:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4ba5 05-20 18:21:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [4ba6 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ba7 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ba8 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ba9 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4baa 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4bab 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4bac 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4bad 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4bae 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4baf 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4bb0 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bb1 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4bb2 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bb3 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bb4 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bb5 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bb6 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4bb7 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48a4 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 gate 1589998896154946400 evaluation succeeds +peer0.org1.example.com | [48a5 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [48a6 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [48a7 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [48a8 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [48a9 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48aa 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ab 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [48ac 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [48ad 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48ae 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48af 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48b0 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48b1 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [48b2 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [48b3 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48b4 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [48b5 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [48b6 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [48b7 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [48b8 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [48b9 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [48ba 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 gate 1589998896398281500 evaluation starts +peer0.org1.example.com | [48bb 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [48bc 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [48bd 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [48be 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 principal evaluation fails +peer0.org1.example.com | [48bf 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 gate 1589998896398281500 evaluation fails +peer0.org1.example.com | [48c0 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [48c1 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [48c2 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [48c3 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 gate 1589998896403419800 evaluation starts +peer0.org1.example.com | [48c4 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d0d 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4d0e 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d0f 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d10 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4d11 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4d12 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4d13 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033538a0 gate 1589998904084300800 evaluation starts +peer0.org2.example.com | [4d14 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033538a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d15 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033538a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d16 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033538a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4d17 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033538a0 principal evaluation fails +peer0.org2.example.com | [4d18 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033538a0 gate 1589998904084300800 evaluation fails +peer0.org2.example.com | [4d19 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d1a 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d1b 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4d1c 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003353e10 gate 1589998904084745200 evaluation starts +peer0.org2.example.com | [4d1d 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003353e10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d1e 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003353e10 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d1f 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003353e10 principal matched by identity 0 +peer0.org2.example.com | [4d20 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4d21 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4d22 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003353e10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4d23 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003353e10 gate 1589998904084745200 evaluation succeeds +peer0.org2.example.com | [4d24 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4d25 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4d26 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4d27 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4d28 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [4d29 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [4d2a 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d2b 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4bb8 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4bb9 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4bba 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4bbb 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4bbc 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4bbd 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4bbe 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56810 gate 1589998904024167900 evaluation starts +peer1.org2.example.com | [4bbf 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4bc0 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56810 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4bc1 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4bc2 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56810 principal evaluation fails +peer1.org2.example.com | [4bc3 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56810 gate 1589998904024167900 evaluation fails +peer1.org2.example.com | [4bc4 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4bc5 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4bc6 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4bc7 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56d80 gate 1589998904024477700 evaluation starts +peer1.org2.example.com | [4bc8 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4bc9 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56d80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4bca 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56d80 principal matched by identity 0 +peer1.org2.example.com | [4bcb 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 34 74 ba 29 4b d0 12 ce 33 3d ac 81 b5 fd 6a |.4t.)K...3=....j| +peer1.org2.example.com | 00000010 c2 b7 7a 09 dc 99 34 e4 3f 32 e5 b5 08 46 c3 99 |..z...4.?2...F..| +peer1.org2.example.com | [4bcc 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 62 67 12 89 a7 a3 e1 e4 5d 38 |0E.!..bg......]8| +peer1.org2.example.com | 00000010 9f d4 25 bb de 04 54 ce f2 c8 aa ff ec 3d c9 2d |..%...T......=.-| +peer1.org2.example.com | 00000020 d8 14 f8 25 c3 02 20 10 3a 80 aa a6 f3 d3 1e e7 |...%.. .:.......| +peer1.org2.example.com | 00000030 66 39 80 69 ef fe 79 47 3b 55 45 d1 fa 70 1e e2 |f9.i..yG;UE..p..| +peer1.org2.example.com | 00000040 54 bc 65 a5 93 3d d4 |T.e..=.| +peer1.org2.example.com | [4bcd 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56d80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4bce 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c56d80 gate 1589998904024477700 evaluation succeeds +peer1.org2.example.com | [4bcf 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4bd0 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4bd1 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4bd2 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4bd3 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bd4 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4bd5 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4bd6 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4bd7 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4bd8 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bd9 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bda 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48c5 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [48c6 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 principal matched by identity 0 +peer0.org1.example.com | [48c7 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [48c8 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [48c9 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [48ca 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 gate 1589998896403419800 evaluation succeeds +peer0.org1.example.com | [48cb 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [48cc 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [48cd 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [48ce 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [48cf 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48d0 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48d1 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [48d2 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [48d3 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [48d4 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [48d5 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48d6 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [48d7 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [48d8 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [48d9 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [48da 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48db 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [48dc 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [48dd 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48de 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [48df 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [48e0 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +peer0.org1.example.com | 00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +peer0.org1.example.com | [48e1 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +peer0.org1.example.com | 00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +peer0.org1.example.com | 00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +peer0.org1.example.com | 00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +peer0.org1.example.com | 00000040 e0 0a 77 e4 aa d8 81 |..w....| +peer0.org1.example.com | [48e2 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [48e3 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 43 36 2c 59 3f 58 4a bf 2e 0b |0E.!..C6,Y?XJ...| +peer0.org1.example.com | 00000010 fb 6b 5d ff 01 89 c6 8d f7 0e 34 c0 a2 61 84 57 |.k].......4..a.W| +peer0.org1.example.com | 00000020 ab ee 94 55 c9 02 20 71 55 8b 1b 85 02 4c 85 97 |...U.. qU....L..| +peer0.org1.example.com | 00000030 fc f1 27 9d 99 58 08 0a 6a 86 8e 4c 50 5d 95 6c |..'..X..j..LP].l| +peer0.org1.example.com | 00000040 9b 22 85 47 6f 16 01 |.".Go..| +peer0.org1.example.com | [48e4 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [48e5 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [48e6 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [48e7 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [48e8 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [48e9 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ea 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48eb 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ec 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [48ed 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48ee 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48ef 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [48f0 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [48f1 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [48f2 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48f3 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [48f4 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [48f5 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [48f6 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48f7 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48f8 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48f9 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48fa 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48fb 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48fc 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [48fd 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48fe 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [48ff 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4900 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4901 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4902 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4903 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4bdb 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bdc 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bdd 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bde 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bdf 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4be0 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4be1 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4be2 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4be3 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4be4 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4be5 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4be6 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4be7 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4be8 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4be9 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bea 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4beb 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bec 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bed 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bee 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bef 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4bf0 05-20 18:21:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bf1 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4bf2 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4bf3 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4bf4 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bf5 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4bf6 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4bf7 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4bf8 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bf9 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4bfa 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4bfb 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [4bfc 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4bfd 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bfe 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4bff 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4c00 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4c01 05-20 18:21:44.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4c02 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4c03 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c04 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c05 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c06 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4c07 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c08 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c09 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4c0a 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4c0b 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4c0c 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c86f50 gate 1589998904388382500 evaluation starts +peer1.org2.example.com | [4c0d 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c86f50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c0e 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c86f50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c0f 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c86f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4c10 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c86f50 principal evaluation fails +peer1.org2.example.com | [4c11 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c86f50 gate 1589998904388382500 evaluation fails +peer1.org2.example.com | [4c12 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c13 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c14 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4c15 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c874c0 gate 1589998904390077700 evaluation starts +peer1.org2.example.com | [4c16 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c874c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c17 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c874c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c18 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c874c0 principal matched by identity 0 +peer1.org2.example.com | [4c19 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4c1a 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4c1b 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c874c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4c1c 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c874c0 gate 1589998904390077700 evaluation succeeds +peer1.org2.example.com | [4c1d 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c1e 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c1f 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4c20 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4c21 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | [4904 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4905 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4906 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4907 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4908 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4909 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [490a 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [490b 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [490c 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [490d 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [490e 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [490f 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4911 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4910 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4912 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4913 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4914 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4915 05-20 18:21:36.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4916 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4d2c 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4d2d 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d2e 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d2f 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4d30 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4d31 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4d32 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f730 gate 1589998904086895900 evaluation starts +peer0.org2.example.com | [4d33 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d34 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f730 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d35 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4d36 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f730 principal evaluation fails +peer0.org2.example.com | [4d37 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004f730 gate 1589998904086895900 evaluation fails +peer0.org2.example.com | [4d38 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d39 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d3a 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4d3b 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fca0 gate 1589998904092316000 evaluation starts +peer0.org2.example.com | [4d3c 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d3d 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fca0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d3e 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fca0 principal matched by identity 0 +peer0.org2.example.com | [4d3f 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4d41 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4d40 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4d42 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fca0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4d43 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fca0 gate 1589998904092316000 evaluation succeeds +peer0.org2.example.com | [4d44 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4d45 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4d46 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4d47 05-20 18:21:44.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4d48 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4d49 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4d4a 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4d4b 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4c22 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4c23 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c24 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c25 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4c26 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c27 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c28 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4c29 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4c2a 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4c2b 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc0db0 gate 1589998904394197800 evaluation starts +peer1.org2.example.com | [4c2c 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc0db0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c2d 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc0db0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c2e 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc0db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4c2f 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc0db0 principal evaluation fails +peer1.org2.example.com | [4c30 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc0db0 gate 1589998904394197800 evaluation fails +peer1.org2.example.com | [4c31 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c32 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c33 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4c34 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc1320 gate 1589998904395222700 evaluation starts +peer1.org2.example.com | [4c35 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc1320 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c36 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc1320 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c37 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc1320 principal matched by identity 0 +peer1.org2.example.com | [4c38 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4c39 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4c3a 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc1320 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4c3b 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc1320 gate 1589998904395222700 evaluation succeeds +peer1.org2.example.com | [4c3c 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c3d 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c3e 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4c3f 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4c40 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4c41 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | [4917 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4918 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4919 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [491a 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [491b 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [491c 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [491d 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [491e 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [491f 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4920 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4921 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4922 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 gate 1589998896927730000 evaluation starts +peer0.org1.example.com | [4923 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4924 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4925 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4926 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 principal evaluation fails +peer0.org1.example.com | [4927 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 gate 1589998896927730000 evaluation fails +peer0.org1.example.com | [4928 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4929 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [492a 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [492b 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 gate 1589998896929391800 evaluation starts +peer0.org1.example.com | [492c 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [492d 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [492e 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 principal matched by identity 0 +peer0.org1.example.com | [492f 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer0.org1.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer0.org1.example.com | [4930 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer0.org1.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer0.org1.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer0.org1.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer0.org1.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer0.org1.example.com | [4931 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4932 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 gate 1589998896929391800 evaluation succeeds +peer0.org1.example.com | [4933 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4934 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4935 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4d4c 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4d4d 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4d4e 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d4f 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d50 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4d51 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d52 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d53 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4d54 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4d55 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4d56 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000321eb0 gate 1589998904105773900 evaluation starts +peer0.org2.example.com | [4d57 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000321eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d58 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000321eb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d59 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000321eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4d5a 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000321eb0 principal evaluation fails +peer0.org2.example.com | [4d5b 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000321eb0 gate 1589998904105773900 evaluation fails +peer0.org2.example.com | [4d5c 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d5d 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d5e 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4d5f 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc420 gate 1589998904106440800 evaluation starts +peer0.org2.example.com | [4d60 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d61 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc420 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d62 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc420 principal matched by identity 0 +peer0.org2.example.com | [4d63 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4d64 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4d65 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4d66 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc420 gate 1589998904106440800 evaluation succeeds +peer0.org2.example.com | [4d67 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4d68 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4d69 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4d6a 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4d6b 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4c42 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4c43 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4c44 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4c45 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4c46 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c47 05-20 18:21:44.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c48 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4c49 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c4a 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c4b 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4c4c 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4c4d 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4c4e 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdd4a0 gate 1589998904401711000 evaluation starts +peer1.org2.example.com | [4c4f 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdd4a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c50 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdd4a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c51 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdd4a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4c52 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdd4a0 principal evaluation fails +peer1.org2.example.com | [4c53 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdd4a0 gate 1589998904401711000 evaluation fails +peer1.org2.example.com | [4c54 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c55 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c56 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4c57 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdda10 gate 1589998904403275600 evaluation starts +peer1.org2.example.com | [4c58 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdda10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c59 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdda10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c5a 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdda10 principal matched by identity 0 +peer1.org2.example.com | [4c5b 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4c5c 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4c5d 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdda10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4c5e 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdda10 gate 1589998904403275600 evaluation succeeds +peer1.org2.example.com | [4c5f 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4936 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4937 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4938 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4939 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [493a 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [493b 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [493c 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [493d 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [493e 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [493f 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [4940 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4941 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4942 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4943 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4944 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4945 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4946 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [4947 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4948 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816103F +peer0.org1.example.com | [4949 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA63AEC70BC1C77F267A85D52C48ED1C76C7A86F8CCC8F2BE13CA4D9597DF835 +peer0.org1.example.com | [494a 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [494b 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [494c 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [494d 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364.\033B&" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [494e 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [494f 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4950 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4951 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4952 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4953 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4954 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364.\033B&" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [4956 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4955 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4957 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4958 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4959 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [495a 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [495b 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [495c 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [495d 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [495e 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [495f 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4960 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4961 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4962 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4963 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4964 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 gate 1589998897031889800 evaluation starts +peer0.org1.example.com | [4965 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4966 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4967 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4968 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 principal evaluation fails +peer0.org1.example.com | [4969 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 gate 1589998897031889800 evaluation fails +peer0.org1.example.com | [496a 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [496b 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [496c 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [496d 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 gate 1589998897035440500 evaluation starts +peer0.org1.example.com | [496e 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [496f 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4970 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 principal matched by identity 0 +peer0.org1.example.com | [4971 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +peer0.org1.example.com | 00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +peer0.org1.example.com | [4972 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +peer0.org1.example.com | 00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +peer0.org1.example.com | 00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +peer0.org1.example.com | 00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +peer0.org1.example.com | 00000040 f9 97 be 8e a5 7e 4d |.....~M| +peer0.org1.example.com | [4973 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4974 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 gate 1589998897035440500 evaluation succeeds +peer0.org1.example.com | [4975 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4976 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4977 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4978 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4979 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [497a 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [497b 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [497c 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +peer0.org1.example.com | 00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +peer0.org1.example.com | [497d 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +peer0.org1.example.com | 00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +peer0.org1.example.com | 00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +peer0.org1.example.com | 00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +peer0.org1.example.com | 00000040 3e f4 2e 1b 42 26 |>...B&| +peer0.org1.example.com | [497e 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [4981 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [497f 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4982 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4980 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4983 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4984 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4985 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +peer0.org1.example.com | 00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +peer0.org1.example.com | [4986 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +peer0.org1.example.com | 00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +peer0.org1.example.com | 00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +peer0.org1.example.com | 00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +peer0.org1.example.com | 00000040 e0 0a 77 e4 aa d8 81 |..w....| +peer0.org1.example.com | [4987 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4988 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4989 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [498a 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [498b 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [498c 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [498e 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +peer0.org1.example.com | 00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +peer0.org1.example.com | [498f 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +peer0.org2.example.com | [4d6c 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [4d6d 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d6e 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d6f 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4d70 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d71 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d72 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4d73 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4d74 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4d75 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cdd30 gate 1589998904108813000 evaluation starts +peer0.org2.example.com | [4d76 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cdd30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d77 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cdd30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d78 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cdd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4d79 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cdd30 principal evaluation fails +peer0.org2.example.com | [4d7a 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cdd30 gate 1589998904108813000 evaluation fails +peer0.org2.example.com | [4d7b 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d7c 05-20 18:21:44.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d7d 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4d7e 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a82a0 gate 1589998904110304900 evaluation starts +peer0.org2.example.com | [4d7f 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a82a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d80 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a82a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d81 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a82a0 principal matched by identity 0 +peer0.org2.example.com | [4d82 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4d83 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4d84 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a82a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4d85 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a82a0 gate 1589998904110304900 evaluation succeeds +peer0.org2.example.com | [4d86 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4d87 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4d88 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4d89 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4d8a 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4d8b 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4d8c 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d8d 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c60 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c61 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4c62 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4c63 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c64 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c65 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4c66 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c67 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c68 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4c69 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4c6a 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4c6b 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfec10 gate 1589998904406137300 evaluation starts +peer1.org2.example.com | [4c6c 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfec10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c6d 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfec10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c6e 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfec10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4c6f 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfec10 principal evaluation fails +peer1.org2.example.com | [4c70 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cfec10 gate 1589998904406137300 evaluation fails +peer1.org2.example.com | [4c71 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c72 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c73 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4c74 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cff180 gate 1589998904406839400 evaluation starts +peer1.org2.example.com | [4c75 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cff180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c76 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cff180 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c77 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cff180 principal matched by identity 0 +peer1.org2.example.com | [4c78 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4c79 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4c7a 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cff180 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4c7b 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cff180 gate 1589998904406839400 evaluation succeeds +peer1.org2.example.com | [4c7c 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c7d 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c7e 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4c7f 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4c80 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4c81 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | [4d8e 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d8f 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4d90 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d91 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d92 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4d93 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4d94 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4d95 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a98b0 gate 1589998904113419300 evaluation starts +peer0.org2.example.com | [4d96 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a98b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4d97 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a98b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4d98 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a98b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4d99 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a98b0 principal evaluation fails +peer0.org2.example.com | [4d9a 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a98b0 gate 1589998904113419300 evaluation fails +peer0.org2.example.com | [4d9b 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d9c 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4d9d 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4d9e 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ee0 gate 1589998904113984400 evaluation starts +peer0.org2.example.com | [4d9f 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4da0 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ee0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4da1 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ee0 principal matched by identity 0 +peer0.org2.example.com | [4da2 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4da3 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [4da4 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ee0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4da5 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ee0 gate 1589998904113984400 evaluation succeeds +peer0.org2.example.com | [4da6 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4da7 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4da8 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4da9 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4daa 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4dab 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4dac 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4dad 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4c82 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4c83 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4c84 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c85 05-20 18:21:44.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c86 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4c87 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4c88 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c89 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4c8a 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4c8b 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4c8c 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4c8d 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1ecc0 gate 1589998904411468400 evaluation starts +peer1.org2.example.com | [4c8e 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1ecc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c8f 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1ecc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c90 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1ecc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4c91 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1ecc0 principal evaluation fails +peer1.org2.example.com | [4c92 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1ecc0 gate 1589998904411468400 evaluation fails +peer1.org2.example.com | [4c93 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c94 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4c95 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4c96 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1f230 gate 1589998904412861800 evaluation starts +peer1.org2.example.com | [4c97 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1f230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4c98 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1f230 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4c99 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1f230 principal matched by identity 0 +peer1.org2.example.com | [4c9a 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4c9b 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4c9c 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1f230 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4c9d 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1f230 gate 1589998904412861800 evaluation succeeds +peer1.org2.example.com | [4c9e 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4c9f 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ca0 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4ca1 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4ca2 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4ca3 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4ca4 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ca5 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ca6 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4ca7 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ca8 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ca9 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4caa 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4cab 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4cac 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d42b20 gate 1589998904418895500 evaluation starts +peer1.org2.example.com | [4cad 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d42b20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4cae 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d42b20 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4caf 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d42b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4cb0 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d42b20 principal evaluation fails +peer1.org2.example.com | [4cb1 05-20 18:21:44.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d42b20 gate 1589998904418895500 evaluation fails +peer1.org2.example.com | [4cb2 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4cb3 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4cb4 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4cb5 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d43090 gate 1589998904421022800 evaluation starts +peer1.org2.example.com | [4cb6 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d43090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4cb7 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d43090 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4cb8 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d43090 principal matched by identity 0 +peer1.org2.example.com | [4cb9 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4cba 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4cbb 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d43090 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4cbc 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d43090 gate 1589998904421022800 evaluation succeeds +peer1.org2.example.com | [4cbd 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4cbe 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4cbf 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4cc0 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4cc1 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4cc2 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4cc3 05-20 18:21:44.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4cc4 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4cc5 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4cc6 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4cc7 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4cc8 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4cc9 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4cca 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ccb 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ccc 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [4ccd 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4cce 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ccf 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4cd0 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4cd1 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4cd2 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4cd3 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4cd4 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4cd5 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4cd6 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4cd7 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4cd8 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4cd9 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80960 gate 1589998904649952100 evaluation starts +peer1.org2.example.com | [4cda 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4cdb 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80960 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4cdc 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4cdd 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80960 principal evaluation fails +peer1.org2.example.com | [4cde 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80960 gate 1589998904649952100 evaluation fails +peer1.org2.example.com | [4cdf 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4ce0 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4ce1 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4ce2 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80ed0 gate 1589998904653371200 evaluation starts +peer1.org2.example.com | [4ce3 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4ce4 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80ed0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4ce5 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80ed0 principal matched by identity 0 +peer1.org2.example.com | [4ce6 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer1.org2.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer1.org2.example.com | [4ce7 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer1.org2.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer1.org2.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer1.org2.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer1.org2.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer1.org2.example.com | [4ce8 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80ed0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4ce9 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d80ed0 gate 1589998904653371200 evaluation succeeds +peer1.org2.example.com | [4cea 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ceb 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4cec 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4ced 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4cee 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4cef 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4cf0 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4cf1 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4cf2 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4cf3 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4cf4 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4cf5 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4cf6 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [4cf7 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4cf8 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4cf9 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4cfa 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4cfb 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4cfc 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4cfd 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > alive:\217\202\372\033\266\370\272\3477\227*\244\364\274\275\304\257P\371R7\370\037\211\002 l\232\360\343\017\206\262n\270\366\322\212G\035Z\007%\261\211\0237\304Q \362\2347\363\027\003k\300" > alive: alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > +peer1.org2.example.com | [4cfe 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4cff 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d00 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4d01 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d02 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d03 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d04 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d05 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d06 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d07 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d08 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d09 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d0a 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [4d0b 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d0c 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d0d 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d0e 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [4d0f 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d10 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d11 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d12 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d13 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d14 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d15 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d16 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d17 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d18 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d19 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d1a 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4d1b 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer1.org2.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer1.org2.example.com | [4d1c 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer1.org2.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer1.org2.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer1.org2.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer1.org2.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer1.org2.example.com | [4d1d 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [4d1e 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d c7 e3 f1 77 bb 71 6f 61 a6 f3 |0E.!.....w.qoa..| +peer1.org2.example.com | 00000010 73 5b 0b 91 c7 f3 b5 9f 20 0c 23 7b e8 9c df 29 |s[...... .#{...)| +peer1.org2.example.com | 00000020 ff 7e 95 7d 31 02 20 52 95 2d bd b9 4c 5b 99 10 |.~.}1. R.-..L[..| +peer1.org2.example.com | 00000030 ed 76 c4 eb 31 74 03 ba ad 01 34 90 d6 ad c6 d4 |.v..1t....4.....| +peer1.org2.example.com | 00000040 fc 1e 22 0a eb 16 ed |.."....| +peer1.org2.example.com | [4d1f 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [4dae 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4daf 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4db0 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4db1 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4db2 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4db3 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4db4 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000371ad0 gate 1589998904117602100 evaluation starts +peer0.org2.example.com | [4db5 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000371ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4db6 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000371ad0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4db7 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000371ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4db8 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000371ad0 principal evaluation fails +peer0.org2.example.com | [4db9 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000371ad0 gate 1589998904117602100 evaluation fails +peer0.org2.example.com | [4dba 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4dbb 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4dbc 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4dbd 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336040 gate 1589998904118579300 evaluation starts +peer0.org2.example.com | [4dbe 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4dbf 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336040 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4dc0 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336040 principal matched by identity 0 +peer0.org2.example.com | [4dc1 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4dc2 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [4dc3 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336040 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4dc4 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000336040 gate 1589998904118579300 evaluation succeeds +peer0.org2.example.com | [4dc5 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4dc6 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4dc7 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4dc8 05-20 18:21:44.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4dc9 05-20 18:21:44.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [4dca 05-20 18:21:44.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [4dcb 05-20 18:21:44.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4dcc 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4dcd 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4dce 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4dcf 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4dd0 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d20 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [4d21 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4d22 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4d23 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4d24 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d25 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d26 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d27 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [4d28 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d29 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d2a 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d2b 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > +peer1.org2.example.com | [4d2c 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d2d 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d2e 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d2f 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d30 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d31 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4d32 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d33 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4d34 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4d35 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4d36 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4d37 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4d38 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4d39 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de31a0 gate 1589998905026243100 evaluation starts +peer1.org2.example.com | [4d3a 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de31a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4d3b 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de31a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4d3c 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de31a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4d3d 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de31a0 principal evaluation fails +peer1.org2.example.com | [4d3e 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de31a0 gate 1589998905026243100 evaluation fails +peer1.org2.example.com | [4d3f 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4d40 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4d41 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4d42 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3710 gate 1589998905027968000 evaluation starts +peer1.org2.example.com | [4d43 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3710 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4d44 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3710 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4d45 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3710 principal matched by identity 0 +peer1.org2.example.com | [4d46 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer1.org2.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer1.org2.example.com | [4d47 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer1.org2.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer1.org2.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer1.org2.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer1.org2.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer1.org2.example.com | [4d48 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3710 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4d49 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3710 gate 1589998905027968000 evaluation succeeds +peer1.org2.example.com | [4d4a 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4d4b 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4d4c 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4d4d 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4d4e 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4d4f 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4d50 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4d51 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4d52 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4d53 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d54 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d55 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d56 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [4d57 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d58 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d59 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d5a 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d5b 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > +peer1.org2.example.com | [4d5c 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d5d 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d5e 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [4d5f 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d60 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [4d61 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d62 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [4d64 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d65 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d66 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d67 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d63 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d68 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d69 05-20 18:21:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d6a 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d6b 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d6c 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d6d 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d6e 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d6f 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d70 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d71 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d72 05-20 18:21:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d73 05-20 18:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4d74 05-20 18:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161048 +peer1.org2.example.com | [4d75 05-20 18:21:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D3A3D6574E318DB9E217A5A0833F8A0D1E207AAA5D22690DF661ECA7E02365BE +peer1.org2.example.com | [4d76 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4d77 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4d78 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4d79 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d7a 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d7b 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d7c 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d7d 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4d7e 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d80 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d81 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d82 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d7f 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d83 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d84 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d85 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d86 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d88 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4d87 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d89 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 a3 d6 57 4e 31 8d b9 e2 17 a5 a0 83 3f 8a 0d |...WN1.......?..| +peer1.org2.example.com | 00000010 1e 20 7a aa 5d 22 69 0d f6 61 ec a7 e0 23 65 be |. z.]"i..a...#e.| +peer1.org2.example.com | [4d8a 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 0f 6b ef e4 55 02 49 7d a2 e3 |0E.!...k..U.I}..| +peer1.org2.example.com | 00000010 e4 03 09 9e 29 d9 f0 c0 6f c6 e5 09 cc 49 eb f1 |....)...o....I..| +peer1.org2.example.com | 00000020 22 61 ce a1 5e 02 20 13 1a e8 d0 b8 0f e6 11 a7 |"a..^. .........| +peer1.org2.example.com | 00000030 c8 81 db e2 b0 04 22 06 21 b4 cf c6 f0 d1 e9 7e |......".!......~| +peer1.org2.example.com | 00000040 f3 d7 cd 17 ec 98 5d |......]| +peer1.org2.example.com | [4d8b 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [4d8c 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc b9 41 f9 5e dc 62 d6 19 1a a7 |0E.!...A.^.b....| +peer1.org2.example.com | 00000010 6f a4 1d 30 e1 03 d8 1d ac a7 69 18 0c 1f 63 9f |o..0......i...c.| +peer0.org2.example.com | [4dd1 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4dd2 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dd3 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4dd4 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dd5 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dd6 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dd7 05-20 18:21:44.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4dd8 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dd9 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dda 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ddb 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ddc 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ddd 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dde 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ddf 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4de0 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4de1 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4de2 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4de3 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4de4 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4de5 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4de6 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [4de7 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4de8 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4de9 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dea 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4deb 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4dec 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4ded 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 89 83 ae 55 26 02 20 36 c8 17 e6 67 67 5b 1c 49 |...U&. 6...gg[.I| +peer1.org2.example.com | 00000030 cd c4 b6 b6 b1 5e 43 6e 44 de bf d3 aa 8a 5e 75 |.....^CnD.....^u| +peer1.org2.example.com | 00000040 26 37 2f 5d ac 9a 4c |&7/]..L| +peer1.org2.example.com | [4d8d 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [4d8e 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [4d8f 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d90 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d91 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d92 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4d93 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 a3 d6 57 4e 31 8d b9 e2 17 a5 a0 83 3f 8a 0d |...WN1.......?..| +peer1.org2.example.com | 00000010 1e 20 7a aa 5d 22 69 0d f6 61 ec a7 e0 23 65 be |. z.]"i..a...#e.| +peer1.org2.example.com | [4d94 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 0f 6b ef e4 55 02 49 7d a2 e3 |0E.!...k..U.I}..| +peer1.org2.example.com | 00000010 e4 03 09 9e 29 d9 f0 c0 6f c6 e5 09 cc 49 eb f1 |....)...o....I..| +peer1.org2.example.com | 00000020 22 61 ce a1 5e 02 20 13 1a e8 d0 b8 0f e6 11 a7 |"a..^. .........| +peer1.org2.example.com | 00000030 c8 81 db e2 b0 04 22 06 21 b4 cf c6 f0 d1 e9 7e |......".!......~| +peer1.org2.example.com | 00000040 f3 d7 cd 17 ec 98 5d |......]| +peer1.org2.example.com | [4d95 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4d96 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d97 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4d98 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4d99 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [4d9a 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4d9b 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4d9c 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4d9d 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4d9e 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4d9f 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4da0 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4da1 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4da2 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5d9e0 gate 1589998905235749200 evaluation starts +peer1.org2.example.com | [4da3 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5d9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4da4 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5d9e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4da5 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5d9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4da6 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5d9e0 principal evaluation fails +peer1.org2.example.com | [4da7 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5d9e0 gate 1589998905235749200 evaluation fails +peer1.org2.example.com | [4da8 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4da9 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4daa 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4dab 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5df50 gate 1589998905237219700 evaluation starts +peer1.org2.example.com | [4dac 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5df50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4dad 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5df50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4dae 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5df50 principal matched by identity 0 +peer1.org2.example.com | [4daf 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer1.org2.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer1.org2.example.com | [4db0 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer1.org2.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer1.org2.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer1.org2.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer1.org2.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer1.org2.example.com | [4db1 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5df50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4db2 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e5df50 gate 1589998905237219700 evaluation succeeds +peer0.org2.example.com | [4dee 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4def 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4df0 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4df1 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4df2 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4df3 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4df4 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376cb0 gate 1589998904640421400 evaluation starts +peer0.org2.example.com | [4df5 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4df6 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376cb0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4df7 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4df8 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376cb0 principal evaluation fails +peer0.org2.example.com | [4df9 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000376cb0 gate 1589998904640421400 evaluation fails +peer0.org2.example.com | [4dfa 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4dfb 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4dfc 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4dfd 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000377510 gate 1589998904642914000 evaluation starts +peer0.org2.example.com | [4dfe 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000377510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4dff 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000377510 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4e00 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000377510 principal matched by identity 0 +peer0.org2.example.com | [4e01 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer0.org2.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer0.org2.example.com | [4e02 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer0.org2.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer0.org2.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer0.org2.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer0.org2.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer0.org2.example.com | [4e03 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000377510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4e04 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000377510 gate 1589998904642914000 evaluation succeeds +peer0.org2.example.com | [4e05 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4e06 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4e07 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4e08 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4e09 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4e0a 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4e0b 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4e0c 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4e0d 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4e0e 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e0f 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e10 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e11 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [4e12 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e13 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e14 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +peer0.org1.example.com | 00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +peer0.org1.example.com | 00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +peer0.org1.example.com | 00000040 3e f4 2e 1b 42 26 |>...B&| +peer0.org1.example.com | [4990 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [4991 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 5b 71 c9 07 f3 23 81 a7 2b 11 b2 |0D. .[q...#..+..| +peer0.org1.example.com | 00000010 dc 11 ac f2 1b 4c c6 59 9e f3 ec c9 5a a5 df 52 |.....L.Y....Z..R| +peer0.org1.example.com | 00000020 4c ae 3c 45 02 20 21 8f 82 7c f7 d4 e4 c4 2a 03 |L. DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4992 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4993 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4994 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4995 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4996 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4997 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4998 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4999 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [499a 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [499b 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [499c 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [499d 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [499e 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [499f 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [49a0 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 gate 1589998897050919800 evaluation starts +peer0.org1.example.com | [49a1 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49a2 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [49a3 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [49a4 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 principal evaluation fails +peer0.org1.example.com | [49a5 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 gate 1589998897050919800 evaluation fails +peer0.org1.example.com | [49a6 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49a7 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49a8 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [49a9 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 gate 1589998897053259800 evaluation starts +peer0.org1.example.com | [49aa 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49ab 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [49ac 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 principal matched by identity 0 +peer0.org1.example.com | [49ad 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +peer0.org1.example.com | 00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +peer0.org1.example.com | [49ae 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +peer0.org1.example.com | 00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +peer0.org1.example.com | 00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +peer0.org1.example.com | 00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +peer0.org1.example.com | 00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +peer0.org1.example.com | [49af 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [49b0 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 gate 1589998897053259800 evaluation succeeds +peer0.org1.example.com | [49b1 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49b2 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49b3 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [49b4 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [49b5 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [49b6 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49b7 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [49b8 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +peer0.org1.example.com | 00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +peer0.org1.example.com | [49b9 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +peer0.org1.example.com | 00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +peer0.org1.example.com | 00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +peer0.org1.example.com | 00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +peer0.org1.example.com | 00000040 e0 0a 77 e4 aa d8 81 |..w....| +peer0.org1.example.com | [49ba 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [49bb 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49bc 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [49bd 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +peer0.org1.example.com | 00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +peer0.org1.example.com | [49be 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +peer0.org1.example.com | 00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +peer0.org1.example.com | 00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +peer0.org1.example.com | 00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +peer0.org1.example.com | 00000040 3e f4 2e 1b 42 26 |>...B&| +peer0.org1.example.com | [49bf 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [49c0 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [49c1 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49c2 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49c3 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [49c4 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [49c5 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [49c6 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49c7 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49c8 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49c9 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49ca 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49cb 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49cc 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [49cd 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49ce 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4db3 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4db4 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4db5 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4db6 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4db7 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4db8 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4db9 05-20 18:21:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4dba 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer1.org2.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer1.org2.example.com | [4dbb 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer1.org2.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer1.org2.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer1.org2.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer1.org2.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer1.org2.example.com | [4dbc 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4dbd 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4dbe 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4dbf 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [4dc0 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4dc1 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e15 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4e16 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e18 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e17 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > alive: alive:\217\202\372\033\266\370\272\3477\227*\244\364\274\275\304\257P\371R7\370\037\211\002 l\232\360\343\017\206\262n\270\366\322\212G\035Z\007%\261\211\0237\304Q \362\2347\363\027\003k\300" > +peer0.org2.example.com | [4e19 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4e1a 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4e1b 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4e1c 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4e1d 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [4e1e 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4e1f 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e20 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e21 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e22 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e23 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e24 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e25 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e26 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e27 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e28 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e29 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e2a 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e2b 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49cf 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [49d0 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49d1 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [49d2 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [49d3 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49d4 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [49d5 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [49d6 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [49d7 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [49d8 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [49d9 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [49da 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 gate 1589998897211196200 evaluation starts +peer0.org1.example.com | [49db 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49dc 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [49dd 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [49de 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 principal evaluation fails +peer0.org1.example.com | [49df 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 gate 1589998897211196200 evaluation fails +peer0.org1.example.com | [49e0 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49e1 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49e2 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [49e3 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 gate 1589998897212736700 evaluation starts +peer0.org1.example.com | [49e4 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49e5 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [49e6 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 principal matched by identity 0 +peer0.org1.example.com | [49e7 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 11 3f d7 a4 00 f7 4e 9d cb af d7 2f c5 f6 25 |..?....N..../..%| +peer0.org1.example.com | 00000010 71 2b c5 89 c1 36 c3 82 83 b7 2a 73 6f 30 42 92 |q+...6....*so0B.| +peer0.org1.example.com | [49e8 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 fc 7c ce 9e 88 61 08 c3 5d ce |0E.!...|...a..].| +peer0.org1.example.com | 00000010 26 19 a5 e3 4e e9 73 09 8a d5 6e 0c 40 76 d0 6c |&...N.s...n.@v.l| +peer0.org1.example.com | 00000020 2b fd b8 c5 c3 02 20 27 09 ea e2 44 a2 e8 55 5a |+..... '...D..UZ| +peer0.org1.example.com | 00000030 e1 29 e0 aa 3d bf eb b8 9a 06 bf aa 2a de 1e ec |.)..=.......*...| +peer0.org1.example.com | 00000040 a1 18 53 1f 04 82 f0 |..S....| +peer0.org1.example.com | [49e9 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [49ea 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 gate 1589998897212736700 evaluation succeeds +peer0.org1.example.com | [49eb 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49ec 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49ed 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [49ee 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [49ef 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [49f0 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [49f1 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [49f2 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [49f3 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [49f4 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49f5 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49f6 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49f7 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [49f8 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49f9 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49fa 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49fb 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [49fc 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [49fd 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [49fe 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49ff 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a00 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a01 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a02 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a03 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4a04 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 82 51 e7 cf 80 b5 56 b9 3f d3 c0 21 8d 63 fe |..Q....V.?..!.c.| +peer0.org1.example.com | 00000010 ff 95 75 d0 7b 64 8d 53 28 22 d8 43 c2 aa 00 8f |..u.{d.S(".C....| +peer0.org1.example.com | [4a05 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 b2 c5 04 0c 4f dc 56 0c bc 68 |0E.!......O.V..h| +peer0.org1.example.com | 00000010 e2 d2 89 56 cb 33 e7 aa a4 7d 85 b2 ce 03 fc fd |...V.3...}......| +peer0.org1.example.com | 00000020 b2 9b fb b1 e5 02 20 26 1e 92 c1 a0 4e d2 4b f5 |...... &....N.K.| +peer0.org1.example.com | 00000030 7a 10 59 3e 14 33 ba e6 57 56 65 50 04 a1 c4 2e |z.Y>.3..WVeP....| +peer0.org1.example.com | 00000040 19 ba 80 f9 b6 25 dc |.....%.| +peer0.org1.example.com | [4a06 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4dc2 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4dc3 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4dc4 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4dc5 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4dc6 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4dc7 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4dc8 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4dc9 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e7dce0 gate 1589998905243134900 evaluation starts +peer1.org2.example.com | [4dca 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e7dce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4dcb 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e7dce0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4dcc 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e7dce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4dcd 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e7dce0 principal evaluation fails +peer1.org2.example.com | [4dce 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e7dce0 gate 1589998905243134900 evaluation fails +peer1.org2.example.com | [4dcf 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4dd0 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4dd1 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4dd2 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea0250 gate 1589998905244157900 evaluation starts +peer1.org2.example.com | [4dd3 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea0250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4dd4 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea0250 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4dd5 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea0250 principal matched by identity 0 +peer1.org2.example.com | [4dd6 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer1.org2.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer1.org2.example.com | [4dd7 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer1.org2.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer1.org2.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer1.org2.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer1.org2.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer1.org2.example.com | [4dd8 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea0250 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4dd9 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea0250 gate 1589998905244157900 evaluation succeeds +peer1.org2.example.com | [4dda 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ddb 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ddc 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4ddd 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4dde 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4ddf 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4de0 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4de1 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer1.org2.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer1.org2.example.com | [4de2 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer1.org2.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer1.org2.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer1.org2.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer1.org2.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer1.org2.example.com | [4de3 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4de4 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4de5 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4de6 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 a3 d6 57 4e 31 8d b9 e2 17 a5 a0 83 3f 8a 0d |...WN1.......?..| +peer1.org2.example.com | 00000010 1e 20 7a aa 5d 22 69 0d f6 61 ec a7 e0 23 65 be |. z.]"i..a...#e.| +peer1.org2.example.com | [4de7 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 0f 6b ef e4 55 02 49 7d a2 e3 |0E.!...k..U.I}..| +peer1.org2.example.com | 00000010 e4 03 09 9e 29 d9 f0 c0 6f c6 e5 09 cc 49 eb f1 |....)...o....I..| +peer1.org2.example.com | 00000020 22 61 ce a1 5e 02 20 13 1a e8 d0 b8 0f e6 11 a7 |"a..^. .........| +peer1.org2.example.com | 00000030 c8 81 db e2 b0 04 22 06 21 b4 cf c6 f0 d1 e9 7e |......".!......~| +peer1.org2.example.com | 00000040 f3 d7 cd 17 ec 98 5d |......]| +peer1.org2.example.com | [4de8 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4de9 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4dea 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4deb 05-20 18:21:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4dec 05-20 18:21:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [4ded 05-20 18:21:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [4dee 05-20 18:21:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4def 05-20 18:21:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610161801 +peer1.org2.example.com | [4df0 05-20 18:21:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EABBAD2B536708A607C9E2E7BAB060EBCF3478F6F8CB8E2BD5EA855213D0F7CC +peer1.org2.example.com | [4df1 05-20 18:21:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [4df2 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4df3 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4df4 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4df5 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4df6 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4df7 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4df8 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4df9 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [4dfa 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4dfb 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:33526 +peer1.org2.example.com | [4dfc 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004e5fef0 +peer1.org2.example.com | [4dfd 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [4dfe 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [4dff 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [4e00 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [4e01 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 2d 34 af b9 4c 2f f5 73 d8 67 e1 29 29 56 9f |/-4..L/.s.g.))V.| +peer1.org2.example.com | 00000010 3c ee 16 52 38 d4 8f 46 e9 f5 8c 75 6a 56 cd 68 |<..R8..F...ujV.h| +peer1.org2.example.com | [4e02 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 0b a1 cd 79 ca 6c 00 00 30 3e 67 |0D. ....y.l..0>g| +peer1.org2.example.com | 00000010 d4 00 9b 9e 7f d7 00 c1 f1 6f 95 43 40 b7 bb 97 |.........o.C@...| +peer1.org2.example.com | 00000020 b5 e0 41 c5 02 20 65 3b 78 59 33 94 04 3a 3c 83 |..A.. e;xY3..:<.| +peer1.org2.example.com | 00000030 43 3a 41 b1 51 ad 93 d0 e1 aa 43 92 f9 d2 01 eb |C:A.Q.....C.....| +peer1.org2.example.com | 00000040 6b 3a e4 d6 93 d8 |k:....| +peer1.org2.example.com | [4e03 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [4e04 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004c37340, header 0xc004efa320 +peer1.org2.example.com | [4e05 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [4e06 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][b616e55f] processing txid: b616e55f0cc8dd60496b94b6182779f2cefabd0f936d736e9cac6e82628bc7ba +peer1.org2.example.com | [4e07 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][b616e55f] Entry chaincode: name:"cscc" +peer1.org2.example.com | [4e08 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> INFO [][b616e55f] Entry chaincode: name:"cscc" +peer1.org2.example.com | [4e09 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [4e0a 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [4e0b 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 2d 34 af b9 4c 2f f5 73 d8 67 e1 29 29 56 9f |/-4..L/.s.g.))V.| +peer1.org2.example.com | 00000010 3c ee 16 52 38 d4 8f 46 e9 f5 8c 75 6a 56 cd 68 |<..R8..F...ujV.h| +peer1.org2.example.com | [4e0c 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 0b a1 cd 79 ca 6c 00 00 30 3e 67 |0D. ....y.l..0>g| +peer1.org2.example.com | 00000010 d4 00 9b 9e 7f d7 00 c1 f1 6f 95 43 40 b7 bb 97 |.........o.C@...| +peer1.org2.example.com | 00000020 b5 e0 41 c5 02 20 65 3b 78 59 33 94 04 3a 3c 83 |..A.. e;xY3..:<.| +peer1.org2.example.com | 00000030 43 3a 41 b1 51 ad 93 d0 e1 aa 43 92 f9 d2 01 eb |C:A.Q.....C.....| +peer1.org2.example.com | 00000040 6b 3a e4 d6 93 d8 |k:....| +peer1.org2.example.com | [4e0d 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU [b616e55f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [4e0e 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU [b616e55f] notifying Txid:b616e55f0cc8dd60496b94b6182779f2cefabd0f936d736e9cac6e82628bc7ba, channelID: +peer1.org2.example.com | [4e0f 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [4e10 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> INFO [][b616e55f] Exit chaincode: name:"cscc" (1ms) +peer1.org2.example.com | [4e11 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][b616e55f] Exit +peer1.org2.example.com | [4e12 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:33526 +peer1.org2.example.com | [4e13 05-20 18:21:47.00 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33526 grpc.code=OK grpc.call_duration=5.9036ms +peer1.org2.example.com | [4e14 05-20 18:21:47.01 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [4e15 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4e16 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e17 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e18 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e19 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a07 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4a08 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4a09 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4a0a 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4a0b 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a0c 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a0d 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a0e 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a0f 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a10 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a11 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4a12 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a13 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4a14 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a15 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a16 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a17 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a18 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a19 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a1a 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a1b 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a1c 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a1d 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a1e 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a1f 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a20 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a21 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a22 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a23 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a24 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a25 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4e2c 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e2d 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e2e 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e2f 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e30 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e31 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e32 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e33 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e34 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e35 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e36 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e37 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e38 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [4e39 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e3a 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4e3b 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161044 +peer0.org2.example.com | [4e3c 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B8E65B74CE0DAC6671AB23B508085D0DDE0E767B1EE2D3071F9031321723A7C5 +peer0.org2.example.com | [4e3d 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e3f 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e40 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e3e 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4e41 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4e42 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [4e44 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e43 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4e45 05-20 18:21:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4e46 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e48 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4e49 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e4b 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4e47 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e4a 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e4c 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e4d 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e4e 05-20 18:21:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e4f 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e50 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e51 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e52 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4e53 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer0.org2.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer0.org2.example.com | [4e54 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer0.org2.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer0.org2.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer0.org2.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer0.org2.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer0.org2.example.com | [4e55 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4e56 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4e57 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e58 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e5a 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e59 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e5b 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e5c 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e5d 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e5e 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e5f 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4e60 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer0.org2.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer0.org2.example.com | [4e61 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer0.org2.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer0.org2.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer0.org2.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer0.org2.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer0.org2.example.com | [4e62 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [4e63 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d c7 e3 f1 77 bb 71 6f 61 a6 f3 |0E.!.....w.qoa..| +peer0.org2.example.com | 00000010 73 5b 0b 91 c7 f3 b5 9f 20 0c 23 7b e8 9c df 29 |s[...... .#{...)| +peer0.org2.example.com | 00000020 ff 7e 95 7d 31 02 20 52 95 2d bd b9 4c 5b 99 10 |.~.}1. R.-..L[..| +peer0.org2.example.com | 00000030 ed 76 c4 eb 31 74 03 ba ad 01 34 90 d6 ad c6 d4 |.v..1t....4.....| +peer0.org2.example.com | 00000040 fc 1e 22 0a eb 16 ed |.."....| +peer0.org2.example.com | [4e64 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [4e1a 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4e1b 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e1c 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e1d 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e1e 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e1f 05-20 18:21:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4e20 05-20 18:21:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e21 05-20 18:21:48.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e22 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e23 05-20 18:21:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e24 05-20 18:21:48.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e25 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [4e26 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4e27 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4e29 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e28 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e2a 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4e2b 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e2d 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4e2c 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4e2e 05-20 18:21:48.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4e30 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e2f 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e31 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4e32 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e33 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e34 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e35 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4e37 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4e38 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4e39 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4e3a 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4e3b 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4e3c 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4e3d 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3620 gate 1589998908465222400 evaluation starts +peer1.org2.example.com | [4e3e 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4e3f 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3620 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4e40 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4e41 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3620 principal evaluation fails +peer1.org2.example.com | [4e42 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3620 gate 1589998908465222400 evaluation fails +peer1.org2.example.com | [4e43 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4e44 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4e45 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4e46 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3b90 gate 1589998908476323200 evaluation starts +peer1.org2.example.com | [4e47 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3b90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4e48 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3b90 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4e49 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3b90 principal matched by identity 0 +peer1.org2.example.com | [4e4a 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 a7 01 af e8 41 b4 5f 35 04 51 14 4d 3b 2d ab |.....A._5.Q.M;-.| +peer1.org2.example.com | 00000010 7c 17 8c 4c 41 e5 55 51 8e 4c 03 a2 ee c2 1b d5 ||..LA.UQ.L......| +peer1.org2.example.com | [4e4b 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 4c a3 49 9b 70 a6 f0 47 5c 03 |0E.!..L.I.p..G\.| +peer1.org2.example.com | 00000010 6d a6 13 9e f0 7a ad 66 a5 2f b0 e1 81 68 14 a5 |m....z.f./...h..| +peer1.org2.example.com | 00000020 00 f6 e5 47 d1 02 20 7d 3e ad 47 c1 ff 9a d4 6a |...G.. }>.G....j| +peer1.org2.example.com | 00000030 1a d9 87 bb 20 b6 0c ff 52 85 f6 02 42 d7 79 a0 |.... ...R...B.y.| +peer1.org2.example.com | 00000040 ec fe d3 0e 27 3a a5 |....':.| +peer1.org2.example.com | [4e4c 05-20 18:21:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3b90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4e4d 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed3b90 gate 1589998908476323200 evaluation succeeds +peer1.org2.example.com | [4e4e 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4e4f 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4e50 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4e51 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4e52 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4e53 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4e54 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4e55 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4e56 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4e57 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e58 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e59 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e36 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4e5a 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4e5b 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4e5c 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4e5d 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4e5e 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69320 gate 1589998908505164300 evaluation starts +peer1.org2.example.com | [4e5f 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e60 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e61 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e62 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e63 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e64 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e65 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e66 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4e67 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e68 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4e69 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4e6a 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e6b 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4e6c 05-20 18:21:48.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4e6d 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69320 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4e6e 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69320 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4e6f 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4e70 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69320 principal evaluation fails +peer1.org2.example.com | [4e71 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f69320 gate 1589998908505164300 evaluation fails +peer1.org2.example.com | [4e72 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4e73 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4e74 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4e75 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f992c0 gate 1589998908543896200 evaluation starts +peer1.org2.example.com | [4e76 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f992c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4e77 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f992c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4e78 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f992c0 principal matched by identity 0 +peer1.org2.example.com | [4e79 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4e7a 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4e7b 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f992c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4e7c 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f992c0 gate 1589998908543896200 evaluation succeeds +peer1.org2.example.com | [4e7d 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4e7e 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4e7f 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4e80 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4e81 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4e82 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4e83 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e84 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4e85 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4e86 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4e87 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4e88 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4e89 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4e8a 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4e8b 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4d80 gate 1589998908564749600 evaluation starts +peer1.org2.example.com | [4e8c 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4e8d 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4d80 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4e8e 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4e8f 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4d80 principal evaluation fails +peer1.org2.example.com | [4e90 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4d80 gate 1589998908564749600 evaluation fails +peer1.org2.example.com | [4e91 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4e92 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4e93 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4e94 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc52f0 gate 1589998908565959300 evaluation starts +peer1.org2.example.com | [4e95 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc52f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4e96 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc52f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4e97 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc52f0 principal matched by identity 0 +peer1.org2.example.com | [4e98 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4e99 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4e9a 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc52f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4e9b 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc52f0 gate 1589998908565959300 evaluation succeeds +peer1.org2.example.com | [4e9c 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4e9d 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4e9e 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4e9f 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4ea0 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [4e65 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [4e66 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e67 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e68 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e69 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e6a 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e6b 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4e6c 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e6d 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4e6e 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4e6f 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4e70 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4e71 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4e72 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4e73 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ba60 gate 1589998904954259400 evaluation starts +peer0.org2.example.com | [4e74 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ba60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4e75 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ba60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4e76 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ba60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4e77 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ba60 principal evaluation fails +peer0.org2.example.com | [4e78 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00047ba60 gate 1589998904954259400 evaluation fails +peer0.org2.example.com | [4e79 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4e7a 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4e7b 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4e7c 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa050 gate 1589998904954525800 evaluation starts +peer0.org2.example.com | [4e7d 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa050 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4e7e 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa050 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4e7f 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa050 principal matched by identity 0 +peer0.org2.example.com | [4e80 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer0.org2.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer0.org2.example.com | [4e81 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer0.org2.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer0.org2.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer0.org2.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer0.org2.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer0.org2.example.com | [4e82 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa050 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4e83 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa050 gate 1589998904954525800 evaluation succeeds +peer0.org2.example.com | [4e84 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4e85 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4e86 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4e87 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4e88 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4e89 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e8a 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4e8b 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer0.org2.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer0.org2.example.com | [4e8c 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer0.org2.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer0.org2.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer0.org2.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer0.org2.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer0.org2.example.com | [4e8d 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4e8e 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4e8f 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e90 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e91 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e92 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4e93 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4e94 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4e95 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4e96 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4e97 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4e98 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4e99 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4e9a 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4e9b 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4e9c 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402100 gate 1589998905034275800 evaluation starts +peer0.org2.example.com | [4e9d 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402100 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4ea1 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4ea2 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4ea3 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ea4 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ea5 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4ea6 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4ea7 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ea8 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ea9 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4eaa 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4eab 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4eac 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ead 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4eae 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4eaf 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4eb0 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4eb1 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f99180 gate 1589998908620519500 evaluation starts +peer1.org2.example.com | [4eb2 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f99180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4eb3 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f99180 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4eb4 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f99180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4eb5 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f99180 principal evaluation fails +peer1.org2.example.com | [4eb6 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f99180 gate 1589998908620519500 evaluation fails +peer1.org2.example.com | [4eb7 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4eb8 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4eb9 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4eba 05-20 18:21:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e0e0 gate 1589998908637347300 evaluation starts +peer1.org2.example.com | [4ebb 05-20 18:21:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e0e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4ebc 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e0e0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4ebd 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e0e0 principal matched by identity 0 +peer1.org2.example.com | [4ebe 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4ebf 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4ec0 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e0e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4ec1 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418e0e0 gate 1589998908637347300 evaluation succeeds +peer1.org2.example.com | [4ec2 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ec3 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ec4 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4ec5 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4ec6 05-20 18:21:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4ec7 05-20 18:21:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4ec8 05-20 18:21:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4ec9 05-20 18:21:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4eca 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4ecb 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ecc 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ecd 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4ece 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4ecf 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4ed0 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004283430 gate 1589998908795585100 evaluation starts +peer1.org2.example.com | [4ed1 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004283430 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4ed2 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004283430 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4ed3 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004283430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4ed4 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004283430 principal evaluation fails +peer1.org2.example.com | [4ed5 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004283430 gate 1589998908795585100 evaluation fails +peer1.org2.example.com | [4ed6 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4ed7 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4ed8 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4ed9 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042839a0 gate 1589998908795878800 evaluation starts +peer1.org2.example.com | [4eda 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042839a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4edb 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042839a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4edc 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042839a0 principal matched by identity 0 +peer1.org2.example.com | [4edd 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4ede 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4edf 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042839a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4ee0 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042839a0 gate 1589998908795878800 evaluation succeeds +peer1.org2.example.com | [4ee1 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ee2 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4ee3 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4ee4 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4ee5 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4ee6 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4e9e 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402100 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4e9f 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4ea0 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402100 principal evaluation fails +peer0.org2.example.com | [4ea1 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000402100 gate 1589998905034275800 evaluation fails +peer0.org2.example.com | [4ea2 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4ea3 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4ea4 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4ea5 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004026e0 gate 1589998905035602400 evaluation starts +peer0.org2.example.com | [4ea6 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004026e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ea7 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004026e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ea8 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004026e0 principal matched by identity 0 +peer0.org2.example.com | [4ea9 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer0.org2.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer0.org2.example.com | [4eaa 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer0.org2.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer0.org2.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer0.org2.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer0.org2.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer0.org2.example.com | [4eab 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004026e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4eac 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004026e0 gate 1589998905035602400 evaluation succeeds +peer0.org2.example.com | [4ead 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4eae 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4eaf 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4eb0 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4eb1 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4eb2 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4eb3 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4eb4 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4eb5 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4eb6 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4eb7 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4eb8 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4eb9 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [4eba 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ebb 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ebc 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ebd 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4ebe 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > alive:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > alive:\217\202\372\033\266\370\272\3477\227*\244\364\274\275\304\257P\371R7\370\037\211\002 l\232\360\343\017\206\262n\270\366\322\212G\035Z\007%\261\211\0237\304Q \362\2347\363\027\003k\300" > +peer0.org2.example.com | [4ebf 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ec0 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a26 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4a27 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a28 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a29 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a2a 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a2b 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a2c 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a2d 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4a2e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 gate 1589998898651819500 evaluation starts +peer0.org1.example.com | [4a2f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a30 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4a31 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4a32 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 principal evaluation fails +peer0.org1.example.com | [4a33 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 gate 1589998898651819500 evaluation fails +peer0.org1.example.com | [4a34 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a35 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a36 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4a37 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 gate 1589998898652064800 evaluation starts +peer0.org1.example.com | [4a38 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a39 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4a3a 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 principal matched by identity 0 +peer0.org1.example.com | [4a3b 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 09 99 50 89 ca 76 a5 96 7b d2 84 6e 28 36 95 |9..P..v..{..n(6.| +peer0.org1.example.com | 00000010 97 b8 5f ac 2f 19 53 1d ce c6 55 32 15 45 6b 53 |.._./.S...U2.EkS| +peer0.org1.example.com | [4a3c 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 eb 65 95 8e ae 99 55 73 35 65 |0E.!...e....Us5e| +peer0.org1.example.com | 00000010 84 6b fa 18 b7 70 05 e9 52 fb 9e 58 d2 72 a5 9d |.k...p..R..X.r..| +peer0.org1.example.com | 00000020 f0 65 75 9d d6 02 20 09 0f a7 3e 2e f1 c8 80 d7 |.eu... ...>.....| +peer0.org1.example.com | 00000030 f4 86 a1 27 58 c9 ef 02 b9 11 c5 69 84 27 38 72 |...'X......i.'8r| +peer0.org1.example.com | 00000040 66 17 8e c2 0a ea 8a |f......| +peer0.org1.example.com | [4a3d 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4a3e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 gate 1589998898652064800 evaluation succeeds +peer0.org1.example.com | [4a3f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a40 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a41 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4a42 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4a43 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a44 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4a45 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4a46 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4a47 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4a48 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a49 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a4a 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a4b 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a4c 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a4d 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a4e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a4f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a50 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a51 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a52 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a53 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a54 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a55 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a56 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a57 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a58 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a59 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a5a 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a5b 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a5c 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4a5d 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a5e 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4a5f 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a60 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a61 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a62 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a63 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a64 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a65 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a67 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4a66 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a68 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a69 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a6a 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a6b 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a6c 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a6d 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a6e 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4a6f 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 gate 1589998898896281500 evaluation starts +peer0.org1.example.com | [4a70 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a71 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4a72 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4a73 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 principal evaluation fails +peer0.org1.example.com | [4a74 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 gate 1589998898896281500 evaluation fails +peer0.org1.example.com | [4a75 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a76 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a77 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4a78 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 gate 1589998898906152500 evaluation starts +peer0.org2.example.com | [4ec1 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ee7 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a79 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ec2 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ee8 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a7a 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ec3 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ee9 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a7b 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 principal matched by identity 0 +peer0.org2.example.com | [4ec4 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [4eea 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a7c 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 26 a8 89 be 83 3f 9b fe bf 72 c9 ef ff 7c 93 |.&....?...r...|.| +peer0.org2.example.com | [4ec5 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4eeb 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 67 5c 9c ae a9 c4 ab 34 9e a4 f7 94 c8 83 98 05 |g\.....4........| +peer0.org2.example.com | [4ec6 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4eec 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a7d 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cb ec 37 a8 5c 24 78 2c e4 f5 |0E.!....7.\$x,..| +peer0.org2.example.com | [4ec7 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4eed 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 ce 50 b4 f7 d1 6c 0d d6 51 67 20 fb a1 76 75 3e |.P...l..Qg ..vu>| +peer0.org2.example.com | [4ec8 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4eee 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 ad 42 a9 9f 7e 02 20 75 fa e6 bf cb 3e 60 4e 42 |.B..~. u....>`NB| +peer0.org2.example.com | [4ec9 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4eef 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 88 a2 b2 4f e8 f2 9d aa ec 98 89 92 45 b9 cb 8c |...O........E...| +peer0.org2.example.com | [4eca 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4ef0 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 4e 65 8a 37 a0 53 57 |Ne.7.SW| +peer0.org2.example.com | [4ecb 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 a3 d6 57 4e 31 8d b9 e2 17 a5 a0 83 3f 8a 0d |...WN1.......?..| +peer1.org2.example.com | [4ef1 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a7e 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 1e 20 7a aa 5d 22 69 0d f6 61 ec a7 e0 23 65 be |. z.]"i..a...#e.| +peer1.org2.example.com | [4ef2 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [4ecc 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 0f 6b ef e4 55 02 49 7d a2 e3 |0E.!...k..U.I}..| +peer1.org2.example.com | [4ef3 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a7f 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 gate 1589998898906152500 evaluation succeeds +peer0.org2.example.com | 00000010 e4 03 09 9e 29 d9 f0 c0 6f c6 e5 09 cc 49 eb f1 |....)...o....I..| +peer1.org2.example.com | [4ef4 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a80 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 22 61 ce a1 5e 02 20 13 1a e8 d0 b8 0f e6 11 a7 |"a..^. .........| +peer1.org2.example.com | [4ef5 05-20 18:21:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | [4a81 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 c8 81 db e2 b0 04 22 06 21 b4 cf c6 f0 d1 e9 7e |......".!......~| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [4a82 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4ef6 05-20 18:21:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | [4a83 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 f3 d7 cd 17 ec 98 5d |......]| +peer0.org1.example.com | [4a84 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [4ecd 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [4ef7 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ece 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc b9 41 f9 5e dc 62 d6 19 1a a7 |0E.!...A.^.b....| +peer0.org1.example.com | [4a85 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4ef8 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 6f a4 1d 30 e1 03 d8 1d ac a7 69 18 0c 1f 63 9f |o..0......i...c.| +peer0.org1.example.com | [4a86 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4ef9 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 89 83 ae 55 26 02 20 36 c8 17 e6 67 67 5b 1c 49 |...U&. 6...gg[.I| +peer1.org2.example.com | [4efa 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a87 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000030 cd c4 b6 b6 b1 5e 43 6e 44 de bf d3 aa 8a 5e 75 |.....^CnD.....^u| +peer1.org2.example.com | [4efb 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a88 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | 00000040 26 37 2f 5d ac 9a 4c |&7/]..L| +peer1.org2.example.com | [4efc 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4ecf 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [4efd 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a89 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ed0 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [4efe 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4a8a 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ed1 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4eff 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003590430 gate 1589998908850855700 evaluation starts +peer0.org1.example.com | [4a8b 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ed2 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4f00 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003590430 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a8c 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ed3 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4f01 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003590430 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4a8d 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ed4 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f02 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003590430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4a8e 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ed5 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f03 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003590430 principal evaluation fails +peer0.org1.example.com | [4a8f 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ed6 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f04 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003590430 gate 1589998908850855700 evaluation fails +peer0.org1.example.com | [4a90 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ed7 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [4f05 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4a91 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ed8 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f06 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4a92 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ed9 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a93 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f07 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4eda 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4a94 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f08 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035909a0 gate 1589998908851171300 evaluation starts +peer0.org2.example.com | [4edb 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\217\202\372\033\266\370\272\3477\227*\244\364\274\275\304\257P\371R7\370\037\211\002 l\232\360\343\017\206\262n\270\366\322\212G\035Z\007%\261\211\0237\304Q \362\2347\363\027\003k\300" > +peer0.org1.example.com | [4a95 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f09 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035909a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4edc 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a96 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f0a 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035909a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4edd 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a97 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f0b 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035909a0 principal matched by identity 0 +peer0.org2.example.com | [4ede 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a98 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4f0c 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | [4edf 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a99 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4ee0 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea bb ad 2b 53 67 08 a6 07 c9 e2 e7 ba b0 60 eb |...+Sg........`.| +peer0.org1.example.com | [4a9a 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4f0d 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 cf 34 78 f6 f8 cb 8e 2b d5 ea 85 52 13 d0 f7 cc |.4x....+...R....| +peer0.org1.example.com | [4a9b 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | [4ee1 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 0a c3 85 c1 de 44 35 30 5e f2 |0E.!.......D50^.| +peer0.org1.example.com | [4a9c 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000010 05 42 e7 08 c5 05 f3 95 40 12 4a f0 5f a4 aa 03 |.B......@.J._...| +peer0.org1.example.com | [4a9d 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000020 63 a1 b9 e0 10 02 20 5d 05 4c fd d9 99 30 bc fe |c..... ].L...0..| +peer0.org1.example.com | [4a9e 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | 00000030 02 70 43 96 05 33 b0 1d 32 3e b7 e1 70 50 de a7 |.pC..3..2>..pP..| +peer0.org1.example.com | [4a9f 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4f0e 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035909a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 fd 14 d3 1f 80 f1 ed |.......| +peer0.org1.example.com | [4aa0 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4f0f 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035909a0 gate 1589998908851171300 evaluation succeeds +peer0.org2.example.com | [4ee2 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4aa1 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f10 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4ee3 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4aa2 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4f11 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4ee4 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4aa3 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f12 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4ee5 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org1.example.com | [4aa4 05-20 18:21:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4f13 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4ee6 05-20 18:21:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org1.example.com | [4aa5 05-20 18:21:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161040 +peer1.org2.example.com | [4f14 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ee7 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37602 +peer0.org1.example.com | [4aa6 05-20 18:21:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DDE8334407C3E865BEA189EFB8784C67AB5E8A6A5D266ACF85BC60F757CAAD7E +peer1.org2.example.com | [4f15 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ee8 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000235450 +peer0.org1.example.com | [4aa7 05-20 18:21:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4f16 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4ee9 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [4aa8 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4f17 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4eea 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [4aa9 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [4f18 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4eeb 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [4aaa 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [4f19 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4eec 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [4aab 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f1a 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4eed 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 30 2e 75 d7 c1 6c 63 99 7c b7 ff 4c 6f ed 85 59 |0.u..lc.|..Lo..Y| +peer0.org1.example.com | [4aac 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f1b 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | 00000010 69 92 29 b9 a9 2c cd 01 b2 ac a4 26 55 21 24 22 |i.)..,.....&U!$"| +peer0.org1.example.com | [4aad 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4f1c 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591c50 gate 1589998908856437200 evaluation starts +peer0.org2.example.com | [4eee 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 8a a6 5b ee 87 b9 5f 6a 77 6e d2 |0D. V..[..._jwn.| +peer0.org1.example.com | [4aae 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f1d 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591c50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 f8 d7 ec 07 8c 04 7e 87 19 6b e9 ba 0f 2f 1c 9c |......~..k.../..| +peer1.org2.example.com | [4f1e 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591c50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4aaf 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000020 34 8c f9 5d 02 20 60 0a 2a f6 49 da 81 ee e1 6f |4..]. `.*.I....o| +peer1.org2.example.com | [4f1f 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4ab0 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 94 75 02 cd dd f5 8d db e2 a4 a7 a8 5a a4 c4 e1 |.u..........Z...| +peer1.org2.example.com | [4f20 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591c50 principal evaluation fails +peer0.org1.example.com | [4ab2 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 4c a6 f8 53 3b a9 |L..S;.| +peer0.org1.example.com | [4ab1 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f21 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591c50 gate 1589998908856437200 evaluation fails +peer1.org2.example.com | [4f22 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4ab3 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4f23 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4eef 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [4ab4 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4f24 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4ef0 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0031309a0, header 0xc000235860 +peer1.org2.example.com | [4f25 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d41c0 gate 1589998908856756500 evaluation starts +peer0.org2.example.com | [4ef1 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [4ab5 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4f26 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d41c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ef2 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU [][f8513e51] processing txid: f8513e518daafa9da7141a16a2388ae90c6bcb5a040407298f2bcfdf37d72d70 +peer0.org1.example.com | [4ab6 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f27 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d41c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4ef3 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU [][f8513e51] Entry chaincode: name:"cscc" +peer0.org1.example.com | [4ab7 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f28 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d41c0 principal matched by identity 0 +peer0.org2.example.com | [4ef4 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> INFO [][f8513e51] Entry chaincode: name:"cscc" +peer0.org1.example.com | [4ab8 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4f29 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | [4ef5 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [4ab9 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [4ef6 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [4f2a 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | [4ef7 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 30 2e 75 d7 c1 6c 63 99 7c b7 ff 4c 6f ed 85 59 |0.u..lc.|..Lo..Y| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | [4aba 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | [4abb 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | [4abc 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd e8 33 44 07 c3 e8 65 be a1 89 ef b8 78 4c 67 |..3D...e.....xLg| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | 00000010 69 92 29 b9 a9 2c cd 01 b2 ac a4 26 55 21 24 22 |i.)..,.....&U!$"| +peer0.org1.example.com | 00000010 ab 5e 8a 6a 5d 26 6a cf 85 bc 60 f7 57 ca ad 7e |.^.j]&j...`.W..~| +peer1.org2.example.com | [4f2b 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d41c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4ef8 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 8a a6 5b ee 87 b9 5f 6a 77 6e d2 |0D. V..[..._jwn.| +peer1.org2.example.com | [4f2c 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d41c0 gate 1589998908856756500 evaluation succeeds +peer0.org2.example.com | 00000010 f8 d7 ec 07 8c 04 7e 87 19 6b e9 ba 0f 2f 1c 9c |......~..k.../..| +peer1.org2.example.com | [4f2d 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000020 34 8c f9 5d 02 20 60 0a 2a f6 49 da 81 ee e1 6f |4..]. `.*.I....o| +peer1.org2.example.com | [4f2e 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4abd 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 45 15 f2 f6 45 a4 92 3a b9 a1 2a |0D. .E...E..:..*| +peer0.org2.example.com | 00000030 94 75 02 cd dd f5 8d db e2 a4 a7 a8 5a a4 c4 e1 |.u..........Z...| +peer0.org1.example.com | 00000010 aa 13 89 d2 6d a3 50 fc 08 17 a1 dc 3d bb 3f 73 |....m.P.....=.?s| +peer0.org2.example.com | 00000040 4c a6 f8 53 3b a9 |L..S;.| +peer1.org2.example.com | [4f2f 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 ed 38 7b 9b 02 20 0c ec 28 8a b9 95 56 58 d4 95 |.8{.. ..(...VX..| +peer0.org2.example.com | [4ef9 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU [f8513e51] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [4f30 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 c0 4c 6b a9 18 33 38 7f 30 70 f8 6a b6 ac 75 d0 |.Lk..38.0p.j..u.| +peer0.org2.example.com | [4efa 05-20 18:21:46.82 UTC] [%{longpkg}] %{callpath} -> DEBU [f8513e51] notifying Txid:f8513e518daafa9da7141a16a2388ae90c6bcb5a040407298f2bcfdf37d72d70, channelID: +peer1.org2.example.com | [4f31 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000040 41 1f d0 af da c2 |A.....| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4efb 05-20 18:21:46.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [4abe 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4f32 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | [4efc 05-20 18:21:46.83 UTC] [%{longpkg}] %{callpath} -> INFO [][f8513e51] Exit chaincode: name:"cscc" (4ms) +peer0.org1.example.com | [4abf 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | [4efd 05-20 18:21:46.83 UTC] [%{longpkg}] %{callpath} -> DEBU [][f8513e51] Exit +peer0.org1.example.com | [4ac0 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | [4efe 05-20 18:21:46.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37602 +peer0.org1.example.com | [4ac1 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | [4eff 05-20 18:21:46.83 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37602 grpc.code=OK grpc.call_duration=12.1623ms +peer0.org1.example.com | [4ac2 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [4f00 05-20 18:21:46.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:37602: read: connection reset by peer +peer0.org1.example.com | [4ac3 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [4f33 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f01 05-20 18:21:46.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4ac4 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f34 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4f02 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ac5 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f35 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4f03 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac6 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f36 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f04 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac7 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f37 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4f05 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac8 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f38 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f06 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ac9 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f39 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f07 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4aca 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f3a 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f08 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4acd 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f3b 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f09 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ace 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f3c 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f0a 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4acf 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f3d 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4f0b 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ad0 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f3e 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f0c 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f3f 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4ad1 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4f0d 05-20 18:21:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f40 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ad2 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4f0e 05-20 18:21:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f41 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ad3 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4f0f 05-20 18:21:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [4f42 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4ad4 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4f10 05-20 18:21:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f43 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4ad5 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4f11 05-20 18:21:48.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f44 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4ad6 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4f12 05-20 18:21:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f45 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2180 gate 1589998908863015500 evaluation starts +peer0.org1.example.com | [4ad7 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 gate 1589998899547751900 evaluation starts +peer0.org2.example.com | [4f13 05-20 18:21:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f46 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2180 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ad8 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4f14 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f47 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2180 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4ad9 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4f15 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f48 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4ada 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [4f16 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f49 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2180 principal evaluation fails +peer0.org1.example.com | [4adb 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 principal evaluation fails +peer0.org2.example.com | [4f17 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f4a 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2180 gate 1589998908863015500 evaluation fails +peer0.org1.example.com | [4adc 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 gate 1589998899547751900 evaluation fails +peer0.org2.example.com | [4f18 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f4b 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4add 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4f19 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f4c 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4acb 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f1a 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4f1b 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4acc 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f1c 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4f4d 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4ade 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4f4e 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b26f0 gate 1589998908873868700 evaluation starts +peer0.org2.example.com | [4f1d 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4adf 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4f4f 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b26f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4f1e 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4ae0 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 gate 1589998899550529800 evaluation starts +peer1.org2.example.com | [4f50 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b26f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4f1f 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4ae1 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f51 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b26f0 principal matched by identity 0 +peer0.org2.example.com | [4f20 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025871a0 gate 1589998908283659000 evaluation starts +peer0.org1.example.com | [4ae3 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f52 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer0.org2.example.com | [4f21 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025871a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ae4 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [4ae5 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f22 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025871a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4ae6 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer0.org2.example.com | [4f23 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025871a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4ae7 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [4f53 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer0.org2.example.com | [4f24 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025871a0 principal evaluation fails +peer0.org1.example.com | [4ae8 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer0.org2.example.com | [4f25 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025871a0 gate 1589998908283659000 evaluation fails +peer0.org1.example.com | [4ae2 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer0.org2.example.com | [4f26 05-20 18:21:48.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4ae9 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer0.org2.example.com | [4f27 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4aea 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 principal matched by identity 0 +peer1.org2.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer0.org2.example.com | [4f28 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4aeb 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | [4f54 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b26f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4f29 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587710 gate 1589998908297656100 evaluation starts +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4f55 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b26f0 gate 1589998908873868700 evaluation succeeds +peer0.org2.example.com | [4f2a 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4aec 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | [4f56 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4f2b 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587710 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | [4f58 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4f2c 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587710 principal matched by identity 0 +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | [4f59 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4f2d 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | [4f5a 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4f2e 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4f5b 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [4aed 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4f5c 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4f2f 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | [4aee 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 gate 1589998899550529800 evaluation succeeds +peer1.org2.example.com | [4f5d 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | [4aef 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4f5e 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | [4af0 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4f5f 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | [4af1 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4f60 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4f63 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4af2 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4f30 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587710 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4f64 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4af3 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | [4f31 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587710 gate 1589998908297656100 evaluation succeeds +peer1.org2.example.com | [4f65 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [4f32 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4f66 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4af4 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | [4f33 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4f67 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | [4f34 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4f68 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | [4f35 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4f69 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | [4f36 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4f6a 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > alive: alive: alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [4af5 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | [4f6b 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f37 05-20 18:21:48.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4f6c 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | [4af6 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | [4f61 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | [4f6d 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | [4f6e 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | [4f6f 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f38 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4f70 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f39 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4af7 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [4f71 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4f3a 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4af8 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f72 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f3b 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4af9 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [4f73 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f3c 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4afa 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f57 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4afb 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f3d 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4f74 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4afc 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f3e 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4f75 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4afd 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4f3f 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4f76 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4afe 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4f40 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4f77 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [4aff 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4f41 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1100 gate 1589998908318248000 evaluation starts +peer1.org2.example.com | [4f78 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b00 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4f42 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1100 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4f79 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b01 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4f43 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1100 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4f7a 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b02 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4f44 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4f7b 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b03 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 gate 1589998899563914600 evaluation starts +peer0.org2.example.com | [4f45 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1100 principal evaluation fails +peer1.org2.example.com | [4f7c 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b04 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4f46 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1100 gate 1589998908318248000 evaluation fails +peer1.org2.example.com | [4f7d 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b05 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4f47 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4f7e 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b06 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [4f48 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4f7f 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b07 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 principal evaluation fails +peer0.org2.example.com | [4f49 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4f80 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b08 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 gate 1589998899563914600 evaluation fails +peer0.org2.example.com | [4f4a 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b16c0 gate 1589998908318785200 evaluation starts +peer1.org2.example.com | [4f81 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [4b09 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4f4b 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b16c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4f82 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b0a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4f4c 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b16c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4f83 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4b0b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4f4d 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b16c0 principal matched by identity 0 +peer1.org2.example.com | [4f62 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4b0c 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 gate 1589998899570554500 evaluation starts +peer0.org2.example.com | [4f4e 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | [4f84 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB388161049 +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [4b0d 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4f85 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BE8070AA7D551DFD388E085348108A61E3ADE61047254CB1614BE6233D3B87C3 +peer0.org2.example.com | [4f4f 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | [4b0e 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4f86 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | [4b0f 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 principal matched by identity 0 +peer1.org2.example.com | [4f87 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | [4b10 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | [4f88 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [4f89 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [4b11 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | [4f8a 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4f50 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b16c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | [4f8b 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4f51 05-20 18:21:48.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b16c0 gate 1589998908318785200 evaluation succeeds +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | [4f8c 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 a4 c4 7f 81 30 05 a6 a4 40 bf 11 9b bb 91 df |'....0...@......| +peer0.org2.example.com | [4f52 05-20 18:21:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000010 52 5b 4d 1d dd f5 26 91 a6 c1 6f 9c 2e 1b e4 75 |R[M...&...o....u| +peer0.org2.example.com | [4f53 05-20 18:21:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4f8d 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 60 c8 2c 6c 80 0b 87 74 0b 17 5b |0D. U`.,l...t..[| +peer0.org2.example.com | [4f54 05-20 18:21:48.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4b12 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 72 1b aa 8b c2 6f 79 7a 13 07 70 6b d1 42 ec 25 |r....oyz..pk.B.%| +peer0.org2.example.com | [4f55 05-20 18:21:48.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4b13 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 gate 1589998899570554500 evaluation succeeds +peer1.org2.example.com | 00000020 99 a9 7e ae 02 20 35 28 3e a3 1c bc 13 4d c3 fe |..~.. 5(>....M..| +peer0.org2.example.com | [4f56 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | [4b14 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4b15 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 53 61 4c 1e a2 55 ff 29 d9 cf 5a db 2f 17 09 c7 |SaL..U.)..Z./...| +peer0.org1.example.com | [4b16 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 31 0e 08 2a 96 7c |1..*.|| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4b17 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4f8e 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f57 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | [4b18 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4f8f 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | [4b19 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4f90 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | [4b1a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f91 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | [4b1b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f92 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4b1c 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4f93 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f58 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b1d 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4f94 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4f59 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b1e 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4f95 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4f5a 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b1f 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4f96 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f5b 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b20 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4f97 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4f5c 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b21 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4f98 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f5d 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4b22 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4f99 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4f5f 05-20 18:21:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b23 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 gate 1589998899574039900 evaluation starts +peer1.org2.example.com | [4f9a 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f60 05-20 18:21:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b24 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4f9b 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4f61 05-20 18:21:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b25 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4f9c 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4f5e 05-20 18:21:48.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b26 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [4f9d 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4f62 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b27 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 principal evaluation fails +peer1.org2.example.com | [4f9e 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4f63 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4b28 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 gate 1589998899574039900 evaluation fails +peer1.org2.example.com | [4f9f 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4b29 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4f64 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4fa0 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b2a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4f66 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4b2b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [4f67 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4fa1 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b2c 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 gate 1589998899574918000 evaluation starts +peer0.org2.example.com | [4f65 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4fa2 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b2d 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4f69 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4fa3 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b2e 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4f68 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4fa4 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b2f 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 principal matched by identity 0 +peer0.org2.example.com | [4f6a 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4fa5 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4b30 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | [4f6b 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4fa6 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [4f6c 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593ac0 gate 1589998908455104500 evaluation starts +peer1.org2.example.com | [4fa7 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b31 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | [4f6d 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4fa8 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | [4f6e 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593ac0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4fa9 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | [4f6f 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4faa 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | [4f70 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593ac0 principal evaluation fails +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [4fab 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f71 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593ac0 gate 1589998908455104500 evaluation fails +peer0.org1.example.com | [4b32 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4fac 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4f72 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b33 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 gate 1589998899574918000 evaluation succeeds +peer1.org2.example.com | [4fad 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4f73 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b34 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4fae 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f74 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4b35 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4faf 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f75 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2080 gate 1589998908455368900 evaluation starts +peer0.org1.example.com | [4b36 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4fb0 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4f76 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2080 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b37 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4fb1 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer0.org2.example.com | [4f77 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2080 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4b38 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer0.org2.example.com | [4f78 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2080 principal matched by identity 0 +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4fb2 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer0.org2.example.com | [4f79 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | [4b39 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer0.org2.example.com | [4f7a 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [4fb3 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | [4b3a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [4b3b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4fb4 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 ae fc 04 aa 56 6d b0 69 d5 79 fe |0D. 6....Vm.i.y.| +peer0.org2.example.com | [4f7b 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2080 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b3c 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 1f e6 5b 8b 85 83 60 5c 2f ab 35 27 7c 61 ab 20 |..[...`\/.5'|a. | +peer0.org2.example.com | [4f7c 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f2080 gate 1589998908455368900 evaluation succeeds +peer0.org1.example.com | [4b3d 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 a9 1c f5 d9 02 20 29 8d d6 de 11 f6 d5 7b 81 4c |..... )......{.L| +peer0.org2.example.com | [4f7d 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b3e 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 dd d6 37 bd 5f b3 33 fa a8 54 1c b4 9a 6a 48 df |..7._.3..T...jH.| +peer0.org2.example.com | [4f7e 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b3f 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000040 60 7e 7e fd 33 df |`~~.3.| +peer0.org2.example.com | [4f7f 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4b40 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4fb5 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4f80 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4b41 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4fb6 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [4f81 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | [4b42 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 gate 1589998899579278100 evaluation starts +peer1.org2.example.com | [4fb7 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4b43 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4fb8 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4f82 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | [4b44 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4fb9 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | [4b45 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [4fba 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | [4b46 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 principal evaluation fails +peer1.org2.example.com | [4fbb 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | [4b47 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 gate 1589998899579278100 evaluation fails +peer1.org2.example.com | [4fbc 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4b48 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4fbd 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [4f83 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b49 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4fbe 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f85 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b4a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4fbf 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b4b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 gate 1589998899579955800 evaluation starts +peer0.org2.example.com | [4f86 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4fc0 05-20 18:21:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b4c 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4f87 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4fc1 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4b4d 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4f88 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4fc2 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f89 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4b4e 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 principal matched by identity 0 +peer1.org2.example.com | [4fc3 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f8a 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4b4f 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | [4fc4 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4f8b 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4fc5 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [4f8c 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f3b30 gate 1589998908502214000 evaluation starts +peer0.org1.example.com | [4b50 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | [4fc6 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4f84 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | [4fc7 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4f8e 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | [4fc8 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4f8d 05-20 18:21:48.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f3b30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | [4fc9 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f8f 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f3b30 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [4fca 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4f90 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f3b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4b51 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4fcb 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f91 05-20 18:21:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f3b30 principal evaluation fails +peer0.org1.example.com | [4b52 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 gate 1589998899579955800 evaluation succeeds +peer1.org2.example.com | [4fcc 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f92 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025f3b30 gate 1589998908502214000 evaluation fails +peer0.org1.example.com | [4b53 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4fcd 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f93 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b54 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4fce 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f94 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b55 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4fcf 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f95 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4b56 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4fd0 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f96 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026360a0 gate 1589998908543713500 evaluation starts +peer0.org1.example.com | [4b57 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | [4fd1 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f97 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026360a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4fd2 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f98 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026360a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4b58 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | [4fd3 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f99 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026360a0 principal matched by identity 0 +peer1.org2.example.com | [4fd4 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f9a 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | [4fd5 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | [4fd6 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f9b 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | [4fd7 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | [4fd8 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [4fd9 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | [4b59 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4fda 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [4b5a 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4fdb 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4f9c 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026360a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b5b 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | [4fdc 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4f9d 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026360a0 gate 1589998908543713500 evaluation succeeds +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [4fdd 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f9e 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b5c 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | [4fde 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f9f 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | [4fdf 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4fa0 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | [4fe0 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4fa1 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | [4fa2 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | [4fe1 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816104A +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [4fe2 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1D6062A9F64A0F1775FE2AC103F442EB24821CE88C282A6ED545B13D16ACE1BE +peer0.org1.example.com | [4b5d 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fa3 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | [4fe3 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4b5e 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | [4fe4 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4b5f 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | [4fe5 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [4b60 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | [4fe6 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [4b61 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4fe7 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fa4 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b62 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4fe8 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4fa5 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b63 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4fe9 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fa6 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | [4b64 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4fea 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4b65 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 gate 1589998899584150200 evaluation starts +peer1.org2.example.com | [4feb 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fa7 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | [4b66 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4fec 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | [4b67 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [4fed 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [4fee 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b68 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [4fef 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4b69 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 principal evaluation fails +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | [4ff0 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b6a 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 gate 1589998899584150200 evaluation fails +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | [4ff1 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4b6b 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b6c 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b6d 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4b6e 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 gate 1589998899585428900 evaluation starts +peer0.org1.example.com | [4b6f 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b70 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4b71 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 principal matched by identity 0 +peer0.org1.example.com | [4b72 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4b73 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4b74 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4ff2 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4b75 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 gate 1589998899585428900 evaluation succeeds +peer1.org2.example.com | [4ff3 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fa8 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b76 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4ff4 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4fa9 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b77 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4ff5 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4faa 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4b78 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4ff6 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4fab 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4b79 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4ff7 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4fac 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4b7a 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | [4ff8 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4ff9 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [4ffa 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4fad 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4b7b 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | [4ffb 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030935d0 gate 1589998909260744800 evaluation starts +peer0.org2.example.com | [4fae 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | [4ffc 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030935d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4faf 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | [4ffd 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030935d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4fb0 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002662260 gate 1589998908556688600 evaluation starts +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | [4ffe 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030935d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4fb1 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002662260 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [5000 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030935d0 principal evaluation fails +peer0.org2.example.com | [4fb2 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002662260 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4b7c 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5001 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030935d0 gate 1589998909260744800 evaluation fails +peer0.org2.example.com | [4fb3 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002662260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4b7d 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5002 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4fb4 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002662260 principal evaluation fails +peer0.org1.example.com | [4b7e 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5003 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4fb5 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002662260 gate 1589998908556688600 evaluation fails +peer0.org1.example.com | [4b7f 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5004 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4fb6 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b80 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5005 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080ad0 gate 1589998909268837000 evaluation starts +peer0.org2.example.com | [4fb7 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b81 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [5006 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4fb8 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4b82 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [5007 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080ad0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4fb9 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026627d0 gate 1589998908559551500 evaluation starts +peer0.org1.example.com | [4b83 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5008 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080ad0 principal matched by identity 0 +peer0.org2.example.com | [4fba 05-20 18:21:48.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026627d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b84 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 gate 1589998899590487400 evaluation starts +peer1.org2.example.com | [5009 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 08 60 40 d8 4d 09 7d ed 61 2f d1 77 df cf 5d |..`@.M.}.a/.w..]| +peer0.org2.example.com | [4fbb 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026627d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4b85 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 45 a2 fc a8 80 66 92 d4 e6 6a e3 61 8a 91 ce c5 |E....f...j.a....| +peer0.org2.example.com | [4fbc 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026627d0 principal matched by identity 0 +peer0.org1.example.com | [4b86 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [500a 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 72 05 3d b6 a2 a6 17 e8 27 31 |0E.!..r.=.....'1| +peer0.org2.example.com | [4fbd 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | [4b87 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | 00000010 ec 3d e6 86 72 54 30 25 90 9b 24 a5 02 16 84 be |.=..rT0%..$.....| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [4b88 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 principal evaluation fails +peer1.org2.example.com | 00000020 13 f3 0b 55 5f 02 20 71 6a d1 8e bb d3 1c 5a e8 |...U_. qj.....Z.| +peer0.org2.example.com | [4fbe 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | [4b89 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 gate 1589998899590487400 evaluation fails +peer1.org2.example.com | 00000030 6d cf 5f 7f 64 14 e0 0f e0 b3 79 eb 43 40 ef 96 |m._.d.....y.C@..| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | [4b8a 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 1c 5e 91 37 38 06 6b |.^.78.k| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | [4b8b 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4fff 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | [4b8c 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [500b 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [4b8d 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 gate 1589998899590814500 evaluation starts +peer1.org2.example.com | [500c 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080ad0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4fbf 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026627d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b8e 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [500d 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080ad0 gate 1589998909268837000 evaluation succeeds +peer0.org2.example.com | [4fc0 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026627d0 gate 1589998908559551500 evaluation succeeds +peer0.org1.example.com | [4b8f 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [500e 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4fc1 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b90 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 principal matched by identity 0 +peer1.org2.example.com | [500f 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4fc2 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b91 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | [5010 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4fc3 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [5011 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4fc4 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4b92 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | [5012 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4fc5 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | [5013 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | [5014 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4fc6 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | [5015 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [5016 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | [4b93 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [5017 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | [4b94 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 gate 1589998899590814500 evaluation succeeds +peer1.org2.example.com | [5018 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [4b95 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [5019 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4fc8 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b96 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4fc9 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [501a 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4b97 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4fca 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [501d 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b98 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4fc7 05-20 18:21:48.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [501b 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b99 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4fcb 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [501e 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b9a 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fcc 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [501c 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b9b 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fcd 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [501f 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b9c 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4fce 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [5020 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b9d 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fcf 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [5021 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b9e 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fd0 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026760c0 gate 1589998908577439900 evaluation starts +peer1.org2.example.com | [5022 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b9f 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4fd1 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026760c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5023 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ba0 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fd2 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026760c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [5024 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ba1 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4fd3 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026760c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [5026 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ba2 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fd4 05-20 18:21:48.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026760c0 principal evaluation fails +peer1.org2.example.com | [5025 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4ba3 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fd5 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026760c0 gate 1589998908577439900 evaluation fails +peer1.org2.example.com | [5027 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ba4 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fd6 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5028 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4ba5 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4fd7 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5029 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4ba6 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fd8 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [502a 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ba7 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fd9 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002676630 gate 1589998908595382000 evaluation starts +peer1.org2.example.com | [502b 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4ba8 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fda 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002676630 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [502c 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ba9 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fdb 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002676630 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [502d 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4baa 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4fdc 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002676630 principal matched by identity 0 +peer1.org2.example.com | [502e 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4bab 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fdd 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | [502f 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4bac 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [5030 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4bad 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4fde 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | [5031 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4bae 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | [5032 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4baf 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | [5033 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4bb0 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | [5034 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4bb1 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [4bb2 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [5035 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4fdf 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002676630 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4bb3 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5036 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036c980 gate 1589998909326233900 evaluation starts +peer0.org2.example.com | [4fe0 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002676630 gate 1589998908595382000 evaluation succeeds +peer0.org1.example.com | [4bb4 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5037 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036c980 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4fe1 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4bb5 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5038 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036c980 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [4fe2 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4bb6 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5039 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036c980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4fe3 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4bb7 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [503a 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036c980 principal evaluation fails +peer0.org2.example.com | [4fe4 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4bb8 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [503b 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036c980 gate 1589998909326233900 evaluation fails +peer0.org2.example.com | [4fe5 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bb9 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [503c 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4fe6 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4bba 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [503d 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4fe7 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4bbb 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [503e 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4bbc 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fe8 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [503f 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d300 gate 1589998909332551400 evaluation starts +peer0.org1.example.com | [4bbd 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fe9 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5040 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d300 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4bbe 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fea 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5041 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d300 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4bbf 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [4feb 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5042 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d300 principal matched by identity 0 +peer0.org1.example.com | [4bc0 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4fec 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5043 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer0.org1.example.com | [4bc1 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [4fed 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4fef 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4bc2 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ff0 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer0.org1.example.com | [4bc3 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ff1 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025cbdc0 gate 1589998908603380200 evaluation starts +peer1.org2.example.com | [5044 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer0.org1.example.com | [4bc4 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ff2 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025cbdc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer0.org1.example.com | [4bc5 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4ff3 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025cbdc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer0.org1.example.com | [4bc6 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU 0xc0025cbdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer0.org1.example.com | 00000010 e2 73 5a 1c db 61 c6 8f 92 80 f1 1c b2 f9 c5 0b |.sZ..a..........| +peer0.org2.example.com | [4ff5 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025cbdc0 principal evaluation fails +peer1.org2.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer0.org1.example.com | [4bc7 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer0.org2.example.com | [4ff6 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025cbdc0 gate 1589998908603380200 evaluation fails +peer1.org2.example.com | [5045 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d300 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer0.org2.example.com | [4ff7 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5046 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00036d300 gate 1589998909332551400 evaluation succeeds +peer0.org1.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer0.org2.example.com | [4ff8 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5047 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer0.org2.example.com | [4ff9 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5048 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer0.org2.example.com | [4ffa 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a3d0 gate 1589998908604020600 evaluation starts +peer1.org2.example.com | [5049 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4bc8 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [4ffb 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a3d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [504a 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [4ffc 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a3d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [504b 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4bc9 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 53 2a bc 7f 21 c4 d9 ff 88 46 |0E.!..S*..!....F| +peer0.org2.example.com | [4ffd 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a3d0 principal matched by identity 0 +peer1.org2.example.com | [504c 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | 00000010 dc 07 62 94 05 3f 03 90 11 6d 38 b7 4c 55 1b d4 |..b..?...m8.LU..| +peer0.org2.example.com | [4ffe 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 a7 01 af e8 41 b4 5f 35 04 51 14 4d 3b 2d ab |.....A._5.Q.M;-.| +peer1.org2.example.com | [504d 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000020 db c0 81 88 5d 02 20 63 83 84 14 eb ad ba 54 dc |....]. c......T.| +peer0.org2.example.com | 00000010 7c 17 8c 4c 41 e5 55 51 8e 4c 03 a2 ee c2 1b d5 ||..LA.UQ.L......| +peer1.org2.example.com | [504e 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000030 31 f6 cd 62 4e 2d c3 b4 b1 b3 01 25 6e 6a 5c b8 |1..bN-.....%nj\.| +peer0.org2.example.com | [4fff 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 4c a3 49 9b 70 a6 f0 47 5c 03 |0E.!..L.I.p..G\.| +peer1.org2.example.com | [504f 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | 00000040 11 13 c5 1b ac e7 6b |......k| +peer0.org2.example.com | 00000010 6d a6 13 9e f0 7a ad 66 a5 2f b0 e1 81 68 14 a5 |m....z.f./...h..| +peer1.org2.example.com | [5050 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 00 f6 e5 47 d1 02 20 7d 3e ad 47 c1 ff 9a d4 6a |...G.. }>.G....j| +peer0.org1.example.com | [4bca 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [5051 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 1a d9 87 bb 20 b6 0c ff 52 85 f6 02 42 d7 79 a0 |.... ...R...B.y.| +peer0.org1.example.com | [4bcb 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [5052 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 ec fe d3 0e 27 3a a5 |....':.| +peer0.org1.example.com | [4bcc 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [5053 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [5000 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a3d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4bcd 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [5054 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5001 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268a3d0 gate 1589998908604020600 evaluation succeeds +peer0.org1.example.com | [4bce 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [5055 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5002 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4bcf 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5056 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5003 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4bd0 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5057 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5004 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4bd1 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5058 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5005 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4bd2 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [5059 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4bd3 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5006 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [505a 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4bd4 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5007 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [505b 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bd5 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5008 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [505c 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bd6 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [5009 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4bd7 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [505d 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [500a 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4bd8 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [505e 05-20 18:21:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [500b 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bd9 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | [505f 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [500c 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bda 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org2.example.com | [5060 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [500d 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bdb 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5061 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4fee 05-20 18:21:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bdc 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610151801 +peer1.org2.example.com | [5062 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [500e 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4bdd 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3F2118770F38C75CB337F7EA62340C7357B738B165264A29C1E16F69C6243A71 +peer1.org2.example.com | [5063 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [500f 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bde 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org2.example.com | [5064 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [5010 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bdf 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5065 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [5011 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4be0 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5066 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5012 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4be1 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5067 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5013 05-20 18:21:48.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4be2 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5068 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5016 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4be3 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [5069 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5014 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4be4 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [506a 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5017 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4be5 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [506b 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [5018 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4be6 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [506c 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [5019 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4be7 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [506d 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [501a 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4be8 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [506e 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7350 gate 1589998909445431200 evaluation starts +peer0.org2.example.com | [501b 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4be9 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [506f 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [501c 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bea 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [5070 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7350 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [501d 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4beb 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5071 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [501e 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4bec 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [501f 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5072 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7350 principal evaluation fails +peer0.org1.example.com | [4bed 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5020 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5073 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7350 gate 1589998909445431200 evaluation fails +peer0.org1.example.com | [4bee 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5021 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5074 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4bef 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5022 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5075 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4bf0 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5023 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [5076 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4bf1 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [5024 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5077 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa78c0 gate 1589998909446244600 evaluation starts +peer0.org1.example.com | [4bf2 05-20 18:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5015 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5078 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa78c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4bf3 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [5025 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5079 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa78c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4bf4 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5026 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [507a 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa78c0 principal matched by identity 0 +peer0.org1.example.com | [4bf5 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [5027 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [507b 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer0.org1.example.com | [4bf6 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5028 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer0.org1.example.com | [4bf7 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [5029 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [507c 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer0.org1.example.com | [4bf8 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [502a 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer0.org1.example.com | [4bf9 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [502b 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer0.org1.example.com | [4bfa 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [502c 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer0.org1.example.com | [4bfb 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [502d 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer0.org1.example.com | [4bfc 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [507d 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa78c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [502e 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4bfd 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [507e 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa78c0 gate 1589998909446244600 evaluation succeeds +peer0.org2.example.com | [502f 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bfe 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [507f 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5030 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4bff 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [5080 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5031 05-20 18:21:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c00 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c01 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c02 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c03 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [5081 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4c04 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5032 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5082 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4c05 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5033 05-20 18:21:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161045 +peer1.org2.example.com | [5083 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c06 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5034 05-20 18:21:48.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 27A4C47F813005A6A440BF119BBB91DF525B4D1DDDF52691A6C16F9C2E1BE475 +peer1.org2.example.com | [5084 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c07 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [5035 05-20 18:21:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [5085 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4c08 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [5036 05-20 18:21:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [5086 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer0.org1.example.com | [4c09 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [5037 05-20 18:21:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer0.org1.example.com | [4c0a 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5038 05-20 18:21:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5087 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer0.org1.example.com | [4c0b 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [5039 05-20 18:21:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer0.org1.example.com | [4c0c 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [503a 05-20 18:21:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer0.org1.example.com | [4c0d 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [503b 05-20 18:21:48.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer0.org1.example.com | [4c0e 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [503d 05-20 18:21:48.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer0.org1.example.com | [4c0f 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [503c 05-20 18:21:48.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [5088 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c10 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [503e 05-20 18:21:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [5089 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c11 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [503f 05-20 18:21:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [508a 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4c12 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5040 05-20 18:21:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [508b 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer0.org1.example.com | [4c13 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5041 05-20 18:21:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer0.org1.example.com | [4c14 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5042 05-20 18:21:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [508c 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer0.org1.example.com | [4c15 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [5043 05-20 18:21:48.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer0.org1.example.com | [4c16 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5044 05-20 18:21:48.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer0.org1.example.com | [4c17 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 gate 1589998900931216500 evaluation starts +peer0.org2.example.com | [5046 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer0.org1.example.com | [4c18 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer0.org2.example.com | [5047 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4c19 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [508d 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5048 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4c1a 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [508e 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5049 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4c1b 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 principal evaluation fails +peer1.org2.example.com | [508f 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [504a 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268bed0 gate 1589998908817502900 evaluation starts +peer0.org1.example.com | [4c1c 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 gate 1589998900931216500 evaluation fails +peer1.org2.example.com | [5090 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [504b 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268bed0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c1d 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [5091 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [504c 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268bed0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4c1e 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [5092 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [504d 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268bed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4c1f 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [5093 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [504e 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268bed0 principal evaluation fails +peer0.org1.example.com | [4c20 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 gate 1589998900931508800 evaluation starts +peer0.org2.example.com | [504f 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268bed0 gate 1589998908817502900 evaluation fails +peer1.org2.example.com | [5094 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4c21 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5050 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5095 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c22 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5051 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5096 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c23 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 principal matched by identity 0 +peer0.org2.example.com | [5052 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5097 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4c24 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer0.org2.example.com | [5053 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6440 gate 1589998908817865600 evaluation starts +peer1.org2.example.com | [5098 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer0.org2.example.com | [5054 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6440 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5099 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4c25 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer0.org2.example.com | [5055 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6440 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [509a 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004301a0 gate 1589998909454621900 evaluation starts +peer0.org1.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer0.org2.example.com | [5056 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6440 principal matched by identity 0 +peer1.org2.example.com | [509b 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004301a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer0.org2.example.com | [5057 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer1.org2.example.com | [509c 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004301a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer0.org2.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer1.org2.example.com | [509d 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004301a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer0.org2.example.com | [5058 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer1.org2.example.com | [509e 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004301a0 principal evaluation fails +peer0.org1.example.com | [4c26 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer1.org2.example.com | [509f 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004301a0 gate 1589998909454621900 evaluation fails +peer0.org1.example.com | [4c27 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 gate 1589998900931508800 evaluation succeeds +peer0.org2.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer1.org2.example.com | [50a0 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4c28 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer1.org2.example.com | [50a1 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4c29 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer1.org2.example.com | [50a2 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4c2a 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5059 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6440 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [50a3 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430730 gate 1589998909454959200 evaluation starts +peer0.org1.example.com | [4c2b 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [505a 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026b6440 gate 1589998908817865600 evaluation succeeds +peer1.org2.example.com | [50a4 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c2c 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [505b 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [50a5 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430730 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4c2d 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [505c 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [50a6 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430730 principal matched by identity 0 +peer0.org1.example.com | [4c2e 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [505d 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [50a7 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer0.org2.example.com | [505e 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer0.org2.example.com | [505f 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c2f 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [50a8 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer0.org2.example.com | [5060 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4c30 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [5061 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4c31 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer0.org2.example.com | [5062 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4c32 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer0.org2.example.com | [5063 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4c33 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer0.org2.example.com | [5064 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c34 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer0.org2.example.com | [5065 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c35 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [50a9 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5066 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c36 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [50aa 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430730 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5067 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [4c37 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [50ab 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000430730 gate 1589998909454959200 evaluation succeeds +peer0.org2.example.com | [5068 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c38 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [50ac 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5069 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c39 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\255B\251\237~\002 u\372\346\277\313>`NB\210\242\262O\350\362\235\252\354\230\211\222E\271\313\214Ne\2127\240SW" > alive: +peer1.org2.example.com | [50ad 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [506a 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c3a 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [50ae 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [506b 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4c3b 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [50af 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4c3c 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [506c 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > alive:\243\034\274\023M\303\376SaL\036\242U\377)\331\317Z\333/\027\t\3071\016\010*\226|" > +peer1.org2.example.com | [50b0 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c3d 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161041 +peer0.org2.example.com | [506d 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [50b1 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c3e 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3BE966595C84DE7475129FDAE6C872425198584C4980E69C1BC3BD83CB531909 +peer0.org2.example.com | [506e 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [50b2 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4c3f 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [5045 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [50b3 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer0.org1.example.com | [4c40 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [506f 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer0.org1.example.com | [4c41 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | [5070 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [50b4 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer0.org2.example.com | [5071 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4c42 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer0.org2.example.com | [5072 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4c43 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer0.org2.example.com | [5073 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c44 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5074 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer0.org1.example.com | [4c45 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5075 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer0.org1.example.com | [4c46 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5076 05-20 18:21:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [50b5 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c47 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [5077 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [50b6 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c49 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5078 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [50b7 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4c48 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [5079 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [50b8 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer0.org1.example.com | [4c4b 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [507a 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer0.org1.example.com | [4c4a 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [507b 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [50b9 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer0.org1.example.com | [4c4c 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [507c 05-20 18:21:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer0.org1.example.com | [4c4d 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [507d 05-20 18:21:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer0.org1.example.com | [4c4e 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [507e 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer0.org1.example.com | [4c4f 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5080 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer0.org1.example.com | [4c50 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [507f 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [50ba 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c51 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [5081 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [50bb 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c52 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +peer0.org2.example.com | [5082 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [50bc 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +peer0.org2.example.com | [5083 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [50bd 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c53 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +peer0.org2.example.com | [5084 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [50be 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +peer0.org2.example.com | [5085 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [50bf 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +peer0.org2.example.com | [5086 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [50c0 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +peer0.org2.example.com | [5087 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [50c1 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | 00000040 14 88 56 f5 8e 65 |..V..e| +peer0.org2.example.com | [5088 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [50c2 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer0.org1.example.com | [4c54 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [5089 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [508a 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [50c3 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer0.org1.example.com | [4c55 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 9d 63 71 44 49 97 52 4a 24 a0 dc |0D. 1.cqDI.RJ$..| +peer0.org2.example.com | [508b 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer0.org1.example.com | 00000010 d3 9b ab 37 13 20 15 8f 0b 05 11 d7 24 7c f8 54 |...7. ......$|.T| +peer0.org2.example.com | [508c 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer0.org1.example.com | 00000020 73 dd 9a b8 02 20 54 a9 2d b3 76 9c b9 f6 5c 33 |s.... T.-.v...\3| +peer0.org2.example.com | [508d 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer0.org1.example.com | 00000030 6a bd dd ef 84 f4 e2 54 1e 4d 0e 65 de 6a 35 fd |j......T.M.e.j5.| +peer0.org2.example.com | [508e 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer0.org1.example.com | 00000040 f7 f0 b2 11 90 c9 |......| +peer0.org2.example.com | [508f 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [50c4 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [4c56 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [5090 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [4c57 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [5091 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [50c5 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3f 53 b3 7a ff 12 10 a9 39 77 11 |0D. k?S.z....9w.| +peer0.org1.example.com | [4c58 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5092 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161046 +peer1.org2.example.com | 00000010 2a 11 29 01 ee 23 48 08 39 9b 61 a5 59 9c 52 10 |*.)..#H.9.a.Y.R.| +peer0.org1.example.com | [4c59 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5093 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BB45386A4DDEC3FA9CFD859C1676184B8B451B99511BF634E0AFEFAC4B975347 +peer0.org2.example.com | [5094 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [5095 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000020 2e bf 18 3b 02 20 0f b9 f7 32 59 96 54 b4 e5 b9 |...;. ...2Y.T...| +peer0.org2.example.com | [5096 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [5097 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 32 8c 6f 36 43 b9 2c c5 74 90 53 e4 f2 98 e4 9c |2.o6C.,.t.S.....| +peer0.org2.example.com | [5098 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5099 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [509a 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c5a 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [509b 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [509c 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [509d 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [509e 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [509f 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50a0 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [50a1 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50a2 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [50a3 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [50a4 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50a5 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [50a6 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [50a7 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [50a8 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [50a9 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 9c dd 8c c2 a8 10 |......| +peer1.org2.example.com | [50c6 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [50c7 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [50c8 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [50c9 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [50ca 05-20 18:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:33534 +peer1.org2.example.com | [50cb 05-20 18:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003ffafa0 +peer1.org2.example.com | [50cc 05-20 18:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [50cd 05-20 18:21:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [50ce 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [50cf 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [50d0 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae a7 f3 7c 2f 12 8f 5c 44 9e c4 a7 41 37 4a 71 |...|/..\D...A7Jq| +peer1.org2.example.com | 00000010 d5 db dd 71 49 f0 c6 71 52 ef c6 f5 60 a9 63 04 |...qI..qR...`.c.| +peer1.org2.example.com | [50d1 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 95 43 d4 b9 cb 9e d2 f0 84 ca |0E.!...C........| +peer1.org2.example.com | 00000010 48 0f 01 0f 54 ed 2b 14 ab c6 2c 8d 84 97 5e ea |H...T.+...,...^.| +peer1.org2.example.com | 00000020 c9 ee 12 a7 c4 02 20 23 f9 72 73 0c 1a 11 b4 de |...... #.rs.....| +peer1.org2.example.com | 00000030 28 c1 f6 11 11 ab d8 47 0e 5c c9 79 28 5c d8 da |(......G.\.y(\..| +peer1.org2.example.com | 00000040 5e ee 0e 80 a5 48 d9 |^....H.| +peer1.org2.example.com | [50d2 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [50d3 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004e18e00, header 0xc003ffb3b0 +peer1.org2.example.com | [50d4 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org2.example.com | [50d5 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU [][49976eed] processing txid: 49976eed7eb4e5a9d93a76fd781b6c4b72c609e10be3cf83b86051e6f2c73331 +peer1.org2.example.com | [50d6 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU [][49976eed] Entry chaincode: name:"qscc" +peer1.org2.example.com | [50d7 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> INFO [][49976eed] Entry chaincode: name:"qscc" +peer1.org2.example.com | [50d8 05-20 18:21:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [50d9 05-20 18:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org2.example.com | [50da 05-20 18:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org2.example.com | [50db 05-20 18:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [50dc 05-20 18:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [50dd 05-20 18:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [50de 05-20 18:21:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [50df 05-20 18:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [50e0 05-20 18:21:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [50e1 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d6730 gate 1589998910310290000 evaluation starts +peer1.org2.example.com | [50e2 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d6730 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [50e3 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d6730 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [50e4 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d6730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org2.example.com | [50e5 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d6730 principal evaluation fails +peer1.org2.example.com | [50e6 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d6730 gate 1589998910310290000 evaluation fails +peer1.org2.example.com | [50e7 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [50e8 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [50e9 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [50ea 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d75a0 gate 1589998910319869100 evaluation starts +peer1.org2.example.com | [50eb 05-20 18:21:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d75a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [50ec 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d75a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [50ed 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d75a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [50ee 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d75a0 principal evaluation fails +peer1.org2.example.com | [50ef 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d75a0 gate 1589998910319869100 evaluation fails +peer1.org2.example.com | [50f0 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [50f1 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [50f2 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [50f3 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d7ce0 gate 1589998910321445900 evaluation starts +peer1.org2.example.com | [50f4 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d7ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [50f5 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d7ce0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [50f6 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [50f7 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [50f8 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [50f9 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d7ce0 principal matched by identity 0 +peer1.org2.example.com | [50fa 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae a7 f3 7c 2f 12 8f 5c 44 9e c4 a7 41 37 4a 71 |...|/..\D...A7Jq| +peer1.org2.example.com | 00000010 d5 db dd 71 49 f0 c6 71 52 ef c6 f5 60 a9 63 04 |...qI..qR...`.c.| +peer1.org2.example.com | [50fb 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 95 43 d4 b9 cb 9e d2 f0 84 ca |0E.!...C........| +peer1.org2.example.com | 00000010 48 0f 01 0f 54 ed 2b 14 ab c6 2c 8d 84 97 5e ea |H...T.+...,...^.| +peer1.org2.example.com | 00000020 c9 ee 12 a7 c4 02 20 23 f9 72 73 0c 1a 11 b4 de |...... #.rs.....| +peer1.org2.example.com | 00000030 28 c1 f6 11 11 ab d8 47 0e 5c c9 79 28 5c d8 da |(......G.\.y(\..| +peer1.org2.example.com | 00000040 5e ee 0e 80 a5 48 d9 |^....H.| +peer1.org2.example.com | [50fc 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d7ce0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [50fd 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d7ce0 gate 1589998910321445900 evaluation succeeds +peer1.org2.example.com | [50fe 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [50ff 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [5100 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [5101 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [5102 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU [49976eed] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [5103 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU [49976eed] notifying Txid:49976eed7eb4e5a9d93a76fd781b6c4b72c609e10be3cf83b86051e6f2c73331, channelID: +peer1.org2.example.com | [5104 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [5105 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> INFO [][49976eed] Exit chaincode: name:"qscc" (36ms) +peer1.org2.example.com | [5106 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU [][49976eed] Exit +peer1.org2.example.com | [5107 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:33534 +peer1.org2.example.com | [5108 05-20 18:21:50.32 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:33534 grpc.code=OK grpc.call_duration=46.3972ms +peer1.org2.example.com | [5109 05-20 18:21:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [510a 05-20 18:21:51.20 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [510b 05-20 18:21:51.20 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [510c 05-20 18:21:51.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [510d 05-20 18:21:51.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08C4828393C2EFB3881610171801 +peer1.org2.example.com | [510e 05-20 18:21:51.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2284397EF19D3C689631B7DB24FBD1D1C1E7A3F15BDB0737E87E792EB1E753D7 +peer1.org2.example.com | [510f 05-20 18:21:51.20 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [5110 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5111 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5112 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5113 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5114 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [5115 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5116 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5117 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [5118 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5119 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [511a 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [511b 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [511c 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [511d 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [511e 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [511f 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5120 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5121 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5122 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5123 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [5124 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5125 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5126 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5127 05-20 18:21:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5128 05-20 18:21:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5129 05-20 18:21:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [512a 05-20 18:21:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [512b 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [512c 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [512d 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [512e 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [512f 05-20 18:21:52.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5130 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [5131 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [50aa 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [50ab 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [50ac 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [50ad 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [50ae 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50af 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [50b0 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [50b1 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [50b2 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 80 70 aa 7d 55 1d fd 38 8e 08 53 48 10 8a 61 |..p.}U..8..SH..a| +peer0.org2.example.com | 00000010 e3 ad e6 10 47 25 4c b1 61 4b e6 23 3d 3b 87 c3 |....G%L.aK.#=;..| +peer0.org2.example.com | [50b3 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 fb 71 2b 8b 3a 90 f3 45 b4 e6 |0E.!...q+.:..E..| +peer0.org2.example.com | 00000010 c3 fe 0d 84 fa 40 cd 7e 3c bb 51 d9 f2 6b 55 82 |.....@.~<.Q..kU.| +peer0.org2.example.com | 00000020 51 8f 6d 81 9b 02 20 51 7a 21 9d 30 4e 81 25 f9 |Q.m... Qz!.0N.%.| +peer0.org2.example.com | 00000030 3c c7 38 b5 c5 4d 90 35 cc d9 67 be 32 83 be a9 |<.8..M.5..g.2...| +peer0.org2.example.com | 00000040 bb 5d 86 86 59 0e 5c |.]..Y.\| +peer0.org2.example.com | [50b4 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [50b5 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [50b6 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [50b7 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [50b8 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [50b9 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50ba 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50bb 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50bc 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50bd 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [50be 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [50bf 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [50c0 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [50c1 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [50c2 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [50c3 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50c4 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [5132 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5133 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c5b 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c5c 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c5d 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c5e 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4c5f 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer0.org1.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer0.org1.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer0.org1.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer0.org1.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer0.org1.example.com | [4c61 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c62 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c63 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4c64 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +peer0.org1.example.com | 00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +peer0.org1.example.com | [4c65 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +peer0.org1.example.com | 00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +peer0.org1.example.com | 00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +peer0.org1.example.com | 00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +peer0.org1.example.com | 00000040 14 88 56 f5 8e 65 |..V..e| +peer0.org1.example.com | [4c66 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c67 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c68 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c6a 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c69 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c6b 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c6c 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c6d 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4c6e 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c6f 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +peer0.org1.example.com | 00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +peer0.org1.example.com | [4c70 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +peer0.org1.example.com | 00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +peer0.org1.example.com | 00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +peer0.org1.example.com | 00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +peer0.org1.example.com | 00000040 14 88 56 f5 8e 65 |..V..e| +peer0.org1.example.com | [4c71 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c72 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c73 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c74 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4c75 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +peer0.org1.example.com | 00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +peer0.org1.example.com | 00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +peer0.org1.example.com | 00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +peer0.org1.example.com | 00000040 e9 13 35 86 49 a6 94 |..5.I..| +peer0.org2.example.com | [50c5 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [50c6 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50c7 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [50c8 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [50c9 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [50ca 05-20 18:21:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50cb 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [50cc 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [50cd 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [50ce 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50cf 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [50d0 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [50d1 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [50d2 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50d3 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [50d4 05-20 18:21:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [50d5 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer0.org2.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer0.org2.example.com | [50d6 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer0.org2.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer0.org2.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer0.org2.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer0.org2.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer0.org2.example.com | [50d7 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [50d8 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [50d9 05-20 18:21:49.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [50da 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 ae fc 04 aa 56 6d b0 69 d5 79 fe |0D. 6....Vm.i.y.| +peer0.org2.example.com | 00000010 1f e6 5b 8b 85 83 60 5c 2f ab 35 27 7c 61 ab 20 |..[...`\/.5'|a. | +peer0.org2.example.com | 00000020 a9 1c f5 d9 02 20 29 8d d6 de 11 f6 d5 7b 81 4c |..... )......{.L| +peer0.org2.example.com | 00000030 dd d6 37 bd 5f b3 33 fa a8 54 1c b4 9a 6a 48 df |..7._.3..T...jH.| +peer0.org2.example.com | 00000040 60 7e 7e fd 33 df |`~~.3.| +peer0.org2.example.com | [50db 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [50dc 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [50dd 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50de 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5134 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5135 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5136 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5137 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [5138 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [5139 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [513a 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a9af0 gate 1589998912492107300 evaluation starts +peer1.org2.example.com | [513b 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a9af0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [513c 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a9af0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [513d 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a9af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [513e 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a9af0 principal evaluation fails +peer1.org2.example.com | [513f 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a9af0 gate 1589998912492107300 evaluation fails +peer1.org2.example.com | [5140 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5141 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5142 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5143 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b4790 gate 1589998912515861800 evaluation starts +peer1.org2.example.com | [5144 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b4790 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5145 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b4790 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [5146 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b4790 principal matched by identity 0 +peer1.org2.example.com | [5147 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [5148 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [5149 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b4790 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [514a 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002b4790 gate 1589998912515861800 evaluation succeeds +peer1.org2.example.com | [514b 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [514c 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [514d 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [514e 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [514f 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [5150 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [5151 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5152 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5153 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5154 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5155 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5156 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [5157 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [5158 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [5159 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037e6f0 gate 1589998912522814000 evaluation starts +peer1.org2.example.com | [515a 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037e6f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [515b 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037e6f0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [515c 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037e6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [515d 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037e6f0 principal evaluation fails +peer1.org2.example.com | [515e 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037e6f0 gate 1589998912522814000 evaluation fails +peer1.org2.example.com | [515f 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5160 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5161 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5162 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ed40 gate 1589998912524606200 evaluation starts +peer1.org2.example.com | [5163 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ed40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5164 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ed40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [5165 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ed40 principal matched by identity 0 +peer1.org2.example.com | [5166 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [5167 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [5168 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ed40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [5169 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ed40 gate 1589998912524606200 evaluation succeeds +peer1.org2.example.com | [516a 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [516b 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [516c 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [516d 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [516e 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [516f 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [5170 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5171 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [5172 05-20 18:21:52.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [5173 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [5174 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5175 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5176 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5177 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5178 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5179 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [517a 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [517b 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [517c 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c2d30 gate 1589998912559829300 evaluation starts +peer1.org2.example.com | [517d 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c2d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [517e 05-20 18:21:52.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c2d30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [517f 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c2d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [5180 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c2d30 principal evaluation fails +peer1.org2.example.com | [5181 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c2d30 gate 1589998912559829300 evaluation fails +peer1.org2.example.com | [5182 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5183 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5184 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5185 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c32a0 gate 1589998912560939900 evaluation starts +peer1.org2.example.com | [5186 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c32a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5187 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c32a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [5188 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c32a0 principal matched by identity 0 +peer1.org2.example.com | [5189 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [4c77 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c78 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c79 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4c7a 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c7b 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4c7c 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c7d 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c7e 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4c7f 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4c80 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4c81 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 gate 1589998901058433500 evaluation starts +peer0.org1.example.com | [4c82 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c83 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4c84 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4c85 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 principal evaluation fails +peer0.org1.example.com | [4c86 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 gate 1589998901058433500 evaluation fails +peer0.org1.example.com | [4c87 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4c88 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4c89 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4c8a 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 gate 1589998901061823200 evaluation starts +peer0.org1.example.com | [4c8b 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c8c 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4c8d 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 principal matched by identity 0 +peer0.org1.example.com | [4c8e 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +peer0.org1.example.com | 00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +peer0.org1.example.com | [4c8f 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +peer0.org1.example.com | 00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +peer0.org1.example.com | 00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +peer0.org1.example.com | 00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +peer0.org1.example.com | 00000040 e9 e7 b7 92 fe 9d c0 |.......| +peer0.org1.example.com | [4c90 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4c91 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 gate 1589998901061823200 evaluation succeeds +peer0.org1.example.com | [4c92 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4c93 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4c94 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4c95 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4c96 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c97 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c98 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c99 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c9a 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c9b 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c9c 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c9d 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c9e 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c9f 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ca0 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ca1 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ca2 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [4ca3 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ca4 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ca5 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ca6 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ca7 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ca8 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4ca9 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4caa 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4cab 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4cac 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4cad 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4cae 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4caf 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4cb0 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 gate 1589998901199432200 evaluation starts +peer0.org1.example.com | [4cb1 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4cb2 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4cb3 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [50df 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [50e0 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [50e1 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [50e2 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [50e3 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [50e4 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [50e5 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [50e6 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [50e7 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [50e8 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f0fa0 gate 1589998909144609300 evaluation starts +peer0.org2.example.com | [50e9 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f0fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [50ea 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f0fa0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [50eb 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f0fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [50ec 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f0fa0 principal evaluation fails +peer0.org2.example.com | [50ed 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f0fa0 gate 1589998909144609300 evaluation fails +peer0.org2.example.com | [50ee 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [50ef 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [50f0 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [50f1 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f1530 gate 1589998909144983800 evaluation starts +peer0.org2.example.com | [50f2 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f1530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [50f3 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f1530 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [50f4 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f1530 principal matched by identity 0 +peer0.org2.example.com | [50f5 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer0.org2.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer0.org2.example.com | [50f7 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer0.org2.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer0.org2.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer0.org2.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer0.org2.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer0.org2.example.com | [50f6 05-20 18:21:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [50f8 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f1530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [50f9 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028f1530 gate 1589998909144983800 evaluation succeeds +peer0.org2.example.com | [50fa 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [50fb 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [50fc 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [50fd 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [50fe 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [50ff 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5100 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4cb4 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 principal evaluation fails +peer0.org1.example.com | [4cb5 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 gate 1589998901199432200 evaluation fails +peer0.org1.example.com | [4cb6 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4cb7 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4cb8 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4cb9 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 gate 1589998901204930000 evaluation starts +peer0.org1.example.com | [4cba 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4cbb 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4cbc 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 principal matched by identity 0 +peer0.org1.example.com | [4cbd 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 73 82 1e c1 5a 80 c0 69 90 25 27 15 6f d8 ea |os...Z..i.%'.o..| +peer0.org1.example.com | 00000010 c0 35 2c 6d c9 80 35 12 85 e1 b5 74 80 a0 93 29 |.5,m..5....t...)| +peer0.org1.example.com | [4cbe 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 5a 29 65 a2 f7 7e 5b de e0 85 |0E.!..Z)e..~[...| +peer0.org1.example.com | 00000010 18 f5 1b bf 8d 7a 8f 3f af 34 53 df fe 45 23 ed |.....z.?.4S..E#.| +peer0.org1.example.com | 00000020 8d 59 58 4c ca 02 20 4e fb f7 56 49 f9 05 19 33 |.YXL.. N..VI...3| +peer0.org1.example.com | 00000030 65 72 94 04 07 dc e7 fb b5 87 b1 2a 38 19 b6 27 |er.........*8..'| +peer0.org1.example.com | 00000040 62 a1 6d e9 cb 41 98 |b.m..A.| +peer0.org1.example.com | [4cbf 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4cc0 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 gate 1589998901204930000 evaluation succeeds +peer0.org1.example.com | [4cc1 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4cc2 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4cc3 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4cc4 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4cc5 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4cc6 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4cc7 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4cc8 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4cc9 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4cca 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ccb 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ccc 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ccd 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [4cce 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ccf 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cd0 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cd1 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4cd2 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4cd4 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cd3 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [4cd5 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cd6 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cd7 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cd8 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cd9 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4cda 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 4b 2b 9f 23 a7 43 6f be a1 6b 0b b1 0f 0c 16 |cK+.#.Co..k.....| +peer0.org1.example.com | 00000010 ba bc 0f 7b 1b 6e d1 9b fd a5 d5 b7 69 dd 65 a8 |...{.n......i.e.| +peer0.org1.example.com | [4cdb 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 00 f3 a7 29 10 8a f3 4c 82 bc 92 |0D. S...)...L...| +peer0.org1.example.com | 00000010 ae 04 32 ff 35 a2 9c a6 ee be 7c 17 2b f3 8e d3 |..2.5.....|.+...| +peer0.org1.example.com | 00000020 0c 14 f3 2d 02 20 35 53 21 9a 97 61 cd ac 4f 15 |...-. 5S!..a..O.| +peer0.org1.example.com | 00000030 ca e0 88 eb 61 de d8 b8 ff b7 94 86 7e 3e 60 58 |....a.......~>`X| +peer0.org1.example.com | 00000040 c3 c3 38 f5 87 80 |..8...| +peer0.org1.example.com | [4cdc 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cdd 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4cde 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4cdf 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4ce0 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4ce1 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ce2 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ce3 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ce4 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ce5 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ce6 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ce7 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4ce8 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ce9 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4cea 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ceb 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cec 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ced 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cee 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cef 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cf0 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cf1 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cf2 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cf3 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5101 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer0.org2.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer0.org2.example.com | [5103 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer0.org2.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer0.org2.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer0.org2.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer0.org2.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer0.org2.example.com | [5104 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5102 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5105 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5106 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5107 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5108 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5109 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [510a 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [510b 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [510c 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [510d 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [510e 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [510f 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [5110 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [5111 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5112 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5113 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5114 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5115 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5116 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [5117 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [5118 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed180 gate 1589998909199201500 evaluation starts +peer0.org2.example.com | [5119 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [518a 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [518b 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c32a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [518c 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c32a0 gate 1589998912560939900 evaluation succeeds +peer1.org2.example.com | [518d 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [518e 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [518f 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [5190 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [5191 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5192 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cf4 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cf5 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cf6 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4cf7 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cf8 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cf9 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cfa 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [4cfb 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4cfc 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cfd 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4cfe 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4cff 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d00 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d01 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4d02 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4d03 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d04 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d05 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d06 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4d07 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4d08 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d09 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d0a 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4d0b 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d0c 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4d0d 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 gate 1589998903547475900 evaluation starts +peer0.org1.example.com | [4d0e 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4d0f 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d10 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d11 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d12 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 principal evaluation fails +peer0.org2.example.com | [511a 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed180 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [511b 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [511c 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed180 principal evaluation fails +peer0.org2.example.com | [511d 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed180 gate 1589998909199201500 evaluation fails +peer0.org2.example.com | [511e 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [511f 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5120 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5121 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed6f0 gate 1589998909200316500 evaluation starts +peer0.org2.example.com | [5122 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed6f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5123 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed6f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5124 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed6f0 principal matched by identity 0 +peer0.org2.example.com | [5125 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer0.org2.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer0.org2.example.com | [5126 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer0.org2.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer0.org2.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer0.org2.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer0.org2.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer0.org2.example.com | [5127 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed6f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5128 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ed6f0 gate 1589998909200316500 evaluation succeeds +peer0.org2.example.com | [5129 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [512a 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [512b 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [512c 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [512d 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [512e 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [512f 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [5130 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer0.org2.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer0.org2.example.com | [5131 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer0.org2.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer0.org2.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer0.org2.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer0.org2.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer0.org2.example.com | [5132 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5133 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5134 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5135 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [5136 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5193 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5194 05-20 18:21:52.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5195 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5196 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [5197 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [5198 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [5199 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fe30 gate 1589998912574603500 evaluation starts +peer1.org2.example.com | [519a 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fe30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [519b 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fe30 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [519c 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fe30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [519d 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fe30 principal evaluation fails +peer1.org2.example.com | [519e 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037fe30 gate 1589998912574603500 evaluation fails +peer1.org2.example.com | [519f 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [51a0 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [51a1 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [51a2 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004203a0 gate 1589998912574943500 evaluation starts +peer1.org2.example.com | [51a3 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004203a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [51a4 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004203a0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [51a5 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004203a0 principal matched by identity 0 +peer1.org2.example.com | [51a6 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [51a7 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [51a8 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004203a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [51a9 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004203a0 gate 1589998912574943500 evaluation succeeds +peer1.org2.example.com | [51aa 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [51ab 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [51ac 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [51ad 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [51ae 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [51af 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [51b0 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [51b1 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [51b2 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [51b3 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [51b4 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [51b5 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [51b6 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51b7 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51b8 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5137 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5139 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [513a 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [513b 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [513c 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [513d 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [513e 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029652b0 gate 1589998909244515600 evaluation starts +peer0.org2.example.com | [513f 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029652b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5140 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029652b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5138 05-20 18:21:49.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5141 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [5142 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029652b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [5143 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029652b0 principal evaluation fails +peer0.org2.example.com | [5144 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029652b0 gate 1589998909244515600 evaluation fails +peer0.org2.example.com | [5145 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5146 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5147 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5148 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002965820 gate 1589998909274274000 evaluation starts +peer0.org2.example.com | [5149 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002965820 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [514a 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002965820 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [514b 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002965820 principal matched by identity 0 +peer0.org2.example.com | [514c 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 08 60 40 d8 4d 09 7d ed 61 2f d1 77 df cf 5d |..`@.M.}.a/.w..]| +peer0.org2.example.com | 00000010 45 a2 fc a8 80 66 92 d4 e6 6a e3 61 8a 91 ce c5 |E....f...j.a....| +peer0.org2.example.com | [514d 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 72 05 3d b6 a2 a6 17 e8 27 31 |0E.!..r.=.....'1| +peer0.org2.example.com | 00000010 ec 3d e6 86 72 54 30 25 90 9b 24 a5 02 16 84 be |.=..rT0%..$.....| +peer0.org2.example.com | 00000020 13 f3 0b 55 5f 02 20 71 6a d1 8e bb d3 1c 5a e8 |...U_. qj.....Z.| +peer0.org2.example.com | 00000030 6d cf 5f 7f 64 14 e0 0f e0 b3 79 eb 43 40 ef 96 |m._.d.....y.C@..| +peer0.org2.example.com | 00000040 1c 5e 91 37 38 06 6b |.^.78.k| +peer0.org2.example.com | [514e 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002965820 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [514f 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002965820 gate 1589998909274274000 evaluation succeeds +peer0.org2.example.com | [5150 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5151 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5152 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5153 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5154 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5155 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [5156 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [5157 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [5158 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [5159 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [515a 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [515b 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d13 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 gate 1589998903547475900 evaluation fails +peer0.org1.example.com | [4d14 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d15 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d16 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d17 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 gate 1589998903555905200 evaluation starts +peer0.org1.example.com | [4d18 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d19 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d1a 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 principal matched by identity 0 +peer0.org1.example.com | [4d1b 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4d1c 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4d1d 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d1e 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 gate 1589998903555905200 evaluation succeeds +peer0.org1.example.com | [4d1f 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d20 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d21 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4d22 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4d23 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [4d24 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [4d25 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d26 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d27 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4d28 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d29 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d2a 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4d2b 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d2c 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4d2d 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 gate 1589998903563666800 evaluation starts +peer0.org1.example.com | [4d2e 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d2f 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d30 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d31 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 principal evaluation fails +peer0.org1.example.com | [4d32 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 gate 1589998903563666800 evaluation fails +peer0.org1.example.com | [4d33 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [51b9 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [51ba 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [51bb 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [51bc 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [51bd 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [51be 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [51bf 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d02d0 gate 1589998912582235800 evaluation starts +peer1.org2.example.com | [51c0 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d02d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [51c1 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d02d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [51c2 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d02d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [51c3 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d02d0 principal evaluation fails +peer1.org2.example.com | [51c4 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d02d0 gate 1589998912582235800 evaluation fails +peer1.org2.example.com | [51c5 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [51c6 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [51c7 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [51c8 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d0840 gate 1589998912582841100 evaluation starts +peer1.org2.example.com | [51c9 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d0840 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [51ca 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d0840 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [51cb 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d0840 principal matched by identity 0 +peer1.org2.example.com | [51cc 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer1.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer1.org2.example.com | [51cd 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer1.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer1.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer1.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer1.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer1.org2.example.com | [51ce 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d0840 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [51cf 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d0840 gate 1589998912582841100 evaluation succeeds +peer1.org2.example.com | [51d0 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [51d1 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [51d2 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [51d3 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [51d4 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer1.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer1.org2.example.com | [51d5 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer1.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer1.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer1.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer1.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer1.org2.example.com | [51d6 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51d7 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51d8 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [51d9 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [51da 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [51db 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [51dc 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [51dd 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [51de 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e83c0 gate 1589998912584651600 evaluation starts +peer1.org2.example.com | [51df 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e83c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [51e0 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e83c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [51e1 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e83c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [51e2 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e83c0 principal evaluation fails +peer1.org2.example.com | [51e3 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e83c0 gate 1589998912584651600 evaluation fails +peer1.org2.example.com | [51e4 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [51e5 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [51e6 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [51e7 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e8930 gate 1589998912585040500 evaluation starts +peer1.org2.example.com | [51e8 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e8930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [51e9 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e8930 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [51ea 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e8930 principal matched by identity 0 +peer1.org2.example.com | [51eb 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer1.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer1.org2.example.com | [51ec 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer1.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer1.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer1.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer1.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer1.org2.example.com | [51ed 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e8930 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [51ee 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004e8930 gate 1589998912585040500 evaluation succeeds +peer1.org2.example.com | [51ef 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [51f0 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [51f1 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [51f2 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [51f3 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer1.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer1.org2.example.com | [51f4 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer1.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer1.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer1.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer1.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer1.org2.example.com | [51f5 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [51f6 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [51f7 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [51f8 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51f9 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51fa 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51fb 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51fc 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51fd 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [51fe 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [51ff 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5200 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [5201 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5202 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [5203 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [5204 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5205 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5206 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5207 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5208 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [5209 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [520a 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [520b 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000404f50 gate 1589998912736007600 evaluation starts +peer1.org2.example.com | [520c 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000404f50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [520d 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000404f50 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [520e 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000404f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [520f 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000404f50 principal evaluation fails +peer1.org2.example.com | [5210 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000404f50 gate 1589998912736007600 evaluation fails +peer1.org2.example.com | [5211 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5212 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5213 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5214 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004054c0 gate 1589998912736917800 evaluation starts +peer1.org2.example.com | [5215 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004054c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5216 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004054c0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [5217 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004054c0 principal matched by identity 0 +peer1.org2.example.com | [5218 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer1.org2.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer1.org2.example.com | [5219 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer1.org2.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer1.org2.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer1.org2.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer1.org2.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer1.org2.example.com | [521a 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004054c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [521b 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004054c0 gate 1589998912736917800 evaluation succeeds +peer1.org2.example.com | [521c 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [521d 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [521e 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [521f 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [5220 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5221 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [5222 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [5223 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [5224 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [5225 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5226 05-20 18:21:52.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5228 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [5229 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [522a 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [522b 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [522c 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [522d 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [522e 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [522f 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5227 05-20 18:21:52.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5230 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [5231 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [5232 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [5233 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5234 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [5235 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [5236 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5237 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5238 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5239 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [523a 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [523b 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [523c 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [523d 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [523e 05-20 18:21:52.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [523f 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5240 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [5241 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5242 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5243 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5244 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [5245 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5246 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [5247 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5248 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [5249 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [524a 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [524b 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [524c 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [524d 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer1.org2.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer1.org2.example.com | [524e 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer1.org2.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer1.org2.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer1.org2.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer1.org2.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer1.org2.example.com | [524f 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [5250 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 58 c8 19 c4 cb 90 84 7d 5a e8 03 |0D. .X......}Z..| +peer1.org2.example.com | 00000010 3f ea 77 5b 66 ee 3c 4b 57 48 ae 9f c2 2f 0b e1 |?.w[f. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [5252 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [5253 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [5254 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [5255 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [5256 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5257 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5258 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5259 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [525a 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [525b 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [525c 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [525d 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [525e 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [525f 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5260 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [5261 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5262 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [5263 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5264 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [5265 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5266 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [5267 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5268 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [5269 05-20 18:21:53.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [526a 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [526b 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [526d 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [526e 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [526c 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [526f 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [5270 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [5271 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5272 05-20 18:21:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [5273 05-20 18:21:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [5274 05-20 18:21:53.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5275 05-20 18:21:53.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5276 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816104B +peer1.org2.example.com | [5277 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E593107EC56A9413207014C6BEEEA69698D6912DDDD0B2DFD620B1DCD48771E2 +peer1.org2.example.com | [5278 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5279 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [527a 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [527b 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [527c 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [527d 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [527e 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [527f 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:a\323F!S\275\007\223\020\002 \022F\230\211\246+6\334E;yR\366\r\366V\366 \"A\3246\267J\364\262v\335J;t@" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5280 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5282 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5281 05-20 18:21:53.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:a\323F!S\275\007\223\020\002 \022F\230\211\246+6\334E;yR\366\r\366V\366 \"A\3246\267J\364\262v\335J;t@" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [5283 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5284 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [5285 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5286 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [5287 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [5288 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 93 10 7e c5 6a 94 13 20 70 14 c6 be ee a6 96 |...~.j.. p......| +peer1.org2.example.com | 00000010 98 d6 91 2d dd d0 b2 df d6 20 b1 dc d4 87 71 e2 |...-..... ....q.| +peer1.org2.example.com | [5289 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 4c 4d ee e8 75 fc 6d 3c bd 5c |0E.!..LM..u.m<.\| +peer1.org2.example.com | 00000010 aa 07 8b 4f cd 23 49 1f 08 cb e3 96 01 ff ed 8c |...O.#I.........| +peer1.org2.example.com | 00000020 6c 7b a2 51 26 02 20 3f 17 9d 12 06 2a 84 9b 34 |l{.Q&. ?....*..4| +peer1.org2.example.com | 00000030 74 ea 6f fe 71 48 e8 12 af d5 5f 18 e6 ab 39 01 |t.o.qH...._...9.| +peer1.org2.example.com | 00000040 67 3b 35 a0 fd 4e 11 |g;5..N.| +peer1.org2.example.com | [528a 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [528b 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 66 06 25 fe 19 e9 af a1 f6 85 f7 |0D. (f.%........| +peer1.org2.example.com | 00000010 f4 cf 8b 94 1e 22 e7 96 59 ff 3e 61 d3 46 21 53 |....."..Y.>a.F!S| +peer1.org2.example.com | 00000020 bd 07 93 10 02 20 12 46 98 89 a6 2b 36 dc 45 3b |..... .F...+6.E;| +peer1.org2.example.com | 00000030 79 52 f6 0d f6 56 f6 20 22 41 d4 36 b7 4a f4 b2 |yR...V. "A.6.J..| +peer1.org2.example.com | 00000040 76 dd 4a 3b 74 40 |v.J;t@| +peer1.org2.example.com | [528c 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [528d 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [528e 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [528f 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5290 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [5291 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5292 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [5293 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5294 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [5295 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [5296 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5297 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5298 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5299 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [529a 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [529b 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [529c 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [529d 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612ab0 gate 1589998913258678100 evaluation starts +peer1.org2.example.com | [529e 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [529f 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612ab0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [52a0 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [52a1 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612ab0 principal evaluation fails +peer1.org2.example.com | [52a2 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612ab0 gate 1589998913258678100 evaluation fails +peer1.org2.example.com | [52a3 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [52a4 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [52a5 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [52a6 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613020 gate 1589998913259084000 evaluation starts +peer1.org2.example.com | [52a7 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613020 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [52a8 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613020 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [52a9 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613020 principal matched by identity 0 +peer1.org2.example.com | [52aa 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer1.org2.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer1.org2.example.com | [52ab 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer1.org2.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer1.org2.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer1.org2.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer1.org2.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer1.org2.example.com | [52ac 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613020 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [52ad 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613020 gate 1589998913259084000 evaluation succeeds +peer1.org2.example.com | [52ae 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [52af 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [52b0 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [52b1 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [52b2 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [52b3 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52b4 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [52b5 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer1.org2.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer1.org2.example.com | [52b6 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer1.org2.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer1.org2.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer1.org2.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer1.org2.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer1.org2.example.com | [52b7 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [52b8 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52b9 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [52ba 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 93 10 7e c5 6a 94 13 20 70 14 c6 be ee a6 96 |...~.j.. p......| +peer1.org2.example.com | 00000010 98 d6 91 2d dd d0 b2 df d6 20 b1 dc d4 87 71 e2 |...-..... ....q.| +peer1.org2.example.com | [52bb 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 4c 4d ee e8 75 fc 6d 3c bd 5c |0E.!..LM..u.m<.\| +peer1.org2.example.com | 00000010 aa 07 8b 4f cd 23 49 1f 08 cb e3 96 01 ff ed 8c |...O.#I.........| +peer1.org2.example.com | 00000020 6c 7b a2 51 26 02 20 3f 17 9d 12 06 2a 84 9b 34 |l{.Q&. ?....*..4| +peer1.org2.example.com | 00000030 74 ea 6f fe 71 48 e8 12 af d5 5f 18 e6 ab 39 01 |t.o.qH...._...9.| +peer1.org2.example.com | 00000040 67 3b 35 a0 fd 4e 11 |g;5..N.| +peer1.org2.example.com | [52bc 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [52bd 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [52be 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52bf 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52c0 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [52c1 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52c2 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [52c3 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [52c4 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [52c5 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [52c6 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [52c7 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [52c8 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [52c9 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [52ca 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [52cb 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d9d0 gate 1589998913266583500 evaluation starts +peer1.org2.example.com | [52cc 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d9d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [52cd 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d9d0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [52ce 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [52cf 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d9d0 principal evaluation fails +peer1.org2.example.com | [52d0 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262d9d0 gate 1589998913266583500 evaluation fails +peer1.org2.example.com | [52d1 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [52d2 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [52d3 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [52d4 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262df40 gate 1589998913266965500 evaluation starts +peer1.org2.example.com | [52d5 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262df40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [52d6 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262df40 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [52d7 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262df40 principal matched by identity 0 +peer1.org2.example.com | [52d8 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 31 cf b9 42 46 10 c5 7b 33 00 c9 4c 8a 12 2b |.1..BF..{3..L..+| +peer1.org2.example.com | 00000010 78 20 e6 6f d5 51 58 e1 ce 29 48 94 0c 87 ba e4 |x .o.QX..)H.....| +peer1.org2.example.com | [52d9 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c e0 45 06 d9 67 b3 83 6e f4 74 26 |0D. ,.E..g..n.t&| +peer1.org2.example.com | 00000010 13 44 e2 34 c0 5b e6 5c 12 92 2b 43 38 f7 c2 90 |.D.4.[.\..+C8...| +peer1.org2.example.com | 00000020 92 0e 34 a3 02 20 3d b6 d3 89 e5 f3 45 dd 48 37 |..4.. =.....E.H7| +peer1.org2.example.com | 00000030 57 2f 26 4b fc c4 5e 62 60 92 50 e1 5e 33 3e 26 |W/&K..^b`.P.^3>&| +peer1.org2.example.com | 00000040 6f ea 43 2b 75 f0 |o.C+u.| +peer1.org2.example.com | [52da 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262df40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [52db 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262df40 gate 1589998913266965500 evaluation succeeds +peer1.org2.example.com | [52dc 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [52dd 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [52de 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [52df 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [52e0 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [52e1 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [52e2 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [52e3 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [52e4 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [52e5 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52e6 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52e7 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52e8 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [52e9 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [52ea 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [52eb 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [52ec 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [52ed 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52ee 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [52ef 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [52f0 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [52f1 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [52f2 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [52f3 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [52f4 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [52f5 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d34 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d35 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d36 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 gate 1589998903566801000 evaluation starts +peer0.org1.example.com | [4d37 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d38 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d39 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 principal matched by identity 0 +peer0.org1.example.com | [4d3a 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [4d3b 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [4d3c 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d3d 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 gate 1589998903566801000 evaluation succeeds +peer0.org1.example.com | [4d3e 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d3f 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d40 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4d41 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4d42 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [4d43 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [4d44 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d45 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4d46 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [4d47 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [4d48 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d49 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d4a 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4d4b 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d4c 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d4d 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4d4e 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d4f 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4d50 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 gate 1589998903580576900 evaluation starts +peer0.org1.example.com | [4d51 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d52 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d53 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d54 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 principal evaluation fails +peer0.org1.example.com | [4d55 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 gate 1589998903580576900 evaluation fails +peer0.org1.example.com | [4d56 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d57 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d58 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d59 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 gate 1589998903587716300 evaluation starts +peer0.org1.example.com | [4d5a 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d5b 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d5c 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 principal matched by identity 0 +peer0.org1.example.com | [4d5d 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4d5e 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4d5f 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d60 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 gate 1589998903587716300 evaluation succeeds +peer0.org1.example.com | [4d61 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d62 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d63 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4d64 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4d65 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [4d66 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [4d67 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d68 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d69 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4d6a 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d6b 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d6c 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4d6d 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d6e 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4d6f 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 gate 1589998903592433700 evaluation starts +peer0.org1.example.com | [4d70 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d71 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d72 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d73 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 principal evaluation fails +peer0.org1.example.com | [4d74 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 gate 1589998903592433700 evaluation fails +peer0.org1.example.com | [4d75 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d76 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d77 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d78 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 gate 1589998903593588900 evaluation starts +peer0.org1.example.com | [4d79 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d7a 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d7b 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 principal matched by identity 0 +peer0.org1.example.com | [4d7c 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [4d7d 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [4d7e 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d7f 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 gate 1589998903593588900 evaluation succeeds +peer0.org1.example.com | [4d80 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d81 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d82 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4d83 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4d84 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d85 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4d86 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d87 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d88 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d89 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4d8a 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d8b 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d8c 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4d8d 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d8e 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4d8f 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 gate 1589998903596824100 evaluation starts +peer0.org1.example.com | [4d90 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d91 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d92 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d93 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 principal evaluation fails +peer0.org1.example.com | [4d94 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 gate 1589998903596824100 evaluation fails +peer0.org1.example.com | [4d95 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d96 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d97 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d98 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 gate 1589998903597337900 evaluation starts +peer0.org1.example.com | [4d99 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d9a 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4d9b 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 principal matched by identity 0 +peer0.org1.example.com | [4d9c 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [4d9d 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [4d9e 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d9f 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 gate 1589998903597337900 evaluation succeeds +peer0.org1.example.com | [4da0 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4da1 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4da2 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4da3 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4da4 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [4da5 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [4da6 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [4da7 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [4da8 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4da9 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4daa 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4dab 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4dac 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4dad 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4dae 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4daf 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4db0 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 gate 1589998903601745000 evaluation starts +peer0.org1.example.com | [4db1 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4db2 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4db3 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4db4 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 principal evaluation fails +peer0.org1.example.com | [4db5 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 gate 1589998903601745000 evaluation fails +peer0.org1.example.com | [4db6 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4db7 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4db8 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4db9 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 gate 1589998903602348800 evaluation starts +peer0.org1.example.com | [4dba 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4dbb 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4dbc 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 principal matched by identity 0 +peer0.org1.example.com | [4dbd 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [4dbe 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [4dbf 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4dc0 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 gate 1589998903602348800 evaluation succeeds +peer0.org1.example.com | [4dc1 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4dc2 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4dc3 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4dc4 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4dc5 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4dc6 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4dc7 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4dc8 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4dc9 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4dca 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4dcb 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4dcc 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4dcd 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4dce 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4dcf 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4dd0 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4dd1 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4dd2 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 gate 1589998903658621900 evaluation starts +peer0.org1.example.com | [4dd3 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4dd4 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4dd5 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4dd6 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 principal evaluation fails +peer0.org1.example.com | [4dd7 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 gate 1589998903658621900 evaluation fails +peer0.org1.example.com | [4dd8 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4dd9 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4dda 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4ddb 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 gate 1589998903659653900 evaluation starts +peer0.org1.example.com | [4ddc 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ddd 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4dde 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 principal matched by identity 0 +peer0.org1.example.com | [4ddf 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 7e 05 ba df ab bc 44 10 f3 cf 33 c6 58 33 1c |+~.....D...3.X3.| +peer0.org1.example.com | 00000010 05 5a 6c f6 c2 ad 21 05 03 05 3a c1 7b c4 5d 04 |.Zl...!...:.{.].| +peer0.org1.example.com | [4de0 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c2 02 c9 a5 53 05 3e 8f 82 fa 1b |0D. *....S.>....| +peer0.org1.example.com | 00000010 b6 f8 ba e7 37 97 2a a4 f4 bc bd c4 af 50 f9 52 |....7.*......P.R| +peer0.org1.example.com | 00000020 37 f8 1f 89 02 20 6c 9a f0 e3 0f 86 b2 6e b8 f6 |7.... l......n..| +peer0.org1.example.com | 00000030 d2 8a 47 1d 5a 07 25 b1 89 13 37 c4 51 20 f2 9c |..G.Z.%...7.Q ..| +peer0.org1.example.com | 00000040 37 f3 17 03 6b c0 |7...k.| +peer0.org1.example.com | [4de1 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4de2 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 gate 1589998903659653900 evaluation succeeds +peer0.org2.example.com | [515c 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [515d 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [515e 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [515f 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5160 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5161 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5162 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5163 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [5164 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5165 05-20 18:21:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5166 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5167 05-20 18:21:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5168 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5169 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [516a 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [516b 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [516c 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a27430 gate 1589998909321675400 evaluation starts +peer0.org2.example.com | [516d 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a27430 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [516e 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a27430 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [516f 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a27430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [5170 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a27430 principal evaluation fails +peer0.org2.example.com | [5171 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a27430 gate 1589998909321675400 evaluation fails +peer0.org2.example.com | [5172 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5173 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5174 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5175 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a279a0 gate 1589998909343286000 evaluation starts +peer0.org2.example.com | [5176 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a279a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5177 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a279a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5178 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a279a0 principal matched by identity 0 +peer0.org2.example.com | [5179 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 08 60 40 d8 4d 09 7d ed 61 2f d1 77 df cf 5d |..`@.M.}.a/.w..]| +peer0.org2.example.com | 00000010 45 a2 fc a8 80 66 92 d4 e6 6a e3 61 8a 91 ce c5 |E....f...j.a....| +peer0.org2.example.com | [517a 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 72 05 3d b6 a2 a6 17 e8 27 31 |0E.!..r.=.....'1| +peer0.org2.example.com | 00000010 ec 3d e6 86 72 54 30 25 90 9b 24 a5 02 16 84 be |.=..rT0%..$.....| +peer0.org2.example.com | 00000020 13 f3 0b 55 5f 02 20 71 6a d1 8e bb d3 1c 5a e8 |...U_. qj.....Z.| +peer0.org2.example.com | 00000030 6d cf 5f 7f 64 14 e0 0f e0 b3 79 eb 43 40 ef 96 |m._.d.....y.C@..| +peer0.org2.example.com | 00000040 1c 5e 91 37 38 06 6b |.^.78.k| +peer0.org2.example.com | [517b 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a279a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [517c 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a279a0 gate 1589998909343286000 evaluation succeeds +peer0.org2.example.com | [517d 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [517e 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [517f 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5180 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5181 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5182 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5183 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5184 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5185 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [5186 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5187 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5188 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5189 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [518a 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [518b 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [518c 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [518d 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [518e 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [518f 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [5190 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5191 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5192 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5193 05-20 18:21:49.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5194 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5195 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5196 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [5197 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [5198 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer0.org2.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer0.org2.example.com | [5199 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer0.org2.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer0.org2.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer0.org2.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer0.org2.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer0.org2.example.com | [519a 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [519b 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3f 53 b3 7a ff 12 10 a9 39 77 11 |0D. k?S.z....9w.| +peer0.org2.example.com | 00000010 2a 11 29 01 ee 23 48 08 39 9b 61 a5 59 9c 52 10 |*.)..#H.9.a.Y.R.| +peer0.org2.example.com | 00000020 2e bf 18 3b 02 20 0f b9 f7 32 59 96 54 b4 e5 b9 |...;. ...2Y.T...| +peer0.org2.example.com | 00000030 32 8c 6f 36 43 b9 2c c5 74 90 53 e4 f2 98 e4 9c |2.o6C.,.t.S.....| +peer0.org2.example.com | 00000040 9c dd 8c c2 a8 10 |......| +peer0.org2.example.com | [519c 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [519d 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [519e 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [519f 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51a0 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [51a1 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [51a2 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [51a3 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51a4 05-20 18:21:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51a5 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [51a7 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [51a8 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [51a9 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [51aa 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\243\034\274\023M\303\376SaL\036\242U\377)\331\317Z\333/\027\t\3071\016\010*\226|" > +peer0.org2.example.com | [51ab 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [51a6 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51ac 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [51ad 05-20 18:21:49.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [51ae 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4de3 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4de4 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4de5 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4de6 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4de7 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4de8 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4de9 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4dea 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4deb 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4dec 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ded 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4dee 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4def 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4df0 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4df1 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4df2 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4df3 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4df4 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4df5 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4df6 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4df7 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4df8 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4df9 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4dfa 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [52f6 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [52f7 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026580b0 gate 1589998913309490000 evaluation starts +peer1.org2.example.com | [52f8 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026580b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [52f9 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026580b0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [52fa 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026580b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [52fb 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026580b0 principal evaluation fails +peer1.org2.example.com | [52fc 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026580b0 gate 1589998913309490000 evaluation fails +peer1.org2.example.com | [52fd 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [52fe 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [52ff 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5300 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658620 gate 1589998913309956600 evaluation starts +peer1.org2.example.com | [5301 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5302 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658620 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [5303 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5305 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:&o\352C+u\360" > alive: alive: +peer1.org2.example.com | [5304 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658620 principal matched by identity 0 +peer1.org2.example.com | [5306 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 31 cf b9 42 46 10 c5 7b 33 00 c9 4c 8a 12 2b |.1..BF..{3..L..+| +peer1.org2.example.com | 00000010 78 20 e6 6f d5 51 58 e1 ce 29 48 94 0c 87 ba e4 |x .o.QX..)H.....| +peer1.org2.example.com | [5307 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c e0 45 06 d9 67 b3 83 6e f4 74 26 |0D. ,.E..g..n.t&| +peer1.org2.example.com | 00000010 13 44 e2 34 c0 5b e6 5c 12 92 2b 43 38 f7 c2 90 |.D.4.[.\..+C8...| +peer1.org2.example.com | 00000020 92 0e 34 a3 02 20 3d b6 d3 89 e5 f3 45 dd 48 37 |..4.. =.....E.H7| +peer1.org2.example.com | 00000030 57 2f 26 4b fc c4 5e 62 60 92 50 e1 5e 33 3e 26 |W/&K..^b`.P.^3>&| +peer1.org2.example.com | 00000040 6f ea 43 2b 75 f0 |o.C+u.| +peer1.org2.example.com | [5309 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658620 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [5308 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [530a 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002658620 gate 1589998913309956600 evaluation succeeds +peer1.org2.example.com | [530b 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [530c 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [530d 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [530e 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [530f 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [5310 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5311 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5312 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [5313 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer1.org2.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer1.org2.example.com | [5314 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer1.org2.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer1.org2.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer1.org2.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer1.org2.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer1.org2.example.com | [5315 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5316 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5317 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4dfb 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4dfc 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4dfd 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4dfe 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4dff 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e00 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e01 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e02 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e03 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e04 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e05 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e06 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e07 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e08 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e09 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4e0a 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e0b 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e0c 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4e0d 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e0e 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e0f 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e10 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e11 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e12 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e13 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e14 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e15 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e16 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e17 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e18 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e19 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e1a 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e1b 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [51af 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [51b0 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [51b1 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [51b2 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [51b3 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [51b4 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [51b5 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8400 gate 1589998909461051800 evaluation starts +peer0.org2.example.com | [51b6 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [51b7 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8400 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [51b8 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [51b9 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8400 principal evaluation fails +peer0.org2.example.com | [51ba 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8400 gate 1589998909461051800 evaluation fails +peer0.org2.example.com | [51bb 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [51bc 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [51bd 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [51be 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8970 gate 1589998909461503100 evaluation starts +peer0.org2.example.com | [51bf 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [51c0 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8970 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [51c1 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8970 principal matched by identity 0 +peer0.org2.example.com | [51c2 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer0.org2.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer0.org2.example.com | [51c3 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer0.org2.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer0.org2.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer0.org2.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer0.org2.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer0.org2.example.com | [51c4 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8970 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [51c5 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8970 gate 1589998909461503100 evaluation succeeds +peer0.org2.example.com | [51c6 05-20 18:21:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [51c7 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [51c8 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [51c9 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [51ca 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [51cb 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [51cc 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [51cd 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [51ce 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [51cf 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51d0 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51d1 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51d2 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [51d3 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [51d4 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [51d5 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [51d6 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [51d7 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\243\034\274\023M\303\376SaL\036\242U\377)\331\317Z\333/\027\t\3071\016\010*\226|" > +peer0.org2.example.com | [51d8 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [51d9 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51da 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [51db 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51dc 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [51dd 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51de 05-20 18:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51df 05-20 18:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [51e0 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37610 +peer0.org2.example.com | [51e1 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025f5f40 +peer0.org2.example.com | [51e2 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [51e3 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [51e4 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [51e5 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [51e6 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a f8 b2 a4 93 f6 a2 d6 e3 7d 0c 71 78 a1 b5 c8 |J........}.qx...| +peer0.org2.example.com | 00000010 db 61 f7 c4 94 45 51 0e 84 a4 9d 1c a8 0f fb 1d |.a...EQ.........| +peer0.org2.example.com | [51e7 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 b4 f9 e8 dd f4 21 e1 68 61 c5 |0E.!.......!.ha.| +peer0.org2.example.com | 00000010 5d c9 88 dc 50 d3 fa 42 19 7a e8 90 9c a1 24 29 |]...P..B.z....$)| +peer0.org2.example.com | 00000020 b8 71 4b ac 8c 02 20 67 d2 e8 77 f8 cd ad be b2 |.qK... g..w.....| +peer0.org2.example.com | 00000030 85 3c 71 95 2c 52 fe 44 7b d1 9d 75 90 c8 38 29 |......{| +peer0.org2.example.com | [51e8 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [51e9 05-20 18:21:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002407e0, header 0xc00279a370 +peer0.org2.example.com | [51ea 05-20 18:21:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | [51eb 05-20 18:21:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU [][8709ecaf] processing txid: 8709ecaf97d80d71ed0805d791ac7c9bfe489873b0521e4eaf0881b932e7dcc9 +peer0.org2.example.com | [51ec 05-20 18:21:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU [][8709ecaf] Entry chaincode: name:"qscc" +peer0.org2.example.com | [51ed 05-20 18:21:49.75 UTC] [%{longpkg}] %{callpath} -> INFO [][8709ecaf] Entry chaincode: name:"qscc" +peer0.org2.example.com | [51ee 05-20 18:21:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [51ef 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org2.example.com | [51f0 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org2.example.com | [51f1 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [51f2 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [51f3 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [51f4 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [51f5 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [51f6 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [51f7 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f144f0 gate 1589998909769880500 evaluation starts +peer0.org2.example.com | [51f8 05-20 18:21:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f144f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [51f9 05-20 18:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f144f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [51fa 05-20 18:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f144f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [51fb 05-20 18:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f144f0 principal evaluation fails +peer0.org2.example.com | [51fc 05-20 18:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f144f0 gate 1589998909769880500 evaluation fails +peer0.org2.example.com | [51fd 05-20 18:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [51fe 05-20 18:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [51ff 05-20 18:21:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5200 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f15340 gate 1589998909778015300 evaluation starts +peer0.org2.example.com | [5201 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f15340 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5202 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f15340 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5203 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f15340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [5204 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f15340 principal evaluation fails +peer0.org2.example.com | [5205 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f15340 gate 1589998909778015300 evaluation fails +peer0.org2.example.com | [5206 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [5318 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 93 10 7e c5 6a 94 13 20 70 14 c6 be ee a6 96 |...~.j.. p......| +peer1.org2.example.com | 00000010 98 d6 91 2d dd d0 b2 df d6 20 b1 dc d4 87 71 e2 |...-..... ....q.| +peer1.org2.example.com | [5319 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 4c 4d ee e8 75 fc 6d 3c bd 5c |0E.!..LM..u.m<.\| +peer1.org2.example.com | 00000010 aa 07 8b 4f cd 23 49 1f 08 cb e3 96 01 ff ed 8c |...O.#I.........| +peer1.org2.example.com | 00000020 6c 7b a2 51 26 02 20 3f 17 9d 12 06 2a 84 9b 34 |l{.Q&. ?....*..4| +peer1.org2.example.com | 00000030 74 ea 6f fe 71 48 e8 12 af d5 5f 18 e6 ab 39 01 |t.o.qH...._...9.| +peer1.org2.example.com | 00000040 67 3b 35 a0 fd 4e 11 |g;5..N.| +peer1.org2.example.com | [531a 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [531b 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [531c 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [531d 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [531e 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [531f 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5320 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [5321 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [5322 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5323 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5324 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5325 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5326 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [5327 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [5328 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [5329 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670bc0 gate 1589998913455902100 evaluation starts +peer1.org2.example.com | [532a 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [532b 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670bc0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [532c 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [532d 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670bc0 principal evaluation fails +peer1.org2.example.com | [532e 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002670bc0 gate 1589998913455902100 evaluation fails +peer1.org2.example.com | [532f 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [5330 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4e1c 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4e1d 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e1e 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4e1f 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4e20 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4e21 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4e22 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4e23 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4e24 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 gate 1589998903894876600 evaluation starts +peer0.org1.example.com | [4e25 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4e26 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4e27 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4e28 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 principal evaluation fails +peer0.org1.example.com | [4e29 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 gate 1589998903894876600 evaluation fails +peer0.org1.example.com | [4e2a 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4e2b 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4e2c 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4e2d 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 gate 1589998903895530100 evaluation starts +peer0.org1.example.com | [4e2e 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4e2f 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4e30 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 principal matched by identity 0 +peer0.org1.example.com | [4e31 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d ba 8c 28 4e d0 9c c1 ca 80 f9 b5 1b 29 85 cd |=..(N........)..| +peer0.org1.example.com | 00000010 db 85 4f c2 bb ed 7f e4 80 43 15 ef d4 92 d5 7c |..O......C.....|| +peer0.org1.example.com | [4e32 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 98 2b fd 76 99 5b 26 b8 51 91 06 |0D. z.+.v.[&.Q..| +peer0.org1.example.com | 00000010 96 f7 2a 73 51 e9 e0 6d e3 b8 54 b1 74 a6 0a ff |..*sQ..m..T.t...| +peer0.org1.example.com | 00000020 cf cd 3e b3 02 20 7d ad 8f d6 d3 86 83 b6 2c 62 |..>.. }.......,b| +peer0.org1.example.com | 00000030 96 61 2f b2 d6 c7 33 66 b5 f5 0a e3 2d 85 c1 95 |.a/...3f....-...| +peer0.org1.example.com | 00000040 25 01 3a 4a 9b f6 |%.:J..| +peer0.org1.example.com | [4e33 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4e34 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 gate 1589998903895530100 evaluation succeeds +peer0.org1.example.com | [4e35 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4e36 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4e37 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4e38 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4e39 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e3a 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4e3b 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4e3c 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4e3d 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4e3e 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e3f 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e40 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e41 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e42 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e43 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e44 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e45 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e46 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e47 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e48 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e49 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e4a 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e4b 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e4c 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4e4d 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e4e 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e4f 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4e50 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e51 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e52 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e53 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e54 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e55 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e56 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e57 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4e58 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e59 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4e5a 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161042 +peer0.org1.example.com | [4e5b 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 093474BA294BD012CE333DAC81B5FD6AC2B77A09DC9934E43F32E5B50846C399 +peer0.org1.example.com | [4e5c 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4e5d 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4e5e 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4e5f 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [4e60 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e61 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e62 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e63 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4e64 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5207 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5208 05-20 18:21:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [5209 05-20 18:21:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f158e0 gate 1589998909801494100 evaluation starts +peer0.org2.example.com | [520a 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f158e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [520b 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f158e0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [520c 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [520d 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [520e 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [520f 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f158e0 principal matched by identity 0 +peer0.org2.example.com | [5210 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a f8 b2 a4 93 f6 a2 d6 e3 7d 0c 71 78 a1 b5 c8 |J........}.qx...| +peer0.org2.example.com | 00000010 db 61 f7 c4 94 45 51 0e 84 a4 9d 1c a8 0f fb 1d |.a...EQ.........| +peer0.org2.example.com | [5211 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 b4 f9 e8 dd f4 21 e1 68 61 c5 |0E.!.......!.ha.| +peer0.org2.example.com | 00000010 5d c9 88 dc 50 d3 fa 42 19 7a e8 90 9c a1 24 29 |]...P..B.z....$)| +peer0.org2.example.com | 00000020 b8 71 4b ac 8c 02 20 67 d2 e8 77 f8 cd ad be b2 |.qK... g..w.....| +peer0.org2.example.com | 00000030 85 3c 71 95 2c 52 fe 44 7b d1 9d 75 90 c8 38 29 |......{| +peer0.org2.example.com | [5212 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f158e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5213 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f158e0 gate 1589998909801494100 evaluation succeeds +peer0.org2.example.com | [5214 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [5215 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [5216 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5217 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5218 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU [8709ecaf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [5219 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU [8709ecaf] notifying Txid:8709ecaf97d80d71ed0805d791ac7c9bfe489873b0521e4eaf0881b932e7dcc9, channelID: +peer0.org2.example.com | [521a 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [521b 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> INFO [][8709ecaf] Exit chaincode: name:"qscc" (61ms) +peer0.org2.example.com | [521c 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU [][8709ecaf] Exit +peer0.org2.example.com | [521d 05-20 18:21:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37610 +peer0.org2.example.com | [521e 05-20 18:21:49.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37610 grpc.code=OK grpc.call_duration=71.5397ms +peer0.org2.example.com | [521f 05-20 18:21:49.86 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [5220 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [5221 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [5222 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 84 39 7e f1 9d 3c 68 96 31 b7 db 24 fb d1 d1 |".9~.. DEBU Verify: sig = 00000000 30 44 02 20 0b 6a a2 78 37 d8 e6 f0 99 94 2e ef |0D. .j.x7.......| +peer0.org2.example.com | 00000010 fc 9a 7c ce 6c 74 c7 8c 5b f5 0e c7 7b 8e 07 7a |..|.lt..[...{..z| +peer0.org2.example.com | 00000020 19 e9 1b 3b 02 20 3e e9 5c b6 69 b5 27 1e 21 07 |...;. >.\.i.'.!.| +peer0.org2.example.com | 00000030 a1 cc f0 83 06 76 7c 44 44 0c bd 0e a0 b2 c8 bd |.....v|DD.......| +peer0.org2.example.com | 00000040 dc c2 4a a4 03 65 |..J..e| +peer0.org2.example.com | [5224 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5225 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5226 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5227 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [5228 05-20 18:21:51.21 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [5229 05-20 18:21:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [522a 05-20 18:21:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [522b 05-20 18:21:51.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [522c 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [522d 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [522e 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [522f 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5230 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5231 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [5232 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [5233 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5234 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5235 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5236 05-20 18:21:51.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5237 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5238 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5239 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [523a 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [523b 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [523c 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [523d 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [523e 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [523f 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5240 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [5241 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [5242 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [5243 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [5244 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5245 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5246 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5247 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5248 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5249 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [524a 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [524b 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [524c 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e2b0 gate 1589998912083985700 evaluation starts +peer0.org2.example.com | [524d 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e2b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [524e 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e2b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [524f 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [5250 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e2b0 principal evaluation fails +peer0.org2.example.com | [5251 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e2b0 gate 1589998912083985700 evaluation fails +peer0.org2.example.com | [5252 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5253 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5254 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5255 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e820 gate 1589998912084248200 evaluation starts +peer0.org2.example.com | [5256 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e820 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5257 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e820 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5258 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e820 principal matched by identity 0 +peer0.org2.example.com | [5259 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [525a 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [525b 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e820 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [525c 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301e820 gate 1589998912084248200 evaluation succeeds +peer0.org2.example.com | [525d 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [525e 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [525f 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5260 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5261 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [5262 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [5263 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5264 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5265 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5266 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5267 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5268 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5269 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [526a 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [526b 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048230 gate 1589998912091451200 evaluation starts +peer0.org2.example.com | [526c 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048230 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [526d 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048230 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [526e 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [526f 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048230 principal evaluation fails +peer0.org2.example.com | [5270 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003048230 gate 1589998912091451200 evaluation fails +peer0.org2.example.com | [5271 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5272 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5273 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5274 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030487d0 gate 1589998912091932400 evaluation starts +peer0.org2.example.com | [5275 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030487d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5276 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030487d0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5277 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030487d0 principal matched by identity 0 +peer0.org2.example.com | [5278 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [5279 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [527a 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030487d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [527b 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030487d0 gate 1589998912091932400 evaluation succeeds +peer0.org2.example.com | [527c 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [527d 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [527e 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [527f 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5280 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5281 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [5282 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [5283 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5284 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5285 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5286 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5287 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5288 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5289 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [528a 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [528b 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [528c 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049d30 gate 1589998912097797100 evaluation starts +peer0.org2.example.com | [528d 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [528e 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049d30 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [528f 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [5290 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049d30 principal evaluation fails +peer0.org2.example.com | [5291 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003049d30 gate 1589998912097797100 evaluation fails +peer0.org2.example.com | [5292 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5293 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5294 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5295 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a62a0 gate 1589998912099210200 evaluation starts +peer0.org2.example.com | [5296 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a62a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5297 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a62a0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5298 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a62a0 principal matched by identity 0 +peer0.org2.example.com | [5299 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [529a 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [529b 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a62a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [529c 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a62a0 gate 1589998912099210200 evaluation succeeds +peer0.org1.example.com | [4e65 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4e66 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4e67 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4e68 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e69 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4e6a 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e6b 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4e6c 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e6d 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e6e 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e6f 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e70 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e71 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e72 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e73 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e74 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e75 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e76 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e77 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e78 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e79 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e7a 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e7b 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e7c 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4e7d 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e7e 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e7f 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e80 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e81 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4e82 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e83 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [5331 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5332 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671130 gate 1589998913457808700 evaluation starts +peer1.org2.example.com | [5333 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5334 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671130 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [5335 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671130 principal matched by identity 0 +peer1.org2.example.com | [5336 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 46 35 dd c7 cc 4b 2f 3d 0c 6b 0f 65 b8 9d ac |pF5...K/=.k.e...| +peer1.org2.example.com | 00000010 51 d1 15 12 e7 f0 46 27 67 48 d7 39 e7 90 ff 60 |Q.....F'gH.9...`| +peer1.org2.example.com | [5337 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc b2 74 9f 21 e8 b7 ae fd ea d7 |0E.!...t.!......| +peer1.org2.example.com | 00000010 00 65 e9 c0 5c eb f4 06 5f c3 6e de 09 24 b6 01 |.e..\..._.n..$..| +peer1.org2.example.com | 00000020 d2 27 19 3f e0 02 20 68 09 46 12 3c 50 1c 4d c4 |.'.?.. h.F. DEBU 0xc002671130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [5339 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671130 gate 1589998913457808700 evaluation succeeds +peer1.org2.example.com | [533a 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [533b 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [533c 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [533d 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [533e 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [533f 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [5340 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [5341 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [5342 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [5343 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5344 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5345 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5346 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5347 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5348 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5349 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [534a 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [534b 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [534c 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [534d 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [534e 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [534f 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [5350 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [5351 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5352 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [5353 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5354 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [5355 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5356 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [529d 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [529e 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [529f 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [52a0 05-20 18:21:52.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [52a1 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [52a2 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [52a3 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [52a4 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [52a5 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [52a6 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [52a7 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [52a8 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [52a9 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [52aa 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [52ab 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7be0 gate 1589998912100852800 evaluation starts +peer0.org1.example.com | [4e84 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e85 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e86 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e87 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4e88 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer0.org1.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer0.org1.example.com | [4e89 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer0.org1.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer0.org1.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer0.org1.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer0.org1.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer0.org1.example.com | [4e8a 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [4e8b 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 18 e5 97 e0 1d da 2f 1a df 32 5b |0D. a....../..2[| +peer0.org1.example.com | 00000010 12 ec 93 30 3e 0d 70 a9 45 53 f3 f7 51 9e 9d 90 |...0>.p.ES..Q...| +peer0.org1.example.com | 00000020 63 bd 46 6a 02 20 39 36 bf 9a 98 aa 2d 8a 40 7f |c.Fj. 96....-.@.| +peer0.org1.example.com | 00000030 9f a9 f5 45 58 34 19 25 24 52 b8 bd 50 98 60 a6 |...EX4.%$R..P.`.| +peer0.org1.example.com | 00000040 a2 ac b2 8d 51 be |....Q.| +peer0.org1.example.com | [4e8c 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4e8d 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [4e8e 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4e8f 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4e90 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4e91 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e92 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e93 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e94 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [4e95 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e96 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e97 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4e98 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e99 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4e9a 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > alive: +peer0.org1.example.com | [4e9b 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e9c 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4e9d 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [5357 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5358 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [5359 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [535a 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [535b 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [535c 05-20 18:21:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [535d 05-20 18:21:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [535e 05-20 18:21:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [535f 05-20 18:21:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5360 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [5361 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 9f 09 c4 c0 52 33 b6 90 ee 6d 28 98 93 cb 1a |.....R3...m(....| +peer1.org2.example.com | 00000010 b3 66 e0 b8 d1 2d d4 ee 56 22 12 af a9 87 7f 74 |.f...-..V".....t| +peer1.org2.example.com | [5362 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 6a 87 ec da c0 91 be 82 e6 4c cc |0D. 3j........L.| +peer1.org2.example.com | 00000010 68 c7 43 8d 4d 19 f8 cd 66 ce d4 23 50 dd 43 8e |h.C.M...f..#P.C.| +peer1.org2.example.com | 00000020 98 82 a7 d4 02 20 64 48 a3 8a d7 62 02 23 02 7d |..... dH...b.#.}| +peer1.org2.example.com | 00000030 0e cb 91 9b ae 82 b9 f4 36 04 32 dc 00 5a 86 66 |........6.2..Z.f| +peer1.org2.example.com | 00000040 e3 6d c0 d9 aa 70 |.m...p| +peer1.org2.example.com | [5363 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5364 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5365 05-20 18:21:53.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [5366 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [5367 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [5368 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [5369 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [536a 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [536b 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [536c 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [536d 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [536e 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [536f 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5370 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5371 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5372 05-20 18:21:53.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5373 05-20 18:21:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5374 05-20 18:21:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5375 05-20 18:21:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5376 05-20 18:21:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [52ac 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7be0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [52ad 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7be0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [52ae 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [52af 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7be0 principal evaluation fails +peer0.org2.example.com | [52b0 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a7be0 gate 1589998912100852800 evaluation fails +peer0.org2.example.com | [52b1 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [52b2 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [52b3 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [52b4 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120150 gate 1589998912104715800 evaluation starts +peer0.org2.example.com | [52b5 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120150 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [52b6 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120150 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [52b7 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120150 principal matched by identity 0 +peer0.org2.example.com | [52b8 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [52b9 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [52ba 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120150 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [52bb 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003120150 gate 1589998912104715800 evaluation succeeds +peer0.org2.example.com | [52bc 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [52bd 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [52be 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [52bf 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [52c0 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [52c1 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [52c2 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [52c3 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [52c4 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [52c5 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [52c6 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [52c7 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [52c8 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [52c9 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [52ca 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [52cb 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [52cc 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [52cd 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 gate 1589998912108727500 evaluation starts +peer0.org2.example.com | [52ce 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [52cf 05-20 18:21:52.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [52d0 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [52d1 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 principal evaluation fails +peer0.org2.example.com | [52d2 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121cc0 gate 1589998912108727500 evaluation fails +peer0.org2.example.com | [52d3 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [52d4 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [52d5 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [52d6 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031482b0 gate 1589998912110777600 evaluation starts +peer0.org2.example.com | [52d7 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031482b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [52d8 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031482b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [52d9 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031482b0 principal matched by identity 0 +peer0.org2.example.com | [52da 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org2.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org2.example.com | [52db 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org2.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org2.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org2.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org2.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org2.example.com | [52dc 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031482b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [52dd 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031482b0 gate 1589998912110777600 evaluation succeeds +peer0.org2.example.com | [52de 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [52df 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [52e0 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [52e1 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [52e2 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org2.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org2.example.com | [52e3 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org2.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org2.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org2.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org2.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org2.example.com | [52e4 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [52e5 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [52e6 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [52e7 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [52e8 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [52e9 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [52ea 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [52eb 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [52ec 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ba0 gate 1589998912113676500 evaluation starts +peer0.org2.example.com | [52ed 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ba0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [52ee 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ba0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [52ef 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [52f0 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ba0 principal evaluation fails +peer0.org2.example.com | [52f1 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003149ba0 gate 1589998912113676500 evaluation fails +peer0.org2.example.com | [52f2 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [52f3 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [52f4 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [52f5 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e120 gate 1589998912113927900 evaluation starts +peer0.org2.example.com | [52f6 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [52f7 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e120 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [52f8 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e120 principal matched by identity 0 +peer0.org2.example.com | [52f9 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org2.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org2.example.com | [52fa 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org2.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org2.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org2.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org2.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org2.example.com | [52fb 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e120 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [52fc 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00318e120 gate 1589998912113927900 evaluation succeeds +peer0.org2.example.com | [52fd 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [52fe 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [52ff 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5300 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5301 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org2.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org2.example.com | [5302 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org2.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org2.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org2.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org2.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org2.example.com | [5303 05-20 18:21:52.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5304 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [5305 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [5306 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5307 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5308 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5309 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [530a 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [530b 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [530c 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [530d 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [530e 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [530f 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [5310 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5311 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [5312 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [5313 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [5314 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5315 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5316 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5317 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5318 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5319 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [531a 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [531b 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [531c 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [531d 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [531e 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [531f 05-20 18:21:52.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5320 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [5321 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [5323 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [5324 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [5325 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5326 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5327 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5328 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5329 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [532a 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [532b 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [532c 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0ab0 gate 1589998912722552100 evaluation starts +peer0.org2.example.com | [532d 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0ab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [532e 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0ab0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [532f 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [5330 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0ab0 principal evaluation fails +peer0.org2.example.com | [5331 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0ab0 gate 1589998912722552100 evaluation fails +peer0.org2.example.com | [5332 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5333 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5334 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5335 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1020 gate 1589998912722922000 evaluation starts +peer0.org2.example.com | [5336 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5337 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1020 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5338 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1020 principal matched by identity 0 +peer0.org2.example.com | [5339 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer0.org2.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer0.org2.example.com | [533a 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer0.org2.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer0.org2.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer0.org2.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer0.org2.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer0.org2.example.com | [533b 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1020 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [533c 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1020 gate 1589998912722922000 evaluation succeeds +peer0.org2.example.com | [533d 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [533e 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [533f 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5340 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5341 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5342 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [5343 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [5344 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [5322 05-20 18:21:52.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5345 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [5346 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5347 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5348 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5349 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [534a 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [534b 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [534c 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [534d 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [534e 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\243\034\274\023M\303\376SaL\036\242U\377)\331\317Z\333/\027\t\3071\016\010*\226|" > +peer0.org2.example.com | [534f 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [5350 05-20 18:21:52.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5351 05-20 18:21:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [5352 05-20 18:21:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5353 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [5354 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5355 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [5357 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5358 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [5359 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [535b 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5356 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [535c 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [535a 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [535d 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [535e 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [535f 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5360 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5361 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5362 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5363 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5364 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [5365 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [5366 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5367 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5368 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5369 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [536a 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [536b 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [536c 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [536d 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [536e 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [536f 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5370 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [5371 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5372 05-20 18:21:52.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [5373 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161047 +peer0.org2.example.com | [5374 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 869688A5E70E01EDEABC567BE4BB4BF069D0C970A935494C356D955990291FF5 +peer0.org2.example.com | [5375 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [5376 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [5377 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [5378 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [5379 05-20 18:21:52.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [537a 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [537b 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [537c 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [537d 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [537e 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [537f 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [5380 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5381 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [5382 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5383 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [5384 05-20 18:21:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [5385 05-20 18:21:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [5386 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [5387 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5388 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [5389 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [538a 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [538b 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [538c 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [538d 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer0.org2.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer0.org2.example.com | [538e 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer0.org2.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer0.org2.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer0.org2.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer0.org2.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer0.org2.example.com | [538f 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5390 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5391 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [5392 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5393 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5394 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5395 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5396 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5397 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [5398 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [5399 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aab20 gate 1589998913024543100 evaluation starts +peer0.org2.example.com | [539a 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aab20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [539b 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aab20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [539c 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aab20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [539d 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aab20 principal evaluation fails +peer0.org2.example.com | [539e 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aab20 gate 1589998913024543100 evaluation fails +peer0.org2.example.com | [539f 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [53a0 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [53a1 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [53a2 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab090 gate 1589998913025214700 evaluation starts +peer0.org2.example.com | [53a3 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [53a4 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab090 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [53a5 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab090 principal matched by identity 0 +peer0.org2.example.com | [53a6 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer0.org2.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer0.org2.example.com | [53a7 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer0.org2.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer0.org2.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer0.org2.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer0.org2.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer0.org2.example.com | [53a8 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab090 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [53a9 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ab090 gate 1589998913025214700 evaluation succeeds +peer0.org1.example.com | [4e9e 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4e9f 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ea0 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ea1 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ea2 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ea3 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ea4 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [4ea5 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ea6 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4ea7 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4ea8 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4eaa 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4ea9 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eab 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4eac 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4ead 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eae 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4eaf 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4eb0 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eb1 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4eb2 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eb3 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eb4 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eb5 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4eb6 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eb7 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eb8 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eb9 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4eba 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [53aa 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [53ab 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [53ac 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [53ad 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [53ae 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [53af 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53b0 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [53b1 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer0.org2.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer0.org2.example.com | [53b2 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer0.org2.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer0.org2.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer0.org2.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer0.org2.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer0.org2.example.com | [53b3 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [53b4 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [53b5 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [53b6 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [53b7 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53b8 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53b9 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53ba 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [53bb 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [53bc 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer0.org2.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer0.org2.example.com | [53bd 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer0.org2.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer0.org2.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer0.org2.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer0.org2.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer0.org2.example.com | [53be 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [53bf 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 58 c8 19 c4 cb 90 84 7d 5a e8 03 |0D. .X......}Z..| +peer0.org2.example.com | 00000010 3f ea 77 5b 66 ee 3c 4b 57 48 ae 9f c2 2f 0b e1 |?.w[f. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [53c1 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [53c2 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53c3 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53c4 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [5377 05-20 18:21:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5378 05-20 18:21:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [5379 05-20 18:21:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [537a 05-20 18:21:53.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [537b 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [537c 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [537d 05-20 18:21:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [537e 05-20 18:21:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08A0F0D5D596EFB38816104C +peer1.org2.example.com | [537f 05-20 18:21:54.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C9BC47376024422C1773708286CFFDC9FECA36B26AE38CA4B8AC7C654495A2FD +peer1.org2.example.com | [5380 05-20 18:21:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5381 05-20 18:21:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [5382 05-20 18:21:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [5383 05-20 18:21:54.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [5384 05-20 18:21:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5385 05-20 18:21:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5386 05-20 18:21:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5387 05-20 18:21:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [5388 05-20 18:21:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5389 05-20 18:21:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [538a 05-20 18:21:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [538b 05-20 18:21:54.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [538c 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [538d 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [538e 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [538f 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5390 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5391 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:46212 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5392 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5393 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5394 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [5395 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ebb 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ebc 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ebd 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ebe 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ebf 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ec0 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ec1 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ec2 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4ec3 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ec4 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4ec5 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ec6 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ec7 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4ec8 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4ec9 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4eca 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 gate 1589998904946593700 evaluation starts +peer0.org1.example.com | [4ecb 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ecc 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4ecd 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4ece 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 principal evaluation fails +peer0.org1.example.com | [4ecf 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 gate 1589998904946593700 evaluation fails +peer0.org1.example.com | [4ed0 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [53c5 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53c6 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [53c7 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [53c8 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [53c9 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [53ca 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [53cb 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [53cc 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [53cd 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [53ce 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [53cf 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bb20 gate 1589998913059894500 evaluation starts +peer0.org2.example.com | [53d0 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bb20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [53d1 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bb20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [53d2 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [53d3 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bb20 principal evaluation fails +peer0.org2.example.com | [53d4 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320bb20 gate 1589998913059894500 evaluation fails +peer0.org2.example.com | [53d5 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [53d6 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [53d7 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [53d8 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319e090 gate 1589998913063024800 evaluation starts +peer0.org2.example.com | [53d9 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319e090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [53da 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319e090 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [53db 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319e090 principal matched by identity 0 +peer0.org2.example.com | [53dc 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer0.org2.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer0.org2.example.com | [53dd 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer0.org2.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer0.org2.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer0.org2.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer0.org2.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer0.org2.example.com | [53de 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319e090 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [53df 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319e090 gate 1589998913063024800 evaluation succeeds +peer0.org2.example.com | [53e0 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [53e1 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [53e2 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [53e3 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [53e4 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [53e5 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5396 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5397 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5398 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5399 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [539a 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [539b 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [539c 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685bb0 gate 1589998914189515400 evaluation starts +peer1.org2.example.com | [539d 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [539e 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685bb0 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [539f 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [53a0 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685bb0 principal evaluation fails +peer1.org2.example.com | [53a1 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685bb0 gate 1589998914189515400 evaluation fails +peer1.org2.example.com | [53a2 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [53a3 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [53a4 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [53a5 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002804130 gate 1589998914195331800 evaluation starts +peer1.org2.example.com | [53a6 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002804130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [53a7 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002804130 processing identity 0 with bytes of 115a110 +peer1.org2.example.com | [53a8 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002804130 principal matched by identity 0 +peer1.org2.example.com | [53a9 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 6e 3d 42 44 13 e6 86 5e 35 a9 47 7f e6 09 cb |_n=BD...^5.G....| +peer1.org2.example.com | 00000010 e6 f1 97 8f 4e b4 37 8a a9 ea 72 66 93 6c 09 68 |....N.7...rf.l.h| +peer1.org2.example.com | [53aa 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f ca d0 08 4f e0 72 d2 9d b5 bc 1e |0D. o...O.r.....| +peer1.org2.example.com | 00000010 5f d3 c2 4b 97 a1 f7 f1 1f 12 4d 09 d2 05 30 f0 |_..K......M...0.| +peer1.org2.example.com | 00000020 ed 1b 06 a8 02 20 1d 0a af b4 7f 11 c0 a9 ef b1 |..... ..........| +peer1.org2.example.com | 00000030 99 5f 80 b4 c1 62 f6 eb f8 46 f8 ff 40 6b 5f 63 |._...b...F..@k_c| +peer1.org2.example.com | 00000040 94 9f 46 12 00 5a |..F..Z| +peer1.org2.example.com | [53ab 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002804130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [53ac 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002804130 gate 1589998914195331800 evaluation succeeds +peer1.org2.example.com | [53ad 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [53ae 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [53af 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [53b0 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [53b1 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [53b2 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [53b3 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [53b4 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [53b5 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [53b6 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [53b7 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [53b8 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [53b9 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [53ba 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [53bb 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [53bc 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [53bd 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [53be 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [53bf 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [53c0 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [53c1 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [53c2 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [53c3 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [53c4 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [53c5 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [53c6 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [53c7 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57236 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [53c8 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [53c9 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [53ca 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [53cb 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39572 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [53cc 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [53cd 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [53ce 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53e6 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [53e7 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer0.org2.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer0.org2.example.com | [53e8 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer0.org2.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer0.org2.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer0.org2.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer0.org2.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer0.org2.example.com | [53e9 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [53ea 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [53eb 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53ec 05-20 18:21:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [53ed 05-20 18:21:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer0.org2.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer0.org2.example.com | [53ee 05-20 18:21:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer0.org2.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer0.org2.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer0.org2.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer0.org2.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer0.org2.example.com | [53ef 05-20 18:21:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [53f0 05-20 18:21:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53f1 05-20 18:21:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53f2 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [53f3 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [53f4 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [53f5 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [53f6 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53f7 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:a\323F!S\275\007\223\020\002 \022F\230\211\246+6\334E;yR\366\r\366V\366 \"A\3246\267J\364\262v\335J;t@" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [53f8 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:a\323F!S\275\007\223\020\002 \022F\230\211\246+6\334E;yR\366\r\366V\366 \"A\3246\267J\364\262v\335J;t@" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [53f9 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [53fa 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:a\323F!S\275\007\223\020\002 \022F\230\211\246+6\334E;yR\366\r\366V\366 \"A\3246\267J\364\262v\335J;t@" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [53fb 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [53fc 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 93 10 7e c5 6a 94 13 20 70 14 c6 be ee a6 96 |...~.j.. p......| +peer0.org2.example.com | 00000010 98 d6 91 2d dd d0 b2 df d6 20 b1 dc d4 87 71 e2 |...-..... ....q.| +peer0.org2.example.com | [53fd 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 4c 4d ee e8 75 fc 6d 3c bd 5c |0E.!..LM..u.m<.\| +peer0.org2.example.com | 00000010 aa 07 8b 4f cd 23 49 1f 08 cb e3 96 01 ff ed 8c |...O.#I.........| +peer0.org2.example.com | 00000020 6c 7b a2 51 26 02 20 3f 17 9d 12 06 2a 84 9b 34 |l{.Q&. ?....*..4| +peer0.org2.example.com | 00000030 74 ea 6f fe 71 48 e8 12 af d5 5f 18 e6 ab 39 01 |t.o.qH...._...9.| +peer0.org2.example.com | 00000040 67 3b 35 a0 fd 4e 11 |g;5..N.| +peer0.org2.example.com | [53fe 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [53ff 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 66 06 25 fe 19 e9 af a1 f6 85 f7 |0D. (f.%........| +peer0.org2.example.com | 00000010 f4 cf 8b 94 1e 22 e7 96 59 ff 3e 61 d3 46 21 53 |....."..Y.>a.F!S| +peer0.org2.example.com | 00000020 bd 07 93 10 02 20 12 46 98 89 a6 2b 36 dc 45 3b |..... .F...+6.E;| +peer0.org2.example.com | 00000030 79 52 f6 0d f6 56 f6 20 22 41 d4 36 b7 4a f4 b2 |yR...V. "A.6.J..| +peer0.org2.example.com | 00000040 76 dd 4a 3b 74 40 |v.J;t@| +peer0.org2.example.com | [5400 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [5401 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [5402 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [5403 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [5404 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [5405 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5406 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5407 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5408 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [5409 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [540a 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [540b 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [540c 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:a\323F!S\275\007\223\020\002 \022F\230\211\246+6\334E;yR\366\r\366V\366 \"A\3246\267J\364\262v\335J;t@" > > alive:\243\034\274\023M\303\376SaL\036\242U\377)\331\317Z\333/\027\t\3071\016\010*\226|" > +peer0.org2.example.com | [540d 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [540e 05-20 18:21:53.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [540f 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [5410 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5411 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [5412 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [5413 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5414 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5415 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5416 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5417 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5418 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [5419 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [541a 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378f80 gate 1589998913266324100 evaluation starts +peer0.org2.example.com | [541b 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378f80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [541c 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378f80 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [541d 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [541e 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378f80 principal evaluation fails +peer0.org2.example.com | [541f 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378f80 gate 1589998913266324100 evaluation fails +peer0.org2.example.com | [5420 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5421 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5422 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5423 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033794f0 gate 1589998913266691900 evaluation starts +peer0.org2.example.com | [5424 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033794f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5425 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033794f0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5426 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033794f0 principal matched by identity 0 +peer0.org2.example.com | [5427 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 31 cf b9 42 46 10 c5 7b 33 00 c9 4c 8a 12 2b |.1..BF..{3..L..+| +peer0.org2.example.com | 00000010 78 20 e6 6f d5 51 58 e1 ce 29 48 94 0c 87 ba e4 |x .o.QX..)H.....| +peer0.org2.example.com | [5428 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c e0 45 06 d9 67 b3 83 6e f4 74 26 |0D. ,.E..g..n.t&| +peer0.org2.example.com | 00000010 13 44 e2 34 c0 5b e6 5c 12 92 2b 43 38 f7 c2 90 |.D.4.[.\..+C8...| +peer0.org2.example.com | 00000020 92 0e 34 a3 02 20 3d b6 d3 89 e5 f3 45 dd 48 37 |..4.. =.....E.H7| +peer0.org2.example.com | 00000030 57 2f 26 4b fc c4 5e 62 60 92 50 e1 5e 33 3e 26 |W/&K..^b`.P.^3>&| +peer0.org2.example.com | 00000040 6f ea 43 2b 75 f0 |o.C+u.| +peer0.org2.example.com | [5429 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033794f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [542a 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033794f0 gate 1589998913266691900 evaluation succeeds +peer0.org2.example.com | [542b 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [542c 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [542d 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [542e 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [542f 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5430 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [5431 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [5432 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [5433 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [5434 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5435 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5436 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5437 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [5438 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5439 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [543a 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [543b 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [543c 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:&o\352C+u\360" > alive:\243\034\274\023M\303\376SaL\036\242U\377)\331\317Z\333/\027\t\3071\016\010*\226|" > +peer0.org2.example.com | [543d 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [543e 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [543f 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5440 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5441 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5442 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5443 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [5444 05-20 18:21:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5445 05-20 18:21:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5446 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5447 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5448 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5449 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [544a 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [544b 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034074b0 gate 1589998913458655600 evaluation starts +peer0.org1.example.com | [4ed1 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4ed2 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4ed3 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 gate 1589998904946853400 evaluation starts +peer0.org1.example.com | [4ed4 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ed5 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4ed6 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 principal matched by identity 0 +peer0.org1.example.com | [4ed7 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer0.org1.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer0.org1.example.com | [4ed8 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer0.org1.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer0.org1.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer0.org1.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer0.org1.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer0.org1.example.com | [4ed9 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4eda 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 gate 1589998904946853400 evaluation succeeds +peer0.org1.example.com | [4edb 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4edc 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4edd 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4ede 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4edf 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4ee0 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4ee1 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4ee2 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4ee3 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4ee4 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ee5 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ee6 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [4ee7 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ee8 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ee9 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4eea 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4eeb 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > alive: alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > alive: +peer0.org1.example.com | [4eec 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eed 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4eee 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4eef 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4ef0 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161043 +peer0.org1.example.com | [4ef1 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3DF3A91BFAB6F160E17345B24A659EF887F7318A6726D0F769548EB7D208FED2 +peer0.org1.example.com | [4ef2 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4ef3 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4ef4 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4ef5 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4ef6 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ef7 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ef8 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ef9 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4efa 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4efb 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4efc 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4efd 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4efe 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4eff 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f00 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f01 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f02 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f03 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f04 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4f06 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer0.org1.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer0.org1.example.com | [4f07 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer0.org1.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer0.org1.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer0.org1.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer0.org1.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer0.org1.example.com | [4f05 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f08 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f09 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [4f0a 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 95 32 d0 b5 b7 47 dc 74 76 6e |0E.!...2...G.tvn| +peer0.org1.example.com | 00000010 42 7e 9b d9 0b fa c0 b3 12 0f a3 2b 62 a9 5a 16 |B~.........+b.Z.| +peer0.org2.example.com | [544c 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034074b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [544d 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034074b0 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [544e 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034074b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [544f 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034074b0 principal evaluation fails +peer0.org2.example.com | [5450 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034074b0 gate 1589998913458655600 evaluation fails +peer0.org2.example.com | [5451 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5452 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [5453 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5454 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407a20 gate 1589998913463878000 evaluation starts +peer0.org2.example.com | [5455 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407a20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5456 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407a20 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [5457 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407a20 principal matched by identity 0 +peer0.org2.example.com | [5458 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 46 35 dd c7 cc 4b 2f 3d 0c 6b 0f 65 b8 9d ac |pF5...K/=.k.e...| +peer0.org2.example.com | 00000010 51 d1 15 12 e7 f0 46 27 67 48 d7 39 e7 90 ff 60 |Q.....F'gH.9...`| +peer0.org2.example.com | [5459 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc b2 74 9f 21 e8 b7 ae fd ea d7 |0E.!...t.!......| +peer0.org2.example.com | 00000010 00 65 e9 c0 5c eb f4 06 5f c3 6e de 09 24 b6 01 |.e..\..._.n..$..| +peer0.org2.example.com | 00000020 d2 27 19 3f e0 02 20 68 09 46 12 3c 50 1c 4d c4 |.'.?.. h.F. DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [545b 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [545c 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407a20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [545d 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003407a20 gate 1589998913463878000 evaluation succeeds +peer0.org2.example.com | [545e 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [545f 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5460 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5461 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5462 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5463 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [5464 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [5465 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [5466 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [5467 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5468 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5469 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [546a 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [546b 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [546c 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [546d 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [546e 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [546f 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5470 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5471 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5472 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5473 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5474 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5475 05-20 18:21:53.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5476 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5477 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5478 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [5479 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [547a 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [547b 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [547c 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [547d 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [547e 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [547f 05-20 18:21:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [5480 05-20 18:21:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [5481 05-20 18:21:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C089CB6DDF495EFB388161048 +peer0.org2.example.com | [5482 05-20 18:21:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BD9F09C4C05233B690EE6D289893CB1AB366E0B8D12DD4EE562212AFA9877F74 +peer0.org2.example.com | [5483 05-20 18:21:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [5484 05-20 18:21:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [5485 05-20 18:21:53.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [5486 05-20 18:21:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [5487 05-20 18:21:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5488 05-20 18:21:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5489 05-20 18:21:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [548a 05-20 18:21:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [548b 05-20 18:21:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [548c 05-20 18:21:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [548d 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [548e 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [548f 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5490 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5491 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5492 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5493 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5494 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5495 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [5496 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 9f 09 c4 c0 52 33 b6 90 ee 6d 28 98 93 cb 1a |.....R3...m(....| +peer0.org2.example.com | 00000010 b3 66 e0 b8 d1 2d d4 ee 56 22 12 af a9 87 7f 74 |.f...-..V".....t| +peer0.org2.example.com | [5497 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 6a 87 ec da c0 91 be 82 e6 4c cc |0D. 3j........L.| +peer0.org2.example.com | 00000010 68 c7 43 8d 4d 19 f8 cd 66 ce d4 23 50 dd 43 8e |h.C.M...f..#P.C.| +peer0.org2.example.com | 00000020 98 82 a7 d4 02 20 64 48 a3 8a d7 62 02 23 02 7d |..... dH...b.#.}| +peer0.org2.example.com | 00000030 0e cb 91 9b ae 82 b9 f4 36 04 32 dc 00 5a 86 66 |........6.2..Z.f| +peer0.org2.example.com | 00000040 e3 6d c0 d9 aa 70 |.m...p| +peer0.org2.example.com | [5498 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5499 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [549a 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [549b 05-20 18:21:53.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [549c 05-20 18:21:53.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [549d 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [549e 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [549f 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54a0 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54a1 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [54a2 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 bc 47 37 60 24 42 2c 17 73 70 82 86 cf fd c9 |..G7`$B,.sp.....| +peer0.org2.example.com | 00000010 fe ca 36 b2 6a e3 8c a4 b8 ac 7c 65 44 95 a2 fd |..6.j.....|eD...| +peer0.org2.example.com | [54a3 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 a9 99 4a 97 fa 4d 43 48 f7 7c 5d |0D. s..J..MCH.|]| +peer0.org2.example.com | 00000010 ad 96 6e e3 77 91 a6 3d af b8 df f4 03 5e c1 6e |..n.w..=.....^.n| +peer0.org2.example.com | 00000020 38 fa 05 85 02 20 44 af b9 9c 50 71 8a 26 38 45 |8.... D...Pq.&8E| +peer0.org2.example.com | 00000030 fe 75 46 b6 7e 3b ba 4f 8d db ed 0c 36 61 bc 20 |.uF.~;.O....6a. | +peer0.org2.example.com | 00000040 f7 26 ba f8 ab 6c |.&...l| +peer0.org2.example.com | [54a4 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54a5 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [54a6 05-20 18:21:54.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [54a7 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [54a8 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [54a9 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54aa 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54ab 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54ac 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54ad 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54ae 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54af 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [54b0 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54b1 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [54b2 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54b3 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54b4 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54b5 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54b6 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54b7 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54b8 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54b9 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54ba 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:34750 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54bb 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54bc 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54bd 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [54be 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54bf 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [54c0 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [54c1 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [54c2 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [54c3 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [54c4 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [54c5 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886300 gate 1589998914183606000 evaluation starts +peer0.org2.example.com | [54c6 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886300 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [54c7 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886300 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [54c8 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [54c9 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886300 principal evaluation fails +peer0.org2.example.com | [54ca 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886300 gate 1589998914183606000 evaluation fails +peer0.org2.example.com | [54cb 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [54cc 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [54cd 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [54ce 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886870 gate 1589998914190839500 evaluation starts +peer0.org2.example.com | [54cf 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54d0 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54d1 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886870 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [54d2 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886870 processing identity 0 with bytes of 115a110 +peer0.org2.example.com | [54d3 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886870 principal matched by identity 0 +peer0.org2.example.com | [54d4 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 6e 3d 42 44 13 e6 86 5e 35 a9 47 7f e6 09 cb |_n=BD...^5.G....| +peer0.org2.example.com | 00000010 e6 f1 97 8f 4e b4 37 8a a9 ea 72 66 93 6c 09 68 |....N.7...rf.l.h| +peer0.org2.example.com | [54d5 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f ca d0 08 4f e0 72 d2 9d b5 bc 1e |0D. o...O.r.....| +peer0.org2.example.com | 00000010 5f d3 c2 4b 97 a1 f7 f1 1f 12 4d 09 d2 05 30 f0 |_..K......M...0.| +peer0.org2.example.com | 00000020 ed 1b 06 a8 02 20 1d 0a af b4 7f 11 c0 a9 ef b1 |..... ..........| +peer0.org2.example.com | 00000030 99 5f 80 b4 c1 62 f6 eb f8 46 f8 ff 40 6b 5f 63 |._...b...F..@k_c| +peer0.org2.example.com | 00000040 94 9f 46 12 00 5a |..F..Z| +peer0.org2.example.com | [54d6 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886870 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [54d7 05-20 18:21:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003886870 gate 1589998914190839500 evaluation succeeds +peer0.org2.example.com | [54d8 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [54d9 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [54da 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [54db 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [54dc 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54dd 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [54de 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [54df 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [54e0 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [54e1 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54e2 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54e3 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54e4 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54e6 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54e5 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54e7 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54e8 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54e9 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54ea 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54eb 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54ec 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54ed 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54ee 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54ef 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54f0 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54f1 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54f2 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54f3 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54f4 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54f5 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54f6 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54f7 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54f8 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [54f9 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54fa 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [54fb 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54fd 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [54fc 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [54fe 05-20 18:21:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 4e 85 0b b3 7a 02 20 0c ef de a7 07 9e 0f ff cd |N...z. .........| +peer0.org1.example.com | 00000030 f6 f1 7b c9 74 b6 1e 19 30 c7 f8 23 3b ab c5 53 |..{.t...0..#;..S| +peer0.org1.example.com | 00000040 18 0a 18 5a c9 9c 58 |...Z..X| +peer0.org1.example.com | [4f0b 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [4f0c 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [4f0d 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f0e 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f0f 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f10 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4f12 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f11 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f13 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f14 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f15 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4f16 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4f17 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4f18 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4f19 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4f1a 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4f1b 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 gate 1589998905046353200 evaluation starts +peer0.org1.example.com | [4f1c 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4f1d 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4f1e 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4f1f 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 principal evaluation fails +peer0.org1.example.com | [4f20 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 gate 1589998905046353200 evaluation fails +peer0.org1.example.com | [4f21 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4f22 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4f23 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4f24 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 gate 1589998905047740100 evaluation starts +peer0.org1.example.com | [4f25 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4f26 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4f27 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 principal matched by identity 0 +peer0.org1.example.com | [4f28 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +peer0.org1.example.com | 00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +peer0.org1.example.com | [4f29 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +peer0.org1.example.com | 00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +peer0.org1.example.com | 00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +peer0.org1.example.com | 00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +peer0.org1.example.com | 00000040 b6 44 ea d4 19 a2 a2 |.D.....| +peer0.org1.example.com | [4f2a 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4f2b 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 gate 1589998905047740100 evaluation succeeds +peer0.org1.example.com | [4f2c 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4f2d 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4f2e 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4f2f 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4f30 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4f31 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f32 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4f33 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer0.org1.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer0.org1.example.com | [4f34 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer0.org1.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer0.org1.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer0.org1.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer0.org1.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer0.org1.example.com | [4f35 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4f36 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4f37 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f38 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4f39 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer0.org1.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer0.org1.example.com | [4f3a 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer0.org1.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer0.org1.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer0.org1.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer0.org1.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer0.org1.example.com | [4f3b 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4f3c 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f3d 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f3e 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f3f 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f40 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4f41 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +peer0.org1.example.com | 00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +peer0.org1.example.com | [4f42 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +peer0.org1.example.com | 00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +peer0.org1.example.com | 00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +peer0.org1.example.com | 00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +peer0.org1.example.com | 00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +peer0.org1.example.com | [4f43 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4f44 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f45 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4f46 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +peer0.org1.example.com | 00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +peer0.org1.example.com | [4f47 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +peer0.org1.example.com | 00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +peer0.org1.example.com | 00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +peer0.org1.example.com | 00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +peer0.org1.example.com | 00000040 4a 09 d4 1c b8 02 c3 |J......| +peer0.org1.example.com | [4f48 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4f49 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4f4a 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f4b 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f4c 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f4d 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f4e 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f4f 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f50 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f51 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f52 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f53 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f54 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f55 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [4f56 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f57 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f58 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f59 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f5a 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f5b 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4f5c 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f5d 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4f5e 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4f5f 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4f60 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4f61 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4f62 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4f63 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 gate 1589998905215816000 evaluation starts +peer0.org1.example.com | [4f64 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4f65 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4f66 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4f67 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 principal evaluation fails +peer0.org1.example.com | [4f68 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 gate 1589998905215816000 evaluation fails +peer0.org1.example.com | [4f69 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4f6a 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4f6b 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4f6c 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 gate 1589998905216770900 evaluation starts +peer0.org1.example.com | [4f6d 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4f6e 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4f6f 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 principal matched by identity 0 +peer0.org1.example.com | [4f70 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 a3 d6 57 4e 31 8d b9 e2 17 a5 a0 83 3f 8a 0d |...WN1.......?..| +peer0.org1.example.com | 00000010 1e 20 7a aa 5d 22 69 0d f6 61 ec a7 e0 23 65 be |. z.]"i..a...#e.| +peer0.org1.example.com | [4f71 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 0f 6b ef e4 55 02 49 7d a2 e3 |0E.!...k..U.I}..| +peer0.org1.example.com | 00000010 e4 03 09 9e 29 d9 f0 c0 6f c6 e5 09 cc 49 eb f1 |....)...o....I..| +peer0.org1.example.com | 00000020 22 61 ce a1 5e 02 20 13 1a e8 d0 b8 0f e6 11 a7 |"a..^. .........| +peer0.org1.example.com | 00000030 c8 81 db e2 b0 04 22 06 21 b4 cf c6 f0 d1 e9 7e |......".!......~| +peer0.org1.example.com | 00000040 f3 d7 cd 17 ec 98 5d |......]| +peer0.org1.example.com | [4f72 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4f73 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 gate 1589998905216770900 evaluation succeeds +peer0.org1.example.com | [4f74 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4f75 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4f76 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4f77 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4f78 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4f79 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4f7a 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4f7b 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4f7c 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4f7d 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f7e 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f7f 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f80 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [4f81 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f82 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f83 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f84 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4f85 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [4f86 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > alive: alive: alive: +peer0.org1.example.com | [4f87 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f88 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [4f89 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [4f8a 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4f8b 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610161801 +peer0.org1.example.com | [4f8c 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1A84F5AA905FCC58301807A5328146AC8A545AB5B5CA6F71F37E95CB31184F53 +peer0.org1.example.com | [4f8d 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [4f8e 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f8f 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f90 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f91 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f92 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4f93 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f94 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4f95 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [4f96 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4f97 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37276 +peer0.org1.example.com | [4f98 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0059d23c0 +peer0.org1.example.com | [4f99 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [4f9a 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [4f9b 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [4f9c 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [4f9d 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 a1 a4 cb 41 d4 05 5c 08 25 96 b9 73 1d 17 cf |....A..\.%..s...| +peer0.org1.example.com | 00000010 42 c0 51 33 6e 24 cb 42 9c e6 43 02 af f1 c2 54 |B.Q3n$.B..C....T| +peer0.org1.example.com | [4f9e 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f f1 bc 0c 74 1d 7e f5 d9 92 a0 98 |0D. ....t.~.....| +peer0.org1.example.com | 00000010 be 75 da 76 c1 2a 6a b2 c3 b3 07 20 33 f0 69 9a |.u.v.*j.... 3.i.| +peer0.org1.example.com | 00000020 65 0e a4 58 02 20 46 70 5a cb 68 07 a8 11 58 70 |e..X. FpZ.h...Xp| +peer0.org1.example.com | 00000030 95 ab 15 a7 14 48 4c 99 c1 93 59 ce eb be fe ee |.....HL...Y.....| +peer0.org1.example.com | 00000040 5e 91 9e 51 d3 b9 |^..Q..| +peer0.org1.example.com | [4f9f 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [4fa0 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0058a56c0, header 0xc0059d27d0 +peer0.org1.example.com | [4fa1 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [4fa2 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [][4eb3abec] processing txid: 4eb3abec23e606d078141575362061ea09bc2c8d5b588bc2f67aa9d817171ac8 +peer0.org1.example.com | [4fa3 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [][4eb3abec] Entry chaincode: name:"cscc" +peer0.org1.example.com | [4fa4 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> INFO [][4eb3abec] Entry chaincode: name:"cscc" +peer0.org1.example.com | [4fa5 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [4fa6 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [4fa7 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 a1 a4 cb 41 d4 05 5c 08 25 96 b9 73 1d 17 cf |....A..\.%..s...| +peer0.org1.example.com | 00000010 42 c0 51 33 6e 24 cb 42 9c e6 43 02 af f1 c2 54 |B.Q3n$.B..C....T| +peer0.org1.example.com | [4fa8 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f f1 bc 0c 74 1d 7e f5 d9 92 a0 98 |0D. ....t.~.....| +peer0.org1.example.com | 00000010 be 75 da 76 c1 2a 6a b2 c3 b3 07 20 33 f0 69 9a |.u.v.*j.... 3.i.| +peer0.org1.example.com | 00000020 65 0e a4 58 02 20 46 70 5a cb 68 07 a8 11 58 70 |e..X. FpZ.h...Xp| +peer0.org1.example.com | 00000030 95 ab 15 a7 14 48 4c 99 c1 93 59 ce eb be fe ee |.....HL...Y.....| +peer0.org1.example.com | 00000040 5e 91 9e 51 d3 b9 |^..Q..| +peer0.org1.example.com | [4fa9 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4eb3abec] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [4faa 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4eb3abec] notifying Txid:4eb3abec23e606d078141575362061ea09bc2c8d5b588bc2f67aa9d817171ac8, channelID: +peer0.org1.example.com | [4fab 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [4fac 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> INFO [][4eb3abec] Exit chaincode: name:"cscc" (1ms) +peer0.org1.example.com | [4fad 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [][4eb3abec] Exit +peer0.org1.example.com | [4fae 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37276 +peer0.org1.example.com | [4faf 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37276 grpc.code=OK grpc.call_duration=3.1993ms +peer0.org1.example.com | [4fb0 05-20 18:21:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4fb1 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37284 +peer0.org1.example.com | [4fb2 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0059d32c0 +peer0.org1.example.com | [4fb3 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [4fb4 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [4fb5 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [4fb6 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [4fb7 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 7f ec 39 7e 6c 03 08 c0 1c e8 40 ee 36 7d 24 |v..9~l.....@.6}$| +peer0.org1.example.com | 00000010 ca 34 8c 57 cc ca c7 5b 2a 33 17 1d 76 b1 16 08 |.4.W...[*3..v...| +peer0.org1.example.com | [4fb8 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc c3 b7 d7 e9 82 c7 f6 cc 12 b9 |0E.!............| +peer0.org1.example.com | 00000010 e2 45 fa 27 5f 67 29 e8 8c 6e ea 32 e3 35 47 94 |.E.'_g)..n.2.5G.| +peer0.org1.example.com | 00000020 f5 2e aa bb 11 02 20 29 1e d1 e1 22 87 3d 9e fc |...... )...".=..| +peer0.org1.example.com | 00000030 33 f8 b5 17 02 d8 36 27 8c 36 0f 95 22 44 10 3c |3.....6'.6.."D.<| +peer0.org1.example.com | 00000040 60 58 02 08 02 d2 be |`X.....| +peer0.org1.example.com | [4fb9 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [4fba 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0058a5ab0, header 0xc0059d36d0 +peer0.org1.example.com | [4fbb 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [4fbc 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU [][26f424f3] processing txid: 26f424f34cf0c9ac953099154de9e99f9c6746a9247217cc1fdacdebf9e0f3c9 +peer0.org1.example.com | [4fbd 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU [][26f424f3] Entry chaincode: name:"qscc" +peer0.org1.example.com | [4fbe 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> INFO [][26f424f3] Entry chaincode: name:"qscc" +peer0.org1.example.com | [4fbf 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [4fc0 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [4fc1 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [4fc2 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [4fc3 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4fc4 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4fc5 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4fc6 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4fc7 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4fc8 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 gate 1589998907441256300 evaluation starts +peer0.org1.example.com | [4fc9 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4fca 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4fcb 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [4fcc 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [4fcd 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4fce 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 principal matched by identity 0 +peer0.org1.example.com | [4fcf 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 7f ec 39 7e 6c 03 08 c0 1c e8 40 ee 36 7d 24 |v..9~l.....@.6}$| +peer0.org1.example.com | 00000010 ca 34 8c 57 cc ca c7 5b 2a 33 17 1d 76 b1 16 08 |.4.W...[*3..v...| +peer0.org1.example.com | [4fd0 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc c3 b7 d7 e9 82 c7 f6 cc 12 b9 |0E.!............| +peer0.org1.example.com | 00000010 e2 45 fa 27 5f 67 29 e8 8c 6e ea 32 e3 35 47 94 |.E.'_g)..n.2.5G.| +peer0.org1.example.com | 00000020 f5 2e aa bb 11 02 20 29 1e d1 e1 22 87 3d 9e fc |...... )...".=..| +peer0.org1.example.com | 00000030 33 f8 b5 17 02 d8 36 27 8c 36 0f 95 22 44 10 3c |3.....6'.6.."D.<| +peer0.org1.example.com | 00000040 60 58 02 08 02 d2 be |`X.....| +peer0.org1.example.com | [4fd1 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4fd2 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 gate 1589998907441256300 evaluation succeeds +peer0.org1.example.com | [4fd3 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4fd4 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4fd5 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4fd6 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4fd7 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU [26f424f3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [4fd8 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU [26f424f3] notifying Txid:26f424f34cf0c9ac953099154de9e99f9c6746a9247217cc1fdacdebf9e0f3c9, channelID: +peer0.org1.example.com | [4fd9 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [4fda 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> INFO [][26f424f3] Exit chaincode: name:"qscc" (8ms) +peer0.org1.example.com | [4fdb 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU [][26f424f3] Exit +peer0.org1.example.com | [4fdc 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37284 +peer0.org1.example.com | [4fdd 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37284 grpc.code=OK grpc.call_duration=12.1048ms +peer0.org1.example.com | [4fde 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4fdf 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4fe0 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4fe1 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [4fe2 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4fe3 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4fe4 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4fe5 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4fe6 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4fe7 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4fe8 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4fe9 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4fea 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4feb 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4fec 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4fed 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4fee 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4fef 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ff0 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4ff1 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4ff2 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4ff3 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 gate 1589998907539560500 evaluation starts +peer0.org1.example.com | [4ff4 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ff5 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4ff6 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4ff7 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 principal evaluation fails +peer0.org1.example.com | [4ff8 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 gate 1589998907539560500 evaluation fails +peer0.org1.example.com | [4ff9 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4ffa 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4ffb 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4ffc 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 gate 1589998907539953700 evaluation starts +peer0.org1.example.com | [4ffd 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ffe 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [4fff 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 principal matched by identity 0 +peer0.org1.example.com | [5000 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [5001 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [5002 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5003 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 gate 1589998907539953700 evaluation succeeds +peer0.org1.example.com | [5004 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5005 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5006 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5007 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5008 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [5009 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [500a 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [500b 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [500c 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [500d 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [500e 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [500f 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5010 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5011 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5012 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 gate 1589998907541734100 evaluation starts +peer0.org1.example.com | [5013 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5014 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5015 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5016 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 principal evaluation fails +peer0.org1.example.com | [5017 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 gate 1589998907541734100 evaluation fails +peer0.org1.example.com | [5018 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5019 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [501a 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [501b 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 gate 1589998907542247500 evaluation starts +peer0.org1.example.com | [501c 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [501d 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [501e 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 principal matched by identity 0 +peer0.org1.example.com | [501f 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [5020 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [5021 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5022 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 gate 1589998907542247500 evaluation succeeds +peer0.org1.example.com | [5023 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5024 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5025 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5026 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5027 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [5028 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [5029 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [502a 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [502b 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [502c 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [502d 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [502e 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [502f 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [5030 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5031 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5032 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5033 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5034 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5035 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5036 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 gate 1589998907558020100 evaluation starts +peer0.org1.example.com | [5037 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5038 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5039 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [503a 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 principal evaluation fails +peer0.org1.example.com | [503b 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 gate 1589998907558020100 evaluation fails +peer0.org1.example.com | [503c 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [503d 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [503e 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [503f 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 gate 1589998907558474800 evaluation starts +peer0.org1.example.com | [5040 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5041 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5042 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 principal matched by identity 0 +peer0.org1.example.com | [5043 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [5044 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [5045 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5046 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 gate 1589998907558474800 evaluation succeeds +peer0.org1.example.com | [5047 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5048 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5049 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [504a 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [504b 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [504c 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [504d 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [504e 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [504f 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5050 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5051 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5052 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5053 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5054 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5055 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5056 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5057 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 gate 1589998907615257600 evaluation starts +peer0.org1.example.com | [5058 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5059 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [505a 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [505b 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 principal evaluation fails +peer0.org1.example.com | [505c 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 gate 1589998907615257600 evaluation fails +peer0.org1.example.com | [505d 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [505e 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [505f 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5060 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 gate 1589998907615608600 evaluation starts +peer0.org1.example.com | [5061 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5062 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5063 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 principal matched by identity 0 +peer0.org1.example.com | [5064 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [5065 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [5066 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5067 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 gate 1589998907615608600 evaluation succeeds +peer0.org1.example.com | [5068 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5069 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [506a 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [506b 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [506c 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [506d 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [506e 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [506f 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [5070 05-20 18:21:47.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5071 05-20 18:21:47.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5072 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5073 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5074 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5075 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5076 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5077 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5078 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 gate 1589998907703753600 evaluation starts +peer0.org1.example.com | [5079 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [507a 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [507b 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [507c 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 principal evaluation fails +peer0.org1.example.com | [507d 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 gate 1589998907703753600 evaluation fails +peer0.org1.example.com | [507e 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [507f 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5080 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5081 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 gate 1589998907704080300 evaluation starts +peer0.org1.example.com | [5082 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5083 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5084 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 principal matched by identity 0 +peer0.org1.example.com | [5085 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [5086 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [5087 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5088 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 gate 1589998907704080300 evaluation succeeds +peer0.org1.example.com | [5089 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [508a 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [508b 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [508c 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [508d 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [508e 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [508f 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5090 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5091 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5092 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5093 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5094 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5095 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5096 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5097 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 gate 1589998907712302300 evaluation starts +peer0.org1.example.com | [5098 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5099 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [509a 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [509b 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 principal evaluation fails +peer0.org1.example.com | [509c 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 gate 1589998907712302300 evaluation fails +peer0.org1.example.com | [509d 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [509e 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [509f 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [50a0 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 gate 1589998907715339900 evaluation starts +peer0.org1.example.com | [50a1 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [50a2 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [50a3 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 principal matched by identity 0 +peer0.org1.example.com | [50a4 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [50a5 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [50a6 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [50a7 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 gate 1589998907715339900 evaluation succeeds +peer0.org1.example.com | [50a8 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [50a9 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [50aa 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [50ab 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [50ac 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50ad 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50ae 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50af 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [50b0 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50b1 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50b2 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [50b3 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [50b4 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50b5 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [50b6 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [50b7 05-20 18:21:47.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [50b8 05-20 18:21:47.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50b9 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [50ba 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [50bb 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50bc 05-20 18:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50bd 05-20 18:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50be 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [50bf 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [50c0 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50c1 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50c2 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50c3 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50c4 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50c5 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50c6 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50c7 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50c8 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [50c9 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 a7 01 af e8 41 b4 5f 35 04 51 14 4d 3b 2d ab |.....A._5.Q.M;-.| +peer0.org1.example.com | 00000010 7c 17 8c 4c 41 e5 55 51 8e 4c 03 a2 ee c2 1b d5 ||..LA.UQ.L......| +peer0.org1.example.com | [50ca 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 4c a3 49 9b 70 a6 f0 47 5c 03 |0E.!..L.I.p..G\.| +peer0.org1.example.com | 00000010 6d a6 13 9e f0 7a ad 66 a5 2f b0 e1 81 68 14 a5 |m....z.f./...h..| +peer0.org1.example.com | 00000020 00 f6 e5 47 d1 02 20 7d 3e ad 47 c1 ff 9a d4 6a |...G.. }>.G....j| +peer0.org1.example.com | 00000030 1a d9 87 bb 20 b6 0c ff 52 85 f6 02 42 d7 79 a0 |.... ...R...B.y.| +peer0.org1.example.com | 00000040 ec fe d3 0e 27 3a a5 |....':.| +peer0.org1.example.com | [50cb 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50cc 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [50cd 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [50ce 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [50cf 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [50d0 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [50d2 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [50d3 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50d4 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50d5 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50d6 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50d1 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50d7 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50d8 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50d9 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50da 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50db 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50dc 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [50dd 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [50de 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [50df 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50e0 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50e1 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50e2 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50e3 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [50e4 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [50e5 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [50e6 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [50e7 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50e8 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50e9 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50ea 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50eb 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50ec 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50ed 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [50ee 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [50ef 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [50f0 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [50f1 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50f2 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50f3 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50f4 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50f5 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [50f6 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50f7 05-20 18:21:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [50f8 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [50f9 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [50fa 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [50fb 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [50fc 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer0.org1.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer0.org1.example.com | [50fd 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer0.org1.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer0.org1.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer0.org1.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer0.org1.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer0.org1.example.com | [50fe 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [50ff 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 73 9e ab d5 20 c7 6a 93 d0 f2 |0E.!..s... .j...| +peer0.org1.example.com | 00000010 a9 f2 4f 1c 05 98 2e 01 ca f1 2d dd f0 9c 2b 64 |..O.......-...+d| +peer0.org1.example.com | 00000020 1b e5 93 20 98 02 20 76 64 1b 1b af 08 e0 93 ff |... .. vd.......| +peer0.org1.example.com | 00000030 65 1d c4 67 00 17 d6 70 d7 b5 6f d1 61 2d e0 e7 |e..g...p..o.a-..| +peer0.org1.example.com | 00000040 f6 18 0b 99 92 53 27 |.....S'| +peer0.org1.example.com | [5100 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [5101 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [5102 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [5103 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [5104 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [5105 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5106 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5108 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [5109 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [510a 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [510b 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [510c 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [510d 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [510e 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5107 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [510f 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5110 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5111 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5112 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5113 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [5114 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5115 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5116 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5117 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5118 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5119 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [511a 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [511b 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 gate 1589998908837856800 evaluation starts +peer0.org1.example.com | [511c 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [511d 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [511e 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [511f 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 principal evaluation fails +peer0.org1.example.com | [5120 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 gate 1589998908837856800 evaluation fails +peer0.org1.example.com | [5121 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5122 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5123 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5124 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 gate 1589998908859773000 evaluation starts +peer0.org1.example.com | [5125 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5126 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5127 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 principal matched by identity 0 +peer0.org1.example.com | [5128 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 a4 c4 7f 81 30 05 a6 a4 40 bf 11 9b bb 91 df |'....0...@......| +peer0.org1.example.com | 00000010 52 5b 4d 1d dd f5 26 91 a6 c1 6f 9c 2e 1b e4 75 |R[M...&...o....u| +peer0.org1.example.com | [5129 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 60 c8 2c 6c 80 0b 87 74 0b 17 5b |0D. U`.,l...t..[| +peer0.org1.example.com | 00000010 72 1b aa 8b c2 6f 79 7a 13 07 70 6b d1 42 ec 25 |r....oyz..pk.B.%| +peer0.org1.example.com | 00000020 99 a9 7e ae 02 20 35 28 3e a3 1c bc 13 4d c3 fe |..~.. 5(>....M..| +peer0.org1.example.com | 00000030 53 61 4c 1e a2 55 ff 29 d9 cf 5a db 2f 17 09 c7 |SaL..U.)..Z./...| +peer0.org1.example.com | 00000040 31 0e 08 2a 96 7c |1..*.|| +peer0.org1.example.com | [512a 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [512b 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 gate 1589998908859773000 evaluation succeeds +peer0.org1.example.com | [512c 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [512d 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [512e 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [512f 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5130 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5131 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [5132 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [5133 05-20 18:21:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [5134 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [5135 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5136 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5137 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5138 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [5139 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [513a 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [513b 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [513c 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [5141 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [5142 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [5143 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [513d 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [5144 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [513e 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [513f 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5145 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5140 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [5146 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5147 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5148 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5149 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [514a 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [514b 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [514c 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [514d 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [514e 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [514f 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5150 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5151 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5152 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [5153 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5154 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5155 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [5156 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5157 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5158 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5159 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [515a 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [515b 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [515c 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [515d 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [515e 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [515f 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [5160 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5161 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [5163 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [5164 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [5165 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5162 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [5166 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [5167 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5168 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [5169 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [516a 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [516b 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [516d 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [516e 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [516f 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5170 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5171 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5172 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 gate 1589998908994619700 evaluation starts +peer0.org1.example.com | [5173 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [516c 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [5174 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [5175 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5176 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5177 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [517c 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161044 +peer0.org1.example.com | [517e 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 principal evaluation fails +peer0.org1.example.com | [517f 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 gate 1589998908994619700 evaluation fails +peer0.org1.example.com | [5180 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5181 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5182 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5183 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 gate 1589998909167897100 evaluation starts +peer0.org1.example.com | [5184 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5185 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5186 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 principal matched by identity 0 +peer0.org1.example.com | [5187 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer0.org1.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer0.org1.example.com | [5188 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer0.org1.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer0.org1.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer0.org1.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer0.org1.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer0.org1.example.com | [517d 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1E086040D84D097DED612FD177DFCF5D45A2FCA8806692D4E66AE3618A91CEC5 +peer0.org1.example.com | [5189 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [518a 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [518b 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [518c 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [5179 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [517a 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [518d 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [518e 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 gate 1589998909167897100 evaluation succeeds +peer0.org1.example.com | [518f 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5190 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5191 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5192 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5193 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5194 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5195 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [5196 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [5178 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [5197 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [5198 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161045 +peer0.org1.example.com | [5199 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [519a 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A75E0EDF0F77AAF07340A27381B738812642B60E14004E31EC4787B3434B432D +peer0.org1.example.com | [519b 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [519c 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [519d 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [519e 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [519f 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51a0 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [51a1 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [51a2 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [51a3 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [51a4 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51a5 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [51a6 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [51a7 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [51a8 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [51a9 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [51aa 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [51ab 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 gate 1589998909183847400 evaluation starts +peer0.org1.example.com | [51ac 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [51ad 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [51ae 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [51af 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 principal evaluation fails +peer0.org1.example.com | [51b0 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 gate 1589998909183847400 evaluation fails +peer0.org1.example.com | [51b1 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [51b2 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [51b3 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [51b4 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 gate 1589998909184152900 evaluation starts +peer0.org1.example.com | [51b5 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [51b6 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [51b7 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 principal matched by identity 0 +peer0.org1.example.com | [51b8 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 80 70 aa 7d 55 1d fd 38 8e 08 53 48 10 8a 61 |..p.}U..8..SH..a| +peer0.org1.example.com | 00000010 e3 ad e6 10 47 25 4c b1 61 4b e6 23 3d 3b 87 c3 |....G%L.aK.#=;..| +peer0.org1.example.com | [51b9 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 fb 71 2b 8b 3a 90 f3 45 b4 e6 |0E.!...q+.:..E..| +peer0.org1.example.com | 00000010 c3 fe 0d 84 fa 40 cd 7e 3c bb 51 d9 f2 6b 55 82 |.....@.~<.Q..kU.| +peer0.org1.example.com | 00000020 51 8f 6d 81 9b 02 20 51 7a 21 9d 30 4e 81 25 f9 |Q.m... Qz!.0N.%.| +peer0.org1.example.com | 00000030 3c c7 38 b5 c5 4d 90 35 cc d9 67 be 32 83 be a9 |<.8..M.5..g.2...| +peer0.org1.example.com | 00000040 bb 5d 86 86 59 0e 5c |.]..Y.\| +peer0.org1.example.com | [51ba 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [51bb 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 gate 1589998909184152900 evaluation succeeds +peer0.org1.example.com | [51bc 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [51bd 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [51be 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [51bf 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [51c0 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [51c1 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [51c2 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [51c3 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [51c4 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [51c5 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51c6 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51c7 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51c8 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51c9 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [51ca 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51cb 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [51cc 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51cd 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [51ce 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51cf 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51d0 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51d1 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [51d2 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [51d4 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [51d5 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51d6 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51d7 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51d8 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51d9 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [51da 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [51db 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51dc 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [51dd 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51de 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51df 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51e0 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51e1 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [51e2 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51e3 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51e4 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [51e5 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [51e6 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51e7 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [51e8 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51e9 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [51ea 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51eb 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [517b 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [51ed 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [51ee 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51ec 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [51f0 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51ef 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [51f1 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [51f2 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51f3 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [51f4 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51d3 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [51f5 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51f6 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [51f7 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [51f8 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [51f9 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [51fa 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51fb 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [51fc 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51fd 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [51fe 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [51ff 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [5200 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5201 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5202 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [5203 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5204 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5205 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5206 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5207 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [5208 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [5209 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [520a 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [520b 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [520c 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [520d 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [520e 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [520f 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5210 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [5211 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5212 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [5213 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5214 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [5215 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5216 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [5217 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [5218 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5219 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [521a 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [521b 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [521c 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [521d 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [521e 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [521f 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 gate 1589998909303947300 evaluation starts +peer0.org1.example.com | [5220 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5221 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5222 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5223 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 principal evaluation fails +peer0.org1.example.com | [5224 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 gate 1589998909303947300 evaluation fails +peer0.org1.example.com | [5225 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5227 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5228 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5229 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 gate 1589998909327689500 evaluation starts +peer0.org1.example.com | [522a 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [522b 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5226 05-20 18:21:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [522c 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [522d 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 principal matched by identity 0 +peer0.org1.example.com | [522e 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer0.org1.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer0.org1.example.com | [522f 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer0.org1.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer0.org1.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer0.org1.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer0.org1.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer0.org1.example.com | [5230 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5231 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 gate 1589998909327689500 evaluation succeeds +peer0.org1.example.com | [5232 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5233 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5234 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5235 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5236 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [5237 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [5238 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [5239 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [523a 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [523b 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [523c 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [523d 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [523e 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [523f 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [5240 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer0.org1.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer0.org1.example.com | [5241 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer0.org1.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer0.org1.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer0.org1.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer0.org1.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer0.org1.example.com | [5242 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [5243 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 38 5f c7 30 5b da ef 5c ef 94 |0E.!..8_.0[..\..| +peer0.org1.example.com | 00000010 fa 3a 3c a1 45 a8 84 89 12 c1 76 ed 60 c9 b5 43 |.:<.E.....v.`..C| +peer0.org1.example.com | 00000020 69 51 21 c9 7e 02 20 0d b8 7c 38 68 0f c8 da c6 |iQ!.~. ..|8h....| +peer0.org1.example.com | 00000030 d4 c0 6a 33 af 5b f3 7c e2 a1 a4 c3 54 7f fd 00 |..j3.[.|....T...| +peer0.org1.example.com | 00000040 c1 4d d9 46 03 28 54 |.M.F.(T| +peer0.org1.example.com | [5244 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [5245 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [5246 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5247 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5248 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5249 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [524a 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [524b 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [524c 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [524d 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [524e 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [524f 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5250 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [5251 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [5252 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [5253 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5254 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [5255 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [5256 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5257 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5258 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5259 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [525a 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [525b 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [525c 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [525d 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 gate 1589998909475432700 evaluation starts +peer0.org1.example.com | [525e 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [525f 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5260 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5261 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 principal evaluation fails +peer0.org1.example.com | [5262 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 gate 1589998909475432700 evaluation fails +peer0.org1.example.com | [5263 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5264 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5265 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5266 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 gate 1589998909476525700 evaluation starts +peer0.org1.example.com | [5267 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5268 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5269 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 principal matched by identity 0 +peer0.org1.example.com | [526a 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +peer0.org1.example.com | 00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +peer0.org1.example.com | [526b 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +peer0.org1.example.com | 00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +peer0.org1.example.com | 00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +peer0.org1.example.com | 00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +peer0.org1.example.com | 00000040 b8 39 f0 63 a1 80 |.9.c..| +peer0.org1.example.com | [526c 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [526d 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 gate 1589998909476525700 evaluation succeeds +peer0.org1.example.com | [526e 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [526f 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5270 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5271 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5272 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5273 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5274 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [5275 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer0.org1.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer0.org1.example.com | [5276 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer0.org1.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer0.org1.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer0.org1.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer0.org1.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer0.org1.example.com | [5277 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5278 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5279 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [527a 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [527b 05-20 18:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [527c 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [527d 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer0.org1.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer0.org1.example.com | [527e 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer0.org1.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer0.org1.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer0.org1.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer0.org1.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer0.org1.example.com | [527f 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5280 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5281 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5282 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [5283 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [5284 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5285 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5286 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5287 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5288 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5289 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [528a 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [528b 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [528c 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 gate 1589998909510812100 evaluation starts +peer0.org1.example.com | [528d 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [528e 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [528f 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5290 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 principal evaluation fails +peer0.org1.example.com | [5291 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 gate 1589998909510812100 evaluation fails +peer0.org1.example.com | [5292 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5293 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5294 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5295 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 gate 1589998909511186800 evaluation starts +peer0.org1.example.com | [5296 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5297 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5298 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 principal matched by identity 0 +peer0.org1.example.com | [5299 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +peer0.org1.example.com | 00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +peer0.org1.example.com | [529a 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +peer0.org1.example.com | 00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +peer0.org1.example.com | 00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +peer0.org1.example.com | 00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +peer0.org1.example.com | 00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +peer0.org1.example.com | [529b 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [529c 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 gate 1589998909511186800 evaluation succeeds +peer0.org1.example.com | [529d 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [529e 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [529f 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [52a0 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [52a1 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [52a2 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52a3 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [52a4 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +peer0.org1.example.com | 00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +peer0.org1.example.com | [52a5 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +peer0.org1.example.com | 00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +peer0.org1.example.com | 00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +peer0.org1.example.com | 00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +peer0.org1.example.com | 00000040 b5 53 ae f9 1c 9a |.S....| +peer0.org1.example.com | [52a6 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [52a7 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52a8 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [52a9 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +peer0.org1.example.com | 00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +peer0.org1.example.com | [52aa 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +peer0.org1.example.com | 00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +peer0.org1.example.com | 00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +peer0.org1.example.com | 00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +peer0.org1.example.com | 00000040 f5 4a 8c da c5 43 |.J...C| +peer0.org1.example.com | [52ab 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [52ac 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [52ad 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52ae 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52af 05-20 18:21:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [52b0 05-20 18:21:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [52b1 05-20 18:21:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [52b2 05-20 18:21:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610171801 +peer0.org1.example.com | [52b3 05-20 18:21:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5A1B2B9F8E0395A51A4C263DE370B5E92D2802ED7D7CEB346EBD7DDA1415D17D +peer0.org1.example.com | [52b4 05-20 18:21:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [52b5 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52b6 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52b7 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52b8 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52b9 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [52ba 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52bb 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52bc 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [52bd 05-20 18:21:50.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52be 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52bf 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52c0 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [52c1 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [52c2 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52c3 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [52c4 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52c5 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [52c6 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [52c7 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [52c8 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [52c9 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [52ca 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [52cb 05-20 18:21:51.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52cc 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52cd 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [52ce 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [52cf 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [52d0 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [52d1 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [52d2 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [52d3 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf63d0 gate 1589998911540821100 evaluation starts +peer0.org1.example.com | [52d4 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf63d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [52d5 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf63d0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [52d6 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf63d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [52d7 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf63d0 principal evaluation fails +peer0.org1.example.com | [52d8 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf63d0 gate 1589998911540821100 evaluation fails +peer0.org1.example.com | [52d9 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [52da 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [52db 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [52dc 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf6940 gate 1589998911544045600 evaluation starts +peer0.org1.example.com | [52dd 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf6940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [52de 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf6940 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [52df 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf6940 principal matched by identity 0 +peer0.org1.example.com | [52e0 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [52e1 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [52e2 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf6940 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [52e3 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cf6940 gate 1589998911544045600 evaluation succeeds +peer0.org1.example.com | [52e4 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [52e5 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [52e6 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [52e7 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [52e8 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [52e9 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [52ea 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52eb 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [52ec 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [52ed 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [52ee 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [52ef 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [52f0 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [52f1 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [52f2 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e230 gate 1589998911546902300 evaluation starts +peer0.org1.example.com | [52f3 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [52f4 05-20 18:21:51.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e230 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [52f5 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [52f8 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e230 principal evaluation fails +peer0.org1.example.com | [52f9 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e230 gate 1589998911546902300 evaluation fails +peer0.org1.example.com | [52f6 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [52f7 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [52fa 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [52fb 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [52fc 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [52fd 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e7a0 gate 1589998911556958600 evaluation starts +peer0.org1.example.com | [52fe 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e7a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [52ff 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e7a0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5300 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e7a0 principal matched by identity 0 +peer0.org1.example.com | [5301 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [5302 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [5303 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e7a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5304 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1e7a0 gate 1589998911556958600 evaluation succeeds +peer0.org1.example.com | [5305 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5306 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5307 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5308 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5309 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [530a 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [530b 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [530c 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [530d 05-20 18:21:51.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [530e 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [530f 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5310 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5311 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5312 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5313 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5314 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1fbf0 gate 1589998911563066100 evaluation starts +peer0.org1.example.com | [5315 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1fbf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5316 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1fbf0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5317 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1fbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5318 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1fbf0 principal evaluation fails +peer0.org1.example.com | [5319 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d1fbf0 gate 1589998911563066100 evaluation fails +peer0.org1.example.com | [531a 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [531b 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [531c 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [531d 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d36160 gate 1589998911567128800 evaluation starts +peer0.org1.example.com | [531e 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d36160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [531f 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d36160 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5320 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d36160 principal matched by identity 0 +peer0.org1.example.com | [5321 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [5322 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [5323 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d36160 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5324 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d36160 gate 1589998911567128800 evaluation succeeds +peer0.org1.example.com | [5325 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5326 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5327 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5328 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5329 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [532a 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [532b 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [532c 05-20 18:21:51.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [532d 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [532e 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [532f 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5330 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5331 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5332 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5333 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37a50 gate 1589998911571767900 evaluation starts +peer0.org1.example.com | [5334 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5335 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37a50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5336 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5337 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37a50 principal evaluation fails +peer0.org1.example.com | [5338 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37a50 gate 1589998911571767900 evaluation fails +peer0.org1.example.com | [5339 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [533a 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [533b 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [533c 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37fc0 gate 1589998911572663400 evaluation starts +peer0.org1.example.com | [533d 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37fc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [533e 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37fc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [533f 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37fc0 principal matched by identity 0 +peer0.org1.example.com | [5340 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [5341 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [5342 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37fc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5343 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d37fc0 gate 1589998911572663400 evaluation succeeds +peer0.org1.example.com | [5344 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5345 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5346 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5347 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [5348 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [5349 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [534a 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [534b 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [534c 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [534d 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [534e 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [534f 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5350 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5351 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5352 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5353 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5354 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5355 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d55b00 gate 1589998911576488500 evaluation starts +peer0.org1.example.com | [5356 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d55b00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5357 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d55b00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5358 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d55b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5359 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d55b00 principal evaluation fails +peer0.org1.example.com | [535a 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d55b00 gate 1589998911576488500 evaluation fails +peer0.org1.example.com | [535b 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [535c 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [535d 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [535e 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d72070 gate 1589998911577393200 evaluation starts +peer0.org1.example.com | [535f 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d72070 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5360 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d72070 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5361 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d72070 principal matched by identity 0 +peer0.org1.example.com | [5362 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +peer0.org1.example.com | 00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +peer0.org1.example.com | [5363 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +peer0.org1.example.com | 00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +peer0.org1.example.com | 00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +peer0.org1.example.com | 00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +peer0.org1.example.com | 00000040 4e b8 31 f6 de 34 4f |N.1..4O| +peer0.org1.example.com | [5364 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d72070 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5365 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d72070 gate 1589998911577393200 evaluation succeeds +peer0.org1.example.com | [5366 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5367 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5368 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5369 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [536a 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +peer0.org1.example.com | 00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +peer0.org1.example.com | [536b 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +peer0.org1.example.com | 00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +peer0.org1.example.com | 00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +peer0.org1.example.com | 00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +peer0.org1.example.com | 00000040 43 f7 19 da 7f c7 |C.....| +peer0.org1.example.com | [536c 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +peer0.org1.example.com | 00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +peer0.org1.example.com | [536d 05-20 18:21:51.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +peer0.org1.example.com | 00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +peer0.org1.example.com | 00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +peer0.org1.example.com | 00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +peer0.org1.example.com | 00000040 18 99 83 c3 cf 7e e8 |.....~.| +peer0.org1.example.com | [536e 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [536f 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5370 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5371 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5372 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5373 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5374 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5375 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5376 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d88050 gate 1589998911580997900 evaluation starts +peer0.org1.example.com | [5377 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d88050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5378 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d88050 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5379 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d88050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [537a 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d88050 principal evaluation fails +peer0.org1.example.com | [537b 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d88050 gate 1589998911580997900 evaluation fails +peer0.org1.example.com | [537c 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [537d 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [537e 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [537f 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d885c0 gate 1589998911581380400 evaluation starts +peer0.org1.example.com | [5380 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d885c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5381 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d885c0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5382 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d885c0 principal matched by identity 0 +peer0.org1.example.com | [5383 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +peer0.org1.example.com | 00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +peer0.org1.example.com | [5384 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +peer0.org1.example.com | 00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +peer0.org1.example.com | 00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +peer0.org1.example.com | 00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +peer0.org1.example.com | 00000040 f2 eb 3e aa a2 ca |..>...| +peer0.org1.example.com | [5385 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d885c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5386 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008d885c0 gate 1589998911581380400 evaluation succeeds +peer0.org1.example.com | [5387 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5388 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5389 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [538a 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [538b 05-20 18:21:51.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [538c 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [538d 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [538e 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [538f 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5390 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5391 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [5392 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [5393 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5394 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [5395 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [5396 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [5397 05-20 18:21:51.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5398 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [5399 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [539a 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [539b 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [539c 05-20 18:21:51.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [539d 05-20 18:21:52.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [539e 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [539f 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53a0 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53a1 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53a2 05-20 18:21:52.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53a3 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [53a4 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [53a5 05-20 18:21:52.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53a6 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53a7 05-20 18:21:52.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53a8 05-20 18:21:52.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53a9 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [53aa 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [53ab 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [53ac 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [53ad 05-20 18:21:52.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53ae 05-20 18:21:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [53af 05-20 18:21:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [53b0 05-20 18:21:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [53b1 05-20 18:21:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [53b2 05-20 18:21:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53b3 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [53b4 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [53b6 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [53b7 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [53b8 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer0.org1.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer0.org1.example.com | [53b9 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer0.org1.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer0.org1.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer0.org1.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer0.org1.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer0.org1.example.com | [53ba 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [53bb 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 82 af ff e5 1d 51 5c 74 f9 dc |0E.!.......Q\t..| +peer0.org1.example.com | 00000010 1f 8d 1f b2 98 9b 2d b0 dd 49 bf be 33 63 9d 6b |......-..I..3c.k| +peer0.org1.example.com | 00000020 72 a6 c1 f7 74 02 20 3d 3d 80 44 8a 56 88 41 e4 |r...t. ==.D.V.A.| +peer0.org1.example.com | 00000030 de c2 83 fd 27 99 6d 51 2e cb 52 9c 8b 2a 7f 07 |....'.mQ..R..*..| +peer0.org1.example.com | 00000040 66 77 85 02 2a 24 2a |fw..*$*| +peer0.org1.example.com | [53bc 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [53bd 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [53be 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [53bf 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [53c0 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [53c1 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53c2 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53c3 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53c4 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [53c5 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53c6 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53c7 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [53c8 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [53c9 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [53ca 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53b5 05-20 18:21:52.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53cb 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [53cc 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [53cd 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [53ce 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53cf 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53d0 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53d1 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53d2 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53d3 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53d4 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [53d5 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53d6 05-20 18:21:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [53d7 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [53d8 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [53da 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [53db 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [53dc 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [53de 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [53df 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [53dd 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53d9 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [53e0 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53e1 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53e2 05-20 18:21:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [53e3 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [53e4 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [53e5 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53e6 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [53e7 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [53e8 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [53e9 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53ea 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [53eb 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [53ec 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [53ed 05-20 18:21:52.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53ee 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [53ef 05-20 18:21:52.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [53f0 05-20 18:21:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [53f1 05-20 18:21:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [53f2 05-20 18:21:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [53f3 05-20 18:21:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [53f4 05-20 18:21:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [53f5 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [53f6 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [53f7 05-20 18:21:53.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [53f8 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [53f9 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [53fa 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9790 gate 1589998913015508100 evaluation starts +peer0.org1.example.com | [53fb 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9790 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [53fc 05-20 18:21:53.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9790 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [53fd 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [53fe 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9790 principal evaluation fails +peer0.org1.example.com | [53ff 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9790 gate 1589998913015508100 evaluation fails +peer0.org1.example.com | [5400 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5401 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [5402 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5403 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9d00 gate 1589998913025578600 evaluation starts +peer0.org1.example.com | [5404 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9d00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5405 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9d00 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5406 05-20 18:21:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9d00 principal matched by identity 0 +peer0.org1.example.com | [5407 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer0.org1.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer0.org1.example.com | [5408 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer0.org1.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer0.org1.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer0.org1.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer0.org1.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer0.org1.example.com | [5409 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9d00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [540a 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008de9d00 gate 1589998913025578600 evaluation succeeds +peer0.org1.example.com | [540b 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [540c 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [540d 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [540e 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [540f 05-20 18:21:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5410 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [5411 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [5412 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [5413 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [5414 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5415 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5416 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5417 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [5418 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5419 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [541a 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [541b 05-20 18:21:53.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [541c 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [541d 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [541e 05-20 18:21:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [541f 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [5420 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [5421 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [5422 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5423 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5424 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5425 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5426 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5427 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5428 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [5429 05-20 18:21:53.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [542a 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [542b 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [542c 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [542d 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [542e 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [542f 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5430 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5431 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5432 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5433 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5434 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5435 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5436 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c290 gate 1589998913245982200 evaluation starts +peer0.org1.example.com | [5437 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c290 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5438 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c290 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5439 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [543a 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c290 principal evaluation fails +peer0.org1.example.com | [543b 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c290 gate 1589998913245982200 evaluation fails +peer0.org1.example.com | [543c 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [543d 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [543e 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [543f 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c800 gate 1589998913247934600 evaluation starts +peer0.org1.example.com | [5440 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5441 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c800 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5442 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c800 principal matched by identity 0 +peer0.org1.example.com | [5443 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 93 10 7e c5 6a 94 13 20 70 14 c6 be ee a6 96 |...~.j.. p......| +peer0.org1.example.com | 00000010 98 d6 91 2d dd d0 b2 df d6 20 b1 dc d4 87 71 e2 |...-..... ....q.| +peer0.org1.example.com | [5444 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 4c 4d ee e8 75 fc 6d 3c bd 5c |0E.!..LM..u.m<.\| +peer0.org1.example.com | 00000010 aa 07 8b 4f cd 23 49 1f 08 cb e3 96 01 ff ed 8c |...O.#I.........| +peer0.org1.example.com | 00000020 6c 7b a2 51 26 02 20 3f 17 9d 12 06 2a 84 9b 34 |l{.Q&. ?....*..4| +peer0.org1.example.com | 00000030 74 ea 6f fe 71 48 e8 12 af d5 5f 18 e6 ab 39 01 |t.o.qH...._...9.| +peer0.org1.example.com | 00000040 67 3b 35 a0 fd 4e 11 |g;5..N.| +peer0.org1.example.com | [5445 05-20 18:21:53.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c800 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5446 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e2c800 gate 1589998913247934600 evaluation succeeds +peer0.org1.example.com | [5447 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5448 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5449 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [544a 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [544b 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [544c 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [544d 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [544e 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [544f 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [5450 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5451 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5452 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5453 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [5454 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5455 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5456 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5457 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [5458 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [5459 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [545a 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [545b 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [545c 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161046 +peer0.org1.example.com | [545d 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1931CFB9424610C57B3300C94C8A122B7820E66FD55158E1CE2948940C87BAE4 +peer0.org1.example.com | [545e 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [545f 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [5460 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [5461 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [5462 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5463 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [5464 05-20 18:21:53.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5465 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [5466 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [5467 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5468 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [5469 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [546a 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:&o\352C+u\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [546b 05-20 18:21:53.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [546c 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [546d 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [546e 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [546f 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [5470 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5471 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5472 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5473 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5474 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5475 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5476 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5477 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62400 gate 1589998913276833600 evaluation starts +peer0.org1.example.com | [5478 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62400 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5479 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62400 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [547a 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [547b 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62400 principal evaluation fails +peer0.org1.example.com | [547c 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62400 gate 1589998913276833600 evaluation fails +peer0.org1.example.com | [547d 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [547e 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [547f 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5480 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62970 gate 1589998913280264300 evaluation starts +peer0.org1.example.com | [5481 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62970 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5482 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62970 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5483 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62970 principal matched by identity 0 +peer0.org1.example.com | [5484 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 93 10 7e c5 6a 94 13 20 70 14 c6 be ee a6 96 |...~.j.. p......| +peer0.org1.example.com | 00000010 98 d6 91 2d dd d0 b2 df d6 20 b1 dc d4 87 71 e2 |...-..... ....q.| +peer0.org1.example.com | [5485 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 4c 4d ee e8 75 fc 6d 3c bd 5c |0E.!..LM..u.m<.\| +peer0.org1.example.com | 00000010 aa 07 8b 4f cd 23 49 1f 08 cb e3 96 01 ff ed 8c |...O.#I.........| +peer0.org1.example.com | 00000020 6c 7b a2 51 26 02 20 3f 17 9d 12 06 2a 84 9b 34 |l{.Q&. ?....*..4| +peer0.org1.example.com | 00000030 74 ea 6f fe 71 48 e8 12 af d5 5f 18 e6 ab 39 01 |t.o.qH...._...9.| +peer0.org1.example.com | 00000040 67 3b 35 a0 fd 4e 11 |g;5..N.| +peer0.org1.example.com | [5486 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62970 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5487 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e62970 gate 1589998913280264300 evaluation succeeds +peer0.org1.example.com | [5488 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5489 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [548a 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [548b 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [548c 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [548d 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [548e 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [548f 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer0.org1.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer0.org1.example.com | [5490 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer0.org1.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer0.org1.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer0.org1.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer0.org1.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer0.org1.example.com | [5491 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5492 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5493 05-20 18:21:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [5494 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 31 cf b9 42 46 10 c5 7b 33 00 c9 4c 8a 12 2b |.1..BF..{3..L..+| +peer0.org1.example.com | 00000010 78 20 e6 6f d5 51 58 e1 ce 29 48 94 0c 87 ba e4 |x .o.QX..)H.....| +peer0.org1.example.com | [5495 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c e0 45 06 d9 67 b3 83 6e f4 74 26 |0D. ,.E..g..n.t&| +peer0.org1.example.com | 00000010 13 44 e2 34 c0 5b e6 5c 12 92 2b 43 38 f7 c2 90 |.D.4.[.\..+C8...| +peer0.org1.example.com | 00000020 92 0e 34 a3 02 20 3d b6 d3 89 e5 f3 45 dd 48 37 |..4.. =.....E.H7| +peer0.org1.example.com | 00000030 57 2f 26 4b fc c4 5e 62 60 92 50 e1 5e 33 3e 26 |W/&K..^b`.P.^3>&| +peer0.org1.example.com | 00000040 6f ea 43 2b 75 f0 |o.C+u.| +peer0.org1.example.com | [5496 05-20 18:21:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5497 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5498 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5499 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [549a 05-20 18:21:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [549b 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [549c 05-20 18:21:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [549d 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [549e 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [549f 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [54a0 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [54a1 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [54a2 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 31 cf b9 42 46 10 c5 7b 33 00 c9 4c 8a 12 2b |.1..BF..{3..L..+| +peer0.org1.example.com | 00000010 78 20 e6 6f d5 51 58 e1 ce 29 48 94 0c 87 ba e4 |x .o.QX..)H.....| +peer0.org1.example.com | [54a3 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c e0 45 06 d9 67 b3 83 6e f4 74 26 |0D. ,.E..g..n.t&| +peer0.org1.example.com | 00000010 13 44 e2 34 c0 5b e6 5c 12 92 2b 43 38 f7 c2 90 |.D.4.[.\..+C8...| +peer0.org1.example.com | 00000020 92 0e 34 a3 02 20 3d b6 d3 89 e5 f3 45 dd 48 37 |..4.. =.....E.H7| +peer0.org1.example.com | 00000030 57 2f 26 4b fc c4 5e 62 60 92 50 e1 5e 33 3e 26 |W/&K..^b`.P.^3>&| +peer0.org1.example.com | 00000040 6f ea 43 2b 75 f0 |o.C+u.| +peer0.org1.example.com | [54a4 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [54a5 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 83 79 17 0c 8c a9 43 d3 a3 44 9e |0D. 7.y....C..D.| +peer0.org1.example.com | 00000010 27 a2 27 a7 de e5 12 ae fd 5d 23 a4 8a cc 37 c0 |'.'......]#...7.| +peer0.org1.example.com | 00000020 c6 c4 08 fb 02 20 7c 71 34 d7 09 0d 96 37 d0 88 |..... |q4....7..| +peer0.org1.example.com | 00000030 a6 55 bf 07 2b 1c 01 40 9f af 15 c0 9f ca 77 49 |.U..+..@......wI| +peer0.org1.example.com | 00000040 66 72 19 93 0e 76 |fr...v| +peer0.org1.example.com | [54a6 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [54a7 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [54a8 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54a9 05-20 18:21:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54aa 05-20 18:21:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [54ab 05-20 18:21:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [54ac 05-20 18:21:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54ad 05-20 18:21:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [54ae 05-20 18:21:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [54af 05-20 18:21:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [54b0 05-20 18:21:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [54b1 05-20 18:21:53.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [54b2 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [54b3 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [54b4 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e87e10 gate 1589998913361248200 evaluation starts +peer0.org1.example.com | [54b5 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e87e10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [54b6 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e87e10 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [54b7 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e87e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [54b8 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e87e10 principal evaluation fails +peer0.org1.example.com | [54b9 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008e87e10 gate 1589998913361248200 evaluation fails +peer0.org1.example.com | [54ba 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [54bb 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [54bc 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [54bd 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea0380 gate 1589998913363866600 evaluation starts +peer0.org1.example.com | [54be 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea0380 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [54bf 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea0380 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [54c0 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea0380 principal matched by identity 0 +peer0.org1.example.com | [54c1 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 96 88 a5 e7 0e 01 ed ea bc 56 7b e4 bb 4b f0 |..........V{..K.| +peer0.org1.example.com | 00000010 69 d0 c9 70 a9 35 49 4c 35 6d 95 59 90 29 1f f5 |i..p.5IL5m.Y.)..| +peer0.org1.example.com | [54c2 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 3a db 8b b8 de b1 9c 2d b8 4a b9 |0D. .:......-.J.| +peer0.org1.example.com | 00000010 eb f9 86 cf 91 31 be 5a 8c 24 27 ac 5c 1e d7 9d |.....1.Z.$'.\...| +peer0.org1.example.com | 00000020 a6 60 65 5a 02 20 3d a6 76 81 0f ee 9c 7b ab 1d |.`eZ. =.v....{..| +peer0.org1.example.com | 00000030 9e bd 92 99 01 92 8f ed e8 a5 86 f6 ce 85 38 c0 |..............8.| +peer0.org1.example.com | 00000040 3a 6c 9f 4c e7 fb |:l.L..| +peer0.org1.example.com | [54c3 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea0380 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [54c4 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ea0380 gate 1589998913363866600 evaluation succeeds +peer0.org1.example.com | [54c5 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [54c6 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [54c7 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [54c8 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [54c9 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [54ca 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54cb 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [54cc 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 31 cf b9 42 46 10 c5 7b 33 00 c9 4c 8a 12 2b |.1..BF..{3..L..+| +peer0.org1.example.com | 00000010 78 20 e6 6f d5 51 58 e1 ce 29 48 94 0c 87 ba e4 |x .o.QX..)H.....| +peer0.org1.example.com | [54cd 05-20 18:21:53.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c e0 45 06 d9 67 b3 83 6e f4 74 26 |0D. ,.E..g..n.t&| +peer0.org1.example.com | 00000010 13 44 e2 34 c0 5b e6 5c 12 92 2b 43 38 f7 c2 90 |.D.4.[.\..+C8...| +peer0.org1.example.com | 00000020 92 0e 34 a3 02 20 3d b6 d3 89 e5 f3 45 dd 48 37 |..4.. =.....E.H7| +peer0.org1.example.com | 00000030 57 2f 26 4b fc c4 5e 62 60 92 50 e1 5e 33 3e 26 |W/&K..^b`.P.^3>&| +peer0.org1.example.com | 00000040 6f ea 43 2b 75 f0 |o.C+u.| +peer0.org1.example.com | [54ce 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [54cf 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [54d0 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54d1 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [54d2 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 e0 51 a1 54 db 1f c0 85 4f 0f 8b bf 7c 71 15 |..Q.T....O...|q.| +peer0.org1.example.com | 00000010 1c fe c9 87 fc 26 50 a4 7d c2 8a 94 0e 30 4d 2b |.....&P.}....0M+| +peer0.org1.example.com | [54d3 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 2e f5 2b 08 8e 21 40 1c a5 3c 10 |0D. %..+..!@..<.| +peer0.org1.example.com | 00000010 09 84 69 13 66 fc 9c 22 20 15 41 2f 4d 70 cd 46 |..i.f.." .A/Mp.F| +peer0.org1.example.com | 00000020 dc 96 e0 1a 02 20 1a e6 23 27 cb a7 da 14 16 cd |..... ..#'......| +peer0.org1.example.com | 00000030 9b 9e 99 76 0e 03 77 72 43 1b fa 2a 6c 73 46 dc |...v..wrC..*lsF.| +peer0.org1.example.com | 00000040 7f 0e 42 72 45 5e |..BrE^| +peer0.org1.example.com | [54d4 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [54d5 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54d6 05-20 18:21:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54d7 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54d8 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54d9 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54da 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54db 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [54dc 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 46 35 dd c7 cc 4b 2f 3d 0c 6b 0f 65 b8 9d ac |pF5...K/=.k.e...| +peer0.org1.example.com | 00000010 51 d1 15 12 e7 f0 46 27 67 48 d7 39 e7 90 ff 60 |Q.....F'gH.9...`| +peer0.org1.example.com | [54dd 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc b2 74 9f 21 e8 b7 ae fd ea d7 |0E.!...t.!......| +peer0.org1.example.com | 00000010 00 65 e9 c0 5c eb f4 06 5f c3 6e de 09 24 b6 01 |.e..\..._.n..$..| +peer0.org1.example.com | 00000020 d2 27 19 3f e0 02 20 68 09 46 12 3c 50 1c 4d c4 |.'.?.. h.F. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54df 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [54e0 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [54e1 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [54e2 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [54e3 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54e4 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54e5 05-20 18:21:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54e6 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [54e7 05-20 18:21:53.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [54e8 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [54e9 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54ea 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54eb 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54ec 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54ed 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54ee 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [54ef 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [54f0 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [54f1 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54f2 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54f3 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54f4 05-20 18:21:53.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54f5 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54f6 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54f7 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54f8 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [54f9 05-20 18:21:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54fa 05-20 18:21:53.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [54fb 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [54fc 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [54fd 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [54fe 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [54ff 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [5500 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5501 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [5502 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5503 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5504 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5505 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5506 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5507 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec3b0 gate 1589998913785216300 evaluation starts +peer0.org1.example.com | [5508 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec3b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5509 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec3b0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [550a 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [550b 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec3b0 principal evaluation fails +peer0.org1.example.com | [550c 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec3b0 gate 1589998913785216300 evaluation fails +peer0.org1.example.com | [550d 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [550e 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [550f 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [5510 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec920 gate 1589998913785789800 evaluation starts +peer0.org1.example.com | [5511 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec920 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5512 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec920 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5513 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec920 principal matched by identity 0 +peer0.org1.example.com | [5514 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 9f 09 c4 c0 52 33 b6 90 ee 6d 28 98 93 cb 1a |.....R3...m(....| +peer0.org1.example.com | 00000010 b3 66 e0 b8 d1 2d d4 ee 56 22 12 af a9 87 7f 74 |.f...-..V".....t| +peer0.org1.example.com | [5515 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 6a 87 ec da c0 91 be 82 e6 4c cc |0D. 3j........L.| +peer0.org1.example.com | 00000010 68 c7 43 8d 4d 19 f8 cd 66 ce d4 23 50 dd 43 8e |h.C.M...f..#P.C.| +peer0.org1.example.com | 00000020 98 82 a7 d4 02 20 64 48 a3 8a d7 62 02 23 02 7d |..... dH...b.#.}| +peer0.org1.example.com | 00000030 0e cb 91 9b ae 82 b9 f4 36 04 32 dc 00 5a 86 66 |........6.2..Z.f| +peer0.org1.example.com | 00000040 e3 6d c0 d9 aa 70 |.m...p| +peer0.org1.example.com | [5516 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec920 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5517 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008eec920 gate 1589998913785789800 evaluation succeeds +peer0.org1.example.com | [5518 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5519 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [551a 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [551b 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [551c 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [551d 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [551e 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [551f 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [5520 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [5521 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5522 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5523 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5524 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5525 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5526 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5527 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5528 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5529 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [552a 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [552b 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [552c 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [552d 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [552e 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [552f 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [5530 05-20 18:21:53.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5531 05-20 18:21:53.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5532 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5533 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5534 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5535 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5536 05-20 18:21:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5537 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5538 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5539 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [553a 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [553b 05-20 18:21:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [553c 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [553d 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [553e 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [553f 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [5540 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [5541 05-20 18:21:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [5542 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [5544 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10a50 gate 1589998914148469800 evaluation starts +peer0.org1.example.com | [5543 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5545 05-20 18:21:54.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5546 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5547 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10a50 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5548 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [5549 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10a50 principal evaluation fails +peer0.org1.example.com | [554a 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10a50 gate 1589998914148469800 evaluation fails +peer0.org1.example.com | [554b 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [554c 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [554d 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [554e 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10fc0 gate 1589998914157204700 evaluation starts +peer0.org1.example.com | [554f 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10fc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5550 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10fc0 processing identity 0 with bytes of 115a110 +peer0.org1.example.com | [5551 05-20 18:21:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10fc0 principal matched by identity 0 +peer0.org1.example.com | [5552 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 bc 47 37 60 24 42 2c 17 73 70 82 86 cf fd c9 |..G7`$B,.sp.....| +peer0.org1.example.com | 00000010 fe ca 36 b2 6a e3 8c a4 b8 ac 7c 65 44 95 a2 fd |..6.j.....|eD...| +peer0.org1.example.com | [5553 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 a9 99 4a 97 fa 4d 43 48 f7 7c 5d |0D. s..J..MCH.|]| +peer0.org1.example.com | 00000010 ad 96 6e e3 77 91 a6 3d af b8 df f4 03 5e c1 6e |..n.w..=.....^.n| +peer0.org1.example.com | 00000020 38 fa 05 85 02 20 44 af b9 9c 50 71 8a 26 38 45 |8.... D...Pq.&8E| +peer0.org1.example.com | 00000030 fe 75 46 b6 7e 3b ba 4f 8d db ed 0c 36 61 bc 20 |.uF.~;.O....6a. | +peer0.org1.example.com | 00000040 f7 26 ba f8 ab 6c |.&...l| +peer0.org1.example.com | [5554 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10fc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [5555 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008f10fc0 gate 1589998914157204700 evaluation succeeds +peer0.org1.example.com | [5556 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5557 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5558 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [5559 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [555a 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [555b 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [555c 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [555d 05-20 18:21:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [555e 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [555f 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5560 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5561 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5562 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [5563 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161047 +peer0.org1.example.com | [5564 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5F6E3D424413E6865E35A9477FE609CBE6F1978F4EB4378AA9EA7266936C0968 +peer0.org1.example.com | [5565 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [5566 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [5567 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [5568 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [5569 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [556a 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [556b 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [556c 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [556d 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [556e 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [556f 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5570 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5571 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [5572 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5573 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [5574 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5575 05-20 18:21:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5576 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5577 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5578 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5579 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [557a 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [557b 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [557c 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [557d 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [557e 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [557f 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [5580 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [5581 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5582 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5583 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5584 05-20 18:21:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5585 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5586 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5587 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5588 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [5589 05-20 18:21:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting diff --git a/hyperledger_fabric/v1.4.7/raft/logs/dev_orderer.log b/hyperledger_fabric/v1.4.7/raft/logs/dev_orderer.log new file mode 100644 index 00000000..bc3c457a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/logs/dev_orderer.log @@ -0,0 +1,9485 @@ +2020-05-20 18:19:45.327 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for ramledger +2020-05-20 18:19:45.327 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value is not a string: 1000 +2020-05-20 18:19:45.327 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for ramledger.HistorySize setting to int 1000 +2020-05-20 18:19:45.328 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[interface{}]interface{} value for kafka +2020-05-20 18:19:45.328 UTC [viperutil] getKeysRecursively -> DEBU 005 Found map[string]interface{} value for kafka.TLS +2020-05-20 18:19:45.328 UTC [viperutil] unmarshalJSON -> DEBU 006 Unmarshal JSON: value is not a string: false +2020-05-20 18:19:45.328 UTC [viperutil] getKeysRecursively -> DEBU 007 Found real value for kafka.TLS.Enabled setting to bool false +2020-05-20 18:19:45.328 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.328 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for kafka.TLS.PrivateKey setting to +2020-05-20 18:19:45.328 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.330 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for kafka.TLS.Certificate setting to +2020-05-20 18:19:45.331 UTC [viperutil] unmarshalJSON -> DEBU 00c Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.331 UTC [viperutil] getKeysRecursively -> DEBU 00d Found real value for kafka.TLS.RootCAs setting to +2020-05-20 18:19:45.331 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.331 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for kafka.TLS.ClientAuthRequired setting to +2020-05-20 18:19:45.331 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.332 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for kafka.TLS.ClientRootCAs setting to +2020-05-20 18:19:45.332 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[string]interface{} value for kafka.SASLPlain +2020-05-20 18:19:45.332 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.332 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for kafka.SASLPlain.User setting to +2020-05-20 18:19:45.332 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.332 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for kafka.SASLPlain.Password setting to +2020-05-20 18:19:45.333 UTC [viperutil] unmarshalJSON -> DEBU 017 Unmarshal JSON: value is not a string: false +2020-05-20 18:19:45.333 UTC [viperutil] getKeysRecursively -> DEBU 018 Found real value for kafka.SASLPlain.Enabled setting to bool false +2020-05-20 18:19:45.333 UTC [viperutil] unmarshalJSON -> DEBU 019 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.333 UTC [viperutil] getKeysRecursively -> DEBU 01a Found real value for kafka.Version setting to +2020-05-20 18:19:45.333 UTC [viperutil] getKeysRecursively -> DEBU 01b Found map[string]interface{} value for kafka.Retry +2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 01c Found map[string]interface{} value for kafka.Retry.Consumer +2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 01d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 01e Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for kafka.Retry.ShortInterval setting to string 5s +2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for kafka.Retry.ShortTotal setting to string 10m +2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for kafka.Retry.LongInterval setting to string 5m +2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for kafka.Retry.LongTotal setting to string 12h +2020-05-20 18:19:45.334 UTC [viperutil] getKeysRecursively -> DEBU 027 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2020-05-20 18:19:45.334 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2020-05-20 18:19:45.335 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2020-05-20 18:19:45.335 UTC [viperutil] unmarshalJSON -> DEBU 02c Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 02d Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 02e Found map[string]interface{} value for kafka.Retry.Metadata +2020-05-20 18:19:45.335 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-05-20 18:19:45.335 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2020-05-20 18:19:45.336 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value is not a string: 3 +2020-05-20 18:19:45.336 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2020-05-20 18:19:45.336 UTC [viperutil] getKeysRecursively -> DEBU 033 Found map[string]interface{} value for kafka.Retry.Producer +2020-05-20 18:19:45.339 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-05-20 18:19:45.339 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2020-05-20 18:19:45.340 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: 3 +2020-05-20 18:19:45.340 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2020-05-20 18:19:45.340 UTC [viperutil] getKeysRecursively -> DEBU 038 Found map[string]interface{} value for kafka.Topic +2020-05-20 18:19:45.341 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value is not a string: 3 +2020-05-20 18:19:45.341 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2020-05-20 18:19:45.341 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value is not a string: false +2020-05-20 18:19:45.341 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for kafka.Verbose setting to bool false +2020-05-20 18:19:45.342 UTC [viperutil] getKeysRecursively -> DEBU 03d Found map[interface{}]interface{} value for debug +2020-05-20 18:19:45.342 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.342 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for debug.BroadcastTraceDir setting to +2020-05-20 18:19:45.342 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.344 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for debug.DeliverTraceDir setting to +2020-05-20 18:19:45.344 UTC [viperutil] getKeysRecursively -> DEBU 042 Found map[interface{}]interface{} value for operations +2020-05-20 18:19:45.345 UTC [viperutil] getKeysRecursively -> DEBU 043 Found map[string]interface{} value for operations.TLS +2020-05-20 18:19:45.345 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.346 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for operations.TLS.Certificate setting to +2020-05-20 18:19:45.346 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.347 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for operations.TLS.PrivateKey setting to +2020-05-20 18:19:45.347 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value is not a string: false +2020-05-20 18:19:45.347 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for operations.TLS.ClientAuthRequired setting to bool false +2020-05-20 18:19:45.347 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: [] +2020-05-20 18:19:45.347 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2020-05-20 18:19:45.347 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.348 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for operations.TLS.RootCAs setting to +2020-05-20 18:19:45.348 UTC [viperutil] unmarshalJSON -> DEBU 04e Unmarshal JSON: value is not a string: false +2020-05-20 18:19:45.348 UTC [viperutil] getKeysRecursively -> DEBU 04f Found real value for operations.TLS.Enabled setting to bool false +2020-05-20 18:19:45.348 UTC [viperutil] unmarshalJSON -> DEBU 050 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-05-20 18:19:45.348 UTC [viperutil] getKeysRecursively -> DEBU 051 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2020-05-20 18:19:45.348 UTC [viperutil] getKeysRecursively -> DEBU 052 Found map[interface{}]interface{} value for metrics +2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for metrics.Provider setting to string prometheus +2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 055 Found map[string]interface{} value for metrics.Statsd +2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 056 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 057 Found real value for metrics.Statsd.WriteInterval setting to string 30s +2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 058 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 059 Found real value for metrics.Statsd.Prefix setting to +2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for metrics.Statsd.Network setting to string udp +2020-05-20 18:19:45.349 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-05-20 18:19:45.349 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 05e Found map[interface{}]interface{} value for consensus +2020-05-20 18:19:45.350 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2020-05-20 18:19:45.350 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 063 Found map[interface{}]interface{} value for general +2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 064 Found map[string]interface{} value for general.Authentication +2020-05-20 18:19:45.350 UTC [viperutil] unmarshalJSON -> DEBU 065 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-05-20 18:19:45.350 UTC [viperutil] getKeysRecursively -> DEBU 066 Found real value for general.Authentication.TimeWindow setting to string 15m +2020-05-20 18:19:45.350 UTC [viperutil] unmarshalJSON -> DEBU 067 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 068 Found real value for general.Authentication.NoExpirationChecks setting to +2020-05-20 18:19:45.351 UTC [viperutil] unmarshalJSON -> DEBU 069 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 06a Found real value for general.SystemChannel setting to +2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 06b Found map[string]interface{} value for general.Cluster +2020-05-20 18:19:45.351 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for general.Cluster.ListenPort setting to string 7055 +2020-05-20 18:19:45.351 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.351 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for general.Cluster.CertExpirationWarningThreshold setting to +2020-05-20 18:19:45.351 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.352 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for general.Cluster.TLSHandshakeTimeShift setting to +2020-05-20 18:19:45.352 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.352 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for general.Cluster.ServerPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-05-20 18:19:45.352 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-05-20 18:19:45.352 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for general.Cluster.ListenAddress setting to string 0.0.0.0 +2020-05-20 18:19:45.352 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.352 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2020-05-20 18:19:45.352 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.354 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for general.Cluster.RPCTimeout setting to +2020-05-20 18:19:45.356 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for general.Cluster.ReplicationMaxRetries setting to +2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 080 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 081 Found real value for general.Cluster.ServerCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 082 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 083 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +2020-05-20 18:19:45.357 UTC [viperutil] unmarshalJSON -> DEBU 084 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.357 UTC [viperutil] getKeysRecursively -> DEBU 085 Found real value for general.Cluster.ReplicationRetryTimeout setting to +2020-05-20 18:19:45.358 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value is not a string: 10 +2020-05-20 18:19:45.358 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for general.Cluster.SendBufferSize setting to int 10 +2020-05-20 18:19:45.358 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.358 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for general.Cluster.DialTimeout setting to +2020-05-20 18:19:45.358 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.358 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for general.Cluster.ReplicationBufferSize setting to +2020-05-20 18:19:45.358 UTC [viperutil] unmarshalJSON -> DEBU 08c Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.359 UTC [viperutil] getKeysRecursively -> DEBU 08d Found real value for general.Cluster.ReplicationPullTimeout setting to +2020-05-20 18:19:45.359 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2020-05-20 18:19:45.359 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for general.LedgerType setting to string file +2020-05-20 18:19:45.359 UTC [viperutil] getKeysRecursively -> DEBU 090 Found map[string]interface{} value for general.Keepalive +2020-05-20 18:19:45.359 UTC [viperutil] unmarshalJSON -> DEBU 091 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.359 UTC [viperutil] getKeysRecursively -> DEBU 092 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2020-05-20 18:19:45.360 UTC [viperutil] unmarshalJSON -> DEBU 093 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.361 UTC [viperutil] getKeysRecursively -> DEBU 094 Found real value for general.Keepalive.ServerInterval setting to string 7200s +2020-05-20 18:19:45.361 UTC [viperutil] unmarshalJSON -> DEBU 095 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-05-20 18:19:45.362 UTC [viperutil] getKeysRecursively -> DEBU 096 Found real value for general.Keepalive.ServerTimeout setting to string 20s +2020-05-20 18:19:45.363 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-05-20 18:19:45.364 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2020-05-20 18:19:45.365 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for general.ConnectionTimeout setting to +2020-05-20 18:19:45.365 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2020-05-20 18:19:45.365 UTC [viperutil] unmarshalJSON -> DEBU 09d Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 09e Found real value for general.ListenPort setting to string 7050 +2020-05-20 18:19:45.365 UTC [viperutil] unmarshalJSON -> DEBU 09f Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 0a0 Found real value for general.LocalMSPID setting to string OrdererMSP +2020-05-20 18:19:45.365 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found map[string]interface{} value for general.Profile +2020-05-20 18:19:45.366 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: false +2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for general.Profile.Enabled setting to bool false +2020-05-20 18:19:45.366 UTC [viperutil] unmarshalJSON -> DEBU 0a4 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a5 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2020-05-20 18:19:45.366 UTC [viperutil] unmarshalJSON -> DEBU 0a6 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found real value for general.GenesisMethod setting to string file +2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found map[string]interface{} value for general.BCCSP +2020-05-20 18:19:45.366 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found map[string]interface{} value for general.BCCSP.SW +2020-05-20 18:19:45.367 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-05-20 18:19:45.367 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2020-05-20 18:19:45.367 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: 256 +2020-05-20 18:19:45.367 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for general.BCCSP.SW.Security setting to int 256 +2020-05-20 18:19:45.367 UTC [viperutil] getKeysRecursively -> DEBU 0ae Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2020-05-20 18:19:45.367 UTC [viperutil] unmarshalJSON -> DEBU 0af Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.367 UTC [viperutil] getKeysRecursively -> DEBU 0b0 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2020-05-20 18:19:45.368 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found map[string]interface{} value for general.BCCSP.PKCS11 +2020-05-20 18:19:45.368 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.368 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for general.BCCSP.PKCS11.Security setting to +2020-05-20 18:19:45.368 UTC [viperutil] getKeysRecursively -> DEBU 0b4 Found map[string]interface{} value for general.BCCSP.PKCS11.FileKeyStore +2020-05-20 18:19:45.368 UTC [viperutil] unmarshalJSON -> DEBU 0b5 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.368 UTC [viperutil] getKeysRecursively -> DEBU 0b6 Found real value for general.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +2020-05-20 18:19:45.368 UTC [viperutil] unmarshalJSON -> DEBU 0b7 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0b8 Found real value for general.BCCSP.PKCS11.Library setting to +2020-05-20 18:19:45.369 UTC [viperutil] unmarshalJSON -> DEBU 0b9 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0ba Found real value for general.BCCSP.PKCS11.Label setting to +2020-05-20 18:19:45.369 UTC [viperutil] unmarshalJSON -> DEBU 0bb Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0bc Found real value for general.BCCSP.PKCS11.Pin setting to +2020-05-20 18:19:45.369 UTC [viperutil] unmarshalJSON -> DEBU 0bd Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0be Found real value for general.BCCSP.PKCS11.Hash setting to +2020-05-20 18:19:45.369 UTC [viperutil] unmarshalJSON -> DEBU 0bf Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found real value for general.BCCSP.Default setting to string SW +2020-05-20 18:19:45.369 UTC [viperutil] getKeysRecursively -> DEBU 0c1 Found map[string]interface{} value for general.TLS +2020-05-20 18:19:45.370 UTC [viperutil] unmarshalJSON -> DEBU 0c2 Unmarshal JSON: value is not a string: false +2020-05-20 18:19:45.370 UTC [viperutil] getKeysRecursively -> DEBU 0c3 Found real value for general.TLS.ClientAuthRequired setting to bool false +2020-05-20 18:19:45.370 UTC [viperutil] unmarshalJSON -> DEBU 0c4 Unmarshal JSON: value is not a string: +2020-05-20 18:19:45.370 UTC [viperutil] getKeysRecursively -> DEBU 0c5 Found real value for general.TLS.ClientRootCAs setting to +2020-05-20 18:19:45.370 UTC [viperutil] unmarshalJSON -> DEBU 0c6 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2020-05-20 18:19:45.370 UTC [viperutil] getKeysRecursively -> DEBU 0c7 Found real value for general.TLS.Enabled setting to string true +2020-05-20 18:19:45.370 UTC [viperutil] unmarshalJSON -> DEBU 0c8 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.372 UTC [viperutil] getKeysRecursively -> DEBU 0c9 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-05-20 18:19:45.372 UTC [viperutil] unmarshalJSON -> DEBU 0ca Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.372 UTC [viperutil] getKeysRecursively -> DEBU 0cb Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-05-20 18:19:45.372 UTC [viperutil] unmarshalJSON -> DEBU 0cc Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.372 UTC [viperutil] getKeysRecursively -> DEBU 0cd Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2020-05-20 18:19:45.373 UTC [viperutil] unmarshalJSON -> DEBU 0ce Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0cf Found real value for general.ListenAddress setting to string 0.0.0.0 +2020-05-20 18:19:45.373 UTC [viperutil] unmarshalJSON -> DEBU 0d0 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0d1 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0d2 Found map[interface{}]interface{} value for fileledger +2020-05-20 18:19:45.373 UTC [viperutil] unmarshalJSON -> DEBU 0d3 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0d4 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2020-05-20 18:19:45.373 UTC [viperutil] unmarshalJSON -> DEBU 0d5 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2020-05-20 18:19:45.373 UTC [viperutil] getKeysRecursively -> DEBU 0d6 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2020-05-20 18:19:45.373 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0d7 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress:0.0.0.0 ListenPort:7055 RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate:/var/hyperledger/orderer/tls/server.crt ServerPrivateKey:/var/hyperledger/orderer/tls/server.key TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +2020-05-20 18:19:45.388 UTC [localconfig] completeInitialization -> INFO 0d8 Kafka.Version unset, setting to 0.10.2.0 +"2020-05-20 18:19:45.416 UTC [bccsp_sw] openKeyStore -> DEBU 0d9 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]" +"2020-05-20 18:19:45.416 UTC [bccsp] initBCCSP -> DEBU 0da Initialize BCCSP [SW]" +"2020-05-20 18:19:45.416 UTC [msp] getPemMaterialFromDir -> DEBU 0db Reading directory /var/hyperledger/orderer/msp/signcerts" +"2020-05-20 18:19:45.425 UTC [msp] getPemMaterialFromDir -> DEBU 0dc Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2020-05-20 18:19:45.432 UTC [msp] getPemMaterialFromDir -> DEBU 0dd Reading directory /var/hyperledger/orderer/msp/cacerts" +"2020-05-20 18:19:45.509 UTC [msp] getPemMaterialFromDir -> DEBU 0de Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2020-05-20 18:19:45.519 UTC [msp] getPemMaterialFromDir -> DEBU 0df Reading directory /var/hyperledger/orderer/msp/admincerts" +"2020-05-20 18:19:45.538 UTC [msp] getPemMaterialFromDir -> DEBU 0e0 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2020-05-20 18:19:45.540 UTC [msp] getMspConfig -> DEBU 0e1 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2020-05-20 18:19:45.540 UTC [msp] getPemMaterialFromDir -> DEBU 0e2 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2020-05-20 18:19:45.558 UTC [msp] getPemMaterialFromDir -> DEBU 0e3 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2020-05-20 18:19:45.567 UTC [msp] getPemMaterialFromDir -> DEBU 0e4 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2020-05-20 18:19:45.569 UTC [msp] getMspConfig -> DEBU 0e5 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2020-05-20 18:19:45.569 UTC [msp] getPemMaterialFromDir -> DEBU 0e6 Reading directory /var/hyperledger/orderer/msp/crls" +"2020-05-20 18:19:45.570 UTC [msp] getMspConfig -> DEBU 0e7 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2020-05-20 18:19:45.582 UTC [msp] getMspConfig -> DEBU 0e8 Loading NodeOUs" +"2020-05-20 18:19:45.621 UTC [msp] newBccspMsp -> DEBU 0e9 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.621 UTC [msp] New -> DEBU 0ea Creating Cache-MSP instance" +"2020-05-20 18:19:45.622 UTC [msp] loadLocaMSP -> DEBU 0eb Created new local MSP" +"2020-05-20 18:19:45.622 UTC [msp] Setup -> DEBU 0ec Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:45.622 UTC [msp.identity] newIdentity -> DEBU 0ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.622 UTC [msp.identity] newIdentity -> DEBU 0ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.658 UTC [bccsp_sw] loadPrivateKey -> DEBU 0ef Loading private key [b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd] at [/var/hyperledger/orderer/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk]..." +"2020-05-20 18:19:45.664 UTC [msp.identity] newIdentity -> DEBU 0f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.665 UTC [msp] setupSigningIdentity -> DEBU 0f1 Signing identity expires at 2030-02-18 18:24:00 +0000 UTC" +"2020-05-20 18:19:45.673 UTC [orderer.common.server] prettyPrintStruct -> INFO 0f2 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "0.0.0.0" + General.Cluster.ListenPort = 7055 + General.Cluster.ServerCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ServerPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Cluster.TLSHandshakeTimeShift = 0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.ConnectionTimeout = 0s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + General.Authentication.NoExpirationChecks = false + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = false + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2020-05-20 18:19:45.684 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: HashingAlgorithm" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f5 Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f6 Processing field: OrdererAddresses" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f7 Processing field: Consortium" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f8 Processing field: Capabilities" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] NewStandardValues -> DEBU 0f9 Initializing protos for *channelconfig.ConsortiumProtos" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fa Processing field: ChannelCreationPolicy" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] NewStandardValues -> DEBU 0fb Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fc Processing field: MSP" +"2020-05-20 18:19:45.684 UTC [common.channelconfig] validateMSP -> DEBU 0fd Setting up MSP for org Org1MSP" +"2020-05-20 18:19:45.685 UTC [msp] newBccspMsp -> DEBU 0fe Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.685 UTC [msp] New -> DEBU 0ff Creating Cache-MSP instance" +"2020-05-20 18:19:45.685 UTC [msp] Setup -> DEBU 100 Setting up MSP instance Org1MSP" +"2020-05-20 18:19:45.685 UTC [msp.identity] newIdentity -> DEBU 101 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.685 UTC [common.channelconfig] NewStandardValues -> DEBU 102 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.685 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: MSP" +"2020-05-20 18:19:45.685 UTC [common.channelconfig] validateMSP -> DEBU 104 Setting up MSP for org Org2MSP" +"2020-05-20 18:19:45.685 UTC [msp] newBccspMsp -> DEBU 105 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.685 UTC [msp] New -> DEBU 106 Creating Cache-MSP instance" +"2020-05-20 18:19:45.685 UTC [msp] Setup -> DEBU 107 Setting up MSP instance Org2MSP" +"2020-05-20 18:19:45.686 UTC [msp.identity] newIdentity -> DEBU 108 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.686 UTC [common.channelconfig] NewStandardValues -> DEBU 109 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10a Processing field: ConsensusType" +"2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10b Processing field: BatchSize" +"2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: BatchTimeout" +"2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10d Processing field: KafkaBrokers" +"2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10e Processing field: ChannelRestrictions" +"2020-05-20 18:19:45.686 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10f Processing field: Capabilities" +"2020-05-20 18:19:45.687 UTC [common.channelconfig] NewStandardValues -> DEBU 110 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:45.687 UTC [common.channelconfig] initializeProtosStruct -> DEBU 111 Processing field: Endpoints" +"2020-05-20 18:19:45.687 UTC [common.channelconfig] NewStandardValues -> DEBU 112 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.687 UTC [common.channelconfig] initializeProtosStruct -> DEBU 113 Processing field: MSP" +"2020-05-20 18:19:45.688 UTC [common.channelconfig] validateMSP -> DEBU 114 Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:45.688 UTC [msp] newBccspMsp -> DEBU 115 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.688 UTC [msp] New -> DEBU 116 Creating Cache-MSP instance" +"2020-05-20 18:19:45.688 UTC [msp] Setup -> DEBU 117 Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:45.690 UTC [msp.identity] newIdentity -> DEBU 118 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.703 UTC [msp] Setup -> DEBU 119 Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:45.705 UTC [msp] Setup -> DEBU 11a MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:45.705 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.705 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.706 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.706 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.706 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.706 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Admins for Channel/Consortiums" +"2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.707 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:45.709 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:45.713 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:45.713 UTC [policies] NewManagerImpl -> DEBU 12a Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:45.714 UTC [policies] GetPolicy -> DEBU 12b Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-05-20 18:19:45.714 UTC [policies] NewManagerImpl -> DEBU 12c Proposed new policy Writers for Channel" +"2020-05-20 18:19:45.714 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Admins for Channel" +"2020-05-20 18:19:45.714 UTC [policies] GetPolicy -> DEBU 12e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-05-20 18:19:45.714 UTC [policies] NewManagerImpl -> DEBU 12f Proposed new policy Readers for Channel" +"2020-05-20 18:19:45.714 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Consortiums" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-05-20 18:19:45.715 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:45.716 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:45.722 UTC [common.configtx] addToMap -> DEBU 156 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:45.724 UTC [orderer.common.server] createLedgerFactory -> DEBU 157 Ledger dir: /var/hyperledger/production/orderer" +"2020-05-20 18:19:45.724 UTC [kvledger.util] CreateDirIfMissing -> DEBU 158 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2020-05-20 18:19:45.724 UTC [kvledger.util] logDirStatus -> DEBU 159 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2020-05-20 18:19:45.724 UTC [kvledger.util] logDirStatus -> DEBU 15a After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2020-05-20 18:19:45.759 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15b Bootstrapping because no existing channels" +"2020-05-20 18:19:45.759 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15c Selected bootstrap block, because system channel last config block is nil" +"2020-05-20 18:19:45.793 UTC [orderer.common.server] initializeServerConfig -> INFO 15d Starting orderer with TLS enabled" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] NewStandardValues -> DEBU 15e Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: HashingAlgorithm" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: OrdererAddresses" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: Consortium" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: Capabilities" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] NewStandardValues -> DEBU 164 Initializing protos for *channelconfig.ConsortiumProtos" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: ChannelCreationPolicy" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] NewStandardValues -> DEBU 166 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: MSP" +"2020-05-20 18:19:45.794 UTC [common.channelconfig] validateMSP -> DEBU 168 Setting up MSP for org Org1MSP" +"2020-05-20 18:19:45.794 UTC [msp] newBccspMsp -> DEBU 169 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.794 UTC [msp] New -> DEBU 16a Creating Cache-MSP instance" +"2020-05-20 18:19:45.794 UTC [msp] Setup -> DEBU 16b Setting up MSP instance Org1MSP" +"2020-05-20 18:19:45.794 UTC [msp.identity] newIdentity -> DEBU 16c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.795 UTC [common.channelconfig] NewStandardValues -> DEBU 16d Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.795 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e Processing field: MSP" +"2020-05-20 18:19:45.795 UTC [common.channelconfig] validateMSP -> DEBU 16f Setting up MSP for org Org2MSP" +"2020-05-20 18:19:45.795 UTC [msp] newBccspMsp -> DEBU 170 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.795 UTC [msp] New -> DEBU 171 Creating Cache-MSP instance" +"2020-05-20 18:19:45.795 UTC [msp] Setup -> DEBU 172 Setting up MSP instance Org2MSP" +"2020-05-20 18:19:45.795 UTC [msp.identity] newIdentity -> DEBU 173 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.796 UTC [common.channelconfig] NewStandardValues -> DEBU 174 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175 Processing field: ConsensusType" +"2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176 Processing field: BatchSize" +"2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177 Processing field: BatchTimeout" +"2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 178 Processing field: KafkaBrokers" +"2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 179 Processing field: ChannelRestrictions" +"2020-05-20 18:19:45.796 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a Processing field: Capabilities" +"2020-05-20 18:19:45.797 UTC [common.channelconfig] NewStandardValues -> DEBU 17b Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:45.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17c Processing field: Endpoints" +"2020-05-20 18:19:45.797 UTC [common.channelconfig] NewStandardValues -> DEBU 17d Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17e Processing field: MSP" +"2020-05-20 18:19:45.797 UTC [common.channelconfig] validateMSP -> DEBU 17f Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:45.797 UTC [msp] newBccspMsp -> DEBU 180 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.797 UTC [msp] New -> DEBU 181 Creating Cache-MSP instance" +"2020-05-20 18:19:45.797 UTC [msp] Setup -> DEBU 182 Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:45.804 UTC [msp.identity] newIdentity -> DEBU 183 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.806 UTC [msp] Setup -> DEBU 184 Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:45.806 UTC [msp] Setup -> DEBU 185 MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:45.807 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 18b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.808 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.809 UTC [policies] NewManagerImpl -> DEBU 18e Proposed new policy Admins for Channel/Consortiums" +"2020-05-20 18:19:45.809 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.810 UTC [policies] NewManagerImpl -> DEBU 190 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.810 UTC [policies] NewManagerImpl -> DEBU 191 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.810 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:45.811 UTC [policies] GetPolicy -> DEBU 196 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Writers for Channel" +"2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Admins for Channel" +"2020-05-20 18:19:45.811 UTC [policies] GetPolicy -> DEBU 199 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-05-20 18:19:45.811 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Readers for Channel" +"2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Group] /Channel" +"2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums" +"2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-05-20 18:19:45.811 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-05-20 18:19:45.812 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-05-20 18:19:45.812 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-05-20 18:19:45.812 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:45.813 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:45.814 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:45.815 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] NewStandardValues -> DEBU 1c2 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c3 Processing field: HashingAlgorithm" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c4 Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: OrdererAddresses" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: Consortium" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: Capabilities" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8 Initializing protos for *channelconfig.ConsortiumProtos" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: ChannelCreationPolicy" +"2020-05-20 18:19:45.816 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: MSP" +"2020-05-20 18:19:45.817 UTC [common.channelconfig] validateMSP -> DEBU 1cc Setting up MSP for org Org1MSP" +"2020-05-20 18:19:45.817 UTC [msp] newBccspMsp -> DEBU 1cd Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.817 UTC [msp] New -> DEBU 1ce Creating Cache-MSP instance" +"2020-05-20 18:19:45.818 UTC [msp] Setup -> DEBU 1cf Setting up MSP instance Org1MSP" +"2020-05-20 18:19:45.818 UTC [msp.identity] newIdentity -> DEBU 1d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.823 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.824 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: MSP" +"2020-05-20 18:19:45.824 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org Org2MSP" +"2020-05-20 18:19:45.824 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.824 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance" +"2020-05-20 18:19:45.825 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance Org2MSP" +"2020-05-20 18:19:45.825 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.833 UTC [common.channelconfig] NewStandardValues -> DEBU 1d8 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9 Processing field: ConsensusType" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da Processing field: BatchSize" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: BatchTimeout" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dc Processing field: KafkaBrokers" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelRestrictions" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1de Processing field: Capabilities" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: Endpoints" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] NewStandardValues -> DEBU 1e1 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:45.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: MSP" +"2020-05-20 18:19:45.836 UTC [common.channelconfig] validateMSP -> DEBU 1e3 Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:45.836 UTC [msp] newBccspMsp -> DEBU 1e4 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:45.836 UTC [msp] New -> DEBU 1e5 Creating Cache-MSP instance" +"2020-05-20 18:19:45.838 UTC [msp] Setup -> DEBU 1e6 Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:45.840 UTC [msp.identity] newIdentity -> DEBU 1e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:45.843 UTC [msp] Setup -> DEBU 1e8 Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:45.844 UTC [msp] Setup -> DEBU 1e9 MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:45.844 UTC [policies] NewManagerImpl -> DEBU 1ea Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.845 UTC [policies] NewManagerImpl -> DEBU 1eb Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.849 UTC [policies] NewManagerImpl -> DEBU 1ec Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1ed Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1ee Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1ef Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1f0 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1f1 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.850 UTC [policies] NewManagerImpl -> DEBU 1f2 Proposed new policy Admins for Channel/Consortiums" +"2020-05-20 18:19:45.851 UTC [policies] NewManagerImpl -> DEBU 1f3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f4 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f5 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:45.852 UTC [policies] GetPolicy -> DEBU 1fa Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Writers for Channel" +"2020-05-20 18:19:45.852 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Admins for Channel" +"2020-05-20 18:19:45.853 UTC [policies] GetPolicy -> DEBU 1fd Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-05-20 18:19:45.853 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Readers for Channel" +"2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 1ff Adding to config map: [Group] /Channel" +"2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 200 Adding to config map: [Group] /Channel/Consortiums" +"2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 201 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 202 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 203 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 204 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-05-20 18:19:45.853 UTC [common.configtx] addToMap -> DEBU 205 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 206 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 207 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 208 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 209 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:45.854 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:45.855 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:45.856 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:45.856 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:45.856 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:45.856 UTC [orderer.common.server] Start -> INFO 226 Setting up cluster for orderer type etcdraft" +"2020-05-20 18:19:45.887 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 227 Booted with a genesis block, replication isn't an option" +"2020-05-20 18:19:45.995 UTC [msp] GetDefaultSigningIdentity -> DEBU 228 Obtaining default signing identity" +"2020-05-20 18:19:46.010 UTC [fsblkstorage] newBlockfileMgr -> DEBU 229 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2020-05-20 18:19:46.010 UTC [kvledger.util] CreateDirIfMissing -> DEBU 22a CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2020-05-20 18:19:46.010 UTC [kvledger.util] logDirStatus -> DEBU 22b Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2020-05-20 18:19:46.011 UTC [kvledger.util] logDirStatus -> DEBU 22c After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2020-05-20 18:19:46.011 UTC [fsblkstorage] newBlockfileMgr -> INFO 22d Getting block information from block storage" +"2020-05-20 18:19:46.011 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 22e Retrieving checkpoint info from block files" +"2020-05-20 18:19:46.011 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 22f retrieveLastFileSuffix()" +"2020-05-20 18:19:46.011 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 230 retrieveLastFileSuffix() - biggestFileNum = -1" +"2020-05-20 18:19:46.011 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 231 Last file number found = -1" +"2020-05-20 18:19:46.011 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 232 No block file found" +"2020-05-20 18:19:46.011 UTC [fsblkstorage] newBlockfileMgr -> DEBU 233 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0003121c0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2020-05-20 18:19:46.013 UTC [fsblkstorage] newBlockIndex -> DEBU 234 newBlockIndex() - indexItems:[[BlockNum]]" +"2020-05-20 18:19:46.015 UTC [fsblkstorage] indexBlock -> DEBU 235 Indexing block [blockNum=0, blockHash=[]byte{0x48, 0x55, 0xad, 0xef, 0x6c, 0xdb, 0x22, 0x69, 0x71, 0xcd, 0x6f, 0x1c, 0x81, 0xaf, 0xc3, 0xaa, 0x9e, 0x4d, 0x72, 0x22, 0x6e, 0xe, 0x6f, 0xf, 0xa7, 0xc9, 0xc6, 0x64, 0xf1, 0x4, 0x22, 0x36} txOffsets= +txId=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 locPointer=offset=39, bytesLength=22885 +]" +"2020-05-20 18:19:46.017 UTC [fsblkstorage] updateCheckpoint -> DEBU 236 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[22930], isChainEmpty=[false], lastBlockNumber=[0]" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] NewStandardValues -> DEBU 237 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 238 Processing field: HashingAlgorithm" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 239 Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23a Processing field: OrdererAddresses" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: Consortium" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: Capabilities" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] NewStandardValues -> DEBU 23d Initializing protos for *channelconfig.ConsortiumProtos" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: ChannelCreationPolicy" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] NewStandardValues -> DEBU 23f Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: MSP" +"2020-05-20 18:19:46.018 UTC [common.channelconfig] validateMSP -> DEBU 241 Setting up MSP for org Org1MSP" +"2020-05-20 18:19:46.018 UTC [msp] newBccspMsp -> DEBU 242 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:46.018 UTC [msp] New -> DEBU 243 Creating Cache-MSP instance" +"2020-05-20 18:19:46.018 UTC [msp] Setup -> DEBU 244 Setting up MSP instance Org1MSP" +"2020-05-20 18:19:46.019 UTC [msp.identity] newIdentity -> DEBU 245 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:46.024 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:46.024 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: MSP" +"2020-05-20 18:19:46.025 UTC [common.channelconfig] validateMSP -> DEBU 248 Setting up MSP for org Org2MSP" +"2020-05-20 18:19:46.025 UTC [msp] newBccspMsp -> DEBU 249 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:46.025 UTC [msp] New -> DEBU 24a Creating Cache-MSP instance" +"2020-05-20 18:19:46.025 UTC [msp] Setup -> DEBU 24b Setting up MSP instance Org2MSP" +"2020-05-20 18:19:46.025 UTC [msp.identity] newIdentity -> DEBU 24c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:46.047 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:46.047 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: ConsensusType" +"2020-05-20 18:19:46.047 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24f Processing field: BatchSize" +"2020-05-20 18:19:46.047 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: BatchTimeout" +"2020-05-20 18:19:46.047 UTC [common.channelconfig] initializeProtosStruct -> DEBU 251 Processing field: KafkaBrokers" +"2020-05-20 18:19:46.048 UTC [common.channelconfig] initializeProtosStruct -> DEBU 252 Processing field: ChannelRestrictions" +"2020-05-20 18:19:46.048 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: Capabilities" +"2020-05-20 18:19:46.048 UTC [common.channelconfig] NewStandardValues -> DEBU 254 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:46.048 UTC [common.channelconfig] initializeProtosStruct -> DEBU 255 Processing field: Endpoints" +"2020-05-20 18:19:46.048 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:46.048 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: MSP" +"2020-05-20 18:19:46.049 UTC [common.channelconfig] validateMSP -> DEBU 258 Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:46.049 UTC [msp] newBccspMsp -> DEBU 259 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:46.049 UTC [msp] New -> DEBU 25a Creating Cache-MSP instance" +"2020-05-20 18:19:46.049 UTC [msp] Setup -> DEBU 25b Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:46.056 UTC [msp.identity] newIdentity -> DEBU 25c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:46.063 UTC [msp] Setup -> DEBU 25d Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:46.063 UTC [msp] Setup -> DEBU 25e MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 25f Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 260 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 261 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 262 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.063 UTC [policies] NewManagerImpl -> DEBU 263 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 264 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 265 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 266 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 267 Proposed new policy Admins for Channel/Consortiums" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:46.064 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:46.065 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Admins for Channel" +"2020-05-20 18:19:46.065 UTC [policies] GetPolicy -> DEBU 270 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-05-20 18:19:46.065 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel" +"2020-05-20 18:19:46.065 UTC [policies] GetPolicy -> DEBU 272 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-05-20 18:19:46.065 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Writers for Channel" +"2020-05-20 18:19:46.065 UTC [common.configtx] addToMap -> DEBU 274 Adding to config map: [Group] /Channel" +"2020-05-20 18:19:46.065 UTC [common.configtx] addToMap -> DEBU 275 Adding to config map: [Group] /Channel/Consortiums" +"2020-05-20 18:19:46.069 UTC [common.configtx] addToMap -> DEBU 276 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-05-20 18:19:46.070 UTC [common.configtx] addToMap -> DEBU 277 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.070 UTC [common.configtx] addToMap -> DEBU 278 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-05-20 18:19:46.070 UTC [common.configtx] addToMap -> DEBU 279 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-05-20 18:19:46.077 UTC [common.configtx] addToMap -> DEBU 27a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-05-20 18:19:46.077 UTC [common.configtx] addToMap -> DEBU 27b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 27c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-05-20 18:19:46.078 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:46.079 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:46.080 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:46.084 UTC [fsblkstorage] Next -> DEBU 29b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-05-20 18:19:46.084 UTC [fsblkstorage] newBlockfileStream -> DEBU 29c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:19:46.084 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29d Remaining bytes=[22930], Going to peek [8] bytes" +"2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29e Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29f blockbytes [22927] read from file [0]" +"2020-05-20 18:19:46.085 UTC [fsblkstorage] Next -> DEBU 2a0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-05-20 18:19:46.085 UTC [fsblkstorage] newBlockfileStream -> DEBU 2a1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a2 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a3 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:19:46.085 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a4 blockbytes [22927] read from file [0]" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] NewStandardValues -> DEBU 2a5 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a6 Processing field: HashingAlgorithm" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a7 Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a8 Processing field: OrdererAddresses" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a9 Processing field: Consortium" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2aa Processing field: Capabilities" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] NewStandardValues -> DEBU 2ab Initializing protos for *channelconfig.ConsortiumProtos" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ac Processing field: ChannelCreationPolicy" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] NewStandardValues -> DEBU 2ad Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ae Processing field: MSP" +"2020-05-20 18:19:46.085 UTC [common.channelconfig] validateMSP -> DEBU 2af Setting up MSP for org Org1MSP" +"2020-05-20 18:19:46.085 UTC [msp] newBccspMsp -> DEBU 2b0 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:46.085 UTC [msp] New -> DEBU 2b1 Creating Cache-MSP instance" +"2020-05-20 18:19:46.086 UTC [msp] Setup -> DEBU 2b2 Setting up MSP instance Org1MSP" +"2020-05-20 18:19:46.090 UTC [msp.identity] newIdentity -> DEBU 2b3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:46.091 UTC [common.channelconfig] NewStandardValues -> DEBU 2b4 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:46.091 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b5 Processing field: MSP" +"2020-05-20 18:19:46.091 UTC [common.channelconfig] validateMSP -> DEBU 2b6 Setting up MSP for org Org2MSP" +"2020-05-20 18:19:46.092 UTC [msp] newBccspMsp -> DEBU 2b7 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:46.092 UTC [msp] New -> DEBU 2b8 Creating Cache-MSP instance" +"2020-05-20 18:19:46.092 UTC [msp] Setup -> DEBU 2b9 Setting up MSP instance Org2MSP" +"2020-05-20 18:19:46.094 UTC [msp.identity] newIdentity -> DEBU 2ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:46.105 UTC [common.channelconfig] NewStandardValues -> DEBU 2bb Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:46.112 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2bc Processing field: ConsensusType" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2bd Processing field: BatchSize" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2be Processing field: BatchTimeout" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2bf Processing field: KafkaBrokers" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c0 Processing field: ChannelRestrictions" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c1 Processing field: Capabilities" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] NewStandardValues -> DEBU 2c2 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c3 Processing field: Endpoints" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] NewStandardValues -> DEBU 2c4 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c5 Processing field: MSP" +"2020-05-20 18:19:46.114 UTC [common.channelconfig] validateMSP -> DEBU 2c6 Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:46.114 UTC [msp] newBccspMsp -> DEBU 2c7 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:46.114 UTC [msp] New -> DEBU 2c8 Creating Cache-MSP instance" +"2020-05-20 18:19:46.114 UTC [msp] Setup -> DEBU 2c9 Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:46.114 UTC [msp.identity] newIdentity -> DEBU 2ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:46.125 UTC [msp] Setup -> DEBU 2cb Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:46.125 UTC [msp] Setup -> DEBU 2cc MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2cd Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2ce Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2cf Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d0 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d1 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d2 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d3 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.126 UTC [policies] NewManagerImpl -> DEBU 2d4 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d5 Proposed new policy Admins for Channel/Consortiums" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d6 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d8 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2d9 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2da Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2db Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2dc Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:46.127 UTC [policies] GetPolicy -> DEBU 2dd Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2de Proposed new policy Writers for Channel" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2df Proposed new policy Admins for Channel" +"2020-05-20 18:19:46.127 UTC [policies] GetPolicy -> DEBU 2e0 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-05-20 18:19:46.127 UTC [policies] NewManagerImpl -> DEBU 2e1 Proposed new policy Readers for Channel" +"2020-05-20 18:19:46.127 UTC [common.configtx] addToMap -> DEBU 2e2 Adding to config map: [Group] /Channel" +"2020-05-20 18:19:46.127 UTC [common.configtx] addToMap -> DEBU 2e3 Adding to config map: [Group] /Channel/Consortiums" +"2020-05-20 18:19:46.129 UTC [common.configtx] addToMap -> DEBU 2e4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-05-20 18:19:46.129 UTC [common.configtx] addToMap -> DEBU 2e5 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-05-20 18:19:46.129 UTC [common.configtx] addToMap -> DEBU 2e6 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-05-20 18:19:46.130 UTC [common.configtx] addToMap -> DEBU 2e7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-05-20 18:19:46.131 UTC [common.configtx] addToMap -> DEBU 2e8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-05-20 18:19:46.131 UTC [common.configtx] addToMap -> DEBU 2e9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-05-20 18:19:46.131 UTC [common.configtx] addToMap -> DEBU 2ea Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-05-20 18:19:46.132 UTC [common.configtx] addToMap -> DEBU 2eb Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-05-20 18:19:46.132 UTC [common.configtx] addToMap -> DEBU 2ec Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-05-20 18:19:46.132 UTC [common.configtx] addToMap -> DEBU 2ed Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-05-20 18:19:46.132 UTC [common.configtx] addToMap -> DEBU 2ee Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-05-20 18:19:46.134 UTC [common.configtx] addToMap -> DEBU 2ef Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-05-20 18:19:46.134 UTC [common.configtx] addToMap -> DEBU 2f0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f1 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f2 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f3 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:46.135 UTC [common.configtx] addToMap -> DEBU 2f5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:46.138 UTC [common.configtx] addToMap -> DEBU 2f6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2f7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2f8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2f9 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fa Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fb Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fc Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fd Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:46.139 UTC [common.configtx] addToMap -> DEBU 2fe Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 2ff Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 300 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 301 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 302 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 303 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 304 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 305 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 306 Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 307 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:46.140 UTC [common.configtx] addToMap -> DEBU 308 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 309 As expected, current configuration has policy '/Channel/Readers'" +"2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 30a As expected, current configuration has policy '/Channel/Writers'" +"2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30b Manager Channel looking up path [Application]" +"2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30c Manager Channel has managers Consortiums" +"2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30d Manager Channel has managers Orderer" +"2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30e Manager Channel looking up path [Orderer]" +"2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 30f Manager Channel has managers Consortiums" +"2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 310 Manager Channel has managers Orderer" +"2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 311 Manager Channel/Orderer looking up path []" +"2020-05-20 18:19:46.140 UTC [policies] Manager -> DEBU 312 Manager Channel/Orderer has managers OrdererOrg" +"2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 313 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 314 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 315 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-05-20 18:19:46.140 UTC [common.channelconfig] LogSanityChecks -> DEBU 316 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-05-20 18:19:46.141 UTC [common.capabilities] Supported -> DEBU 317 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:19:46.141 UTC [common.capabilities] Supported -> DEBU 318 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:19:46.141 UTC [orderer.common.server] func1 -> DEBU 319 Executing callback to update root CAs" +"2020-05-20 18:19:46.141 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31a updating root CAs for channel [testchainid]" +"2020-05-20 18:19:46.141 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31b adding orderer root CAs for MSP [OrdererMSP]" +"2020-05-20 18:19:46.141 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31c adding app root CAs for MSP [Org1MSP]" +"2020-05-20 18:19:46.141 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31d adding app root CAs for MSP [Org2MSP]" +"2020-05-20 18:19:46.141 UTC [fsblkstorage] Next -> DEBU 31e Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-05-20 18:19:46.141 UTC [fsblkstorage] newBlockfileStream -> DEBU 31f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:19:46.141 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 320 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-05-20 18:19:46.141 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 321 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:19:46.141 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 322 blockbytes [22927] read from file [0]" +"2020-05-20 18:19:46.141 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 323 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2020-05-20 18:19:46.141 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 324 EvictionSuspicion not set, defaulting to 10m0s" +"2020-05-20 18:19:46.142 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 325 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2020-05-20 18:19:46.142 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 326 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2020-05-20 18:19:46.162 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 327 Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2020-05-20 18:19:46.163 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 328 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2020-05-20 18:19:46.163 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 329 Appending 0 entries to memory storage" channel=testchainid node=1 +"2020-05-20 18:19:46.163 UTC [fsblkstorage] Next -> DEBU 32a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] newBlockfileStream -> DEBU 32b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32c Remaining bytes=[22930], Going to peek [8] bytes" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32d Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32e blockbytes [22927] read from file [0]" +"2020-05-20 18:19:46.163 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 32f [channel: testchainid] Done creating channel support resources" +"2020-05-20 18:19:46.163 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 330 Creating system channel msg processor for channel testchainid" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] Next -> DEBU 331 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] newBlockfileStream -> DEBU 332 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 333 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 334 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:19:46.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 335 blockbytes [22927] read from file [0]" +"2020-05-20 18:19:46.164 UTC [orderer.commmon.multichannel] Initialize -> INFO 336 Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +"2020-05-20 18:19:46.164 UTC [orderer.consensus.etcdraft] Start -> INFO 337 Starting Raft node" channel=testchainid node=1 +"2020-05-20 18:19:46.164 UTC [orderer.common.cluster] Configure -> INFO 338 Entering, channel: testchainid, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +]" +"2020-05-20 18:19:46.164 UTC [orderer.common.cluster] updateStubInMapping -> INFO 339 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2020-05-20 18:19:46.165 UTC [orderer.common.cluster] updateStubInMapping -> INFO 33a Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2020-05-20 18:19:46.166 UTC [orderer.common.cluster] func1 -> DEBU 33b Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + for channel testchainid" +"2020-05-20 18:19:46.169 UTC [grpc] DialContext -> DEBU 33c parsed scheme: """ +"2020-05-20 18:19:46.170 UTC [grpc] DialContext -> DEBU 33d scheme "" not registered, fallback to default scheme" +"2020-05-20 18:19:46.171 UTC [grpc] watcher -> DEBU 33e ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2020-05-20 18:19:46.172 UTC [grpc] switchBalancer -> DEBU 33f ClientConn switching balancer to "pick_first"" +"2020-05-20 18:19:46.172 UTC [grpc] HandleSubConnStateChange -> DEBU 340 pickfirstBalancer: HandleSubConnStateChange: 0xc000282220, CONNECTING" +"2020-05-20 18:19:46.173 UTC [orderer.common.cluster] updateStubInMapping -> INFO 341 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2020-05-20 18:19:46.173 UTC [orderer.common.cluster] updateStubInMapping -> INFO 342 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2020-05-20 18:19:46.174 UTC [orderer.common.cluster] func1 -> DEBU 343 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- + for channel testchainid" +"2020-05-20 18:19:46.174 UTC [grpc] DialContext -> DEBU 344 parsed scheme: """ +"2020-05-20 18:19:46.174 UTC [grpc] DialContext -> DEBU 345 scheme "" not registered, fallback to default scheme" +"2020-05-20 18:19:46.175 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 346 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2020-05-20 18:19:46.175 UTC [grpc] watcher -> DEBU 347 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2020-05-20 18:19:46.175 UTC [grpc] switchBalancer -> DEBU 348 ClientConn switching balancer to "pick_first"" +"2020-05-20 18:19:46.175 UTC [grpc] HandleSubConnStateChange -> DEBU 349 pickfirstBalancer: HandleSubConnStateChange: 0xc000282720, CONNECTING" +"2020-05-20 18:19:46.175 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 34a 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2020-05-20 18:19:46.176 UTC [orderer.common.cluster] Configure -> INFO 34b Exiting" +"2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] start -> DEBU 34c Starting raft node: #peers: 3" channel=testchainid node=1 +"2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] start -> INFO 34d Starting raft node as part of a new channel" channel=testchainid node=1 +"2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 34e 1 became follower at term 0" channel=testchainid node=1 +"2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] newRaft -> INFO 34f newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2020-05-20 18:19:46.176 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 350 1 became follower at term 1" channel=testchainid node=1 +"2020-05-20 18:19:46.177 UTC [orderer.common.server] Start -> INFO 351 Starting orderer: + Version: 1.4.7 + Commit SHA: development build + Go version: go1.13.11 + OS/Arch: linux/amd64" +"2020-05-20 18:19:46.177 UTC [orderer.common.server] Start -> INFO 352 Starting cluster listener on [::]:7055" +"2020-05-20 18:19:46.177 UTC [orderer.common.server] Start -> INFO 353 Beginning to serve requests" +"2020-05-20 18:19:46.178 UTC [orderer.consensus.etcdraft] apply -> INFO 354 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-05-20 18:19:46.178 UTC [orderer.consensus.etcdraft] apply -> INFO 355 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-05-20 18:19:46.178 UTC [orderer.consensus.etcdraft] apply -> INFO 356 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-05-20 18:19:46.199 UTC [grpc] HandleSubConnStateChange -> DEBU 357 pickfirstBalancer: HandleSubConnStateChange: 0xc000282720, READY" +"2020-05-20 18:19:46.199 UTC [grpc] HandleSubConnStateChange -> DEBU 358 pickfirstBalancer: HandleSubConnStateChange: 0xc000282220, READY" +"2020-05-20 18:19:46.969 UTC [orderer.common.cluster] Step -> DEBU 359 Connection from orderer2.example.com(172.18.0.3:44052)" +"2020-05-20 18:19:46.969 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:46.969 UTC [orderer.consensus.etcdraft] Step -> INFO 35b 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +"2020-05-20 18:19:46.970 UTC [orderer.common.cluster] NewStream -> DEBU 35c Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2020-05-20 18:19:46.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35d Sending msg of 28 bytes to 3 on channel testchainid took 68.4µs" +"2020-05-20 18:19:46.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80µs " +"2020-05-20 18:19:46.972 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:46.972 UTC [orderer.consensus.etcdraft] Step -> INFO 360 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2020-05-20 18:19:46.972 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 361 1 became follower at term 2" channel=testchainid node=1 +"2020-05-20 18:19:46.972 UTC [orderer.consensus.etcdraft] Step -> INFO 362 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +"2020-05-20 18:19:46.973 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 363 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-05-20 18:19:46.973 UTC [orderer.common.cluster.step] sendMessage -> DEBU 364 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.2µs " +"2020-05-20 18:19:46.977 UTC [orderer.common.cluster.step] handleMessage -> DEBU 365 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 36" +"2020-05-20 18:19:46.977 UTC [orderer.consensus.etcdraft] run -> INFO 366 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2020-05-20 18:19:46.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 367 Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" +"2020-05-20 18:19:46.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU 368 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.3µs " +"2020-05-20 18:19:46.978 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 369 Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2020-05-20 18:19:46.981 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:46.982 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36b Sending msg of 28 bytes to 3 on channel testchainid took 75.6µs" +"2020-05-20 18:19:46.982 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.2µs " +"2020-05-20 18:19:47.466 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:47.466 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36e Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-05-20 18:19:47.467 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.3µs " +"2020-05-20 18:19:47.965 UTC [orderer.common.cluster.step] handleMessage -> DEBU 370 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:47.965 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 371 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2020-05-20 18:19:47.966 UTC [orderer.common.cluster.step] sendMessage -> DEBU 372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +"2020-05-20 18:19:48.465 UTC [orderer.common.cluster.step] handleMessage -> DEBU 373 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:48.465 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 374 Sending msg of 28 bytes to 3 on channel testchainid took 573µs" +"2020-05-20 18:19:48.466 UTC [orderer.common.cluster.step] sendMessage -> DEBU 375 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.4µs " +"2020-05-20 18:19:48.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 376 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:48.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 377 Sending msg of 28 bytes to 3 on channel testchainid took 50.7µs" +"2020-05-20 18:19:48.961 UTC [orderer.common.cluster.step] sendMessage -> DEBU 378 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.1µs " +"2020-05-20 18:19:49.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU 379 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:49.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37a Sending msg of 28 bytes to 3 on channel testchainid took 11.8µs" +"2020-05-20 18:19:49.461 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.5µs " +"2020-05-20 18:19:49.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:49.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37d Sending msg of 28 bytes to 3 on channel testchainid took 100.8µs" +"2020-05-20 18:19:49.961 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +"2020-05-20 18:19:50.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:50.461 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 380 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +"2020-05-20 18:19:50.461 UTC [orderer.common.cluster.step] sendMessage -> DEBU 381 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.2µs " +"2020-05-20 18:19:50.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 382 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:50.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 383 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2020-05-20 18:19:50.962 UTC [orderer.common.cluster.step] sendMessage -> DEBU 384 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.7µs " +"2020-05-20 18:19:51.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 385 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:51.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 386 Sending msg of 28 bytes to 3 on channel testchainid took 934.4µs" +"2020-05-20 18:19:51.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU 387 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 885.3µs " +"2020-05-20 18:19:51.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 388 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:51.964 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 389 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-05-20 18:19:51.965 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2511ms " +"2020-05-20 18:19:52.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:52.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38c Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2020-05-20 18:19:52.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 342.9µs " +"2020-05-20 18:19:52.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:52.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38f Sending msg of 28 bytes to 3 on channel testchainid took 35.5µs" +"2020-05-20 18:19:52.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 390 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.5µs " +"2020-05-20 18:19:53.468 UTC [orderer.common.cluster.step] handleMessage -> DEBU 391 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:53.468 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 392 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2020-05-20 18:19:53.469 UTC [orderer.common.cluster.step] sendMessage -> DEBU 393 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.2µs " +"2020-05-20 18:19:53.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 394 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:53.964 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 395 Sending msg of 28 bytes to 3 on channel testchainid took 94.7µs" +"2020-05-20 18:19:53.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 396 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 665.6µs " +"2020-05-20 18:19:54.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU 397 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:54.462 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 398 Sending msg of 28 bytes to 3 on channel testchainid took 592.4µs" +"2020-05-20 18:19:54.463 UTC [orderer.common.cluster.step] sendMessage -> DEBU 399 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171.8µs " +"2020-05-20 18:19:54.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:54.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39b Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +"2020-05-20 18:19:54.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.9µs " +"2020-05-20 18:19:55.463 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:55.465 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39e Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +"2020-05-20 18:19:55.465 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 225.2µs " +"2020-05-20 18:19:55.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:55.962 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a1 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2020-05-20 18:19:55.963 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 739.4µs " +"2020-05-20 18:19:56.082 UTC [orderer.common.server] replicateDisabledChains -> DEBU 3a3 No inactive chains to try to replicate" +"2020-05-20 18:19:56.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:56.463 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a5 Sending msg of 28 bytes to 3 on channel testchainid took 99.2µs" +"2020-05-20 18:19:56.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 542.2µs " +"2020-05-20 18:19:56.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:56.962 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a8 Sending msg of 28 bytes to 3 on channel testchainid took 35.4µs" +"2020-05-20 18:19:56.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.527ms " +"2020-05-20 18:19:57.461 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3aa Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:57.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 401.6µs " +"2020-05-20 18:19:57.463 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3ac Sending msg of 28 bytes to 3 on channel testchainid took 136.5µs" +"2020-05-20 18:19:57.710 UTC [orderer.common.server] Deliver -> DEBU 3ad Starting new Deliver handler" +"2020-05-20 18:19:57.710 UTC [common.deliver] Handle -> DEBU 3ae Starting new deliver loop for 172.18.0.9:53410" +"2020-05-20 18:19:57.710 UTC [common.deliver] Handle -> DEBU 3af Attempting to read seek info message from 172.18.0.9:53410" +"2020-05-20 18:19:57.738 UTC [orderer.common.server] Broadcast -> DEBU 3b0 Starting new Broadcast handler" +"2020-05-20 18:19:57.738 UTC [orderer.common.broadcast] Handle -> DEBU 3b1 Starting new broadcast loop for 172.18.0.9:53412" +"2020-05-20 18:19:57.744 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 3b2 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:53412" +"2020-05-20 18:19:57.744 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3b3 Processing config update tx with system channel message processor for channel ID businesschannel" +"2020-05-20 18:19:57.744 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3b4 Processing channel create tx for channel businesschannel on system channel testchainid" +"2020-05-20 18:19:57.745 UTC [common.channelconfig] NewStandardValues -> DEBU 3b5 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:57.745 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b6 Processing field: HashingAlgorithm" +"2020-05-20 18:19:57.745 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b7 Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:57.745 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b8 Processing field: OrdererAddresses" +"2020-05-20 18:19:57.746 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b9 Processing field: Consortium" +"2020-05-20 18:19:57.746 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ba Processing field: Capabilities" +"2020-05-20 18:19:57.747 UTC [common.channelconfig] NewStandardValues -> DEBU 3bb Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:57.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bc Processing field: ConsensusType" +"2020-05-20 18:19:57.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bd Processing field: BatchSize" +"2020-05-20 18:19:57.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3be Processing field: BatchTimeout" +"2020-05-20 18:19:57.747 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bf Processing field: KafkaBrokers" +"2020-05-20 18:19:57.748 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c0 Processing field: ChannelRestrictions" +"2020-05-20 18:19:57.748 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c1 Processing field: Capabilities" +"2020-05-20 18:19:57.749 UTC [common.channelconfig] NewStandardValues -> DEBU 3c2 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:57.749 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c3 Processing field: Endpoints" +"2020-05-20 18:19:57.749 UTC [common.channelconfig] NewStandardValues -> DEBU 3c4 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.749 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c5 Processing field: MSP" +"2020-05-20 18:19:57.750 UTC [common.channelconfig] validateMSP -> DEBU 3c6 Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:57.750 UTC [msp] newBccspMsp -> DEBU 3c7 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.750 UTC [msp] New -> DEBU 3c8 Creating Cache-MSP instance" +"2020-05-20 18:19:57.751 UTC [msp] Setup -> DEBU 3c9 Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:57.751 UTC [msp.identity] newIdentity -> DEBU 3ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.752 UTC [common.channelconfig] NewStandardValues -> DEBU 3cb Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:19:57.752 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cc Processing field: ACLs" +"2020-05-20 18:19:57.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cd Processing field: Capabilities" +"2020-05-20 18:19:57.753 UTC [common.channelconfig] NewStandardValues -> DEBU 3ce Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:19:57.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cf Processing field: AnchorPeers" +"2020-05-20 18:19:57.753 UTC [common.channelconfig] NewStandardValues -> DEBU 3d0 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.753 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d1 Processing field: MSP" +"2020-05-20 18:19:57.753 UTC [common.channelconfig] Validate -> DEBU 3d2 Anchor peers for org Org2MSP are " +"2020-05-20 18:19:57.754 UTC [common.channelconfig] validateMSP -> DEBU 3d3 Setting up MSP for org Org2MSP" +"2020-05-20 18:19:57.754 UTC [msp] newBccspMsp -> DEBU 3d4 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.754 UTC [msp] New -> DEBU 3d5 Creating Cache-MSP instance" +"2020-05-20 18:19:57.754 UTC [msp] Setup -> DEBU 3d6 Setting up MSP instance Org2MSP" +"2020-05-20 18:19:57.755 UTC [msp.identity] newIdentity -> DEBU 3d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.755 UTC [common.channelconfig] NewStandardValues -> DEBU 3d8 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:19:57.755 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d9 Processing field: AnchorPeers" +"2020-05-20 18:19:57.756 UTC [common.channelconfig] NewStandardValues -> DEBU 3da Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.756 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3db Processing field: MSP" +"2020-05-20 18:19:57.756 UTC [common.channelconfig] Validate -> DEBU 3dc Anchor peers for org Org1MSP are " +"2020-05-20 18:19:57.756 UTC [common.channelconfig] validateMSP -> DEBU 3dd Setting up MSP for org Org1MSP" +"2020-05-20 18:19:57.756 UTC [msp] newBccspMsp -> DEBU 3de Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.757 UTC [msp] New -> DEBU 3df Creating Cache-MSP instance" +"2020-05-20 18:19:57.757 UTC [msp] Setup -> DEBU 3e0 Setting up MSP instance Org1MSP" +"2020-05-20 18:19:57.757 UTC [msp.identity] newIdentity -> DEBU 3e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.759 UTC [msp] Setup -> DEBU 3e2 Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:57.759 UTC [msp] Setup -> DEBU 3e3 MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:57.759 UTC [policies] NewManagerImpl -> DEBU 3e4 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.760 UTC [policies] NewManagerImpl -> DEBU 3e5 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.760 UTC [policies] NewManagerImpl -> DEBU 3e6 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.760 UTC [policies] NewManagerImpl -> DEBU 3e7 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3e8 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3e9 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3ea Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3eb Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3ec Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3ed Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.761 UTC [policies] NewManagerImpl -> DEBU 3ee Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3ef Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f0 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f1 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f2 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f3 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2020-05-20 18:19:57.762 UTC [policies] GetPolicy -> DEBU 3f4 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2020-05-20 18:19:57.762 UTC [policies] NewManagerImpl -> DEBU 3f5 Proposed new policy Writers for Channel" +"2020-05-20 18:19:57.763 UTC [policies] GetPolicy -> DEBU 3f6 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2020-05-20 18:19:57.763 UTC [policies] NewManagerImpl -> DEBU 3f7 Proposed new policy Admins for Channel" +"2020-05-20 18:19:57.763 UTC [policies] GetPolicy -> DEBU 3f8 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2020-05-20 18:19:57.764 UTC [policies] NewManagerImpl -> DEBU 3f9 Proposed new policy Readers for Channel" +"2020-05-20 18:19:57.764 UTC [common.configtx] addToMap -> DEBU 3fa Adding to config map: [Group] /Channel" +"2020-05-20 18:19:57.764 UTC [common.configtx] addToMap -> DEBU 3fb Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:57.765 UTC [common.configtx] addToMap -> DEBU 3fc Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.765 UTC [common.configtx] addToMap -> DEBU 3fd Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:57.765 UTC [common.configtx] addToMap -> DEBU 3fe Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:57.765 UTC [common.configtx] addToMap -> DEBU 3ff Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 400 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 401 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 402 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 403 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 404 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 405 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 406 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 407 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:57.766 UTC [common.configtx] addToMap -> DEBU 408 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 409 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 40a Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 40b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 40c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:19:57.767 UTC [common.configtx] addToMap -> DEBU 40d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 40e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 40f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 410 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 411 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 412 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 413 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:19:57.768 UTC [common.configtx] addToMap -> DEBU 414 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:19:57.769 UTC [common.configtx] addToMap -> DEBU 415 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:19:57.769 UTC [common.configtx] addToMap -> DEBU 416 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:19:57.769 UTC [common.configtx] addToMap -> DEBU 417 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2020-05-20 18:19:57.770 UTC [common.configtx] addToMap -> DEBU 418 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:57.771 UTC [common.configtx] addToMap -> DEBU 419 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:57.771 UTC [common.configtx] addToMap -> DEBU 41a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:57.772 UTC [common.configtx] addToMap -> DEBU 41b Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:19:57.775 UTC [common.configtx] addToMap -> DEBU 41c Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:57.775 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:57.775 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:57.775 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Group] /Channel" +"2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:19:57.776 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Group] /Channel" +"2020-05-20 18:19:57.777 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:19:57.777 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:19:57.777 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:19:57.777 UTC [common.configtx] addToMap -> DEBU 429 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42a Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42b Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42c Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:19:57.778 UTC [common.configtx] addToMap -> DEBU 42e Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:19:57.779 UTC [common.configtx] addToMap -> DEBU 42f Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:19:57.779 UTC [common.configtx] addToMap -> DEBU 430 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:19:57.780 UTC [common.configtx] verifyDeltaSet -> DEBU 431 Processing change to key: [Group] /Channel/Application" +"2020-05-20 18:19:57.780 UTC [common.configtx] policyForItem -> DEBU 432 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2020-05-20 18:19:57.780 UTC [policies] Manager -> DEBU 433 Manager Channel looking up path []" +"2020-05-20 18:19:57.780 UTC [policies] Manager -> DEBU 434 Manager Channel has managers Application" +"2020-05-20 18:19:57.780 UTC [policies] Manager -> DEBU 435 Manager Channel has managers Orderer" +"2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 436 Manager Channel looking up path [Application]" +"2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 437 Manager Channel has managers Orderer" +"2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 438 Manager Channel has managers Application" +"2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 439 Manager Channel/Application looking up path []" +"2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 43a Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:19:57.781 UTC [policies] Manager -> DEBU 43b Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:19:57.781 UTC [policies] Evaluate -> DEBU 43c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2020-05-20 18:19:57.781 UTC [policies] Evaluate -> DEBU 43d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:19:57.781 UTC [policies] Evaluate -> DEBU 43e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-05-20 18:19:57.781 UTC [msp] DeserializeIdentity -> DEBU 43f Obtaining identity" +"2020-05-20 18:19:57.782 UTC [msp.identity] newIdentity -> DEBU 440 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.782 UTC [cauthdsl] func1 -> DEBU 441 0xc000570a50 gate 1589998797782655600 evaluation starts" +"2020-05-20 18:19:57.782 UTC [cauthdsl] func2 -> DEBU 442 0xc000570a50 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:19:57.782 UTC [cauthdsl] func2 -> DEBU 443 0xc000570a50 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:19:57.782 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 444 Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-05-20 18:19:57.782 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 445 Checking if identity carries the admin ou for Org1MSP" +"2020-05-20 18:19:57.782 UTC [msp] Validate -> DEBU 446 MSP Org1MSP validating identity" +"2020-05-20 18:19:57.783 UTC [msp] getCertificationChain -> DEBU 447 MSP Org1MSP getting certification chain" +"2020-05-20 18:19:57.783 UTC [msp] hasOURole -> DEBU 448 MSP Org1MSP checking if the identity is a client" +"2020-05-20 18:19:57.783 UTC [msp] getCertificationChain -> DEBU 449 MSP Org1MSP getting certification chain" +"2020-05-20 18:19:57.784 UTC [cauthdsl] func2 -> DEBU 44a 0xc000570a50 principal matched by identity 0" +"2020-05-20 18:19:57.784 UTC [msp.identity] Verify -> DEBU 44b Verify: digest = 00000000 a9 37 8b cd a3 3d 52 8a 05 e3 c2 73 6a be cb ae |.7...=R....sj...| +00000010 37 24 4f dc a7 54 65 45 5a 6f 5f 5d 12 d6 03 ec |7$O..TeEZo_]....|" +"2020-05-20 18:19:57.784 UTC [msp.identity] Verify -> DEBU 44c Verify: sig = 00000000 30 45 02 21 00 89 08 e9 47 23 b2 b1 53 9a 62 df |0E.!....G#..S.b.| +00000010 cd 53 5a bc 46 67 c4 e8 d7 18 d5 4f 96 60 53 b3 |.SZ.Fg.....O.`S.| +00000020 5b 33 1a 2b e3 02 20 72 7d d7 cf 99 12 b6 1e 2f |[3.+.. r}....../| +00000030 85 95 3e e9 5e cd d0 36 f2 03 e8 1c f1 e6 10 46 |..>.^..6.......F| +00000040 a3 43 27 63 8a 09 48 |.C'c..H|" +"2020-05-20 18:19:57.785 UTC [cauthdsl] func2 -> DEBU 44d 0xc000570a50 principal evaluation succeeds for identity 0" +"2020-05-20 18:19:57.785 UTC [cauthdsl] func1 -> DEBU 44e 0xc000570a50 gate 1589998797782655600 evaluation succeeds" +"2020-05-20 18:19:57.785 UTC [policies] Evaluate -> DEBU 44f Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:19:57.785 UTC [policies] Evaluate -> DEBU 450 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:19:57.785 UTC [policies] Evaluate -> DEBU 451 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2020-05-20 18:19:57.786 UTC [policies] Evaluate -> DEBU 452 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 453 Processing change to key: [Value] /Channel/Application/ACLs" +"2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 454 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 455 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 456 Processing change to key: [Policy] /Channel/Application/Readers" +"2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 457 Processing change to key: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 458 Processing change to key: [Policy] /Channel/Application/Writers" +"2020-05-20 18:19:57.786 UTC [common.configtx] verifyDeltaSet -> DEBU 459 Processing change to key: [Policy] /Channel/Application/Admins" +"2020-05-20 18:19:57.787 UTC [common.configtx] recurseConfigMap -> DEBU 45a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.788 UTC [common.configtx] recurseConfigMap -> DEBU 45b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.788 UTC [common.configtx] recurseConfigMap -> DEBU 45c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 45d Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 45e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.790 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 464 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 465 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 466 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 467 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 468 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 469 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.791 UTC [common.configtx] recurseConfigMap -> DEBU 46a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46b Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 46f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.792 UTC [common.configtx] recurseConfigMap -> DEBU 470 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.792 UTC [msp] GetDefaultSigningIdentity -> DEBU 471 Obtaining default signing identity" +"2020-05-20 18:19:57.793 UTC [msp] GetDefaultSigningIdentity -> DEBU 472 Obtaining default signing identity" +"2020-05-20 18:19:57.793 UTC [msp.identity] Sign -> DEBU 473 Sign: plaintext: 0AEA060A1B08011A0608CDE995F60522...D6653D24DB1C5D65D2EE19D93B8A0BAC " +"2020-05-20 18:19:57.793 UTC [msp.identity] Sign -> DEBU 474 Sign: digest: 0B78DF95544E2920B9159E55D4CC8F0029582A8F7ACC9B47EB1D7483493DBB87 " +"2020-05-20 18:19:57.794 UTC [msp] GetDefaultSigningIdentity -> DEBU 475 Obtaining default signing identity" +"2020-05-20 18:19:57.794 UTC [msp] GetDefaultSigningIdentity -> DEBU 476 Obtaining default signing identity" +"2020-05-20 18:19:57.795 UTC [msp.identity] Sign -> DEBU 477 Sign: plaintext: 0AE6060A1708041A0608CDE995F60522...3ACC9B789F0D8B0ACD226ADD58A684DF " +"2020-05-20 18:19:57.795 UTC [msp.identity] Sign -> DEBU 478 Sign: digest: B5A5A75BB4D562F255D95B59050CEA3B0CB3AF1E6CF4780D0A742421194E37AB " +"2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 479 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 47a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 47b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 47c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:19:57.796 UTC [policies] Evaluate -> DEBU 47d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:19:57.796 UTC [msp] DeserializeIdentity -> DEBU 47e Obtaining identity" +"2020-05-20 18:19:57.797 UTC [msp.identity] newIdentity -> DEBU 47f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.798 UTC [cauthdsl] func1 -> DEBU 480 0xc000cbaa50 gate 1589998797798145800 evaluation starts" +"2020-05-20 18:19:57.798 UTC [cauthdsl] func2 -> DEBU 481 0xc000cbaa50 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:19:57.798 UTC [cauthdsl] func2 -> DEBU 482 0xc000cbaa50 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:19:57.798 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 483 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-05-20 18:19:57.798 UTC [msp] Validate -> DEBU 484 MSP OrdererMSP validating identity" +"2020-05-20 18:19:57.799 UTC [msp] getCertificationChain -> DEBU 485 MSP OrdererMSP getting certification chain" +"2020-05-20 18:19:57.799 UTC [cauthdsl] func2 -> DEBU 486 0xc000cbaa50 principal matched by identity 0" +"2020-05-20 18:19:57.799 UTC [msp.identity] Verify -> DEBU 487 Verify: digest = 00000000 b5 a5 a7 5b b4 d5 62 f2 55 d9 5b 59 05 0c ea 3b |...[..b.U.[Y...;| +00000010 0c b3 af 1e 6c f4 78 0d 0a 74 24 21 19 4e 37 ab |....l.x..t$!.N7.|" +"2020-05-20 18:19:57.799 UTC [msp.identity] Verify -> DEBU 488 Verify: sig = 00000000 30 45 02 21 00 fe 49 cf a6 97 2c a9 ea d7 02 a7 |0E.!..I...,.....| +00000010 68 22 da 91 db 47 c0 57 bb bb 0c 00 2d b0 10 eb |h"...G.W....-...| +00000020 e5 8a c3 ed 0e 02 20 5d b7 28 d1 38 0e 85 c8 4b |...... ].(.8...K| +00000030 b9 84 08 2b 0d 17 fb 22 0b a8 81 95 52 06 3c d8 |...+..."....R.<.| +00000040 99 bd d5 69 55 54 bc |...iUT.|" +"2020-05-20 18:19:57.800 UTC [cauthdsl] func2 -> DEBU 489 0xc000cbaa50 principal evaluation succeeds for identity 0" +"2020-05-20 18:19:57.800 UTC [cauthdsl] func1 -> DEBU 48a 0xc000cbaa50 gate 1589998797798145800 evaluation succeeds" +"2020-05-20 18:19:57.800 UTC [policies] Evaluate -> DEBU 48b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:57.800 UTC [policies] Evaluate -> DEBU 48c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:57.800 UTC [policies] Evaluate -> DEBU 48d Signature set satisfies policy /Channel/Orderer/Writers" +"2020-05-20 18:19:57.800 UTC [policies] Evaluate -> DEBU 48e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:19:57.801 UTC [policies] Evaluate -> DEBU 48f Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:19:57.801 UTC [policies] Evaluate -> DEBU 490 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:19:57.801 UTC [common.channelconfig] NewStandardValues -> DEBU 491 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 492 Processing field: HashingAlgorithm" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 493 Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 494 Processing field: OrdererAddresses" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 495 Processing field: Consortium" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 496 Processing field: Capabilities" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] NewStandardValues -> DEBU 497 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 498 Processing field: ConsensusType" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 499 Processing field: BatchSize" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49a Processing field: BatchTimeout" +"2020-05-20 18:19:57.802 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49b Processing field: KafkaBrokers" +"2020-05-20 18:19:57.803 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49c Processing field: ChannelRestrictions" +"2020-05-20 18:19:57.803 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49d Processing field: Capabilities" +"2020-05-20 18:19:57.804 UTC [common.channelconfig] NewStandardValues -> DEBU 49e Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:57.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49f Processing field: Endpoints" +"2020-05-20 18:19:57.804 UTC [common.channelconfig] NewStandardValues -> DEBU 4a0 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a1 Processing field: MSP" +"2020-05-20 18:19:57.804 UTC [common.channelconfig] validateMSP -> DEBU 4a2 Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:57.804 UTC [msp] newBccspMsp -> DEBU 4a3 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.804 UTC [msp] New -> DEBU 4a4 Creating Cache-MSP instance" +"2020-05-20 18:19:57.805 UTC [msp] Setup -> DEBU 4a5 Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:57.805 UTC [msp.identity] newIdentity -> DEBU 4a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.806 UTC [common.channelconfig] NewStandardValues -> DEBU 4a7 Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:19:57.806 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a8 Processing field: ACLs" +"2020-05-20 18:19:57.806 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a9 Processing field: Capabilities" +"2020-05-20 18:19:57.807 UTC [common.channelconfig] NewStandardValues -> DEBU 4aa Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:19:57.807 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ab Processing field: AnchorPeers" +"2020-05-20 18:19:57.807 UTC [common.channelconfig] NewStandardValues -> DEBU 4ac Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.807 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ad Processing field: MSP" +"2020-05-20 18:19:57.807 UTC [common.channelconfig] Validate -> DEBU 4ae Anchor peers for org Org2MSP are " +"2020-05-20 18:19:57.807 UTC [common.channelconfig] validateMSP -> DEBU 4af Setting up MSP for org Org2MSP" +"2020-05-20 18:19:57.807 UTC [msp] newBccspMsp -> DEBU 4b0 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.807 UTC [msp] New -> DEBU 4b1 Creating Cache-MSP instance" +"2020-05-20 18:19:57.807 UTC [msp] Setup -> DEBU 4b2 Setting up MSP instance Org2MSP" +"2020-05-20 18:19:57.808 UTC [msp.identity] newIdentity -> DEBU 4b3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.809 UTC [common.channelconfig] NewStandardValues -> DEBU 4b4 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:19:57.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b5 Processing field: AnchorPeers" +"2020-05-20 18:19:57.809 UTC [common.channelconfig] NewStandardValues -> DEBU 4b6 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b7 Processing field: MSP" +"2020-05-20 18:19:57.809 UTC [common.channelconfig] Validate -> DEBU 4b8 Anchor peers for org Org1MSP are " +"2020-05-20 18:19:57.809 UTC [common.channelconfig] validateMSP -> DEBU 4b9 Setting up MSP for org Org1MSP" +"2020-05-20 18:19:57.810 UTC [msp] newBccspMsp -> DEBU 4ba Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.810 UTC [msp] New -> DEBU 4bb Creating Cache-MSP instance" +"2020-05-20 18:19:57.810 UTC [msp] Setup -> DEBU 4bc Setting up MSP instance Org1MSP" +"2020-05-20 18:19:57.811 UTC [msp.identity] newIdentity -> DEBU 4bd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.811 UTC [msp] Setup -> DEBU 4be Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:57.811 UTC [msp] Setup -> DEBU 4bf MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:57.811 UTC [policies] NewManagerImpl -> DEBU 4c0 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c1 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c3 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c4 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c5 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:57.812 UTC [policies] NewManagerImpl -> DEBU 4c6 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4c7 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4c8 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4c9 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4ca Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4cb Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4cc Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4cd Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4ce Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4cf Proposed new policy ChannelCreationPolicy for Channel/Application" +"2020-05-20 18:19:57.813 UTC [policies] GetPolicy -> DEBU 4d0 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2020-05-20 18:19:57.813 UTC [policies] NewManagerImpl -> DEBU 4d1 Proposed new policy Admins for Channel" +"2020-05-20 18:19:57.813 UTC [policies] GetPolicy -> DEBU 4d2 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2020-05-20 18:19:57.814 UTC [policies] NewManagerImpl -> DEBU 4d3 Proposed new policy Readers for Channel" +"2020-05-20 18:19:57.814 UTC [policies] GetPolicy -> DEBU 4d4 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2020-05-20 18:19:57.814 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel" +"2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4d6 Adding to config map: [Group] /Channel" +"2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4d7 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4d8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4d9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:57.814 UTC [common.configtx] addToMap -> DEBU 4da Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4db Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4dc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4dd Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4de Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4df Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4e0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4e1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:57.815 UTC [common.configtx] addToMap -> DEBU 4e2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e3 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e4 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e5 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e6 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:19:57.816 UTC [common.configtx] addToMap -> DEBU 4e9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ea Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:57.817 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Group] /Channel" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:19:57.818 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Group] /Channel" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:19:57.819 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:19:57.820 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:19:57.820 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:19:57.820 UTC [common.configtx] addToMap -> DEBU 50b Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:19:57.820 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:19:57.820 UTC [common.configtx] verifyDeltaSet -> DEBU 50d Processing change to key: [Group] /Channel/Application" +"2020-05-20 18:19:57.821 UTC [common.configtx] policyForItem -> DEBU 50e Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2020-05-20 18:19:57.821 UTC [policies] Manager -> DEBU 50f Manager Channel looking up path []" +"2020-05-20 18:19:57.821 UTC [policies] Manager -> DEBU 510 Manager Channel has managers Orderer" +"2020-05-20 18:19:57.821 UTC [policies] Manager -> DEBU 511 Manager Channel has managers Application" +"2020-05-20 18:19:57.821 UTC [policies] Manager -> DEBU 512 Manager Channel looking up path [Application]" +"2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 513 Manager Channel has managers Application" +"2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 514 Manager Channel has managers Orderer" +"2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 515 Manager Channel/Application looking up path []" +"2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 516 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:19:57.822 UTC [policies] Manager -> DEBU 517 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:19:57.822 UTC [policies] Evaluate -> DEBU 518 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2020-05-20 18:19:57.822 UTC [policies] Evaluate -> DEBU 519 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:19:57.822 UTC [policies] Evaluate -> DEBU 51a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-05-20 18:19:57.822 UTC [msp] DeserializeIdentity -> DEBU 51b Obtaining identity" +"2020-05-20 18:19:57.822 UTC [msp.identity] newIdentity -> DEBU 51c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.823 UTC [cauthdsl] func1 -> DEBU 51d 0xc000daeca0 gate 1589998797823512000 evaluation starts" +"2020-05-20 18:19:57.823 UTC [cauthdsl] func2 -> DEBU 51e 0xc000daeca0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:19:57.823 UTC [cauthdsl] func2 -> DEBU 51f 0xc000daeca0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:19:57.823 UTC [cauthdsl] func2 -> DEBU 520 0xc000daeca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-05-20 18:19:57.823 UTC [cauthdsl] func2 -> DEBU 521 0xc000daeca0 principal evaluation fails" +"2020-05-20 18:19:57.823 UTC [cauthdsl] func1 -> DEBU 522 0xc000daeca0 gate 1589998797823512000 evaluation fails" +"2020-05-20 18:19:57.823 UTC [policies] Evaluate -> DEBU 523 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:19:57.823 UTC [policies] Evaluate -> DEBU 524 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 525 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-05-20 18:19:57.824 UTC [cauthdsl] func1 -> DEBU 526 0xc0005bebb0 gate 1589998797824029600 evaluation starts" +"2020-05-20 18:19:57.824 UTC [cauthdsl] func2 -> DEBU 527 0xc0005bebb0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:19:57.824 UTC [cauthdsl] func2 -> DEBU 528 0xc0005bebb0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:19:57.824 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 529 Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-05-20 18:19:57.824 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 52a Checking if identity carries the admin ou for Org1MSP" +"2020-05-20 18:19:57.824 UTC [msp] Validate -> DEBU 52b MSP Org1MSP validating identity" +"2020-05-20 18:19:57.824 UTC [msp] getCertificationChain -> DEBU 52c MSP Org1MSP getting certification chain" +"2020-05-20 18:19:57.824 UTC [msp] hasOURole -> DEBU 52d MSP Org1MSP checking if the identity is a client" +"2020-05-20 18:19:57.824 UTC [msp] getCertificationChain -> DEBU 52e MSP Org1MSP getting certification chain" +"2020-05-20 18:19:57.824 UTC [cauthdsl] func2 -> DEBU 52f 0xc0005bebb0 principal matched by identity 0" +"2020-05-20 18:19:57.824 UTC [msp.identity] Verify -> DEBU 530 Verify: digest = 00000000 a9 37 8b cd a3 3d 52 8a 05 e3 c2 73 6a be cb ae |.7...=R....sj...| +00000010 37 24 4f dc a7 54 65 45 5a 6f 5f 5d 12 d6 03 ec |7$O..TeEZo_]....|" +"2020-05-20 18:19:57.824 UTC [msp.identity] Verify -> DEBU 531 Verify: sig = 00000000 30 45 02 21 00 89 08 e9 47 23 b2 b1 53 9a 62 df |0E.!....G#..S.b.| +00000010 cd 53 5a bc 46 67 c4 e8 d7 18 d5 4f 96 60 53 b3 |.SZ.Fg.....O.`S.| +00000020 5b 33 1a 2b e3 02 20 72 7d d7 cf 99 12 b6 1e 2f |[3.+.. r}....../| +00000030 85 95 3e e9 5e cd d0 36 f2 03 e8 1c f1 e6 10 46 |..>.^..6.......F| +00000040 a3 43 27 63 8a 09 48 |.C'c..H|" +"2020-05-20 18:19:57.824 UTC [cauthdsl] func2 -> DEBU 532 0xc0005bebb0 principal evaluation succeeds for identity 0" +"2020-05-20 18:19:57.824 UTC [cauthdsl] func1 -> DEBU 533 0xc0005bebb0 gate 1589998797824029600 evaluation succeeds" +"2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 534 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 535 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 536 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2020-05-20 18:19:57.824 UTC [policies] Evaluate -> DEBU 537 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2020-05-20 18:19:57.824 UTC [common.configtx] verifyDeltaSet -> DEBU 538 Processing change to key: [Value] /Channel/Application/ACLs" +"2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 539 Processing change to key: [Policy] /Channel/Application/Writers" +"2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53a Processing change to key: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53b Processing change to key: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53c Processing change to key: [Policy] /Channel/Application/Admins" +"2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53d Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:19:57.825 UTC [common.configtx] verifyDeltaSet -> DEBU 53e Processing change to key: [Policy] /Channel/Application/Readers" +"2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 53f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 540 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 541 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 542 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 543 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.825 UTC [common.configtx] recurseConfigMap -> DEBU 544 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.826 UTC [common.configtx] recurseConfigMap -> DEBU 545 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.827 UTC [common.configtx] recurseConfigMap -> DEBU 546 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.827 UTC [common.configtx] recurseConfigMap -> DEBU 547 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.827 UTC [common.configtx] recurseConfigMap -> DEBU 548 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.828 UTC [common.configtx] recurseConfigMap -> DEBU 549 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.829 UTC [common.configtx] recurseConfigMap -> DEBU 54a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.829 UTC [common.configtx] recurseConfigMap -> DEBU 54b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.830 UTC [common.configtx] recurseConfigMap -> DEBU 54c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.830 UTC [common.configtx] recurseConfigMap -> DEBU 54d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.831 UTC [common.configtx] recurseConfigMap -> DEBU 54e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.831 UTC [common.configtx] recurseConfigMap -> DEBU 54f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.831 UTC [common.configtx] recurseConfigMap -> DEBU 550 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.832 UTC [common.configtx] recurseConfigMap -> DEBU 551 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.832 UTC [common.configtx] recurseConfigMap -> DEBU 552 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.833 UTC [common.configtx] recurseConfigMap -> DEBU 553 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.833 UTC [common.configtx] recurseConfigMap -> DEBU 554 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.834 UTC [common.configtx] recurseConfigMap -> DEBU 555 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:19:57.835 UTC [common.channelconfig] NewStandardValues -> DEBU 556 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:57.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 557 Processing field: HashingAlgorithm" +"2020-05-20 18:19:57.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 558 Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:57.835 UTC [common.channelconfig] initializeProtosStruct -> DEBU 559 Processing field: OrdererAddresses" +"2020-05-20 18:19:57.836 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55a Processing field: Consortium" +"2020-05-20 18:19:57.836 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55b Processing field: Capabilities" +"2020-05-20 18:19:57.836 UTC [common.channelconfig] NewStandardValues -> DEBU 55c Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:57.837 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55d Processing field: ConsensusType" +"2020-05-20 18:19:57.837 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55e Processing field: BatchSize" +"2020-05-20 18:19:57.837 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55f Processing field: BatchTimeout" +"2020-05-20 18:19:57.837 UTC [common.channelconfig] initializeProtosStruct -> DEBU 560 Processing field: KafkaBrokers" +"2020-05-20 18:19:57.838 UTC [common.channelconfig] initializeProtosStruct -> DEBU 561 Processing field: ChannelRestrictions" +"2020-05-20 18:19:57.838 UTC [common.channelconfig] initializeProtosStruct -> DEBU 562 Processing field: Capabilities" +"2020-05-20 18:19:57.839 UTC [common.channelconfig] NewStandardValues -> DEBU 563 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:57.839 UTC [common.channelconfig] initializeProtosStruct -> DEBU 564 Processing field: Endpoints" +"2020-05-20 18:19:57.839 UTC [common.channelconfig] NewStandardValues -> DEBU 565 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.839 UTC [common.channelconfig] initializeProtosStruct -> DEBU 566 Processing field: MSP" +"2020-05-20 18:19:57.839 UTC [common.channelconfig] validateMSP -> DEBU 567 Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:57.839 UTC [msp] newBccspMsp -> DEBU 568 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.840 UTC [msp] New -> DEBU 569 Creating Cache-MSP instance" +"2020-05-20 18:19:57.840 UTC [msp] Setup -> DEBU 56a Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:57.840 UTC [msp.identity] newIdentity -> DEBU 56b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.841 UTC [common.channelconfig] NewStandardValues -> DEBU 56c Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:19:57.841 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56d Processing field: ACLs" +"2020-05-20 18:19:57.841 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56e Processing field: Capabilities" +"2020-05-20 18:19:57.842 UTC [common.channelconfig] NewStandardValues -> DEBU 56f Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:19:57.842 UTC [common.channelconfig] initializeProtosStruct -> DEBU 570 Processing field: AnchorPeers" +"2020-05-20 18:19:57.842 UTC [common.channelconfig] NewStandardValues -> DEBU 571 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.842 UTC [common.channelconfig] initializeProtosStruct -> DEBU 572 Processing field: MSP" +"2020-05-20 18:19:57.842 UTC [common.channelconfig] Validate -> DEBU 573 Anchor peers for org Org2MSP are " +"2020-05-20 18:19:57.842 UTC [common.channelconfig] validateMSP -> DEBU 574 Setting up MSP for org Org2MSP" +"2020-05-20 18:19:57.843 UTC [msp] newBccspMsp -> DEBU 575 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.843 UTC [msp] New -> DEBU 576 Creating Cache-MSP instance" +"2020-05-20 18:19:57.843 UTC [msp] Setup -> DEBU 577 Setting up MSP instance Org2MSP" +"2020-05-20 18:19:57.844 UTC [msp.identity] newIdentity -> DEBU 578 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.846 UTC [common.channelconfig] NewStandardValues -> DEBU 579 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:19:57.846 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: AnchorPeers" +"2020-05-20 18:19:57.846 UTC [common.channelconfig] NewStandardValues -> DEBU 57b Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.846 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57c Processing field: MSP" +"2020-05-20 18:19:57.846 UTC [common.channelconfig] Validate -> DEBU 57d Anchor peers for org Org1MSP are " +"2020-05-20 18:19:57.846 UTC [common.channelconfig] validateMSP -> DEBU 57e Setting up MSP for org Org1MSP" +"2020-05-20 18:19:57.846 UTC [msp] newBccspMsp -> DEBU 57f Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.847 UTC [msp] New -> DEBU 580 Creating Cache-MSP instance" +"2020-05-20 18:19:57.847 UTC [msp] Setup -> DEBU 581 Setting up MSP instance Org1MSP" +"2020-05-20 18:19:57.847 UTC [msp.identity] newIdentity -> DEBU 582 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.847 UTC [msp] Setup -> DEBU 583 Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:57.848 UTC [msp] Setup -> DEBU 584 MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:57.848 UTC [policies] NewManagerImpl -> DEBU 585 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.848 UTC [policies] NewManagerImpl -> DEBU 586 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.848 UTC [policies] NewManagerImpl -> DEBU 587 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 588 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.849 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.850 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Writers for Channel/Application" +"2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Admins for Channel/Application" +"2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Readers for Channel/Application" +"2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Writers for Channel" +"2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy Admins for Channel" +"2020-05-20 18:19:57.851 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Readers for Channel" +"2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 59c Adding to config map: [Group] /Channel" +"2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 59d Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 59e Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 59f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:19:57.852 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:19:57.853 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:19:57.854 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:57.855 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:57.856 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:57.857 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:57.857 UTC [common.capabilities] Supported -> DEBU 5c8 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:19:57.857 UTC [common.capabilities] Supported -> DEBU 5c9 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:19:57.858 UTC [orderer.common.cluster] NewStream -> DEBU 5ca Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2020-05-20 18:19:57.858 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 5cb Sending msg of 29303 bytes to 3 on channel testchainid took 91.6µs" +"2020-05-20 18:19:57.858 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 5cc [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:53412" +"2020-05-20 18:19:57.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5cd Send of SubmitRequest for channel testchainid with payload of size 29303 to orderer2.example.com(orderer2.example.com:7050) took 132µs " +"2020-05-20 18:19:57.864 UTC [common.deliver] deliverBlocks -> DEBU 5ce Rejecting deliver for 172.18.0.9:53410 because channel businesschannel not found" +"2020-05-20 18:19:57.864 UTC [orderer.common.server] func1 -> DEBU 5cf Closing Deliver stream" +"2020-05-20 18:19:57.865 UTC [comm.grpc.server] 1 -> INFO 5d0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53410 grpc.code=OK grpc.call_duration=154.9308ms +"2020-05-20 18:19:57.866 UTC [orderer.common.broadcast] Handle -> DEBU 5d1 Received EOF from 172.18.0.9:53412, hangup" +"2020-05-20 18:19:57.875 UTC [orderer.common.server] func1 -> DEBU 5d3 Closing Broadcast stream" +"2020-05-20 18:19:57.877 UTC [comm.grpc.server] 1 -> INFO 5d4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53412 grpc.code=OK grpc.call_duration=138.9457ms +"2020-05-20 18:19:57.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 29514" +"2020-05-20 18:19:57.897 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d5 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2020-05-20 18:19:57.898 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5d6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.6µs " +"2020-05-20 18:19:57.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:57.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d8 Sending msg of 28 bytes to 3 on channel testchainid took 1.8974ms" +"2020-05-20 18:19:57.903 UTC [orderer.common.server] Deliver -> DEBU 5d9 Starting new Deliver handler" +"2020-05-20 18:19:57.905 UTC [common.deliver] Handle -> DEBU 5dc Starting new deliver loop for 172.18.0.9:53414" +"2020-05-20 18:19:57.904 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5da Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2020-05-20 18:19:57.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5db Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.3µs " +"2020-05-20 18:19:57.907 UTC [common.channelconfig] NewStandardValues -> DEBU 5dd Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:19:57.907 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5de Processing field: HashingAlgorithm" +"2020-05-20 18:19:57.908 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5df Processing field: BlockDataHashingStructure" +"2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e0 Processing field: OrdererAddresses" +"2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e1 Processing field: Consortium" +"2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e2 Processing field: Capabilities" +"2020-05-20 18:19:57.909 UTC [common.channelconfig] NewStandardValues -> DEBU 5e3 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e4 Processing field: ConsensusType" +"2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e5 Processing field: BatchSize" +"2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e6 Processing field: BatchTimeout" +"2020-05-20 18:19:57.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e7 Processing field: KafkaBrokers" +"2020-05-20 18:19:57.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e8 Processing field: ChannelRestrictions" +"2020-05-20 18:19:57.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e9 Processing field: Capabilities" +"2020-05-20 18:19:57.911 UTC [common.channelconfig] NewStandardValues -> DEBU 5ea Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:19:57.911 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5eb Processing field: Endpoints" +"2020-05-20 18:19:57.911 UTC [common.channelconfig] NewStandardValues -> DEBU 5ec Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.911 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ed Processing field: MSP" +"2020-05-20 18:19:57.911 UTC [common.channelconfig] validateMSP -> DEBU 5ee Setting up MSP for org OrdererOrg" +"2020-05-20 18:19:57.913 UTC [msp] newBccspMsp -> DEBU 5ef Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.913 UTC [msp] New -> DEBU 5f0 Creating Cache-MSP instance" +"2020-05-20 18:19:57.913 UTC [msp] Setup -> DEBU 5f1 Setting up MSP instance OrdererMSP" +"2020-05-20 18:19:57.914 UTC [msp.identity] newIdentity -> DEBU 5f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.915 UTC [common.channelconfig] NewStandardValues -> DEBU 5f4 Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:19:57.906 UTC [common.deliver] Handle -> DEBU 5f3 Attempting to read seek info message from 172.18.0.9:53414" +"2020-05-20 18:19:57.915 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f5 Processing field: ACLs" +"2020-05-20 18:19:57.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f6 Processing field: Capabilities" +"2020-05-20 18:19:57.916 UTC [common.channelconfig] NewStandardValues -> DEBU 5f7 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:19:57.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f8 Processing field: AnchorPeers" +"2020-05-20 18:19:57.916 UTC [common.channelconfig] NewStandardValues -> DEBU 5f9 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fa Processing field: MSP" +"2020-05-20 18:19:57.916 UTC [common.channelconfig] Validate -> DEBU 5fb Anchor peers for org Org2MSP are " +"2020-05-20 18:19:57.916 UTC [common.channelconfig] validateMSP -> DEBU 5fc Setting up MSP for org Org2MSP" +"2020-05-20 18:19:57.916 UTC [msp] newBccspMsp -> DEBU 5fd Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.916 UTC [msp] New -> DEBU 5fe Creating Cache-MSP instance" +"2020-05-20 18:19:57.917 UTC [msp] Setup -> DEBU 5ff Setting up MSP instance Org2MSP" +"2020-05-20 18:19:57.919 UTC [msp.identity] newIdentity -> DEBU 600 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.921 UTC [common.channelconfig] NewStandardValues -> DEBU 601 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:19:57.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 602 Processing field: AnchorPeers" +"2020-05-20 18:19:57.921 UTC [common.channelconfig] NewStandardValues -> DEBU 603 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:19:57.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 604 Processing field: MSP" +"2020-05-20 18:19:57.922 UTC [common.channelconfig] Validate -> DEBU 605 Anchor peers for org Org1MSP are " +"2020-05-20 18:19:57.923 UTC [common.channelconfig] validateMSP -> DEBU 606 Setting up MSP for org Org1MSP" +"2020-05-20 18:19:57.923 UTC [msp] newBccspMsp -> DEBU 607 Creating BCCSP-based MSP instance" +"2020-05-20 18:19:57.923 UTC [msp] New -> DEBU 608 Creating Cache-MSP instance" +"2020-05-20 18:19:57.923 UTC [msp] Setup -> DEBU 609 Setting up MSP instance Org1MSP" +"2020-05-20 18:19:57.924 UTC [msp.identity] newIdentity -> DEBU 60a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:19:57.927 UTC [msp] Setup -> DEBU 60b Setting up the MSP manager (3 msps)" +"2020-05-20 18:19:57.927 UTC [msp] Setup -> DEBU 60c MSP manager setup complete, setup 3 msps" +"2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 60d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 60e Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 60f Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 610 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:19:57.928 UTC [policies] NewManagerImpl -> DEBU 611 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 612 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 613 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 614 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 615 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 616 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 617 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 618 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 619 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 61a Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 61b Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 61c Proposed new policy Writers for Channel/Application" +"2020-05-20 18:19:57.929 UTC [policies] NewManagerImpl -> DEBU 61d Proposed new policy Admins for Channel/Application" +"2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 61e Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 61f Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 620 Proposed new policy Readers for Channel/Application" +"2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 621 Proposed new policy Writers for Channel" +"2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 622 Proposed new policy Admins for Channel" +"2020-05-20 18:19:57.930 UTC [policies] NewManagerImpl -> DEBU 623 Proposed new policy Readers for Channel" +"2020-05-20 18:19:57.930 UTC [common.configtx] addToMap -> DEBU 624 Adding to config map: [Group] /Channel" +"2020-05-20 18:19:57.930 UTC [common.configtx] addToMap -> DEBU 625 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:19:57.930 UTC [common.configtx] addToMap -> DEBU 626 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:19:57.930 UTC [common.configtx] addToMap -> DEBU 627 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 628 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 629 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62e Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 62f Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:19:57.931 UTC [common.configtx] addToMap -> DEBU 630 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 631 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 632 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 633 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 634 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 635 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:19:57.932 UTC [common.configtx] addToMap -> DEBU 636 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:19:57.933 UTC [common.configtx] addToMap -> DEBU 637 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:19:57.933 UTC [common.configtx] addToMap -> DEBU 638 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:19:57.933 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:19:57.933 UTC [common.configtx] addToMap -> DEBU 63a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63d Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 63f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 640 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:19:57.934 UTC [common.configtx] addToMap -> DEBU 641 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 643 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 644 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 645 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 646 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 647 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:19:57.935 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64e Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:19:57.936 UTC [common.configtx] addToMap -> DEBU 64f Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:19:57.936 UTC [common.channelconfig] LogSanityChecks -> DEBU 650 As expected, current configuration has policy '/Channel/Readers'" +"2020-05-20 18:19:57.936 UTC [common.channelconfig] LogSanityChecks -> DEBU 651 As expected, current configuration has policy '/Channel/Writers'" +"2020-05-20 18:19:57.936 UTC [policies] Manager -> DEBU 652 Manager Channel looking up path [Application]" +"2020-05-20 18:19:57.936 UTC [policies] Manager -> DEBU 653 Manager Channel has managers Orderer" +"2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 654 Manager Channel has managers Application" +"2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 655 Manager Channel/Application looking up path []" +"2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 656 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 657 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:19:57.937 UTC [common.channelconfig] LogSanityChecks -> DEBU 658 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-05-20 18:19:57.937 UTC [common.channelconfig] LogSanityChecks -> DEBU 659 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-05-20 18:19:57.937 UTC [common.channelconfig] LogSanityChecks -> DEBU 65a As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 65b Manager Channel looking up path [Orderer]" +"2020-05-20 18:19:57.937 UTC [policies] Manager -> DEBU 65c Manager Channel has managers Orderer" +"2020-05-20 18:19:57.938 UTC [policies] Manager -> DEBU 65d Manager Channel has managers Application" +"2020-05-20 18:19:57.938 UTC [policies] Manager -> DEBU 65e Manager Channel/Orderer looking up path []" +"2020-05-20 18:19:57.938 UTC [policies] Manager -> DEBU 65f Manager Channel/Orderer has managers OrdererOrg" +"2020-05-20 18:19:57.945 UTC [common.channelconfig] LogSanityChecks -> DEBU 660 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-05-20 18:19:57.945 UTC [common.channelconfig] LogSanityChecks -> DEBU 661 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-05-20 18:19:57.945 UTC [common.channelconfig] LogSanityChecks -> DEBU 662 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-05-20 18:19:57.945 UTC [common.channelconfig] LogSanityChecks -> DEBU 663 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-05-20 18:19:57.945 UTC [common.capabilities] Supported -> DEBU 664 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:19:57.946 UTC [common.capabilities] Supported -> DEBU 665 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:19:57.946 UTC [fsblkstorage] newBlockfileMgr -> DEBU 666 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2020-05-20 18:19:57.946 UTC [kvledger.util] CreateDirIfMissing -> DEBU 667 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2020-05-20 18:19:57.946 UTC [kvledger.util] logDirStatus -> DEBU 668 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2020-05-20 18:19:57.949 UTC [kvledger.util] logDirStatus -> DEBU 669 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2020-05-20 18:19:57.949 UTC [fsblkstorage] newBlockfileMgr -> INFO 66a Getting block information from block storage" +"2020-05-20 18:19:57.950 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66b Retrieving checkpoint info from block files" +"2020-05-20 18:19:57.950 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 66c retrieveLastFileSuffix()" +"2020-05-20 18:19:57.950 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 66d retrieveLastFileSuffix() - biggestFileNum = -1" +"2020-05-20 18:19:57.950 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66e Last file number found = -1" +"2020-05-20 18:19:57.951 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66f No block file found" +"2020-05-20 18:19:57.951 UTC [fsblkstorage] newBlockfileMgr -> DEBU 670 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0000ccce0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2020-05-20 18:19:57.958 UTC [fsblkstorage] newBlockIndex -> DEBU 671 newBlockIndex() - indexItems:[[BlockNum]]" +"2020-05-20 18:19:57.960 UTC [orderer.common.server] func1 -> DEBU 672 Executing callback to update root CAs" +"2020-05-20 18:19:57.961 UTC [orderer.common.server] updateTrustedRoots -> DEBU 674 updating root CAs for channel [businesschannel]" +"2020-05-20 18:19:57.961 UTC [orderer.common.server] updateTrustedRoots -> DEBU 675 adding orderer root CAs for MSP [OrdererMSP]" +"2020-05-20 18:19:57.961 UTC [orderer.common.server] updateTrustedRoots -> DEBU 676 adding app root CAs for MSP [Org2MSP]" +"2020-05-20 18:19:57.961 UTC [orderer.common.server] updateTrustedRoots -> DEBU 677 adding app root CAs for MSP [Org1MSP]" +"2020-05-20 18:19:57.961 UTC [orderer.common.cluster.step] handleMessage -> DEBU 673 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:57.964 UTC [fsblkstorage] indexBlock -> DEBU 678 Indexing block [blockNum=0, blockHash=[]byte{0xfa, 0x23, 0xe2, 0xb8, 0x2a, 0x9a, 0x88, 0xab, 0xe1, 0x10, 0x81, 0xae, 0xa5, 0x6, 0xf5, 0xf1, 0x22, 0x82, 0x0, 0xe, 0x6e, 0x5c, 0x2d, 0x5e, 0xf7, 0xc1, 0x60, 0xa4, 0x8c, 0xf3, 0x4, 0xc7} txOffsets= +txId=bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5 locPointer=offset=39, bytesLength=28429 +]" +"2020-05-20 18:19:57.966 UTC [fsblkstorage] updateCheckpoint -> DEBU 679 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28474], isChainEmpty=[false], lastBlockNumber=[0]" +"2020-05-20 18:19:57.966 UTC [fsblkstorage] Next -> DEBU 67a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-05-20 18:19:57.966 UTC [fsblkstorage] newBlockfileStream -> DEBU 67b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-05-20 18:19:57.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67c Remaining bytes=[28474], Going to peek [8] bytes" +"2020-05-20 18:19:57.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67d Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:19:57.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67e blockbytes [28471] read from file [0]" +"2020-05-20 18:19:57.967 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 67f [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2020-05-20 18:19:57.968 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 680 EvictionSuspicion not set, defaulting to 10m0s" +"2020-05-20 18:19:57.968 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 681 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2020-05-20 18:19:57.968 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 682 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2020-05-20 18:19:57.971 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 683 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2020-05-20 18:19:57.972 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 684 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2020-05-20 18:19:57.972 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 685 Appending 0 entries to memory storage" channel=businesschannel node=1 +"2020-05-20 18:19:57.972 UTC [fsblkstorage] Next -> DEBU 686 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-05-20 18:19:57.972 UTC [fsblkstorage] newBlockfileStream -> DEBU 687 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-05-20 18:19:57.972 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 688 Remaining bytes=[28474], Going to peek [8] bytes" +"2020-05-20 18:19:57.973 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 689 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:19:57.973 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68a blockbytes [28471] read from file [0]" +"2020-05-20 18:19:57.973 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 68b [channel: businesschannel] Done creating channel support resources" +"2020-05-20 18:19:57.973 UTC [orderer.commmon.multichannel] newChain -> INFO 68c Created and starting new chain businesschannel" +"2020-05-20 18:19:57.973 UTC [orderer.consensus.etcdraft] Start -> INFO 68d Starting Raft node" channel=businesschannel node=1 +"2020-05-20 18:19:57.973 UTC [orderer.common.cluster] Configure -> INFO 68e Entering, channel: businesschannel, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +]" +"2020-05-20 18:19:57.975 UTC [orderer.common.cluster] updateStubInMapping -> INFO 68f Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2020-05-20 18:19:57.975 UTC [orderer.common.cluster] updateStubInMapping -> INFO 690 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2020-05-20 18:19:57.976 UTC [orderer.common.cluster] func1 -> DEBU 691 Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + for channel businesschannel" +"2020-05-20 18:19:57.977 UTC [orderer.common.cluster] updateStubInMapping -> INFO 692 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2020-05-20 18:19:57.977 UTC [orderer.common.cluster] updateStubInMapping -> INFO 693 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2020-05-20 18:19:57.977 UTC [orderer.common.cluster] func1 -> DEBU 694 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- + for channel businesschannel" +"2020-05-20 18:19:57.978 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 695 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2020-05-20 18:19:57.978 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 696 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2020-05-20 18:19:57.978 UTC [orderer.common.cluster] Configure -> INFO 697 Exiting" +"2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] start -> DEBU 698 Starting raft node: #peers: 3" channel=businesschannel node=1 +"2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] start -> INFO 699 Starting raft node as part of a new channel" channel=businesschannel node=1 +"2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 69a 1 became follower at term 0" channel=businesschannel node=1 +"2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] newRaft -> INFO 69b newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2020-05-20 18:19:57.978 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 69c 1 became follower at term 1" channel=businesschannel node=1 +"2020-05-20 18:19:57.978 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 69d [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2020-05-20 18:19:57.978 UTC [msp] GetDefaultSigningIdentity -> DEBU 69e Obtaining default signing identity" +"2020-05-20 18:19:57.979 UTC [orderer.consensus.etcdraft] run -> INFO 69f This node is picked to start campaign" channel=businesschannel node=1 +"2020-05-20 18:19:57.979 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6a1 Sending msg of 28 bytes to 3 on channel testchainid took 11.1µs" +"2020-05-20 18:19:57.979 UTC [msp] GetDefaultSigningIdentity -> DEBU 6a0 Obtaining default signing identity" +"2020-05-20 18:19:57.979 UTC [msp.identity] Sign -> DEBU 6a2 Sign: plaintext: 0A00120B0A090A03010203100418050A...E99618AA3F4069367EA14281C69EA059 " +"2020-05-20 18:19:57.980 UTC [msp.identity] Sign -> DEBU 6a4 Sign: digest: 1EA9D252FF8A0857FC3B5EE7874543122E08CD85EFA4522731A3A54DCCF0BCA6 " +"2020-05-20 18:19:57.979 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.1µs " +"2020-05-20 18:19:57.982 UTC [fsblkstorage] indexBlock -> DEBU 6a5 Indexing block [blockNum=1, blockHash=[]byte{0x7b, 0x37, 0x2f, 0x1d, 0x14, 0x72, 0x4b, 0x8c, 0x85, 0x15, 0x3f, 0x43, 0x59, 0x2c, 0x33, 0x8b, 0x34, 0x8a, 0x25, 0xc3, 0x72, 0x12, 0xff, 0xb1, 0x65, 0x7f, 0xf7, 0x24, 0x42, 0x12, 0x7d, 0xe6} txOffsets= +txId=f1880cdda7ebf9df4008926918c731463ae90ae6c247cc9aac8b96dbea8d26f7 locPointer=offset=71, bytesLength=29383 +]" +"2020-05-20 18:19:57.983 UTC [orderer.consensus.etcdraft] apply -> INFO 6a6 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-05-20 18:19:57.983 UTC [orderer.consensus.etcdraft] apply -> INFO 6a7 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-05-20 18:19:57.983 UTC [orderer.consensus.etcdraft] apply -> INFO 6a8 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-05-20 18:19:57.983 UTC [fsblkstorage] updateCheckpoint -> DEBU 6a9 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[53339], isChainEmpty=[false], lastBlockNumber=[1]" +"2020-05-20 18:19:57.984 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 6aa [channel: testchainid] Wrote block [1]" +"2020-05-20 18:19:58.105 UTC [common.deliver] deliverBlocks -> WARN 6ab [channel: businesschannel] Rejecting deliver request for 172.18.0.9:53414 because of consenter error" +"2020-05-20 18:19:58.106 UTC [orderer.common.server] func1 -> DEBU 6ac Closing Deliver stream" +"2020-05-20 18:19:58.106 UTC [comm.grpc.server] 1 -> INFO 6ad streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53414 grpc.code=OK grpc.call_duration=203.568ms +"2020-05-20 18:19:58.131 UTC [orderer.common.server] Deliver -> DEBU 6ae Starting new Deliver handler" +"2020-05-20 18:19:58.132 UTC [common.deliver] Handle -> DEBU 6af Starting new deliver loop for 172.18.0.9:53416" +"2020-05-20 18:19:58.133 UTC [common.deliver] Handle -> DEBU 6b0 Attempting to read seek info message from 172.18.0.9:53416" +"2020-05-20 18:19:58.298 UTC [common.deliver] deliverBlocks -> WARN 6b1 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:53416 because of consenter error" +"2020-05-20 18:19:58.299 UTC [orderer.common.server] func1 -> DEBU 6b2 Closing Deliver stream" +"2020-05-20 18:19:58.299 UTC [comm.grpc.server] 1 -> INFO 6b3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53416 grpc.code=OK grpc.call_duration=202.2578ms +"2020-05-20 18:19:58.324 UTC [orderer.common.server] Deliver -> DEBU 6b4 Starting new Deliver handler" +"2020-05-20 18:19:58.324 UTC [common.deliver] Handle -> DEBU 6b5 Starting new deliver loop for 172.18.0.9:53418" +"2020-05-20 18:19:58.325 UTC [common.deliver] Handle -> DEBU 6b6 Attempting to read seek info message from 172.18.0.9:53418" +"2020-05-20 18:19:58.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:58.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b8 Sending msg of 28 bytes to 3 on channel testchainid took 106.1µs" +"2020-05-20 18:19:58.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.9µs " +"2020-05-20 18:19:58.525 UTC [common.deliver] deliverBlocks -> WARN 6ba [channel: businesschannel] Rejecting deliver request for 172.18.0.9:53418 because of consenter error" +"2020-05-20 18:19:58.526 UTC [orderer.common.server] func1 -> DEBU 6bb Closing Deliver stream" +"2020-05-20 18:19:58.526 UTC [comm.grpc.server] 1 -> INFO 6bc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53418 grpc.code=OK grpc.call_duration=202.7233ms +"2020-05-20 18:19:58.545 UTC [orderer.common.server] Deliver -> DEBU 6bd Starting new Deliver handler" +"2020-05-20 18:19:58.546 UTC [common.deliver] Handle -> DEBU 6be Starting new deliver loop for 172.18.0.9:53420" +"2020-05-20 18:19:58.546 UTC [common.deliver] Handle -> DEBU 6bf Attempting to read seek info message from 172.18.0.9:53420" +"2020-05-20 18:19:58.750 UTC [common.deliver] deliverBlocks -> WARN 6c0 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:53420 because of consenter error" +"2020-05-20 18:19:58.751 UTC [orderer.common.server] func1 -> DEBU 6c1 Closing Deliver stream" +"2020-05-20 18:19:58.751 UTC [comm.grpc.server] 1 -> INFO 6c2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53420 grpc.code=OK grpc.call_duration=206.4333ms +"2020-05-20 18:19:58.776 UTC [orderer.common.server] Deliver -> DEBU 6c3 Starting new Deliver handler" +"2020-05-20 18:19:58.776 UTC [common.deliver] Handle -> DEBU 6c4 Starting new deliver loop for 172.18.0.9:53422" +"2020-05-20 18:19:58.776 UTC [common.deliver] Handle -> DEBU 6c5 Attempting to read seek info message from 172.18.0.9:53422" +"2020-05-20 18:19:58.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:58.928 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c7 Sending msg of 28 bytes to 3 on channel testchainid took 186.3µs" +"2020-05-20 18:19:58.929 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.164ms " +"2020-05-20 18:19:58.947 UTC [orderer.consensus.etcdraft] Step -> INFO 6c9 1 is starting a new election at term 1" channel=businesschannel node=1 +"2020-05-20 18:19:58.947 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6ca 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2020-05-20 18:19:58.947 UTC [orderer.consensus.etcdraft] poll -> INFO 6cb 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2020-05-20 18:19:58.947 UTC [orderer.consensus.etcdraft] campaign -> INFO 6cc 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2020-05-20 18:19:58.948 UTC [orderer.consensus.etcdraft] campaign -> INFO 6cd 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2020-05-20 18:19:58.948 UTC [orderer.common.cluster] NewStream -> DEBU 6ce Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2020-05-20 18:19:58.949 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 2 on channel businesschannel took 467.1µs" +"2020-05-20 18:19:58.949 UTC [orderer.common.cluster] NewStream -> DEBU 6d0 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2020-05-20 18:19:58.949 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d1 Sending msg of 28 bytes to 3 on channel businesschannel took 341.5µs" +"2020-05-20 18:19:58.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.1µs " +"2020-05-20 18:19:58.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.6µs " +"2020-05-20 18:19:58.952 UTC [orderer.common.cluster] Step -> DEBU 6d4 Connection from orderer1.example.com(172.18.0.4:45494)" +"2020-05-20 18:19:58.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:58.954 UTC [orderer.consensus.etcdraft] poll -> INFO 6d6 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +"2020-05-20 18:19:58.954 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6d7 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2020-05-20 18:19:58.956 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6d8 1 became candidate at term 2" channel=businesschannel node=1 +"2020-05-20 18:19:58.956 UTC [orderer.consensus.etcdraft] poll -> INFO 6d9 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2020-05-20 18:19:58.956 UTC [orderer.consensus.etcdraft] campaign -> INFO 6da 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2020-05-20 18:19:58.956 UTC [orderer.consensus.etcdraft] campaign -> INFO 6db 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2020-05-20 18:19:58.955 UTC [orderer.common.cluster] Step -> DEBU 6dc Connection from orderer2.example.com(172.18.0.3:44052)" +"2020-05-20 18:19:58.957 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6dd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:58.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6de Sending msg of 28 bytes to 2 on channel businesschannel took 114.8µs" +"2020-05-20 18:19:58.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6df Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.5µs " +"2020-05-20 18:19:58.961 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e0 Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +"2020-05-20 18:19:58.962 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:58.962 UTC [orderer.consensus.etcdraft] poll -> INFO 6e2 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +"2020-05-20 18:19:58.962 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6e3 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2020-05-20 18:19:58.963 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6e4 1 became leader at term 2" channel=businesschannel node=1 +"2020-05-20 18:19:58.963 UTC [orderer.consensus.etcdraft] run -> INFO 6e5 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2020-05-20 18:19:58.961 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +"2020-05-20 18:19:58.965 UTC [orderer.consensus.etcdraft] run -> INFO 6e7 Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2020-05-20 18:19:58.966 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6e8 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2020-05-20 18:19:58.966 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6e9 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2020-05-20 18:19:58.965 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ea Sending msg of 36 bytes to 2 on channel businesschannel took 19.2µs" +"2020-05-20 18:19:58.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6eb Sending msg of 36 bytes to 3 on channel businesschannel took 19.1µs" +"2020-05-20 18:19:58.972 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ec Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:58.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ed Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 206.9µs " +"2020-05-20 18:19:58.973 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ee Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 3.6627ms " +"2020-05-20 18:19:58.977 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:58.978 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:58.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f1 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +"2020-05-20 18:19:58.978 UTC [policies] Evaluate -> DEBU 6f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:19:58.979 UTC [policies] Evaluate -> DEBU 6f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:19:58.979 UTC [policies] Evaluate -> DEBU 6f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:19:58.979 UTC [policies] Evaluate -> DEBU 6f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:19:58.979 UTC [policies] Evaluate -> DEBU 6f6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:19:58.979 UTC [msp] DeserializeIdentity -> DEBU 6f7 Obtaining identity" +"2020-05-20 18:19:58.979 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 762.2µs " +"2020-05-20 18:19:58.980 UTC [msp.identity] newIdentity -> DEBU 6f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-05-20 18:19:58.980 UTC [cauthdsl] func1 -> DEBU 6fa 0xc000daeb00 gate 1589998798980437200 evaluation starts" +"2020-05-20 18:19:58.980 UTC [cauthdsl] func2 -> DEBU 6fb 0xc000daeb00 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:19:58.980 UTC [cauthdsl] func2 -> DEBU 6fc 0xc000daeb00 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:19:58.980 UTC [cauthdsl] func2 -> DEBU 6fd 0xc000daeb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-05-20 18:19:58.980 UTC [cauthdsl] func2 -> DEBU 6fe 0xc000daeb00 principal evaluation fails" +"2020-05-20 18:19:58.980 UTC [cauthdsl] func1 -> DEBU 6ff 0xc000daeb00 gate 1589998798980437200 evaluation fails" +"2020-05-20 18:19:58.981 UTC [policies] Evaluate -> DEBU 700 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:58.981 UTC [policies] Evaluate -> DEBU 701 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:19:58.981 UTC [policies] func1 -> DEBU 702 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 703 Signature set did not satisfy policy /Channel/Orderer/Readers" +"2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 704 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 705 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 706 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:19:58.982 UTC [policies] Evaluate -> DEBU 707 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:19:58.982 UTC [cauthdsl] func1 -> DEBU 708 0xc0005be190 gate 1589998798982601000 evaluation starts" +"2020-05-20 18:19:58.982 UTC [cauthdsl] func2 -> DEBU 709 0xc0005be190 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:19:58.982 UTC [cauthdsl] func2 -> DEBU 70a 0xc0005be190 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:19:58.982 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 70b Checking if identity satisfies MEMBER role for Org1MSP" +"2020-05-20 18:19:58.983 UTC [msp] Validate -> DEBU 70c MSP Org1MSP validating identity" +"2020-05-20 18:19:58.983 UTC [msp] getCertificationChain -> DEBU 70d MSP Org1MSP getting certification chain" +"2020-05-20 18:19:58.982 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 70e Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2020-05-20 18:19:58.983 UTC [cauthdsl] func2 -> DEBU 70f 0xc0005be190 principal matched by identity 0" +"2020-05-20 18:19:58.983 UTC [msp.identity] Verify -> DEBU 710 Verify: digest = 00000000 3b 5e 91 4c c8 92 6f 64 00 32 6e be fa 11 03 32 |;^.L..od.2n....2| +00000010 e9 97 0b b7 3d 10 a6 7d 32 90 58 6d 92 70 06 71 |....=..}2.Xm.p.q|" +"2020-05-20 18:19:58.984 UTC [msp.identity] Verify -> DEBU 711 Verify: sig = 00000000 30 44 02 20 38 f1 ae f1 cf 45 63 57 26 c5 0f 34 |0D. 8....EcW&..4| +00000010 60 84 09 a7 07 f0 70 72 6b 46 30 b8 64 92 b3 45 |`.....prkF0.d..E| +00000020 bd aa 7f 75 02 20 21 86 1c ae bf bc 6b 35 64 d0 |...u. !.....k5d.| +00000030 4d 8e 89 0f 5f cd 53 07 23 f9 38 da 61 9f 07 41 |M..._.S.#.8.a..A| +00000040 5c 06 4e 1a 1d 83 |\.N...|" +"2020-05-20 18:19:58.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 712 Sending msg of 28 bytes to 3 on channel businesschannel took 152.3µs" +"2020-05-20 18:19:58.984 UTC [cauthdsl] func2 -> DEBU 713 0xc0005be190 principal evaluation succeeds for identity 0" +"2020-05-20 18:19:58.984 UTC [cauthdsl] func1 -> DEBU 714 0xc0005be190 gate 1589998798982601000 evaluation succeeds" +"2020-05-20 18:19:58.985 UTC [policies] Evaluate -> DEBU 715 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:19:58.985 UTC [policies] Evaluate -> DEBU 716 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:19:58.985 UTC [policies] Evaluate -> DEBU 717 Signature set satisfies policy /Channel/Application/Readers" +"2020-05-20 18:19:58.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 718 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:58.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 719 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.5µs " +"2020-05-20 18:19:58.986 UTC [policies] Evaluate -> DEBU 71a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:19:58.986 UTC [policies] Evaluate -> DEBU 71b Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:19:58.986 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:19:58.987 UTC [common.deliver] deliverBlocks -> DEBU 71d [channel: businesschannel] Received seekInfo (0xc0003d2bc0) start: > stop: > from 172.18.0.9:53422" +"2020-05-20 18:19:58.987 UTC [fsblkstorage] Next -> DEBU 71e Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-05-20 18:19:58.987 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:58.987 UTC [fsblkstorage] newBlockfileStream -> DEBU 720 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-05-20 18:19:58.988 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 721 Remaining bytes=[28474], Going to peek [8] bytes" +"2020-05-20 18:19:58.988 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 722 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:19:58.988 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 723 blockbytes [28471] read from file [0]" +"2020-05-20 18:19:58.989 UTC [common.deliver] deliverBlocks -> DEBU 724 [channel: businesschannel] Delivering block [0] for (0xc0003d2bc0) for 172.18.0.9:53422" +"2020-05-20 18:19:58.989 UTC [common.deliver] deliverBlocks -> DEBU 725 [channel: businesschannel] Done delivering to 172.18.0.9:53422 for (0xc0003d2bc0)" +"2020-05-20 18:19:58.989 UTC [common.deliver] Handle -> DEBU 726 Waiting for new SeekInfo from 172.18.0.9:53422" +"2020-05-20 18:19:58.989 UTC [common.deliver] Handle -> DEBU 727 Attempting to read seek info message from 172.18.0.9:53422" +"2020-05-20 18:19:58.995 UTC [grpc] warningf -> DEBU 728 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:53422: read: connection reset by peer" +"2020-05-20 18:19:58.995 UTC [grpc] infof -> DEBU 729 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:19:58.996 UTC [common.deliver] Handle -> WARN 72a Error reading from 172.18.0.9:53422: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:19:58.997 UTC [orderer.common.server] func1 -> DEBU 72b Closing Deliver stream" +"2020-05-20 18:19:58.997 UTC [comm.grpc.server] 1 -> INFO 72c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53422 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=221.9648ms +"2020-05-20 18:19:58.997 UTC [grpc] infof -> DEBU 72d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:19:58.998 UTC [grpc] infof -> DEBU 72f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:19:58.998 UTC [grpc] infof -> DEBU 730 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:19:58.998 UTC [grpc] infof -> DEBU 72e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:19:58.999 UTC [grpc] infof -> DEBU 732 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:19:58.999 UTC [grpc] infof -> DEBU 731 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:19:59.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU 733 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:59.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 734 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-05-20 18:19:59.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU 735 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +"2020-05-20 18:19:59.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 736 Sending msg of 28 bytes to 2 on channel businesschannel took 16.6µs" +"2020-05-20 18:19:59.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 737 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2020-05-20 18:19:59.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 738 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +"2020-05-20 18:19:59.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 739 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +"2020-05-20 18:19:59.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:59.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:59.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:19:59.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73d Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2020-05-20 18:19:59.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.7µs " +"2020-05-20 18:19:59.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +"2020-05-20 18:19:59.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 740 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-05-20 18:19:59.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 741 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.9µs " +"2020-05-20 18:19:59.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 742 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.7µs " +"2020-05-20 18:19:59.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU 743 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:19:59.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU 744 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:00.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU 745 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:00.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 746 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +"2020-05-20 18:20:00.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU 747 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.1µs " +"2020-05-20 18:20:00.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 748 Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +"2020-05-20 18:20:00.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 749 Sending msg of 28 bytes to 3 on channel businesschannel took 9.1µs" +"2020-05-20 18:20:00.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 287.6µs " +"2020-05-20 18:20:00.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:00.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:00.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 833.7µs " +"2020-05-20 18:20:00.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:00.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74f Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +"2020-05-20 18:20:00.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU 750 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.2µs " +"2020-05-20 18:20:00.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 751 Sending msg of 28 bytes to 2 on channel businesschannel took 30.8µs" +"2020-05-20 18:20:00.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 752 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" +"2020-05-20 18:20:00.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU 753 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160µs " +"2020-05-20 18:20:00.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU 754 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4427ms " +"2020-05-20 18:20:00.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU 755 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:00.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU 756 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:01.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU 757 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:01.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 758 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +"2020-05-20 18:20:01.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU 759 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +"2020-05-20 18:20:01.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75a Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +"2020-05-20 18:20:01.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75b Sending msg of 28 bytes to 3 on channel businesschannel took 8.2µs" +"2020-05-20 18:20:01.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240µs " +"2020-05-20 18:20:01.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:01.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3707ms " +"2020-05-20 18:20:01.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:01.931 UTC [orderer.common.cluster.step] handleMessage -> DEBU 760 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:01.932 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 761 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2020-05-20 18:20:01.932 UTC [orderer.common.cluster.step] sendMessage -> DEBU 762 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.6µs " +"2020-05-20 18:20:01.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 763 Sending msg of 28 bytes to 2 on channel businesschannel took 42.3µs" +"2020-05-20 18:20:01.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 764 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +"2020-05-20 18:20:01.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 765 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 281.1µs " +"2020-05-20 18:20:01.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU 766 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 283µs " +"2020-05-20 18:20:01.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 767 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:01.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU 768 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:02.429 UTC [orderer.common.cluster.step] handleMessage -> DEBU 769 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:02.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76a Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +"2020-05-20 18:20:02.430 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 534.1µs " +"2020-05-20 18:20:02.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76c Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +"2020-05-20 18:20:02.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76d Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +"2020-05-20 18:20:02.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.5µs " +"2020-05-20 18:20:02.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.2µs " +"2020-05-20 18:20:02.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU 770 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:02.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU 771 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:02.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU 772 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:02.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 773 Sending msg of 28 bytes to 3 on channel testchainid took 8µs" +"2020-05-20 18:20:02.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU 774 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs " +"2020-05-20 18:20:02.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 775 Sending msg of 28 bytes to 2 on channel businesschannel took 14.6µs" +"2020-05-20 18:20:02.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 776 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-05-20 18:20:02.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 777 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.3µs " +"2020-05-20 18:20:02.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 778 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " +"2020-05-20 18:20:02.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU 779 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:02.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:03.042 UTC [orderer.common.server] Deliver -> DEBU 77b Starting new Deliver handler" +"2020-05-20 18:20:03.042 UTC [common.deliver] Handle -> DEBU 77c Starting new deliver loop for 172.18.0.9:53448" +"2020-05-20 18:20:03.042 UTC [common.deliver] Handle -> DEBU 77d Attempting to read seek info message from 172.18.0.9:53448" +"2020-05-20 18:20:03.067 UTC [orderer.common.server] Broadcast -> DEBU 77e Starting new Broadcast handler" +"2020-05-20 18:20:03.067 UTC [orderer.common.broadcast] Handle -> DEBU 77f Starting new broadcast loop for 172.18.0.9:53450" +"2020-05-20 18:20:03.068 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 780 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:53450" +"2020-05-20 18:20:03.068 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 781 Processing config update message for exisitng channel businesschannel" +"2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 782 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 783 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 784 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 785 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:03.069 UTC [policies] Evaluate -> DEBU 786 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:20:03.070 UTC [cauthdsl] func1 -> DEBU 787 0xc000d0f170 gate 1589998803070050500 evaluation starts" +"2020-05-20 18:20:03.070 UTC [cauthdsl] func2 -> DEBU 788 0xc000d0f170 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:03.070 UTC [cauthdsl] func2 -> DEBU 789 0xc000d0f170 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:03.070 UTC [cauthdsl] func2 -> DEBU 78a 0xc000d0f170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-05-20 18:20:03.070 UTC [cauthdsl] func2 -> DEBU 78b 0xc000d0f170 principal evaluation fails" +"2020-05-20 18:20:03.070 UTC [cauthdsl] func1 -> DEBU 78c 0xc000d0f170 gate 1589998803070050500 evaluation fails" +"2020-05-20 18:20:03.071 UTC [policies] Evaluate -> DEBU 78d Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:03.071 UTC [policies] Evaluate -> DEBU 78e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:03.071 UTC [policies] func1 -> DEBU 78f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-05-20 18:20:03.071 UTC [policies] Evaluate -> DEBU 790 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-05-20 18:20:03.072 UTC [policies] Evaluate -> DEBU 791 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:20:03.072 UTC [policies] Evaluate -> DEBU 792 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-05-20 18:20:03.072 UTC [policies] Evaluate -> DEBU 793 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:03.072 UTC [policies] Evaluate -> DEBU 794 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-05-20 18:20:03.072 UTC [cauthdsl] func1 -> DEBU 795 0xc000d0fe80 gate 1589998803072652100 evaluation starts" +"2020-05-20 18:20:03.072 UTC [cauthdsl] func2 -> DEBU 796 0xc000d0fe80 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:03.072 UTC [cauthdsl] func2 -> DEBU 797 0xc000d0fe80 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:03.072 UTC [cauthdsl] func2 -> DEBU 798 0xc000d0fe80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-05-20 18:20:03.073 UTC [cauthdsl] func2 -> DEBU 799 0xc000d0fe80 principal evaluation fails" +"2020-05-20 18:20:03.073 UTC [cauthdsl] func1 -> DEBU 79a 0xc000d0fe80 gate 1589998803072652100 evaluation fails" +"2020-05-20 18:20:03.073 UTC [policies] Evaluate -> DEBU 79b Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:03.073 UTC [policies] Evaluate -> DEBU 79c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:03.073 UTC [policies] Evaluate -> DEBU 79d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-05-20 18:20:03.073 UTC [cauthdsl] func1 -> DEBU 79e 0xc000cd86f0 gate 1589998803073767200 evaluation starts" +"2020-05-20 18:20:03.074 UTC [cauthdsl] func2 -> DEBU 79f 0xc000cd86f0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:03.074 UTC [cauthdsl] func2 -> DEBU 7a0 0xc000cd86f0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:03.074 UTC [cauthdsl] func2 -> DEBU 7a1 0xc000cd86f0 principal matched by identity 0" +"2020-05-20 18:20:03.074 UTC [msp.identity] Verify -> DEBU 7a2 Verify: digest = 00000000 7d 95 e5 11 92 be 0c 04 5e fb e1 a5 d6 88 b5 b5 |}.......^.......| +00000010 21 99 14 5e 20 97 f4 2e 1b bd d6 d3 2f b7 8e 07 |!..^ ......./...|" +"2020-05-20 18:20:03.074 UTC [msp.identity] Verify -> DEBU 7a3 Verify: sig = 00000000 30 44 02 20 27 89 73 eb 94 69 f2 be d0 d1 36 e2 |0D. '.s..i....6.| +00000010 be 32 9a bb 52 95 80 b1 32 3f 99 d7 71 83 35 cf |.2..R...2?..q.5.| +00000020 db d9 21 a8 02 20 2d 07 3a 07 2c 62 95 dc ae b7 |..!.. -.:.,b....| +00000030 be 82 95 28 c4 a3 c6 6e 73 35 54 21 83 09 dc 4a |...(...ns5T!...J| +00000040 cb 75 7d 7c 06 7c |.u}|.||" +"2020-05-20 18:20:03.075 UTC [cauthdsl] func2 -> DEBU 7a4 0xc000cd86f0 principal evaluation succeeds for identity 0" +"2020-05-20 18:20:03.075 UTC [cauthdsl] func1 -> DEBU 7a5 0xc000cd86f0 gate 1589998803073767200 evaluation succeeds" +"2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7a6 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7a8 Signature set satisfies policy /Channel/Application/Writers" +"2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-05-20 18:20:03.075 UTC [policies] Evaluate -> DEBU 7aa Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:20:03.076 UTC [policies] Evaluate -> DEBU 7ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:20:03.076 UTC [common.configtx] addToMap -> DEBU 7ac Adding to config map: [Group] /Channel" +"2020-05-20 18:20:03.076 UTC [common.configtx] addToMap -> DEBU 7ad Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:03.076 UTC [common.configtx] addToMap -> DEBU 7ae Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.076 UTC [common.configtx] addToMap -> DEBU 7af Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b3 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:03.077 UTC [common.configtx] addToMap -> DEBU 7b4 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:03.078 UTC [common.configtx] addToMap -> DEBU 7b5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.078 UTC [common.configtx] addToMap -> DEBU 7b6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:03.078 UTC [common.configtx] addToMap -> DEBU 7b7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:03.079 UTC [common.configtx] addToMap -> DEBU 7b8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.079 UTC [common.configtx] addToMap -> DEBU 7b9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.079 UTC [common.configtx] addToMap -> DEBU 7ba Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:03.079 UTC [common.configtx] verifyDeltaSet -> DEBU 7bb Processing change to key: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.079 UTC [common.configtx] policyForItem -> DEBU 7bc Getting policy for item Org1MSP with mod_policy Admins" +"2020-05-20 18:20:03.080 UTC [policies] Manager -> DEBU 7bd Manager Channel looking up path [Application]" +"2020-05-20 18:20:03.080 UTC [policies] Manager -> DEBU 7be Manager Channel has managers Orderer" +"2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7bf Manager Channel has managers Application" +"2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7c0 Manager Channel/Application looking up path []" +"2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7c1 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7c2 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:03.081 UTC [policies] Manager -> DEBU 7c3 Manager Channel/Application looking up path [Org1MSP]" +"2020-05-20 18:20:03.082 UTC [policies] Manager -> DEBU 7c4 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:03.082 UTC [policies] Manager -> DEBU 7c5 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:03.082 UTC [policies] Manager -> DEBU 7c6 Manager Channel/Application/Org1MSP looking up path []" +"2020-05-20 18:20:03.083 UTC [policies] Evaluate -> DEBU 7c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-05-20 18:20:03.083 UTC [cauthdsl] func1 -> DEBU 7c8 0xc000cbb480 gate 1589998803083388700 evaluation starts" +"2020-05-20 18:20:03.083 UTC [cauthdsl] func2 -> DEBU 7c9 0xc000cbb480 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:03.083 UTC [cauthdsl] func2 -> DEBU 7ca 0xc000cbb480 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:03.083 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7cb Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-05-20 18:20:03.084 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7cc Checking if identity carries the admin ou for Org1MSP" +"2020-05-20 18:20:03.084 UTC [msp] Validate -> DEBU 7cd MSP Org1MSP validating identity" +"2020-05-20 18:20:03.085 UTC [msp] getCertificationChain -> DEBU 7ce MSP Org1MSP getting certification chain" +"2020-05-20 18:20:03.086 UTC [msp] hasOURole -> DEBU 7cf MSP Org1MSP checking if the identity is a client" +"2020-05-20 18:20:03.086 UTC [msp] getCertificationChain -> DEBU 7d0 MSP Org1MSP getting certification chain" +"2020-05-20 18:20:03.086 UTC [cauthdsl] func2 -> DEBU 7d1 0xc000cbb480 principal matched by identity 0" +"2020-05-20 18:20:03.086 UTC [msp.identity] Verify -> DEBU 7d2 Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.|" +"2020-05-20 18:20:03.087 UTC [msp.identity] Verify -> DEBU 7d3 Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +00000040 b6 a1 df 24 f2 fb af |...$...|" +"2020-05-20 18:20:03.087 UTC [cauthdsl] func2 -> DEBU 7d4 0xc000cbb480 principal evaluation succeeds for identity 0" +"2020-05-20 18:20:03.087 UTC [cauthdsl] func1 -> DEBU 7d5 0xc000cbb480 gate 1589998803083388700 evaluation succeeds" +"2020-05-20 18:20:03.087 UTC [policies] Evaluate -> DEBU 7d6 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.087 UTC [policies] Evaluate -> DEBU 7d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.088 UTC [common.configtx] verifyDeltaSet -> DEBU 7d8 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:03.088 UTC [common.configtx] recurseConfigMap -> DEBU 7d9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.088 UTC [common.configtx] recurseConfigMap -> DEBU 7da Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.089 UTC [common.configtx] recurseConfigMap -> DEBU 7db Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.089 UTC [common.configtx] recurseConfigMap -> DEBU 7dc Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.089 UTC [common.configtx] recurseConfigMap -> DEBU 7dd Setting policy for key Admins to " +"2020-05-20 18:20:03.089 UTC [common.configtx] recurseConfigMap -> DEBU 7de Setting policy for key Readers to " +"2020-05-20 18:20:03.090 UTC [common.configtx] recurseConfigMap -> DEBU 7df Setting policy for key Writers to " +"2020-05-20 18:20:03.090 UTC [common.configtx] recurseConfigMap -> DEBU 7e0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.091 UTC [common.configtx] recurseConfigMap -> DEBU 7e1 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.091 UTC [common.configtx] recurseConfigMap -> DEBU 7e2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.091 UTC [common.configtx] recurseConfigMap -> DEBU 7e3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e4 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e7 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.092 UTC [common.configtx] recurseConfigMap -> DEBU 7e8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7e9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7ea Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7eb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7ec Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7ed Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.093 UTC [common.configtx] recurseConfigMap -> DEBU 7ee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.094 UTC [common.channelconfig] NewStandardValues -> DEBU 7ef Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:20:03.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f0 Processing field: HashingAlgorithm" +"2020-05-20 18:20:03.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f1 Processing field: BlockDataHashingStructure" +"2020-05-20 18:20:03.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f2 Processing field: OrdererAddresses" +"2020-05-20 18:20:03.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f3 Processing field: Consortium" +"2020-05-20 18:20:03.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f4 Processing field: Capabilities" +"2020-05-20 18:20:03.095 UTC [common.channelconfig] NewStandardValues -> DEBU 7f5 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:20:03.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f6 Processing field: ConsensusType" +"2020-05-20 18:20:03.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f7 Processing field: BatchSize" +"2020-05-20 18:20:03.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f8 Processing field: BatchTimeout" +"2020-05-20 18:20:03.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f9 Processing field: KafkaBrokers" +"2020-05-20 18:20:03.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fa Processing field: ChannelRestrictions" +"2020-05-20 18:20:03.098 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fb Processing field: Capabilities" +"2020-05-20 18:20:03.098 UTC [common.channelconfig] NewStandardValues -> DEBU 7fc Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:20:03.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fd Processing field: Endpoints" +"2020-05-20 18:20:03.099 UTC [common.channelconfig] NewStandardValues -> DEBU 7fe Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ff Processing field: MSP" +"2020-05-20 18:20:03.100 UTC [common.channelconfig] validateMSP -> DEBU 800 Setting up MSP for org OrdererOrg" +"2020-05-20 18:20:03.100 UTC [msp] newBccspMsp -> DEBU 801 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.100 UTC [msp] New -> DEBU 802 Creating Cache-MSP instance" +"2020-05-20 18:20:03.100 UTC [msp] Setup -> DEBU 803 Setting up MSP instance OrdererMSP" +"2020-05-20 18:20:03.101 UTC [msp.identity] newIdentity -> DEBU 804 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.103 UTC [common.channelconfig] NewStandardValues -> DEBU 805 Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:20:03.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 806 Processing field: ACLs" +"2020-05-20 18:20:03.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 807 Processing field: Capabilities" +"2020-05-20 18:20:03.103 UTC [common.channelconfig] NewStandardValues -> DEBU 808 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:03.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 809 Processing field: AnchorPeers" +"2020-05-20 18:20:03.103 UTC [common.channelconfig] NewStandardValues -> DEBU 80a Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80b Processing field: MSP" +"2020-05-20 18:20:03.103 UTC [common.channelconfig] Validate -> DEBU 80c Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:20:03.103 UTC [common.channelconfig] validateMSP -> DEBU 80d Setting up MSP for org Org1MSP" +"2020-05-20 18:20:03.103 UTC [msp] newBccspMsp -> DEBU 80e Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.103 UTC [msp] New -> DEBU 80f Creating Cache-MSP instance" +"2020-05-20 18:20:03.103 UTC [msp] Setup -> DEBU 810 Setting up MSP instance Org1MSP" +"2020-05-20 18:20:03.103 UTC [msp.identity] newIdentity -> DEBU 811 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.105 UTC [common.channelconfig] NewStandardValues -> DEBU 812 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:03.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 813 Processing field: AnchorPeers" +"2020-05-20 18:20:03.105 UTC [common.channelconfig] NewStandardValues -> DEBU 814 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 815 Processing field: MSP" +"2020-05-20 18:20:03.105 UTC [common.channelconfig] Validate -> DEBU 816 Anchor peers for org Org2MSP are " +"2020-05-20 18:20:03.105 UTC [common.channelconfig] validateMSP -> DEBU 817 Setting up MSP for org Org2MSP" +"2020-05-20 18:20:03.105 UTC [msp] newBccspMsp -> DEBU 818 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.105 UTC [msp] New -> DEBU 819 Creating Cache-MSP instance" +"2020-05-20 18:20:03.105 UTC [msp] Setup -> DEBU 81a Setting up MSP instance Org2MSP" +"2020-05-20 18:20:03.106 UTC [msp.identity] newIdentity -> DEBU 81b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.107 UTC [msp] Setup -> DEBU 81c Setting up the MSP manager (3 msps)" +"2020-05-20 18:20:03.107 UTC [msp] Setup -> DEBU 81d MSP manager setup complete, setup 3 msps" +"2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 81e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 81f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 820 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 821 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 822 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 823 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 824 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:20:03.107 UTC [policies] NewManagerImpl -> DEBU 825 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 826 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 827 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 828 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 829 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82a Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82b Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.108 UTC [policies] GetPolicy -> DEBU 82c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82d Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82e Proposed new policy Readers for Channel/Application" +"2020-05-20 18:20:03.108 UTC [policies] NewManagerImpl -> DEBU 82f Proposed new policy Writers for Channel/Application" +"2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 830 Proposed new policy Admins for Channel/Application" +"2020-05-20 18:20:03.109 UTC [policies] GetPolicy -> DEBU 831 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 832 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 833 Proposed new policy Writers for Channel" +"2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 834 Proposed new policy Admins for Channel" +"2020-05-20 18:20:03.109 UTC [policies] NewManagerImpl -> DEBU 835 Proposed new policy Readers for Channel" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 836 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 837 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 838 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 839 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83d Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 83f Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 840 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 841 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 842 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 843 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 844 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 845 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:20:03.109 UTC [common.configtx] addToMap -> DEBU 846 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:03.110 UTC [common.configtx] addToMap -> DEBU 847 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:03.110 UTC [common.configtx] addToMap -> DEBU 848 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:03.110 UTC [common.configtx] addToMap -> DEBU 849 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:03.110 UTC [common.configtx] addToMap -> DEBU 84a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84d Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 84f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 850 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 851 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 852 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 853 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 854 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 855 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 856 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:20:03.111 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:20:03.112 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:20:03.112 UTC [common.channelconfig] LogSanityChecks -> DEBU 862 As expected, current configuration has policy '/Channel/Readers'" +"2020-05-20 18:20:03.112 UTC [common.channelconfig] LogSanityChecks -> DEBU 863 As expected, current configuration has policy '/Channel/Writers'" +"2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 864 Manager Channel looking up path [Application]" +"2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 865 Manager Channel has managers Orderer" +"2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 866 Manager Channel has managers Application" +"2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 867 Manager Channel/Application looking up path []" +"2020-05-20 18:20:03.112 UTC [policies] Manager -> DEBU 868 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 869 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:03.113 UTC [common.channelconfig] LogSanityChecks -> DEBU 86a As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-05-20 18:20:03.113 UTC [common.channelconfig] LogSanityChecks -> DEBU 86b As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-05-20 18:20:03.113 UTC [common.channelconfig] LogSanityChecks -> DEBU 86c As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 86d Manager Channel looking up path [Orderer]" +"2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 86e Manager Channel has managers Orderer" +"2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 86f Manager Channel has managers Application" +"2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 870 Manager Channel/Orderer looking up path []" +"2020-05-20 18:20:03.113 UTC [policies] Manager -> DEBU 871 Manager Channel/Orderer has managers OrdererOrg" +"2020-05-20 18:20:03.113 UTC [common.channelconfig] LogSanityChecks -> DEBU 872 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-05-20 18:20:03.114 UTC [common.channelconfig] LogSanityChecks -> DEBU 873 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-05-20 18:20:03.114 UTC [common.channelconfig] LogSanityChecks -> DEBU 874 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-05-20 18:20:03.114 UTC [common.channelconfig] LogSanityChecks -> DEBU 875 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-05-20 18:20:03.114 UTC [common.capabilities] Supported -> DEBU 876 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:20:03.114 UTC [common.capabilities] Supported -> DEBU 877 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:20:03.114 UTC [msp] GetDefaultSigningIdentity -> DEBU 878 Obtaining default signing identity" +"2020-05-20 18:20:03.114 UTC [msp] GetDefaultSigningIdentity -> DEBU 879 Obtaining default signing identity" +"2020-05-20 18:20:03.114 UTC [msp.identity] Sign -> DEBU 87a Sign: plaintext: 0AEA060A1B08011A0608D3E995F60522...C66E733554218309DC4ACB757D7C067C " +"2020-05-20 18:20:03.114 UTC [msp.identity] Sign -> DEBU 87b Sign: digest: 11B8814557B376228FE31A03C3912F867E72D9F3AA71799765BC309D33CCE612 " +"2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 87c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 87d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 87e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 87f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:03.115 UTC [policies] Evaluate -> DEBU 880 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:20:03.115 UTC [msp] DeserializeIdentity -> DEBU 881 Obtaining identity" +"2020-05-20 18:20:03.115 UTC [msp.identity] newIdentity -> DEBU 882 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.116 UTC [cauthdsl] func1 -> DEBU 883 0xc0009d8b20 gate 1589998803115929500 evaluation starts" +"2020-05-20 18:20:03.116 UTC [cauthdsl] func2 -> DEBU 884 0xc0009d8b20 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:03.116 UTC [cauthdsl] func2 -> DEBU 885 0xc0009d8b20 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:03.116 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 886 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-05-20 18:20:03.116 UTC [msp] Validate -> DEBU 887 MSP OrdererMSP validating identity" +"2020-05-20 18:20:03.116 UTC [msp] getCertificationChain -> DEBU 888 MSP OrdererMSP getting certification chain" +"2020-05-20 18:20:03.116 UTC [cauthdsl] func2 -> DEBU 889 0xc0009d8b20 principal matched by identity 0" +"2020-05-20 18:20:03.116 UTC [msp.identity] Verify -> DEBU 88a Verify: digest = 00000000 11 b8 81 45 57 b3 76 22 8f e3 1a 03 c3 91 2f 86 |...EW.v"....../.| +00000010 7e 72 d9 f3 aa 71 79 97 65 bc 30 9d 33 cc e6 12 |~r...qy.e.0.3...|" +"2020-05-20 18:20:03.116 UTC [msp.identity] Verify -> DEBU 88b Verify: sig = 00000000 30 45 02 21 00 a2 a0 2b cc a7 6e 38 18 f4 da de |0E.!...+..n8....| +00000010 55 a1 da 90 8d 69 4c 45 cd 0b c0 36 18 d5 5a 21 |U....iLE...6..Z!| +00000020 fa 5f 93 bc 1f 02 20 5b 9e 95 84 5c e6 2b cc d1 |._.... [...\.+..| +00000030 f5 6c a3 3f bd 2e 63 05 ad db bb 57 a1 1c cd 2d |.l.?..c....W...-| +00000040 85 68 ef ee ee 6d 09 |.h...m.|" +"2020-05-20 18:20:03.117 UTC [cauthdsl] func2 -> DEBU 88c 0xc0009d8b20 principal evaluation succeeds for identity 0" +"2020-05-20 18:20:03.117 UTC [cauthdsl] func1 -> DEBU 88d 0xc0009d8b20 gate 1589998803115929500 evaluation succeeds" +"2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 88e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 88f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 890 Signature set satisfies policy /Channel/Orderer/Writers" +"2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 891 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 892 Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:20:03.117 UTC [policies] Evaluate -> DEBU 893 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:20:03.117 UTC [orderer.common.msgprocessor] Apply -> DEBU 894 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-05-20 18:20:03.117 UTC [common.channelconfig] NewStandardValues -> DEBU 895 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 896 Processing field: HashingAlgorithm" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 897 Processing field: BlockDataHashingStructure" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 898 Processing field: OrdererAddresses" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 899 Processing field: Consortium" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89a Processing field: Capabilities" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] NewStandardValues -> DEBU 89b Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: ACLs" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: Capabilities" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] NewStandardValues -> DEBU 89e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89f Processing field: AnchorPeers" +"2020-05-20 18:20:03.118 UTC [common.channelconfig] NewStandardValues -> DEBU 8a0 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a1 Processing field: MSP" +"2020-05-20 18:20:03.119 UTC [common.channelconfig] Validate -> DEBU 8a2 Anchor peers for org Org2MSP are " +"2020-05-20 18:20:03.119 UTC [common.channelconfig] validateMSP -> DEBU 8a3 Setting up MSP for org Org2MSP" +"2020-05-20 18:20:03.119 UTC [msp] newBccspMsp -> DEBU 8a4 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.119 UTC [msp] New -> DEBU 8a5 Creating Cache-MSP instance" +"2020-05-20 18:20:03.119 UTC [msp] Setup -> DEBU 8a6 Setting up MSP instance Org2MSP" +"2020-05-20 18:20:03.119 UTC [msp.identity] newIdentity -> DEBU 8a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.119 UTC [common.channelconfig] NewStandardValues -> DEBU 8a8 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:03.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a9 Processing field: AnchorPeers" +"2020-05-20 18:20:03.120 UTC [common.channelconfig] NewStandardValues -> DEBU 8aa Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ab Processing field: MSP" +"2020-05-20 18:20:03.120 UTC [common.channelconfig] Validate -> DEBU 8ac Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:20:03.120 UTC [common.channelconfig] validateMSP -> DEBU 8ad Setting up MSP for org Org1MSP" +"2020-05-20 18:20:03.120 UTC [msp] newBccspMsp -> DEBU 8ae Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.120 UTC [msp] New -> DEBU 8af Creating Cache-MSP instance" +"2020-05-20 18:20:03.120 UTC [msp] Setup -> DEBU 8b0 Setting up MSP instance Org1MSP" +"2020-05-20 18:20:03.120 UTC [msp.identity] newIdentity -> DEBU 8b1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8b2 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b3 Processing field: ConsensusType" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: BatchSize" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b5 Processing field: BatchTimeout" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b6 Processing field: KafkaBrokers" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b7 Processing field: ChannelRestrictions" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b8 Processing field: Capabilities" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8b9 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ba Processing field: Endpoints" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] NewStandardValues -> DEBU 8bb Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bc Processing field: MSP" +"2020-05-20 18:20:03.121 UTC [common.channelconfig] validateMSP -> DEBU 8bd Setting up MSP for org OrdererOrg" +"2020-05-20 18:20:03.121 UTC [msp] newBccspMsp -> DEBU 8be Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.121 UTC [msp] New -> DEBU 8bf Creating Cache-MSP instance" +"2020-05-20 18:20:03.122 UTC [msp] Setup -> DEBU 8c0 Setting up MSP instance OrdererMSP" +"2020-05-20 18:20:03.122 UTC [msp.identity] newIdentity -> DEBU 8c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.122 UTC [msp] Setup -> DEBU 8c2 Setting up the MSP manager (3 msps)" +"2020-05-20 18:20:03.122 UTC [msp] Setup -> DEBU 8c3 MSP manager setup complete, setup 3 msps" +"2020-05-20 18:20:03.122 UTC [policies] NewManagerImpl -> DEBU 8c4 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.122 UTC [policies] NewManagerImpl -> DEBU 8c5 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8c6 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8c7 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8c8 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8c9 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8ca Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.123 UTC [policies] GetPolicy -> DEBU 8cb Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8cc Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:20:03.123 UTC [policies] GetPolicy -> DEBU 8cd Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8ce Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8cf Proposed new policy Readers for Channel/Application" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d0 Proposed new policy Writers for Channel/Application" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d1 Proposed new policy Admins for Channel/Application" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.123 UTC [policies] NewManagerImpl -> DEBU 8d5 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8d6 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8d7 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8d8 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8d9 Proposed new policy Writers for Channel" +"2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8da Proposed new policy Admins for Channel" +"2020-05-20 18:20:03.124 UTC [policies] NewManagerImpl -> DEBU 8db Proposed new policy Readers for Channel" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8dc Adding to config map: [Group] /Channel" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8dd Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8de Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8df Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e4 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:03.124 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f0 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f1 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:03.125 UTC [common.configtx] addToMap -> DEBU 8f6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8f7 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8f8 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8f9 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fa Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fb Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fc Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fd Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8fe Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:20:03.126 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:20:03.127 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:20:03.127 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:20:03.127 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:20:03.127 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 908 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:53450" +"2020-05-20 18:20:03.127 UTC [orderer.consensus.etcdraft] propose -> INFO 909 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-05-20 18:20:03.127 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 90a Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-05-20 18:20:03.128 UTC [orderer.consensus.etcdraft] 2 -> DEBU 90b Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2020-05-20 18:20:03.132 UTC [grpc] warningf -> DEBU 90c transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:53450: read: connection reset by peer" +"2020-05-20 18:20:03.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 90d Sending msg of 27268 bytes to 2 on channel businesschannel took 22.6µs" +"2020-05-20 18:20:03.132 UTC [orderer.common.broadcast] Handle -> WARN 90e Error reading from 172.18.0.9:53450: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:20:03.132 UTC [orderer.common.server] func1 -> DEBU 90f Closing Broadcast stream" +"2020-05-20 18:20:03.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 910 Sending msg of 27268 bytes to 3 on channel businesschannel took 17.1µs" +"2020-05-20 18:20:03.132 UTC [comm.grpc.server] 1 -> INFO 911 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53450 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=64.8212ms +"2020-05-20 18:20:03.132 UTC [grpc] infof -> DEBU 912 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:20:03.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 913 Send of ConsensusRequest for channel businesschannel with payload of size 27268 to orderer2.example.com(orderer2.example.com:7050) took 296.2µs " +"2020-05-20 18:20:03.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 914 Send of ConsensusRequest for channel businesschannel with payload of size 27268 to orderer1.example.com(orderer1.example.com:7050) took 138.8µs " +"2020-05-20 18:20:03.136 UTC [orderer.common.cluster.step] handleMessage -> DEBU 915 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:03.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 916 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2020-05-20 18:20:03.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 917 Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +"2020-05-20 18:20:03.137 UTC [orderer.common.cluster.step] sendMessage -> DEBU 918 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 285.3µs " +"2020-05-20 18:20:03.137 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 919 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2020-05-20 18:20:03.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU 91a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:03.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU 91b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.7µs " +"2020-05-20 18:20:03.142 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Group] /Channel" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 925 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 926 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:03.143 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.144 UTC [common.configtx] verifyDeltaSet -> DEBU 92b Processing change to key: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.144 UTC [common.configtx] policyForItem -> DEBU 92c Getting policy for item Org1MSP with mod_policy Admins" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 92d Manager Channel looking up path [Application]" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 92e Manager Channel has managers Orderer" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 92f Manager Channel has managers Application" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 930 Manager Channel/Application looking up path []" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 931 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 932 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 933 Manager Channel/Application looking up path [Org1MSP]" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 934 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 935 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:03.144 UTC [policies] Manager -> DEBU 936 Manager Channel/Application/Org1MSP looking up path []" +"2020-05-20 18:20:03.144 UTC [policies] Evaluate -> DEBU 937 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-05-20 18:20:03.144 UTC [cauthdsl] func1 -> DEBU 938 0xc000d2c250 gate 1589998803144945600 evaluation starts" +"2020-05-20 18:20:03.145 UTC [cauthdsl] func2 -> DEBU 939 0xc000d2c250 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:03.145 UTC [cauthdsl] func2 -> DEBU 93a 0xc000d2c250 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:03.145 UTC [cauthdsl] func2 -> DEBU 93b 0xc000d2c250 principal matched by identity 0" +"2020-05-20 18:20:03.145 UTC [msp.identity] Verify -> DEBU 93c Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.|" +"2020-05-20 18:20:03.145 UTC [msp.identity] Verify -> DEBU 93d Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +00000040 b6 a1 df 24 f2 fb af |...$...|" +"2020-05-20 18:20:03.146 UTC [cauthdsl] func2 -> DEBU 93e 0xc000d2c250 principal evaluation succeeds for identity 0" +"2020-05-20 18:20:03.146 UTC [cauthdsl] func1 -> DEBU 93f 0xc000d2c250 gate 1589998803144945600 evaluation succeeds" +"2020-05-20 18:20:03.146 UTC [policies] Evaluate -> DEBU 940 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.146 UTC [policies] Evaluate -> DEBU 941 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 942 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:03.146 UTC [common.configtx] verifyDeltaSet -> DEBU 943 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:03.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 944 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 945 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 946 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 947 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 948 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 949 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94b Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 94f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 950 Setting policy for key Readers to " +"2020-05-20 18:20:03.147 UTC [common.deliver] Handle -> WARN 951 Error reading from 172.18.0.9:53448: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:20:03.147 UTC [orderer.common.server] func1 -> DEBU 952 Closing Deliver stream" +"2020-05-20 18:20:03.147 UTC [comm.grpc.server] 1 -> INFO 953 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53448 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=105.1563ms +"2020-05-20 18:20:03.147 UTC [grpc] infof -> DEBU 954 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:20:03.146 UTC [common.configtx] recurseConfigMap -> DEBU 955 Setting policy for key Writers to " +"2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 956 Setting policy for key Admins to " +"2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 957 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 958 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 959 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 95a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 95b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 95c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.148 UTC [common.configtx] recurseConfigMap -> DEBU 95d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.149 UTC [common.configtx] recurseConfigMap -> DEBU 95e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:03.149 UTC [common.channelconfig] NewStandardValues -> DEBU 95f Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 960 Processing field: HashingAlgorithm" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 961 Processing field: BlockDataHashingStructure" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 962 Processing field: OrdererAddresses" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 963 Processing field: Consortium" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 964 Processing field: Capabilities" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] NewStandardValues -> DEBU 965 Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 966 Processing field: ACLs" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 967 Processing field: Capabilities" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] NewStandardValues -> DEBU 968 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 969 Processing field: AnchorPeers" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] NewStandardValues -> DEBU 96a Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96b Processing field: MSP" +"2020-05-20 18:20:03.149 UTC [common.channelconfig] Validate -> DEBU 96c Anchor peers for org Org2MSP are " +"2020-05-20 18:20:03.149 UTC [common.channelconfig] validateMSP -> DEBU 96d Setting up MSP for org Org2MSP" +"2020-05-20 18:20:03.149 UTC [msp] newBccspMsp -> DEBU 96e Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.149 UTC [msp] New -> DEBU 96f Creating Cache-MSP instance" +"2020-05-20 18:20:03.149 UTC [msp] Setup -> DEBU 970 Setting up MSP instance Org2MSP" +"2020-05-20 18:20:03.150 UTC [msp.identity] newIdentity -> DEBU 971 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.150 UTC [common.channelconfig] NewStandardValues -> DEBU 972 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:03.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 973 Processing field: AnchorPeers" +"2020-05-20 18:20:03.154 UTC [common.channelconfig] NewStandardValues -> DEBU 974 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 975 Processing field: MSP" +"2020-05-20 18:20:03.154 UTC [common.channelconfig] Validate -> DEBU 976 Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:20:03.154 UTC [common.channelconfig] validateMSP -> DEBU 977 Setting up MSP for org Org1MSP" +"2020-05-20 18:20:03.154 UTC [msp] newBccspMsp -> DEBU 978 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.154 UTC [msp] New -> DEBU 979 Creating Cache-MSP instance" +"2020-05-20 18:20:03.154 UTC [msp] Setup -> DEBU 97a Setting up MSP instance Org1MSP" +"2020-05-20 18:20:03.155 UTC [msp.identity] newIdentity -> DEBU 97b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.155 UTC [common.channelconfig] NewStandardValues -> DEBU 97c Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:20:03.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97d Processing field: ConsensusType" +"2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97e Processing field: BatchSize" +"2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97f Processing field: BatchTimeout" +"2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 980 Processing field: KafkaBrokers" +"2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 981 Processing field: ChannelRestrictions" +"2020-05-20 18:20:03.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 982 Processing field: Capabilities" +"2020-05-20 18:20:03.157 UTC [common.channelconfig] NewStandardValues -> DEBU 983 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:20:03.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 984 Processing field: Endpoints" +"2020-05-20 18:20:03.157 UTC [common.channelconfig] NewStandardValues -> DEBU 985 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:03.157 UTC [common.channelconfig] initializeProtosStruct -> DEBU 986 Processing field: MSP" +"2020-05-20 18:20:03.157 UTC [common.channelconfig] validateMSP -> DEBU 987 Setting up MSP for org OrdererOrg" +"2020-05-20 18:20:03.157 UTC [msp] newBccspMsp -> DEBU 988 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:03.157 UTC [msp] New -> DEBU 989 Creating Cache-MSP instance" +"2020-05-20 18:20:03.158 UTC [msp] Setup -> DEBU 98a Setting up MSP instance OrdererMSP" +"2020-05-20 18:20:03.159 UTC [msp.identity] newIdentity -> DEBU 98b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:20:03.160 UTC [msp] Setup -> DEBU 98c Setting up the MSP manager (3 msps)" +"2020-05-20 18:20:03.160 UTC [msp] Setup -> DEBU 98d MSP manager setup complete, setup 3 msps" +"2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 98f Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 990 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 991 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 992 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.160 UTC [policies] NewManagerImpl -> DEBU 993 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 994 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:20:03.161 UTC [policies] GetPolicy -> DEBU 995 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 996 Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Readers for Channel/Application" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Writers for Channel/Application" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Admins for Channel/Application" +"2020-05-20 18:20:03.161 UTC [policies] GetPolicy -> DEBU 99a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99c Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99d Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 99f Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a0 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a1 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a2 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a3 Proposed new policy Writers for Channel" +"2020-05-20 18:20:03.161 UTC [policies] NewManagerImpl -> DEBU 9a4 Proposed new policy Admins for Channel" +"2020-05-20 18:20:03.162 UTC [policies] NewManagerImpl -> DEBU 9a5 Proposed new policy Readers for Channel" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:03.162 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:03.163 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:20:03.164 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9cc Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9cd Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9ce Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9cf Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:20:03.165 UTC [common.configtx] addToMap -> DEBU 9d0 Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:20:03.166 UTC [common.configtx] addToMap -> DEBU 9d1 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:20:03.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d2 As expected, current configuration has policy '/Channel/Readers'" +"2020-05-20 18:20:03.166 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d3 As expected, current configuration has policy '/Channel/Writers'" +"2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d4 Manager Channel looking up path [Application]" +"2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d5 Manager Channel has managers Application" +"2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d6 Manager Channel has managers Orderer" +"2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d7 Manager Channel/Application looking up path []" +"2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d8 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:03.166 UTC [policies] Manager -> DEBU 9d9 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9da As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9db As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9dc As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9dd Manager Channel looking up path [Orderer]" +"2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9de Manager Channel has managers Application" +"2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9df Manager Channel has managers Orderer" +"2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9e0 Manager Channel/Orderer looking up path []" +"2020-05-20 18:20:03.167 UTC [policies] Manager -> DEBU 9e1 Manager Channel/Orderer has managers OrdererOrg" +"2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e2 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e3 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e4 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-05-20 18:20:03.167 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e5 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-05-20 18:20:03.167 UTC [common.capabilities] Supported -> DEBU 9e6 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:20:03.167 UTC [common.capabilities] Supported -> DEBU 9e7 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:20:03.168 UTC [orderer.common.server] func1 -> DEBU 9e8 Executing callback to update root CAs" +"2020-05-20 18:20:03.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e9 updating root CAs for channel [businesschannel]" +"2020-05-20 18:20:03.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9ea adding app root CAs for MSP [Org2MSP]" +"2020-05-20 18:20:03.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9eb adding app root CAs for MSP [Org1MSP]" +"2020-05-20 18:20:03.168 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9ec adding orderer root CAs for MSP [OrdererMSP]" +"2020-05-20 18:20:03.170 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9ed [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2020-05-20 18:20:03.170 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9ee [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2020-05-20 18:20:03.170 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ef Obtaining default signing identity" +"2020-05-20 18:20:03.170 UTC [msp] GetDefaultSigningIdentity -> DEBU 9f0 Obtaining default signing identity" +"2020-05-20 18:20:03.170 UTC [msp.identity] Sign -> DEBU 9f1 Sign: plaintext: 0A020801120B0A090A03010203100418...E9BAC567312B232F0AD2484897D67734 " +"2020-05-20 18:20:03.170 UTC [msp.identity] Sign -> DEBU 9f2 Sign: digest: 5D0AE9896F8618D0833712F9E1CE041529D25B8DAB149077BC8331FD4D2E13D9 " +"2020-05-20 18:20:03.172 UTC [fsblkstorage] indexBlock -> DEBU 9f3 Indexing block [blockNum=1, blockHash=[]byte{0xa6, 0xe9, 0x70, 0x63, 0xe3, 0xe8, 0x98, 0x1e, 0x14, 0xfd, 0x2a, 0x6f, 0x3d, 0xd9, 0x24, 0x28, 0x30, 0xda, 0x1, 0x2c, 0xc0, 0x6d, 0x3f, 0xca, 0x43, 0xa9, 0xc8, 0x4, 0x6b, 0x7f, 0xa7, 0x8c} txOffsets= +txId=5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d locPointer=offset=71, bytesLength=27137 +]" +"2020-05-20 18:20:03.175 UTC [fsblkstorage] updateCheckpoint -> DEBU 9f4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56644], isChainEmpty=[false], lastBlockNumber=[1]" +"2020-05-20 18:20:03.175 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9f5 [channel: businesschannel] Wrote block [1]" +"2020-05-20 18:20:03.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:03.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f7 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +"2020-05-20 18:20:03.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 309.2µs " +"2020-05-20 18:20:03.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f9 Sending msg of 28 bytes to 2 on channel businesschannel took 187.2µs" +"2020-05-20 18:20:03.447 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fa Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +"2020-05-20 18:20:03.447 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 537.2µs " +"2020-05-20 18:20:03.447 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 202.1µs " +"2020-05-20 18:20:03.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:03.450 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fe Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:03.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9ff Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:03.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a00 Sending msg of 28 bytes to 3 on channel testchainid took 16.2µs" +"2020-05-20 18:20:03.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU a01 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +"2020-05-20 18:20:03.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a02 Sending msg of 28 bytes to 2 on channel businesschannel took 90.2µs" +"2020-05-20 18:20:03.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a03 Sending msg of 28 bytes to 3 on channel businesschannel took 34.9µs" +"2020-05-20 18:20:03.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU a04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 765.1µs " +"2020-05-20 18:20:03.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU a05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 992.6µs " +"2020-05-20 18:20:03.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU a06 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:03.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU a07 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:04.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU a08 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:04.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU a09 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.3µs " +"2020-05-20 18:20:04.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0a Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2020-05-20 18:20:04.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0b Sending msg of 28 bytes to 3 on channel businesschannel took 29.5µs" +"2020-05-20 18:20:04.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0c Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +"2020-05-20 18:20:04.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 607.3µs " +"2020-05-20 18:20:04.447 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 899.9µs " +"2020-05-20 18:20:04.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:04.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU a10 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:04.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU a11 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:04.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +"2020-05-20 18:20:04.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU a13 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 331µs " +"2020-05-20 18:20:04.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a14 Sending msg of 28 bytes to 2 on channel businesschannel took 269.9µs" +"2020-05-20 18:20:04.947 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a15 Sending msg of 28 bytes to 3 on channel businesschannel took 27.8µs" +"2020-05-20 18:20:04.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU a16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 418.4µs " +"2020-05-20 18:20:04.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU a17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 273.3µs " +"2020-05-20 18:20:04.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU a18 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:04.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU a19 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:05.319 UTC [orderer.common.server] Deliver -> DEBU a1a Starting new Deliver handler" +"2020-05-20 18:20:05.320 UTC [common.deliver] Handle -> DEBU a1b Starting new deliver loop for 172.18.0.9:53452" +"2020-05-20 18:20:05.320 UTC [common.deliver] Handle -> DEBU a1c Attempting to read seek info message from 172.18.0.9:53452" +"2020-05-20 18:20:05.337 UTC [orderer.common.server] Broadcast -> DEBU a1d Starting new Broadcast handler" +"2020-05-20 18:20:05.337 UTC [orderer.common.broadcast] Handle -> DEBU a1e Starting new broadcast loop for 172.18.0.9:53454" +"2020-05-20 18:20:05.338 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a1f [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:53454" +"2020-05-20 18:20:05.338 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a20 Processing config update message for exisitng channel businesschannel" +"2020-05-20 18:20:05.338 UTC [policies] Evaluate -> DEBU a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:20:05.339 UTC [policies] Evaluate -> DEBU a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:05.339 UTC [policies] Evaluate -> DEBU a23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-05-20 18:20:05.339 UTC [policies] Evaluate -> DEBU a24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:05.339 UTC [policies] Evaluate -> DEBU a25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-05-20 18:20:05.340 UTC [msp] DeserializeIdentity -> DEBU a26 Obtaining identity" +"2020-05-20 18:20:05.340 UTC [msp.identity] newIdentity -> DEBU a27 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.341 UTC [cauthdsl] func1 -> DEBU a28 0xc0011063f0 gate 1589998805341621200 evaluation starts" +"2020-05-20 18:20:05.342 UTC [cauthdsl] func2 -> DEBU a29 0xc0011063f0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:05.342 UTC [cauthdsl] func2 -> DEBU a2a 0xc0011063f0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:05.342 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a2b Checking if identity satisfies MEMBER role for Org2MSP" +"2020-05-20 18:20:05.342 UTC [msp] Validate -> DEBU a2c MSP Org2MSP validating identity" +"2020-05-20 18:20:05.343 UTC [msp] getCertificationChain -> DEBU a2d MSP Org2MSP getting certification chain" +"2020-05-20 18:20:05.343 UTC [cauthdsl] func2 -> DEBU a2e 0xc0011063f0 principal matched by identity 0" +"2020-05-20 18:20:05.344 UTC [msp.identity] Verify -> DEBU a2f Verify: digest = 00000000 b4 40 df 75 2f af c4 27 dc ed 4d 87 b6 ce 86 a8 |.@.u/..'..M.....| +00000010 7d b7 3d 86 04 5f b9 e5 32 a5 c9 da 35 06 6c f5 |}.=.._..2...5.l.|" +"2020-05-20 18:20:05.344 UTC [msp.identity] Verify -> DEBU a30 Verify: sig = 00000000 30 44 02 20 0f e0 57 53 40 3e 26 1d 72 e3 3f 5e |0D. ..WS@>&.r.?^| +00000010 e7 91 ce 02 fe 06 8b 8d 91 4c 31 89 4c 49 72 8c |.........L1.LIr.| +00000020 45 ff 03 04 02 20 78 aa ae 54 93 4c 99 bc c7 36 |E.... x..T.L...6| +00000030 10 78 ac 2b 05 cc 2c af ae 4d 42 3e c1 e5 5e 3d |.x.+..,..MB>..^=| +00000040 b5 67 24 4c d8 1d |.g$L..|" +"2020-05-20 18:20:05.345 UTC [cauthdsl] func2 -> DEBU a31 0xc0011063f0 principal evaluation succeeds for identity 0" +"2020-05-20 18:20:05.345 UTC [cauthdsl] func1 -> DEBU a32 0xc0011063f0 gate 1589998805341621200 evaluation succeeds" +"2020-05-20 18:20:05.345 UTC [policies] Evaluate -> DEBU a33 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.345 UTC [policies] Evaluate -> DEBU a34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.346 UTC [policies] Evaluate -> DEBU a35 Signature set satisfies policy /Channel/Application/Writers" +"2020-05-20 18:20:05.346 UTC [policies] Evaluate -> DEBU a36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-05-20 18:20:05.347 UTC [policies] Evaluate -> DEBU a37 Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:20:05.347 UTC [policies] Evaluate -> DEBU a38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:20:05.348 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:05.348 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:05.348 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.349 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:05.349 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:05.349 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.349 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.350 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:05.350 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:05.350 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.350 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:05.351 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:20:05.351 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:05.351 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.352 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.352 UTC [common.configtx] verifyDeltaSet -> DEBU a48 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:20:05.352 UTC [common.configtx] verifyDeltaSet -> DEBU a49 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.352 UTC [common.configtx] policyForItem -> DEBU a4a Getting policy for item Org2MSP with mod_policy Admins" +"2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4b Manager Channel looking up path [Application]" +"2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4c Manager Channel has managers Application" +"2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4d Manager Channel has managers Orderer" +"2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4e Manager Channel/Application looking up path []" +"2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a4f Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:05.353 UTC [policies] Manager -> DEBU a50 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:05.354 UTC [policies] Manager -> DEBU a51 Manager Channel/Application looking up path [Org2MSP]" +"2020-05-20 18:20:05.354 UTC [policies] Manager -> DEBU a52 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:05.354 UTC [policies] Manager -> DEBU a53 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:05.354 UTC [policies] Manager -> DEBU a54 Manager Channel/Application/Org2MSP looking up path []" +"2020-05-20 18:20:05.355 UTC [policies] Evaluate -> DEBU a55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-05-20 18:20:05.355 UTC [cauthdsl] func1 -> DEBU a56 0xc001123bc0 gate 1589998805355281900 evaluation starts" +"2020-05-20 18:20:05.355 UTC [cauthdsl] func2 -> DEBU a57 0xc001123bc0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:05.355 UTC [cauthdsl] func2 -> DEBU a58 0xc001123bc0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:05.356 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a59 Checking if identity has been named explicitly as an admin for Org2MSP" +"2020-05-20 18:20:05.356 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a5a Checking if identity carries the admin ou for Org2MSP" +"2020-05-20 18:20:05.356 UTC [msp] Validate -> DEBU a5b MSP Org2MSP validating identity" +"2020-05-20 18:20:05.357 UTC [msp] getCertificationChain -> DEBU a5c MSP Org2MSP getting certification chain" +"2020-05-20 18:20:05.357 UTC [msp] hasOURole -> DEBU a5d MSP Org2MSP checking if the identity is a client" +"2020-05-20 18:20:05.357 UTC [msp] getCertificationChain -> DEBU a5e MSP Org2MSP getting certification chain" +"2020-05-20 18:20:05.358 UTC [cauthdsl] func2 -> DEBU a5f 0xc001123bc0 principal matched by identity 0" +"2020-05-20 18:20:05.358 UTC [msp.identity] Verify -> DEBU a60 Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D|" +"2020-05-20 18:20:05.358 UTC [msp.identity] Verify -> DEBU a61 Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +00000040 c1 0e dd 4e f6 78 ea |...N.x.|" +"2020-05-20 18:20:05.359 UTC [cauthdsl] func2 -> DEBU a62 0xc001123bc0 principal evaluation succeeds for identity 0" +"2020-05-20 18:20:05.359 UTC [cauthdsl] func1 -> DEBU a63 0xc001123bc0 gate 1589998805355281900 evaluation succeeds" +"2020-05-20 18:20:05.359 UTC [policies] Evaluate -> DEBU a64 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.359 UTC [policies] Evaluate -> DEBU a65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.360 UTC [common.configtx] recurseConfigMap -> DEBU a66 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.360 UTC [common.configtx] recurseConfigMap -> DEBU a67 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.361 UTC [common.configtx] recurseConfigMap -> DEBU a68 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.361 UTC [common.configtx] recurseConfigMap -> DEBU a69 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.361 UTC [common.configtx] recurseConfigMap -> DEBU a6a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.361 UTC [common.configtx] recurseConfigMap -> DEBU a6b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.362 UTC [common.configtx] recurseConfigMap -> DEBU a6c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.362 UTC [common.configtx] recurseConfigMap -> DEBU a6d Setting policy for key Readers to " +"2020-05-20 18:20:05.362 UTC [common.configtx] recurseConfigMap -> DEBU a6e Setting policy for key Writers to " +"2020-05-20 18:20:05.363 UTC [common.configtx] recurseConfigMap -> DEBU a6f Setting policy for key Admins to " +"2020-05-20 18:20:05.363 UTC [common.configtx] recurseConfigMap -> DEBU a70 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.363 UTC [common.configtx] recurseConfigMap -> DEBU a71 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.363 UTC [common.configtx] recurseConfigMap -> DEBU a72 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.364 UTC [common.configtx] recurseConfigMap -> DEBU a73 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.364 UTC [common.configtx] recurseConfigMap -> DEBU a74 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.364 UTC [common.configtx] recurseConfigMap -> DEBU a75 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.364 UTC [common.configtx] recurseConfigMap -> DEBU a76 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.365 UTC [common.configtx] recurseConfigMap -> DEBU a77 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.365 UTC [common.configtx] recurseConfigMap -> DEBU a78 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.365 UTC [common.configtx] recurseConfigMap -> DEBU a79 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.365 UTC [common.configtx] recurseConfigMap -> DEBU a7a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.366 UTC [common.channelconfig] NewStandardValues -> DEBU a7b Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:20:05.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7c Processing field: HashingAlgorithm" +"2020-05-20 18:20:05.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7d Processing field: BlockDataHashingStructure" +"2020-05-20 18:20:05.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7e Processing field: OrdererAddresses" +"2020-05-20 18:20:05.366 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7f Processing field: Consortium" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a80 Processing field: Capabilities" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] NewStandardValues -> DEBU a81 Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a82 Processing field: ACLs" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a83 Processing field: Capabilities" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] NewStandardValues -> DEBU a84 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a85 Processing field: AnchorPeers" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] NewStandardValues -> DEBU a86 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] initializeProtosStruct -> DEBU a87 Processing field: MSP" +"2020-05-20 18:20:05.367 UTC [common.channelconfig] Validate -> DEBU a88 Anchor peers for org Org2MSP are anchor_peers: " +"2020-05-20 18:20:05.367 UTC [common.channelconfig] validateMSP -> DEBU a89 Setting up MSP for org Org2MSP" +"2020-05-20 18:20:05.367 UTC [msp] newBccspMsp -> DEBU a8a Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.367 UTC [msp] New -> DEBU a8b Creating Cache-MSP instance" +"2020-05-20 18:20:05.367 UTC [msp] Setup -> DEBU a8c Setting up MSP instance Org2MSP" +"2020-05-20 18:20:05.368 UTC [msp.identity] newIdentity -> DEBU a8d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.368 UTC [common.channelconfig] NewStandardValues -> DEBU a8e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:05.368 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8f Processing field: AnchorPeers" +"2020-05-20 18:20:05.368 UTC [common.channelconfig] NewStandardValues -> DEBU a90 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.368 UTC [common.channelconfig] initializeProtosStruct -> DEBU a91 Processing field: MSP" +"2020-05-20 18:20:05.368 UTC [common.channelconfig] Validate -> DEBU a92 Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:20:05.368 UTC [common.channelconfig] validateMSP -> DEBU a93 Setting up MSP for org Org1MSP" +"2020-05-20 18:20:05.368 UTC [msp] newBccspMsp -> DEBU a94 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.368 UTC [msp] New -> DEBU a95 Creating Cache-MSP instance" +"2020-05-20 18:20:05.368 UTC [msp] Setup -> DEBU a96 Setting up MSP instance Org1MSP" +"2020-05-20 18:20:05.369 UTC [msp.identity] newIdentity -> DEBU a97 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] NewStandardValues -> DEBU a98 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a99 Processing field: ConsensusType" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9a Processing field: BatchSize" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9b Processing field: BatchTimeout" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9c Processing field: KafkaBrokers" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9d Processing field: ChannelRestrictions" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9e Processing field: Capabilities" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] NewStandardValues -> DEBU a9f Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] initializeProtosStruct -> DEBU aa0 Processing field: Endpoints" +"2020-05-20 18:20:05.369 UTC [common.channelconfig] NewStandardValues -> DEBU aa1 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.371 UTC [common.channelconfig] initializeProtosStruct -> DEBU aa2 Processing field: MSP" +"2020-05-20 18:20:05.371 UTC [common.channelconfig] validateMSP -> DEBU aa3 Setting up MSP for org OrdererOrg" +"2020-05-20 18:20:05.372 UTC [msp] newBccspMsp -> DEBU aa4 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.372 UTC [msp] New -> DEBU aa5 Creating Cache-MSP instance" +"2020-05-20 18:20:05.373 UTC [msp] Setup -> DEBU aa6 Setting up MSP instance OrdererMSP" +"2020-05-20 18:20:05.373 UTC [msp.identity] newIdentity -> DEBU aa7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.375 UTC [msp] Setup -> DEBU aa8 Setting up the MSP manager (3 msps)" +"2020-05-20 18:20:05.375 UTC [msp] Setup -> DEBU aa9 MSP manager setup complete, setup 3 msps" +"2020-05-20 18:20:05.376 UTC [policies] NewManagerImpl -> DEBU aaa Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.376 UTC [policies] NewManagerImpl -> DEBU aab Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.376 UTC [policies] NewManagerImpl -> DEBU aac Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.377 UTC [policies] NewManagerImpl -> DEBU aad Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.377 UTC [policies] NewManagerImpl -> DEBU aae Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.377 UTC [policies] NewManagerImpl -> DEBU aaf Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.378 UTC [policies] GetPolicy -> DEBU ab0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:05.378 UTC [policies] GetPolicy -> DEBU ab1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:05.378 UTC [policies] NewManagerImpl -> DEBU ab2 Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:20:05.379 UTC [policies] NewManagerImpl -> DEBU ab3 Proposed new policy Readers for Channel/Application" +"2020-05-20 18:20:05.379 UTC [policies] NewManagerImpl -> DEBU ab4 Proposed new policy Writers for Channel/Application" +"2020-05-20 18:20:05.380 UTC [policies] NewManagerImpl -> DEBU ab5 Proposed new policy Admins for Channel/Application" +"2020-05-20 18:20:05.380 UTC [policies] GetPolicy -> DEBU ab6 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:05.380 UTC [policies] GetPolicy -> DEBU ab7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:05.380 UTC [policies] NewManagerImpl -> DEBU ab8 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:20:05.381 UTC [policies] NewManagerImpl -> DEBU ab9 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.381 UTC [policies] NewManagerImpl -> DEBU aba Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.381 UTC [policies] NewManagerImpl -> DEBU abb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.382 UTC [policies] NewManagerImpl -> DEBU abc Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:20:05.382 UTC [policies] NewManagerImpl -> DEBU abd Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:20:05.382 UTC [policies] NewManagerImpl -> DEBU abe Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:20:05.382 UTC [policies] NewManagerImpl -> DEBU abf Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:20:05.383 UTC [policies] NewManagerImpl -> DEBU ac0 Proposed new policy Writers for Channel" +"2020-05-20 18:20:05.383 UTC [policies] NewManagerImpl -> DEBU ac1 Proposed new policy Admins for Channel" +"2020-05-20 18:20:05.383 UTC [policies] NewManagerImpl -> DEBU ac2 Proposed new policy Readers for Channel" +"2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac3 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac4 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:05.384 UTC [common.configtx] addToMap -> DEBU ac7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ac8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ac9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU aca Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU acb Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU acc Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU acd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ace Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU acf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad1 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad2 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad3 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad4 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad5 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad6 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad7 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad8 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ad9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU ada Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU adb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:20:05.385 UTC [common.configtx] addToMap -> DEBU adc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:05.386 UTC [common.configtx] addToMap -> DEBU add Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:20:05.386 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:20:05.386 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:20:05.386 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:20:05.387 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:20:05.388 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:20:05.389 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:20:05.389 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:20:05.389 UTC [common.channelconfig] LogSanityChecks -> DEBU aef As expected, current configuration has policy '/Channel/Readers'" +"2020-05-20 18:20:05.389 UTC [common.channelconfig] LogSanityChecks -> DEBU af0 As expected, current configuration has policy '/Channel/Writers'" +"2020-05-20 18:20:05.389 UTC [policies] Manager -> DEBU af1 Manager Channel looking up path [Application]" +"2020-05-20 18:20:05.389 UTC [policies] Manager -> DEBU af2 Manager Channel has managers Application" +"2020-05-20 18:20:05.389 UTC [policies] Manager -> DEBU af3 Manager Channel has managers Orderer" +"2020-05-20 18:20:05.390 UTC [policies] Manager -> DEBU af4 Manager Channel/Application looking up path []" +"2020-05-20 18:20:05.390 UTC [policies] Manager -> DEBU af5 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:05.390 UTC [policies] Manager -> DEBU af6 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:05.390 UTC [common.channelconfig] LogSanityChecks -> DEBU af7 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-05-20 18:20:05.390 UTC [common.channelconfig] LogSanityChecks -> DEBU af8 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-05-20 18:20:05.390 UTC [common.channelconfig] LogSanityChecks -> DEBU af9 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-05-20 18:20:05.390 UTC [policies] Manager -> DEBU afa Manager Channel looking up path [Orderer]" +"2020-05-20 18:20:05.391 UTC [policies] Manager -> DEBU afb Manager Channel has managers Application" +"2020-05-20 18:20:05.391 UTC [policies] Manager -> DEBU afc Manager Channel has managers Orderer" +"2020-05-20 18:20:05.391 UTC [policies] Manager -> DEBU afd Manager Channel/Orderer looking up path []" +"2020-05-20 18:20:05.391 UTC [policies] Manager -> DEBU afe Manager Channel/Orderer has managers OrdererOrg" +"2020-05-20 18:20:05.391 UTC [common.channelconfig] LogSanityChecks -> DEBU aff As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-05-20 18:20:05.391 UTC [common.channelconfig] LogSanityChecks -> DEBU b00 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-05-20 18:20:05.391 UTC [common.channelconfig] LogSanityChecks -> DEBU b01 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-05-20 18:20:05.391 UTC [common.channelconfig] LogSanityChecks -> DEBU b02 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-05-20 18:20:05.392 UTC [common.capabilities] Supported -> DEBU b03 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:20:05.392 UTC [common.capabilities] Supported -> DEBU b04 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:20:05.392 UTC [msp] GetDefaultSigningIdentity -> DEBU b05 Obtaining default signing identity" +"2020-05-20 18:20:05.392 UTC [msp] GetDefaultSigningIdentity -> DEBU b06 Obtaining default signing identity" +"2020-05-20 18:20:05.392 UTC [msp.identity] Sign -> DEBU b07 Sign: plaintext: 0AEA060A1B08011A0608D5E995F60522...2CAFAE4D423EC1E55E3DB567244CD81D " +"2020-05-20 18:20:05.392 UTC [msp.identity] Sign -> DEBU b08 Sign: digest: 3C37BB7160BE2A5DCCC1224E4F27D1586169D05C2EE4D9B0E39CE2217E904940 " +"2020-05-20 18:20:05.393 UTC [policies] Evaluate -> DEBU b09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:20:05.393 UTC [policies] Evaluate -> DEBU b0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:05.393 UTC [policies] Evaluate -> DEBU b0b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-05-20 18:20:05.393 UTC [policies] Evaluate -> DEBU b0c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:05.394 UTC [policies] Evaluate -> DEBU b0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-05-20 18:20:05.394 UTC [msp] DeserializeIdentity -> DEBU b0e Obtaining identity" +"2020-05-20 18:20:05.394 UTC [msp.identity] newIdentity -> DEBU b0f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.394 UTC [cauthdsl] func1 -> DEBU b10 0xc0012325e0 gate 1589998805394781000 evaluation starts" +"2020-05-20 18:20:05.394 UTC [cauthdsl] func2 -> DEBU b11 0xc0012325e0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:05.394 UTC [cauthdsl] func2 -> DEBU b12 0xc0012325e0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b13 0xc0012325e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b14 0xc0012325e0 principal evaluation fails" +"2020-05-20 18:20:05.395 UTC [cauthdsl] func1 -> DEBU b15 0xc0012325e0 gate 1589998805394781000 evaluation fails" +"2020-05-20 18:20:05.395 UTC [policies] Evaluate -> DEBU b16 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.395 UTC [policies] Evaluate -> DEBU b17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.395 UTC [policies] Evaluate -> DEBU b18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-05-20 18:20:05.395 UTC [cauthdsl] func1 -> DEBU b19 0xc0012337a0 gate 1589998805395637700 evaluation starts" +"2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b1a 0xc0012337a0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b1b 0xc0012337a0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b1c 0xc0012337a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:20:05.395 UTC [cauthdsl] func2 -> DEBU b1d 0xc0012337a0 principal evaluation fails" +"2020-05-20 18:20:05.396 UTC [cauthdsl] func1 -> DEBU b1e 0xc0012337a0 gate 1589998805395637700 evaluation fails" +"2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:05.396 UTC [policies] func1 -> DEBU b21 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]" +"2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b22 Signature set did not satisfy policy /Channel/Application/Writers" +"2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:20:05.396 UTC [policies] Evaluate -> DEBU b26 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:20:05.396 UTC [cauthdsl] func1 -> DEBU b27 0xc00125a4b0 gate 1589998805396634000 evaluation starts" +"2020-05-20 18:20:05.396 UTC [cauthdsl] func2 -> DEBU b28 0xc00125a4b0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:05.396 UTC [cauthdsl] func2 -> DEBU b29 0xc00125a4b0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:05.396 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b2a Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-05-20 18:20:05.396 UTC [msp] Validate -> DEBU b2b MSP OrdererMSP validating identity" +"2020-05-20 18:20:05.397 UTC [msp] getCertificationChain -> DEBU b2c MSP OrdererMSP getting certification chain" +"2020-05-20 18:20:05.397 UTC [cauthdsl] func2 -> DEBU b2d 0xc00125a4b0 principal matched by identity 0" +"2020-05-20 18:20:05.397 UTC [msp.identity] Verify -> DEBU b2e Verify: digest = 00000000 3c 37 bb 71 60 be 2a 5d cc c1 22 4e 4f 27 d1 58 |<7.q`.*].."NO'.X| +00000010 61 69 d0 5c 2e e4 d9 b0 e3 9c e2 21 7e 90 49 40 |ai.\.......!~.I@|" +"2020-05-20 18:20:05.398 UTC [msp.identity] Verify -> DEBU b2f Verify: sig = 00000000 30 45 02 21 00 f1 60 c6 0c 5d 48 6b 58 d3 55 d6 |0E.!..`..]HkX.U.| +00000010 55 aa 91 32 59 e9 96 66 be 0b b5 dc d7 6d 1e cd |U..2Y..f.....m..| +00000020 f6 0e 3e eb ae 02 20 0b 84 cd 3c d4 a3 21 14 67 |..>... ...<..!.g| +00000030 cc 8e d7 67 bd 5d 55 59 2b de 4a 52 0f f7 5f bf |...g.]UY+.JR.._.| +00000040 23 c2 cc 10 3c 4b c5 |#... DEBU b30 0xc00125a4b0 principal evaluation succeeds for identity 0" +"2020-05-20 18:20:05.398 UTC [cauthdsl] func1 -> DEBU b31 0xc00125a4b0 gate 1589998805396634000 evaluation succeeds" +"2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b32 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b33 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b34 Signature set satisfies policy /Channel/Orderer/Writers" +"2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b36 Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:20:05.398 UTC [policies] Evaluate -> DEBU b37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:20:05.399 UTC [orderer.common.msgprocessor] Apply -> DEBU b38 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-05-20 18:20:05.399 UTC [common.channelconfig] NewStandardValues -> DEBU b39 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3a Processing field: HashingAlgorithm" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3b Processing field: BlockDataHashingStructure" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3c Processing field: OrdererAddresses" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3d Processing field: Consortium" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b3e Processing field: Capabilities" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] NewStandardValues -> DEBU b3f Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b40 Processing field: ACLs" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b41 Processing field: Capabilities" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] NewStandardValues -> DEBU b42 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:05.399 UTC [common.channelconfig] initializeProtosStruct -> DEBU b43 Processing field: AnchorPeers" +"2020-05-20 18:20:05.400 UTC [common.channelconfig] NewStandardValues -> DEBU b44 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.400 UTC [common.channelconfig] initializeProtosStruct -> DEBU b45 Processing field: MSP" +"2020-05-20 18:20:05.400 UTC [common.channelconfig] Validate -> DEBU b46 Anchor peers for org Org2MSP are anchor_peers: " +"2020-05-20 18:20:05.400 UTC [common.channelconfig] validateMSP -> DEBU b47 Setting up MSP for org Org2MSP" +"2020-05-20 18:20:05.400 UTC [msp] newBccspMsp -> DEBU b48 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.400 UTC [msp] New -> DEBU b49 Creating Cache-MSP instance" +"2020-05-20 18:20:05.400 UTC [msp] Setup -> DEBU b4a Setting up MSP instance Org2MSP" +"2020-05-20 18:20:05.400 UTC [msp.identity] newIdentity -> DEBU b4b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.401 UTC [common.channelconfig] NewStandardValues -> DEBU b4c Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:05.401 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4d Processing field: AnchorPeers" +"2020-05-20 18:20:05.401 UTC [common.channelconfig] NewStandardValues -> DEBU b4e Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.401 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4f Processing field: MSP" +"2020-05-20 18:20:05.401 UTC [common.channelconfig] Validate -> DEBU b50 Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:20:05.401 UTC [common.channelconfig] validateMSP -> DEBU b51 Setting up MSP for org Org1MSP" +"2020-05-20 18:20:05.401 UTC [msp] newBccspMsp -> DEBU b52 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.402 UTC [msp] New -> DEBU b53 Creating Cache-MSP instance" +"2020-05-20 18:20:05.402 UTC [msp] Setup -> DEBU b54 Setting up MSP instance Org1MSP" +"2020-05-20 18:20:05.402 UTC [msp.identity] newIdentity -> DEBU b55 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.403 UTC [common.channelconfig] NewStandardValues -> DEBU b56 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:20:05.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU b57 Processing field: ConsensusType" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b58 Processing field: BatchSize" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b59 Processing field: BatchTimeout" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5a Processing field: KafkaBrokers" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5b Processing field: ChannelRestrictions" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5c Processing field: Capabilities" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] NewStandardValues -> DEBU b5d Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5e Processing field: Endpoints" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] NewStandardValues -> DEBU b5f Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.404 UTC [common.channelconfig] initializeProtosStruct -> DEBU b60 Processing field: MSP" +"2020-05-20 18:20:05.405 UTC [common.channelconfig] validateMSP -> DEBU b61 Setting up MSP for org OrdererOrg" +"2020-05-20 18:20:05.405 UTC [msp] newBccspMsp -> DEBU b62 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.405 UTC [msp] New -> DEBU b63 Creating Cache-MSP instance" +"2020-05-20 18:20:05.405 UTC [msp] Setup -> DEBU b64 Setting up MSP instance OrdererMSP" +"2020-05-20 18:20:05.405 UTC [msp.identity] newIdentity -> DEBU b65 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.406 UTC [msp] Setup -> DEBU b66 Setting up the MSP manager (3 msps)" +"2020-05-20 18:20:05.406 UTC [msp] Setup -> DEBU b67 MSP manager setup complete, setup 3 msps" +"2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b68 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b69 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b6a Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b6b Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b6c Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.407 UTC [policies] NewManagerImpl -> DEBU b6d Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.407 UTC [policies] GetPolicy -> DEBU b6e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:05.407 UTC [policies] GetPolicy -> DEBU b6f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b70 Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b71 Proposed new policy Readers for Channel/Application" +"2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b72 Proposed new policy Writers for Channel/Application" +"2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b73 Proposed new policy Admins for Channel/Application" +"2020-05-20 18:20:05.408 UTC [policies] GetPolicy -> DEBU b74 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:05.408 UTC [policies] GetPolicy -> DEBU b75 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b76 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b77 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.408 UTC [policies] NewManagerImpl -> DEBU b78 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b79 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7a Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7b Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7c Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7d Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7e Proposed new policy Writers for Channel" +"2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b7f Proposed new policy Admins for Channel" +"2020-05-20 18:20:05.409 UTC [policies] NewManagerImpl -> DEBU b80 Proposed new policy Readers for Channel" +"2020-05-20 18:20:05.409 UTC [common.configtx] addToMap -> DEBU b81 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:05.409 UTC [common.configtx] addToMap -> DEBU b82 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:05.409 UTC [common.configtx] addToMap -> DEBU b83 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.409 UTC [common.configtx] addToMap -> DEBU b84 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b85 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b86 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b87 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b88 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b89 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:05.410 UTC [common.configtx] addToMap -> DEBU b8a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8b Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b8f Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b90 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b91 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b92 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b93 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:20:05.411 UTC [common.configtx] addToMap -> DEBU b94 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b95 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b96 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b97 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b98 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b99 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b9a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b9b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:20:05.412 UTC [common.configtx] addToMap -> DEBU b9c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU b9d Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU b9e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU b9f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:20:05.413 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:20:05.414 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:20:05.415 UTC [orderer.consensus.etcdraft] propose -> INFO bad Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-05-20 18:20:05.415 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bae [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:53454" +"2020-05-20 18:20:05.415 UTC [orderer.consensus.etcdraft] serveRequest -> INFO baf Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-05-20 18:20:05.415 UTC [orderer.consensus.etcdraft] 2 -> DEBU bb0 Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2020-05-20 18:20:05.419 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bb1 Sending msg of 27272 bytes to 2 on channel businesschannel took 22.2µs" +"2020-05-20 18:20:05.420 UTC [orderer.common.broadcast] Handle -> WARN bb4 Error reading from 172.18.0.9:53454: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:20:05.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bb5 Sending msg of 27272 bytes to 3 on channel businesschannel took 16.5µs" +"2020-05-20 18:20:05.420 UTC [orderer.common.server] func1 -> DEBU bb6 Closing Broadcast stream" +"2020-05-20 18:20:05.420 UTC [comm.grpc.server] 1 -> INFO bb7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53454 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.9651ms +"2020-05-20 18:20:05.420 UTC [grpc] infof -> DEBU bb9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:20:05.420 UTC [orderer.common.cluster.step] sendMessage -> DEBU bb8 Send of ConsensusRequest for channel businesschannel with payload of size 27272 to orderer2.example.com(orderer2.example.com:7050) took 126.3µs " +"2020-05-20 18:20:05.419 UTC [grpc] infof -> DEBU bb3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:20:05.419 UTC [common.deliver] Handle -> WARN bb2 Error reading from 172.18.0.9:53452: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:20:05.420 UTC [orderer.common.server] func1 -> DEBU bba Closing Deliver stream" +"2020-05-20 18:20:05.420 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbb Send of ConsensusRequest for channel businesschannel with payload of size 27272 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " +"2020-05-20 18:20:05.420 UTC [comm.grpc.server] 1 -> INFO bbc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53452 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=100.899ms +"2020-05-20 18:20:05.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU bbd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:05.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bbe Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-05-20 18:20:05.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.2µs " +"2020-05-20 18:20:05.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:05.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc1 Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" +"2020-05-20 18:20:05.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc2 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2020-05-20 18:20:05.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU bc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 39.6µs " +"2020-05-20 18:20:05.429 UTC [orderer.consensus.etcdraft] writeBlock -> INFO bc4 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2020-05-20 18:20:05.432 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:05.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:05.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU bc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.5µs " +"2020-05-20 18:20:05.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:05.444 UTC [common.configtx] addToMap -> DEBU bc9 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:05.444 UTC [common.configtx] addToMap -> DEBU bca Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:05.444 UTC [common.configtx] addToMap -> DEBU bcb Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bcc Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +"2020-05-20 18:20:05.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU bce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.9µs " +"2020-05-20 18:20:05.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU bd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.8µs " +"2020-05-20 18:20:05.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bcf Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +"2020-05-20 18:20:05.444 UTC [common.configtx] addToMap -> DEBU bcd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:05.448 UTC [common.configtx] addToMap -> DEBU bd2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:05.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU bd3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:05.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU bd1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:05.449 UTC [common.configtx] addToMap -> DEBU bd4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.449 UTC [common.configtx] addToMap -> DEBU bd5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bd6 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bd7 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bd8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bd9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:20:05.450 UTC [common.configtx] addToMap -> DEBU bda Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:05.451 UTC [common.configtx] addToMap -> DEBU bdb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:05.451 UTC [common.configtx] addToMap -> DEBU bdc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.451 UTC [common.configtx] addToMap -> DEBU bdd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.451 UTC [common.configtx] verifyDeltaSet -> DEBU bde Processing change to key: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.451 UTC [common.configtx] policyForItem -> DEBU bdf Getting policy for item Org2MSP with mod_policy Admins" +"2020-05-20 18:20:05.452 UTC [policies] Manager -> DEBU be0 Manager Channel looking up path [Application]" +"2020-05-20 18:20:05.452 UTC [policies] Manager -> DEBU be1 Manager Channel has managers Application" +"2020-05-20 18:20:05.452 UTC [policies] Manager -> DEBU be2 Manager Channel has managers Orderer" +"2020-05-20 18:20:05.452 UTC [policies] Manager -> DEBU be3 Manager Channel/Application looking up path []" +"2020-05-20 18:20:05.453 UTC [policies] Manager -> DEBU be4 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:05.454 UTC [policies] Manager -> DEBU be5 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:05.455 UTC [policies] Manager -> DEBU be6 Manager Channel/Application looking up path [Org2MSP]" +"2020-05-20 18:20:05.455 UTC [policies] Manager -> DEBU be7 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:05.456 UTC [policies] Manager -> DEBU be8 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:05.456 UTC [policies] Manager -> DEBU be9 Manager Channel/Application/Org2MSP looking up path []" +"2020-05-20 18:20:05.456 UTC [policies] Evaluate -> DEBU bea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-05-20 18:20:05.456 UTC [cauthdsl] func1 -> DEBU beb 0xc000d8fa80 gate 1589998805456934500 evaluation starts" +"2020-05-20 18:20:05.457 UTC [cauthdsl] func2 -> DEBU bec 0xc000d8fa80 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:20:05.457 UTC [cauthdsl] func2 -> DEBU bed 0xc000d8fa80 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:20:05.457 UTC [cauthdsl] func2 -> DEBU bee 0xc000d8fa80 principal matched by identity 0" +"2020-05-20 18:20:05.457 UTC [msp.identity] Verify -> DEBU bef Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D|" +"2020-05-20 18:20:05.458 UTC [msp.identity] Verify -> DEBU bf0 Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +00000040 c1 0e dd 4e f6 78 ea |...N.x.|" +"2020-05-20 18:20:05.458 UTC [cauthdsl] func2 -> DEBU bf1 0xc000d8fa80 principal evaluation succeeds for identity 0" +"2020-05-20 18:20:05.459 UTC [cauthdsl] func1 -> DEBU bf2 0xc000d8fa80 gate 1589998805456934500 evaluation succeeds" +"2020-05-20 18:20:05.459 UTC [policies] Evaluate -> DEBU bf3 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.459 UTC [policies] Evaluate -> DEBU bf4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.459 UTC [common.configtx] verifyDeltaSet -> DEBU bf5 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:20:05.459 UTC [common.configtx] recurseConfigMap -> DEBU bf6 Setting policy for key Admins to " +"2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bf7 Setting policy for key Readers to " +"2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bf8 Setting policy for key Writers to " +"2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bf9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bfa Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bfb Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.460 UTC [common.configtx] recurseConfigMap -> DEBU bfc Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU bfd Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU bfe Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU bff Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU c00 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU c01 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.461 UTC [common.configtx] recurseConfigMap -> DEBU c02 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c03 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c04 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c05 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c06 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c07 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c08 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.462 UTC [common.configtx] recurseConfigMap -> DEBU c09 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.463 UTC [common.configtx] recurseConfigMap -> DEBU c0a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:20:05.463 UTC [common.channelconfig] NewStandardValues -> DEBU c0b Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:20:05.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0c Processing field: HashingAlgorithm" +"2020-05-20 18:20:05.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0d Processing field: BlockDataHashingStructure" +"2020-05-20 18:20:05.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0e Processing field: OrdererAddresses" +"2020-05-20 18:20:05.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0f Processing field: Consortium" +"2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c10 Processing field: Capabilities" +"2020-05-20 18:20:05.464 UTC [common.channelconfig] NewStandardValues -> DEBU c11 Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c12 Processing field: ACLs" +"2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c13 Processing field: Capabilities" +"2020-05-20 18:20:05.464 UTC [common.channelconfig] NewStandardValues -> DEBU c14 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c15 Processing field: AnchorPeers" +"2020-05-20 18:20:05.464 UTC [common.channelconfig] NewStandardValues -> DEBU c16 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU c17 Processing field: MSP" +"2020-05-20 18:20:05.465 UTC [common.channelconfig] Validate -> DEBU c18 Anchor peers for org Org2MSP are anchor_peers: " +"2020-05-20 18:20:05.465 UTC [common.channelconfig] validateMSP -> DEBU c19 Setting up MSP for org Org2MSP" +"2020-05-20 18:20:05.465 UTC [msp] newBccspMsp -> DEBU c1a Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.465 UTC [msp] New -> DEBU c1b Creating Cache-MSP instance" +"2020-05-20 18:20:05.465 UTC [msp] Setup -> DEBU c1c Setting up MSP instance Org2MSP" +"2020-05-20 18:20:05.466 UTC [msp.identity] newIdentity -> DEBU c1d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.467 UTC [common.channelconfig] NewStandardValues -> DEBU c1e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:20:05.467 UTC [common.channelconfig] initializeProtosStruct -> DEBU c1f Processing field: AnchorPeers" +"2020-05-20 18:20:05.467 UTC [common.channelconfig] NewStandardValues -> DEBU c20 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.467 UTC [common.channelconfig] initializeProtosStruct -> DEBU c21 Processing field: MSP" +"2020-05-20 18:20:05.468 UTC [common.channelconfig] Validate -> DEBU c22 Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:20:05.468 UTC [common.channelconfig] validateMSP -> DEBU c23 Setting up MSP for org Org1MSP" +"2020-05-20 18:20:05.468 UTC [msp] newBccspMsp -> DEBU c24 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.468 UTC [msp] New -> DEBU c25 Creating Cache-MSP instance" +"2020-05-20 18:20:05.468 UTC [msp] Setup -> DEBU c26 Setting up MSP instance Org1MSP" +"2020-05-20 18:20:05.469 UTC [msp.identity] newIdentity -> DEBU c27 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.471 UTC [common.channelconfig] NewStandardValues -> DEBU c28 Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: ConsensusType" +"2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2a Processing field: BatchSize" +"2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2b Processing field: BatchTimeout" +"2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2c Processing field: KafkaBrokers" +"2020-05-20 18:20:05.471 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2d Processing field: ChannelRestrictions" +"2020-05-20 18:20:05.472 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2e Processing field: Capabilities" +"2020-05-20 18:20:05.472 UTC [common.channelconfig] NewStandardValues -> DEBU c2f Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:20:05.472 UTC [common.channelconfig] initializeProtosStruct -> DEBU c30 Processing field: Endpoints" +"2020-05-20 18:20:05.472 UTC [common.channelconfig] NewStandardValues -> DEBU c31 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:20:05.472 UTC [common.channelconfig] initializeProtosStruct -> DEBU c32 Processing field: MSP" +"2020-05-20 18:20:05.472 UTC [common.channelconfig] validateMSP -> DEBU c33 Setting up MSP for org OrdererOrg" +"2020-05-20 18:20:05.473 UTC [msp] newBccspMsp -> DEBU c34 Creating BCCSP-based MSP instance" +"2020-05-20 18:20:05.473 UTC [msp] New -> DEBU c35 Creating Cache-MSP instance" +"2020-05-20 18:20:05.473 UTC [msp] Setup -> DEBU c36 Setting up MSP instance OrdererMSP" +"2020-05-20 18:20:05.474 UTC [msp.identity] newIdentity -> DEBU c37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:20:05.475 UTC [msp] Setup -> DEBU c38 Setting up the MSP manager (3 msps)" +"2020-05-20 18:20:05.475 UTC [msp] Setup -> DEBU c39 MSP manager setup complete, setup 3 msps" +"2020-05-20 18:20:05.475 UTC [policies] NewManagerImpl -> DEBU c3a Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.475 UTC [policies] NewManagerImpl -> DEBU c3b Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.475 UTC [policies] NewManagerImpl -> DEBU c3c Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:20:05.476 UTC [policies] NewManagerImpl -> DEBU c3d Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.476 UTC [policies] NewManagerImpl -> DEBU c3e Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.476 UTC [policies] NewManagerImpl -> DEBU c3f Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:20:05.476 UTC [policies] NewManagerImpl -> DEBU c40 Proposed new policy Admins for Channel/Application" +"2020-05-20 18:20:05.476 UTC [policies] GetPolicy -> DEBU c41 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:05.477 UTC [policies] GetPolicy -> DEBU c42 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c43 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:20:05.477 UTC [policies] GetPolicy -> DEBU c44 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:20:05.477 UTC [policies] GetPolicy -> DEBU c45 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c46 Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c47 Proposed new policy Readers for Channel/Application" +"2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c48 Proposed new policy Writers for Channel/Application" +"2020-05-20 18:20:05.477 UTC [policies] NewManagerImpl -> DEBU c49 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4b Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4c Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4d Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4e Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c4f Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:20:05.478 UTC [policies] NewManagerImpl -> DEBU c50 Proposed new policy Writers for Channel" +"2020-05-20 18:20:05.479 UTC [policies] NewManagerImpl -> DEBU c51 Proposed new policy Admins for Channel" +"2020-05-20 18:20:05.479 UTC [policies] NewManagerImpl -> DEBU c52 Proposed new policy Readers for Channel" +"2020-05-20 18:20:05.479 UTC [common.configtx] addToMap -> DEBU c53 Adding to config map: [Group] /Channel" +"2020-05-20 18:20:05.479 UTC [common.configtx] addToMap -> DEBU c54 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:20:05.479 UTC [common.configtx] addToMap -> DEBU c55 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c56 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c57 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c58 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c59 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c5a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:20:05.480 UTC [common.configtx] addToMap -> DEBU c5b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c5c Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c5d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c5e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c5f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c60 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c61 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c62 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c63 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c64 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:20:05.481 UTC [common.configtx] addToMap -> DEBU c65 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c66 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c67 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c68 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c69 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c6f Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c70 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c71 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c72 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c73 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c74 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c75 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c76 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c77 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c78 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c79 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c7a Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c7b Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c7c Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:20:05.482 UTC [common.configtx] addToMap -> DEBU c7d Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:20:05.483 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:20:05.483 UTC [common.channelconfig] LogSanityChecks -> DEBU c7f As expected, current configuration has policy '/Channel/Readers'" +"2020-05-20 18:20:05.483 UTC [common.channelconfig] LogSanityChecks -> DEBU c80 As expected, current configuration has policy '/Channel/Writers'" +"2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c81 Manager Channel looking up path [Application]" +"2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c82 Manager Channel has managers Application" +"2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c83 Manager Channel has managers Orderer" +"2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c84 Manager Channel/Application looking up path []" +"2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c85 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:20:05.483 UTC [policies] Manager -> DEBU c86 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:20:05.483 UTC [common.channelconfig] LogSanityChecks -> DEBU c87 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c88 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c89 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8a Manager Channel looking up path [Orderer]" +"2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8b Manager Channel has managers Application" +"2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8c Manager Channel has managers Orderer" +"2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8d Manager Channel/Orderer looking up path []" +"2020-05-20 18:20:05.484 UTC [policies] Manager -> DEBU c8e Manager Channel/Orderer has managers OrdererOrg" +"2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c8f As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c90 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c91 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-05-20 18:20:05.484 UTC [common.channelconfig] LogSanityChecks -> DEBU c92 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-05-20 18:20:05.484 UTC [common.capabilities] Supported -> DEBU c93 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:20:05.484 UTC [common.capabilities] Supported -> DEBU c94 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:20:05.484 UTC [orderer.common.server] func1 -> DEBU c95 Executing callback to update root CAs" +"2020-05-20 18:20:05.484 UTC [orderer.common.server] updateTrustedRoots -> DEBU c96 updating root CAs for channel [businesschannel]" +"2020-05-20 18:20:05.484 UTC [orderer.common.server] updateTrustedRoots -> DEBU c97 adding app root CAs for MSP [Org2MSP]" +"2020-05-20 18:20:05.484 UTC [orderer.common.server] updateTrustedRoots -> DEBU c98 adding app root CAs for MSP [Org1MSP]" +"2020-05-20 18:20:05.484 UTC [orderer.common.server] updateTrustedRoots -> DEBU c99 adding orderer root CAs for MSP [OrdererMSP]" +"2020-05-20 18:20:05.485 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c9a [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2020-05-20 18:20:05.485 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c9b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-05-20 18:20:05.485 UTC [msp] GetDefaultSigningIdentity -> DEBU c9c Obtaining default signing identity" +"2020-05-20 18:20:05.485 UTC [msp] GetDefaultSigningIdentity -> DEBU c9d Obtaining default signing identity" +"2020-05-20 18:20:05.485 UTC [msp.identity] Sign -> DEBU c9e Sign: plaintext: 0A020802120B0A090A03010203100418...AB819CE3307668257A7BAF10780BE1BC " +"2020-05-20 18:20:05.485 UTC [msp.identity] Sign -> DEBU c9f Sign: digest: B1B93DF7F5E50310DD45C3CE9CE96C3CF4878EEC9C174BA54034643BF744444D " +"2020-05-20 18:20:05.488 UTC [fsblkstorage] indexBlock -> DEBU ca0 Indexing block [blockNum=2, blockHash=[]byte{0xf5, 0x87, 0x9d, 0xf3, 0xcd, 0xbf, 0xbf, 0x43, 0x96, 0xe2, 0xb0, 0xb9, 0x62, 0xaf, 0x50, 0x91, 0xe3, 0xeb, 0x80, 0x22, 0x57, 0x52, 0xd1, 0xfd, 0x79, 0x4c, 0xe4, 0xfe, 0xe5, 0xa7, 0x26, 0x2a} txOffsets= +txId=11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0 locPointer=offset=71, bytesLength=27141 +]" +"2020-05-20 18:20:05.490 UTC [fsblkstorage] updateCheckpoint -> DEBU ca1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84818], isChainEmpty=[false], lastBlockNumber=[2]" +"2020-05-20 18:20:05.490 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ca2 [channel: businesschannel] Wrote block [2]" +"2020-05-20 18:20:05.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:05.928 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca4 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-05-20 18:20:05.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +"2020-05-20 18:20:05.948 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca6 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-05-20 18:20:05.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.6µs " +"2020-05-20 18:20:05.948 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca8 Sending msg of 28 bytes to 3 on channel businesschannel took 55.3µs" +"2020-05-20 18:20:05.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 286.2µs " +"2020-05-20 18:20:05.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU caa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:05.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU cab Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:06.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU cac Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:06.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cad Sending msg of 28 bytes to 3 on channel testchainid took 25.9µs" +"2020-05-20 18:20:06.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU cae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 248.1µs " +"2020-05-20 18:20:06.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU caf Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2020-05-20 18:20:06.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2020-05-20 18:20:06.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.5µs " +"2020-05-20 18:20:06.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0075ms " +"2020-05-20 18:20:06.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:06.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:06.928 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:06.928 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb6 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +"2020-05-20 18:20:06.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.5µs " +"2020-05-20 18:20:06.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +"2020-05-20 18:20:06.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cba Sending msg of 28 bytes to 3 on channel businesschannel took 162.7µs" +"2020-05-20 18:20:06.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.5µs " +"2020-05-20 18:20:06.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99µs " +"2020-05-20 18:20:06.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:06.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:07.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbe Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:07.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cbf Sending msg of 28 bytes to 3 on channel testchainid took 38.4µs" +"2020-05-20 18:20:07.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.8µs " +"2020-05-20 18:20:07.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 129.4µs" +"2020-05-20 18:20:07.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.9µs " +"2020-05-20 18:20:07.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc3 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2020-05-20 18:20:07.447 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.2003ms " +"2020-05-20 18:20:07.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:07.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:07.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:07.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc8 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2020-05-20 18:20:07.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.6µs " +"2020-05-20 18:20:07.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cca Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +"2020-05-20 18:20:07.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2020-05-20 18:20:07.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.8µs " +"2020-05-20 18:20:07.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.9µs " +"2020-05-20 18:20:07.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU cce Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:07.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:08.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:08.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +"2020-05-20 18:20:08.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229.6µs " +"2020-05-20 18:20:08.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd3 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2020-05-20 18:20:08.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd4 Sending msg of 28 bytes to 3 on channel businesschannel took 59.3µs" +"2020-05-20 18:20:08.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 310µs " +"2020-05-20 18:20:08.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 533.9µs " +"2020-05-20 18:20:08.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:08.450 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:08.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:08.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +"2020-05-20 18:20:08.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +"2020-05-20 18:20:08.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdc Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +"2020-05-20 18:20:08.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdd Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +"2020-05-20 18:20:08.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU cde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 254.8µs " +"2020-05-20 18:20:08.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.6µs " +"2020-05-20 18:20:08.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:08.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:09.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:09.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-05-20 18:20:09.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.2µs " +"2020-05-20 18:20:09.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2020-05-20 18:20:09.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2020-05-20 18:20:09.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233.3µs " +"2020-05-20 18:20:09.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.3µs " +"2020-05-20 18:20:09.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:09.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU cea Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:09.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU ceb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:09.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +"2020-05-20 18:20:09.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.8µs " +"2020-05-20 18:20:09.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +"2020-05-20 18:20:09.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cef Sending msg of 28 bytes to 3 on channel businesschannel took 9.8µs" +"2020-05-20 18:20:09.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.8µs " +"2020-05-20 18:20:09.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 265.6µs " +"2020-05-20 18:20:09.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:09.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:10.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:10.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel testchainid took 460.3µs" +"2020-05-20 18:20:10.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 463.8µs " +"2020-05-20 18:20:10.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf7 Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +"2020-05-20 18:20:10.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf8 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-05-20 18:20:10.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.8µs " +"2020-05-20 18:20:10.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +"2020-05-20 18:20:10.445 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:10.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:10.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:10.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 3 on channel testchainid took 234.9µs" +"2020-05-20 18:20:10.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.5µs " +"2020-05-20 18:20:10.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d00 Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +"2020-05-20 18:20:10.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d01 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +"2020-05-20 18:20:10.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5935ms " +"2020-05-20 18:20:10.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 872.3µs " +"2020-05-20 18:20:10.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:10.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU d05 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:11.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:11.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2020-05-20 18:20:11.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 314.7µs " +"2020-05-20 18:20:11.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +"2020-05-20 18:20:11.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2020-05-20 18:20:11.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.5µs " +"2020-05-20 18:20:11.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 330.8µs " +"2020-05-20 18:20:11.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:11.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:11.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:11.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.5µs " +"2020-05-20 18:20:11.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d11 Sending msg of 28 bytes to 3 on channel testchainid took 9.7µs" +"2020-05-20 18:20:11.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 45µs" +"2020-05-20 18:20:11.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 28 bytes to 3 on channel businesschannel took 7.1µs" +"2020-05-20 18:20:11.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 208.5µs " +"2020-05-20 18:20:11.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.4µs " +"2020-05-20 18:20:11.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:11.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:12.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:12.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2020-05-20 18:20:12.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.7µs " +"2020-05-20 18:20:12.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +"2020-05-20 18:20:12.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-05-20 18:20:12.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " +"2020-05-20 18:20:12.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.3µs " +"2020-05-20 18:20:12.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:12.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:12.542 UTC [orderer.common.server] Broadcast -> DEBU d21 Starting new Broadcast handler" +"2020-05-20 18:20:12.543 UTC [orderer.common.broadcast] Handle -> DEBU d22 Starting new broadcast loop for 172.18.0.9:53516" +"2020-05-20 18:20:12.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU d23 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:12.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d24 Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +"2020-05-20 18:20:12.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.2µs " +"2020-05-20 18:20:12.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d26 Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +"2020-05-20 18:20:12.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d27 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2020-05-20 18:20:12.944 UTC [orderer.common.cluster.step] sendMessage -> DEBU d28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +"2020-05-20 18:20:12.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.4µs " +"2020-05-20 18:20:12.945 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:12.945 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:13.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:13.428 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2d Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-05-20 18:20:13.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.2µs " +"2020-05-20 18:20:13.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2f Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +"2020-05-20 18:20:13.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d30 Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2020-05-20 18:20:13.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +"2020-05-20 18:20:13.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.9µs " +"2020-05-20 18:20:13.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU d33 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:13.449 UTC [orderer.common.cluster.step] handleMessage -> DEBU d34 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:13.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU d35 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:13.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d36 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-05-20 18:20:13.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU d37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +"2020-05-20 18:20:13.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d38 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2020-05-20 18:20:13.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.4µs " +"2020-05-20 18:20:13.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3a Sending msg of 28 bytes to 3 on channel businesschannel took 303.2µs" +"2020-05-20 18:20:13.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 342.1µs " +"2020-05-20 18:20:13.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:13.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:14.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:14.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3f Sending msg of 28 bytes to 3 on channel testchainid took 21.4µs" +"2020-05-20 18:20:14.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU d40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.1µs " +"2020-05-20 18:20:14.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d41 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2020-05-20 18:20:14.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d42 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2020-05-20 18:20:14.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.7µs " +"2020-05-20 18:20:14.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.9µs " +"2020-05-20 18:20:14.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU d45 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:14.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU d46 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:14.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU d47 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:14.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d48 Sending msg of 28 bytes to 3 on channel testchainid took 283.7µs" +"2020-05-20 18:20:14.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.8µs " +"2020-05-20 18:20:14.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4a Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2020-05-20 18:20:14.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4b Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2020-05-20 18:20:14.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 249.6µs " +"2020-05-20 18:20:14.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.4µs " +"2020-05-20 18:20:14.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:14.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:15.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d50 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:15.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d51 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-05-20 18:20:15.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d52 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.9µs " +"2020-05-20 18:20:15.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d53 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2020-05-20 18:20:15.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d54 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +"2020-05-20 18:20:15.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.1µs " +"2020-05-20 18:20:15.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.7µs " +"2020-05-20 18:20:15.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU d57 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:15.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU d58 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:15.928 UTC [orderer.common.cluster.step] handleMessage -> DEBU d59 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:15.928 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5a Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2020-05-20 18:20:15.929 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278.7µs " +"2020-05-20 18:20:15.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5c Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +"2020-05-20 18:20:15.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5d Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-05-20 18:20:15.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.6µs " +"2020-05-20 18:20:15.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:15.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.5µs " +"2020-05-20 18:20:15.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU d61 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:16.048 UTC [orderer.common.server] replicateDisabledChains -> DEBU d62 No inactive chains to try to replicate" +"2020-05-20 18:20:16.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d63 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:16.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d64 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2020-05-20 18:20:16.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95µs " +"2020-05-20 18:20:16.449 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d66 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +"2020-05-20 18:20:16.450 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d67 Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +"2020-05-20 18:20:16.450 UTC [orderer.common.cluster.step] sendMessage -> DEBU d68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.3µs " +"2020-05-20 18:20:16.450 UTC [orderer.common.cluster.step] sendMessage -> DEBU d69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.8µs " +"2020-05-20 18:20:16.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:16.452 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:16.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:16.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6d Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-05-20 18:20:16.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 523µs " +"2020-05-20 18:20:16.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6f Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +"2020-05-20 18:20:16.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +"2020-05-20 18:20:16.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.5µs " +"2020-05-20 18:20:16.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0366ms " +"2020-05-20 18:20:16.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU d73 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:16.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU d74 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:17.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:17.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d76 Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" +"2020-05-20 18:20:17.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.7µs " +"2020-05-20 18:20:17.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d78 Sending msg of 28 bytes to 2 on channel businesschannel took 22.9µs" +"2020-05-20 18:20:17.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d79 Sending msg of 28 bytes to 3 on channel businesschannel took 64.3µs" +"2020-05-20 18:20:17.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 379.2µs " +"2020-05-20 18:20:17.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 951.8µs " +"2020-05-20 18:20:17.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:17.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:17.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:17.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 3 on channel testchainid took 430.8µs" +"2020-05-20 18:20:17.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.5µs " +"2020-05-20 18:20:17.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d81 Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +"2020-05-20 18:20:17.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 561.9µs " +"2020-05-20 18:20:17.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2020-05-20 18:20:17.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 892.5µs " +"2020-05-20 18:20:17.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d85 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:17.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU d86 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:18.427 UTC [orderer.common.cluster.step] handleMessage -> DEBU d87 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:18.427 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d88 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-05-20 18:20:18.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU d89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62µs " +"2020-05-20 18:20:18.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8a Sending msg of 28 bytes to 2 on channel businesschannel took 56.5µs" +"2020-05-20 18:20:18.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel businesschannel took 50.4µs" +"2020-05-20 18:20:18.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 691µs " +"2020-05-20 18:20:18.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.3µs " +"2020-05-20 18:20:18.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:18.451 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:18.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU d90 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:18.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2020-05-20 18:20:18.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU d92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +"2020-05-20 18:20:18.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d93 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +"2020-05-20 18:20:18.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +"2020-05-20 18:20:18.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.1µs " +"2020-05-20 18:20:18.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.4µs " +"2020-05-20 18:20:18.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:18.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU d98 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:19.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU d99 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:19.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9a Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-05-20 18:20:19.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.5µs " +"2020-05-20 18:20:19.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9c Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-05-20 18:20:19.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +"2020-05-20 18:20:19.444 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " +"2020-05-20 18:20:19.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.3µs " +"2020-05-20 18:20:19.445 UTC [orderer.common.cluster.step] handleMessage -> DEBU da0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:19.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU da1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:19.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU da2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:19.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.6µs " +"2020-05-20 18:20:19.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da3 Sending msg of 28 bytes to 3 on channel testchainid took 698.3µs" +"2020-05-20 18:20:19.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da5 Sending msg of 28 bytes to 2 on channel businesschannel took 46.1µs" +"2020-05-20 18:20:19.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da6 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +"2020-05-20 18:20:19.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU da7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210µs " +"2020-05-20 18:20:19.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU da8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 324.6µs " +"2020-05-20 18:20:19.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:19.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU daa Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:20.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU dab Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:20.425 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dac Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-05-20 18:20:20.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58µs " +"2020-05-20 18:20:20.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dae Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2020-05-20 18:20:20.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db0 Sending msg of 28 bytes to 3 on channel businesschannel took 413.5µs" +"2020-05-20 18:20:20.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU daf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.5µs " +"2020-05-20 18:20:20.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU db1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " +"2020-05-20 18:20:20.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:20.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU db3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:20.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU db4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:20.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db5 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2020-05-20 18:20:20.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU db6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " +"2020-05-20 18:20:20.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +"2020-05-20 18:20:20.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db8 Sending msg of 28 bytes to 3 on channel businesschannel took 51µs" +"2020-05-20 18:20:20.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU db9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.9µs " +"2020-05-20 18:20:20.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU dba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 923.6µs " +"2020-05-20 18:20:20.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:20.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:21.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:21.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2020-05-20 18:20:21.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.6µs " +"2020-05-20 18:20:21.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc0 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +"2020-05-20 18:20:21.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.6µs " +"2020-05-20 18:20:21.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc3 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-05-20 18:20:21.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.7µs " +"2020-05-20 18:20:21.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:21.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:21.925 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:21.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +"2020-05-20 18:20:21.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 282.4µs " +"2020-05-20 18:20:21.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +"2020-05-20 18:20:21.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dca Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2020-05-20 18:20:21.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.7µs " +"2020-05-20 18:20:21.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.4µs " +"2020-05-20 18:20:21.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcd Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:21.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:22.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcf Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:22.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd0 Sending msg of 28 bytes to 3 on channel testchainid took 63.7µs" +"2020-05-20 18:20:22.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.9µs " +"2020-05-20 18:20:22.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd2 Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +"2020-05-20 18:20:22.446 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +"2020-05-20 18:20:22.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:22.446 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.7µs " +"2020-05-20 18:20:22.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs " +"2020-05-20 18:20:22.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:22.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd8 Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +"2020-05-20 18:20:22.960 UTC [orderer.common.cluster.step] handleMessage -> DEBU dda Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:22.960 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddb Sending msg of 28 bytes to 3 on channel testchainid took 119.6µs" +"2020-05-20 18:20:22.961 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529.1µs " +"2020-05-20 18:20:22.962 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.2µs " +"2020-05-20 18:20:22.966 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 328.2µs " +"2020-05-20 18:20:22.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +"2020-05-20 18:20:22.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:22.977 UTC [orderer.common.cluster.step] handleMessage -> DEBU de0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:23.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU de1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:23.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de2 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +"2020-05-20 18:20:23.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU de3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.9µs " +"2020-05-20 18:20:23.457 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de4 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2020-05-20 18:20:23.457 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 3 on channel businesschannel took 60.5µs" +"2020-05-20 18:20:23.462 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.4µs " +"2020-05-20 18:20:23.463 UTC [orderer.common.cluster.step] sendMessage -> DEBU de7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.6061ms " +"2020-05-20 18:20:23.480 UTC [orderer.common.cluster.step] handleMessage -> DEBU de8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:23.509 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:23.927 UTC [orderer.common.cluster.step] handleMessage -> DEBU dea Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:23.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU deb Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2020-05-20 18:20:23.928 UTC [orderer.common.cluster.step] sendMessage -> DEBU dec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.9µs " +"2020-05-20 18:20:23.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ded Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +"2020-05-20 18:20:23.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dee Sending msg of 28 bytes to 3 on channel businesschannel took 25.8µs" +"2020-05-20 18:20:23.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU def Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +"2020-05-20 18:20:23.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 885µs " +"2020-05-20 18:20:23.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:23.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:24.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU df3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:24.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2020-05-20 18:20:24.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU df5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +"2020-05-20 18:20:24.455 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df6 Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" +"2020-05-20 18:20:24.455 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df7 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2020-05-20 18:20:24.456 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.8µs " +"2020-05-20 18:20:24.456 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.1µs " +"2020-05-20 18:20:24.457 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:24.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:24.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:24.927 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfd Sending msg of 28 bytes to 3 on channel testchainid took 16.2µs" +"2020-05-20 18:20:24.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.9µs " +"2020-05-20 18:20:24.946 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +"2020-05-20 18:20:24.947 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2020-05-20 18:20:24.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 228.6µs " +"2020-05-20 18:20:24.948 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.3µs " +"2020-05-20 18:20:24.950 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:24.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:25.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:25.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e06 Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2020-05-20 18:20:25.428 UTC [orderer.common.cluster.step] sendMessage -> DEBU e07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 462.8µs " +"2020-05-20 18:20:25.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2020-05-20 18:20:25.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +"2020-05-20 18:20:25.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 447.5µs " +"2020-05-20 18:20:25.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 506.9µs " +"2020-05-20 18:20:25.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:25.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:25.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:25.940 UTC [orderer.common.cluster.step] sendMessage -> DEBU e10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.4µs " +"2020-05-20 18:20:25.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2020-05-20 18:20:25.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 3 on channel businesschannel took 20.6µs" +"2020-05-20 18:20:25.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 419.7µs " +"2020-05-20 18:20:25.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.4µs " +"2020-05-20 18:20:25.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0f Sending msg of 28 bytes to 3 on channel testchainid took 74.3µs" +"2020-05-20 18:20:25.956 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:26.012 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:26.426 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:26.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e18 Sending msg of 28 bytes to 3 on channel testchainid took 42.3µs" +"2020-05-20 18:20:26.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU e19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 293.3µs " +"2020-05-20 18:20:26.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2020-05-20 18:20:26.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +"2020-05-20 18:20:26.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.7µs " +"2020-05-20 18:20:26.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 400.1µs " +"2020-05-20 18:20:26.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:26.447 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:26.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:26.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e21 Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" +"2020-05-20 18:20:26.927 UTC [orderer.common.cluster.step] sendMessage -> DEBU e22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208µs " +"2020-05-20 18:20:26.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 2 on channel businesschannel took 39.5µs" +"2020-05-20 18:20:26.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2020-05-20 18:20:26.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +"2020-05-20 18:20:26.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 483µs " +"2020-05-20 18:20:26.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:26.946 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:27.425 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:27.426 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2a Sending msg of 28 bytes to 3 on channel testchainid took 9.2µs" +"2020-05-20 18:20:27.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 828.8µs " +"2020-05-20 18:20:27.444 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +"2020-05-20 18:20:27.445 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 3 on channel businesschannel took 99µs" +"2020-05-20 18:20:27.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 250.3µs " +"2020-05-20 18:20:27.445 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.3µs " +"2020-05-20 18:20:27.446 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:27.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:27.926 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:27.926 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2020-05-20 18:20:27.926 UTC [orderer.common.cluster.step] sendMessage -> DEBU e34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +"2020-05-20 18:20:27.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +"2020-05-20 18:20:27.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.6µs " +"2020-05-20 18:20:27.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2020-05-20 18:20:27.947 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " +"2020-05-20 18:20:27.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:27.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:28.394 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:28.395 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 3 on channel testchainid took 10µs" +"2020-05-20 18:20:28.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.4µs " +"2020-05-20 18:20:28.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 51.1µs" +"2020-05-20 18:20:28.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 97.4µs" +"2020-05-20 18:20:28.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.3µs " +"2020-05-20 18:20:28.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " +"2020-05-20 18:20:28.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:28.414 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:28.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:28.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e45 Sending msg of 28 bytes to 3 on channel testchainid took 12µs" +"2020-05-20 18:20:28.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU e46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.6µs " +"2020-05-20 18:20:28.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e47 Sending msg of 28 bytes to 2 on channel businesschannel took 37.4µs" +"2020-05-20 18:20:28.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 3 on channel businesschannel took 13.2µs" +"2020-05-20 18:20:28.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU e49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.4µs " +"2020-05-20 18:20:28.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +"2020-05-20 18:20:28.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:28.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:29.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:29.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4e Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2020-05-20 18:20:29.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.6µs " +"2020-05-20 18:20:29.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 3 on channel businesschannel took 98.5µs" +"2020-05-20 18:20:29.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +"2020-05-20 18:20:29.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.6µs " +"2020-05-20 18:20:29.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " +"2020-05-20 18:20:29.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU e54 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:29.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:29.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:29.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e57 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-05-20 18:20:29.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU e58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.7µs " +"2020-05-20 18:20:29.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" +"2020-05-20 18:20:29.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5a Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2020-05-20 18:20:29.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 179.7µs " +"2020-05-20 18:20:29.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +"2020-05-20 18:20:29.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:29.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:30.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:30.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e60 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-05-20 18:20:30.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU e61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 674.4µs " +"2020-05-20 18:20:30.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +"2020-05-20 18:20:30.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2020-05-20 18:20:30.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56µs " +"2020-05-20 18:20:30.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.7µs " +"2020-05-20 18:20:30.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:30.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:30.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:30.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2020-05-20 18:20:30.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.8µs " +"2020-05-20 18:20:30.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +"2020-05-20 18:20:30.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2020-05-20 18:20:30.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 624.4µs " +"2020-05-20 18:20:30.919 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 243.3µs " +"2020-05-20 18:20:30.920 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:30.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:31.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:31.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2020-05-20 18:20:31.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU e73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.3µs " +"2020-05-20 18:20:31.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +"2020-05-20 18:20:31.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.5µs " +"2020-05-20 18:20:31.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 2 on channel businesschannel took 253.2µs" +"2020-05-20 18:20:31.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.5µs " +"2020-05-20 18:20:31.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:31.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:31.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7a Sending msg of 28 bytes to 2 on channel businesschannel took 67.7µs" +"2020-05-20 18:20:31.941 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +"2020-05-20 18:20:31.943 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 335.8µs " +"2020-05-20 18:20:31.944 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 892.5µs " +"2020-05-20 18:20:31.944 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:31.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2020-05-20 18:20:31.946 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.1µs " +"2020-05-20 18:20:31.953 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:31.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:32.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e83 Sending msg of 28 bytes to 2 on channel businesschannel took 106µs" +"2020-05-20 18:20:32.429 UTC [orderer.common.cluster.step] sendMessage -> DEBU e84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 159.4µs " +"2020-05-20 18:20:32.429 UTC [orderer.common.cluster.step] handleMessage -> DEBU e85 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:32.430 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2020-05-20 18:20:32.429 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2020-05-20 18:20:32.432 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.4µs " +"2020-05-20 18:20:32.430 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.8µs " +"2020-05-20 18:20:32.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:32.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:32.899 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:32.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8d Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2020-05-20 18:20:32.906 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.9348ms " +"2020-05-20 18:20:32.929 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +"2020-05-20 18:20:32.929 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2020-05-20 18:20:32.929 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.9µs " +"2020-05-20 18:20:32.929 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.9µs " +"2020-05-20 18:20:32.930 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:32.932 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:33.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:33.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e96 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +"2020-05-20 18:20:33.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU e97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.8µs " +"2020-05-20 18:20:33.414 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +"2020-05-20 18:20:33.414 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e99 Sending msg of 28 bytes to 3 on channel businesschannel took 93.9µs" +"2020-05-20 18:20:33.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.3µs " +"2020-05-20 18:20:33.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.9µs " +"2020-05-20 18:20:33.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:33.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:33.893 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:33.894 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9f Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-05-20 18:20:33.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.8µs " +"2020-05-20 18:20:33.913 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +"2020-05-20 18:20:33.914 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea2 Sending msg of 28 bytes to 3 on channel businesschannel took 25µs" +"2020-05-20 18:20:33.914 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +"2020-05-20 18:20:33.931 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 17.3088ms " +"2020-05-20 18:20:33.951 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:33.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:34.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:34.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea8 Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +"2020-05-20 18:20:34.413 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2020-05-20 18:20:34.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.5µs " +"2020-05-20 18:20:34.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.9µs " +"2020-05-20 18:20:34.427 UTC [orderer.common.cluster.step] sendMessage -> DEBU eac Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7347ms " +"2020-05-20 18:20:34.423 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ead Sending msg of 28 bytes to 3 on channel testchainid took 433.1µs" +"2020-05-20 18:20:34.444 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:34.459 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:34.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:34.893 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb1 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2020-05-20 18:20:34.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +"2020-05-20 18:20:34.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +"2020-05-20 18:20:34.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb4 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2020-05-20 18:20:34.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 645.7µs " +"2020-05-20 18:20:34.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5822ms " +"2020-05-20 18:20:34.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:34.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:35.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:35.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eba Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2020-05-20 18:20:35.393 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178µs " +"2020-05-20 18:20:35.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2020-05-20 18:20:35.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +"2020-05-20 18:20:35.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.4µs " +"2020-05-20 18:20:35.417 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 7.145ms " +"2020-05-20 18:20:35.419 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:35.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:35.893 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:35.893 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec3 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +"2020-05-20 18:20:35.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.2µs " +"2020-05-20 18:20:35.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2020-05-20 18:20:35.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec6 Sending msg of 28 bytes to 3 on channel businesschannel took 104.5µs" +"2020-05-20 18:20:35.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +"2020-05-20 18:20:35.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.7µs " +"2020-05-20 18:20:35.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:35.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:36.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:36.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecc Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +"2020-05-20 18:20:36.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.2µs " +"2020-05-20 18:20:36.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +"2020-05-20 18:20:36.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecf Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +"2020-05-20 18:20:36.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 228.6µs " +"2020-05-20 18:20:36.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.1µs " +"2020-05-20 18:20:36.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:36.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:36.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2020-05-20 18:20:36.918 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed5 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-05-20 18:20:36.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +"2020-05-20 18:20:36.942 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 8.6102ms " +"2020-05-20 18:20:36.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:36.949 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:36.950 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +"2020-05-20 18:20:36.952 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:36.949 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +"2020-05-20 18:20:37.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU edd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:37.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ede Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +"2020-05-20 18:20:37.393 UTC [orderer.common.cluster.step] sendMessage -> DEBU edf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150µs " +"2020-05-20 18:20:37.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee0 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2020-05-20 18:20:37.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.1µs " +"2020-05-20 18:20:37.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84µs " +"2020-05-20 18:20:37.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:37.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee4 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2020-05-20 18:20:37.415 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:37.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:37.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2020-05-20 18:20:37.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.2µs " +"2020-05-20 18:20:37.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2020-05-20 18:20:37.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.2µs " +"2020-05-20 18:20:37.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 3 on channel businesschannel took 32.3µs" +"2020-05-20 18:20:37.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +"2020-05-20 18:20:37.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:37.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:38.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:38.394 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef0 Sending msg of 28 bytes to 3 on channel testchainid took 50.9µs" +"2020-05-20 18:20:38.395 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.4µs " +"2020-05-20 18:20:38.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel businesschannel took 563.5µs" +"2020-05-20 18:20:38.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +"2020-05-20 18:20:38.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.8µs " +"2020-05-20 18:20:38.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.9µs " +"2020-05-20 18:20:38.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:38.415 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef7 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:38.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef8 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +"2020-05-20 18:20:38.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef9 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2020-05-20 18:20:38.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU efa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.1µs " +"2020-05-20 18:20:38.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU efb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.4µs " +"2020-05-20 18:20:38.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU efc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:38.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efd Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +"2020-05-20 18:20:38.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU efe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.5µs " +"2020-05-20 18:20:38.947 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:38.948 UTC [orderer.common.cluster.step] handleMessage -> DEBU f00 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:39.393 UTC [orderer.common.cluster.step] handleMessage -> DEBU f01 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:39.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f02 Sending msg of 28 bytes to 3 on channel testchainid took 27.8µs" +"2020-05-20 18:20:39.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU f03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492µs " +"2020-05-20 18:20:39.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" +"2020-05-20 18:20:39.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f06 Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +"2020-05-20 18:20:39.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 322.3µs " +"2020-05-20 18:20:39.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.6µs " +"2020-05-20 18:20:39.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:39.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:39.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:39.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0b Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" +"2020-05-20 18:20:39.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 981.6µs " +"2020-05-20 18:20:39.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +"2020-05-20 18:20:39.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 200.8µs " +"2020-05-20 18:20:39.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0f Sending msg of 28 bytes to 3 on channel businesschannel took 124.5µs" +"2020-05-20 18:20:39.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.4µs " +"2020-05-20 18:20:39.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:39.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:40.399 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:40.399 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2020-05-20 18:20:40.401 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " +"2020-05-20 18:20:40.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +"2020-05-20 18:20:40.420 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-05-20 18:20:40.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.7µs " +"2020-05-20 18:20:40.421 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.6µs " +"2020-05-20 18:20:40.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:40.423 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:40.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:40.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1d Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" +"2020-05-20 18:20:40.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 351µs " +"2020-05-20 18:20:40.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.8µs " +"2020-05-20 18:20:40.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU f20 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:40.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f21 Sending msg of 28 bytes to 2 on channel businesschannel took 2.1838ms" +"2020-05-20 18:20:40.917 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f22 Sending msg of 28 bytes to 3 on channel businesschannel took 48.4µs" +"2020-05-20 18:20:40.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU f23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.4µs " +"2020-05-20 18:20:40.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU f24 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:41.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:41.397 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f26 Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +"2020-05-20 18:20:41.398 UTC [orderer.common.cluster.step] sendMessage -> DEBU f27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.9µs " +"2020-05-20 18:20:41.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" +"2020-05-20 18:20:41.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f29 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2020-05-20 18:20:41.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.5µs " +"2020-05-20 18:20:41.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.072ms " +"2020-05-20 18:20:41.414 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:41.415 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:41.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:41.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2f Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-05-20 18:20:41.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f30 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.6µs " +"2020-05-20 18:20:41.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +"2020-05-20 18:20:41.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 329.9µs " +"2020-05-20 18:20:41.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.3µs " +"2020-05-20 18:20:41.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f34 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +"2020-05-20 18:20:41.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:41.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:42.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:42.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f38 Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +"2020-05-20 18:20:42.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU f39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.7µs " +"2020-05-20 18:20:42.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2020-05-20 18:20:42.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2020-05-20 18:20:42.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 193.4µs " +"2020-05-20 18:20:42.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.3µs " +"2020-05-20 18:20:42.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:42.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:42.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:42.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f41 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2020-05-20 18:20:42.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.4µs " +"2020-05-20 18:20:42.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +"2020-05-20 18:20:42.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f44 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2020-05-20 18:20:42.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115.2µs " +"2020-05-20 18:20:42.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.6µs " +"2020-05-20 18:20:42.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU f47 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:42.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:43.394 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:43.394 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4a Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs" +"2020-05-20 18:20:43.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 633.8µs " +"2020-05-20 18:20:43.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 2 on channel businesschannel took 83.9µs" +"2020-05-20 18:20:43.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.2µs " +"2020-05-20 18:20:43.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2020-05-20 18:20:43.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 557µs " +"2020-05-20 18:20:43.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU f50 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:43.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:43.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f52 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:43.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f53 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +"2020-05-20 18:20:43.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.2µs " +"2020-05-20 18:20:43.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +"2020-05-20 18:20:43.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f56 Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +"2020-05-20 18:20:43.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 249.8µs " +"2020-05-20 18:20:43.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.8µs " +"2020-05-20 18:20:43.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU f59 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:43.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:44.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:44.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5c Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +"2020-05-20 18:20:44.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.5µs " +"2020-05-20 18:20:44.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +"2020-05-20 18:20:44.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5f Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2020-05-20 18:20:44.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 334.9µs " +"2020-05-20 18:20:44.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.9µs " +"2020-05-20 18:20:44.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f62 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:44.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU f63 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:44.896 UTC [orderer.common.cluster.step] handleMessage -> DEBU f64 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:44.897 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f65 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2020-05-20 18:20:44.898 UTC [orderer.common.cluster.step] sendMessage -> DEBU f66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 406.7µs " +"2020-05-20 18:20:44.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +"2020-05-20 18:20:44.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f68 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2020-05-20 18:20:44.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +"2020-05-20 18:20:44.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:44.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 548.2µs " +"2020-05-20 18:20:44.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:45.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:45.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6e Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2020-05-20 18:20:45.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.3µs " +"2020-05-20 18:20:45.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f70 Sending msg of 28 bytes to 2 on channel businesschannel took 49µs" +"2020-05-20 18:20:45.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +"2020-05-20 18:20:45.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.2µs " +"2020-05-20 18:20:45.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.6µs " +"2020-05-20 18:20:45.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:45.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:45.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f76 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:45.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f77 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-05-20 18:20:45.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +"2020-05-20 18:20:45.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +"2020-05-20 18:20:45.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 2 on channel businesschannel took 15.9µs" +"2020-05-20 18:20:45.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.3µs " +"2020-05-20 18:20:45.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.1µs " +"2020-05-20 18:20:45.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:45.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:46.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:46.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f80 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2020-05-20 18:20:46.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 369.9µs " +"2020-05-20 18:20:46.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +"2020-05-20 18:20:46.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f83 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2020-05-20 18:20:46.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.2µs " +"2020-05-20 18:20:46.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.3µs " +"2020-05-20 18:20:46.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:46.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:46.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f88 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:46.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f89 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2020-05-20 18:20:46.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.4µs " +"2020-05-20 18:20:46.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +"2020-05-20 18:20:46.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76µs " +"2020-05-20 18:20:46.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57µs " +"2020-05-20 18:20:46.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:46.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:46.913 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f90 Sending msg of 28 bytes to 3 on channel businesschannel took 1.5704ms" +"2020-05-20 18:20:47.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU f91 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:47.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f92 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-05-20 18:20:47.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU f93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.3µs " +"2020-05-20 18:20:47.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +"2020-05-20 18:20:47.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f95 Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +"2020-05-20 18:20:47.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 563.8µs " +"2020-05-20 18:20:47.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU f97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.2µs " +"2020-05-20 18:20:47.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f98 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:47.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU f99 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:47.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:47.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9b Sending msg of 28 bytes to 3 on channel testchainid took 32µs" +"2020-05-20 18:20:47.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.3µs " +"2020-05-20 18:20:47.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +"2020-05-20 18:20:47.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9e Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +"2020-05-20 18:20:47.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.8µs " +"2020-05-20 18:20:47.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 338.7µs " +"2020-05-20 18:20:47.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:47.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:48.396 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:48.396 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa4 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2020-05-20 18:20:48.396 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.7µs " +"2020-05-20 18:20:48.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +"2020-05-20 18:20:48.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.3µs " +"2020-05-20 18:20:48.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa8 Sending msg of 28 bytes to 3 on channel businesschannel took 153.2µs" +"2020-05-20 18:20:48.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.8µs " +"2020-05-20 18:20:48.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU faa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:48.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU fab Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:48.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU fac Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:48.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fad Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2020-05-20 18:20:48.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU fae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 294.9µs " +"2020-05-20 18:20:48.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 2 on channel businesschannel took 13.9µs" +"2020-05-20 18:20:48.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb0 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2020-05-20 18:20:48.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.9µs " +"2020-05-20 18:20:48.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51µs " +"2020-05-20 18:20:48.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:48.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:49.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:49.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb6 Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +"2020-05-20 18:20:49.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.4µs " +"2020-05-20 18:20:49.417 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 2 on channel businesschannel took 376µs" +"2020-05-20 18:20:49.418 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 484.1µs " +"2020-05-20 18:20:49.418 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fba Sending msg of 28 bytes to 3 on channel businesschannel took 17µs" +"2020-05-20 18:20:49.420 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0351ms " +"2020-05-20 18:20:49.421 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:49.422 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:49.893 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:49.894 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbf Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +"2020-05-20 18:20:49.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0495ms " +"2020-05-20 18:20:49.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +"2020-05-20 18:20:49.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 2 on channel businesschannel took 144.7µs" +"2020-05-20 18:20:49.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.4µs " +"2020-05-20 18:20:49.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 953.8µs " +"2020-05-20 18:20:49.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:49.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:50.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:50.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc8 Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2020-05-20 18:20:50.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.5µs " +"2020-05-20 18:20:50.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +"2020-05-20 18:20:50.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 3 on channel businesschannel took 85.5µs" +"2020-05-20 18:20:50.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.6µs " +"2020-05-20 18:20:50.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 293µs " +"2020-05-20 18:20:50.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU fce Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:50.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcf Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:50.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:50.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd1 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-05-20 18:20:50.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +"2020-05-20 18:20:50.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd3 Sending msg of 28 bytes to 2 on channel businesschannel took 24.7µs" +"2020-05-20 18:20:50.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2020-05-20 18:20:50.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.3µs " +"2020-05-20 18:20:50.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.7424ms " +"2020-05-20 18:20:50.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd7 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:50.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:51.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:51.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fda Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-05-20 18:20:51.393 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325µs " +"2020-05-20 18:20:51.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdc Sending msg of 28 bytes to 2 on channel businesschannel took 16.5µs" +"2020-05-20 18:20:51.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdd Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2020-05-20 18:20:51.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU fde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.2µs " +"2020-05-20 18:20:51.411 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:51.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.87ms " +"2020-05-20 18:20:51.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:51.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:51.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe3 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-05-20 18:20:51.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.3µs " +"2020-05-20 18:20:51.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe5 Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +"2020-05-20 18:20:51.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe6 Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +"2020-05-20 18:20:51.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.7µs " +"2020-05-20 18:20:51.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 895.4µs " +"2020-05-20 18:20:51.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:51.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU fea Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:52.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU feb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:52.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fec Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +"2020-05-20 18:20:52.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU fed Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.7µs " +"2020-05-20 18:20:52.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fee Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2020-05-20 18:20:52.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff0 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2020-05-20 18:20:52.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU fef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140µs " +"2020-05-20 18:20:52.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +"2020-05-20 18:20:52.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff2 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:52.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:52.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:52.893 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff5 Sending msg of 28 bytes to 3 on channel testchainid took 9.4µs" +"2020-05-20 18:20:52.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.4µs " +"2020-05-20 18:20:52.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff7 Sending msg of 28 bytes to 2 on channel businesschannel took 50.4µs" +"2020-05-20 18:20:52.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff8 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2020-05-20 18:20:52.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.6µs " +"2020-05-20 18:20:52.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 38.7µs " +"2020-05-20 18:20:52.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffb Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:52.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:53.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:53.391 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffe Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-05-20 18:20:53.393 UTC [orderer.common.cluster.step] sendMessage -> DEBU fff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265.2µs " +"2020-05-20 18:20:53.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1000 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 706.1µs " +"2020-05-20 18:20:53.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1001 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2020-05-20 18:20:53.413 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1002 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +"2020-05-20 18:20:53.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1003 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:53.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1004 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +"2020-05-20 18:20:53.417 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1005 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:53.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1006 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:53.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1007 Sending msg of 28 bytes to 3 on channel testchainid took 8.4µs" +"2020-05-20 18:20:53.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1008 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.7µs " +"2020-05-20 18:20:53.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1009 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.8µs " +"2020-05-20 18:20:53.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 2 on channel businesschannel took 35.3µs" +"2020-05-20 18:20:53.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100c Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2020-05-20 18:20:53.911 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:53.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +"2020-05-20 18:20:53.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:54.391 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:54.392 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1010 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-05-20 18:20:54.392 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1011 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +"2020-05-20 18:20:54.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1012 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2020-05-20 18:20:54.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1014 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2020-05-20 18:20:54.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1013 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.4µs " +"2020-05-20 18:20:54.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1015 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.7µs " +"2020-05-20 18:20:54.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1016 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:54.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1017 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:54.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1018 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:54.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1019 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2020-05-20 18:20:54.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.4µs " +"2020-05-20 18:20:54.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101b Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +"2020-05-20 18:20:54.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101d Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-05-20 18:20:54.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.9µs " +"2020-05-20 18:20:54.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.3µs " +"2020-05-20 18:20:54.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:54.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1020 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:55.397 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1021 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:55.398 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1022 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +"2020-05-20 18:20:55.399 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1023 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +"2020-05-20 18:20:55.411 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1024 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +"2020-05-20 18:20:55.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2020-05-20 18:20:55.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1026 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 209.2µs " +"2020-05-20 18:20:55.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 406.7µs " +"2020-05-20 18:20:55.415 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1028 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:55.416 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:55.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:55.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102b Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +"2020-05-20 18:20:55.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.1µs " +"2020-05-20 18:20:55.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102d Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +"2020-05-20 18:20:55.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102e Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2020-05-20 18:20:55.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +"2020-05-20 18:20:55.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1030 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 343.7µs " +"2020-05-20 18:20:55.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1031 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:55.916 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:56.014 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1033 No inactive chains to try to replicate" +"2020-05-20 18:20:56.395 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1034 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:56.397 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1035 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2020-05-20 18:20:56.398 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1036 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.4µs " +"2020-05-20 18:20:56.514 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1037 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1757ms" +"2020-05-20 18:20:56.514 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1038 Sending msg of 28 bytes to 3 on channel businesschannel took 137.6µs" +"2020-05-20 18:20:56.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1039 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.6µs " +"2020-05-20 18:20:56.515 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.4µs " +"2020-05-20 18:20:56.525 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:56.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:56.891 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:56.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103e Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-05-20 18:20:56.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 421.9µs " +"2020-05-20 18:20:56.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1040 Sending msg of 28 bytes to 2 on channel businesschannel took 63µs" +"2020-05-20 18:20:56.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1041 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2020-05-20 18:20:56.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1042 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 201.7µs " +"2020-05-20 18:20:56.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1043 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 837µs " +"2020-05-20 18:20:56.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1044 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:56.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1045 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:57.392 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1046 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:57.393 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +"2020-05-20 18:20:57.394 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1048 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 538.4µs " +"2020-05-20 18:20:57.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1049 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2020-05-20 18:20:57.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104a Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-05-20 18:20:57.411 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.4µs " +"2020-05-20 18:20:57.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:57.414 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:57.415 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.8168ms " +"2020-05-20 18:20:57.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:57.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1050 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +"2020-05-20 18:20:57.893 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1051 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +"2020-05-20 18:20:57.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1052 Sending msg of 28 bytes to 2 on channel businesschannel took 59.9µs" +"2020-05-20 18:20:57.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1053 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2020-05-20 18:20:57.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1054 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +"2020-05-20 18:20:57.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1055 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.2µs " +"2020-05-20 18:20:57.912 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1056 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:57.913 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1057 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:58.422 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1058 Sending msg of 28 bytes to 2 on channel businesschannel took 24.1µs" +"2020-05-20 18:20:58.422 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1059 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-05-20 18:20:58.423 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " +"2020-05-20 18:20:58.426 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.1µs " +"2020-05-20 18:20:58.428 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:58.432 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:58.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:58.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105f Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +"2020-05-20 18:20:58.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1060 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.4µs " +"2020-05-20 18:20:58.861 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1061 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:58.945 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1062 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.4µs " +"2020-05-20 18:20:58.945 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1063 Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +"2020-05-20 18:20:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1064 Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +"2020-05-20 18:20:58.951 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1065 Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +"2020-05-20 18:20:58.952 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1066 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.9µs " +"2020-05-20 18:20:58.953 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1067 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4825ms " +"2020-05-20 18:20:58.954 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1068 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:58.959 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1069 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:59.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:59.359 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106b Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2020-05-20 18:20:59.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " +"2020-05-20 18:20:59.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106d Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs" +"2020-05-20 18:20:59.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106e Sending msg of 28 bytes to 3 on channel businesschannel took 34.3µs" +"2020-05-20 18:20:59.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.1µs " +"2020-05-20 18:20:59.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1070 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 895.1µs " +"2020-05-20 18:20:59.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1071 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:59.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1072 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:59.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1073 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:20:59.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1074 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2020-05-20 18:20:59.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1075 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 276.1µs " +"2020-05-20 18:20:59.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1076 Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +"2020-05-20 18:20:59.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1077 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2020-05-20 18:20:59.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1078 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.2µs " +"2020-05-20 18:20:59.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1079 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 207.5µs " +"2020-05-20 18:20:59.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:20:59.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:00.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:00.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107d Sending msg of 28 bytes to 3 on channel testchainid took 63.3µs" +"2020-05-20 18:21:00.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3275ms " +"2020-05-20 18:21:00.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107f Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +"2020-05-20 18:21:00.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1080 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2020-05-20 18:21:00.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1081 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 315.9µs " +"2020-05-20 18:21:00.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1082 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.9µs " +"2020-05-20 18:21:00.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1083 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:00.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1084 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:00.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1085 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:00.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1086 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2020-05-20 18:21:00.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1087 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 370.3µs " +"2020-05-20 18:21:00.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1088 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2020-05-20 18:21:00.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1089 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2020-05-20 18:21:00.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185µs " +"2020-05-20 18:21:00.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.6µs " +"2020-05-20 18:21:00.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:00.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:01.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:01.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108f Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2020-05-20 18:21:01.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1090 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101µs " +"2020-05-20 18:21:01.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1091 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +"2020-05-20 18:21:01.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1093 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2020-05-20 18:21:01.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1094 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.1µs " +"2020-05-20 18:21:01.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1092 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.4µs " +"2020-05-20 18:21:01.381 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1095 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:01.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1096 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:01.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1097 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:01.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1098 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-05-20 18:21:01.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1099 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " +"2020-05-20 18:21:01.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109a Sending msg of 28 bytes to 2 on channel businesschannel took 17.6µs" +"2020-05-20 18:21:01.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109b Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +"2020-05-20 18:21:01.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274µs " +"2020-05-20 18:21:01.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.3µs " +"2020-05-20 18:21:01.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:01.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:02.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:02.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a1 Sending msg of 28 bytes to 3 on channel testchainid took 8.2µs" +"2020-05-20 18:21:02.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +"2020-05-20 18:21:02.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a3 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +"2020-05-20 18:21:02.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a5 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-05-20 18:21:02.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:02.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.9µs " +"2020-05-20 18:21:02.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +"2020-05-20 18:21:02.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:02.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:02.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10aa Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +"2020-05-20 18:21:02.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.6µs " +"2020-05-20 18:21:02.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ac Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2020-05-20 18:21:02.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ad Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2020-05-20 18:21:02.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 209.1µs " +"2020-05-20 18:21:02.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +"2020-05-20 18:21:02.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:02.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:03.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:03.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b3 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2020-05-20 18:21:03.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +"2020-05-20 18:21:03.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b5 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +"2020-05-20 18:21:03.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 3 on channel businesschannel took 122.8µs" +"2020-05-20 18:21:03.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.6µs " +"2020-05-20 18:21:03.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.5µs " +"2020-05-20 18:21:03.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:03.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ba Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:03.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:03.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +"2020-05-20 18:21:03.867 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bd Sending msg of 28 bytes to 3 on channel testchainid took 347.5µs" +"2020-05-20 18:21:03.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10be Sending msg of 28 bytes to 2 on channel businesschannel took 93.3µs" +"2020-05-20 18:21:03.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bf Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +"2020-05-20 18:21:03.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.3µs " +"2020-05-20 18:21:03.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.9µs " +"2020-05-20 18:21:03.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:03.881 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:04.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:04.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c5 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-05-20 18:21:04.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +"2020-05-20 18:21:04.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c7 Sending msg of 28 bytes to 2 on channel businesschannel took 54µs" +"2020-05-20 18:21:04.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c8 Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +"2020-05-20 18:21:04.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.4µs " +"2020-05-20 18:21:04.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.5µs " +"2020-05-20 18:21:04.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:04.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:04.860 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:04.869 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ce Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2020-05-20 18:21:04.871 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7111ms " +"2020-05-20 18:21:04.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d0 Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2020-05-20 18:21:04.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d1 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2020-05-20 18:21:04.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.5µs " +"2020-05-20 18:21:04.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.9µs " +"2020-05-20 18:21:04.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:04.883 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:05.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:05.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d7 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +"2020-05-20 18:21:05.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 871.9µs " +"2020-05-20 18:21:05.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d9 Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" +"2020-05-20 18:21:05.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 638.8µs " +"2020-05-20 18:21:05.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10db Sending msg of 28 bytes to 3 on channel businesschannel took 74.8µs" +"2020-05-20 18:21:05.383 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:05.383 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10dd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.6729ms " +"2020-05-20 18:21:05.383 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10de Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:05.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10df Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:05.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e0 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2020-05-20 18:21:05.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 527.4µs " +"2020-05-20 18:21:05.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e2 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2020-05-20 18:21:05.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e3 Sending msg of 28 bytes to 3 on channel businesschannel took 31.2µs" +"2020-05-20 18:21:05.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.2µs " +"2020-05-20 18:21:05.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0868ms " +"2020-05-20 18:21:05.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:05.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e7 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:06.359 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:06.359 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e9 Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +"2020-05-20 18:21:06.360 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +"2020-05-20 18:21:06.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10eb Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +"2020-05-20 18:21:06.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ec Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2020-05-20 18:21:06.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 487.3µs " +"2020-05-20 18:21:06.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171µs " +"2020-05-20 18:21:06.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ef Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:06.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:06.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:06.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f2 Sending msg of 28 bytes to 3 on channel testchainid took 10.1µs" +"2020-05-20 18:21:06.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +"2020-05-20 18:21:06.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f4 Sending msg of 28 bytes to 3 on channel businesschannel took 79.3µs" +"2020-05-20 18:21:06.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10f5 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2020-05-20 18:21:06.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.6µs " +"2020-05-20 18:21:06.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.9µs " +"2020-05-20 18:21:06.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:06.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10f9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:07.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fa Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:07.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fb Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +"2020-05-20 18:21:07.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.5µs " +"2020-05-20 18:21:07.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fd Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +"2020-05-20 18:21:07.379 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1100 Sending msg of 28 bytes to 3 on channel businesschannel took 139.2µs" +"2020-05-20 18:21:07.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.1µs " +"2020-05-20 18:21:07.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ff Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:07.381 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1101 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 862.8µs " +"2020-05-20 18:21:07.384 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1102 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:07.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1103 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:07.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1104 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-05-20 18:21:07.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1105 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.8µs " +"2020-05-20 18:21:07.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1106 Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +"2020-05-20 18:21:07.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1107 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.6µs " +"2020-05-20 18:21:07.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1108 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +"2020-05-20 18:21:07.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1109 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 482.9µs " +"2020-05-20 18:21:07.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:07.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:08.360 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:08.360 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110d Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2020-05-20 18:21:08.360 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.8µs " +"2020-05-20 18:21:08.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110f Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +"2020-05-20 18:21:08.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2020-05-20 18:21:08.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +"2020-05-20 18:21:08.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1112 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.2µs " +"2020-05-20 18:21:08.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1113 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:08.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1114 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:08.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1115 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:08.856 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1116 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-05-20 18:21:08.856 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1117 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " +"2020-05-20 18:21:08.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1118 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" +"2020-05-20 18:21:08.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 2 on channel businesschannel took 6.9µs" +"2020-05-20 18:21:08.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69µs " +"2020-05-20 18:21:08.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45µs " +"2020-05-20 18:21:08.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:08.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:09.363 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:09.363 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111f Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2020-05-20 18:21:09.363 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1120 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +"2020-05-20 18:21:09.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1121 Sending msg of 28 bytes to 2 on channel businesschannel took 35.7µs" +"2020-05-20 18:21:09.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2020-05-20 18:21:09.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1123 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95µs " +"2020-05-20 18:21:09.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1124 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.5µs " +"2020-05-20 18:21:09.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1125 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:09.383 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1126 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:09.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1127 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:09.859 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1128 Sending msg of 28 bytes to 3 on channel testchainid took 44µs" +"2020-05-20 18:21:09.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1129 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.6µs " +"2020-05-20 18:21:09.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112a Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +"2020-05-20 18:21:09.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +"2020-05-20 18:21:09.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 191µs " +"2020-05-20 18:21:09.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 899.1µs " +"2020-05-20 18:21:09.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:09.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:10.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1130 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:10.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1131 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-05-20 18:21:10.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1132 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +"2020-05-20 18:21:10.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1133 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2020-05-20 18:21:10.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 3 on channel businesschannel took 60.9µs" +"2020-05-20 18:21:10.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1135 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.2µs " +"2020-05-20 18:21:10.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.5µs " +"2020-05-20 18:21:10.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1137 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:10.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:10.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:10.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113a Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-05-20 18:21:10.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.5µs " +"2020-05-20 18:21:10.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113c Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +"2020-05-20 18:21:10.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2020-05-20 18:21:10.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 494.6µs " +"2020-05-20 18:21:10.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.7µs " +"2020-05-20 18:21:10.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1140 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:10.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:10.937 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1142 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:53516 with txid 'd4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb' of type ENDORSER_TRANSACTION" +"2020-05-20 18:21:10.938 UTC [policies] Evaluate -> DEBU 1143 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:21:10.938 UTC [policies] Evaluate -> DEBU 1144 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:10.938 UTC [policies] Evaluate -> DEBU 1145 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:21:10.939 UTC [policies] Evaluate -> DEBU 1146 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:10.939 UTC [policies] Evaluate -> DEBU 1147 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:21:10.939 UTC [msp] DeserializeIdentity -> DEBU 1148 Obtaining identity" +"2020-05-20 18:21:10.940 UTC [msp.identity] newIdentity -> DEBU 1149 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-05-20 18:21:10.941 UTC [cauthdsl] func1 -> DEBU 114a 0xc000ff66b0 gate 1589998870941195800 evaluation starts" +"2020-05-20 18:21:10.941 UTC [cauthdsl] func2 -> DEBU 114b 0xc000ff66b0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:10.941 UTC [cauthdsl] func2 -> DEBU 114c 0xc000ff66b0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:10.942 UTC [cauthdsl] func2 -> DEBU 114d 0xc000ff66b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-05-20 18:21:10.942 UTC [cauthdsl] func2 -> DEBU 114e 0xc000ff66b0 principal evaluation fails" +"2020-05-20 18:21:10.942 UTC [cauthdsl] func1 -> DEBU 114f 0xc000ff66b0 gate 1589998870941195800 evaluation fails" +"2020-05-20 18:21:10.942 UTC [policies] Evaluate -> DEBU 1150 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:10.942 UTC [policies] Evaluate -> DEBU 1151 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:10.943 UTC [policies] func1 -> DEBU 1152 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1153 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1154 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1155 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1156 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:10.943 UTC [policies] Evaluate -> DEBU 1157 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-05-20 18:21:10.944 UTC [cauthdsl] func1 -> DEBU 1158 0xc000ff7d20 gate 1589998870944261900 evaluation starts" +"2020-05-20 18:21:10.944 UTC [cauthdsl] func2 -> DEBU 1159 0xc000ff7d20 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:10.944 UTC [cauthdsl] func2 -> DEBU 115a 0xc000ff7d20 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:10.945 UTC [cauthdsl] func2 -> DEBU 115b 0xc000ff7d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-05-20 18:21:10.945 UTC [cauthdsl] func2 -> DEBU 115c 0xc000ff7d20 principal evaluation fails" +"2020-05-20 18:21:10.945 UTC [cauthdsl] func1 -> DEBU 115d 0xc000ff7d20 gate 1589998870944261900 evaluation fails" +"2020-05-20 18:21:10.945 UTC [policies] Evaluate -> DEBU 115e Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:10.945 UTC [policies] Evaluate -> DEBU 115f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:10.945 UTC [policies] Evaluate -> DEBU 1160 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-05-20 18:21:10.946 UTC [cauthdsl] func1 -> DEBU 1161 0xc001010580 gate 1589998870945941300 evaluation starts" +"2020-05-20 18:21:10.946 UTC [cauthdsl] func2 -> DEBU 1162 0xc001010580 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:10.946 UTC [cauthdsl] func2 -> DEBU 1163 0xc001010580 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:10.946 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1164 Checking if identity satisfies MEMBER role for Org1MSP" +"2020-05-20 18:21:10.946 UTC [msp] Validate -> DEBU 1165 MSP Org1MSP validating identity" +"2020-05-20 18:21:10.947 UTC [msp] getCertificationChain -> DEBU 1166 MSP Org1MSP getting certification chain" +"2020-05-20 18:21:10.948 UTC [cauthdsl] func2 -> DEBU 1167 0xc001010580 principal matched by identity 0" +"2020-05-20 18:21:10.948 UTC [msp.identity] Verify -> DEBU 1168 Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..|" +"2020-05-20 18:21:10.948 UTC [msp.identity] Verify -> DEBU 1169 Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +00000040 cf eb d4 a9 50 ef |....P.|" +"2020-05-20 18:21:10.949 UTC [cauthdsl] func2 -> DEBU 116a 0xc001010580 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:10.949 UTC [cauthdsl] func1 -> DEBU 116b 0xc001010580 gate 1589998870945941300 evaluation succeeds" +"2020-05-20 18:21:10.949 UTC [policies] Evaluate -> DEBU 116c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:10.950 UTC [policies] Evaluate -> DEBU 116d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:10.950 UTC [policies] Evaluate -> DEBU 116e Signature set satisfies policy /Channel/Application/Writers" +"2020-05-20 18:21:10.950 UTC [policies] Evaluate -> DEBU 116f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-05-20 18:21:10.950 UTC [policies] Evaluate -> DEBU 1170 Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:21:10.951 UTC [policies] Evaluate -> DEBU 1171 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:21:10.951 UTC [orderer.common.blockcutter] Ordered -> DEBU 1172 Enqueuing message into batch" +"2020-05-20 18:21:10.951 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1173 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:53516" +"2020-05-20 18:21:10.956 UTC [grpc] warningf -> DEBU 1174 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:53516: read: connection reset by peer" +"2020-05-20 18:21:10.956 UTC [grpc] infof -> DEBU 1175 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:10.957 UTC [orderer.common.broadcast] Handle -> WARN 1176 Error reading from 172.18.0.9:53516: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:10.957 UTC [orderer.common.server] func1 -> DEBU 1177 Closing Broadcast stream" +"2020-05-20 18:21:10.959 UTC [comm.grpc.server] 1 -> INFO 1178 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53516 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.4863661s +"2020-05-20 18:21:11.361 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1179 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:11.363 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2020-05-20 18:21:11.364 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.2µs " +"2020-05-20 18:21:11.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117c Sending msg of 28 bytes to 2 on channel businesschannel took 86.9µs" +"2020-05-20 18:21:11.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117d Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +"2020-05-20 18:21:11.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.8µs " +"2020-05-20 18:21:11.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 374.2µs " +"2020-05-20 18:21:11.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1180 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:11.386 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1181 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:11.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1182 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" +"2020-05-20 18:21:11.891 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1183 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +"2020-05-20 18:21:11.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1184 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 289.2µs " +"2020-05-20 18:21:11.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1185 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 292µs " +"2020-05-20 18:21:11.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1186 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:11.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1187 Sending msg of 28 bytes to 3 on channel testchainid took 11.5µs" +"2020-05-20 18:21:11.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1188 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.7µs " +"2020-05-20 18:21:11.902 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1189 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:11.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:12.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118c Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +"2020-05-20 18:21:12.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +"2020-05-20 18:21:12.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118e Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +"2020-05-20 18:21:12.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1190 Sending msg of 28 bytes to 2 on channel businesschannel took 49.6µs" +"2020-05-20 18:21:12.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.9µs " +"2020-05-20 18:21:12.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1191 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.8µs " +"2020-05-20 18:21:12.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1192 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1193 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:12.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1195 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2020-05-20 18:21:12.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1196 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +"2020-05-20 18:21:12.878 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1197 Sending msg of 28 bytes to 2 on channel businesschannel took 120.9µs" +"2020-05-20 18:21:12.878 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1198 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2020-05-20 18:21:12.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1199 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.2µs " +"2020-05-20 18:21:12.879 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.4µs " +"2020-05-20 18:21:12.881 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.882 UTC [orderer.common.cluster.step] handleMessage -> DEBU 119c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.953 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 119d Batch timer expired, creating block" channel=businesschannel node=1 +"2020-05-20 18:21:12.953 UTC [orderer.consensus.etcdraft] propose -> INFO 119e Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-05-20 18:21:12.954 UTC [orderer.consensus.etcdraft] 2 -> DEBU 119f Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2020-05-20 18:21:12.958 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a0 Send of ConsensusRequest for channel businesschannel with payload of size 3647 to orderer1.example.com(orderer1.example.com:7050) took 123.1µs " +"2020-05-20 18:21:12.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a1 Sending msg of 3647 bytes to 2 on channel businesschannel took 43.3µs" +"2020-05-20 18:21:12.960 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a2 Send of ConsensusRequest for channel businesschannel with payload of size 3647 to orderer2.example.com(orderer2.example.com:7050) took 166.1µs " +"2020-05-20 18:21:12.963 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.963 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a4 Sending msg of 3647 bytes to 3 on channel businesschannel took 3.2866ms" +"2020-05-20 18:21:12.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.967 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a6 Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2020-05-20 18:21:12.968 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a9 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2020-05-20 18:21:12.968 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 270.6µs " +"2020-05-20 18:21:12.967 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 11a7 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2020-05-20 18:21:12.968 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 11ab [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-05-20 18:21:12.968 UTC [msp] GetDefaultSigningIdentity -> DEBU 11ac Obtaining default signing identity" +"2020-05-20 18:21:12.969 UTC [msp] GetDefaultSigningIdentity -> DEBU 11ad Obtaining default signing identity" +"2020-05-20 18:21:12.969 UTC [msp.identity] Sign -> DEBU 11ae Sign: plaintext: 0A020802120B0A090A03010203100418...2D28A0829A0E49AFEA8F8402854E7ABE " +"2020-05-20 18:21:12.970 UTC [msp.identity] Sign -> DEBU 11af Sign: digest: 6C1B423BB90D53735B1923F0702F95DE248BE9D3FAD627EACC57A14C3A9CD61F " +"2020-05-20 18:21:12.967 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.6µs " +"2020-05-20 18:21:12.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b0 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.976 UTC [fsblkstorage] indexBlock -> DEBU 11b1 Indexing block [blockNum=3, blockHash=[]byte{0xe4, 0xd0, 0x6e, 0x11, 0x83, 0x40, 0x38, 0x1c, 0x2a, 0x25, 0xb9, 0x5b, 0xef, 0x40, 0xdf, 0xab, 0x76, 0x31, 0x92, 0x2e, 0xb6, 0x6d, 0xd2, 0x76, 0xed, 0x67, 0x48, 0xc4, 0x26, 0xd8, 0xcb, 0xd9} txOffsets= +txId=d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb locPointer=offset=70, bytesLength=3519 +]" +"2020-05-20 18:21:12.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:12.990 UTC [fsblkstorage] updateCheckpoint -> DEBU 11b3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89369], isChainEmpty=[false], lastBlockNumber=[3]" +"2020-05-20 18:21:12.991 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 11b4 [channel: businesschannel] Wrote block [3]" +"2020-05-20 18:21:13.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:13.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b6 Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" +"2020-05-20 18:21:13.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.7µs " +"2020-05-20 18:21:13.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b8 Sending msg of 28 bytes to 2 on channel businesschannel took 59.5µs" +"2020-05-20 18:21:13.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bb Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2020-05-20 18:21:13.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 315.7µs " +"2020-05-20 18:21:13.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ba Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:13.379 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0693ms " +"2020-05-20 18:21:13.381 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11bd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:13.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11be Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:13.859 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bf Sending msg of 28 bytes to 3 on channel testchainid took 41.2µs" +"2020-05-20 18:21:13.860 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 844.9µs " +"2020-05-20 18:21:13.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c1 Sending msg of 28 bytes to 3 on channel businesschannel took 23.3µs" +"2020-05-20 18:21:13.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c2 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2020-05-20 18:21:13.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.9µs " +"2020-05-20 18:21:13.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 225.6µs " +"2020-05-20 18:21:13.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:13.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:14.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:14.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c8 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" +"2020-05-20 18:21:14.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 306.2µs " +"2020-05-20 18:21:14.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ca Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2020-05-20 18:21:14.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cb Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2020-05-20 18:21:14.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.1µs " +"2020-05-20 18:21:14.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 513.3µs " +"2020-05-20 18:21:14.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ce Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:14.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11cf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:14.532 UTC [orderer.common.server] Broadcast -> DEBU 11d0 Starting new Broadcast handler" +"2020-05-20 18:21:14.534 UTC [orderer.common.broadcast] Handle -> DEBU 11d1 Starting new broadcast loop for 172.18.0.9:53552" +"2020-05-20 18:21:14.547 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 11d2 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:53552 with txid '523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb' of type ENDORSER_TRANSACTION" +"2020-05-20 18:21:14.547 UTC [policies] Evaluate -> DEBU 11d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:21:14.548 UTC [policies] Evaluate -> DEBU 11d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:14.548 UTC [policies] Evaluate -> DEBU 11d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:21:14.548 UTC [policies] Evaluate -> DEBU 11d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:14.548 UTC [policies] Evaluate -> DEBU 11d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:21:14.548 UTC [cauthdsl] func1 -> DEBU 11d8 0xc0010a3c40 gate 1589998874548778400 evaluation starts" +"2020-05-20 18:21:14.548 UTC [cauthdsl] func2 -> DEBU 11d9 0xc0010a3c40 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:14.549 UTC [cauthdsl] func2 -> DEBU 11da 0xc0010a3c40 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:14.549 UTC [cauthdsl] func2 -> DEBU 11db 0xc0010a3c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-05-20 18:21:14.549 UTC [cauthdsl] func2 -> DEBU 11dc 0xc0010a3c40 principal evaluation fails" +"2020-05-20 18:21:14.549 UTC [cauthdsl] func1 -> DEBU 11dd 0xc0010a3c40 gate 1589998874548778400 evaluation fails" +"2020-05-20 18:21:14.549 UTC [policies] Evaluate -> DEBU 11de Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:14.549 UTC [policies] Evaluate -> DEBU 11df == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:14.550 UTC [policies] func1 -> DEBU 11e0 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e1 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:14.550 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-05-20 18:21:14.551 UTC [cauthdsl] func1 -> DEBU 11e6 0xc0010ee930 gate 1589998874550979200 evaluation starts" +"2020-05-20 18:21:14.551 UTC [cauthdsl] func2 -> DEBU 11e7 0xc0010ee930 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:14.551 UTC [cauthdsl] func2 -> DEBU 11e8 0xc0010ee930 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:14.551 UTC [cauthdsl] func2 -> DEBU 11e9 0xc0010ee930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-05-20 18:21:14.551 UTC [cauthdsl] func2 -> DEBU 11ea 0xc0010ee930 principal evaluation fails" +"2020-05-20 18:21:14.551 UTC [cauthdsl] func1 -> DEBU 11eb 0xc0010ee930 gate 1589998874550979200 evaluation fails" +"2020-05-20 18:21:14.551 UTC [policies] Evaluate -> DEBU 11ec Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:14.552 UTC [policies] Evaluate -> DEBU 11ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:14.552 UTC [policies] Evaluate -> DEBU 11ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-05-20 18:21:14.552 UTC [cauthdsl] func1 -> DEBU 11ef 0xc0010ef170 gate 1589998874552576000 evaluation starts" +"2020-05-20 18:21:14.552 UTC [cauthdsl] func2 -> DEBU 11f0 0xc0010ef170 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:14.552 UTC [cauthdsl] func2 -> DEBU 11f1 0xc0010ef170 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:14.552 UTC [cauthdsl] func2 -> DEBU 11f2 0xc0010ef170 principal matched by identity 0" +"2020-05-20 18:21:14.553 UTC [msp.identity] Verify -> DEBU 11f3 Verify: digest = 00000000 9a 7e c4 71 ef b0 20 ae cd 05 10 be 77 ae f6 68 |.~.q.. .....w..h| +00000010 4b 20 de 34 61 55 df 2a 9b 70 6c 05 f8 d9 58 f1 |K .4aU.*.pl...X.|" +"2020-05-20 18:21:14.553 UTC [msp.identity] Verify -> DEBU 11f4 Verify: sig = 00000000 30 45 02 21 00 e9 f1 17 4c a9 a9 d6 1e 50 a5 18 |0E.!....L....P..| +00000010 e7 94 ff 3a 5b 3e 7f 2a d7 2f 47 85 a5 2a e8 5a |...:[>.*./G..*.Z| +00000020 8a 68 49 69 f0 02 20 3c f9 13 4b 83 24 18 9c c7 |.hIi.. <..K.$...| +00000030 06 c2 76 90 44 10 43 e8 4b 7a ea 74 b6 08 d1 7e |..v.D.C.Kz.t...~| +00000040 9d 56 77 6a 8e 23 e5 |.Vwj.#.|" +"2020-05-20 18:21:14.553 UTC [cauthdsl] func2 -> DEBU 11f5 0xc0010ef170 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:14.554 UTC [cauthdsl] func1 -> DEBU 11f6 0xc0010ef170 gate 1589998874552576000 evaluation succeeds" +"2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11f7 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11f9 Signature set satisfies policy /Channel/Application/Writers" +"2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11fb Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:21:14.554 UTC [policies] Evaluate -> DEBU 11fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:21:14.555 UTC [orderer.common.blockcutter] Ordered -> DEBU 11fd Enqueuing message into batch" +"2020-05-20 18:21:14.555 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 11fe [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:53552" +"2020-05-20 18:21:14.558 UTC [grpc] infof -> DEBU 11ff transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:14.558 UTC [orderer.common.broadcast] Handle -> WARN 1200 Error reading from 172.18.0.9:53552: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:14.559 UTC [orderer.common.server] func1 -> DEBU 1201 Closing Broadcast stream" +"2020-05-20 18:21:14.559 UTC [comm.grpc.server] 1 -> INFO 1202 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53552 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.7182ms +"2020-05-20 18:21:14.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1203 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:14.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1204 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +"2020-05-20 18:21:14.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1205 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.4µs " +"2020-05-20 18:21:14.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1206 Sending msg of 28 bytes to 2 on channel businesschannel took 245.5µs" +"2020-05-20 18:21:14.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1207 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.6µs " +"2020-05-20 18:21:14.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1208 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 321.4µs " +"2020-05-20 18:21:14.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1209 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:14.880 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120a Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +"2020-05-20 18:21:14.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:15.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:15.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120d Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +"2020-05-20 18:21:15.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 120e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 411.9µs " +"2020-05-20 18:21:15.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120f Sending msg of 28 bytes to 3 on channel businesschannel took 30.2µs" +"2020-05-20 18:21:15.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1210 Sending msg of 28 bytes to 2 on channel businesschannel took 10.8µs" +"2020-05-20 18:21:15.378 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1211 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +"2020-05-20 18:21:15.379 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1212 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 963.1µs " +"2020-05-20 18:21:15.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1213 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:15.381 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1214 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:15.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1215 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:15.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1216 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.2µs " +"2020-05-20 18:21:15.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1217 Sending msg of 28 bytes to 3 on channel testchainid took 344.2µs" +"2020-05-20 18:21:15.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1218 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +"2020-05-20 18:21:15.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1219 Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +"2020-05-20 18:21:15.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 455.7µs " +"2020-05-20 18:21:15.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:15.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6234ms " +"2020-05-20 18:21:15.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:16.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:16.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 121f Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +"2020-05-20 18:21:16.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1220 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.1µs " +"2020-05-20 18:21:16.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1221 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2020-05-20 18:21:16.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1222 Sending msg of 28 bytes to 3 on channel businesschannel took 17.5µs" +"2020-05-20 18:21:16.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1223 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.2µs " +"2020-05-20 18:21:16.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1224 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:16.379 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1225 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.415ms " +"2020-05-20 18:21:16.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1226 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:16.555 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1227 Batch timer expired, creating block" channel=businesschannel node=1 +"2020-05-20 18:21:16.556 UTC [orderer.consensus.etcdraft] propose -> INFO 1228 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-05-20 18:21:16.557 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1229 Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2020-05-20 18:21:16.561 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122a Sending msg of 3110 bytes to 2 on channel businesschannel took 20.3µs" +"2020-05-20 18:21:16.561 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122b Sending msg of 3110 bytes to 3 on channel businesschannel took 15.4µs" +"2020-05-20 18:21:16.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122c Send of ConsensusRequest for channel businesschannel with payload of size 3110 to orderer2.example.com(orderer2.example.com:7050) took 254.3µs " +"2020-05-20 18:21:16.562 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122d Send of ConsensusRequest for channel businesschannel with payload of size 3110 to orderer1.example.com(orderer1.example.com:7050) took 802.7µs " +"2020-05-20 18:21:16.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:16.567 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122f Sending msg of 28 bytes to 2 on channel businesschannel took 15.7µs" +"2020-05-20 18:21:16.567 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2020-05-20 18:21:16.568 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.2µs " +"2020-05-20 18:21:16.568 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1232 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:16.568 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1233 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2020-05-20 18:21:16.569 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1234 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-05-20 18:21:16.569 UTC [msp] GetDefaultSigningIdentity -> DEBU 1235 Obtaining default signing identity" +"2020-05-20 18:21:16.569 UTC [msp] GetDefaultSigningIdentity -> DEBU 1236 Obtaining default signing identity" +"2020-05-20 18:21:16.569 UTC [msp.identity] Sign -> DEBU 1237 Sign: plaintext: 0A020802120B0A090A03010203100418...1D95C41FFF473D2AA497045CA14C9638 " +"2020-05-20 18:21:16.569 UTC [msp.identity] Sign -> DEBU 1238 Sign: digest: 2E8DC98619B913D624355CC832A0AAC42F1A68FD82E9BB775E91F26F9932D788 " +"2020-05-20 18:21:16.570 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1239 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.8µs " +"2020-05-20 18:21:16.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:16.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:16.574 UTC [fsblkstorage] indexBlock -> DEBU 123c Indexing block [blockNum=4, blockHash=[]byte{0xa4, 0x2e, 0x9a, 0xd0, 0x47, 0x9a, 0xd6, 0x54, 0xc0, 0x1a, 0xaa, 0x8c, 0xcf, 0x92, 0x89, 0x7b, 0x18, 0x78, 0x45, 0x2d, 0x50, 0x36, 0x95, 0xaf, 0xa8, 0x78, 0xd1, 0xa7, 0xb2, 0x8a, 0xb1, 0xaf} txOffsets= +txId=523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb locPointer=offset=70, bytesLength=2982 +]" +"2020-05-20 18:21:16.581 UTC [fsblkstorage] updateCheckpoint -> DEBU 123d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93382], isChainEmpty=[false], lastBlockNumber=[4]" +"2020-05-20 18:21:16.585 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 123e [channel: businesschannel] Wrote block [4]" +"2020-05-20 18:21:16.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:16.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1240 Sending msg of 28 bytes to 3 on channel testchainid took 224µs" +"2020-05-20 18:21:16.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1241 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.9µs " +"2020-05-20 18:21:16.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1242 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-05-20 18:21:16.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1243 Sending msg of 28 bytes to 3 on channel businesschannel took 90.1µs" +"2020-05-20 18:21:16.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1244 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 248.2µs " +"2020-05-20 18:21:16.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1245 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.1µs " +"2020-05-20 18:21:16.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1246 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:16.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1247 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:17.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1248 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:17.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1249 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-05-20 18:21:17.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 648.3µs " +"2020-05-20 18:21:17.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124b Sending msg of 28 bytes to 2 on channel businesschannel took 44.3µs" +"2020-05-20 18:21:17.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 124c Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +"2020-05-20 18:21:17.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 124d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +"2020-05-20 18:21:17.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 124e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:17.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 124f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:17.378 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1250 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4092ms " +"2020-05-20 18:21:17.493 UTC [orderer.common.server] Broadcast -> DEBU 1251 Starting new Broadcast handler" +"2020-05-20 18:21:17.493 UTC [orderer.common.broadcast] Handle -> DEBU 1252 Starting new broadcast loop for 172.18.0.9:53566" +"2020-05-20 18:21:17.533 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1253 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:53566 with txid 'f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397' of type ENDORSER_TRANSACTION" +"2020-05-20 18:21:17.534 UTC [policies] Evaluate -> DEBU 1254 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:21:17.534 UTC [policies] Evaluate -> DEBU 1255 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:17.534 UTC [policies] Evaluate -> DEBU 1256 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:21:17.535 UTC [policies] Evaluate -> DEBU 1257 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:17.535 UTC [policies] Evaluate -> DEBU 1258 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:21:17.535 UTC [msp] DeserializeIdentity -> DEBU 1259 Obtaining identity" +"2020-05-20 18:21:17.536 UTC [msp.identity] newIdentity -> DEBU 125a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE-----" +"2020-05-20 18:21:17.538 UTC [cauthdsl] func1 -> DEBU 125b 0xc0011925e0 gate 1589998877538093500 evaluation starts" +"2020-05-20 18:21:17.539 UTC [cauthdsl] func2 -> DEBU 125c 0xc0011925e0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:17.539 UTC [cauthdsl] func2 -> DEBU 125d 0xc0011925e0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:17.540 UTC [cauthdsl] func2 -> DEBU 125e 0xc0011925e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2020-05-20 18:21:17.540 UTC [cauthdsl] func2 -> DEBU 125f 0xc0011925e0 principal evaluation fails" +"2020-05-20 18:21:17.540 UTC [cauthdsl] func1 -> DEBU 1260 0xc0011925e0 gate 1589998877538093500 evaluation fails" +"2020-05-20 18:21:17.540 UTC [policies] Evaluate -> DEBU 1261 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:17.541 UTC [policies] Evaluate -> DEBU 1262 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:17.541 UTC [policies] func1 -> DEBU 1263 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-05-20 18:21:17.541 UTC [policies] Evaluate -> DEBU 1264 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-05-20 18:21:17.541 UTC [policies] Evaluate -> DEBU 1265 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:21:17.541 UTC [policies] Evaluate -> DEBU 1266 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-05-20 18:21:17.542 UTC [policies] Evaluate -> DEBU 1267 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:17.542 UTC [policies] Evaluate -> DEBU 1268 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-05-20 18:21:17.542 UTC [cauthdsl] func1 -> DEBU 1269 0xc001193c50 gate 1589998877542939700 evaluation starts" +"2020-05-20 18:21:17.543 UTC [cauthdsl] func2 -> DEBU 126a 0xc001193c50 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:17.543 UTC [cauthdsl] func2 -> DEBU 126b 0xc001193c50 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:17.543 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 126c Checking if identity satisfies MEMBER role for Org2MSP" +"2020-05-20 18:21:17.544 UTC [msp] Validate -> DEBU 126d MSP Org2MSP validating identity" +"2020-05-20 18:21:17.544 UTC [msp] getCertificationChain -> DEBU 126e MSP Org2MSP getting certification chain" +"2020-05-20 18:21:17.545 UTC [cauthdsl] func2 -> DEBU 126f 0xc001193c50 principal matched by identity 0" +"2020-05-20 18:21:17.545 UTC [msp.identity] Verify -> DEBU 1270 Verify: digest = 00000000 bf 39 ad 16 51 9c 3a 63 61 b3 8b e7 78 81 98 26 |.9..Q.:ca...x..&| +00000010 fa 45 70 07 9c c9 7e c2 9a 96 46 22 d6 5c 7d 38 |.Ep...~...F".\}8|" +"2020-05-20 18:21:17.546 UTC [msp.identity] Verify -> DEBU 1271 Verify: sig = 00000000 30 44 02 20 4a 04 e6 28 19 1c 5d a6 e5 ec 93 0a |0D. J..(..].....| +00000010 c1 a3 fe a2 2d b1 5e 21 14 5f 55 25 ee 8b 39 22 |....-.^!._U%..9"| +00000020 ee 75 f0 7e 02 20 77 94 f8 8e ec a2 44 4a 6b 45 |.u.~. w.....DJkE| +00000030 a4 95 29 d7 fa ec 6f 2a f1 ac 43 a8 e4 d6 92 5b |..)...o*..C....[| +00000040 b2 87 c3 52 76 5a |...RvZ|" +"2020-05-20 18:21:17.547 UTC [cauthdsl] func2 -> DEBU 1272 0xc001193c50 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:17.547 UTC [cauthdsl] func1 -> DEBU 1273 0xc001193c50 gate 1589998877542939700 evaluation succeeds" +"2020-05-20 18:21:17.548 UTC [policies] Evaluate -> DEBU 1274 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:17.548 UTC [policies] Evaluate -> DEBU 1275 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:17.548 UTC [policies] Evaluate -> DEBU 1276 Signature set satisfies policy /Channel/Application/Writers" +"2020-05-20 18:21:17.549 UTC [policies] Evaluate -> DEBU 1277 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-05-20 18:21:17.549 UTC [policies] Evaluate -> DEBU 1278 Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:21:17.549 UTC [policies] Evaluate -> DEBU 1279 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:21:17.550 UTC [orderer.common.blockcutter] Ordered -> DEBU 127a Enqueuing message into batch" +"2020-05-20 18:21:17.550 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 127b [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:53566" +"2020-05-20 18:21:17.555 UTC [grpc] infof -> DEBU 127c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:17.555 UTC [orderer.common.broadcast] Handle -> WARN 127d Error reading from 172.18.0.9:53566: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:17.556 UTC [orderer.common.server] func1 -> DEBU 127e Closing Broadcast stream" +"2020-05-20 18:21:17.557 UTC [comm.grpc.server] 1 -> INFO 127f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53566 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=63.4911ms +"2020-05-20 18:21:17.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1280 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:17.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1281 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145µs " +"2020-05-20 18:21:17.859 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1282 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2020-05-20 18:21:17.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1283 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2020-05-20 18:21:17.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1284 Sending msg of 28 bytes to 3 on channel businesschannel took 127.5µs" +"2020-05-20 18:21:17.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1285 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 573.1µs " +"2020-05-20 18:21:17.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1286 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 382µs " +"2020-05-20 18:21:17.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1287 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:17.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1288 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:18.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1289 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:18.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.2µs " +"2020-05-20 18:21:18.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128b Sending msg of 28 bytes to 3 on channel testchainid took 50.4µs" +"2020-05-20 18:21:18.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.3µs " +"2020-05-20 18:21:18.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128d Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2020-05-20 18:21:18.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 128e Sending msg of 28 bytes to 3 on channel businesschannel took 82.3µs" +"2020-05-20 18:21:18.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 128f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 963.6µs " +"2020-05-20 18:21:18.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1290 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:18.380 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1291 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:18.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1292 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:18.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1293 Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +"2020-05-20 18:21:18.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1294 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.1µs " +"2020-05-20 18:21:18.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1295 Sending msg of 28 bytes to 2 on channel businesschannel took 34.2µs" +"2020-05-20 18:21:18.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1296 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +"2020-05-20 18:21:18.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1297 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.2µs " +"2020-05-20 18:21:18.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1298 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.1932ms " +"2020-05-20 18:21:18.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1299 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:18.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:19.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 129b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:19.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129c Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +"2020-05-20 18:21:19.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167µs " +"2020-05-20 18:21:19.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129e Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +"2020-05-20 18:21:19.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 129f Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +"2020-05-20 18:21:19.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.5µs " +"2020-05-20 18:21:19.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 589.3µs " +"2020-05-20 18:21:19.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:19.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:19.550 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 12a4 Batch timer expired, creating block" channel=businesschannel node=1 +"2020-05-20 18:21:19.551 UTC [orderer.consensus.etcdraft] propose -> INFO 12a5 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-05-20 18:21:19.551 UTC [orderer.consensus.etcdraft] 2 -> DEBU 12a6 Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2020-05-20 18:21:19.555 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a7 Sending msg of 3108 bytes to 2 on channel businesschannel took 23.3µs" +"2020-05-20 18:21:19.555 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a8 Send of ConsensusRequest for channel businesschannel with payload of size 3108 to orderer1.example.com(orderer1.example.com:7050) took 325µs " +"2020-05-20 18:21:19.555 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a9 Sending msg of 3108 bytes to 3 on channel businesschannel took 42µs" +"2020-05-20 18:21:19.556 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12aa Send of ConsensusRequest for channel businesschannel with payload of size 3108 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +"2020-05-20 18:21:19.560 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ab Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:19.560 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ac Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +"2020-05-20 18:21:19.560 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ad Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:19.561 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 12ae Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2020-05-20 18:21:19.562 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 12af [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-05-20 18:21:19.562 UTC [msp] GetDefaultSigningIdentity -> DEBU 12b1 Obtaining default signing identity" +"2020-05-20 18:21:19.561 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b0 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2020-05-20 18:21:19.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 482.8µs " +"2020-05-20 18:21:19.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 94.6µs " +"2020-05-20 18:21:19.564 UTC [msp] GetDefaultSigningIdentity -> DEBU 12b4 Obtaining default signing identity" +"2020-05-20 18:21:19.569 UTC [msp.identity] Sign -> DEBU 12b7 Sign: plaintext: 0A020802120B0A090A03010203100418...C2978E4ACEF8D9E80C554D2C65B8CF50 " +"2020-05-20 18:21:19.569 UTC [msp.identity] Sign -> DEBU 12b8 Sign: digest: 45E98A8AF968BED4E593335471F8AF7F2B95D606563A82E691B2CABEDA5D1C58 " +"2020-05-20 18:21:19.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:19.569 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:19.584 UTC [fsblkstorage] indexBlock -> DEBU 12b9 Indexing block [blockNum=5, blockHash=[]byte{0x60, 0xc5, 0x4f, 0x44, 0x0, 0x2d, 0xfc, 0xe6, 0x2a, 0x7, 0x13, 0xb5, 0xf5, 0xfc, 0xb9, 0xf0, 0xb, 0x61, 0x18, 0xa, 0xe3, 0x93, 0x45, 0xfc, 0x9f, 0x46, 0x5c, 0xc4, 0x56, 0x14, 0x37, 0xcd} txOffsets= +txId=f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 locPointer=offset=70, bytesLength=2980 +]" +"2020-05-20 18:21:19.589 UTC [fsblkstorage] updateCheckpoint -> DEBU 12ba Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97393], isChainEmpty=[false], lastBlockNumber=[5]" +"2020-05-20 18:21:19.589 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 12bb [channel: businesschannel] Wrote block [5]" +"2020-05-20 18:21:19.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12bc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:19.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12bd Sending msg of 28 bytes to 3 on channel testchainid took 468.2µs" +"2020-05-20 18:21:19.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 598.2µs " +"2020-05-20 18:21:19.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12bf Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +"2020-05-20 18:21:19.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c0 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2020-05-20 18:21:19.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +"2020-05-20 18:21:19.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.9µs " +"2020-05-20 18:21:19.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c3 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:19.879 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c4 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:20.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:20.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c6 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2020-05-20 18:21:20.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 522.6µs " +"2020-05-20 18:21:20.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c8 Sending msg of 28 bytes to 3 on channel businesschannel took 27.9µs" +"2020-05-20 18:21:20.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12c9 Sending msg of 28 bytes to 2 on channel businesschannel took 13.9µs" +"2020-05-20 18:21:20.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.5µs " +"2020-05-20 18:21:20.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12cb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 40.1µs " +"2020-05-20 18:21:20.376 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cc Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:20.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:20.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ce Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:20.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12cf Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-05-20 18:21:20.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +"2020-05-20 18:21:20.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.2µs " +"2020-05-20 18:21:20.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d2 Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" +"2020-05-20 18:21:20.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d3 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +"2020-05-20 18:21:20.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +"2020-05-20 18:21:20.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d5 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:20.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:21.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12d7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:21.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d8 Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +"2020-05-20 18:21:21.356 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +"2020-05-20 18:21:21.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12da Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +"2020-05-20 18:21:21.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12db Sending msg of 28 bytes to 2 on channel businesschannel took 10.4µs" +"2020-05-20 18:21:21.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.9µs " +"2020-05-20 18:21:21.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12dd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.7µs " +"2020-05-20 18:21:21.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12de Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:21.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12df Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:21.860 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:21.867 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e1 Sending msg of 28 bytes to 3 on channel testchainid took 27.9µs" +"2020-05-20 18:21:21.867 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +"2020-05-20 18:21:21.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e3 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-05-20 18:21:21.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e4 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +"2020-05-20 18:21:21.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.4µs " +"2020-05-20 18:21:21.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.7µs " +"2020-05-20 18:21:21.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e7 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:21.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:22.360 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:22.360 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ea Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2020-05-20 18:21:22.361 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12eb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 420.4µs " +"2020-05-20 18:21:22.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ec Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +"2020-05-20 18:21:22.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ed Sending msg of 28 bytes to 3 on channel businesschannel took 17.6µs" +"2020-05-20 18:21:22.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " +"2020-05-20 18:21:22.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54µs " +"2020-05-20 18:21:22.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:22.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:22.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:22.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f3 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +"2020-05-20 18:21:22.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.3µs " +"2020-05-20 18:21:22.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f5 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +"2020-05-20 18:21:22.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12f6 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +"2020-05-20 18:21:22.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.3µs " +"2020-05-20 18:21:22.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.2µs " +"2020-05-20 18:21:22.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12f9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:22.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:23.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12fb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:23.356 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fc Sending msg of 28 bytes to 3 on channel testchainid took 6.7µs" +"2020-05-20 18:21:23.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +"2020-05-20 18:21:23.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12fe Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2020-05-20 18:21:23.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12ff Sending msg of 28 bytes to 3 on channel businesschannel took 28.3µs" +"2020-05-20 18:21:23.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1300 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.6µs " +"2020-05-20 18:21:23.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1301 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.4µs " +"2020-05-20 18:21:23.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1302 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:23.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1303 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:23.549 UTC [orderer.common.server] Deliver -> DEBU 1304 Starting new Deliver handler" +"2020-05-20 18:21:23.550 UTC [common.deliver] Handle -> DEBU 1305 Starting new deliver loop for 172.18.0.9:53612" +"2020-05-20 18:21:23.551 UTC [common.deliver] Handle -> DEBU 1306 Attempting to read seek info message from 172.18.0.9:53612" +"2020-05-20 18:21:23.553 UTC [policies] Evaluate -> DEBU 1307 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:23.553 UTC [policies] Evaluate -> DEBU 1308 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:23.553 UTC [policies] Evaluate -> DEBU 1309 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:23.553 UTC [policies] Evaluate -> DEBU 130a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:23.554 UTC [policies] Evaluate -> DEBU 130b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:23.554 UTC [msp] DeserializeIdentity -> DEBU 130c Obtaining identity" +"2020-05-20 18:21:23.555 UTC [msp.identity] newIdentity -> DEBU 130d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-05-20 18:21:23.556 UTC [cauthdsl] func1 -> DEBU 130e 0xc0012457e0 gate 1589998883556301700 evaluation starts" +"2020-05-20 18:21:23.556 UTC [cauthdsl] func2 -> DEBU 130f 0xc0012457e0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:23.556 UTC [cauthdsl] func2 -> DEBU 1310 0xc0012457e0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:23.557 UTC [cauthdsl] func2 -> DEBU 1311 0xc0012457e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:23.557 UTC [cauthdsl] func2 -> DEBU 1312 0xc0012457e0 principal evaluation fails" +"2020-05-20 18:21:23.557 UTC [cauthdsl] func1 -> DEBU 1313 0xc0012457e0 gate 1589998883556301700 evaluation fails" +"2020-05-20 18:21:23.557 UTC [policies] Evaluate -> DEBU 1314 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:23.557 UTC [policies] Evaluate -> DEBU 1315 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:23.557 UTC [policies] Evaluate -> DEBU 1316 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:23.557 UTC [cauthdsl] func1 -> DEBU 1317 0xc00128e9a0 gate 1589998883557556900 evaluation starts" +"2020-05-20 18:21:23.557 UTC [cauthdsl] func2 -> DEBU 1318 0xc00128e9a0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:23.557 UTC [cauthdsl] func2 -> DEBU 1319 0xc00128e9a0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:23.558 UTC [cauthdsl] func2 -> DEBU 131a 0xc00128e9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:23.558 UTC [cauthdsl] func2 -> DEBU 131b 0xc00128e9a0 principal evaluation fails" +"2020-05-20 18:21:23.558 UTC [cauthdsl] func1 -> DEBU 131c 0xc00128e9a0 gate 1589998883557556900 evaluation fails" +"2020-05-20 18:21:23.558 UTC [policies] Evaluate -> DEBU 131d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:23.558 UTC [policies] Evaluate -> DEBU 131e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:23.558 UTC [policies] func1 -> DEBU 131f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2020-05-20 18:21:23.558 UTC [policies] Evaluate -> DEBU 1320 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:23.559 UTC [policies] Evaluate -> DEBU 1321 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:23.559 UTC [policies] Evaluate -> DEBU 1322 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:23.559 UTC [policies] Evaluate -> DEBU 1323 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:23.559 UTC [policies] Evaluate -> DEBU 1324 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:23.559 UTC [cauthdsl] func1 -> DEBU 1325 0xc00128f6b0 gate 1589998883559821300 evaluation starts" +"2020-05-20 18:21:23.560 UTC [cauthdsl] func2 -> DEBU 1326 0xc00128f6b0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:23.560 UTC [cauthdsl] func2 -> DEBU 1327 0xc00128f6b0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:23.560 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1328 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-05-20 18:21:23.560 UTC [msp] Validate -> DEBU 1329 MSP OrdererMSP validating identity" +"2020-05-20 18:21:23.561 UTC [msp] getCertificationChain -> DEBU 132a MSP OrdererMSP getting certification chain" +"2020-05-20 18:21:23.561 UTC [cauthdsl] func2 -> DEBU 132b 0xc00128f6b0 principal matched by identity 0" +"2020-05-20 18:21:23.561 UTC [msp.identity] Verify -> DEBU 132c Verify: digest = 00000000 d7 2f 77 c0 72 e3 19 03 68 44 7a 30 91 91 b7 a6 |./w.r...hDz0....| +00000010 7f 5f 62 c6 f3 1b 33 12 e0 49 77 67 13 3c b4 9a |._b...3..Iwg.<..|" +"2020-05-20 18:21:23.561 UTC [msp.identity] Verify -> DEBU 132d Verify: sig = 00000000 30 44 02 20 1d d1 75 b9 8e 37 f5 8c 2d 76 28 27 |0D. ..u..7..-v('| +00000010 7e 3b cd 5f 5b 84 9c 58 05 c0 a1 7a 3a b8 f2 e6 |~;._[..X...z:...| +00000020 96 43 7d d8 02 20 4c 88 4a a7 89 31 50 7a 30 a9 |.C}.. L.J..1Pz0.| +00000030 e9 7e 8a bd 0c 22 66 78 d2 47 b0 07 50 71 8f 43 |.~..."fx.G..Pq.C| +00000040 fd 05 a1 5c 4d 40 |...\M@|" +"2020-05-20 18:21:23.562 UTC [cauthdsl] func2 -> DEBU 132e 0xc00128f6b0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:23.562 UTC [cauthdsl] func1 -> DEBU 132f 0xc00128f6b0 gate 1589998883559821300 evaluation succeeds" +"2020-05-20 18:21:23.565 UTC [policies] Evaluate -> DEBU 1330 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:23.565 UTC [policies] Evaluate -> DEBU 1331 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:23.566 UTC [policies] Evaluate -> DEBU 1332 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:23.566 UTC [policies] Evaluate -> DEBU 1333 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:23.566 UTC [policies] Evaluate -> DEBU 1334 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:23.567 UTC [policies] Evaluate -> DEBU 1335 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:23.567 UTC [common.deliver] deliverBlocks -> DEBU 1336 [channel: businesschannel] Received seekInfo (0xc0011f8c00) start: > stop: > from 172.18.0.9:53612" +"2020-05-20 18:21:23.567 UTC [fsblkstorage] Next -> DEBU 1337 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:23.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1338 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93382]" +"2020-05-20 18:21:23.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1339 Remaining bytes=[4011], Going to peek [8] bytes" +"2020-05-20 18:21:23.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 133a Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93382], bytesOffset=[93384]}" +"2020-05-20 18:21:23.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 133b blockbytes [4009] read from file [0]" +"2020-05-20 18:21:23.568 UTC [common.deliver] deliverBlocks -> DEBU 133c [channel: businesschannel] Delivering block [5] for (0xc0011f8c00) for 172.18.0.9:53612" +"2020-05-20 18:21:23.568 UTC [common.deliver] deliverBlocks -> DEBU 133d [channel: businesschannel] Done delivering to 172.18.0.9:53612 for (0xc0011f8c00)" +"2020-05-20 18:21:23.569 UTC [common.deliver] Handle -> DEBU 133e Waiting for new SeekInfo from 172.18.0.9:53612" +"2020-05-20 18:21:23.569 UTC [common.deliver] Handle -> DEBU 133f Attempting to read seek info message from 172.18.0.9:53612" +"2020-05-20 18:21:23.578 UTC [grpc] infof -> DEBU 1340 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:23.578 UTC [common.deliver] Handle -> WARN 1341 Error reading from 172.18.0.9:53612: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:23.578 UTC [orderer.common.server] func1 -> DEBU 1342 Closing Deliver stream" +"2020-05-20 18:21:23.578 UTC [comm.grpc.server] 1 -> INFO 1343 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53612 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.6118ms +"2020-05-20 18:21:23.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1344 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:23.859 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1345 Sending msg of 28 bytes to 3 on channel testchainid took 146.2µs" +"2020-05-20 18:21:23.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1346 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.7µs " +"2020-05-20 18:21:23.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1347 Sending msg of 28 bytes to 2 on channel businesschannel took 109.2µs" +"2020-05-20 18:21:23.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1348 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2020-05-20 18:21:23.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1349 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.6µs " +"2020-05-20 18:21:23.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU 134a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.7µs " +"2020-05-20 18:21:23.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:23.880 UTC [orderer.common.cluster.step] handleMessage -> DEBU 134c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:24.085 UTC [orderer.common.server] Deliver -> DEBU 134d Starting new Deliver handler" +"2020-05-20 18:21:24.087 UTC [common.deliver] Handle -> DEBU 134e Starting new deliver loop for 172.18.0.9:53614" +"2020-05-20 18:21:24.088 UTC [common.deliver] Handle -> DEBU 134f Attempting to read seek info message from 172.18.0.9:53614" +"2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1350 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1351 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1352 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1353 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.093 UTC [policies] Evaluate -> DEBU 1354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:24.093 UTC [cauthdsl] func1 -> DEBU 1355 0xc000ae8dd0 gate 1589998884093720200 evaluation starts" +"2020-05-20 18:21:24.093 UTC [cauthdsl] func2 -> DEBU 1356 0xc000ae8dd0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.093 UTC [cauthdsl] func2 -> DEBU 1357 0xc000ae8dd0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.094 UTC [cauthdsl] func2 -> DEBU 1358 0xc000ae8dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:24.094 UTC [cauthdsl] func2 -> DEBU 1359 0xc000ae8dd0 principal evaluation fails" +"2020-05-20 18:21:24.094 UTC [cauthdsl] func1 -> DEBU 135a 0xc000ae8dd0 gate 1589998884093720200 evaluation fails" +"2020-05-20 18:21:24.095 UTC [policies] Evaluate -> DEBU 135b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:24.095 UTC [policies] Evaluate -> DEBU 135c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:24.104 UTC [policies] Evaluate -> DEBU 135d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:24.105 UTC [cauthdsl] func1 -> DEBU 135e 0xc000ae9640 gate 1589998884105421100 evaluation starts" +"2020-05-20 18:21:24.106 UTC [cauthdsl] func2 -> DEBU 135f 0xc000ae9640 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.106 UTC [cauthdsl] func2 -> DEBU 1360 0xc000ae9640 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.106 UTC [cauthdsl] func2 -> DEBU 1361 0xc000ae9640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:24.107 UTC [cauthdsl] func2 -> DEBU 1362 0xc000ae9640 principal evaluation fails" +"2020-05-20 18:21:24.107 UTC [cauthdsl] func1 -> DEBU 1363 0xc000ae9640 gate 1589998884105421100 evaluation fails" +"2020-05-20 18:21:24.108 UTC [policies] Evaluate -> DEBU 1364 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:24.108 UTC [policies] Evaluate -> DEBU 1365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:24.109 UTC [policies] func1 -> DEBU 1366 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2020-05-20 18:21:24.109 UTC [policies] Evaluate -> DEBU 1367 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:24.109 UTC [policies] Evaluate -> DEBU 1368 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:24.110 UTC [policies] Evaluate -> DEBU 1369 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:24.110 UTC [policies] Evaluate -> DEBU 136a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.111 UTC [policies] Evaluate -> DEBU 136b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:24.112 UTC [cauthdsl] func1 -> DEBU 136c 0xc0005be400 gate 1589998884112388200 evaluation starts" +"2020-05-20 18:21:24.112 UTC [cauthdsl] func2 -> DEBU 136d 0xc0005be400 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.113 UTC [cauthdsl] func2 -> DEBU 136e 0xc0005be400 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.117 UTC [cauthdsl] func2 -> DEBU 136f 0xc0005be400 principal matched by identity 0" +"2020-05-20 18:21:24.117 UTC [msp.identity] Verify -> DEBU 1370 Verify: digest = 00000000 da 29 73 cb c5 16 0f ae 3f d4 92 63 cf e4 45 7a |.)s.....?..c..Ez| +00000010 d1 c7 19 0e cc 3f 72 fc ac 68 44 f3 31 29 5f f5 |.....?r..hD.1)_.|" +"2020-05-20 18:21:24.117 UTC [msp.identity] Verify -> DEBU 1371 Verify: sig = 00000000 30 44 02 20 7c 21 c6 c6 3c 3c 7e 26 5b c6 80 48 |0D. |!..<<~&[..H| +00000010 29 5b 0a 2a 19 5f 48 8d 4d 6a 71 e5 5d c3 bd 9b |)[.*._H.Mjq.]...| +00000020 79 2b da 97 02 20 7d ad c1 95 89 af 97 f8 ca 1d |y+... }.........| +00000030 88 0b 58 02 8d 8d 47 30 39 a1 44 7d 01 66 bb a9 |..X...G09.D}.f..| +00000040 c8 b1 4b b6 6a b5 |..K.j.|" +"2020-05-20 18:21:24.128 UTC [cauthdsl] func2 -> DEBU 1372 0xc0005be400 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:24.129 UTC [cauthdsl] func1 -> DEBU 1373 0xc0005be400 gate 1589998884112388200 evaluation succeeds" +"2020-05-20 18:21:24.129 UTC [policies] Evaluate -> DEBU 1374 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:24.129 UTC [policies] Evaluate -> DEBU 1375 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:24.130 UTC [policies] Evaluate -> DEBU 1376 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:24.130 UTC [policies] Evaluate -> DEBU 1377 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:24.130 UTC [policies] Evaluate -> DEBU 1378 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:24.130 UTC [policies] Evaluate -> DEBU 1379 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:24.132 UTC [common.deliver] deliverBlocks -> DEBU 137a [channel: businesschannel] Received seekInfo (0xc0013d03c0) start: > stop: > from 172.18.0.9:53614" +"2020-05-20 18:21:24.133 UTC [fsblkstorage] Next -> DEBU 137b Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:24.133 UTC [fsblkstorage] newBlockfileStream -> DEBU 137c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93382]" +"2020-05-20 18:21:24.134 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 137d Remaining bytes=[4011], Going to peek [8] bytes" +"2020-05-20 18:21:24.134 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 137e Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93382], bytesOffset=[93384]}" +"2020-05-20 18:21:24.135 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 137f blockbytes [4009] read from file [0]" +"2020-05-20 18:21:24.136 UTC [common.deliver] deliverBlocks -> DEBU 1380 [channel: businesschannel] Delivering block [5] for (0xc0013d03c0) for 172.18.0.9:53614" +"2020-05-20 18:21:24.137 UTC [common.deliver] deliverBlocks -> DEBU 1381 [channel: businesschannel] Done delivering to 172.18.0.9:53614 for (0xc0013d03c0)" +"2020-05-20 18:21:24.137 UTC [common.deliver] Handle -> DEBU 1382 Waiting for new SeekInfo from 172.18.0.9:53614" +"2020-05-20 18:21:24.138 UTC [common.deliver] Handle -> DEBU 1383 Attempting to read seek info message from 172.18.0.9:53614" +"2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1384 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1385 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1386 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1387 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.145 UTC [policies] Evaluate -> DEBU 1388 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:24.145 UTC [cauthdsl] func1 -> DEBU 1389 0xc000dae9e0 gate 1589998884145971400 evaluation starts" +"2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 138a 0xc000dae9e0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 138b 0xc000dae9e0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 138c 0xc000dae9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 138d 0xc000dae9e0 principal evaluation fails" +"2020-05-20 18:21:24.146 UTC [cauthdsl] func1 -> DEBU 138e 0xc000dae9e0 gate 1589998884145971400 evaluation fails" +"2020-05-20 18:21:24.146 UTC [policies] Evaluate -> DEBU 138f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:24.146 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:24.146 UTC [policies] Evaluate -> DEBU 1391 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:24.146 UTC [cauthdsl] func1 -> DEBU 1392 0xc000daf220 gate 1589998884146814400 evaluation starts" +"2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 1393 0xc000daf220 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.146 UTC [cauthdsl] func2 -> DEBU 1394 0xc000daf220 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.147 UTC [cauthdsl] func2 -> DEBU 1395 0xc000daf220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:24.147 UTC [cauthdsl] func2 -> DEBU 1396 0xc000daf220 principal evaluation fails" +"2020-05-20 18:21:24.147 UTC [cauthdsl] func1 -> DEBU 1397 0xc000daf220 gate 1589998884146814400 evaluation fails" +"2020-05-20 18:21:24.148 UTC [policies] Evaluate -> DEBU 1398 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:24.148 UTC [policies] Evaluate -> DEBU 1399 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:24.148 UTC [policies] func1 -> DEBU 139a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2020-05-20 18:21:24.150 UTC [policies] Evaluate -> DEBU 139b Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:24.150 UTC [policies] Evaluate -> DEBU 139c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:24.151 UTC [policies] Evaluate -> DEBU 139d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:24.151 UTC [policies] Evaluate -> DEBU 139e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.151 UTC [policies] Evaluate -> DEBU 139f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:24.151 UTC [cauthdsl] func1 -> DEBU 13a0 0xc000daff20 gate 1589998884151860200 evaluation starts" +"2020-05-20 18:21:24.152 UTC [cauthdsl] func2 -> DEBU 13a1 0xc000daff20 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.152 UTC [cauthdsl] func2 -> DEBU 13a2 0xc000daff20 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.152 UTC [cauthdsl] func2 -> DEBU 13a3 0xc000daff20 principal matched by identity 0" +"2020-05-20 18:21:24.152 UTC [msp.identity] Verify -> DEBU 13a4 Verify: digest = 00000000 d5 b5 73 35 7e 1f be b1 c0 65 ba d1 1b d1 54 a3 |..s5~....e....T.| +00000010 94 2e 32 6b ad 93 89 28 42 c4 61 c4 d7 b8 b0 3a |..2k...(B.a....:|" +"2020-05-20 18:21:24.152 UTC [msp.identity] Verify -> DEBU 13a5 Verify: sig = 00000000 30 45 02 21 00 90 17 47 db 86 87 57 a1 bb db 5b |0E.!...G...W...[| +00000010 b9 24 d7 70 12 67 01 37 13 8d 5f b6 4b 1d 1c dc |.$.p.g.7.._.K...| +00000020 56 34 3d 63 8f 02 20 66 ed bb 3a 52 fb 66 f9 c2 |V4=c.. f..:R.f..| +00000030 e0 f8 e6 05 ca aa 11 b8 c4 50 4b bc ac 0f 2c 27 |.........PK...,'| +00000040 75 a3 96 63 32 db a2 |u..c2..|" +"2020-05-20 18:21:24.153 UTC [cauthdsl] func2 -> DEBU 13a6 0xc000daff20 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:24.155 UTC [cauthdsl] func1 -> DEBU 13a7 0xc000daff20 gate 1589998884151860200 evaluation succeeds" +"2020-05-20 18:21:24.155 UTC [policies] Evaluate -> DEBU 13a8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:24.155 UTC [policies] Evaluate -> DEBU 13a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:24.156 UTC [policies] Evaluate -> DEBU 13aa Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:24.156 UTC [policies] Evaluate -> DEBU 13ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:24.156 UTC [policies] Evaluate -> DEBU 13ac Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:24.156 UTC [policies] Evaluate -> DEBU 13ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:24.157 UTC [common.deliver] deliverBlocks -> DEBU 13ae [channel: businesschannel] Received seekInfo (0xc001112100) start: > stop: > from 172.18.0.9:53614" +"2020-05-20 18:21:24.157 UTC [fsblkstorage] Next -> DEBU 13af Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:24.157 UTC [fsblkstorage] newBlockfileStream -> DEBU 13b0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56644]" +"2020-05-20 18:21:24.158 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13b1 Remaining bytes=[40749], Going to peek [8] bytes" +"2020-05-20 18:21:24.166 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13b2 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56644], bytesOffset=[56647]}" +"2020-05-20 18:21:24.167 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13b3 blockbytes [28171] read from file [0]" +"2020-05-20 18:21:24.168 UTC [common.deliver] deliverBlocks -> DEBU 13b4 [channel: businesschannel] Delivering block [2] for (0xc001112100) for 172.18.0.9:53614" +"2020-05-20 18:21:24.172 UTC [common.deliver] deliverBlocks -> DEBU 13b5 [channel: businesschannel] Done delivering to 172.18.0.9:53614 for (0xc001112100)" +"2020-05-20 18:21:24.172 UTC [common.deliver] Handle -> DEBU 13b6 Waiting for new SeekInfo from 172.18.0.9:53614" +"2020-05-20 18:21:24.173 UTC [common.deliver] Handle -> DEBU 13b7 Attempting to read seek info message from 172.18.0.9:53614" +"2020-05-20 18:21:24.188 UTC [grpc] infof -> DEBU 13b8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:24.189 UTC [common.deliver] Handle -> WARN 13b9 Error reading from 172.18.0.9:53614: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:24.190 UTC [orderer.common.server] func1 -> DEBU 13ba Closing Deliver stream" +"2020-05-20 18:21:24.190 UTC [comm.grpc.server] 1 -> INFO 13bb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53614 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=105.298ms +"2020-05-20 18:21:24.359 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13bc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:24.360 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bd Sending msg of 28 bytes to 3 on channel testchainid took 31.9µs" +"2020-05-20 18:21:24.361 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.7µs " +"2020-05-20 18:21:24.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13bf Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +"2020-05-20 18:21:24.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13c0 Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" +"2020-05-20 18:21:24.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.7µs " +"2020-05-20 18:21:24.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.5µs " +"2020-05-20 18:21:24.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:24.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:24.513 UTC [orderer.common.server] Deliver -> DEBU 13c5 Starting new Deliver handler" +"2020-05-20 18:21:24.513 UTC [common.deliver] Handle -> DEBU 13c6 Starting new deliver loop for 172.18.0.9:53616" +"2020-05-20 18:21:24.514 UTC [common.deliver] Handle -> DEBU 13c7 Attempting to read seek info message from 172.18.0.9:53616" +"2020-05-20 18:21:24.517 UTC [policies] Evaluate -> DEBU 13c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:24.517 UTC [policies] Evaluate -> DEBU 13c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.518 UTC [policies] Evaluate -> DEBU 13ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:24.519 UTC [policies] Evaluate -> DEBU 13cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.519 UTC [policies] Evaluate -> DEBU 13cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:24.519 UTC [cauthdsl] func1 -> DEBU 13cd 0xc000cbabd0 gate 1589998884519887900 evaluation starts" +"2020-05-20 18:21:24.520 UTC [cauthdsl] func2 -> DEBU 13ce 0xc000cbabd0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.521 UTC [cauthdsl] func2 -> DEBU 13cf 0xc000cbabd0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.521 UTC [cauthdsl] func2 -> DEBU 13d0 0xc000cbabd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:24.522 UTC [cauthdsl] func2 -> DEBU 13d1 0xc000cbabd0 principal evaluation fails" +"2020-05-20 18:21:24.523 UTC [cauthdsl] func1 -> DEBU 13d2 0xc000cbabd0 gate 1589998884519887900 evaluation fails" +"2020-05-20 18:21:24.524 UTC [policies] Evaluate -> DEBU 13d3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:24.524 UTC [policies] Evaluate -> DEBU 13d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:24.525 UTC [policies] Evaluate -> DEBU 13d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:24.525 UTC [cauthdsl] func1 -> DEBU 13d6 0xc000cbb530 gate 1589998884525792900 evaluation starts" +"2020-05-20 18:21:24.525 UTC [cauthdsl] func2 -> DEBU 13d7 0xc000cbb530 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.526 UTC [cauthdsl] func2 -> DEBU 13d8 0xc000cbb530 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.526 UTC [cauthdsl] func2 -> DEBU 13d9 0xc000cbb530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:24.527 UTC [cauthdsl] func2 -> DEBU 13da 0xc000cbb530 principal evaluation fails" +"2020-05-20 18:21:24.527 UTC [cauthdsl] func1 -> DEBU 13db 0xc000cbb530 gate 1589998884525792900 evaluation fails" +"2020-05-20 18:21:24.527 UTC [policies] Evaluate -> DEBU 13dc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:24.528 UTC [policies] Evaluate -> DEBU 13dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:24.528 UTC [policies] func1 -> DEBU 13de Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2020-05-20 18:21:24.528 UTC [policies] Evaluate -> DEBU 13df Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:24.529 UTC [policies] Evaluate -> DEBU 13e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:24.529 UTC [policies] Evaluate -> DEBU 13e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:24.530 UTC [policies] Evaluate -> DEBU 13e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.530 UTC [policies] Evaluate -> DEBU 13e3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:24.531 UTC [cauthdsl] func1 -> DEBU 13e4 0xc000c8a220 gate 1589998884531065100 evaluation starts" +"2020-05-20 18:21:24.531 UTC [cauthdsl] func2 -> DEBU 13e5 0xc000c8a220 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.531 UTC [cauthdsl] func2 -> DEBU 13e6 0xc000c8a220 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.531 UTC [cauthdsl] func2 -> DEBU 13e7 0xc000c8a220 principal matched by identity 0" +"2020-05-20 18:21:24.531 UTC [msp.identity] Verify -> DEBU 13e8 Verify: digest = 00000000 34 3f 71 29 06 d2 e7 0a 25 71 28 7c 59 c8 d3 29 |4?q)....%q(|Y..)| +00000010 f1 ee c6 68 ed 54 89 dc b2 a2 69 d9 a3 2d af 46 |...h.T....i..-.F|" +"2020-05-20 18:21:24.532 UTC [msp.identity] Verify -> DEBU 13e9 Verify: sig = 00000000 30 45 02 21 00 f4 b7 a6 e6 0b 48 e9 04 e6 46 f4 |0E.!......H...F.| +00000010 ff f5 80 b3 01 53 c6 8e 7c 7e fe b9 34 35 b7 72 |.....S..|~..45.r| +00000020 4e cc 44 ee da 02 20 57 b4 cf 35 d8 c7 e6 10 6d |N.D... W..5....m| +00000030 da 70 ce 38 9b 80 50 64 66 b2 53 ff 33 1a 7d 12 |.p.8..Pdf.S.3.}.| +00000040 f8 0f 7f 2c 28 29 de |...,().|" +"2020-05-20 18:21:24.536 UTC [cauthdsl] func2 -> DEBU 13ea 0xc000c8a220 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:24.536 UTC [cauthdsl] func1 -> DEBU 13eb 0xc000c8a220 gate 1589998884531065100 evaluation succeeds" +"2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13ec Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13ed == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13ee Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13f0 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:24.536 UTC [policies] Evaluate -> DEBU 13f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:24.536 UTC [common.deliver] deliverBlocks -> DEBU 13f2 [channel: businesschannel] Received seekInfo (0xc001113300) start: > stop: > from 172.18.0.9:53616" +"2020-05-20 18:21:24.539 UTC [fsblkstorage] Next -> DEBU 13f3 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:24.539 UTC [fsblkstorage] newBlockfileStream -> DEBU 13f4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-05-20 18:21:24.539 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f5 Remaining bytes=[97393], Going to peek [8] bytes" +"2020-05-20 18:21:24.539 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f6 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:21:24.539 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f7 blockbytes [28471] read from file [0]" +"2020-05-20 18:21:24.539 UTC [common.deliver] deliverBlocks -> DEBU 13f8 [channel: businesschannel] Delivering block [0] for (0xc001113300) for 172.18.0.9:53616" +"2020-05-20 18:21:24.540 UTC [common.deliver] deliverBlocks -> DEBU 13f9 [channel: businesschannel] Done delivering to 172.18.0.9:53616 for (0xc001113300)" +"2020-05-20 18:21:24.540 UTC [common.deliver] Handle -> DEBU 13fa Waiting for new SeekInfo from 172.18.0.9:53616" +"2020-05-20 18:21:24.540 UTC [common.deliver] Handle -> DEBU 13fb Attempting to read seek info message from 172.18.0.9:53616" +"2020-05-20 18:21:24.557 UTC [grpc] infof -> DEBU 13fc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:24.558 UTC [common.deliver] Handle -> WARN 13fd Error reading from 172.18.0.9:53616: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:24.558 UTC [orderer.common.server] func1 -> DEBU 13fe Closing Deliver stream" +"2020-05-20 18:21:24.559 UTC [comm.grpc.server] 1 -> INFO 13ff streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53616 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.9936ms +"2020-05-20 18:21:24.809 UTC [orderer.common.server] Deliver -> DEBU 1400 Starting new Deliver handler" +"2020-05-20 18:21:24.809 UTC [common.deliver] Handle -> DEBU 1401 Starting new deliver loop for 172.18.0.9:53618" +"2020-05-20 18:21:24.809 UTC [common.deliver] Handle -> DEBU 1402 Attempting to read seek info message from 172.18.0.9:53618" +"2020-05-20 18:21:24.810 UTC [policies] Evaluate -> DEBU 1403 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:24.811 UTC [policies] Evaluate -> DEBU 1404 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.811 UTC [policies] Evaluate -> DEBU 1405 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:24.811 UTC [policies] Evaluate -> DEBU 1406 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.812 UTC [policies] Evaluate -> DEBU 1407 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:24.812 UTC [cauthdsl] func1 -> DEBU 1408 0xc0003bdcd0 gate 1589998884812277700 evaluation starts" +"2020-05-20 18:21:24.812 UTC [cauthdsl] func2 -> DEBU 1409 0xc0003bdcd0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.812 UTC [cauthdsl] func2 -> DEBU 140a 0xc0003bdcd0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.812 UTC [cauthdsl] func2 -> DEBU 140b 0xc0003bdcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:24.813 UTC [cauthdsl] func2 -> DEBU 140c 0xc0003bdcd0 principal evaluation fails" +"2020-05-20 18:21:24.813 UTC [cauthdsl] func1 -> DEBU 140d 0xc0003bdcd0 gate 1589998884812277700 evaluation fails" +"2020-05-20 18:21:24.813 UTC [policies] Evaluate -> DEBU 140e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:24.813 UTC [policies] Evaluate -> DEBU 140f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:24.814 UTC [policies] Evaluate -> DEBU 1410 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:24.814 UTC [cauthdsl] func1 -> DEBU 1411 0xc00004e5b0 gate 1589998884814517500 evaluation starts" +"2020-05-20 18:21:24.814 UTC [cauthdsl] func2 -> DEBU 1412 0xc00004e5b0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.814 UTC [cauthdsl] func2 -> DEBU 1413 0xc00004e5b0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.815 UTC [cauthdsl] func2 -> DEBU 1414 0xc00004e5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:24.815 UTC [cauthdsl] func2 -> DEBU 1415 0xc00004e5b0 principal evaluation fails" +"2020-05-20 18:21:24.815 UTC [cauthdsl] func1 -> DEBU 1416 0xc00004e5b0 gate 1589998884814517500 evaluation fails" +"2020-05-20 18:21:24.816 UTC [policies] Evaluate -> DEBU 1417 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:24.816 UTC [policies] Evaluate -> DEBU 1418 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:24.816 UTC [policies] func1 -> DEBU 1419 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-05-20 18:21:24.816 UTC [policies] Evaluate -> DEBU 141a Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:24.817 UTC [policies] Evaluate -> DEBU 141b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:24.817 UTC [policies] Evaluate -> DEBU 141c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:24.817 UTC [policies] Evaluate -> DEBU 141d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:24.817 UTC [policies] Evaluate -> DEBU 141e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:24.818 UTC [cauthdsl] func1 -> DEBU 141f 0xc00004f3c0 gate 1589998884818199900 evaluation starts" +"2020-05-20 18:21:24.818 UTC [cauthdsl] func2 -> DEBU 1420 0xc00004f3c0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:24.818 UTC [cauthdsl] func2 -> DEBU 1421 0xc00004f3c0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:24.818 UTC [cauthdsl] func2 -> DEBU 1422 0xc00004f3c0 principal matched by identity 0" +"2020-05-20 18:21:24.819 UTC [msp.identity] Verify -> DEBU 1423 Verify: digest = 00000000 7a 5d d6 e4 3b 6a af fe 85 e4 75 5b b5 6d ea 45 |z]..;j....u[.m.E| +00000010 70 b3 7e 37 08 bb 3f 7c 72 97 f8 59 ca b0 84 8f |p.~7..?|r..Y....|" +"2020-05-20 18:21:24.819 UTC [msp.identity] Verify -> DEBU 1424 Verify: sig = 00000000 30 45 02 21 00 a5 f8 5d f4 32 f6 88 e0 73 b4 67 |0E.!...].2...s.g| +00000010 22 a2 24 7d 3e 1d a5 21 64 90 e6 b3 47 f7 90 23 |".$}>..!d...G..#| +00000020 58 37 f8 16 92 02 20 0a ed af 02 b1 34 60 ee 32 |X7.... .....4`.2| +00000030 f8 21 e5 3d 1d c7 0f 59 3f e2 48 df 68 72 d0 94 |.!.=...Y?.H.hr..| +00000040 fa 46 34 c2 0b ac fb |.F4....|" +"2020-05-20 18:21:24.819 UTC [cauthdsl] func2 -> DEBU 1425 0xc00004f3c0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:24.820 UTC [cauthdsl] func1 -> DEBU 1426 0xc00004f3c0 gate 1589998884818199900 evaluation succeeds" +"2020-05-20 18:21:24.820 UTC [policies] Evaluate -> DEBU 1427 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:24.820 UTC [policies] Evaluate -> DEBU 1428 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:24.820 UTC [policies] Evaluate -> DEBU 1429 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:24.820 UTC [policies] Evaluate -> DEBU 142a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:24.821 UTC [policies] Evaluate -> DEBU 142b Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:24.821 UTC [policies] Evaluate -> DEBU 142c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:24.821 UTC [common.deliver] deliverBlocks -> DEBU 142d [channel: businesschannel] Received seekInfo (0xc001113900) start: > stop: > from 172.18.0.9:53618" +"2020-05-20 18:21:24.821 UTC [fsblkstorage] Next -> DEBU 142e Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:24.822 UTC [fsblkstorage] newBlockfileStream -> DEBU 142f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28474]" +"2020-05-20 18:21:24.822 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1430 Remaining bytes=[68919], Going to peek [8] bytes" +"2020-05-20 18:21:24.823 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1431 Returning blockbytes - length=[28167], placementInfo={fileNum=[0], startOffset=[28474], bytesOffset=[28477]}" +"2020-05-20 18:21:24.823 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1432 blockbytes [28167] read from file [0]" +"2020-05-20 18:21:24.823 UTC [common.deliver] deliverBlocks -> DEBU 1433 [channel: businesschannel] Delivering block [1] for (0xc001113900) for 172.18.0.9:53618" +"2020-05-20 18:21:24.824 UTC [common.deliver] deliverBlocks -> DEBU 1434 [channel: businesschannel] Done delivering to 172.18.0.9:53618 for (0xc001113900)" +"2020-05-20 18:21:24.824 UTC [common.deliver] Handle -> DEBU 1435 Waiting for new SeekInfo from 172.18.0.9:53618" +"2020-05-20 18:21:24.824 UTC [common.deliver] Handle -> DEBU 1436 Attempting to read seek info message from 172.18.0.9:53618" +"2020-05-20 18:21:24.830 UTC [common.deliver] Handle -> WARN 1437 Error reading from 172.18.0.9:53618: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:24.830 UTC [orderer.common.server] func1 -> DEBU 1438 Closing Deliver stream" +"2020-05-20 18:21:24.830 UTC [comm.grpc.server] 1 -> INFO 1439 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53618 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.023ms +"2020-05-20 18:21:24.830 UTC [grpc] infof -> DEBU 143a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:24.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:24.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143c Sending msg of 28 bytes to 3 on channel testchainid took 31.2µs" +"2020-05-20 18:21:24.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118µs " +"2020-05-20 18:21:24.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143e Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +"2020-05-20 18:21:24.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143f Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2020-05-20 18:21:24.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1440 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 347.6µs " +"2020-05-20 18:21:24.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1441 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.4µs " +"2020-05-20 18:21:24.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1442 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:24.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1443 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:25.101 UTC [orderer.common.server] Deliver -> DEBU 1444 Starting new Deliver handler" +"2020-05-20 18:21:25.101 UTC [common.deliver] Handle -> DEBU 1445 Starting new deliver loop for 172.18.0.9:53620" +"2020-05-20 18:21:25.101 UTC [common.deliver] Handle -> DEBU 1446 Attempting to read seek info message from 172.18.0.9:53620" +"2020-05-20 18:21:25.101 UTC [policies] Evaluate -> DEBU 1447 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:25.101 UTC [policies] Evaluate -> DEBU 1448 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.101 UTC [policies] Evaluate -> DEBU 1449 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:25.102 UTC [policies] Evaluate -> DEBU 144a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.102 UTC [policies] Evaluate -> DEBU 144b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:25.102 UTC [cauthdsl] func1 -> DEBU 144c 0xc000d83860 gate 1589998885102346200 evaluation starts" +"2020-05-20 18:21:25.102 UTC [cauthdsl] func2 -> DEBU 144d 0xc000d83860 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.102 UTC [cauthdsl] func2 -> DEBU 144e 0xc000d83860 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.102 UTC [cauthdsl] func2 -> DEBU 144f 0xc000d83860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:25.102 UTC [cauthdsl] func2 -> DEBU 1450 0xc000d83860 principal evaluation fails" +"2020-05-20 18:21:25.102 UTC [cauthdsl] func1 -> DEBU 1451 0xc000d83860 gate 1589998885102346200 evaluation fails" +"2020-05-20 18:21:25.102 UTC [policies] Evaluate -> DEBU 1452 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:25.102 UTC [policies] Evaluate -> DEBU 1453 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:25.103 UTC [policies] Evaluate -> DEBU 1454 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:25.103 UTC [cauthdsl] func1 -> DEBU 1455 0xc0002820a0 gate 1589998885103053500 evaluation starts" +"2020-05-20 18:21:25.103 UTC [cauthdsl] func2 -> DEBU 1456 0xc0002820a0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.103 UTC [cauthdsl] func2 -> DEBU 1457 0xc0002820a0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.103 UTC [cauthdsl] func2 -> DEBU 1458 0xc0002820a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:25.103 UTC [cauthdsl] func2 -> DEBU 1459 0xc0002820a0 principal evaluation fails" +"2020-05-20 18:21:25.103 UTC [cauthdsl] func1 -> DEBU 145a 0xc0002820a0 gate 1589998885103053500 evaluation fails" +"2020-05-20 18:21:25.103 UTC [policies] Evaluate -> DEBU 145b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 145c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:25.104 UTC [policies] func1 -> DEBU 145d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 145e Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 145f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 1460 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 1461 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.104 UTC [policies] Evaluate -> DEBU 1462 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:25.104 UTC [cauthdsl] func1 -> DEBU 1463 0xc000283120 gate 1589998885104943500 evaluation starts" +"2020-05-20 18:21:25.105 UTC [cauthdsl] func2 -> DEBU 1464 0xc000283120 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.105 UTC [cauthdsl] func2 -> DEBU 1465 0xc000283120 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.105 UTC [cauthdsl] func2 -> DEBU 1466 0xc000283120 principal matched by identity 0" +"2020-05-20 18:21:25.105 UTC [msp.identity] Verify -> DEBU 1467 Verify: digest = 00000000 55 7f 4d 86 82 66 f4 45 39 8e 75 ae de bb ef 3f |U.M..f.E9.u....?| +00000010 c3 5d 69 6f fb 74 16 c1 3d e8 83 fd 7f 6e f0 94 |.]io.t..=....n..|" +"2020-05-20 18:21:25.105 UTC [msp.identity] Verify -> DEBU 1468 Verify: sig = 00000000 30 45 02 21 00 a2 8d b6 56 01 78 7d 0e c3 b0 0b |0E.!....V.x}....| +00000010 3c 36 f8 ee e0 72 19 01 70 00 30 24 5c 36 96 51 |<6...r..p.0$\6.Q| +00000020 d7 42 b5 ca 2a 02 20 55 b0 88 8f 1b 52 ea 1c f1 |.B..*. U....R...| +00000030 f0 9e 19 1a 61 0f 67 df 63 56 b7 f8 42 38 1d a4 |....a.g.cV..B8..| +00000040 8a de 0d a4 95 c7 05 |.......|" +"2020-05-20 18:21:25.106 UTC [cauthdsl] func2 -> DEBU 1469 0xc000283120 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:25.106 UTC [cauthdsl] func1 -> DEBU 146a 0xc000283120 gate 1589998885104943500 evaluation succeeds" +"2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146d Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 146f Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:25.106 UTC [policies] Evaluate -> DEBU 1470 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:25.107 UTC [common.deliver] deliverBlocks -> DEBU 1471 [channel: businesschannel] Received seekInfo (0xc0013d0f00) start: > stop: > from 172.18.0.9:53620" +"2020-05-20 18:21:25.107 UTC [fsblkstorage] Next -> DEBU 1472 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:25.107 UTC [fsblkstorage] newBlockfileStream -> DEBU 1473 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56644]" +"2020-05-20 18:21:25.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1474 Remaining bytes=[40749], Going to peek [8] bytes" +"2020-05-20 18:21:25.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1475 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56644], bytesOffset=[56647]}" +"2020-05-20 18:21:25.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1476 blockbytes [28171] read from file [0]" +"2020-05-20 18:21:25.108 UTC [common.deliver] deliverBlocks -> DEBU 1477 [channel: businesschannel] Delivering block [2] for (0xc0013d0f00) for 172.18.0.9:53620" +"2020-05-20 18:21:25.108 UTC [common.deliver] deliverBlocks -> DEBU 1478 [channel: businesschannel] Done delivering to 172.18.0.9:53620 for (0xc0013d0f00)" +"2020-05-20 18:21:25.109 UTC [common.deliver] Handle -> DEBU 1479 Waiting for new SeekInfo from 172.18.0.9:53620" +"2020-05-20 18:21:25.109 UTC [common.deliver] Handle -> DEBU 147a Attempting to read seek info message from 172.18.0.9:53620" +"2020-05-20 18:21:25.128 UTC [grpc] infof -> DEBU 147b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:25.129 UTC [common.deliver] Handle -> WARN 147c Error reading from 172.18.0.9:53620: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:25.129 UTC [orderer.common.server] func1 -> DEBU 147d Closing Deliver stream" +"2020-05-20 18:21:25.129 UTC [comm.grpc.server] 1 -> INFO 147e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53620 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.1438ms +"2020-05-20 18:21:25.344 UTC [orderer.common.server] Deliver -> DEBU 147f Starting new Deliver handler" +"2020-05-20 18:21:25.344 UTC [common.deliver] Handle -> DEBU 1480 Starting new deliver loop for 172.18.0.9:53622" +"2020-05-20 18:21:25.344 UTC [common.deliver] Handle -> DEBU 1481 Attempting to read seek info message from 172.18.0.9:53622" +"2020-05-20 18:21:25.345 UTC [policies] Evaluate -> DEBU 1482 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:25.345 UTC [policies] Evaluate -> DEBU 1483 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.345 UTC [policies] Evaluate -> DEBU 1484 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:25.346 UTC [policies] Evaluate -> DEBU 1485 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.346 UTC [policies] Evaluate -> DEBU 1486 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:25.346 UTC [cauthdsl] func1 -> DEBU 1487 0xc00023d8c0 gate 1589998885346194900 evaluation starts" +"2020-05-20 18:21:25.346 UTC [cauthdsl] func2 -> DEBU 1488 0xc00023d8c0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.346 UTC [cauthdsl] func2 -> DEBU 1489 0xc00023d8c0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.346 UTC [cauthdsl] func2 -> DEBU 148a 0xc00023d8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:25.346 UTC [cauthdsl] func2 -> DEBU 148b 0xc00023d8c0 principal evaluation fails" +"2020-05-20 18:21:25.347 UTC [cauthdsl] func1 -> DEBU 148c 0xc00023d8c0 gate 1589998885346194900 evaluation fails" +"2020-05-20 18:21:25.347 UTC [policies] Evaluate -> DEBU 148d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:25.347 UTC [policies] Evaluate -> DEBU 148e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:25.347 UTC [policies] Evaluate -> DEBU 148f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:25.347 UTC [cauthdsl] func1 -> DEBU 1490 0xc0002f6210 gate 1589998885347529900 evaluation starts" +"2020-05-20 18:21:25.347 UTC [cauthdsl] func2 -> DEBU 1491 0xc0002f6210 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.347 UTC [cauthdsl] func2 -> DEBU 1492 0xc0002f6210 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.348 UTC [cauthdsl] func2 -> DEBU 1493 0xc0002f6210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:25.348 UTC [cauthdsl] func2 -> DEBU 1494 0xc0002f6210 principal evaluation fails" +"2020-05-20 18:21:25.348 UTC [cauthdsl] func1 -> DEBU 1495 0xc0002f6210 gate 1589998885347529900 evaluation fails" +"2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 1496 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 1497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:25.348 UTC [policies] func1 -> DEBU 1498 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 1499 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 149a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:25.348 UTC [policies] Evaluate -> DEBU 149b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:25.349 UTC [policies] Evaluate -> DEBU 149c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.349 UTC [policies] Evaluate -> DEBU 149d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:25.349 UTC [cauthdsl] func1 -> DEBU 149e 0xc0002f71a0 gate 1589998885349364900 evaluation starts" +"2020-05-20 18:21:25.349 UTC [cauthdsl] func2 -> DEBU 149f 0xc0002f71a0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.349 UTC [cauthdsl] func2 -> DEBU 14a0 0xc0002f71a0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.349 UTC [cauthdsl] func2 -> DEBU 14a1 0xc0002f71a0 principal matched by identity 0" +"2020-05-20 18:21:25.349 UTC [msp.identity] Verify -> DEBU 14a2 Verify: digest = 00000000 3d 2e 83 77 0c 79 d7 d5 a8 fe 98 09 d6 21 87 3a |=..w.y.......!.:| +00000010 89 f1 19 4e 65 52 33 91 ea 27 30 c4 b3 f9 8d c0 |...NeR3..'0.....|" +"2020-05-20 18:21:25.349 UTC [msp.identity] Verify -> DEBU 14a3 Verify: sig = 00000000 30 45 02 21 00 af bc 7b 5e d5 3a 4b 1e c1 9f 70 |0E.!...{^.:K...p| +00000010 e3 19 85 a4 85 91 8c d8 01 e3 83 fc 0e 6f f4 7f |.............o..| +00000020 fe 42 c1 5a 89 02 20 53 5e e9 86 63 39 55 93 21 |.B.Z.. S^..c9U.!| +00000030 70 f1 d4 31 c3 c4 f4 19 23 96 d6 27 4c fd 9b f0 |p..1....#..'L...| +00000040 8c b0 af 4a b2 8a 91 |...J...|" +"2020-05-20 18:21:25.350 UTC [cauthdsl] func2 -> DEBU 14a4 0xc0002f71a0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:25.351 UTC [cauthdsl] func1 -> DEBU 14a5 0xc0002f71a0 gate 1589998885349364900 evaluation succeeds" +"2020-05-20 18:21:25.351 UTC [policies] Evaluate -> DEBU 14a6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.351 UTC [policies] Evaluate -> DEBU 14a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.352 UTC [policies] Evaluate -> DEBU 14a8 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.352 UTC [policies] Evaluate -> DEBU 14a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.352 UTC [policies] Evaluate -> DEBU 14aa Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:25.352 UTC [policies] Evaluate -> DEBU 14ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:25.353 UTC [common.deliver] deliverBlocks -> DEBU 14ac [channel: businesschannel] Received seekInfo (0xc0013d12c0) start: > stop: > from 172.18.0.9:53622" +"2020-05-20 18:21:25.353 UTC [fsblkstorage] Next -> DEBU 14ad Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:25.353 UTC [fsblkstorage] newBlockfileStream -> DEBU 14ae newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84818]" +"2020-05-20 18:21:25.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14af Remaining bytes=[12575], Going to peek [8] bytes" +"2020-05-20 18:21:25.354 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14b0 Returning blockbytes - length=[4549], placementInfo={fileNum=[0], startOffset=[84818], bytesOffset=[84820]}" +"2020-05-20 18:21:25.354 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14b1 blockbytes [4549] read from file [0]" +"2020-05-20 18:21:25.355 UTC [common.deliver] deliverBlocks -> DEBU 14b2 [channel: businesschannel] Delivering block [3] for (0xc0013d12c0) for 172.18.0.9:53622" +"2020-05-20 18:21:25.355 UTC [common.deliver] deliverBlocks -> DEBU 14b3 [channel: businesschannel] Done delivering to 172.18.0.9:53622 for (0xc0013d12c0)" +"2020-05-20 18:21:25.356 UTC [common.deliver] Handle -> DEBU 14b4 Waiting for new SeekInfo from 172.18.0.9:53622" +"2020-05-20 18:21:25.356 UTC [common.deliver] Handle -> DEBU 14b5 Attempting to read seek info message from 172.18.0.9:53622" +"2020-05-20 18:21:25.358 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:25.358 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b7 Sending msg of 28 bytes to 3 on channel testchainid took 35.8µs" +"2020-05-20 18:21:25.359 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.1µs " +"2020-05-20 18:21:25.367 UTC [grpc] infof -> DEBU 14b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:25.367 UTC [common.deliver] Handle -> WARN 14ba Error reading from 172.18.0.9:53622: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:25.367 UTC [orderer.common.server] func1 -> DEBU 14bb Closing Deliver stream" +"2020-05-20 18:21:25.367 UTC [comm.grpc.server] 1 -> INFO 14bc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53622 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.4006ms +"2020-05-20 18:21:25.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bd Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2020-05-20 18:21:25.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14be Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2020-05-20 18:21:25.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 419.7µs " +"2020-05-20 18:21:25.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 740.5µs " +"2020-05-20 18:21:25.377 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:25.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:25.558 UTC [orderer.common.server] Deliver -> DEBU 14c3 Starting new Deliver handler" +"2020-05-20 18:21:25.559 UTC [common.deliver] Handle -> DEBU 14c4 Starting new deliver loop for 172.18.0.9:53624" +"2020-05-20 18:21:25.559 UTC [common.deliver] Handle -> DEBU 14c5 Attempting to read seek info message from 172.18.0.9:53624" +"2020-05-20 18:21:25.559 UTC [policies] Evaluate -> DEBU 14c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:25.560 UTC [policies] Evaluate -> DEBU 14c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.560 UTC [policies] Evaluate -> DEBU 14c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:25.560 UTC [policies] Evaluate -> DEBU 14c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.560 UTC [policies] Evaluate -> DEBU 14ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:25.560 UTC [cauthdsl] func1 -> DEBU 14cb 0xc0005590a0 gate 1589998885560516400 evaluation starts" +"2020-05-20 18:21:25.560 UTC [cauthdsl] func2 -> DEBU 14cc 0xc0005590a0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.560 UTC [cauthdsl] func2 -> DEBU 14cd 0xc0005590a0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.560 UTC [cauthdsl] func2 -> DEBU 14ce 0xc0005590a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:25.560 UTC [cauthdsl] func2 -> DEBU 14cf 0xc0005590a0 principal evaluation fails" +"2020-05-20 18:21:25.561 UTC [cauthdsl] func1 -> DEBU 14d0 0xc0005590a0 gate 1589998885560516400 evaluation fails" +"2020-05-20 18:21:25.561 UTC [policies] Evaluate -> DEBU 14d1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:25.561 UTC [policies] Evaluate -> DEBU 14d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:25.561 UTC [policies] Evaluate -> DEBU 14d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:25.561 UTC [cauthdsl] func1 -> DEBU 14d4 0xc000559910 gate 1589998885561664600 evaluation starts" +"2020-05-20 18:21:25.561 UTC [cauthdsl] func2 -> DEBU 14d5 0xc000559910 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.561 UTC [cauthdsl] func2 -> DEBU 14d6 0xc000559910 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.562 UTC [cauthdsl] func2 -> DEBU 14d7 0xc000559910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:25.562 UTC [cauthdsl] func2 -> DEBU 14d8 0xc000559910 principal evaluation fails" +"2020-05-20 18:21:25.562 UTC [cauthdsl] func1 -> DEBU 14d9 0xc000559910 gate 1589998885561664600 evaluation fails" +"2020-05-20 18:21:25.562 UTC [policies] Evaluate -> DEBU 14da Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:25.562 UTC [policies] Evaluate -> DEBU 14db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:25.562 UTC [policies] func1 -> DEBU 14dc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-05-20 18:21:25.562 UTC [policies] Evaluate -> DEBU 14dd Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:25.563 UTC [policies] Evaluate -> DEBU 14de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:25.563 UTC [policies] Evaluate -> DEBU 14df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:25.563 UTC [policies] Evaluate -> DEBU 14e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.563 UTC [policies] Evaluate -> DEBU 14e1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:25.563 UTC [cauthdsl] func1 -> DEBU 14e2 0xc00056e600 gate 1589998885563428600 evaluation starts" +"2020-05-20 18:21:25.563 UTC [cauthdsl] func2 -> DEBU 14e3 0xc00056e600 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.563 UTC [cauthdsl] func2 -> DEBU 14e4 0xc00056e600 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.563 UTC [cauthdsl] func2 -> DEBU 14e5 0xc00056e600 principal matched by identity 0" +"2020-05-20 18:21:25.563 UTC [msp.identity] Verify -> DEBU 14e6 Verify: digest = 00000000 05 3c fa 0f ff d5 82 40 b7 5a 08 57 6d eb aa f2 |.<.....@.Z.Wm...| +00000010 0e 9f 1a 3f c1 a1 42 14 6d 8e 4c 35 d4 2c fc e8 |...?..B.m.L5.,..|" +"2020-05-20 18:21:25.564 UTC [msp.identity] Verify -> DEBU 14e7 Verify: sig = 00000000 30 44 02 20 21 5c 63 e6 3b 7c 8c 40 c6 1e 94 56 |0D. !\c.;|.@...V| +00000010 d9 74 ad ff f0 a7 aa ff 50 d3 b2 7d 7f f2 ef 40 |.t......P..}...@| +00000020 e4 48 be 71 02 20 73 77 12 72 35 12 9f 5e d7 c1 |.H.q. sw.r5..^..| +00000030 6a f6 0f 7c d3 4c 35 6c 1a f8 30 b5 12 4a cf e8 |j..|.L5l..0..J..| +00000040 f2 cb 9d bc 59 2b |....Y+|" +"2020-05-20 18:21:25.564 UTC [cauthdsl] func2 -> DEBU 14e8 0xc00056e600 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:25.564 UTC [cauthdsl] func1 -> DEBU 14e9 0xc00056e600 gate 1589998885563428600 evaluation succeeds" +"2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14ea Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14eb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14ec Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.564 UTC [policies] Evaluate -> DEBU 14ee Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:25.565 UTC [policies] Evaluate -> DEBU 14ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:25.565 UTC [common.deliver] deliverBlocks -> DEBU 14f0 [channel: businesschannel] Received seekInfo (0xc000d72700) start: > stop: > from 172.18.0.9:53624" +"2020-05-20 18:21:25.565 UTC [fsblkstorage] Next -> DEBU 14f1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:25.565 UTC [fsblkstorage] newBlockfileStream -> DEBU 14f2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89369]" +"2020-05-20 18:21:25.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14f3 Remaining bytes=[8024], Going to peek [8] bytes" +"2020-05-20 18:21:25.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14f4 Returning blockbytes - length=[4011], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +"2020-05-20 18:21:25.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14f5 blockbytes [4011] read from file [0]" +"2020-05-20 18:21:25.566 UTC [common.deliver] deliverBlocks -> DEBU 14f6 [channel: businesschannel] Delivering block [4] for (0xc000d72700) for 172.18.0.9:53624" +"2020-05-20 18:21:25.566 UTC [common.deliver] deliverBlocks -> DEBU 14f7 [channel: businesschannel] Done delivering to 172.18.0.9:53624 for (0xc000d72700)" +"2020-05-20 18:21:25.567 UTC [common.deliver] Handle -> DEBU 14f8 Waiting for new SeekInfo from 172.18.0.9:53624" +"2020-05-20 18:21:25.567 UTC [common.deliver] Handle -> DEBU 14f9 Attempting to read seek info message from 172.18.0.9:53624" +"2020-05-20 18:21:25.575 UTC [grpc] infof -> DEBU 14fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:25.575 UTC [common.deliver] Handle -> WARN 14fb Error reading from 172.18.0.9:53624: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:25.576 UTC [orderer.common.server] func1 -> DEBU 14fc Closing Deliver stream" +"2020-05-20 18:21:25.576 UTC [comm.grpc.server] 1 -> INFO 14fd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53624 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.1667ms +"2020-05-20 18:21:25.772 UTC [orderer.common.server] Deliver -> DEBU 14fe Starting new Deliver handler" +"2020-05-20 18:21:25.773 UTC [common.deliver] Handle -> DEBU 14ff Starting new deliver loop for 172.18.0.9:53626" +"2020-05-20 18:21:25.773 UTC [common.deliver] Handle -> DEBU 1500 Attempting to read seek info message from 172.18.0.9:53626" +"2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1501 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1502 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1503 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1504 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.774 UTC [policies] Evaluate -> DEBU 1505 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:25.775 UTC [cauthdsl] func1 -> DEBU 1506 0xc00059ea40 gate 1589998885774929100 evaluation starts" +"2020-05-20 18:21:25.775 UTC [cauthdsl] func2 -> DEBU 1507 0xc00059ea40 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.775 UTC [cauthdsl] func2 -> DEBU 1508 0xc00059ea40 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.775 UTC [cauthdsl] func2 -> DEBU 1509 0xc00059ea40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:25.775 UTC [cauthdsl] func2 -> DEBU 150a 0xc00059ea40 principal evaluation fails" +"2020-05-20 18:21:25.775 UTC [cauthdsl] func1 -> DEBU 150b 0xc00059ea40 gate 1589998885774929100 evaluation fails" +"2020-05-20 18:21:25.775 UTC [policies] Evaluate -> DEBU 150c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:25.775 UTC [policies] Evaluate -> DEBU 150d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:25.775 UTC [policies] Evaluate -> DEBU 150e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:25.776 UTC [cauthdsl] func1 -> DEBU 150f 0xc00059f410 gate 1589998885776145300 evaluation starts" +"2020-05-20 18:21:25.776 UTC [cauthdsl] func2 -> DEBU 1510 0xc00059f410 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.776 UTC [cauthdsl] func2 -> DEBU 1511 0xc00059f410 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.776 UTC [cauthdsl] func2 -> DEBU 1512 0xc00059f410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:25.776 UTC [cauthdsl] func2 -> DEBU 1513 0xc00059f410 principal evaluation fails" +"2020-05-20 18:21:25.776 UTC [cauthdsl] func1 -> DEBU 1514 0xc00059f410 gate 1589998885776145300 evaluation fails" +"2020-05-20 18:21:25.776 UTC [policies] Evaluate -> DEBU 1515 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:25.776 UTC [policies] Evaluate -> DEBU 1516 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:25.776 UTC [policies] func1 -> DEBU 1517 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 1518 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 1519 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 151a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 151b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.777 UTC [policies] Evaluate -> DEBU 151c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:25.777 UTC [cauthdsl] func1 -> DEBU 151d 0xc0009d8160 gate 1589998885777877300 evaluation starts" +"2020-05-20 18:21:25.777 UTC [cauthdsl] func2 -> DEBU 151e 0xc0009d8160 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.778 UTC [cauthdsl] func2 -> DEBU 151f 0xc0009d8160 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.778 UTC [cauthdsl] func2 -> DEBU 1520 0xc0009d8160 principal matched by identity 0" +"2020-05-20 18:21:25.778 UTC [msp.identity] Verify -> DEBU 1521 Verify: digest = 00000000 26 10 42 54 30 ff 0a bf ff 2f 23 ee 9d ce 4b 18 |&.BT0..../#...K.| +00000010 54 60 65 4f 93 41 a4 9f 91 cf bf ba 28 1a 56 e6 |T`eO.A......(.V.|" +"2020-05-20 18:21:25.778 UTC [msp.identity] Verify -> DEBU 1522 Verify: sig = 00000000 30 44 02 20 73 d1 eb fa da 98 99 26 ab dc e7 7b |0D. s......&...{| +00000010 c9 16 f8 2c 46 b0 74 c8 61 88 fb 18 84 cb 5b 0e |...,F.t.a.....[.| +00000020 8f 8d 48 cc 02 20 45 d9 d4 61 20 d6 d3 be 44 dc |..H.. E..a ...D.| +00000030 ea 8d af 1f 4a 6b 7f 0e b4 9c 59 a8 f0 90 1d 13 |....Jk....Y.....| +00000040 d6 aa 5e a2 54 f2 |..^.T.|" +"2020-05-20 18:21:25.779 UTC [cauthdsl] func2 -> DEBU 1523 0xc0009d8160 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:25.779 UTC [cauthdsl] func1 -> DEBU 1524 0xc0009d8160 gate 1589998885777877300 evaluation succeeds" +"2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1525 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1526 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1527 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1528 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.779 UTC [policies] Evaluate -> DEBU 1529 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:25.780 UTC [policies] Evaluate -> DEBU 152a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:25.780 UTC [common.deliver] deliverBlocks -> DEBU 152b [channel: businesschannel] Received seekInfo (0xc0013d1a80) start: > stop: > from 172.18.0.9:53626" +"2020-05-20 18:21:25.780 UTC [fsblkstorage] Next -> DEBU 152c Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-05-20 18:21:25.780 UTC [fsblkstorage] newBlockfileStream -> DEBU 152d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93382]" +"2020-05-20 18:21:25.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 152e Remaining bytes=[4011], Going to peek [8] bytes" +"2020-05-20 18:21:25.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 152f Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93382], bytesOffset=[93384]}" +"2020-05-20 18:21:25.780 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1530 blockbytes [4009] read from file [0]" +"2020-05-20 18:21:25.781 UTC [common.deliver] deliverBlocks -> DEBU 1531 [channel: businesschannel] Delivering block [5] for (0xc0013d1a80) for 172.18.0.9:53626" +"2020-05-20 18:21:25.781 UTC [common.deliver] deliverBlocks -> DEBU 1532 [channel: businesschannel] Done delivering to 172.18.0.9:53626 for (0xc0013d1a80)" +"2020-05-20 18:21:25.781 UTC [common.deliver] Handle -> DEBU 1533 Waiting for new SeekInfo from 172.18.0.9:53626" +"2020-05-20 18:21:25.781 UTC [common.deliver] Handle -> DEBU 1534 Attempting to read seek info message from 172.18.0.9:53626" +"2020-05-20 18:21:25.788 UTC [common.deliver] Handle -> WARN 1535 Error reading from 172.18.0.9:53626: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:25.788 UTC [orderer.common.server] func1 -> DEBU 1536 Closing Deliver stream" +"2020-05-20 18:21:25.788 UTC [comm.grpc.server] 1 -> INFO 1537 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53626 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9934ms +"2020-05-20 18:21:25.789 UTC [grpc] infof -> DEBU 1538 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:25.856 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1539 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:25.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153a Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-05-20 18:21:25.857 UTC [orderer.common.cluster.step] sendMessage -> DEBU 153b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.8µs " +"2020-05-20 18:21:25.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153c Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +"2020-05-20 18:21:25.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 153d Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2020-05-20 18:21:25.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 153e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.4µs " +"2020-05-20 18:21:25.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 153f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.9µs " +"2020-05-20 18:21:25.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1540 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:25.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1541 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:25.970 UTC [orderer.common.server] Deliver -> DEBU 1542 Starting new Deliver handler" +"2020-05-20 18:21:25.971 UTC [common.deliver] Handle -> DEBU 1543 Starting new deliver loop for 172.18.0.9:53628" +"2020-05-20 18:21:25.971 UTC [common.deliver] Handle -> DEBU 1544 Attempting to read seek info message from 172.18.0.9:53628" +"2020-05-20 18:21:25.972 UTC [policies] Evaluate -> DEBU 1545 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:25.972 UTC [policies] Evaluate -> DEBU 1546 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.972 UTC [policies] Evaluate -> DEBU 1547 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:25.973 UTC [policies] Evaluate -> DEBU 1548 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:25.973 UTC [policies] Evaluate -> DEBU 1549 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:25.973 UTC [msp] DeserializeIdentity -> DEBU 154a Obtaining identity" +"2020-05-20 18:21:25.974 UTC [msp.identity] newIdentity -> DEBU 154b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-05-20 18:21:25.975 UTC [cauthdsl] func1 -> DEBU 154c 0xc0004e8cb0 gate 1589998885975264600 evaluation starts" +"2020-05-20 18:21:25.975 UTC [cauthdsl] func2 -> DEBU 154d 0xc0004e8cb0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:25.975 UTC [cauthdsl] func2 -> DEBU 154e 0xc0004e8cb0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:25.975 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 154f Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-05-20 18:21:25.975 UTC [msp] Validate -> DEBU 1550 MSP OrdererMSP validating identity" +"2020-05-20 18:21:25.976 UTC [msp] getCertificationChain -> DEBU 1551 MSP OrdererMSP getting certification chain" +"2020-05-20 18:21:25.976 UTC [cauthdsl] func2 -> DEBU 1552 0xc0004e8cb0 principal matched by identity 0" +"2020-05-20 18:21:25.977 UTC [msp.identity] Verify -> DEBU 1553 Verify: digest = 00000000 d3 0c a0 a0 24 69 15 4b 14 42 7c f3 96 f3 51 28 |....$i.K.B|...Q(| +00000010 5e 9c 74 70 34 58 d8 67 71 3e 08 67 7b 2b 97 9a |^.tp4X.gq>.g{+..|" +"2020-05-20 18:21:25.977 UTC [msp.identity] Verify -> DEBU 1554 Verify: sig = 00000000 30 44 02 20 08 f7 fc db 63 0b 86 9c 3f c1 6b ab |0D. ....c...?.k.| +00000010 ea a7 45 7a 86 e0 fd 8e ec 9c be 90 cb d0 47 b6 |..Ez..........G.| +00000020 01 7e c8 71 02 20 75 49 58 e6 d2 92 14 c8 c0 6a |.~.q. uIX......j| +00000030 a9 e8 24 ce 5e 0d 2a 23 67 79 3e 69 64 e1 62 da |..$.^.*#gy>id.b.| +00000040 22 5a 10 64 b1 7f |"Z.d..|" +"2020-05-20 18:21:25.977 UTC [cauthdsl] func2 -> DEBU 1555 0xc0004e8cb0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:25.977 UTC [cauthdsl] func1 -> DEBU 1556 0xc0004e8cb0 gate 1589998885975264600 evaluation succeeds" +"2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 1557 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 1558 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 1559 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 155a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:25.978 UTC [policies] Evaluate -> DEBU 155b Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:25.979 UTC [policies] Evaluate -> DEBU 155c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:25.979 UTC [common.deliver] deliverBlocks -> DEBU 155d [channel: testchainid] Received seekInfo (0xc0003d2300) start: > stop: > from 172.18.0.9:53628" +"2020-05-20 18:21:25.980 UTC [fsblkstorage] Next -> DEBU 155e Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:25.980 UTC [fsblkstorage] newBlockfileStream -> DEBU 155f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-05-20 18:21:25.981 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1560 Remaining bytes=[30409], Going to peek [8] bytes" +"2020-05-20 18:21:25.982 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1561 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-05-20 18:21:25.983 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1562 blockbytes [30406] read from file [0]" +"2020-05-20 18:21:25.983 UTC [common.deliver] deliverBlocks -> DEBU 1563 [channel: testchainid] Delivering block [1] for (0xc0003d2300) for 172.18.0.9:53628" +"2020-05-20 18:21:25.983 UTC [common.deliver] deliverBlocks -> DEBU 1564 [channel: testchainid] Done delivering to 172.18.0.9:53628 for (0xc0003d2300)" +"2020-05-20 18:21:25.984 UTC [common.deliver] Handle -> DEBU 1565 Waiting for new SeekInfo from 172.18.0.9:53628" +"2020-05-20 18:21:25.984 UTC [common.deliver] Handle -> DEBU 1566 Attempting to read seek info message from 172.18.0.9:53628" +"2020-05-20 18:21:25.993 UTC [common.deliver] Handle -> WARN 1567 Error reading from 172.18.0.9:53628: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:25.993 UTC [orderer.common.server] func1 -> DEBU 1568 Closing Deliver stream" +"2020-05-20 18:21:25.993 UTC [comm.grpc.server] 1 -> INFO 1569 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53628 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.2745ms +"2020-05-20 18:21:25.994 UTC [grpc] infof -> DEBU 156a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:26.218 UTC [orderer.common.server] Deliver -> DEBU 156b Starting new Deliver handler" +"2020-05-20 18:21:26.218 UTC [common.deliver] Handle -> DEBU 156c Starting new deliver loop for 172.18.0.9:53630" +"2020-05-20 18:21:26.218 UTC [common.deliver] Handle -> DEBU 156d Attempting to read seek info message from 172.18.0.9:53630" +"2020-05-20 18:21:26.219 UTC [policies] Evaluate -> DEBU 156e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:26.219 UTC [policies] Evaluate -> DEBU 156f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:26.219 UTC [policies] Evaluate -> DEBU 1570 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:26.220 UTC [policies] Evaluate -> DEBU 1571 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:26.220 UTC [policies] Evaluate -> DEBU 1572 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:26.220 UTC [cauthdsl] func1 -> DEBU 1573 0xc000548290 gate 1589998886220902400 evaluation starts" +"2020-05-20 18:21:26.221 UTC [cauthdsl] func2 -> DEBU 1574 0xc000548290 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:26.221 UTC [cauthdsl] func2 -> DEBU 1575 0xc000548290 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:26.222 UTC [cauthdsl] func2 -> DEBU 1576 0xc000548290 principal matched by identity 0" +"2020-05-20 18:21:26.222 UTC [msp.identity] Verify -> DEBU 1577 Verify: digest = 00000000 2a 10 b3 2f 30 50 38 9a 2a 65 b6 24 13 b1 ce 0f |*../0P8.*e.$....| +00000010 f3 0a bc 64 89 3a 39 18 4c d0 07 b5 3b 0f c3 ac |...d.:9.L...;...|" +"2020-05-20 18:21:26.222 UTC [msp.identity] Verify -> DEBU 1578 Verify: sig = 00000000 30 44 02 20 41 c1 10 d0 b7 f6 d1 ec b3 a3 e8 c9 |0D. A...........| +00000010 91 a1 7d e2 d7 5e 6b 33 c5 75 b4 c7 c4 1f cd e6 |..}..^k3.u......| +00000020 50 be 51 2a 02 20 26 82 26 d6 b2 08 4b 44 6c 42 |P.Q*. &.&...KDlB| +00000030 15 10 f0 fa 42 47 87 b4 15 2d 9b 83 94 e0 da 93 |....BG...-......| +00000040 a4 ea 8e 6f 32 45 |...o2E|" +"2020-05-20 18:21:26.223 UTC [cauthdsl] func2 -> DEBU 1579 0xc000548290 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:26.223 UTC [cauthdsl] func1 -> DEBU 157a 0xc000548290 gate 1589998886220902400 evaluation succeeds" +"2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157d Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:26.224 UTC [policies] Evaluate -> DEBU 157f Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:26.225 UTC [policies] Evaluate -> DEBU 1580 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:26.225 UTC [common.deliver] deliverBlocks -> DEBU 1581 [channel: testchainid] Received seekInfo (0xc0003d32c0) start: > stop: > from 172.18.0.9:53630" +"2020-05-20 18:21:26.225 UTC [fsblkstorage] Next -> DEBU 1582 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:26.225 UTC [fsblkstorage] newBlockfileStream -> DEBU 1583 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-05-20 18:21:26.225 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1584 Remaining bytes=[30409], Going to peek [8] bytes" +"2020-05-20 18:21:26.226 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1585 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-05-20 18:21:26.226 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1586 blockbytes [30406] read from file [0]" +"2020-05-20 18:21:26.227 UTC [common.deliver] deliverBlocks -> DEBU 1587 [channel: testchainid] Delivering block [1] for (0xc0003d32c0) for 172.18.0.9:53630" +"2020-05-20 18:21:26.227 UTC [common.deliver] deliverBlocks -> DEBU 1588 [channel: testchainid] Done delivering to 172.18.0.9:53630 for (0xc0003d32c0)" +"2020-05-20 18:21:26.227 UTC [common.deliver] Handle -> DEBU 1589 Waiting for new SeekInfo from 172.18.0.9:53630" +"2020-05-20 18:21:26.228 UTC [common.deliver] Handle -> DEBU 158a Attempting to read seek info message from 172.18.0.9:53630" +"2020-05-20 18:21:26.238 UTC [policies] Evaluate -> DEBU 158b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:26.238 UTC [policies] Evaluate -> DEBU 158c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:26.238 UTC [policies] Evaluate -> DEBU 158d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:26.239 UTC [policies] Evaluate -> DEBU 158e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:26.239 UTC [policies] Evaluate -> DEBU 158f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:26.239 UTC [cauthdsl] func1 -> DEBU 1590 0xc0009f9a20 gate 1589998886239907900 evaluation starts" +"2020-05-20 18:21:26.240 UTC [cauthdsl] func2 -> DEBU 1591 0xc0009f9a20 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:26.240 UTC [cauthdsl] func2 -> DEBU 1592 0xc0009f9a20 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:26.240 UTC [cauthdsl] func2 -> DEBU 1593 0xc0009f9a20 principal matched by identity 0" +"2020-05-20 18:21:26.240 UTC [msp.identity] Verify -> DEBU 1594 Verify: digest = 00000000 5f da 9c fe 98 77 74 b6 c6 59 4c c9 04 31 80 ed |_....wt..YL..1..| +00000010 50 35 36 8a a3 76 6c 25 f4 d7 bd 96 6d 8d 88 4e |P56..vl%....m..N|" +"2020-05-20 18:21:26.240 UTC [msp.identity] Verify -> DEBU 1595 Verify: sig = 00000000 30 45 02 21 00 ba f2 0c 58 8d 5f 4c fd 6d 3c 39 |0E.!....X._L.m<9| +00000010 09 02 a2 b2 1f 29 df ed 00 ba c6 53 5a 64 8a 82 |.....).....SZd..| +00000020 66 80 2d 7b 66 02 20 09 f8 fb 13 0e 40 e5 b4 7e |f.-{f. .....@..~| +00000030 08 c4 94 7e 5f 09 11 37 3e e4 37 2e de e6 67 31 |...~_..7>.7...g1| +00000040 c7 fd a0 1b 43 92 68 |....C.h|" +"2020-05-20 18:21:26.241 UTC [cauthdsl] func2 -> DEBU 1596 0xc0009f9a20 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:26.241 UTC [cauthdsl] func1 -> DEBU 1597 0xc0009f9a20 gate 1589998886239907900 evaluation succeeds" +"2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 1598 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 1599 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 159a Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 159b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:26.241 UTC [policies] Evaluate -> DEBU 159c Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:26.242 UTC [policies] Evaluate -> DEBU 159d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:26.242 UTC [common.deliver] deliverBlocks -> DEBU 159e [channel: testchainid] Received seekInfo (0xc000d72fc0) start: > stop: > from 172.18.0.9:53630" +"2020-05-20 18:21:26.243 UTC [fsblkstorage] Next -> DEBU 159f Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:26.243 UTC [fsblkstorage] newBlockfileStream -> DEBU 15a0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:21:26.243 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15a1 Remaining bytes=[53339], Going to peek [8] bytes" +"2020-05-20 18:21:26.244 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15a2 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:21:26.244 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15a3 blockbytes [22927] read from file [0]" +"2020-05-20 18:21:26.244 UTC [common.deliver] deliverBlocks -> DEBU 15a4 [channel: testchainid] Delivering block [0] for (0xc000d72fc0) for 172.18.0.9:53630" +"2020-05-20 18:21:26.245 UTC [common.deliver] deliverBlocks -> DEBU 15a5 [channel: testchainid] Done delivering to 172.18.0.9:53630 for (0xc000d72fc0)" +"2020-05-20 18:21:26.245 UTC [common.deliver] Handle -> DEBU 15a6 Waiting for new SeekInfo from 172.18.0.9:53630" +"2020-05-20 18:21:26.245 UTC [common.deliver] Handle -> DEBU 15a7 Attempting to read seek info message from 172.18.0.9:53630" +"2020-05-20 18:21:26.254 UTC [grpc] infof -> DEBU 15a8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:26.254 UTC [common.deliver] Handle -> WARN 15a9 Error reading from 172.18.0.9:53630: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:26.255 UTC [orderer.common.server] func1 -> DEBU 15aa Closing Deliver stream" +"2020-05-20 18:21:26.255 UTC [comm.grpc.server] 1 -> INFO 15ab streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53630 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.6535ms +"2020-05-20 18:21:26.357 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ac Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:26.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ad Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2020-05-20 18:21:26.358 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 379.1µs " +"2020-05-20 18:21:26.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15af Sending msg of 28 bytes to 2 on channel businesschannel took 39.6µs" +"2020-05-20 18:21:26.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15b0 Sending msg of 28 bytes to 3 on channel businesschannel took 118.1µs" +"2020-05-20 18:21:26.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 676.3µs " +"2020-05-20 18:21:26.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15b2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.6µs " +"2020-05-20 18:21:26.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:26.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15b4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:26.480 UTC [orderer.common.server] Deliver -> DEBU 15b5 Starting new Deliver handler" +"2020-05-20 18:21:26.480 UTC [common.deliver] Handle -> DEBU 15b6 Starting new deliver loop for 172.18.0.9:53632" +"2020-05-20 18:21:26.480 UTC [common.deliver] Handle -> DEBU 15b7 Attempting to read seek info message from 172.18.0.9:53632" +"2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:26.481 UTC [policies] Evaluate -> DEBU 15bc == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:26.481 UTC [cauthdsl] func1 -> DEBU 15bd 0xc000e6a570 gate 1589998886481691900 evaluation starts" +"2020-05-20 18:21:26.482 UTC [cauthdsl] func2 -> DEBU 15be 0xc000e6a570 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:26.482 UTC [cauthdsl] func2 -> DEBU 15bf 0xc000e6a570 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:26.482 UTC [cauthdsl] func2 -> DEBU 15c0 0xc000e6a570 principal matched by identity 0" +"2020-05-20 18:21:26.482 UTC [msp.identity] Verify -> DEBU 15c1 Verify: digest = 00000000 01 39 80 f0 f5 7b 84 ab 44 5a 9b df c5 86 f4 a7 |.9...{..DZ......| +00000010 a3 83 10 35 b2 57 32 5d 3b 59 f7 11 65 d7 86 2b |...5.W2];Y..e..+|" +"2020-05-20 18:21:26.483 UTC [msp.identity] Verify -> DEBU 15c2 Verify: sig = 00000000 30 45 02 21 00 d6 50 87 20 db 12 f2 8b b6 33 45 |0E.!..P. .....3E| +00000010 a5 01 ce 04 1f 16 c1 78 06 77 21 ec b2 c6 b1 9d |.......x.w!.....| +00000020 13 b4 9e 2f 66 02 20 10 e5 b1 42 a6 11 d2 c0 1a |.../f. ...B.....| +00000030 50 42 f5 d2 6e df fb c4 49 1c e5 31 30 7c 27 2c |PB..n...I..10|',| +00000040 c3 41 52 b9 b0 dd c5 |.AR....|" +"2020-05-20 18:21:26.484 UTC [cauthdsl] func2 -> DEBU 15c3 0xc000e6a570 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:26.484 UTC [cauthdsl] func1 -> DEBU 15c4 0xc000e6a570 gate 1589998886481691900 evaluation succeeds" +"2020-05-20 18:21:26.484 UTC [policies] Evaluate -> DEBU 15c5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:26.484 UTC [policies] Evaluate -> DEBU 15c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:26.484 UTC [policies] Evaluate -> DEBU 15c7 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:26.485 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:26.485 UTC [policies] Evaluate -> DEBU 15c9 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:26.486 UTC [policies] Evaluate -> DEBU 15ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:26.486 UTC [common.deliver] deliverBlocks -> DEBU 15cb [channel: testchainid] Received seekInfo (0xc000d73580) start: > stop: > from 172.18.0.9:53632" +"2020-05-20 18:21:26.486 UTC [fsblkstorage] Next -> DEBU 15cc Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:26.487 UTC [fsblkstorage] newBlockfileStream -> DEBU 15cd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:21:26.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15ce Remaining bytes=[53339], Going to peek [8] bytes" +"2020-05-20 18:21:26.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15cf Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:21:26.489 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15d0 blockbytes [22927] read from file [0]" +"2020-05-20 18:21:26.490 UTC [common.deliver] deliverBlocks -> DEBU 15d1 [channel: testchainid] Delivering block [0] for (0xc000d73580) for 172.18.0.9:53632" +"2020-05-20 18:21:26.490 UTC [common.deliver] deliverBlocks -> DEBU 15d2 [channel: testchainid] Done delivering to 172.18.0.9:53632 for (0xc000d73580)" +"2020-05-20 18:21:26.491 UTC [common.deliver] Handle -> DEBU 15d3 Waiting for new SeekInfo from 172.18.0.9:53632" +"2020-05-20 18:21:26.491 UTC [common.deliver] Handle -> DEBU 15d4 Attempting to read seek info message from 172.18.0.9:53632" +"2020-05-20 18:21:26.502 UTC [grpc] infof -> DEBU 15d5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:26.502 UTC [common.deliver] Handle -> WARN 15d6 Error reading from 172.18.0.9:53632: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:26.502 UTC [orderer.common.server] func1 -> DEBU 15d7 Closing Deliver stream" +"2020-05-20 18:21:26.502 UTC [comm.grpc.server] 1 -> INFO 15d8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53632 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.7895ms +"2020-05-20 18:21:26.745 UTC [orderer.common.server] Deliver -> DEBU 15d9 Starting new Deliver handler" +"2020-05-20 18:21:26.745 UTC [common.deliver] Handle -> DEBU 15da Starting new deliver loop for 172.18.0.9:53634" +"2020-05-20 18:21:26.745 UTC [common.deliver] Handle -> DEBU 15db Attempting to read seek info message from 172.18.0.9:53634" +"2020-05-20 18:21:26.751 UTC [policies] Evaluate -> DEBU 15dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:26.752 UTC [policies] Evaluate -> DEBU 15dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:26.752 UTC [policies] Evaluate -> DEBU 15de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:26.752 UTC [policies] Evaluate -> DEBU 15df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:26.752 UTC [policies] Evaluate -> DEBU 15e0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:26.752 UTC [cauthdsl] func1 -> DEBU 15e1 0xc000d4bd80 gate 1589998886752697700 evaluation starts" +"2020-05-20 18:21:26.752 UTC [cauthdsl] func2 -> DEBU 15e2 0xc000d4bd80 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:26.752 UTC [cauthdsl] func2 -> DEBU 15e3 0xc000d4bd80 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:26.753 UTC [cauthdsl] func2 -> DEBU 15e4 0xc000d4bd80 principal matched by identity 0" +"2020-05-20 18:21:26.753 UTC [msp.identity] Verify -> DEBU 15e5 Verify: digest = 00000000 9f 16 c9 60 65 00 cd 29 b2 f5 4c 82 ff 56 29 78 |...`e..)..L..V)x| +00000010 7c 43 db f2 23 37 a9 53 4f 82 33 95 30 6e b1 0b ||C..#7.SO.3.0n..|" +"2020-05-20 18:21:26.753 UTC [msp.identity] Verify -> DEBU 15e6 Verify: sig = 00000000 30 44 02 20 3d 6d 0e 4a 9f 13 1b cd 7f 24 a7 ec |0D. =m.J.....$..| +00000010 68 2d f0 62 70 88 63 42 89 c5 2a ed f5 1d 0c d0 |h-.bp.cB..*.....| +00000020 fe 18 7a 89 02 20 23 a7 2b 97 b2 b4 3b 62 76 b7 |..z.. #.+...;bv.| +00000030 9f 86 df cc c6 2e 3d be 1e 70 7f 23 48 b1 eb 3a |......=..p.#H..:| +00000040 62 b5 45 f4 91 80 |b.E...|" +"2020-05-20 18:21:26.753 UTC [cauthdsl] func2 -> DEBU 15e7 0xc000d4bd80 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:26.754 UTC [cauthdsl] func1 -> DEBU 15e8 0xc000d4bd80 gate 1589998886752697700 evaluation succeeds" +"2020-05-20 18:21:26.754 UTC [policies] Evaluate -> DEBU 15e9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:26.754 UTC [policies] Evaluate -> DEBU 15ea == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:26.754 UTC [policies] Evaluate -> DEBU 15eb Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:26.755 UTC [policies] Evaluate -> DEBU 15ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:26.755 UTC [policies] Evaluate -> DEBU 15ed Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:26.755 UTC [policies] Evaluate -> DEBU 15ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:26.755 UTC [common.deliver] deliverBlocks -> DEBU 15ef [channel: testchainid] Received seekInfo (0xc000cfe340) start: > stop: > from 172.18.0.9:53634" +"2020-05-20 18:21:26.755 UTC [fsblkstorage] Next -> DEBU 15f0 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:26.755 UTC [fsblkstorage] newBlockfileStream -> DEBU 15f1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-05-20 18:21:26.756 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15f2 Remaining bytes=[30409], Going to peek [8] bytes" +"2020-05-20 18:21:26.756 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15f3 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-05-20 18:21:26.756 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15f4 blockbytes [30406] read from file [0]" +"2020-05-20 18:21:26.756 UTC [common.deliver] deliverBlocks -> DEBU 15f5 [channel: testchainid] Delivering block [1] for (0xc000cfe340) for 172.18.0.9:53634" +"2020-05-20 18:21:26.757 UTC [common.deliver] deliverBlocks -> DEBU 15f6 [channel: testchainid] Done delivering to 172.18.0.9:53634 for (0xc000cfe340)" +"2020-05-20 18:21:26.757 UTC [common.deliver] Handle -> DEBU 15f7 Waiting for new SeekInfo from 172.18.0.9:53634" +"2020-05-20 18:21:26.757 UTC [common.deliver] Handle -> DEBU 15f8 Attempting to read seek info message from 172.18.0.9:53634" +"2020-05-20 18:21:26.765 UTC [common.deliver] Handle -> WARN 15f9 Error reading from 172.18.0.9:53634: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:26.765 UTC [orderer.common.server] func1 -> DEBU 15fa Closing Deliver stream" +"2020-05-20 18:21:26.765 UTC [comm.grpc.server] 1 -> INFO 15fb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53634 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.6923ms +"2020-05-20 18:21:26.766 UTC [grpc] infof -> DEBU 15fc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:26.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15fd Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:26.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15fe Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" +"2020-05-20 18:21:26.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15ff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " +"2020-05-20 18:21:26.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1600 Sending msg of 28 bytes to 2 on channel businesschannel took 33.8µs" +"2020-05-20 18:21:26.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1601 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +"2020-05-20 18:21:26.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1602 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +"2020-05-20 18:21:26.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1603 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.7µs " +"2020-05-20 18:21:26.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1604 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:26.878 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1605 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:27.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1606 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:27.357 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1607 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-05-20 18:21:27.357 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1608 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 333µs " +"2020-05-20 18:21:27.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1609 Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +"2020-05-20 18:21:27.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313.2µs " +"2020-05-20 18:21:27.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160b Sending msg of 28 bytes to 2 on channel businesschannel took 8.6µs" +"2020-05-20 18:21:27.378 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:27.381 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.6144ms " +"2020-05-20 18:21:27.382 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:27.861 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:27.861 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1610 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2020-05-20 18:21:27.861 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1611 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.5µs " +"2020-05-20 18:21:27.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1612 Sending msg of 28 bytes to 2 on channel businesschannel took 58.4µs" +"2020-05-20 18:21:27.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1613 Sending msg of 28 bytes to 3 on channel businesschannel took 6.2µs" +"2020-05-20 18:21:27.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1614 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.6µs " +"2020-05-20 18:21:27.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1615 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +"2020-05-20 18:21:27.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1616 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:27.877 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1617 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:28.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1618 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:28.321 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1619 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-05-20 18:21:28.321 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.4µs " +"2020-05-20 18:21:28.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161b Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" +"2020-05-20 18:21:28.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161c Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-05-20 18:21:28.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.9µs " +"2020-05-20 18:21:28.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.4µs " +"2020-05-20 18:21:28.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:28.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1620 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:28.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1621 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:28.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1622 Sending msg of 28 bytes to 3 on channel testchainid took 49.4µs" +"2020-05-20 18:21:28.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1623 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.3µs " +"2020-05-20 18:21:28.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1624 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2020-05-20 18:21:28.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1625 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +"2020-05-20 18:21:28.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1626 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.3µs " +"2020-05-20 18:21:28.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1627 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.8µs " +"2020-05-20 18:21:28.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1628 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:28.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1629 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:29.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:29.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162b Sending msg of 28 bytes to 3 on channel testchainid took 31.5µs" +"2020-05-20 18:21:29.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 679.9µs " +"2020-05-20 18:21:29.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162d Sending msg of 28 bytes to 2 on channel businesschannel took 16.6µs" +"2020-05-20 18:21:29.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162e Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-05-20 18:21:29.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +"2020-05-20 18:21:29.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1630 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.8µs " +"2020-05-20 18:21:29.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1631 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:29.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1632 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:29.828 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1633 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:29.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1634 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2020-05-20 18:21:29.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1635 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " +"2020-05-20 18:21:29.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1636 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2020-05-20 18:21:29.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1637 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2020-05-20 18:21:29.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1638 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.4µs " +"2020-05-20 18:21:29.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1639 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 581.8µs " +"2020-05-20 18:21:29.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:29.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:30.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:30.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163d Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +"2020-05-20 18:21:30.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.9µs " +"2020-05-20 18:21:30.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163f Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2020-05-20 18:21:30.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1640 Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +"2020-05-20 18:21:30.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1641 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.4µs " +"2020-05-20 18:21:30.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1642 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.6µs " +"2020-05-20 18:21:30.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1643 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:30.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1644 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:30.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1645 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:30.825 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1646 Sending msg of 28 bytes to 3 on channel testchainid took 48.1µs" +"2020-05-20 18:21:30.825 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1647 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.3µs " +"2020-05-20 18:21:30.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1648 Sending msg of 28 bytes to 2 on channel businesschannel took 55.5µs" +"2020-05-20 18:21:30.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1649 Sending msg of 28 bytes to 3 on channel businesschannel took 26.4µs" +"2020-05-20 18:21:30.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 655.4µs " +"2020-05-20 18:21:30.845 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.3505ms " +"2020-05-20 18:21:30.847 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:30.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:31.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:31.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164f Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2020-05-20 18:21:31.323 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1650 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " +"2020-05-20 18:21:31.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1651 Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +"2020-05-20 18:21:31.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1652 Sending msg of 28 bytes to 3 on channel businesschannel took 30.5µs" +"2020-05-20 18:21:31.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1653 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.3µs " +"2020-05-20 18:21:31.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1654 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.6µs " +"2020-05-20 18:21:31.345 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1655 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:31.346 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1656 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:31.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1657 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:31.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1658 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2020-05-20 18:21:31.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1659 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.9µs " +"2020-05-20 18:21:31.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165a Sending msg of 28 bytes to 2 on channel businesschannel took 16.8µs" +"2020-05-20 18:21:31.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165b Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" +"2020-05-20 18:21:31.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.4µs " +"2020-05-20 18:21:31.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274.4µs " +"2020-05-20 18:21:31.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:31.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 165f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:32.323 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1660 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:32.325 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1661 Sending msg of 28 bytes to 3 on channel testchainid took 43.6µs" +"2020-05-20 18:21:32.326 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1662 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.6µs " +"2020-05-20 18:21:32.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1663 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2020-05-20 18:21:32.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1664 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2020-05-20 18:21:32.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1665 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.2µs " +"2020-05-20 18:21:32.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1666 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0573ms " +"2020-05-20 18:21:32.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1667 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:32.345 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1668 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:32.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1669 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:32.822 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166a Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-05-20 18:21:32.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.1µs " +"2020-05-20 18:21:32.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166c Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +"2020-05-20 18:21:32.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166d Sending msg of 28 bytes to 3 on channel businesschannel took 45.6µs" +"2020-05-20 18:21:32.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102µs " +"2020-05-20 18:21:32.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 424.9µs " +"2020-05-20 18:21:32.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1670 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:32.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1671 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:33.338 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1672 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:33.339 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1673 Sending msg of 28 bytes to 3 on channel testchainid took 41.8µs" +"2020-05-20 18:21:33.339 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1674 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +"2020-05-20 18:21:33.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1675 Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +"2020-05-20 18:21:33.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1676 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2020-05-20 18:21:33.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1677 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +"2020-05-20 18:21:33.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1678 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.9µs " +"2020-05-20 18:21:33.347 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1679 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:33.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:33.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:33.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167c Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2020-05-20 18:21:33.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " +"2020-05-20 18:21:33.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167e Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +"2020-05-20 18:21:33.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167f Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2020-05-20 18:21:33.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1680 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.5µs " +"2020-05-20 18:21:33.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1681 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.9µs " +"2020-05-20 18:21:33.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1682 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:33.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1683 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:34.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1684 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:34.321 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1685 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2020-05-20 18:21:34.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1686 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +"2020-05-20 18:21:34.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1687 Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +"2020-05-20 18:21:34.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1688 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2020-05-20 18:21:34.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1689 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.7µs " +"2020-05-20 18:21:34.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 168a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.6µs " +"2020-05-20 18:21:34.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168b Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:34.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:34.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 168d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:34.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 168e Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2020-05-20 18:21:34.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 168f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.4µs " +"2020-05-20 18:21:34.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1690 Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +"2020-05-20 18:21:34.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1691 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-05-20 18:21:34.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1692 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129.3µs " +"2020-05-20 18:21:34.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1693 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:34.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1694 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:34.843 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1695 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7753ms " +"2020-05-20 18:21:35.060 UTC [orderer.common.server] Deliver -> DEBU 1696 Starting new Deliver handler" +"2020-05-20 18:21:35.060 UTC [common.deliver] Handle -> DEBU 1697 Starting new deliver loop for 172.18.0.9:53636" +"2020-05-20 18:21:35.061 UTC [common.deliver] Handle -> DEBU 1698 Attempting to read seek info message from 172.18.0.9:53636" +"2020-05-20 18:21:35.078 UTC [orderer.common.server] Broadcast -> DEBU 1699 Starting new Broadcast handler" +"2020-05-20 18:21:35.078 UTC [orderer.common.broadcast] Handle -> DEBU 169a Starting new broadcast loop for 172.18.0.9:53638" +"2020-05-20 18:21:35.079 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 169b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:53638" +"2020-05-20 18:21:35.079 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 169c Processing config update message for exisitng channel businesschannel" +"2020-05-20 18:21:35.079 UTC [policies] Evaluate -> DEBU 169d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:21:35.079 UTC [policies] Evaluate -> DEBU 169e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:35.079 UTC [policies] Evaluate -> DEBU 169f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:21:35.079 UTC [policies] Evaluate -> DEBU 16a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:35.080 UTC [policies] Evaluate -> DEBU 16a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:21:35.080 UTC [cauthdsl] func1 -> DEBU 16a2 0xc0012a3c60 gate 1589998895080056400 evaluation starts" +"2020-05-20 18:21:35.080 UTC [cauthdsl] func2 -> DEBU 16a3 0xc0012a3c60 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:35.080 UTC [cauthdsl] func2 -> DEBU 16a4 0xc0012a3c60 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:35.080 UTC [cauthdsl] func2 -> DEBU 16a5 0xc0012a3c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-05-20 18:21:35.080 UTC [cauthdsl] func2 -> DEBU 16a6 0xc0012a3c60 principal evaluation fails" +"2020-05-20 18:21:35.081 UTC [cauthdsl] func1 -> DEBU 16a7 0xc0012a3c60 gate 1589998895080056400 evaluation fails" +"2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16a8 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:35.081 UTC [policies] func1 -> DEBU 16aa Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16ab Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16ac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:21:35.081 UTC [policies] Evaluate -> DEBU 16ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-05-20 18:21:35.082 UTC [policies] Evaluate -> DEBU 16ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:35.082 UTC [policies] Evaluate -> DEBU 16af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-05-20 18:21:35.082 UTC [cauthdsl] func1 -> DEBU 16b0 0xc001046950 gate 1589998895082914700 evaluation starts" +"2020-05-20 18:21:35.083 UTC [cauthdsl] func2 -> DEBU 16b1 0xc001046950 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:35.083 UTC [cauthdsl] func2 -> DEBU 16b2 0xc001046950 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:35.083 UTC [cauthdsl] func2 -> DEBU 16b3 0xc001046950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-05-20 18:21:35.083 UTC [cauthdsl] func2 -> DEBU 16b4 0xc001046950 principal evaluation fails" +"2020-05-20 18:21:35.083 UTC [cauthdsl] func1 -> DEBU 16b5 0xc001046950 gate 1589998895082914700 evaluation fails" +"2020-05-20 18:21:35.083 UTC [policies] Evaluate -> DEBU 16b6 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:35.083 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:35.083 UTC [policies] Evaluate -> DEBU 16b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-05-20 18:21:35.084 UTC [cauthdsl] func1 -> DEBU 16b9 0xc001047190 gate 1589998895084245800 evaluation starts" +"2020-05-20 18:21:35.084 UTC [cauthdsl] func2 -> DEBU 16ba 0xc001047190 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:35.084 UTC [cauthdsl] func2 -> DEBU 16bb 0xc001047190 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:35.084 UTC [cauthdsl] func2 -> DEBU 16bc 0xc001047190 principal matched by identity 0" +"2020-05-20 18:21:35.084 UTC [msp.identity] Verify -> DEBU 16bd Verify: digest = 00000000 6a 45 7e 9a ac 81 56 b4 7f 32 0a 2a d2 73 0f 48 |jE~...V..2.*.s.H| +00000010 8e ea e1 6c a9 56 d5 14 f0 0f 04 79 37 9f 6c 6f |...l.V.....y7.lo|" +"2020-05-20 18:21:35.084 UTC [msp.identity] Verify -> DEBU 16be Verify: sig = 00000000 30 44 02 20 3b 10 8c a8 75 55 dc 28 44 5e 4e 7a |0D. ;...uU.(D^Nz| +00000010 81 71 8b 9f 96 f2 84 f3 da c7 b7 44 cc 17 cd cf |.q.........D....| +00000020 48 46 84 78 02 20 7b 55 6e a3 05 b2 d1 35 01 03 |HF.x. {Un....5..| +00000030 f8 67 38 7a 9a 16 6d 17 24 b4 b1 64 b6 91 c1 41 |.g8z..m.$..d...A| +00000040 93 9a a6 f8 91 c2 |......|" +"2020-05-20 18:21:35.085 UTC [cauthdsl] func2 -> DEBU 16bf 0xc001047190 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:35.085 UTC [cauthdsl] func1 -> DEBU 16c0 0xc001047190 gate 1589998895084245800 evaluation succeeds" +"2020-05-20 18:21:35.085 UTC [policies] Evaluate -> DEBU 16c1 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:35.085 UTC [policies] Evaluate -> DEBU 16c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:35.085 UTC [policies] Evaluate -> DEBU 16c3 Signature set satisfies policy /Channel/Application/Writers" +"2020-05-20 18:21:35.085 UTC [policies] Evaluate -> DEBU 16c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-05-20 18:21:35.086 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:21:35.086 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:21:35.086 UTC [common.configtx] addToMap -> DEBU 16c7 Adding to config map: [Group] /Channel" +"2020-05-20 18:21:35.086 UTC [common.configtx] addToMap -> DEBU 16c8 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:21:35.086 UTC [common.configtx] addToMap -> DEBU 16c9 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:21:35.086 UTC [common.configtx] addToMap -> DEBU 16ca Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16cb Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16cc Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16cd Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16ce Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16cf Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16d0 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:21:35.087 UTC [common.configtx] addToMap -> DEBU 16d1 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d2 Adding to config map: [Group] /Channel" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d3 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d4 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d5 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d6 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16d9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16da Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:35.088 UTC [common.configtx] addToMap -> DEBU 16db Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16dc Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16dd Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16de Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16df Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16e0 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16e1 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:21:35.089 UTC [common.configtx] addToMap -> DEBU 16e2 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:21:35.090 UTC [common.configtx] verifyDeltaSet -> DEBU 16e3 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2020-05-20 18:21:35.090 UTC [common.configtx] verifyDeltaSet -> DEBU 16e4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-05-20 18:21:35.090 UTC [common.configtx] verifyDeltaSet -> DEBU 16e5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:35.091 UTC [common.configtx] verifyDeltaSet -> DEBU 16e6 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2020-05-20 18:21:35.091 UTC [common.configtx] verifyDeltaSet -> DEBU 16e7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-05-20 18:21:35.091 UTC [common.configtx] verifyDeltaSet -> DEBU 16e8 Processing change to key: [Group] /Channel/Application" +"2020-05-20 18:21:35.091 UTC [common.configtx] policyForItem -> DEBU 16e9 Getting policy for item Application with mod_policy Admins" +"2020-05-20 18:21:35.091 UTC [policies] Manager -> DEBU 16ea Manager Channel looking up path []" +"2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16eb Manager Channel has managers Application" +"2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16ec Manager Channel has managers Orderer" +"2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16ed Manager Channel looking up path [Application]" +"2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16ee Manager Channel has managers Application" +"2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16ef Manager Channel has managers Orderer" +"2020-05-20 18:21:35.092 UTC [policies] Manager -> DEBU 16f0 Manager Channel/Application looking up path []" +"2020-05-20 18:21:35.093 UTC [policies] Manager -> DEBU 16f1 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:21:35.093 UTC [policies] Manager -> DEBU 16f2 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:21:35.093 UTC [policies] Evaluate -> DEBU 16f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2020-05-20 18:21:35.093 UTC [policies] Evaluate -> DEBU 16f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:35.093 UTC [policies] Evaluate -> DEBU 16f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-05-20 18:21:35.093 UTC [cauthdsl] deduplicate -> WARN 16f6 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-05-20 18:21:35.094 UTC [cauthdsl] func1 -> DEBU 16f7 0xc000e50960 gate 1589998895094073300 evaluation starts" +"2020-05-20 18:21:35.094 UTC [cauthdsl] func2 -> DEBU 16f8 0xc000e50960 signed by 0 principal evaluation starts (used [false false false])" +"2020-05-20 18:21:35.094 UTC [cauthdsl] func2 -> DEBU 16f9 0xc000e50960 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:35.094 UTC [cauthdsl] func2 -> DEBU 16fa 0xc000e50960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-05-20 18:21:35.094 UTC [cauthdsl] func2 -> DEBU 16fb 0xc000e50960 processing identity 1 with bytes of fe0d40" +"2020-05-20 18:21:35.094 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 16fc Checking if identity has been named explicitly as an admin for Org2MSP" +"2020-05-20 18:21:35.094 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 16fd Checking if identity carries the admin ou for Org2MSP" +"2020-05-20 18:21:35.094 UTC [msp] Validate -> DEBU 16fe MSP Org2MSP validating identity" +"2020-05-20 18:21:35.095 UTC [msp] getCertificationChain -> DEBU 16ff MSP Org2MSP getting certification chain" +"2020-05-20 18:21:35.095 UTC [msp] hasOURole -> DEBU 1700 MSP Org2MSP checking if the identity is a client" +"2020-05-20 18:21:35.096 UTC [msp] getCertificationChain -> DEBU 1701 MSP Org2MSP getting certification chain" +"2020-05-20 18:21:35.096 UTC [cauthdsl] func2 -> DEBU 1702 0xc000e50960 principal matched by identity 1" +"2020-05-20 18:21:35.096 UTC [msp.identity] Verify -> DEBU 1703 Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..|" +"2020-05-20 18:21:35.096 UTC [msp.identity] Verify -> DEBU 1704 Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +00000040 72 24 fc be df 99 95 |r$.....|" +"2020-05-20 18:21:35.097 UTC [cauthdsl] func2 -> DEBU 1705 0xc000e50960 principal evaluation succeeds for identity 1" +"2020-05-20 18:21:35.097 UTC [cauthdsl] func1 -> DEBU 1706 0xc000e50960 gate 1589998895094073300 evaluation succeeds" +"2020-05-20 18:21:35.097 UTC [policies] Evaluate -> DEBU 1707 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:21:35.097 UTC [policies] Evaluate -> DEBU 1708 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:21:35.097 UTC [policies] Evaluate -> DEBU 1709 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-05-20 18:21:35.097 UTC [cauthdsl] deduplicate -> WARN 170a De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-05-20 18:21:35.097 UTC [cauthdsl] func1 -> DEBU 170b 0xc000e51290 gate 1589998895097415600 evaluation starts" +"2020-05-20 18:21:35.097 UTC [cauthdsl] func2 -> DEBU 170c 0xc000e51290 signed by 0 principal evaluation starts (used [false false false])" +"2020-05-20 18:21:35.098 UTC [cauthdsl] func2 -> DEBU 170d 0xc000e51290 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:35.098 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 170e Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-05-20 18:21:35.098 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 170f Checking if identity carries the admin ou for Org1MSP" +"2020-05-20 18:21:35.098 UTC [msp] Validate -> DEBU 1710 MSP Org1MSP validating identity" +"2020-05-20 18:21:35.099 UTC [msp] getCertificationChain -> DEBU 1711 MSP Org1MSP getting certification chain" +"2020-05-20 18:21:35.099 UTC [msp] hasOURole -> DEBU 1712 MSP Org1MSP checking if the identity is a client" +"2020-05-20 18:21:35.099 UTC [msp] getCertificationChain -> DEBU 1713 MSP Org1MSP getting certification chain" +"2020-05-20 18:21:35.100 UTC [cauthdsl] func2 -> DEBU 1714 0xc000e51290 principal matched by identity 0" +"2020-05-20 18:21:35.100 UTC [msp.identity] Verify -> DEBU 1715 Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.|" +"2020-05-20 18:21:35.100 UTC [msp.identity] Verify -> DEBU 1716 Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +00000040 61 03 26 ae cc 43 |a.&..C|" +"2020-05-20 18:21:35.100 UTC [cauthdsl] func2 -> DEBU 1717 0xc000e51290 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:35.101 UTC [cauthdsl] func1 -> DEBU 1718 0xc000e51290 gate 1589998895097415600 evaluation succeeds" +"2020-05-20 18:21:35.101 UTC [policies] Evaluate -> DEBU 1719 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:21:35.101 UTC [policies] Evaluate -> DEBU 171a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:21:35.101 UTC [policies] Evaluate -> DEBU 171b Signature set satisfies policy /Channel/Application/Admins" +"2020-05-20 18:21:35.101 UTC [policies] Evaluate -> DEBU 171c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2020-05-20 18:21:35.101 UTC [common.configtx] verifyDeltaSet -> DEBU 171d Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 171e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 171f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 1720 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 1721 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.102 UTC [common.configtx] recurseConfigMap -> DEBU 1722 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1723 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1724 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1725 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1726 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.103 UTC [common.configtx] recurseConfigMap -> DEBU 1727 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 1728 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 1729 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 172a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 172b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.104 UTC [common.configtx] recurseConfigMap -> DEBU 172c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 172d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 172e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 172f Setting policy for key Endorsement to " +"2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 1730 Setting policy for key LifecycleEndorsement to " +"2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 1731 Setting policy for key Readers to " +"2020-05-20 18:21:35.105 UTC [common.configtx] recurseConfigMap -> DEBU 1732 Setting policy for key Writers to " +"2020-05-20 18:21:35.106 UTC [common.configtx] recurseConfigMap -> DEBU 1733 Setting policy for key Admins to " +"2020-05-20 18:21:35.106 UTC [common.configtx] recurseConfigMap -> DEBU 1734 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.106 UTC [common.configtx] recurseConfigMap -> DEBU 1735 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.106 UTC [common.configtx] recurseConfigMap -> DEBU 1736 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.106 UTC [common.channelconfig] NewStandardValues -> DEBU 1737 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:21:35.106 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1738 Processing field: HashingAlgorithm" +"2020-05-20 18:21:35.106 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1739 Processing field: BlockDataHashingStructure" +"2020-05-20 18:21:35.106 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173a Processing field: OrdererAddresses" +"2020-05-20 18:21:35.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173b Processing field: Consortium" +"2020-05-20 18:21:35.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173c Processing field: Capabilities" +"2020-05-20 18:21:35.108 UTC [common.channelconfig] NewStandardValues -> DEBU 173d Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:21:35.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173e Processing field: ACLs" +"2020-05-20 18:21:35.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173f Processing field: Capabilities" +"2020-05-20 18:21:35.108 UTC [common.channelconfig] NewStandardValues -> DEBU 1740 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1741 Processing field: AnchorPeers" +"2020-05-20 18:21:35.109 UTC [common.channelconfig] NewStandardValues -> DEBU 1742 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1743 Processing field: MSP" +"2020-05-20 18:21:35.109 UTC [common.channelconfig] Validate -> DEBU 1744 Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:21:35.110 UTC [common.channelconfig] validateMSP -> DEBU 1745 Setting up MSP for org Org1MSP" +"2020-05-20 18:21:35.110 UTC [msp] newBccspMsp -> DEBU 1746 Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.110 UTC [msp] New -> DEBU 1747 Creating Cache-MSP instance" +"2020-05-20 18:21:35.110 UTC [msp] Setup -> DEBU 1748 Setting up MSP instance Org1MSP" +"2020-05-20 18:21:35.111 UTC [msp.identity] newIdentity -> DEBU 1749 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.113 UTC [common.channelconfig] NewStandardValues -> DEBU 174a Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.113 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174b Processing field: AnchorPeers" +"2020-05-20 18:21:35.113 UTC [common.channelconfig] NewStandardValues -> DEBU 174c Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174d Processing field: MSP" +"2020-05-20 18:21:35.114 UTC [common.channelconfig] Validate -> DEBU 174e Anchor peers for org Org2MSP are anchor_peers: " +"2020-05-20 18:21:35.114 UTC [common.channelconfig] validateMSP -> DEBU 174f Setting up MSP for org Org2MSP" +"2020-05-20 18:21:35.114 UTC [msp] newBccspMsp -> DEBU 1750 Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.115 UTC [msp] New -> DEBU 1751 Creating Cache-MSP instance" +"2020-05-20 18:21:35.115 UTC [msp] Setup -> DEBU 1752 Setting up MSP instance Org2MSP" +"2020-05-20 18:21:35.115 UTC [msp.identity] newIdentity -> DEBU 1753 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.116 UTC [common.channelconfig] NewStandardValues -> DEBU 1754 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1755 Processing field: AnchorPeers" +"2020-05-20 18:21:35.116 UTC [common.channelconfig] NewStandardValues -> DEBU 1756 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1757 Processing field: MSP" +"2020-05-20 18:21:35.116 UTC [common.channelconfig] Validate -> DEBU 1758 Anchor peers for org Org3MSP are " +"2020-05-20 18:21:35.117 UTC [common.channelconfig] validateMSP -> DEBU 1759 Setting up MSP for org Org3MSP" +"2020-05-20 18:21:35.117 UTC [msp] newBccspMsp -> DEBU 175a Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.117 UTC [msp] New -> DEBU 175b Creating Cache-MSP instance" +"2020-05-20 18:21:35.117 UTC [msp] Setup -> DEBU 175c Setting up MSP instance Org3MSP" +"2020-05-20 18:21:35.118 UTC [msp.identity] newIdentity -> DEBU 175d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] NewStandardValues -> DEBU 175e Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175f Processing field: ConsensusType" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1760 Processing field: BatchSize" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1761 Processing field: BatchTimeout" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1762 Processing field: KafkaBrokers" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1763 Processing field: ChannelRestrictions" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1764 Processing field: Capabilities" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] NewStandardValues -> DEBU 1765 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1766 Processing field: Endpoints" +"2020-05-20 18:21:35.119 UTC [common.channelconfig] NewStandardValues -> DEBU 1767 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1768 Processing field: MSP" +"2020-05-20 18:21:35.120 UTC [common.channelconfig] validateMSP -> DEBU 1769 Setting up MSP for org OrdererOrg" +"2020-05-20 18:21:35.120 UTC [msp] newBccspMsp -> DEBU 176a Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.120 UTC [msp] New -> DEBU 176b Creating Cache-MSP instance" +"2020-05-20 18:21:35.120 UTC [msp] Setup -> DEBU 176c Setting up MSP instance OrdererMSP" +"2020-05-20 18:21:35.121 UTC [msp.identity] newIdentity -> DEBU 176d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.122 UTC [msp] Setup -> DEBU 176e Setting up the MSP manager (4 msps)" +"2020-05-20 18:21:35.122 UTC [msp] Setup -> DEBU 176f MSP manager setup complete, setup 4 msps" +"2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1770 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1771 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1772 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1773 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1774 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.122 UTC [policies] NewManagerImpl -> DEBU 1775 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 1776 Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 1777 Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 1778 Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 1779 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.123 UTC [policies] NewManagerImpl -> DEBU 177a Proposed new policy Admins for Channel/Application" +"2020-05-20 18:21:35.123 UTC [policies] GetPolicy -> DEBU 177b Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:21:35.123 UTC [policies] GetPolicy -> DEBU 177c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 177d Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:21:35.124 UTC [policies] GetPolicy -> DEBU 177e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:21:35.124 UTC [policies] GetPolicy -> DEBU 177f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1780 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1781 Proposed new policy Readers for Channel/Application" +"2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1782 Proposed new policy Writers for Channel/Application" +"2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1783 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.124 UTC [policies] NewManagerImpl -> DEBU 1784 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1785 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1786 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1787 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1788 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 1789 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 178a Proposed new policy Writers for Channel" +"2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 178b Proposed new policy Admins for Channel" +"2020-05-20 18:21:35.125 UTC [policies] NewManagerImpl -> DEBU 178c Proposed new policy Readers for Channel" +"2020-05-20 18:21:35.125 UTC [common.configtx] addToMap -> DEBU 178d Adding to config map: [Group] /Channel" +"2020-05-20 18:21:35.125 UTC [common.configtx] addToMap -> DEBU 178e Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 178f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1790 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1791 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1792 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1793 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1794 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:35.126 UTC [common.configtx] addToMap -> DEBU 1795 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 1796 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 1797 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 1798 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 1799 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 179a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:35.127 UTC [common.configtx] addToMap -> DEBU 179b Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 179c Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 179d Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 179e Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 179f Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:35.128 UTC [common.configtx] addToMap -> DEBU 17a0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a1 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a2 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a3 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a4 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a6 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a7 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a8 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17a9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17aa Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:21:35.129 UTC [common.configtx] addToMap -> DEBU 17ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17ae Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17af Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17b0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17b1 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:21:35.130 UTC [common.configtx] addToMap -> DEBU 17b2 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b4 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b5 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b6 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b7 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b8 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17b9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:21:35.131 UTC [common.configtx] addToMap -> DEBU 17ba Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:21:35.132 UTC [common.configtx] addToMap -> DEBU 17bb Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:21:35.132 UTC [common.configtx] addToMap -> DEBU 17bc Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:21:35.132 UTC [common.configtx] addToMap -> DEBU 17bd Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:21:35.132 UTC [common.configtx] addToMap -> DEBU 17be Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:21:35.132 UTC [common.channelconfig] LogSanityChecks -> DEBU 17bf As expected, current configuration has policy '/Channel/Readers'" +"2020-05-20 18:21:35.133 UTC [common.channelconfig] LogSanityChecks -> DEBU 17c0 As expected, current configuration has policy '/Channel/Writers'" +"2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c1 Manager Channel looking up path [Application]" +"2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c2 Manager Channel has managers Application" +"2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c3 Manager Channel has managers Orderer" +"2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c4 Manager Channel/Application looking up path []" +"2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c5 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:21:35.133 UTC [policies] Manager -> DEBU 17c6 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17c7 Manager Channel/Application has managers Org3MSP" +"2020-05-20 18:21:35.134 UTC [common.channelconfig] LogSanityChecks -> DEBU 17c8 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-05-20 18:21:35.134 UTC [common.channelconfig] LogSanityChecks -> DEBU 17c9 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-05-20 18:21:35.134 UTC [common.channelconfig] LogSanityChecks -> DEBU 17ca As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17cb Manager Channel looking up path [Orderer]" +"2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17cc Manager Channel has managers Application" +"2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17cd Manager Channel has managers Orderer" +"2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17ce Manager Channel/Orderer looking up path []" +"2020-05-20 18:21:35.134 UTC [policies] Manager -> DEBU 17cf Manager Channel/Orderer has managers OrdererOrg" +"2020-05-20 18:21:35.135 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d0 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-05-20 18:21:35.135 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d1 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-05-20 18:21:35.135 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d2 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-05-20 18:21:35.135 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d3 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-05-20 18:21:35.135 UTC [common.capabilities] Supported -> DEBU 17d4 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:21:35.135 UTC [common.capabilities] Supported -> DEBU 17d5 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:21:35.135 UTC [msp] GetDefaultSigningIdentity -> DEBU 17d6 Obtaining default signing identity" +"2020-05-20 18:21:35.136 UTC [msp] GetDefaultSigningIdentity -> DEBU 17d7 Obtaining default signing identity" +"2020-05-20 18:21:35.136 UTC [msp.identity] Sign -> DEBU 17d8 Sign: plaintext: 0AEA060A1B08011A0608AFEA95F60522...6D1724B4B164B691C141939AA6F891C2 " +"2020-05-20 18:21:35.136 UTC [msp.identity] Sign -> DEBU 17d9 Sign: digest: E149494F234C66AB43406901B928342C712DCFEB1106D8CC15143260E9815821 " +"2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:35.137 UTC [policies] Evaluate -> DEBU 17de == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-05-20 18:21:35.137 UTC [msp] DeserializeIdentity -> DEBU 17df Obtaining identity" +"2020-05-20 18:21:35.138 UTC [msp.identity] newIdentity -> DEBU 17e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.139 UTC [cauthdsl] func1 -> DEBU 17e1 0xc0011ff410 gate 1589998895139178300 evaluation starts" +"2020-05-20 18:21:35.139 UTC [cauthdsl] func2 -> DEBU 17e2 0xc0011ff410 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:35.139 UTC [cauthdsl] func2 -> DEBU 17e3 0xc0011ff410 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:35.139 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17e4 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-05-20 18:21:35.139 UTC [msp] Validate -> DEBU 17e5 MSP OrdererMSP validating identity" +"2020-05-20 18:21:35.139 UTC [msp] getCertificationChain -> DEBU 17e6 MSP OrdererMSP getting certification chain" +"2020-05-20 18:21:35.140 UTC [cauthdsl] func2 -> DEBU 17e7 0xc0011ff410 principal matched by identity 0" +"2020-05-20 18:21:35.140 UTC [msp.identity] Verify -> DEBU 17e8 Verify: digest = 00000000 e1 49 49 4f 23 4c 66 ab 43 40 69 01 b9 28 34 2c |.IIO#Lf.C@i..(4,| +00000010 71 2d cf eb 11 06 d8 cc 15 14 32 60 e9 81 58 21 |q-........2`..X!|" +"2020-05-20 18:21:35.140 UTC [msp.identity] Verify -> DEBU 17e9 Verify: sig = 00000000 30 44 02 20 1c 51 e2 c7 48 26 65 f8 8c 6e 5a 85 |0D. .Q..H&e..nZ.| +00000010 8a 41 ca a0 4b 9c 5c 82 d8 9b c8 b3 00 54 02 d4 |.A..K.\......T..| +00000020 81 5b 50 d2 02 20 01 14 a5 f1 ad ed ae d1 ee fd |.[P.. ..........| +00000030 6f ef 05 30 85 7c 16 66 26 77 a5 98 56 0f 7e 61 |o..0.|.f&w..V.~a| +00000040 43 ae 34 84 59 de |C.4.Y.|" +"2020-05-20 18:21:35.141 UTC [cauthdsl] func2 -> DEBU 17ea 0xc0011ff410 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:35.141 UTC [cauthdsl] func1 -> DEBU 17eb 0xc0011ff410 gate 1589998895139178300 evaluation succeeds" +"2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17ec Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17ed == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17ee Signature set satisfies policy /Channel/Orderer/Writers" +"2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17f0 Signature set satisfies policy /Channel/Writers" +"2020-05-20 18:21:35.141 UTC [policies] Evaluate -> DEBU 17f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-05-20 18:21:35.148 UTC [orderer.common.msgprocessor] Apply -> DEBU 17f2 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-05-20 18:21:35.148 UTC [common.channelconfig] NewStandardValues -> DEBU 17f3 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:21:35.148 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f4 Processing field: HashingAlgorithm" +"2020-05-20 18:21:35.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f5 Processing field: BlockDataHashingStructure" +"2020-05-20 18:21:35.149 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f6 Processing field: OrdererAddresses" +"2020-05-20 18:21:35.150 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f7 Processing field: Consortium" +"2020-05-20 18:21:35.150 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f8 Processing field: Capabilities" +"2020-05-20 18:21:35.150 UTC [common.channelconfig] NewStandardValues -> DEBU 17f9 Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:21:35.150 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17fa Processing field: ACLs" +"2020-05-20 18:21:35.150 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17fb Processing field: Capabilities" +"2020-05-20 18:21:35.151 UTC [common.channelconfig] NewStandardValues -> DEBU 17fc Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17fd Processing field: AnchorPeers" +"2020-05-20 18:21:35.151 UTC [common.channelconfig] NewStandardValues -> DEBU 17fe Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17ff Processing field: MSP" +"2020-05-20 18:21:35.151 UTC [common.channelconfig] Validate -> DEBU 1800 Anchor peers for org Org3MSP are " +"2020-05-20 18:21:35.151 UTC [common.channelconfig] validateMSP -> DEBU 1801 Setting up MSP for org Org3MSP" +"2020-05-20 18:21:35.151 UTC [msp] newBccspMsp -> DEBU 1802 Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.151 UTC [msp] New -> DEBU 1803 Creating Cache-MSP instance" +"2020-05-20 18:21:35.152 UTC [msp] Setup -> DEBU 1804 Setting up MSP instance Org3MSP" +"2020-05-20 18:21:35.152 UTC [msp.identity] newIdentity -> DEBU 1805 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.153 UTC [common.channelconfig] NewStandardValues -> DEBU 1806 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.153 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1807 Processing field: AnchorPeers" +"2020-05-20 18:21:35.153 UTC [common.channelconfig] NewStandardValues -> DEBU 1808 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.153 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1809 Processing field: MSP" +"2020-05-20 18:21:35.153 UTC [common.channelconfig] Validate -> DEBU 180a Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:21:35.153 UTC [common.channelconfig] validateMSP -> DEBU 180b Setting up MSP for org Org1MSP" +"2020-05-20 18:21:35.154 UTC [msp] newBccspMsp -> DEBU 180c Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.154 UTC [msp] New -> DEBU 180d Creating Cache-MSP instance" +"2020-05-20 18:21:35.154 UTC [msp] Setup -> DEBU 180e Setting up MSP instance Org1MSP" +"2020-05-20 18:21:35.155 UTC [msp.identity] newIdentity -> DEBU 180f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.156 UTC [common.channelconfig] NewStandardValues -> DEBU 1810 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1811 Processing field: AnchorPeers" +"2020-05-20 18:21:35.156 UTC [common.channelconfig] NewStandardValues -> DEBU 1812 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1813 Processing field: MSP" +"2020-05-20 18:21:35.156 UTC [common.channelconfig] Validate -> DEBU 1814 Anchor peers for org Org2MSP are anchor_peers: " +"2020-05-20 18:21:35.156 UTC [common.channelconfig] validateMSP -> DEBU 1815 Setting up MSP for org Org2MSP" +"2020-05-20 18:21:35.156 UTC [msp] newBccspMsp -> DEBU 1816 Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.156 UTC [msp] New -> DEBU 1817 Creating Cache-MSP instance" +"2020-05-20 18:21:35.157 UTC [msp] Setup -> DEBU 1818 Setting up MSP instance Org2MSP" +"2020-05-20 18:21:35.157 UTC [msp.identity] newIdentity -> DEBU 1819 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.158 UTC [common.channelconfig] NewStandardValues -> DEBU 181a Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181b Processing field: ConsensusType" +"2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181c Processing field: BatchSize" +"2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181d Processing field: BatchTimeout" +"2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181e Processing field: KafkaBrokers" +"2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 181f Processing field: ChannelRestrictions" +"2020-05-20 18:21:35.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1820 Processing field: Capabilities" +"2020-05-20 18:21:35.159 UTC [common.channelconfig] NewStandardValues -> DEBU 1821 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:21:35.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1822 Processing field: Endpoints" +"2020-05-20 18:21:35.159 UTC [common.channelconfig] NewStandardValues -> DEBU 1823 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1824 Processing field: MSP" +"2020-05-20 18:21:35.159 UTC [common.channelconfig] validateMSP -> DEBU 1825 Setting up MSP for org OrdererOrg" +"2020-05-20 18:21:35.160 UTC [msp] newBccspMsp -> DEBU 1826 Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.160 UTC [msp] New -> DEBU 1827 Creating Cache-MSP instance" +"2020-05-20 18:21:35.160 UTC [msp] Setup -> DEBU 1828 Setting up MSP instance OrdererMSP" +"2020-05-20 18:21:35.160 UTC [msp.identity] newIdentity -> DEBU 1829 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.161 UTC [msp] Setup -> DEBU 182a Setting up the MSP manager (4 msps)" +"2020-05-20 18:21:35.161 UTC [msp] Setup -> DEBU 182b MSP manager setup complete, setup 4 msps" +"2020-05-20 18:21:35.161 UTC [policies] NewManagerImpl -> DEBU 182c Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 182d Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 182e Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 182f Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 1830 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 1831 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 1832 Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.162 UTC [policies] NewManagerImpl -> DEBU 1833 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.163 UTC [policies] NewManagerImpl -> DEBU 1834 Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.163 UTC [policies] NewManagerImpl -> DEBU 1835 Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.163 UTC [policies] NewManagerImpl -> DEBU 1836 Proposed new policy Admins for Channel/Application" +"2020-05-20 18:21:35.163 UTC [policies] GetPolicy -> DEBU 1837 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:21:35.163 UTC [policies] GetPolicy -> DEBU 1838 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:21:35.163 UTC [policies] NewManagerImpl -> DEBU 1839 Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:21:35.163 UTC [policies] GetPolicy -> DEBU 183a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:21:35.164 UTC [policies] GetPolicy -> DEBU 183b Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 183c Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 183d Proposed new policy Readers for Channel/Application" +"2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 183e Proposed new policy Writers for Channel/Application" +"2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 183f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 1840 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.164 UTC [policies] NewManagerImpl -> DEBU 1841 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1842 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1843 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1844 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1845 Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1846 Proposed new policy Readers for Channel" +"2020-05-20 18:21:35.165 UTC [policies] NewManagerImpl -> DEBU 1847 Proposed new policy Writers for Channel" +"2020-05-20 18:21:35.166 UTC [policies] NewManagerImpl -> DEBU 1848 Proposed new policy Admins for Channel" +"2020-05-20 18:21:35.166 UTC [common.configtx] addToMap -> DEBU 1849 Adding to config map: [Group] /Channel" +"2020-05-20 18:21:35.166 UTC [common.configtx] addToMap -> DEBU 184a Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:21:35.166 UTC [common.configtx] addToMap -> DEBU 184b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:21:35.166 UTC [common.configtx] addToMap -> DEBU 184c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:21:35.167 UTC [common.configtx] addToMap -> DEBU 184d Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:21:35.167 UTC [common.configtx] addToMap -> DEBU 184e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 184f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 1850 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 1851 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 1852 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:21:35.168 UTC [common.configtx] addToMap -> DEBU 1853 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1854 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1855 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1856 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1857 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1858 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 1859 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 185a Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-05-20 18:21:35.169 UTC [common.configtx] addToMap -> DEBU 185b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 185c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 185d Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 185e Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 185f Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 1860 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:21:35.170 UTC [common.configtx] addToMap -> DEBU 1861 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:21:35.171 UTC [common.configtx] addToMap -> DEBU 1862 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:21:35.171 UTC [common.configtx] addToMap -> DEBU 1863 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:21:35.171 UTC [common.configtx] addToMap -> DEBU 1864 Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:21:35.171 UTC [common.configtx] addToMap -> DEBU 1865 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 1866 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 1867 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 1868 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 1869 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 186a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:21:35.172 UTC [common.configtx] addToMap -> DEBU 186b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 186c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 186d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 186e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 186f Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 1870 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 1871 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 1872 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:21:35.173 UTC [common.configtx] addToMap -> DEBU 1873 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1874 Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1875 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1876 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1877 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1878 Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 1879 Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:21:35.174 UTC [common.configtx] addToMap -> DEBU 187a Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:21:35.176 UTC [orderer.consensus.etcdraft] propose -> INFO 187b Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-05-20 18:21:35.176 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 187c [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:53638" +"2020-05-20 18:21:35.176 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 187d Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-05-20 18:21:35.176 UTC [orderer.consensus.etcdraft] 2 -> DEBU 187e Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2020-05-20 18:21:35.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 187f Sending msg of 40277 bytes to 2 on channel businesschannel took 17.8µs" +"2020-05-20 18:21:35.181 UTC [common.deliver] Handle -> WARN 1880 Error reading from 172.18.0.9:53636: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:35.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1881 Sending msg of 40277 bytes to 3 on channel businesschannel took 12µs" +"2020-05-20 18:21:35.181 UTC [orderer.common.server] func1 -> DEBU 1882 Closing Deliver stream" +"2020-05-20 18:21:35.181 UTC [comm.grpc.server] 1 -> INFO 1883 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53636 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=121.7424ms +"2020-05-20 18:21:35.181 UTC [grpc] infof -> DEBU 1884 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:35.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1885 Send of ConsensusRequest for channel businesschannel with payload of size 40277 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2020-05-20 18:21:35.181 UTC [orderer.common.broadcast] Handle -> WARN 1886 Error reading from 172.18.0.9:53638: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:35.181 UTC [orderer.common.server] func1 -> DEBU 1887 Closing Broadcast stream" +"2020-05-20 18:21:35.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1889 Send of ConsensusRequest for channel businesschannel with payload of size 40277 to orderer1.example.com(orderer1.example.com:7050) took 51.4µs " +"2020-05-20 18:21:35.181 UTC [comm.grpc.server] 1 -> INFO 1888 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:53638 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.5079ms +"2020-05-20 18:21:35.181 UTC [grpc] infof -> DEBU 188a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:35.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 188b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:35.186 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188c Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +"2020-05-20 18:21:35.186 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188d Sending msg of 28 bytes to 3 on channel businesschannel took 30.3µs" +"2020-05-20 18:21:35.186 UTC [orderer.common.cluster.step] sendMessage -> DEBU 188e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163µs " +"2020-05-20 18:21:35.186 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 188f Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2020-05-20 18:21:35.188 UTC [common.configtx] addToMap -> DEBU 1890 Adding to config map: [Group] /Channel" +"2020-05-20 18:21:35.189 UTC [common.configtx] addToMap -> DEBU 1891 Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:21:35.189 UTC [common.configtx] addToMap -> DEBU 1892 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:21:35.190 UTC [common.configtx] addToMap -> DEBU 1893 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:21:35.190 UTC [common.configtx] addToMap -> DEBU 1894 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:21:35.191 UTC [common.configtx] addToMap -> DEBU 1895 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:21:35.191 UTC [common.configtx] addToMap -> DEBU 1896 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:21:35.192 UTC [common.configtx] addToMap -> DEBU 1897 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:21:35.192 UTC [common.configtx] addToMap -> DEBU 1898 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:21:35.192 UTC [common.configtx] addToMap -> DEBU 1899 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:21:35.193 UTC [common.configtx] addToMap -> DEBU 189a Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:21:35.193 UTC [common.configtx] addToMap -> DEBU 189b Adding to config map: [Group] /Channel" +"2020-05-20 18:21:35.193 UTC [common.configtx] addToMap -> DEBU 189c Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 189e Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 189f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 18a1 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 18a2 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 18a3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-05-20 18:21:35.194 UTC [common.configtx] addToMap -> DEBU 18a4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-05-20 18:21:35.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 189d Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:35.195 UTC [common.configtx] addToMap -> DEBU 18a5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:35.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104µs " +"2020-05-20 18:21:35.195 UTC [common.configtx] addToMap -> DEBU 18a6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-05-20 18:21:35.196 UTC [common.configtx] addToMap -> DEBU 18a7 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:21:35.196 UTC [common.configtx] addToMap -> DEBU 18a8 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18aa Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18ab Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18ac Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18ad Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:21:35.205 UTC [common.configtx] addToMap -> DEBU 18ae Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:21:35.206 UTC [common.configtx] verifyDeltaSet -> DEBU 18af Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-05-20 18:21:35.206 UTC [common.configtx] verifyDeltaSet -> DEBU 18b0 Processing change to key: [Group] /Channel/Application" +"2020-05-20 18:21:35.206 UTC [common.configtx] policyForItem -> DEBU 18b1 Getting policy for item Application with mod_policy Admins" +"2020-05-20 18:21:35.206 UTC [policies] Manager -> DEBU 18b2 Manager Channel looking up path []" +"2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b3 Manager Channel has managers Application" +"2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b4 Manager Channel has managers Orderer" +"2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b5 Manager Channel looking up path [Application]" +"2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b6 Manager Channel has managers Application" +"2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b7 Manager Channel has managers Orderer" +"2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b8 Manager Channel/Application looking up path []" +"2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18b9 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:21:35.207 UTC [policies] Manager -> DEBU 18ba Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:21:35.207 UTC [policies] Evaluate -> DEBU 18bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2020-05-20 18:21:35.207 UTC [policies] Evaluate -> DEBU 18bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:35.208 UTC [policies] Evaluate -> DEBU 18bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-05-20 18:21:35.208 UTC [cauthdsl] deduplicate -> WARN 18be De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-05-20 18:21:35.208 UTC [cauthdsl] func1 -> DEBU 18bf 0xc0009ce720 gate 1589998895208392600 evaluation starts" +"2020-05-20 18:21:35.208 UTC [cauthdsl] func2 -> DEBU 18c0 0xc0009ce720 signed by 0 principal evaluation starts (used [false false false])" +"2020-05-20 18:21:35.208 UTC [cauthdsl] func2 -> DEBU 18c1 0xc0009ce720 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:35.208 UTC [cauthdsl] func2 -> DEBU 18c2 0xc0009ce720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18c3 0xc0009ce720 processing identity 1 with bytes of fe0d40" +"2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18c4 0xc0009ce720 principal matched by identity 1" +"2020-05-20 18:21:35.209 UTC [msp.identity] Verify -> DEBU 18c5 Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..|" +"2020-05-20 18:21:35.209 UTC [msp.identity] Verify -> DEBU 18c6 Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +00000040 72 24 fc be df 99 95 |r$.....|" +"2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18c7 0xc0009ce720 principal evaluation succeeds for identity 1" +"2020-05-20 18:21:35.209 UTC [cauthdsl] func1 -> DEBU 18c8 0xc0009ce720 gate 1589998895208392600 evaluation succeeds" +"2020-05-20 18:21:35.209 UTC [policies] Evaluate -> DEBU 18c9 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:21:35.209 UTC [policies] Evaluate -> DEBU 18ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:21:35.209 UTC [policies] Evaluate -> DEBU 18cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-05-20 18:21:35.209 UTC [cauthdsl] deduplicate -> WARN 18cc De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-05-20 18:21:35.209 UTC [cauthdsl] func1 -> DEBU 18cd 0xc0009cf0e0 gate 1589998895209773700 evaluation starts" +"2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18ce 0xc0009cf0e0 signed by 0 principal evaluation starts (used [false false false])" +"2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18cf 0xc0009cf0e0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:35.209 UTC [cauthdsl] func2 -> DEBU 18d0 0xc0009cf0e0 principal matched by identity 0" +"2020-05-20 18:21:35.209 UTC [msp.identity] Verify -> DEBU 18d1 Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.|" +"2020-05-20 18:21:35.210 UTC [msp.identity] Verify -> DEBU 18d2 Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +00000040 61 03 26 ae cc 43 |a.&..C|" +"2020-05-20 18:21:35.197 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18a9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:35.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18d3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:35.214 UTC [cauthdsl] func2 -> DEBU 18d4 0xc0009cf0e0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:35.214 UTC [cauthdsl] func1 -> DEBU 18d5 0xc0009cf0e0 gate 1589998895209773700 evaluation succeeds" +"2020-05-20 18:21:35.214 UTC [policies] Evaluate -> DEBU 18d6 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:21:35.217 UTC [policies] Evaluate -> DEBU 18d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:21:35.217 UTC [policies] Evaluate -> DEBU 18d8 Signature set satisfies policy /Channel/Application/Admins" +"2020-05-20 18:21:35.218 UTC [policies] Evaluate -> DEBU 18d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2020-05-20 18:21:35.218 UTC [common.configtx] verifyDeltaSet -> DEBU 18da Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-05-20 18:21:35.231 UTC [common.configtx] verifyDeltaSet -> DEBU 18db Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:35.231 UTC [common.configtx] verifyDeltaSet -> DEBU 18dc Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-05-20 18:21:35.232 UTC [common.configtx] verifyDeltaSet -> DEBU 18dd Processing change to key: [Group] /Channel/Application/Org3MSP" +"2020-05-20 18:21:35.232 UTC [common.configtx] verifyDeltaSet -> DEBU 18de Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2020-05-20 18:21:35.233 UTC [common.configtx] recurseConfigMap -> DEBU 18df Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.233 UTC [common.configtx] recurseConfigMap -> DEBU 18e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.233 UTC [common.configtx] recurseConfigMap -> DEBU 18e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.234 UTC [common.configtx] recurseConfigMap -> DEBU 18e2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.234 UTC [common.configtx] recurseConfigMap -> DEBU 18e3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.235 UTC [common.configtx] recurseConfigMap -> DEBU 18e4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.236 UTC [common.configtx] recurseConfigMap -> DEBU 18e5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.237 UTC [common.configtx] recurseConfigMap -> DEBU 18e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.237 UTC [common.configtx] recurseConfigMap -> DEBU 18e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.238 UTC [common.configtx] recurseConfigMap -> DEBU 18e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.238 UTC [common.configtx] recurseConfigMap -> DEBU 18e9 Setting policy for key Admins to " +"2020-05-20 18:21:35.238 UTC [common.configtx] recurseConfigMap -> DEBU 18ea Setting policy for key Endorsement to " +"2020-05-20 18:21:35.239 UTC [common.configtx] recurseConfigMap -> DEBU 18eb Setting policy for key LifecycleEndorsement to " +"2020-05-20 18:21:35.239 UTC [common.configtx] recurseConfigMap -> DEBU 18ec Setting policy for key Readers to " +"2020-05-20 18:21:35.239 UTC [common.configtx] recurseConfigMap -> DEBU 18ed Setting policy for key Writers to " +"2020-05-20 18:21:35.240 UTC [common.configtx] recurseConfigMap -> DEBU 18ee Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.240 UTC [common.configtx] recurseConfigMap -> DEBU 18ef Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.241 UTC [common.configtx] recurseConfigMap -> DEBU 18f0 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.241 UTC [common.configtx] recurseConfigMap -> DEBU 18f1 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.242 UTC [common.configtx] recurseConfigMap -> DEBU 18f2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.243 UTC [common.configtx] recurseConfigMap -> DEBU 18f3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.243 UTC [common.configtx] recurseConfigMap -> DEBU 18f4 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.243 UTC [common.configtx] recurseConfigMap -> DEBU 18f5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.244 UTC [common.configtx] recurseConfigMap -> DEBU 18f6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.244 UTC [common.configtx] recurseConfigMap -> DEBU 18f7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-05-20 18:21:35.246 UTC [common.channelconfig] NewStandardValues -> DEBU 18f8 Initializing protos for *channelconfig.ChannelProtos" +"2020-05-20 18:21:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18f9 Processing field: HashingAlgorithm" +"2020-05-20 18:21:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18fa Processing field: BlockDataHashingStructure" +"2020-05-20 18:21:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18fb Processing field: OrdererAddresses" +"2020-05-20 18:21:35.246 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18fc Processing field: Consortium" +"2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18fd Processing field: Capabilities" +"2020-05-20 18:21:35.247 UTC [common.channelconfig] NewStandardValues -> DEBU 18fe Initializing protos for *channelconfig.OrdererProtos" +"2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18ff Processing field: ConsensusType" +"2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1900 Processing field: BatchSize" +"2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1901 Processing field: BatchTimeout" +"2020-05-20 18:21:35.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1902 Processing field: KafkaBrokers" +"2020-05-20 18:21:35.248 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1903 Processing field: ChannelRestrictions" +"2020-05-20 18:21:35.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1904 Processing field: Capabilities" +"2020-05-20 18:21:35.259 UTC [common.channelconfig] NewStandardValues -> DEBU 1905 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-05-20 18:21:35.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1906 Processing field: Endpoints" +"2020-05-20 18:21:35.260 UTC [common.channelconfig] NewStandardValues -> DEBU 1907 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1908 Processing field: MSP" +"2020-05-20 18:21:35.260 UTC [common.channelconfig] validateMSP -> DEBU 1909 Setting up MSP for org OrdererOrg" +"2020-05-20 18:21:35.262 UTC [msp] newBccspMsp -> DEBU 190a Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.262 UTC [msp] New -> DEBU 190b Creating Cache-MSP instance" +"2020-05-20 18:21:35.263 UTC [msp] Setup -> DEBU 190c Setting up MSP instance OrdererMSP" +"2020-05-20 18:21:35.266 UTC [msp.identity] newIdentity -> DEBU 190d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.269 UTC [common.channelconfig] NewStandardValues -> DEBU 190e Initializing protos for *channelconfig.ApplicationProtos" +"2020-05-20 18:21:35.271 UTC [common.channelconfig] initializeProtosStruct -> DEBU 190f Processing field: ACLs" +"2020-05-20 18:21:35.272 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1910 Processing field: Capabilities" +"2020-05-20 18:21:35.273 UTC [common.channelconfig] NewStandardValues -> DEBU 1911 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.273 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1912 Processing field: AnchorPeers" +"2020-05-20 18:21:35.273 UTC [common.channelconfig] NewStandardValues -> DEBU 1913 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.273 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1914 Processing field: MSP" +"2020-05-20 18:21:35.275 UTC [common.channelconfig] Validate -> DEBU 1915 Anchor peers for org Org1MSP are anchor_peers: " +"2020-05-20 18:21:35.275 UTC [common.channelconfig] validateMSP -> DEBU 1916 Setting up MSP for org Org1MSP" +"2020-05-20 18:21:35.276 UTC [msp] newBccspMsp -> DEBU 1917 Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.276 UTC [msp] New -> DEBU 1918 Creating Cache-MSP instance" +"2020-05-20 18:21:35.276 UTC [msp] Setup -> DEBU 1919 Setting up MSP instance Org1MSP" +"2020-05-20 18:21:35.277 UTC [msp.identity] newIdentity -> DEBU 191a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.279 UTC [common.channelconfig] NewStandardValues -> DEBU 191b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 191c Processing field: AnchorPeers" +"2020-05-20 18:21:35.282 UTC [common.channelconfig] NewStandardValues -> DEBU 191d Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 191e Processing field: MSP" +"2020-05-20 18:21:35.282 UTC [common.channelconfig] Validate -> DEBU 191f Anchor peers for org Org2MSP are anchor_peers: " +"2020-05-20 18:21:35.283 UTC [common.channelconfig] validateMSP -> DEBU 1920 Setting up MSP for org Org2MSP" +"2020-05-20 18:21:35.283 UTC [msp] newBccspMsp -> DEBU 1921 Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.284 UTC [msp] New -> DEBU 1922 Creating Cache-MSP instance" +"2020-05-20 18:21:35.284 UTC [msp] Setup -> DEBU 1923 Setting up MSP instance Org2MSP" +"2020-05-20 18:21:35.286 UTC [msp.identity] newIdentity -> DEBU 1924 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.286 UTC [common.channelconfig] NewStandardValues -> DEBU 1925 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-05-20 18:21:35.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1926 Processing field: AnchorPeers" +"2020-05-20 18:21:35.289 UTC [common.channelconfig] NewStandardValues -> DEBU 1927 Initializing protos for *channelconfig.OrganizationProtos" +"2020-05-20 18:21:35.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1928 Processing field: MSP" +"2020-05-20 18:21:35.289 UTC [common.channelconfig] Validate -> DEBU 1929 Anchor peers for org Org3MSP are " +"2020-05-20 18:21:35.289 UTC [common.channelconfig] validateMSP -> DEBU 192a Setting up MSP for org Org3MSP" +"2020-05-20 18:21:35.289 UTC [msp] newBccspMsp -> DEBU 192b Creating BCCSP-based MSP instance" +"2020-05-20 18:21:35.289 UTC [msp] New -> DEBU 192c Creating Cache-MSP instance" +"2020-05-20 18:21:35.289 UTC [msp] Setup -> DEBU 192d Setting up MSP instance Org3MSP" +"2020-05-20 18:21:35.291 UTC [msp.identity] newIdentity -> DEBU 192e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-05-20 18:21:35.291 UTC [msp] Setup -> DEBU 192f Setting up the MSP manager (4 msps)" +"2020-05-20 18:21:35.294 UTC [msp] Setup -> DEBU 1930 MSP manager setup complete, setup 4 msps" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1931 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1932 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1933 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1934 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1935 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1936 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1937 Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1938 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 1939 Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.294 UTC [policies] NewManagerImpl -> DEBU 193a Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 193b Proposed new policy Readers for Channel/Application" +"2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 193c Proposed new policy Writers for Channel/Application" +"2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 193d Proposed new policy Admins for Channel/Application" +"2020-05-20 18:21:35.295 UTC [policies] GetPolicy -> DEBU 193e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:21:35.295 UTC [policies] GetPolicy -> DEBU 193f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 1940 Proposed new policy Endorsement for Channel/Application" +"2020-05-20 18:21:35.295 UTC [policies] GetPolicy -> DEBU 1941 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-05-20 18:21:35.295 UTC [policies] GetPolicy -> DEBU 1942 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-05-20 18:21:35.295 UTC [policies] NewManagerImpl -> DEBU 1943 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-05-20 18:21:35.298 UTC [policies] NewManagerImpl -> DEBU 1944 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.298 UTC [policies] NewManagerImpl -> DEBU 1945 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.298 UTC [policies] NewManagerImpl -> DEBU 1946 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 1947 Proposed new policy Admins for Channel/Orderer" +"2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 1948 Proposed new policy BlockValidation for Channel/Orderer" +"2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 1949 Proposed new policy Readers for Channel/Orderer" +"2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 194a Proposed new policy Writers for Channel/Orderer" +"2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 194b Proposed new policy Writers for Channel" +"2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 194c Proposed new policy Admins for Channel" +"2020-05-20 18:21:35.303 UTC [policies] NewManagerImpl -> DEBU 194d Proposed new policy Readers for Channel" +"2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 194e Adding to config map: [Group] /Channel" +"2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 194f Adding to config map: [Group] /Channel/Orderer" +"2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1950 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1951 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1952 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1953 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-05-20 18:21:35.303 UTC [common.configtx] addToMap -> DEBU 1954 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1955 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1956 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1957 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1958 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 1959 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 195a Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 195b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-05-20 18:21:35.304 UTC [common.configtx] addToMap -> DEBU 195c Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-05-20 18:21:35.306 UTC [common.configtx] addToMap -> DEBU 195d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-05-20 18:21:35.306 UTC [common.configtx] addToMap -> DEBU 195e Adding to config map: [Group] /Channel/Application" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 195f Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1960 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1961 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1962 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1963 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1964 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1965 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1966 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1967 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1968 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1969 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196c Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 196f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1970 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1971 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1972 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1973 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1974 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1975 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1976 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1977 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1978 Adding to config map: [Value] /Channel/Capabilities" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 1979 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197b Adding to config map: [Value] /Channel/Consortium" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197c Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197d Adding to config map: [Policy] /Channel/Readers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197e Adding to config map: [Policy] /Channel/Writers" +"2020-05-20 18:21:35.307 UTC [common.configtx] addToMap -> DEBU 197f Adding to config map: [Policy] /Channel/Admins" +"2020-05-20 18:21:35.307 UTC [common.channelconfig] LogSanityChecks -> DEBU 1980 As expected, current configuration has policy '/Channel/Readers'" +"2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1981 As expected, current configuration has policy '/Channel/Writers'" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1982 Manager Channel looking up path [Application]" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1983 Manager Channel has managers Application" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1984 Manager Channel has managers Orderer" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1985 Manager Channel/Application looking up path []" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1986 Manager Channel/Application has managers Org2MSP" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1987 Manager Channel/Application has managers Org3MSP" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1988 Manager Channel/Application has managers Org1MSP" +"2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1989 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 198a As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 198b As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 198c Manager Channel looking up path [Orderer]" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 198d Manager Channel has managers Application" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 198e Manager Channel has managers Orderer" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 198f Manager Channel/Orderer looking up path []" +"2020-05-20 18:21:35.308 UTC [policies] Manager -> DEBU 1990 Manager Channel/Orderer has managers OrdererOrg" +"2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1991 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1992 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1993 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-05-20 18:21:35.308 UTC [common.channelconfig] LogSanityChecks -> DEBU 1994 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-05-20 18:21:35.308 UTC [common.capabilities] Supported -> DEBU 1995 Orderer capability V1_4_2 is supported and is enabled" +"2020-05-20 18:21:35.308 UTC [common.capabilities] Supported -> DEBU 1996 Channel capability V1_4_3 is supported and is enabled" +"2020-05-20 18:21:35.308 UTC [orderer.common.server] func1 -> DEBU 1997 Executing callback to update root CAs" +"2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1998 updating root CAs for channel [businesschannel]" +"2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1999 adding app root CAs for MSP [Org2MSP]" +"2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 199a adding app root CAs for MSP [Org3MSP]" +"2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 199b adding orderer root CAs for MSP [OrdererMSP]" +"2020-05-20 18:21:35.308 UTC [orderer.common.server] updateTrustedRoots -> DEBU 199c adding app root CAs for MSP [Org1MSP]" +"2020-05-20 18:21:35.309 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 199d [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +"2020-05-20 18:21:35.309 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 199e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +"2020-05-20 18:21:35.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 199f Obtaining default signing identity" +"2020-05-20 18:21:35.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 19a0 Obtaining default signing identity" +"2020-05-20 18:21:35.309 UTC [msp.identity] Sign -> DEBU 19a1 Sign: plaintext: 0A020806120B0A090A03010203100418...D58524EE370D8159D91A862F7CBDC7A6 " +"2020-05-20 18:21:35.309 UTC [msp.identity] Sign -> DEBU 19a2 Sign: digest: 5F86DFCD9EC951EC71DB036A4486AFA52A8589AF43DE7FC68A1F167DAC429610 " +"2020-05-20 18:21:35.317 UTC [fsblkstorage] indexBlock -> DEBU 19a3 Indexing block [blockNum=6, blockHash=[]byte{0xd4, 0xd4, 0x5b, 0x4, 0x4e, 0x8a, 0x13, 0x2b, 0x2, 0xd9, 0x3, 0xc3, 0x1e, 0x8, 0xa3, 0x0, 0x38, 0xa2, 0x72, 0xe6, 0xd8, 0x7f, 0xf1, 0x5f, 0x4f, 0x51, 0x17, 0xe3, 0xb7, 0xa8, 0x82, 0xb3} txOffsets= +txId=987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2 locPointer=offset=71, bytesLength=40146 +]" +"2020-05-20 18:21:35.318 UTC [fsblkstorage] updateCheckpoint -> DEBU 19a4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138572], isChainEmpty=[false], lastBlockNumber=[6]" +"2020-05-20 18:21:35.318 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 19a5 [channel: businesschannel] Wrote block [6]" +"2020-05-20 18:21:35.323 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19a6 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:35.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19a7 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-05-20 18:21:35.323 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19a8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63µs " +"2020-05-20 18:21:35.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19a9 Sending msg of 28 bytes to 2 on channel businesschannel took 63.8µs" +"2020-05-20 18:21:35.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ab Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2020-05-20 18:21:35.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.3µs " +"2020-05-20 18:21:35.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.2µs " +"2020-05-20 18:21:35.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ad Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:35.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ae Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:35.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19af Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:35.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b0 Sending msg of 28 bytes to 3 on channel testchainid took 72.4µs" +"2020-05-20 18:21:35.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +"2020-05-20 18:21:35.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b2 Sending msg of 28 bytes to 2 on channel businesschannel took 47.8µs" +"2020-05-20 18:21:35.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19b3 Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +"2020-05-20 18:21:35.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.4µs " +"2020-05-20 18:21:35.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " +"2020-05-20 18:21:35.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b6 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:35.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b7 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:36.323 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19b8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:36.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19b9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +"2020-05-20 18:21:36.324 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ba Sending msg of 28 bytes to 3 on channel testchainid took 110.3µs" +"2020-05-20 18:21:36.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19bb Sending msg of 28 bytes to 3 on channel businesschannel took 30µs" +"2020-05-20 18:21:36.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19bc Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2020-05-20 18:21:36.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 574.4µs " +"2020-05-20 18:21:36.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 365.1µs " +"2020-05-20 18:21:36.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19bf Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:36.344 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:36.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c1 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:36.822 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c2 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2020-05-20 18:21:36.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.7µs " +"2020-05-20 18:21:36.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c4 Sending msg of 28 bytes to 2 on channel businesschannel took 60.2µs" +"2020-05-20 18:21:36.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19c5 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +"2020-05-20 18:21:36.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.3µs " +"2020-05-20 18:21:36.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 572.3µs " +"2020-05-20 18:21:36.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c8 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:36.845 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19c9 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:37.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ca Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:37.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19cb Sending msg of 28 bytes to 3 on channel testchainid took 692.8µs" +"2020-05-20 18:21:37.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2053ms " +"2020-05-20 18:21:37.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19cd Sending msg of 28 bytes to 2 on channel businesschannel took 38.1µs" +"2020-05-20 18:21:37.342 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ce Sending msg of 28 bytes to 3 on channel businesschannel took 27.3µs" +"2020-05-20 18:21:37.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.9µs " +"2020-05-20 18:21:37.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.9µs " +"2020-05-20 18:21:37.345 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:37.345 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:37.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19d3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:37.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d4 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +"2020-05-20 18:21:37.825 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 887.5µs " +"2020-05-20 18:21:37.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d6 Sending msg of 28 bytes to 2 on channel businesschannel took 48.7µs" +"2020-05-20 18:21:37.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19d7 Sending msg of 28 bytes to 3 on channel businesschannel took 27.9µs" +"2020-05-20 18:21:37.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 475.2µs " +"2020-05-20 18:21:37.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6059ms " +"2020-05-20 18:21:37.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19db Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:37.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19da Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:38.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19dc Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:38.323 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dd Sending msg of 28 bytes to 3 on channel testchainid took 48.6µs" +"2020-05-20 18:21:38.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 891.8µs " +"2020-05-20 18:21:38.343 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19df Sending msg of 28 bytes to 2 on channel businesschannel took 769µs" +"2020-05-20 18:21:38.343 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e0 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2020-05-20 18:21:38.347 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.2246ms " +"2020-05-20 18:21:38.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:38.351 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:38.350 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.9357ms " +"2020-05-20 18:21:38.380 UTC [orderer.common.server] Deliver -> DEBU 19e5 Starting new Deliver handler" +"2020-05-20 18:21:38.380 UTC [common.deliver] Handle -> DEBU 19e6 Starting new deliver loop for 172.18.0.9:53664" +"2020-05-20 18:21:38.380 UTC [common.deliver] Handle -> DEBU 19e7 Attempting to read seek info message from 172.18.0.9:53664" +"2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:38.382 UTC [policies] Evaluate -> DEBU 19ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:38.382 UTC [msp] DeserializeIdentity -> DEBU 19ed Obtaining identity" +"2020-05-20 18:21:38.383 UTC [msp.identity] newIdentity -> DEBU 19ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-05-20 18:21:38.383 UTC [cauthdsl] func1 -> DEBU 19ef 0xc000ae89d0 gate 1589998898383703500 evaluation starts" +"2020-05-20 18:21:38.383 UTC [cauthdsl] func2 -> DEBU 19f0 0xc000ae89d0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:38.384 UTC [cauthdsl] func2 -> DEBU 19f1 0xc000ae89d0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:38.384 UTC [cauthdsl] func2 -> DEBU 19f2 0xc000ae89d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:38.384 UTC [cauthdsl] func2 -> DEBU 19f3 0xc000ae89d0 principal evaluation fails" +"2020-05-20 18:21:38.384 UTC [cauthdsl] func1 -> DEBU 19f4 0xc000ae89d0 gate 1589998898383703500 evaluation fails" +"2020-05-20 18:21:38.384 UTC [policies] Evaluate -> DEBU 19f5 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:38.385 UTC [policies] Evaluate -> DEBU 19f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:38.385 UTC [policies] Evaluate -> DEBU 19f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:38.385 UTC [cauthdsl] func1 -> DEBU 19f8 0xc000ae9cb0 gate 1589998898385380100 evaluation starts" +"2020-05-20 18:21:38.385 UTC [cauthdsl] func2 -> DEBU 19f9 0xc000ae9cb0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:38.385 UTC [cauthdsl] func2 -> DEBU 19fa 0xc000ae9cb0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:38.385 UTC [cauthdsl] func2 -> DEBU 19fb 0xc000ae9cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:38.386 UTC [cauthdsl] func2 -> DEBU 19fc 0xc000ae9cb0 principal evaluation fails" +"2020-05-20 18:21:38.386 UTC [cauthdsl] func1 -> DEBU 19fd 0xc000ae9cb0 gate 1589998898385380100 evaluation fails" +"2020-05-20 18:21:38.386 UTC [policies] Evaluate -> DEBU 19fe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:38.386 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:38.386 UTC [policies] Evaluate -> DEBU 1a00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:38.387 UTC [cauthdsl] func1 -> DEBU 1a01 0xc0011fe510 gate 1589998898387239600 evaluation starts" +"2020-05-20 18:21:38.387 UTC [cauthdsl] func2 -> DEBU 1a02 0xc0011fe510 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:38.387 UTC [cauthdsl] func2 -> DEBU 1a03 0xc0011fe510 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:38.387 UTC [cauthdsl] func2 -> DEBU 1a04 0xc0011fe510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:38.387 UTC [cauthdsl] func2 -> DEBU 1a05 0xc0011fe510 principal evaluation fails" +"2020-05-20 18:21:38.388 UTC [cauthdsl] func1 -> DEBU 1a06 0xc0011fe510 gate 1589998898387239600 evaluation fails" +"2020-05-20 18:21:38.388 UTC [policies] Evaluate -> DEBU 1a07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:38.388 UTC [policies] Evaluate -> DEBU 1a08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:38.388 UTC [policies] func1 -> DEBU 1a09 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:38.388 UTC [policies] Evaluate -> DEBU 1a0a Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:38.389 UTC [policies] Evaluate -> DEBU 1a0b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:38.389 UTC [policies] Evaluate -> DEBU 1a0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:38.389 UTC [policies] Evaluate -> DEBU 1a0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:38.390 UTC [policies] Evaluate -> DEBU 1a0e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:38.390 UTC [cauthdsl] func1 -> DEBU 1a0f 0xc0011ff220 gate 1589998898390370500 evaluation starts" +"2020-05-20 18:21:38.390 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0011ff220 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:38.390 UTC [cauthdsl] func2 -> DEBU 1a11 0xc0011ff220 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:38.390 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1a12 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-05-20 18:21:38.391 UTC [msp] Validate -> DEBU 1a13 MSP OrdererMSP validating identity" +"2020-05-20 18:21:38.391 UTC [msp] getCertificationChain -> DEBU 1a14 MSP OrdererMSP getting certification chain" +"2020-05-20 18:21:38.392 UTC [cauthdsl] func2 -> DEBU 1a15 0xc0011ff220 principal matched by identity 0" +"2020-05-20 18:21:38.392 UTC [msp.identity] Verify -> DEBU 1a16 Verify: digest = 00000000 d4 2a e5 28 4f 8c a1 fd b9 f4 95 f1 02 72 64 90 |.*.(O........rd.| +00000010 4e a4 3c 7e 3d c6 aa 4c bf e6 af 9c 59 8b 14 b3 |N.<~=..L....Y...|" +"2020-05-20 18:21:38.392 UTC [msp.identity] Verify -> DEBU 1a17 Verify: sig = 00000000 30 44 02 20 0e ec 39 c9 5e 84 0b 7d 1a aa d5 1c |0D. ..9.^..}....| +00000010 bc 34 b0 e4 a0 36 f6 f7 e2 ba 35 97 c7 e1 f7 09 |.4...6....5.....| +00000020 1e 76 07 23 02 20 2c e9 a1 56 fc 27 7b ce 4f 43 |.v.#. ,..V.'{.OC| +00000030 e9 44 0c a9 cf 90 60 79 8b bc ed 39 61 69 9a 67 |.D....`y...9ai.g| +00000040 16 61 b9 d6 68 b7 |.a..h.|" +"2020-05-20 18:21:38.392 UTC [cauthdsl] func2 -> DEBU 1a18 0xc0011ff220 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:38.392 UTC [cauthdsl] func1 -> DEBU 1a19 0xc0011ff220 gate 1589998898390370500 evaluation succeeds" +"2020-05-20 18:21:38.392 UTC [policies] Evaluate -> DEBU 1a1a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:38.392 UTC [policies] Evaluate -> DEBU 1a1b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:38.392 UTC [policies] Evaluate -> DEBU 1a1c Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:38.393 UTC [policies] Evaluate -> DEBU 1a1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:38.393 UTC [policies] Evaluate -> DEBU 1a1e Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:38.393 UTC [policies] Evaluate -> DEBU 1a1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:38.393 UTC [common.deliver] deliverBlocks -> DEBU 1a20 [channel: businesschannel] Received seekInfo (0xc000310840) start: > stop: > from 172.18.0.9:53664" +"2020-05-20 18:21:38.394 UTC [fsblkstorage] Next -> DEBU 1a21 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:38.394 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a22 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +"2020-05-20 18:21:38.394 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a23 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-05-20 18:21:38.394 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a24 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +"2020-05-20 18:21:38.394 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a25 blockbytes [41176] read from file [0]" +"2020-05-20 18:21:38.394 UTC [common.deliver] deliverBlocks -> DEBU 1a26 [channel: businesschannel] Delivering block [6] for (0xc000310840) for 172.18.0.9:53664" +"2020-05-20 18:21:38.395 UTC [common.deliver] deliverBlocks -> DEBU 1a27 [channel: businesschannel] Done delivering to 172.18.0.9:53664 for (0xc000310840)" +"2020-05-20 18:21:38.395 UTC [common.deliver] Handle -> DEBU 1a28 Waiting for new SeekInfo from 172.18.0.9:53664" +"2020-05-20 18:21:38.395 UTC [common.deliver] Handle -> DEBU 1a29 Attempting to read seek info message from 172.18.0.9:53664" +"2020-05-20 18:21:38.399 UTC [grpc] infof -> DEBU 1a2a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:38.400 UTC [common.deliver] Handle -> WARN 1a2b Error reading from 172.18.0.9:53664: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:38.400 UTC [orderer.common.server] func1 -> DEBU 1a2c Closing Deliver stream" +"2020-05-20 18:21:38.400 UTC [comm.grpc.server] 1 -> INFO 1a2d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53664 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8451ms +"2020-05-20 18:21:38.550 UTC [orderer.common.server] Deliver -> DEBU 1a2e Starting new Deliver handler" +"2020-05-20 18:21:38.550 UTC [common.deliver] Handle -> DEBU 1a2f Starting new deliver loop for 172.18.0.9:53666" +"2020-05-20 18:21:38.550 UTC [common.deliver] Handle -> DEBU 1a30 Attempting to read seek info message from 172.18.0.9:53666" +"2020-05-20 18:21:38.552 UTC [policies] Evaluate -> DEBU 1a31 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:38.553 UTC [policies] Evaluate -> DEBU 1a32 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:38.553 UTC [policies] Evaluate -> DEBU 1a33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:38.553 UTC [policies] Evaluate -> DEBU 1a34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:38.554 UTC [policies] Evaluate -> DEBU 1a35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:38.554 UTC [cauthdsl] func1 -> DEBU 1a36 0xc001247e40 gate 1589998898554206000 evaluation starts" +"2020-05-20 18:21:38.554 UTC [cauthdsl] func2 -> DEBU 1a37 0xc001247e40 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:38.555 UTC [cauthdsl] func2 -> DEBU 1a38 0xc001247e40 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:38.555 UTC [cauthdsl] func2 -> DEBU 1a39 0xc001247e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:38.555 UTC [cauthdsl] func2 -> DEBU 1a3a 0xc001247e40 principal evaluation fails" +"2020-05-20 18:21:38.555 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc001247e40 gate 1589998898554206000 evaluation fails" +"2020-05-20 18:21:38.556 UTC [policies] Evaluate -> DEBU 1a3c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:38.556 UTC [policies] Evaluate -> DEBU 1a3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:38.556 UTC [policies] Evaluate -> DEBU 1a3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:38.556 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc000cc6680 gate 1589998898556580000 evaluation starts" +"2020-05-20 18:21:38.556 UTC [cauthdsl] func2 -> DEBU 1a40 0xc000cc6680 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:38.557 UTC [cauthdsl] func2 -> DEBU 1a41 0xc000cc6680 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:38.557 UTC [cauthdsl] func2 -> DEBU 1a42 0xc000cc6680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:38.557 UTC [cauthdsl] func2 -> DEBU 1a43 0xc000cc6680 principal evaluation fails" +"2020-05-20 18:21:38.557 UTC [cauthdsl] func1 -> DEBU 1a44 0xc000cc6680 gate 1589998898556580000 evaluation fails" +"2020-05-20 18:21:38.557 UTC [policies] Evaluate -> DEBU 1a45 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:38.557 UTC [policies] Evaluate -> DEBU 1a46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:38.558 UTC [policies] Evaluate -> DEBU 1a47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:38.558 UTC [cauthdsl] func1 -> DEBU 1a48 0xc000cc6ec0 gate 1589998898558473600 evaluation starts" +"2020-05-20 18:21:38.558 UTC [cauthdsl] func2 -> DEBU 1a49 0xc000cc6ec0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:38.558 UTC [cauthdsl] func2 -> DEBU 1a4a 0xc000cc6ec0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:38.559 UTC [cauthdsl] func2 -> DEBU 1a4b 0xc000cc6ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:38.559 UTC [cauthdsl] func2 -> DEBU 1a4c 0xc000cc6ec0 principal evaluation fails" +"2020-05-20 18:21:38.559 UTC [cauthdsl] func1 -> DEBU 1a4d 0xc000cc6ec0 gate 1589998898558473600 evaluation fails" +"2020-05-20 18:21:38.559 UTC [policies] Evaluate -> DEBU 1a4e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:38.559 UTC [policies] Evaluate -> DEBU 1a4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:38.559 UTC [policies] func1 -> DEBU 1a50 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:38.560 UTC [policies] Evaluate -> DEBU 1a51 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:38.560 UTC [policies] Evaluate -> DEBU 1a52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:38.560 UTC [policies] Evaluate -> DEBU 1a53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:38.561 UTC [policies] Evaluate -> DEBU 1a54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:38.561 UTC [policies] Evaluate -> DEBU 1a55 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:38.561 UTC [cauthdsl] func1 -> DEBU 1a56 0xc000cc7bb0 gate 1589998898561591800 evaluation starts" +"2020-05-20 18:21:38.561 UTC [cauthdsl] func2 -> DEBU 1a57 0xc000cc7bb0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:38.562 UTC [cauthdsl] func2 -> DEBU 1a58 0xc000cc7bb0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:38.562 UTC [cauthdsl] func2 -> DEBU 1a59 0xc000cc7bb0 principal matched by identity 0" +"2020-05-20 18:21:38.563 UTC [msp.identity] Verify -> DEBU 1a5a Verify: digest = 00000000 66 8a 42 53 2d 20 46 e1 ac 7a 07 b2 ef 90 4f 23 |f.BS- F..z....O#| +00000010 dc 8e 42 8c 0c 4c 5c cf 5b 3d 3e 3f 3e f3 d9 bf |..B..L\.[=>?>...|" +"2020-05-20 18:21:38.563 UTC [msp.identity] Verify -> DEBU 1a5b Verify: sig = 00000000 30 44 02 20 38 a9 bc 5c 69 28 7f b3 e9 b8 6b ad |0D. 8..\i(....k.| +00000010 ea 4c d0 f4 09 fb bc a6 23 42 6d 4f 48 23 f3 4c |.L......#BmOH#.L| +00000020 99 28 76 1b 02 20 03 66 0f eb bb e3 c1 6b 07 35 |.(v.. .f.....k.5| +00000030 9f eb 71 2c 22 2f a0 ee b7 48 a2 3b 4b 06 0c 5b |..q,"/...H.;K..[| +00000040 81 99 0e 9f 34 21 |....4!|" +"2020-05-20 18:21:38.563 UTC [cauthdsl] func2 -> DEBU 1a5c 0xc000cc7bb0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:38.563 UTC [cauthdsl] func1 -> DEBU 1a5d 0xc000cc7bb0 gate 1589998898561591800 evaluation succeeds" +"2020-05-20 18:21:38.563 UTC [policies] Evaluate -> DEBU 1a5e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a5f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a60 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a62 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:38.564 UTC [policies] Evaluate -> DEBU 1a63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:38.565 UTC [common.deliver] deliverBlocks -> DEBU 1a64 [channel: businesschannel] Received seekInfo (0xc0003110c0) start: > stop: > from 172.18.0.9:53666" +"2020-05-20 18:21:38.565 UTC [fsblkstorage] Next -> DEBU 1a65 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:38.565 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a66 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +"2020-05-20 18:21:38.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a67 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-05-20 18:21:38.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a68 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +"2020-05-20 18:21:38.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a69 blockbytes [41176] read from file [0]" +"2020-05-20 18:21:38.566 UTC [common.deliver] deliverBlocks -> DEBU 1a6a [channel: businesschannel] Delivering block [6] for (0xc0003110c0) for 172.18.0.9:53666" +"2020-05-20 18:21:38.566 UTC [common.deliver] deliverBlocks -> DEBU 1a6b [channel: businesschannel] Done delivering to 172.18.0.9:53666 for (0xc0003110c0)" +"2020-05-20 18:21:38.570 UTC [common.deliver] Handle -> DEBU 1a6c Waiting for new SeekInfo from 172.18.0.9:53666" +"2020-05-20 18:21:38.570 UTC [common.deliver] Handle -> DEBU 1a6d Attempting to read seek info message from 172.18.0.9:53666" +"2020-05-20 18:21:38.573 UTC [grpc] infof -> DEBU 1a6e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:38.573 UTC [common.deliver] Handle -> WARN 1a6f Error reading from 172.18.0.9:53666: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:38.573 UTC [orderer.common.server] func1 -> DEBU 1a70 Closing Deliver stream" +"2020-05-20 18:21:38.573 UTC [comm.grpc.server] 1 -> INFO 1a71 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53666 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.2213ms +"2020-05-20 18:21:38.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a72 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:38.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a73 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2020-05-20 18:21:38.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a74 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +"2020-05-20 18:21:38.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a75 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +"2020-05-20 18:21:38.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a76 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-05-20 18:21:38.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +"2020-05-20 18:21:38.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262.8µs " +"2020-05-20 18:21:38.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a79 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:38.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a7a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:39.105 UTC [orderer.common.server] Deliver -> DEBU 1a7b Starting new Deliver handler" +"2020-05-20 18:21:39.105 UTC [common.deliver] Handle -> DEBU 1a7c Starting new deliver loop for 172.18.0.9:53668" +"2020-05-20 18:21:39.105 UTC [common.deliver] Handle -> DEBU 1a7d Attempting to read seek info message from 172.18.0.9:53668" +"2020-05-20 18:21:39.107 UTC [policies] Evaluate -> DEBU 1a7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:39.107 UTC [policies] Evaluate -> DEBU 1a7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.108 UTC [policies] Evaluate -> DEBU 1a80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:39.108 UTC [policies] Evaluate -> DEBU 1a81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.108 UTC [policies] Evaluate -> DEBU 1a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:39.109 UTC [cauthdsl] func1 -> DEBU 1a83 0xc000d229c0 gate 1589998899109074600 evaluation starts" +"2020-05-20 18:21:39.109 UTC [cauthdsl] func2 -> DEBU 1a84 0xc000d229c0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.109 UTC [cauthdsl] func2 -> DEBU 1a85 0xc000d229c0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.110 UTC [cauthdsl] func2 -> DEBU 1a86 0xc000d229c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:39.110 UTC [cauthdsl] func2 -> DEBU 1a87 0xc000d229c0 principal evaluation fails" +"2020-05-20 18:21:39.111 UTC [cauthdsl] func1 -> DEBU 1a88 0xc000d229c0 gate 1589998899109074600 evaluation fails" +"2020-05-20 18:21:39.111 UTC [policies] Evaluate -> DEBU 1a89 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.112 UTC [policies] Evaluate -> DEBU 1a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.112 UTC [policies] Evaluate -> DEBU 1a8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:39.112 UTC [cauthdsl] func1 -> DEBU 1a8c 0xc000d23200 gate 1589998899112846700 evaluation starts" +"2020-05-20 18:21:39.113 UTC [cauthdsl] func2 -> DEBU 1a8d 0xc000d23200 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.113 UTC [cauthdsl] func2 -> DEBU 1a8e 0xc000d23200 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.113 UTC [cauthdsl] func2 -> DEBU 1a8f 0xc000d23200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:39.113 UTC [cauthdsl] func2 -> DEBU 1a90 0xc000d23200 principal evaluation fails" +"2020-05-20 18:21:39.114 UTC [cauthdsl] func1 -> DEBU 1a91 0xc000d23200 gate 1589998899112846700 evaluation fails" +"2020-05-20 18:21:39.114 UTC [policies] Evaluate -> DEBU 1a92 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.114 UTC [policies] Evaluate -> DEBU 1a93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.115 UTC [policies] Evaluate -> DEBU 1a94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:39.115 UTC [cauthdsl] func1 -> DEBU 1a95 0xc000d23a40 gate 1589998899115850700 evaluation starts" +"2020-05-20 18:21:39.116 UTC [cauthdsl] func2 -> DEBU 1a96 0xc000d23a40 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.116 UTC [cauthdsl] func2 -> DEBU 1a97 0xc000d23a40 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.116 UTC [cauthdsl] func2 -> DEBU 1a98 0xc000d23a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:39.116 UTC [cauthdsl] func2 -> DEBU 1a99 0xc000d23a40 principal evaluation fails" +"2020-05-20 18:21:39.117 UTC [cauthdsl] func1 -> DEBU 1a9a 0xc000d23a40 gate 1589998899115850700 evaluation fails" +"2020-05-20 18:21:39.117 UTC [policies] Evaluate -> DEBU 1a9b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.117 UTC [policies] Evaluate -> DEBU 1a9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.117 UTC [policies] func1 -> DEBU 1a9d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1a9e Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1a9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.118 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:39.119 UTC [cauthdsl] func1 -> DEBU 1aa3 0xc000d56730 gate 1589998899119244600 evaluation starts" +"2020-05-20 18:21:39.119 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc000d56730 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.119 UTC [cauthdsl] func2 -> DEBU 1aa5 0xc000d56730 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.119 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000d56730 principal matched by identity 0" +"2020-05-20 18:21:39.120 UTC [msp.identity] Verify -> DEBU 1aa7 Verify: digest = 00000000 7f ab a1 74 a4 35 a1 e1 80 ac f8 a8 e6 60 48 ea |...t.5.......`H.| +00000010 87 a3 5a c0 bc 23 66 6f f1 6f 5a 8f 47 f6 38 d2 |..Z..#fo.oZ.G.8.|" +"2020-05-20 18:21:39.120 UTC [msp.identity] Verify -> DEBU 1aa8 Verify: sig = 00000000 30 44 02 20 55 71 03 de 31 05 bb 95 97 1a ee f8 |0D. Uq..1.......| +00000010 c8 f1 4a a7 7c cc 58 4e 84 40 35 cb ae 40 95 93 |..J.|.XN.@5..@..| +00000020 d4 f7 f9 71 02 20 4d 19 21 d3 e4 fc ca ed cc 33 |...q. M.!......3| +00000030 1e b3 0e f8 4f 30 30 28 d2 57 71 42 52 cb e1 e5 |....O00(.WqBR...| +00000040 67 db 97 2d 0c 33 |g..-.3|" +"2020-05-20 18:21:39.121 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000d56730 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:39.121 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000d56730 gate 1589998899119244600 evaluation succeeds" +"2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aab Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aad Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1aaf Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:39.121 UTC [policies] Evaluate -> DEBU 1ab0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:39.121 UTC [common.deliver] deliverBlocks -> DEBU 1ab1 [channel: businesschannel] Received seekInfo (0xc000311f00) start: > stop: > from 172.18.0.9:53668" +"2020-05-20 18:21:39.122 UTC [fsblkstorage] Next -> DEBU 1ab2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:39.122 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ab3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +"2020-05-20 18:21:39.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab4 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-05-20 18:21:39.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab5 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +"2020-05-20 18:21:39.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab6 blockbytes [41176] read from file [0]" +"2020-05-20 18:21:39.123 UTC [common.deliver] deliverBlocks -> DEBU 1ab7 [channel: businesschannel] Delivering block [6] for (0xc000311f00) for 172.18.0.9:53668" +"2020-05-20 18:21:39.123 UTC [common.deliver] deliverBlocks -> DEBU 1ab8 [channel: businesschannel] Done delivering to 172.18.0.9:53668 for (0xc000311f00)" +"2020-05-20 18:21:39.124 UTC [common.deliver] Handle -> DEBU 1ab9 Waiting for new SeekInfo from 172.18.0.9:53668" +"2020-05-20 18:21:39.125 UTC [common.deliver] Handle -> DEBU 1aba Attempting to read seek info message from 172.18.0.9:53668" +"2020-05-20 18:21:39.129 UTC [common.deliver] Handle -> WARN 1abb Error reading from 172.18.0.9:53668: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:39.129 UTC [orderer.common.server] func1 -> DEBU 1abc Closing Deliver stream" +"2020-05-20 18:21:39.129 UTC [comm.grpc.server] 1 -> INFO 1abd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53668 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.4995ms +"2020-05-20 18:21:39.130 UTC [grpc] infof -> DEBU 1abe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:39.309 UTC [orderer.common.server] Deliver -> DEBU 1abf Starting new Deliver handler" +"2020-05-20 18:21:39.310 UTC [common.deliver] Handle -> DEBU 1ac0 Starting new deliver loop for 172.18.0.9:53670" +"2020-05-20 18:21:39.310 UTC [common.deliver] Handle -> DEBU 1ac1 Attempting to read seek info message from 172.18.0.9:53670" +"2020-05-20 18:21:39.312 UTC [policies] Evaluate -> DEBU 1ac2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:39.313 UTC [policies] Evaluate -> DEBU 1ac3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.313 UTC [policies] Evaluate -> DEBU 1ac4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:39.313 UTC [policies] Evaluate -> DEBU 1ac5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.314 UTC [policies] Evaluate -> DEBU 1ac6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:39.314 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc000daff90 gate 1589998899314515900 evaluation starts" +"2020-05-20 18:21:39.314 UTC [cauthdsl] func2 -> DEBU 1ac8 0xc000daff90 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.315 UTC [cauthdsl] func2 -> DEBU 1ac9 0xc000daff90 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.315 UTC [cauthdsl] func2 -> DEBU 1aca 0xc000daff90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:39.316 UTC [cauthdsl] func2 -> DEBU 1acb 0xc000daff90 principal evaluation fails" +"2020-05-20 18:21:39.316 UTC [cauthdsl] func1 -> DEBU 1acc 0xc000daff90 gate 1589998899314515900 evaluation fails" +"2020-05-20 18:21:39.316 UTC [policies] Evaluate -> DEBU 1acd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.317 UTC [policies] Evaluate -> DEBU 1ace == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.317 UTC [policies] Evaluate -> DEBU 1acf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:39.317 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc000dc67d0 gate 1589998899317970200 evaluation starts" +"2020-05-20 18:21:39.318 UTC [cauthdsl] func2 -> DEBU 1ad1 0xc000dc67d0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.318 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc000dc67d0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.319 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc000dc67d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:39.319 UTC [cauthdsl] func2 -> DEBU 1ad4 0xc000dc67d0 principal evaluation fails" +"2020-05-20 18:21:39.319 UTC [cauthdsl] func1 -> DEBU 1ad5 0xc000dc67d0 gate 1589998899317970200 evaluation fails" +"2020-05-20 18:21:39.319 UTC [policies] Evaluate -> DEBU 1ad6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.320 UTC [policies] Evaluate -> DEBU 1ad7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.320 UTC [policies] Evaluate -> DEBU 1ad8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:39.320 UTC [cauthdsl] func1 -> DEBU 1ad9 0xc000dc7010 gate 1589998899320657500 evaluation starts" +"2020-05-20 18:21:39.320 UTC [cauthdsl] func2 -> DEBU 1ada 0xc000dc7010 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1adb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:39.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1adc Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-05-20 18:21:39.321 UTC [cauthdsl] func2 -> DEBU 1add 0xc000dc7010 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.322 UTC [cauthdsl] func2 -> DEBU 1ade 0xc000dc7010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:39.322 UTC [cauthdsl] func2 -> DEBU 1adf 0xc000dc7010 principal evaluation fails" +"2020-05-20 18:21:39.322 UTC [cauthdsl] func1 -> DEBU 1ae0 0xc000dc7010 gate 1589998899320657500 evaluation fails" +"2020-05-20 18:21:39.322 UTC [policies] Evaluate -> DEBU 1ae1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.323 UTC [policies] func1 -> DEBU 1ae3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae4 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.323 UTC [policies] Evaluate -> DEBU 1ae8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:39.323 UTC [cauthdsl] func1 -> DEBU 1ae9 0xc000d97660 gate 1589998899323325400 evaluation starts" +"2020-05-20 18:21:39.323 UTC [cauthdsl] func2 -> DEBU 1aea 0xc000d97660 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.323 UTC [cauthdsl] func2 -> DEBU 1aeb 0xc000d97660 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.323 UTC [cauthdsl] func2 -> DEBU 1aec 0xc000d97660 principal matched by identity 0" +"2020-05-20 18:21:39.324 UTC [msp.identity] Verify -> DEBU 1aed Verify: digest = 00000000 35 32 a1 52 24 74 1a 15 92 bb 84 dd 57 a0 98 75 |52.R$t......W..u| +00000010 5a 24 d7 08 3b bd 9b 42 4c 6f d8 a7 ae 3b 10 96 |Z$..;..BLo...;..|" +"2020-05-20 18:21:39.324 UTC [msp.identity] Verify -> DEBU 1aee Verify: sig = 00000000 30 45 02 21 00 ae 77 78 0f f6 4c 9c 3f 3b cd 87 |0E.!..wx..L.?;..| +00000010 e1 56 de 88 3d 80 fa 08 61 9a 55 c5 48 de 16 84 |.V..=...a.U.H...| +00000020 c7 c3 ee 3a db 02 20 50 4d 18 83 30 c4 30 50 5d |...:.. PM..0.0P]| +00000030 60 37 d5 be 20 6e 4b c1 2c c0 d4 dc fe c9 f1 de |`7.. nK.,.......| +00000040 36 26 f1 67 f0 f8 4a |6&.g..J|" +"2020-05-20 18:21:39.324 UTC [cauthdsl] func2 -> DEBU 1aef 0xc000d97660 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:39.324 UTC [cauthdsl] func1 -> DEBU 1af0 0xc000d97660 gate 1589998899323325400 evaluation succeeds" +"2020-05-20 18:21:39.324 UTC [policies] Evaluate -> DEBU 1af1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af3 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af5 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:39.325 UTC [policies] Evaluate -> DEBU 1af6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:39.325 UTC [common.deliver] deliverBlocks -> DEBU 1af7 [channel: businesschannel] Received seekInfo (0xc000d9c580) start: > stop: > from 172.18.0.9:53670" +"2020-05-20 18:21:39.325 UTC [fsblkstorage] Next -> DEBU 1af8 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:39.325 UTC [fsblkstorage] newBlockfileStream -> DEBU 1af9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +"2020-05-20 18:21:39.325 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afa Remaining bytes=[41179], Going to peek [8] bytes" +"2020-05-20 18:21:39.325 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afb Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +"2020-05-20 18:21:39.326 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afc blockbytes [41176] read from file [0]" +"2020-05-20 18:21:39.326 UTC [common.deliver] deliverBlocks -> DEBU 1afd [channel: businesschannel] Delivering block [6] for (0xc000d9c580) for 172.18.0.9:53670" +"2020-05-20 18:21:39.326 UTC [common.deliver] deliverBlocks -> DEBU 1afe [channel: businesschannel] Done delivering to 172.18.0.9:53670 for (0xc000d9c580)" +"2020-05-20 18:21:39.326 UTC [common.deliver] Handle -> DEBU 1aff Waiting for new SeekInfo from 172.18.0.9:53670" +"2020-05-20 18:21:39.326 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b00 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.3µs " +"2020-05-20 18:21:39.326 UTC [common.deliver] Handle -> DEBU 1b01 Attempting to read seek info message from 172.18.0.9:53670" +"2020-05-20 18:21:39.330 UTC [policies] Evaluate -> DEBU 1b02 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:39.330 UTC [policies] Evaluate -> DEBU 1b03 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.330 UTC [policies] Evaluate -> DEBU 1b04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:39.331 UTC [cauthdsl] func1 -> DEBU 1b07 0xc000dc7dc0 gate 1589998899331261800 evaluation starts" +"2020-05-20 18:21:39.331 UTC [cauthdsl] func2 -> DEBU 1b08 0xc000dc7dc0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.331 UTC [cauthdsl] func2 -> DEBU 1b09 0xc000dc7dc0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.331 UTC [cauthdsl] func2 -> DEBU 1b0a 0xc000dc7dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:39.331 UTC [cauthdsl] func2 -> DEBU 1b0b 0xc000dc7dc0 principal evaluation fails" +"2020-05-20 18:21:39.331 UTC [cauthdsl] func1 -> DEBU 1b0c 0xc000dc7dc0 gate 1589998899331261800 evaluation fails" +"2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b0d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.331 UTC [policies] Evaluate -> DEBU 1b0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:39.331 UTC [cauthdsl] func1 -> DEBU 1b10 0xc000e8c600 gate 1589998899331934900 evaluation starts" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b11 0xc000e8c600 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b12 0xc000e8c600 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b13 0xc000e8c600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b14 0xc000e8c600 principal evaluation fails" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func1 -> DEBU 1b15 0xc000e8c600 gate 1589998899331934900 evaluation fails" +"2020-05-20 18:21:39.332 UTC [policies] Evaluate -> DEBU 1b16 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.332 UTC [policies] Evaluate -> DEBU 1b17 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.332 UTC [policies] Evaluate -> DEBU 1b18 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func1 -> DEBU 1b19 0xc000e8ce40 gate 1589998899332668400 evaluation starts" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b1a 0xc000e8ce40 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b1b 0xc000e8ce40 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b1c 0xc000e8ce40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func2 -> DEBU 1b1d 0xc000e8ce40 principal evaluation fails" +"2020-05-20 18:21:39.332 UTC [cauthdsl] func1 -> DEBU 1b1e 0xc000e8ce40 gate 1589998899332668400 evaluation fails" +"2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.333 UTC [policies] func1 -> DEBU 1b21 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b22 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.333 UTC [policies] Evaluate -> DEBU 1b26 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:39.334 UTC [cauthdsl] func1 -> DEBU 1b27 0xc000e8db30 gate 1589998899334088100 evaluation starts" +"2020-05-20 18:21:39.334 UTC [cauthdsl] func2 -> DEBU 1b28 0xc000e8db30 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.334 UTC [cauthdsl] func2 -> DEBU 1b29 0xc000e8db30 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.334 UTC [cauthdsl] func2 -> DEBU 1b2a 0xc000e8db30 principal matched by identity 0" +"2020-05-20 18:21:39.334 UTC [msp.identity] Verify -> DEBU 1b2b Verify: digest = 00000000 f2 0c a4 6f 25 f0 3b 77 1f f3 e8 f4 8e 76 66 bc |...o%.;w.....vf.| +00000010 50 9b c7 38 3b 76 6f 7f 69 4a e8 b3 ab 85 ed 93 |P..8;vo.iJ......|" +"2020-05-20 18:21:39.334 UTC [msp.identity] Verify -> DEBU 1b2c Verify: sig = 00000000 30 45 02 21 00 de 75 00 94 27 3e b7 da c8 b8 1f |0E.!..u..'>.....| +00000010 d1 bc 7d 1b 33 b3 ae 9d e3 c2 7f 3d d1 f0 22 f0 |..}.3......=..".| +00000020 0b 8e d0 b9 91 02 20 4e 81 f4 3e ef c3 95 57 e6 |...... N..>...W.| +00000030 1c 87 87 c4 66 5f 01 79 b6 99 5e 09 92 ae 91 74 |....f_.y..^....t| +00000040 d2 8c d8 e9 2a 68 43 |....*hC|" +"2020-05-20 18:21:39.335 UTC [cauthdsl] func2 -> DEBU 1b2d 0xc000e8db30 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:39.335 UTC [cauthdsl] func1 -> DEBU 1b2e 0xc000e8db30 gate 1589998899334088100 evaluation succeeds" +"2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b2f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b30 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b31 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b32 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b33 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:39.335 UTC [policies] Evaluate -> DEBU 1b34 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:39.335 UTC [common.deliver] deliverBlocks -> DEBU 1b35 [channel: businesschannel] Received seekInfo (0xc000cfed40) start: > stop: > from 172.18.0.9:53670" +"2020-05-20 18:21:39.335 UTC [fsblkstorage] Next -> DEBU 1b36 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:39.335 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b37 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +"2020-05-20 18:21:39.335 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b38 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-05-20 18:21:39.335 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b39 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +"2020-05-20 18:21:39.335 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b3a blockbytes [41176] read from file [0]" +"2020-05-20 18:21:39.336 UTC [common.deliver] deliverBlocks -> DEBU 1b3b [channel: businesschannel] Delivering block [6] for (0xc000cfed40) for 172.18.0.9:53670" +"2020-05-20 18:21:39.336 UTC [common.deliver] deliverBlocks -> DEBU 1b3c [channel: businesschannel] Done delivering to 172.18.0.9:53670 for (0xc000cfed40)" +"2020-05-20 18:21:39.336 UTC [common.deliver] Handle -> DEBU 1b3d Waiting for new SeekInfo from 172.18.0.9:53670" +"2020-05-20 18:21:39.336 UTC [common.deliver] Handle -> DEBU 1b3e Attempting to read seek info message from 172.18.0.9:53670" +"2020-05-20 18:21:39.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3f Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +"2020-05-20 18:21:39.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b40 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2020-05-20 18:21:39.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " +"2020-05-20 18:21:39.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.8µs " +"2020-05-20 18:21:39.346 UTC [common.deliver] Handle -> WARN 1b43 Error reading from 172.18.0.9:53670: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:39.347 UTC [orderer.common.server] func1 -> DEBU 1b44 Closing Deliver stream" +"2020-05-20 18:21:39.347 UTC [comm.grpc.server] 1 -> INFO 1b45 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53670 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.8256ms +"2020-05-20 18:21:39.348 UTC [grpc] infof -> DEBU 1b46 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:39.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b47 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:39.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b48 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:39.485 UTC [orderer.common.server] Deliver -> DEBU 1b49 Starting new Deliver handler" +"2020-05-20 18:21:39.485 UTC [common.deliver] Handle -> DEBU 1b4a Starting new deliver loop for 172.18.0.9:53672" +"2020-05-20 18:21:39.486 UTC [common.deliver] Handle -> DEBU 1b4b Attempting to read seek info message from 172.18.0.9:53672" +"2020-05-20 18:21:39.487 UTC [policies] Evaluate -> DEBU 1b4c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:39.488 UTC [policies] Evaluate -> DEBU 1b4d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.488 UTC [policies] Evaluate -> DEBU 1b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:39.488 UTC [policies] Evaluate -> DEBU 1b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.488 UTC [policies] Evaluate -> DEBU 1b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:39.488 UTC [cauthdsl] func1 -> DEBU 1b51 0xc001082580 gate 1589998899488892000 evaluation starts" +"2020-05-20 18:21:39.489 UTC [cauthdsl] func2 -> DEBU 1b52 0xc001082580 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.489 UTC [cauthdsl] func2 -> DEBU 1b53 0xc001082580 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.489 UTC [cauthdsl] func2 -> DEBU 1b54 0xc001082580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:39.489 UTC [cauthdsl] func2 -> DEBU 1b55 0xc001082580 principal evaluation fails" +"2020-05-20 18:21:39.490 UTC [cauthdsl] func1 -> DEBU 1b56 0xc001082580 gate 1589998899488892000 evaluation fails" +"2020-05-20 18:21:39.490 UTC [policies] Evaluate -> DEBU 1b57 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.490 UTC [policies] Evaluate -> DEBU 1b58 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.490 UTC [policies] Evaluate -> DEBU 1b59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:39.491 UTC [cauthdsl] func1 -> DEBU 1b5a 0xc001082dc0 gate 1589998899491072800 evaluation starts" +"2020-05-20 18:21:39.491 UTC [cauthdsl] func2 -> DEBU 1b5b 0xc001082dc0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.491 UTC [cauthdsl] func2 -> DEBU 1b5c 0xc001082dc0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.491 UTC [cauthdsl] func2 -> DEBU 1b5d 0xc001082dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:39.491 UTC [cauthdsl] func2 -> DEBU 1b5e 0xc001082dc0 principal evaluation fails" +"2020-05-20 18:21:39.492 UTC [cauthdsl] func1 -> DEBU 1b5f 0xc001082dc0 gate 1589998899491072800 evaluation fails" +"2020-05-20 18:21:39.492 UTC [policies] Evaluate -> DEBU 1b60 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.492 UTC [policies] Evaluate -> DEBU 1b61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.493 UTC [policies] Evaluate -> DEBU 1b62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:39.493 UTC [cauthdsl] func1 -> DEBU 1b63 0xc001083600 gate 1589998899493283300 evaluation starts" +"2020-05-20 18:21:39.493 UTC [cauthdsl] func2 -> DEBU 1b64 0xc001083600 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.493 UTC [cauthdsl] func2 -> DEBU 1b65 0xc001083600 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.493 UTC [cauthdsl] func2 -> DEBU 1b66 0xc001083600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:39.494 UTC [cauthdsl] func2 -> DEBU 1b67 0xc001083600 principal evaluation fails" +"2020-05-20 18:21:39.494 UTC [cauthdsl] func1 -> DEBU 1b68 0xc001083600 gate 1589998899493283300 evaluation fails" +"2020-05-20 18:21:39.495 UTC [policies] Evaluate -> DEBU 1b69 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.495 UTC [policies] Evaluate -> DEBU 1b6a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.495 UTC [policies] func1 -> DEBU 1b6b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:39.495 UTC [policies] Evaluate -> DEBU 1b6c Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:39.496 UTC [policies] Evaluate -> DEBU 1b6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:39.496 UTC [policies] Evaluate -> DEBU 1b6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:39.496 UTC [policies] Evaluate -> DEBU 1b6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.496 UTC [policies] Evaluate -> DEBU 1b70 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:39.497 UTC [cauthdsl] func1 -> DEBU 1b71 0xc00109e2f0 gate 1589998899497029300 evaluation starts" +"2020-05-20 18:21:39.497 UTC [cauthdsl] func2 -> DEBU 1b72 0xc00109e2f0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.497 UTC [cauthdsl] func2 -> DEBU 1b73 0xc00109e2f0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.497 UTC [cauthdsl] func2 -> DEBU 1b74 0xc00109e2f0 principal matched by identity 0" +"2020-05-20 18:21:39.497 UTC [msp.identity] Verify -> DEBU 1b75 Verify: digest = 00000000 5d a7 40 50 ce df e1 7c c9 96 62 be 93 42 8d 30 |].@P...|..b..B.0| +00000010 2e 04 f4 19 19 84 4f 11 97 f3 64 b7 db ed 4e 46 |......O...d...NF|" +"2020-05-20 18:21:39.498 UTC [msp.identity] Verify -> DEBU 1b76 Verify: sig = 00000000 30 45 02 21 00 e8 63 5b 97 96 d0 1c 0a 37 ac d8 |0E.!..c[.....7..| +00000010 0a a3 6d f9 59 95 47 62 c8 c3 54 08 27 1c 30 96 |..m.Y.Gb..T.'.0.| +00000020 50 96 6a f9 f1 02 20 3d 2a 3b d0 72 0f 83 17 dd |P.j... =*;.r....| +00000030 70 6d ba 47 13 af fb 87 d7 d0 d5 49 03 b8 6e ae |pm.G.......I..n.| +00000040 6e a8 05 03 3e b6 05 |n...>..|" +"2020-05-20 18:21:39.498 UTC [cauthdsl] func2 -> DEBU 1b77 0xc00109e2f0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:39.498 UTC [cauthdsl] func1 -> DEBU 1b78 0xc00109e2f0 gate 1589998899497029300 evaluation succeeds" +"2020-05-20 18:21:39.498 UTC [policies] Evaluate -> DEBU 1b79 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.498 UTC [policies] Evaluate -> DEBU 1b7a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.498 UTC [policies] Evaluate -> DEBU 1b7b Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.499 UTC [policies] Evaluate -> DEBU 1b7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.499 UTC [policies] Evaluate -> DEBU 1b7d Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:39.499 UTC [policies] Evaluate -> DEBU 1b7e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:39.499 UTC [common.deliver] deliverBlocks -> DEBU 1b7f [channel: businesschannel] Received seekInfo (0xc000d9d680) start: > stop: > from 172.18.0.9:53672" +"2020-05-20 18:21:39.499 UTC [fsblkstorage] Next -> DEBU 1b80 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:39.500 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b81 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-05-20 18:21:39.500 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b82 Remaining bytes=[138572], Going to peek [8] bytes" +"2020-05-20 18:21:39.500 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b83 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:21:39.500 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b84 blockbytes [28471] read from file [0]" +"2020-05-20 18:21:39.500 UTC [common.deliver] deliverBlocks -> DEBU 1b85 [channel: businesschannel] Delivering block [0] for (0xc000d9d680) for 172.18.0.9:53672" +"2020-05-20 18:21:39.501 UTC [common.deliver] deliverBlocks -> DEBU 1b86 [channel: businesschannel] Done delivering to 172.18.0.9:53672 for (0xc000d9d680)" +"2020-05-20 18:21:39.501 UTC [common.deliver] Handle -> DEBU 1b87 Waiting for new SeekInfo from 172.18.0.9:53672" +"2020-05-20 18:21:39.502 UTC [common.deliver] Handle -> DEBU 1b88 Attempting to read seek info message from 172.18.0.9:53672" +"2020-05-20 18:21:39.512 UTC [grpc] infof -> DEBU 1b89 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:39.512 UTC [common.deliver] Handle -> WARN 1b8a Error reading from 172.18.0.9:53672: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:39.513 UTC [orderer.common.server] func1 -> DEBU 1b8b Closing Deliver stream" +"2020-05-20 18:21:39.514 UTC [comm.grpc.server] 1 -> INFO 1b8c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53672 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.5805ms +"2020-05-20 18:21:39.801 UTC [orderer.common.server] Deliver -> DEBU 1b8d Starting new Deliver handler" +"2020-05-20 18:21:39.802 UTC [common.deliver] Handle -> DEBU 1b8e Starting new deliver loop for 172.18.0.9:53674" +"2020-05-20 18:21:39.802 UTC [common.deliver] Handle -> DEBU 1b8f Attempting to read seek info message from 172.18.0.9:53674" +"2020-05-20 18:21:39.802 UTC [policies] Evaluate -> DEBU 1b90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:39.802 UTC [policies] Evaluate -> DEBU 1b91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.802 UTC [policies] Evaluate -> DEBU 1b92 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:39.802 UTC [policies] Evaluate -> DEBU 1b93 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.809 UTC [policies] Evaluate -> DEBU 1b94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:39.809 UTC [cauthdsl] func1 -> DEBU 1b95 0xc0010ee240 gate 1589998899809466700 evaluation starts" +"2020-05-20 18:21:39.809 UTC [cauthdsl] func2 -> DEBU 1b96 0xc0010ee240 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.810 UTC [cauthdsl] func2 -> DEBU 1b97 0xc0010ee240 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.810 UTC [cauthdsl] func2 -> DEBU 1b98 0xc0010ee240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:39.810 UTC [cauthdsl] func2 -> DEBU 1b99 0xc0010ee240 principal evaluation fails" +"2020-05-20 18:21:39.811 UTC [cauthdsl] func1 -> DEBU 1b9a 0xc0010ee240 gate 1589998899809466700 evaluation fails" +"2020-05-20 18:21:39.811 UTC [policies] Evaluate -> DEBU 1b9b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.811 UTC [policies] Evaluate -> DEBU 1b9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:39.811 UTC [policies] Evaluate -> DEBU 1b9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:39.812 UTC [cauthdsl] func1 -> DEBU 1b9e 0xc0010eea80 gate 1589998899812015400 evaluation starts" +"2020-05-20 18:21:39.812 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc0010eea80 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.812 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc0010eea80 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.812 UTC [cauthdsl] func2 -> DEBU 1ba1 0xc0010eea80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:39.814 UTC [cauthdsl] func2 -> DEBU 1ba2 0xc0010eea80 principal evaluation fails" +"2020-05-20 18:21:39.814 UTC [cauthdsl] func1 -> DEBU 1ba3 0xc0010eea80 gate 1589998899812015400 evaluation fails" +"2020-05-20 18:21:39.814 UTC [policies] Evaluate -> DEBU 1ba4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.814 UTC [policies] Evaluate -> DEBU 1ba5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:39.815 UTC [policies] Evaluate -> DEBU 1ba6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:39.815 UTC [cauthdsl] func1 -> DEBU 1ba7 0xc0010ef2c0 gate 1589998899815666200 evaluation starts" +"2020-05-20 18:21:39.816 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc0010ef2c0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.816 UTC [cauthdsl] func2 -> DEBU 1ba9 0xc0010ef2c0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.816 UTC [cauthdsl] func2 -> DEBU 1baa 0xc0010ef2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:39.816 UTC [cauthdsl] func2 -> DEBU 1bab 0xc0010ef2c0 principal evaluation fails" +"2020-05-20 18:21:39.819 UTC [cauthdsl] func1 -> DEBU 1bac 0xc0010ef2c0 gate 1589998899815666200 evaluation fails" +"2020-05-20 18:21:39.819 UTC [policies] Evaluate -> DEBU 1bad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.819 UTC [policies] Evaluate -> DEBU 1bae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:39.820 UTC [policies] func1 -> DEBU 1baf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:39.820 UTC [policies] Evaluate -> DEBU 1bb0 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:39.820 UTC [policies] Evaluate -> DEBU 1bb1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:39.821 UTC [policies] Evaluate -> DEBU 1bb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:39.821 UTC [policies] Evaluate -> DEBU 1bb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:39.821 UTC [policies] Evaluate -> DEBU 1bb4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:39.821 UTC [cauthdsl] func1 -> DEBU 1bb5 0xc0010effb0 gate 1589998899821658200 evaluation starts" +"2020-05-20 18:21:39.821 UTC [cauthdsl] func2 -> DEBU 1bb6 0xc0010effb0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:39.822 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc0010effb0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:39.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb8 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:39.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb9 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-05-20 18:21:39.824 UTC [cauthdsl] func2 -> DEBU 1bba 0xc0010effb0 principal matched by identity 0" +"2020-05-20 18:21:39.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.7µs " +"2020-05-20 18:21:39.825 UTC [msp.identity] Verify -> DEBU 1bbc Verify: digest = 00000000 91 4a 7a e3 0e 8c 9e c9 d9 46 66 7b f5 ab 11 3a |.Jz......Ff{...:| +00000010 f3 61 78 74 6d 15 04 9c 39 d6 f9 6e d3 1b 4f 02 |.axtm...9..n..O.|" +"2020-05-20 18:21:39.825 UTC [msp.identity] Verify -> DEBU 1bbd Verify: sig = 00000000 30 45 02 21 00 92 9b 18 41 ae d5 df d2 4e 2d d3 |0E.!....A....N-.| +00000010 c6 39 99 dd 90 02 d4 ce 1f f5 45 0e 59 2f 77 dc |.9........E.Y/w.| +00000020 8d 64 18 50 b9 02 20 0a 04 3a a3 7f 3e bc 6a 6f |.d.P.. ..:..>.jo| +00000030 49 74 39 ed 35 15 5a 5a 82 10 ba ca 82 21 1b 4b |It9.5.ZZ.....!.K| +00000040 b7 7f 81 3a 65 0e d2 |...:e..|" +"2020-05-20 18:21:39.826 UTC [cauthdsl] func2 -> DEBU 1bbe 0xc0010effb0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:39.826 UTC [cauthdsl] func1 -> DEBU 1bbf 0xc0010effb0 gate 1589998899821658200 evaluation succeeds" +"2020-05-20 18:21:39.826 UTC [policies] Evaluate -> DEBU 1bc0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.827 UTC [policies] Evaluate -> DEBU 1bc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:39.827 UTC [policies] Evaluate -> DEBU 1bc2 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.827 UTC [policies] Evaluate -> DEBU 1bc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:39.827 UTC [policies] Evaluate -> DEBU 1bc4 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:39.828 UTC [policies] Evaluate -> DEBU 1bc5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:39.829 UTC [common.deliver] deliverBlocks -> DEBU 1bc6 [channel: businesschannel] Received seekInfo (0xc000cff440) start: > stop: > from 172.18.0.9:53674" +"2020-05-20 18:21:39.829 UTC [fsblkstorage] Next -> DEBU 1bc7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:39.830 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bc8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28474]" +"2020-05-20 18:21:39.830 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc9 Remaining bytes=[110098], Going to peek [8] bytes" +"2020-05-20 18:21:39.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bca Returning blockbytes - length=[28167], placementInfo={fileNum=[0], startOffset=[28474], bytesOffset=[28477]}" +"2020-05-20 18:21:39.831 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bcb blockbytes [28167] read from file [0]" +"2020-05-20 18:21:39.831 UTC [common.deliver] deliverBlocks -> DEBU 1bcc [channel: businesschannel] Delivering block [1] for (0xc000cff440) for 172.18.0.9:53674" +"2020-05-20 18:21:39.832 UTC [common.deliver] deliverBlocks -> DEBU 1bcd [channel: businesschannel] Done delivering to 172.18.0.9:53674 for (0xc000cff440)" +"2020-05-20 18:21:39.832 UTC [common.deliver] Handle -> DEBU 1bce Waiting for new SeekInfo from 172.18.0.9:53674" +"2020-05-20 18:21:39.832 UTC [common.deliver] Handle -> DEBU 1bcf Attempting to read seek info message from 172.18.0.9:53674" +"2020-05-20 18:21:39.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +"2020-05-20 18:21:39.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd1 Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs" +"2020-05-20 18:21:39.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.2µs " +"2020-05-20 18:21:39.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 209.5µs " +"2020-05-20 18:21:39.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd5 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:39.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd4 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:39.852 UTC [common.deliver] Handle -> WARN 1bd6 Error reading from 172.18.0.9:53674: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:39.853 UTC [orderer.common.server] func1 -> DEBU 1bd7 Closing Deliver stream" +"2020-05-20 18:21:39.854 UTC [comm.grpc.server] 1 -> INFO 1bd8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53674 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=52.5835ms +"2020-05-20 18:21:39.855 UTC [grpc] infof -> DEBU 1bd9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:40.043 UTC [orderer.common.server] Deliver -> DEBU 1bda Starting new Deliver handler" +"2020-05-20 18:21:40.044 UTC [common.deliver] Handle -> DEBU 1bdb Starting new deliver loop for 172.18.0.9:53676" +"2020-05-20 18:21:40.044 UTC [common.deliver] Handle -> DEBU 1bdc Attempting to read seek info message from 172.18.0.9:53676" +"2020-05-20 18:21:40.045 UTC [policies] Evaluate -> DEBU 1bdd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:40.046 UTC [policies] Evaluate -> DEBU 1bde This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.046 UTC [policies] Evaluate -> DEBU 1bdf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:40.046 UTC [policies] Evaluate -> DEBU 1be0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.046 UTC [policies] Evaluate -> DEBU 1be1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:40.046 UTC [cauthdsl] func1 -> DEBU 1be2 0xc000ae8ac0 gate 1589998900046978800 evaluation starts" +"2020-05-20 18:21:40.047 UTC [cauthdsl] func2 -> DEBU 1be3 0xc000ae8ac0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.047 UTC [cauthdsl] func2 -> DEBU 1be4 0xc000ae8ac0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.047 UTC [cauthdsl] func2 -> DEBU 1be5 0xc000ae8ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:40.047 UTC [cauthdsl] func2 -> DEBU 1be6 0xc000ae8ac0 principal evaluation fails" +"2020-05-20 18:21:40.048 UTC [cauthdsl] func1 -> DEBU 1be7 0xc000ae8ac0 gate 1589998900046978800 evaluation fails" +"2020-05-20 18:21:40.048 UTC [policies] Evaluate -> DEBU 1be8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:40.048 UTC [policies] Evaluate -> DEBU 1be9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:40.048 UTC [policies] Evaluate -> DEBU 1bea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:40.049 UTC [cauthdsl] func1 -> DEBU 1beb 0xc000ae9480 gate 1589998900049044900 evaluation starts" +"2020-05-20 18:21:40.049 UTC [cauthdsl] func2 -> DEBU 1bec 0xc000ae9480 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.049 UTC [cauthdsl] func2 -> DEBU 1bed 0xc000ae9480 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.049 UTC [cauthdsl] func2 -> DEBU 1bee 0xc000ae9480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:40.049 UTC [cauthdsl] func2 -> DEBU 1bef 0xc000ae9480 principal evaluation fails" +"2020-05-20 18:21:40.050 UTC [cauthdsl] func1 -> DEBU 1bf0 0xc000ae9480 gate 1589998900049044900 evaluation fails" +"2020-05-20 18:21:40.050 UTC [policies] Evaluate -> DEBU 1bf1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:40.050 UTC [policies] Evaluate -> DEBU 1bf2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:40.050 UTC [policies] Evaluate -> DEBU 1bf3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:40.050 UTC [cauthdsl] func1 -> DEBU 1bf4 0xc000ae9d80 gate 1589998900050941800 evaluation starts" +"2020-05-20 18:21:40.051 UTC [cauthdsl] func2 -> DEBU 1bf5 0xc000ae9d80 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.051 UTC [cauthdsl] func2 -> DEBU 1bf6 0xc000ae9d80 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.051 UTC [cauthdsl] func2 -> DEBU 1bf7 0xc000ae9d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:40.051 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc000ae9d80 principal evaluation fails" +"2020-05-20 18:21:40.051 UTC [cauthdsl] func1 -> DEBU 1bf9 0xc000ae9d80 gate 1589998900050941800 evaluation fails" +"2020-05-20 18:21:40.052 UTC [policies] Evaluate -> DEBU 1bfa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:40.052 UTC [policies] Evaluate -> DEBU 1bfb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:40.052 UTC [policies] func1 -> DEBU 1bfc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:40.052 UTC [policies] Evaluate -> DEBU 1bfd Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:40.052 UTC [policies] Evaluate -> DEBU 1bfe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:40.053 UTC [policies] Evaluate -> DEBU 1bff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:40.053 UTC [policies] Evaluate -> DEBU 1c00 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.053 UTC [policies] Evaluate -> DEBU 1c01 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:40.053 UTC [cauthdsl] func1 -> DEBU 1c02 0xc000daea70 gate 1589998900053767300 evaluation starts" +"2020-05-20 18:21:40.053 UTC [cauthdsl] func2 -> DEBU 1c03 0xc000daea70 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.054 UTC [cauthdsl] func2 -> DEBU 1c04 0xc000daea70 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.054 UTC [cauthdsl] func2 -> DEBU 1c05 0xc000daea70 principal matched by identity 0" +"2020-05-20 18:21:40.054 UTC [msp.identity] Verify -> DEBU 1c06 Verify: digest = 00000000 a0 01 19 b1 65 db f8 5b 05 9b f8 52 51 48 6d 0a |....e..[...RQHm.| +00000010 07 15 1b c3 17 88 9c 5c 2b 82 2d 97 91 d9 a9 dc |.......\+.-.....|" +"2020-05-20 18:21:40.055 UTC [msp.identity] Verify -> DEBU 1c07 Verify: sig = 00000000 30 44 02 20 45 f5 21 26 b9 b8 fc 39 a1 ba da 6c |0D. E.!&...9...l| +00000010 af a2 38 80 0d 56 b9 27 9f 76 b9 ab f3 37 7b 2e |..8..V.'.v...7{.| +00000020 d2 a0 6b d6 02 20 1f a9 38 6a f3 51 4b 6f 94 de |..k.. ..8j.QKo..| +00000030 87 6c fa 2d ef 4e 39 de 5f 92 e4 b6 d3 d6 11 ca |.l.-.N9._.......| +00000040 79 8b 16 39 94 d1 |y..9..|" +"2020-05-20 18:21:40.055 UTC [cauthdsl] func2 -> DEBU 1c08 0xc000daea70 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:40.055 UTC [cauthdsl] func1 -> DEBU 1c09 0xc000daea70 gate 1589998900053767300 evaluation succeeds" +"2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0c Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0e Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:40.056 UTC [policies] Evaluate -> DEBU 1c0f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:40.057 UTC [common.deliver] deliverBlocks -> DEBU 1c10 [channel: businesschannel] Received seekInfo (0xc000310300) start: > stop: > from 172.18.0.9:53676" +"2020-05-20 18:21:40.057 UTC [fsblkstorage] Next -> DEBU 1c11 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:40.057 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c12 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56644]" +"2020-05-20 18:21:40.057 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c13 Remaining bytes=[81928], Going to peek [8] bytes" +"2020-05-20 18:21:40.058 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c14 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56644], bytesOffset=[56647]}" +"2020-05-20 18:21:40.058 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c15 blockbytes [28171] read from file [0]" +"2020-05-20 18:21:40.058 UTC [common.deliver] deliverBlocks -> DEBU 1c16 [channel: businesschannel] Delivering block [2] for (0xc000310300) for 172.18.0.9:53676" +"2020-05-20 18:21:40.059 UTC [common.deliver] deliverBlocks -> DEBU 1c17 [channel: businesschannel] Done delivering to 172.18.0.9:53676 for (0xc000310300)" +"2020-05-20 18:21:40.060 UTC [common.deliver] Handle -> DEBU 1c18 Waiting for new SeekInfo from 172.18.0.9:53676" +"2020-05-20 18:21:40.060 UTC [common.deliver] Handle -> DEBU 1c19 Attempting to read seek info message from 172.18.0.9:53676" +"2020-05-20 18:21:40.066 UTC [grpc] infof -> DEBU 1c1a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:40.066 UTC [common.deliver] Handle -> WARN 1c1b Error reading from 172.18.0.9:53676: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:40.067 UTC [orderer.common.server] func1 -> DEBU 1c1c Closing Deliver stream" +"2020-05-20 18:21:40.068 UTC [comm.grpc.server] 1 -> INFO 1c1d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53676 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.7134ms +"2020-05-20 18:21:40.271 UTC [orderer.common.server] Deliver -> DEBU 1c1e Starting new Deliver handler" +"2020-05-20 18:21:40.271 UTC [common.deliver] Handle -> DEBU 1c1f Starting new deliver loop for 172.18.0.9:53678" +"2020-05-20 18:21:40.271 UTC [common.deliver] Handle -> DEBU 1c20 Attempting to read seek info message from 172.18.0.9:53678" +"2020-05-20 18:21:40.274 UTC [policies] Evaluate -> DEBU 1c21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:40.275 UTC [policies] Evaluate -> DEBU 1c22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.275 UTC [policies] Evaluate -> DEBU 1c23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:40.275 UTC [policies] Evaluate -> DEBU 1c24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.275 UTC [policies] Evaluate -> DEBU 1c25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:40.276 UTC [cauthdsl] func1 -> DEBU 1c26 0xc0005be780 gate 1589998900276133700 evaluation starts" +"2020-05-20 18:21:40.276 UTC [cauthdsl] func2 -> DEBU 1c27 0xc0005be780 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.276 UTC [cauthdsl] func2 -> DEBU 1c28 0xc0005be780 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.276 UTC [cauthdsl] func2 -> DEBU 1c29 0xc0005be780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:40.276 UTC [cauthdsl] func2 -> DEBU 1c2a 0xc0005be780 principal evaluation fails" +"2020-05-20 18:21:40.277 UTC [cauthdsl] func1 -> DEBU 1c2b 0xc0005be780 gate 1589998900276133700 evaluation fails" +"2020-05-20 18:21:40.277 UTC [policies] Evaluate -> DEBU 1c2c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:40.277 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:40.278 UTC [policies] Evaluate -> DEBU 1c2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:40.278 UTC [cauthdsl] func1 -> DEBU 1c2f 0xc0005befc0 gate 1589998900278435000 evaluation starts" +"2020-05-20 18:21:40.278 UTC [cauthdsl] func2 -> DEBU 1c30 0xc0005befc0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.278 UTC [cauthdsl] func2 -> DEBU 1c31 0xc0005befc0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.279 UTC [cauthdsl] func2 -> DEBU 1c32 0xc0005befc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:40.279 UTC [cauthdsl] func2 -> DEBU 1c33 0xc0005befc0 principal evaluation fails" +"2020-05-20 18:21:40.279 UTC [cauthdsl] func1 -> DEBU 1c34 0xc0005befc0 gate 1589998900278435000 evaluation fails" +"2020-05-20 18:21:40.279 UTC [policies] Evaluate -> DEBU 1c35 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:40.280 UTC [policies] Evaluate -> DEBU 1c36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:40.280 UTC [policies] Evaluate -> DEBU 1c37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:40.281 UTC [cauthdsl] func1 -> DEBU 1c38 0xc0005bf8d0 gate 1589998900281022300 evaluation starts" +"2020-05-20 18:21:40.281 UTC [cauthdsl] func2 -> DEBU 1c39 0xc0005bf8d0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.281 UTC [cauthdsl] func2 -> DEBU 1c3a 0xc0005bf8d0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.282 UTC [cauthdsl] func2 -> DEBU 1c3b 0xc0005bf8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:40.282 UTC [cauthdsl] func2 -> DEBU 1c3c 0xc0005bf8d0 principal evaluation fails" +"2020-05-20 18:21:40.283 UTC [cauthdsl] func1 -> DEBU 1c3d 0xc0005bf8d0 gate 1589998900281022300 evaluation fails" +"2020-05-20 18:21:40.283 UTC [policies] Evaluate -> DEBU 1c3e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:40.283 UTC [policies] Evaluate -> DEBU 1c3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:40.283 UTC [policies] func1 -> DEBU 1c40 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c41 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c42 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.284 UTC [policies] Evaluate -> DEBU 1c45 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:40.285 UTC [cauthdsl] func1 -> DEBU 1c46 0xc000d94730 gate 1589998900285043300 evaluation starts" +"2020-05-20 18:21:40.285 UTC [cauthdsl] func2 -> DEBU 1c47 0xc000d94730 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.285 UTC [cauthdsl] func2 -> DEBU 1c48 0xc000d94730 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.285 UTC [cauthdsl] func2 -> DEBU 1c49 0xc000d94730 principal matched by identity 0" +"2020-05-20 18:21:40.285 UTC [msp.identity] Verify -> DEBU 1c4a Verify: digest = 00000000 b6 8f 52 bb f0 47 f2 57 b5 2b 05 a2 5e 95 e9 99 |..R..G.W.+..^...| +00000010 98 ff 8f 65 83 7f ba ca 9a 2a 77 d0 a4 8b 8e ed |...e.....*w.....|" +"2020-05-20 18:21:40.286 UTC [msp.identity] Verify -> DEBU 1c4b Verify: sig = 00000000 30 45 02 21 00 d0 17 68 e6 3f b3 2f ef 2d 1f 3c |0E.!...h.?./.-.<| +00000010 6e 5a 1c bf c0 7b 1b fa fe 49 86 0b 82 1e 4c 39 |nZ...{...I....L9| +00000020 20 58 a3 1d 97 02 20 69 57 f3 31 be 0a 87 f1 13 | X.... iW.1.....| +00000030 2c b2 96 dc 95 94 15 da 8c 0d fc b8 38 93 28 9c |,...........8.(.| +00000040 c8 77 08 5d b7 a2 75 |.w.]..u|" +"2020-05-20 18:21:40.286 UTC [cauthdsl] func2 -> DEBU 1c4c 0xc000d94730 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:40.286 UTC [cauthdsl] func1 -> DEBU 1c4d 0xc000d94730 gate 1589998900285043300 evaluation succeeds" +"2020-05-20 18:21:40.286 UTC [policies] Evaluate -> DEBU 1c4e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:40.286 UTC [policies] Evaluate -> DEBU 1c4f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:40.287 UTC [policies] Evaluate -> DEBU 1c50 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:40.287 UTC [policies] Evaluate -> DEBU 1c51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:40.287 UTC [policies] Evaluate -> DEBU 1c52 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:40.287 UTC [policies] Evaluate -> DEBU 1c53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:40.287 UTC [common.deliver] deliverBlocks -> DEBU 1c54 [channel: businesschannel] Received seekInfo (0xc000585180) start: > stop: > from 172.18.0.9:53678" +"2020-05-20 18:21:40.287 UTC [fsblkstorage] Next -> DEBU 1c55 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:40.291 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c56 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84818]" +"2020-05-20 18:21:40.293 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c57 Remaining bytes=[53754], Going to peek [8] bytes" +"2020-05-20 18:21:40.293 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c58 Returning blockbytes - length=[4549], placementInfo={fileNum=[0], startOffset=[84818], bytesOffset=[84820]}" +"2020-05-20 18:21:40.293 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c59 blockbytes [4549] read from file [0]" +"2020-05-20 18:21:40.293 UTC [common.deliver] deliverBlocks -> DEBU 1c5a [channel: businesschannel] Delivering block [3] for (0xc000585180) for 172.18.0.9:53678" +"2020-05-20 18:21:40.294 UTC [common.deliver] deliverBlocks -> DEBU 1c5b [channel: businesschannel] Done delivering to 172.18.0.9:53678 for (0xc000585180)" +"2020-05-20 18:21:40.294 UTC [common.deliver] Handle -> DEBU 1c5c Waiting for new SeekInfo from 172.18.0.9:53678" +"2020-05-20 18:21:40.295 UTC [common.deliver] Handle -> DEBU 1c5d Attempting to read seek info message from 172.18.0.9:53678" +"2020-05-20 18:21:40.304 UTC [common.deliver] Handle -> WARN 1c5e Error reading from 172.18.0.9:53678: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:40.304 UTC [orderer.common.server] func1 -> DEBU 1c5f Closing Deliver stream" +"2020-05-20 18:21:40.304 UTC [grpc] infof -> DEBU 1c60 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:40.304 UTC [comm.grpc.server] 1 -> INFO 1c61 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53678 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5158ms +"2020-05-20 18:21:40.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c62 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:40.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c63 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +"2020-05-20 18:21:40.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c64 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.9µs " +"2020-05-20 18:21:40.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c65 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +"2020-05-20 18:21:40.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c66 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2020-05-20 18:21:40.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 275.5µs " +"2020-05-20 18:21:40.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.1µs " +"2020-05-20 18:21:40.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c69 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:40.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:40.551 UTC [orderer.common.server] Deliver -> DEBU 1c6b Starting new Deliver handler" +"2020-05-20 18:21:40.551 UTC [common.deliver] Handle -> DEBU 1c6c Starting new deliver loop for 172.18.0.9:53680" +"2020-05-20 18:21:40.552 UTC [common.deliver] Handle -> DEBU 1c6d Attempting to read seek info message from 172.18.0.9:53680" +"2020-05-20 18:21:40.553 UTC [policies] Evaluate -> DEBU 1c6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:40.553 UTC [policies] Evaluate -> DEBU 1c6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.553 UTC [policies] Evaluate -> DEBU 1c70 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:40.554 UTC [policies] Evaluate -> DEBU 1c71 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.554 UTC [policies] Evaluate -> DEBU 1c72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:40.554 UTC [cauthdsl] func1 -> DEBU 1c73 0xc000d83280 gate 1589998900554393700 evaluation starts" +"2020-05-20 18:21:40.554 UTC [cauthdsl] func2 -> DEBU 1c74 0xc000d83280 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.554 UTC [cauthdsl] func2 -> DEBU 1c75 0xc000d83280 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.554 UTC [cauthdsl] func2 -> DEBU 1c76 0xc000d83280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:40.555 UTC [cauthdsl] func2 -> DEBU 1c77 0xc000d83280 principal evaluation fails" +"2020-05-20 18:21:40.555 UTC [cauthdsl] func1 -> DEBU 1c78 0xc000d83280 gate 1589998900554393700 evaluation fails" +"2020-05-20 18:21:40.555 UTC [policies] Evaluate -> DEBU 1c79 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:40.555 UTC [policies] Evaluate -> DEBU 1c7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:40.555 UTC [policies] Evaluate -> DEBU 1c7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:40.555 UTC [cauthdsl] func1 -> DEBU 1c7c 0xc000d83d00 gate 1589998900555581500 evaluation starts" +"2020-05-20 18:21:40.555 UTC [cauthdsl] func2 -> DEBU 1c7d 0xc000d83d00 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.555 UTC [cauthdsl] func2 -> DEBU 1c7e 0xc000d83d00 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.555 UTC [cauthdsl] func2 -> DEBU 1c7f 0xc000d83d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c80 0xc000d83d00 principal evaluation fails" +"2020-05-20 18:21:40.556 UTC [cauthdsl] func1 -> DEBU 1c81 0xc000d83d00 gate 1589998900555581500 evaluation fails" +"2020-05-20 18:21:40.556 UTC [policies] Evaluate -> DEBU 1c82 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:40.556 UTC [policies] Evaluate -> DEBU 1c83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:40.556 UTC [policies] Evaluate -> DEBU 1c84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:40.556 UTC [cauthdsl] func1 -> DEBU 1c85 0xc000cba540 gate 1589998900556538300 evaluation starts" +"2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c86 0xc000cba540 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c87 0xc000cba540 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c88 0xc000cba540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:40.556 UTC [cauthdsl] func2 -> DEBU 1c89 0xc000cba540 principal evaluation fails" +"2020-05-20 18:21:40.557 UTC [cauthdsl] func1 -> DEBU 1c8a 0xc000cba540 gate 1589998900556538300 evaluation fails" +"2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:40.557 UTC [policies] func1 -> DEBU 1c8d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c8e Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.557 UTC [policies] Evaluate -> DEBU 1c92 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:40.558 UTC [cauthdsl] func1 -> DEBU 1c93 0xc000cbb350 gate 1589998900558077700 evaluation starts" +"2020-05-20 18:21:40.558 UTC [cauthdsl] func2 -> DEBU 1c94 0xc000cbb350 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.558 UTC [cauthdsl] func2 -> DEBU 1c95 0xc000cbb350 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.558 UTC [cauthdsl] func2 -> DEBU 1c96 0xc000cbb350 principal matched by identity 0" +"2020-05-20 18:21:40.558 UTC [msp.identity] Verify -> DEBU 1c97 Verify: digest = 00000000 8a a8 81 01 3d 5a bc 93 9f ed 87 75 cf 1d 5a a6 |....=Z.....u..Z.| +00000010 41 da a9 72 51 f6 0c 95 18 a5 45 7e f2 a5 ce 9f |A..rQ.....E~....|" +"2020-05-20 18:21:40.558 UTC [msp.identity] Verify -> DEBU 1c98 Verify: sig = 00000000 30 45 02 21 00 e5 ee d6 bb ea 52 49 8e c8 76 85 |0E.!......RI..v.| +00000010 86 0c 8e 9a 53 63 ee 14 9b c0 85 dd 26 dd 00 c8 |....Sc......&...| +00000020 cf d3 f7 86 84 02 20 29 a5 59 9c 67 ae d5 1f 04 |...... ).Y.g....| +00000030 c9 e1 59 95 0c 17 da 24 3b 20 4d fe ba 4f da 98 |..Y....$; M..O..| +00000040 a8 97 31 bb 82 83 60 |..1...`|" +"2020-05-20 18:21:40.559 UTC [cauthdsl] func2 -> DEBU 1c99 0xc000cbb350 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:40.559 UTC [cauthdsl] func1 -> DEBU 1c9a 0xc000cbb350 gate 1589998900558077700 evaluation succeeds" +"2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9d Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:40.559 UTC [policies] Evaluate -> DEBU 1c9f Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:40.560 UTC [policies] Evaluate -> DEBU 1ca0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:40.560 UTC [common.deliver] deliverBlocks -> DEBU 1ca1 [channel: businesschannel] Received seekInfo (0xc000585980) start: > stop: > from 172.18.0.9:53680" +"2020-05-20 18:21:40.560 UTC [fsblkstorage] Next -> DEBU 1ca2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:40.560 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ca3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89369]" +"2020-05-20 18:21:40.560 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ca4 Remaining bytes=[49203], Going to peek [8] bytes" +"2020-05-20 18:21:40.561 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ca5 Returning blockbytes - length=[4011], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +"2020-05-20 18:21:40.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ca6 blockbytes [4011] read from file [0]" +"2020-05-20 18:21:40.563 UTC [common.deliver] deliverBlocks -> DEBU 1ca7 [channel: businesschannel] Delivering block [4] for (0xc000585980) for 172.18.0.9:53680" +"2020-05-20 18:21:40.564 UTC [common.deliver] deliverBlocks -> DEBU 1ca8 [channel: businesschannel] Done delivering to 172.18.0.9:53680 for (0xc000585980)" +"2020-05-20 18:21:40.565 UTC [common.deliver] Handle -> DEBU 1ca9 Waiting for new SeekInfo from 172.18.0.9:53680" +"2020-05-20 18:21:40.565 UTC [common.deliver] Handle -> DEBU 1caa Attempting to read seek info message from 172.18.0.9:53680" +"2020-05-20 18:21:40.575 UTC [grpc] warningf -> DEBU 1cab transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:53680: read: connection reset by peer" +"2020-05-20 18:21:40.575 UTC [grpc] infof -> DEBU 1cac transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:40.575 UTC [common.deliver] Handle -> WARN 1cad Error reading from 172.18.0.9:53680: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:40.576 UTC [orderer.common.server] func1 -> DEBU 1cae Closing Deliver stream" +"2020-05-20 18:21:40.578 UTC [comm.grpc.server] 1 -> INFO 1caf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53680 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1164ms +"2020-05-20 18:21:40.795 UTC [orderer.common.server] Deliver -> DEBU 1cb0 Starting new Deliver handler" +"2020-05-20 18:21:40.795 UTC [common.deliver] Handle -> DEBU 1cb1 Starting new deliver loop for 172.18.0.9:53682" +"2020-05-20 18:21:40.796 UTC [common.deliver] Handle -> DEBU 1cb2 Attempting to read seek info message from 172.18.0.9:53682" +"2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.798 UTC [policies] Evaluate -> DEBU 1cb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:40.798 UTC [cauthdsl] func1 -> DEBU 1cb8 0xc000c8b680 gate 1589998900798750200 evaluation starts" +"2020-05-20 18:21:40.798 UTC [cauthdsl] func2 -> DEBU 1cb9 0xc000c8b680 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.799 UTC [cauthdsl] func2 -> DEBU 1cba 0xc000c8b680 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.799 UTC [cauthdsl] func2 -> DEBU 1cbb 0xc000c8b680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:40.799 UTC [cauthdsl] func2 -> DEBU 1cbc 0xc000c8b680 principal evaluation fails" +"2020-05-20 18:21:40.799 UTC [cauthdsl] func1 -> DEBU 1cbd 0xc000c8b680 gate 1589998900798750200 evaluation fails" +"2020-05-20 18:21:40.799 UTC [policies] Evaluate -> DEBU 1cbe Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:40.799 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:40.799 UTC [policies] Evaluate -> DEBU 1cc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:40.799 UTC [cauthdsl] func1 -> DEBU 1cc1 0xc000c8bf40 gate 1589998900799979100 evaluation starts" +"2020-05-20 18:21:40.800 UTC [cauthdsl] func2 -> DEBU 1cc2 0xc000c8bf40 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.800 UTC [cauthdsl] func2 -> DEBU 1cc3 0xc000c8bf40 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.800 UTC [cauthdsl] func2 -> DEBU 1cc4 0xc000c8bf40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:40.800 UTC [cauthdsl] func2 -> DEBU 1cc5 0xc000c8bf40 principal evaluation fails" +"2020-05-20 18:21:40.800 UTC [cauthdsl] func1 -> DEBU 1cc6 0xc000c8bf40 gate 1589998900799979100 evaluation fails" +"2020-05-20 18:21:40.800 UTC [policies] Evaluate -> DEBU 1cc7 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:40.800 UTC [policies] Evaluate -> DEBU 1cc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:40.800 UTC [policies] Evaluate -> DEBU 1cc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:40.801 UTC [cauthdsl] func1 -> DEBU 1cca 0xc00004e7c0 gate 1589998900801281500 evaluation starts" +"2020-05-20 18:21:40.801 UTC [cauthdsl] func2 -> DEBU 1ccb 0xc00004e7c0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.801 UTC [cauthdsl] func2 -> DEBU 1ccc 0xc00004e7c0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.801 UTC [cauthdsl] func2 -> DEBU 1ccd 0xc00004e7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:40.801 UTC [cauthdsl] func2 -> DEBU 1cce 0xc00004e7c0 principal evaluation fails" +"2020-05-20 18:21:40.801 UTC [cauthdsl] func1 -> DEBU 1ccf 0xc00004e7c0 gate 1589998900801281500 evaluation fails" +"2020-05-20 18:21:40.801 UTC [policies] Evaluate -> DEBU 1cd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:40.801 UTC [policies] Evaluate -> DEBU 1cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:40.801 UTC [policies] func1 -> DEBU 1cd2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd3 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:40.802 UTC [policies] Evaluate -> DEBU 1cd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:40.802 UTC [cauthdsl] func1 -> DEBU 1cd8 0xc00004f610 gate 1589998900802289500 evaluation starts" +"2020-05-20 18:21:40.802 UTC [cauthdsl] func2 -> DEBU 1cd9 0xc00004f610 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:40.802 UTC [cauthdsl] func2 -> DEBU 1cda 0xc00004f610 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:40.802 UTC [cauthdsl] func2 -> DEBU 1cdb 0xc00004f610 principal matched by identity 0" +"2020-05-20 18:21:40.803 UTC [msp.identity] Verify -> DEBU 1cdc Verify: digest = 00000000 f1 4c 0e f0 58 25 ae 53 15 9c 6f 84 84 26 29 e3 |.L..X%.S..o..&).| +00000010 b8 6f 4c 55 c2 25 2e 0a dd bd 1e e6 23 2b 3c 16 |.oLU.%......#+<.|" +"2020-05-20 18:21:40.803 UTC [msp.identity] Verify -> DEBU 1cdd Verify: sig = 00000000 30 45 02 21 00 bd bd 73 1b 26 6a c3 7d 29 f1 c9 |0E.!...s.&j.})..| +00000010 c1 40 c8 94 84 ea db 89 5c 50 64 e4 0c 07 a5 21 |.@......\Pd....!| +00000020 d5 90 60 7e 66 02 20 13 4e 22 ac 7e 64 f3 b9 ab |..`~f. .N".~d...| +00000030 8c 82 af 89 d0 8e 01 98 42 59 6e cc e5 d4 17 ac |........BYn.....| +00000040 80 79 ab a9 55 34 b3 |.y..U4.|" +"2020-05-20 18:21:40.803 UTC [cauthdsl] func2 -> DEBU 1cde 0xc00004f610 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:40.803 UTC [cauthdsl] func1 -> DEBU 1cdf 0xc00004f610 gate 1589998900802289500 evaluation succeeds" +"2020-05-20 18:21:40.803 UTC [policies] Evaluate -> DEBU 1ce0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:40.803 UTC [policies] Evaluate -> DEBU 1ce1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:40.803 UTC [policies] Evaluate -> DEBU 1ce2 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:40.804 UTC [policies] Evaluate -> DEBU 1ce3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:40.804 UTC [policies] Evaluate -> DEBU 1ce4 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:40.804 UTC [policies] Evaluate -> DEBU 1ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:40.804 UTC [common.deliver] deliverBlocks -> DEBU 1ce6 [channel: businesschannel] Received seekInfo (0xc000585f40) start: > stop: > from 172.18.0.9:53682" +"2020-05-20 18:21:40.804 UTC [fsblkstorage] Next -> DEBU 1ce7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:40.805 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ce8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93382]" +"2020-05-20 18:21:40.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ce9 Remaining bytes=[45190], Going to peek [8] bytes" +"2020-05-20 18:21:40.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cea Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93382], bytesOffset=[93384]}" +"2020-05-20 18:21:40.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ceb blockbytes [4009] read from file [0]" +"2020-05-20 18:21:40.805 UTC [common.deliver] deliverBlocks -> DEBU 1cec [channel: businesschannel] Delivering block [5] for (0xc000585f40) for 172.18.0.9:53682" +"2020-05-20 18:21:40.806 UTC [common.deliver] deliverBlocks -> DEBU 1ced [channel: businesschannel] Done delivering to 172.18.0.9:53682 for (0xc000585f40)" +"2020-05-20 18:21:40.806 UTC [common.deliver] Handle -> DEBU 1cee Waiting for new SeekInfo from 172.18.0.9:53682" +"2020-05-20 18:21:40.806 UTC [common.deliver] Handle -> DEBU 1cef Attempting to read seek info message from 172.18.0.9:53682" +"2020-05-20 18:21:40.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:40.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf1 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-05-20 18:21:40.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.4µs " +"2020-05-20 18:21:40.823 UTC [common.deliver] Handle -> WARN 1cf3 Error reading from 172.18.0.9:53682: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:40.824 UTC [orderer.common.server] func1 -> DEBU 1cf4 Closing Deliver stream" +"2020-05-20 18:21:40.825 UTC [comm.grpc.server] 1 -> INFO 1cf5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53682 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.6377ms +"2020-05-20 18:21:40.826 UTC [grpc] infof -> DEBU 1cf6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:40.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf7 Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +"2020-05-20 18:21:40.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.2µs " +"2020-05-20 18:21:40.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64µs " +"2020-05-20 18:21:40.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfa Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:40.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:40.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfc Sending msg of 28 bytes to 3 on channel businesschannel took 340.4µs" +"2020-05-20 18:21:41.140 UTC [orderer.common.server] Deliver -> DEBU 1cfd Starting new Deliver handler" +"2020-05-20 18:21:41.140 UTC [common.deliver] Handle -> DEBU 1cfe Starting new deliver loop for 172.18.0.9:53684" +"2020-05-20 18:21:41.141 UTC [common.deliver] Handle -> DEBU 1cff Attempting to read seek info message from 172.18.0.9:53684" +"2020-05-20 18:21:41.142 UTC [policies] Evaluate -> DEBU 1d00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:41.142 UTC [policies] Evaluate -> DEBU 1d01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.143 UTC [policies] Evaluate -> DEBU 1d02 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-05-20 18:21:41.143 UTC [policies] Evaluate -> DEBU 1d03 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.143 UTC [policies] Evaluate -> DEBU 1d04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-05-20 18:21:41.143 UTC [cauthdsl] func1 -> DEBU 1d05 0xc000282120 gate 1589998901143697500 evaluation starts" +"2020-05-20 18:21:41.144 UTC [cauthdsl] func2 -> DEBU 1d06 0xc000282120 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:41.144 UTC [cauthdsl] func2 -> DEBU 1d07 0xc000282120 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:41.144 UTC [cauthdsl] func2 -> DEBU 1d08 0xc000282120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-05-20 18:21:41.144 UTC [cauthdsl] func2 -> DEBU 1d09 0xc000282120 principal evaluation fails" +"2020-05-20 18:21:41.145 UTC [cauthdsl] func1 -> DEBU 1d0a 0xc000282120 gate 1589998901143697500 evaluation fails" +"2020-05-20 18:21:41.145 UTC [policies] Evaluate -> DEBU 1d0b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:41.145 UTC [policies] Evaluate -> DEBU 1d0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-05-20 18:21:41.145 UTC [policies] Evaluate -> DEBU 1d0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-05-20 18:21:41.145 UTC [cauthdsl] func1 -> DEBU 1d0e 0xc000282ae0 gate 1589998901145887200 evaluation starts" +"2020-05-20 18:21:41.146 UTC [cauthdsl] func2 -> DEBU 1d0f 0xc000282ae0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:41.146 UTC [cauthdsl] func2 -> DEBU 1d10 0xc000282ae0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:41.146 UTC [cauthdsl] func2 -> DEBU 1d11 0xc000282ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-05-20 18:21:41.146 UTC [cauthdsl] func2 -> DEBU 1d12 0xc000282ae0 principal evaluation fails" +"2020-05-20 18:21:41.147 UTC [cauthdsl] func1 -> DEBU 1d13 0xc000282ae0 gate 1589998901145887200 evaluation fails" +"2020-05-20 18:21:41.147 UTC [policies] Evaluate -> DEBU 1d14 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:41.147 UTC [policies] Evaluate -> DEBU 1d15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-05-20 18:21:41.147 UTC [policies] Evaluate -> DEBU 1d16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-05-20 18:21:41.147 UTC [cauthdsl] func1 -> DEBU 1d17 0xc000283910 gate 1589998901147973100 evaluation starts" +"2020-05-20 18:21:41.148 UTC [cauthdsl] func2 -> DEBU 1d18 0xc000283910 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:41.148 UTC [cauthdsl] func2 -> DEBU 1d19 0xc000283910 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:41.148 UTC [cauthdsl] func2 -> DEBU 1d1a 0xc000283910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-05-20 18:21:41.149 UTC [cauthdsl] func2 -> DEBU 1d1b 0xc000283910 principal evaluation fails" +"2020-05-20 18:21:41.149 UTC [cauthdsl] func1 -> DEBU 1d1c 0xc000283910 gate 1589998901147973100 evaluation fails" +"2020-05-20 18:21:41.149 UTC [policies] Evaluate -> DEBU 1d1d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:41.149 UTC [policies] Evaluate -> DEBU 1d1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-05-20 18:21:41.149 UTC [policies] func1 -> DEBU 1d1f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-05-20 18:21:41.150 UTC [policies] Evaluate -> DEBU 1d20 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-05-20 18:21:41.150 UTC [policies] Evaluate -> DEBU 1d21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-05-20 18:21:41.150 UTC [policies] Evaluate -> DEBU 1d22 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:41.150 UTC [policies] Evaluate -> DEBU 1d23 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.151 UTC [policies] Evaluate -> DEBU 1d24 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:41.151 UTC [cauthdsl] func1 -> DEBU 1d25 0xc00023c900 gate 1589998901151228100 evaluation starts" +"2020-05-20 18:21:41.151 UTC [cauthdsl] func2 -> DEBU 1d26 0xc00023c900 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:41.151 UTC [cauthdsl] func2 -> DEBU 1d27 0xc00023c900 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:41.153 UTC [cauthdsl] func2 -> DEBU 1d28 0xc00023c900 principal matched by identity 0" +"2020-05-20 18:21:41.153 UTC [msp.identity] Verify -> DEBU 1d29 Verify: digest = 00000000 ed 29 c6 e5 ac a1 c6 c7 52 6e c3 f9 3c 35 c3 50 |.)......Rn..<5.P| +00000010 a0 3b 69 13 b7 7c df b4 dc 4a a0 4c c4 da a1 59 |.;i..|...J.L...Y|" +"2020-05-20 18:21:41.153 UTC [msp.identity] Verify -> DEBU 1d2a Verify: sig = 00000000 30 44 02 20 3a 08 72 9a aa d9 a0 5a 69 e0 9b d7 |0D. :.r....Zi...| +00000010 58 bc 2f 66 ba 7f d8 58 20 9a b5 96 28 58 c4 99 |X./f...X ...(X..| +00000020 9b ae 13 fe 02 20 1b 02 86 00 d6 b4 41 73 06 65 |..... ......As.e| +00000030 4b 98 4a 81 27 78 fe 36 ed d1 cc d5 01 9c 6e 4a |K.J.'x.6......nJ| +00000040 e1 4d 2b 8c f2 51 |.M+..Q|" +"2020-05-20 18:21:41.154 UTC [cauthdsl] func2 -> DEBU 1d2b 0xc00023c900 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:41.154 UTC [cauthdsl] func1 -> DEBU 1d2c 0xc00023c900 gate 1589998901151228100 evaluation succeeds" +"2020-05-20 18:21:41.154 UTC [policies] Evaluate -> DEBU 1d2d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d2e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d2f Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d31 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:41.155 UTC [policies] Evaluate -> DEBU 1d32 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:41.155 UTC [common.deliver] deliverBlocks -> DEBU 1d33 [channel: businesschannel] Received seekInfo (0xc0013d12c0) start: > stop: > from 172.18.0.9:53684" +"2020-05-20 18:21:41.156 UTC [fsblkstorage] Next -> DEBU 1d34 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-05-20 18:21:41.156 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d35 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97393]" +"2020-05-20 18:21:41.156 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d36 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-05-20 18:21:41.156 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d37 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97393], bytesOffset=[97396]}" +"2020-05-20 18:21:41.157 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d38 blockbytes [41176] read from file [0]" +"2020-05-20 18:21:41.157 UTC [common.deliver] deliverBlocks -> DEBU 1d39 [channel: businesschannel] Delivering block [6] for (0xc0013d12c0) for 172.18.0.9:53684" +"2020-05-20 18:21:41.158 UTC [common.deliver] deliverBlocks -> DEBU 1d3a [channel: businesschannel] Done delivering to 172.18.0.9:53684 for (0xc0013d12c0)" +"2020-05-20 18:21:41.158 UTC [common.deliver] Handle -> DEBU 1d3b Waiting for new SeekInfo from 172.18.0.9:53684" +"2020-05-20 18:21:41.159 UTC [common.deliver] Handle -> DEBU 1d3c Attempting to read seek info message from 172.18.0.9:53684" +"2020-05-20 18:21:41.169 UTC [common.deliver] Handle -> WARN 1d3d Error reading from 172.18.0.9:53684: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:41.171 UTC [orderer.common.server] func1 -> DEBU 1d3e Closing Deliver stream" +"2020-05-20 18:21:41.172 UTC [comm.grpc.server] 1 -> INFO 1d3f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53684 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.0842ms +"2020-05-20 18:21:41.173 UTC [grpc] infof -> DEBU 1d40 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:41.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d41 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:41.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d42 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-05-20 18:21:41.323 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d43 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 212.8µs " +"2020-05-20 18:21:41.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d44 Sending msg of 28 bytes to 2 on channel businesschannel took 16.6µs" +"2020-05-20 18:21:41.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d45 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +"2020-05-20 18:21:41.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.1µs " +"2020-05-20 18:21:41.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.5µs " +"2020-05-20 18:21:41.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d48 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:41.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d49 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:41.444 UTC [orderer.common.server] Deliver -> DEBU 1d4a Starting new Deliver handler" +"2020-05-20 18:21:41.445 UTC [common.deliver] Handle -> DEBU 1d4b Starting new deliver loop for 172.18.0.9:53686" +"2020-05-20 18:21:41.445 UTC [common.deliver] Handle -> DEBU 1d4c Attempting to read seek info message from 172.18.0.9:53686" +"2020-05-20 18:21:41.446 UTC [policies] Evaluate -> DEBU 1d4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:41.447 UTC [policies] Evaluate -> DEBU 1d4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.447 UTC [policies] Evaluate -> DEBU 1d4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:41.447 UTC [policies] Evaluate -> DEBU 1d50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.447 UTC [policies] Evaluate -> DEBU 1d51 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:41.447 UTC [cauthdsl] func1 -> DEBU 1d52 0xc0002f7bf0 gate 1589998901447986200 evaluation starts" +"2020-05-20 18:21:41.448 UTC [cauthdsl] func2 -> DEBU 1d53 0xc0002f7bf0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:41.448 UTC [cauthdsl] func2 -> DEBU 1d54 0xc0002f7bf0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:41.448 UTC [cauthdsl] func2 -> DEBU 1d55 0xc0002f7bf0 principal matched by identity 0" +"2020-05-20 18:21:41.448 UTC [msp.identity] Verify -> DEBU 1d56 Verify: digest = 00000000 c7 76 17 12 f8 64 71 64 b1 59 59 1e 66 18 a3 fc |.v...dqd.YY.f...| +00000010 a1 6d c7 3b 02 39 1d 80 ca 8b 33 82 9a a6 57 f5 |.m.;.9....3...W.|" +"2020-05-20 18:21:41.449 UTC [msp.identity] Verify -> DEBU 1d57 Verify: sig = 00000000 30 45 02 21 00 8f 73 f8 9c 6b d2 ec 79 10 b6 e7 |0E.!..s..k..y...| +00000010 fa 89 3c a3 59 74 92 93 67 97 4d fc e7 19 43 73 |..<.Yt..g.M...Cs| +00000020 0c 50 2d ab 26 02 20 11 2b 43 07 ad b4 0a 2c 8c |.P-.&. .+C....,.| +00000030 c1 04 75 da 36 c4 f8 4a 9a a8 3e b0 0d 8c b6 24 |..u.6..J..>....$| +00000040 2b 87 81 a3 a7 6b 15 |+....k.|" +"2020-05-20 18:21:41.449 UTC [cauthdsl] func2 -> DEBU 1d58 0xc0002f7bf0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:41.450 UTC [cauthdsl] func1 -> DEBU 1d59 0xc0002f7bf0 gate 1589998901447986200 evaluation succeeds" +"2020-05-20 18:21:41.450 UTC [policies] Evaluate -> DEBU 1d5a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.450 UTC [policies] Evaluate -> DEBU 1d5b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.450 UTC [policies] Evaluate -> DEBU 1d5c Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.451 UTC [policies] Evaluate -> DEBU 1d5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.451 UTC [policies] Evaluate -> DEBU 1d5e Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:41.451 UTC [policies] Evaluate -> DEBU 1d5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:41.451 UTC [common.deliver] deliverBlocks -> DEBU 1d60 [channel: testchainid] Received seekInfo (0xc0013d1c00) start: > stop: > from 172.18.0.9:53686" +"2020-05-20 18:21:41.451 UTC [fsblkstorage] Next -> DEBU 1d61 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:41.452 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d62 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-05-20 18:21:41.452 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d63 Remaining bytes=[30409], Going to peek [8] bytes" +"2020-05-20 18:21:41.452 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d64 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-05-20 18:21:41.452 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d65 blockbytes [30406] read from file [0]" +"2020-05-20 18:21:41.453 UTC [common.deliver] deliverBlocks -> DEBU 1d66 [channel: testchainid] Delivering block [1] for (0xc0013d1c00) for 172.18.0.9:53686" +"2020-05-20 18:21:41.453 UTC [common.deliver] deliverBlocks -> DEBU 1d67 [channel: testchainid] Done delivering to 172.18.0.9:53686 for (0xc0013d1c00)" +"2020-05-20 18:21:41.454 UTC [common.deliver] Handle -> DEBU 1d68 Waiting for new SeekInfo from 172.18.0.9:53686" +"2020-05-20 18:21:41.454 UTC [common.deliver] Handle -> DEBU 1d69 Attempting to read seek info message from 172.18.0.9:53686" +"2020-05-20 18:21:41.460 UTC [common.deliver] Handle -> WARN 1d6a Error reading from 172.18.0.9:53686: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:41.461 UTC [orderer.common.server] func1 -> DEBU 1d6b Closing Deliver stream" +"2020-05-20 18:21:41.461 UTC [comm.grpc.server] 1 -> INFO 1d6c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53686 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.0797ms +"2020-05-20 18:21:41.462 UTC [grpc] infof -> DEBU 1d6d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:41.618 UTC [orderer.common.server] Deliver -> DEBU 1d6e Starting new Deliver handler" +"2020-05-20 18:21:41.618 UTC [common.deliver] Handle -> DEBU 1d6f Starting new deliver loop for 172.18.0.9:53688" +"2020-05-20 18:21:41.619 UTC [common.deliver] Handle -> DEBU 1d70 Attempting to read seek info message from 172.18.0.9:53688" +"2020-05-20 18:21:41.620 UTC [policies] Evaluate -> DEBU 1d71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:41.620 UTC [policies] Evaluate -> DEBU 1d72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.620 UTC [policies] Evaluate -> DEBU 1d73 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:41.621 UTC [policies] Evaluate -> DEBU 1d74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.621 UTC [policies] Evaluate -> DEBU 1d75 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:41.621 UTC [cauthdsl] func1 -> DEBU 1d76 0xc00056e040 gate 1589998901621409900 evaluation starts" +"2020-05-20 18:21:41.621 UTC [cauthdsl] func2 -> DEBU 1d77 0xc00056e040 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:41.621 UTC [cauthdsl] func2 -> DEBU 1d78 0xc00056e040 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:41.622 UTC [cauthdsl] func2 -> DEBU 1d79 0xc00056e040 principal matched by identity 0" +"2020-05-20 18:21:41.622 UTC [msp.identity] Verify -> DEBU 1d7a Verify: digest = 00000000 09 5a 94 5a 24 d0 5d 6f c1 99 22 4b 84 5c 29 ad |.Z.Z$.]o.."K.\).| +00000010 a9 be 1d eb 26 b0 c0 2f a0 f6 79 f1 5a f7 61 e4 |....&../..y.Z.a.|" +"2020-05-20 18:21:41.622 UTC [msp.identity] Verify -> DEBU 1d7b Verify: sig = 00000000 30 44 02 20 79 7b 72 01 a8 82 7f bf 98 d0 b4 ca |0D. y{r.........| +00000010 19 b1 90 e7 ca 22 1c 5a e6 02 65 62 74 92 3e ae |.....".Z..ebt.>.| +00000020 95 5b 8e bc 02 20 32 f7 cc 64 5f cb 7e 91 56 a6 |.[... 2..d_.~.V.| +00000030 f1 2d 16 c7 23 59 b0 3d 8b 07 60 9a 65 1a fb 8f |.-..#Y.=..`.e...| +00000040 25 a3 cc db 87 52 |%....R|" +"2020-05-20 18:21:41.623 UTC [cauthdsl] func2 -> DEBU 1d7c 0xc00056e040 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:41.623 UTC [cauthdsl] func1 -> DEBU 1d7d 0xc00056e040 gate 1589998901621409900 evaluation succeeds" +"2020-05-20 18:21:41.623 UTC [policies] Evaluate -> DEBU 1d7e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.623 UTC [policies] Evaluate -> DEBU 1d7f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.623 UTC [policies] Evaluate -> DEBU 1d80 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.623 UTC [policies] Evaluate -> DEBU 1d81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.624 UTC [policies] Evaluate -> DEBU 1d82 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:41.624 UTC [policies] Evaluate -> DEBU 1d83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:41.624 UTC [common.deliver] deliverBlocks -> DEBU 1d84 [channel: testchainid] Received seekInfo (0xc001112240) start: > stop: > from 172.18.0.9:53688" +"2020-05-20 18:21:41.624 UTC [fsblkstorage] Next -> DEBU 1d85 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:41.625 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d86 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-05-20 18:21:41.625 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d87 Remaining bytes=[30409], Going to peek [8] bytes" +"2020-05-20 18:21:41.625 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d88 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-05-20 18:21:41.626 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d89 blockbytes [30406] read from file [0]" +"2020-05-20 18:21:41.626 UTC [common.deliver] deliverBlocks -> DEBU 1d8a [channel: testchainid] Delivering block [1] for (0xc001112240) for 172.18.0.9:53688" +"2020-05-20 18:21:41.626 UTC [common.deliver] deliverBlocks -> DEBU 1d8b [channel: testchainid] Done delivering to 172.18.0.9:53688 for (0xc001112240)" +"2020-05-20 18:21:41.626 UTC [common.deliver] Handle -> DEBU 1d8c Waiting for new SeekInfo from 172.18.0.9:53688" +"2020-05-20 18:21:41.627 UTC [common.deliver] Handle -> DEBU 1d8d Attempting to read seek info message from 172.18.0.9:53688" +"2020-05-20 18:21:41.632 UTC [policies] Evaluate -> DEBU 1d8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:41.632 UTC [policies] Evaluate -> DEBU 1d8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.633 UTC [policies] Evaluate -> DEBU 1d90 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:41.633 UTC [policies] Evaluate -> DEBU 1d91 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.633 UTC [policies] Evaluate -> DEBU 1d92 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:41.633 UTC [cauthdsl] func1 -> DEBU 1d93 0xc00059e4a0 gate 1589998901633819300 evaluation starts" +"2020-05-20 18:21:41.634 UTC [cauthdsl] func2 -> DEBU 1d94 0xc00059e4a0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:41.634 UTC [cauthdsl] func2 -> DEBU 1d95 0xc00059e4a0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:41.634 UTC [cauthdsl] func2 -> DEBU 1d96 0xc00059e4a0 principal matched by identity 0" +"2020-05-20 18:21:41.634 UTC [msp.identity] Verify -> DEBU 1d97 Verify: digest = 00000000 9e 17 23 1b a7 ed 91 6b 07 77 34 73 90 e4 92 2e |..#....k.w4s....| +00000010 c4 5a 79 e5 38 71 8e 40 37 2e e9 12 a4 09 13 0a |.Zy.8q.@7.......|" +"2020-05-20 18:21:41.635 UTC [msp.identity] Verify -> DEBU 1d98 Verify: sig = 00000000 30 45 02 21 00 87 af f8 28 16 26 b7 8b 87 19 55 |0E.!....(.&....U| +00000010 7d 65 33 36 f9 9c bb 10 6d 98 7e f0 66 2a ad 44 |}e36....m.~.f*.D| +00000020 86 8b 28 ae 4e 02 20 61 43 f5 48 f9 32 17 b6 ac |..(.N. aC.H.2...| +00000030 fc b7 5d 45 82 4e 92 a7 47 83 61 c1 97 29 aa b4 |..]E.N..G.a..)..| +00000040 1c 2c 56 6a e5 37 4f |.,Vj.7O|" +"2020-05-20 18:21:41.635 UTC [cauthdsl] func2 -> DEBU 1d99 0xc00059e4a0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:41.636 UTC [cauthdsl] func1 -> DEBU 1d9a 0xc00059e4a0 gate 1589998901633819300 evaluation succeeds" +"2020-05-20 18:21:41.636 UTC [policies] Evaluate -> DEBU 1d9b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.636 UTC [policies] Evaluate -> DEBU 1d9c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.636 UTC [policies] Evaluate -> DEBU 1d9d Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.637 UTC [policies] Evaluate -> DEBU 1d9e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.637 UTC [policies] Evaluate -> DEBU 1d9f Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:41.637 UTC [policies] Evaluate -> DEBU 1da0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:41.638 UTC [common.deliver] deliverBlocks -> DEBU 1da1 [channel: testchainid] Received seekInfo (0xc001112640) start: > stop: > from 172.18.0.9:53688" +"2020-05-20 18:21:41.638 UTC [fsblkstorage] Next -> DEBU 1da2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:41.638 UTC [fsblkstorage] newBlockfileStream -> DEBU 1da3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:21:41.638 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1da4 Remaining bytes=[53339], Going to peek [8] bytes" +"2020-05-20 18:21:41.639 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1da5 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:21:41.639 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1da6 blockbytes [22927] read from file [0]" +"2020-05-20 18:21:41.639 UTC [common.deliver] deliverBlocks -> DEBU 1da7 [channel: testchainid] Delivering block [0] for (0xc001112640) for 172.18.0.9:53688" +"2020-05-20 18:21:41.639 UTC [common.deliver] deliverBlocks -> DEBU 1da8 [channel: testchainid] Done delivering to 172.18.0.9:53688 for (0xc001112640)" +"2020-05-20 18:21:41.640 UTC [common.deliver] Handle -> DEBU 1da9 Waiting for new SeekInfo from 172.18.0.9:53688" +"2020-05-20 18:21:41.640 UTC [common.deliver] Handle -> DEBU 1daa Attempting to read seek info message from 172.18.0.9:53688" +"2020-05-20 18:21:41.645 UTC [common.deliver] Handle -> WARN 1dab Error reading from 172.18.0.9:53688: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:41.645 UTC [orderer.common.server] func1 -> DEBU 1dac Closing Deliver stream" +"2020-05-20 18:21:41.646 UTC [comm.grpc.server] 1 -> INFO 1dad streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53688 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.6382ms +"2020-05-20 18:21:41.646 UTC [grpc] infof -> DEBU 1dae transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:41.789 UTC [orderer.common.server] Deliver -> DEBU 1daf Starting new Deliver handler" +"2020-05-20 18:21:41.790 UTC [common.deliver] Handle -> DEBU 1db0 Starting new deliver loop for 172.18.0.9:53690" +"2020-05-20 18:21:41.791 UTC [common.deliver] Handle -> DEBU 1db1 Attempting to read seek info message from 172.18.0.9:53690" +"2020-05-20 18:21:41.793 UTC [policies] Evaluate -> DEBU 1db2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:41.794 UTC [policies] Evaluate -> DEBU 1db3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.795 UTC [policies] Evaluate -> DEBU 1db4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:41.795 UTC [policies] Evaluate -> DEBU 1db5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.796 UTC [policies] Evaluate -> DEBU 1db6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:41.796 UTC [cauthdsl] func1 -> DEBU 1db7 0xc0009d8f70 gate 1589998901796896300 evaluation starts" +"2020-05-20 18:21:41.797 UTC [cauthdsl] func2 -> DEBU 1db8 0xc0009d8f70 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:41.797 UTC [cauthdsl] func2 -> DEBU 1db9 0xc0009d8f70 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:41.798 UTC [cauthdsl] func2 -> DEBU 1dba 0xc0009d8f70 principal matched by identity 0" +"2020-05-20 18:21:41.799 UTC [msp.identity] Verify -> DEBU 1dbb Verify: digest = 00000000 fb 7c ef a1 7a d7 27 8a a6 3b f1 b2 c1 7f e0 4c |.|..z.'..;.....L| +00000010 7a a4 3a c9 3f c6 1e c6 d5 e9 79 63 cd a5 c7 bc |z.:.?.....yc....|" +"2020-05-20 18:21:41.799 UTC [msp.identity] Verify -> DEBU 1dbc Verify: sig = 00000000 30 45 02 21 00 fe d7 b4 83 19 f4 8c 8d 27 10 8d |0E.!.........'..| +00000010 d0 03 60 c1 2a 89 aa 5e 7f 4c f1 41 8c a4 c1 84 |..`.*..^.L.A....| +00000020 35 eb 13 18 a9 02 20 19 69 89 94 73 e0 8c f6 d2 |5..... .i..s....| +00000030 ec a0 79 74 de 52 40 eb a9 a9 60 41 62 b1 6d 02 |..yt.R@...`Ab.m.| +00000040 ff e8 0f ec b0 db 35 |......5|" +"2020-05-20 18:21:41.800 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc0009d8f70 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:41.801 UTC [cauthdsl] func1 -> DEBU 1dbe 0xc0009d8f70 gate 1589998901796896300 evaluation succeeds" +"2020-05-20 18:21:41.801 UTC [policies] Evaluate -> DEBU 1dbf Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.802 UTC [policies] Evaluate -> DEBU 1dc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:41.802 UTC [policies] Evaluate -> DEBU 1dc1 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.802 UTC [policies] Evaluate -> DEBU 1dc2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:41.802 UTC [policies] Evaluate -> DEBU 1dc3 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:41.803 UTC [policies] Evaluate -> DEBU 1dc4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:41.803 UTC [common.deliver] deliverBlocks -> DEBU 1dc5 [channel: testchainid] Received seekInfo (0xc001113000) start: > stop: > from 172.18.0.9:53690" +"2020-05-20 18:21:41.803 UTC [fsblkstorage] Next -> DEBU 1dc6 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:41.803 UTC [fsblkstorage] newBlockfileStream -> DEBU 1dc7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-05-20 18:21:41.804 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc8 Remaining bytes=[53339], Going to peek [8] bytes" +"2020-05-20 18:21:41.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc9 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-05-20 18:21:41.805 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dca blockbytes [22927] read from file [0]" +"2020-05-20 18:21:41.805 UTC [common.deliver] deliverBlocks -> DEBU 1dcb [channel: testchainid] Delivering block [0] for (0xc001113000) for 172.18.0.9:53690" +"2020-05-20 18:21:41.806 UTC [common.deliver] deliverBlocks -> DEBU 1dcc [channel: testchainid] Done delivering to 172.18.0.9:53690 for (0xc001113000)" +"2020-05-20 18:21:41.807 UTC [common.deliver] Handle -> DEBU 1dcd Waiting for new SeekInfo from 172.18.0.9:53690" +"2020-05-20 18:21:41.807 UTC [common.deliver] Handle -> DEBU 1dce Attempting to read seek info message from 172.18.0.9:53690" +"2020-05-20 18:21:41.814 UTC [common.deliver] Handle -> WARN 1dcf Error reading from 172.18.0.9:53690: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:41.816 UTC [orderer.common.server] func1 -> DEBU 1dd0 Closing Deliver stream" +"2020-05-20 18:21:41.816 UTC [comm.grpc.server] 1 -> INFO 1dd1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53690 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1479ms +"2020-05-20 18:21:41.817 UTC [grpc] infof -> DEBU 1dd2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:41.824 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dd3 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:41.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dd4 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2020-05-20 18:21:41.825 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 407.5µs " +"2020-05-20 18:21:41.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dd6 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2020-05-20 18:21:41.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dd7 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +"2020-05-20 18:21:41.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +"2020-05-20 18:21:41.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 423.9µs " +"2020-05-20 18:21:41.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dda Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:41.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ddb Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:41.997 UTC [orderer.common.server] Deliver -> DEBU 1ddc Starting new Deliver handler" +"2020-05-20 18:21:41.998 UTC [common.deliver] Handle -> DEBU 1ddd Starting new deliver loop for 172.18.0.9:53692" +"2020-05-20 18:21:41.998 UTC [common.deliver] Handle -> DEBU 1dde Attempting to read seek info message from 172.18.0.9:53692" +"2020-05-20 18:21:41.999 UTC [policies] Evaluate -> DEBU 1ddf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-05-20 18:21:41.999 UTC [policies] Evaluate -> DEBU 1de0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:41.999 UTC [policies] Evaluate -> DEBU 1de1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-05-20 18:21:41.999 UTC [policies] Evaluate -> DEBU 1de2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-05-20 18:21:42.000 UTC [policies] Evaluate -> DEBU 1de3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-05-20 18:21:42.000 UTC [cauthdsl] func1 -> DEBU 1de4 0xc0009f9ed0 gate 1589998902000496700 evaluation starts" +"2020-05-20 18:21:42.000 UTC [cauthdsl] func2 -> DEBU 1de5 0xc0009f9ed0 signed by 0 principal evaluation starts (used [false])" +"2020-05-20 18:21:42.000 UTC [cauthdsl] func2 -> DEBU 1de6 0xc0009f9ed0 processing identity 0 with bytes of fe0d40" +"2020-05-20 18:21:42.001 UTC [cauthdsl] func2 -> DEBU 1de7 0xc0009f9ed0 principal matched by identity 0" +"2020-05-20 18:21:42.001 UTC [msp.identity] Verify -> DEBU 1de8 Verify: digest = 00000000 27 b5 fd 25 3f d1 2e b2 a6 d4 e9 61 a8 24 1c 47 |'..%?......a.$.G| +00000010 5c dd d4 c9 ad 15 2d 7c 11 6a 7b e0 43 89 34 1b |\.....-|.j{.C.4.|" +"2020-05-20 18:21:42.001 UTC [msp.identity] Verify -> DEBU 1de9 Verify: sig = 00000000 30 45 02 21 00 e4 c0 78 9e f4 fe b0 b3 b9 90 61 |0E.!...x.......a| +00000010 1a 45 c4 58 f6 10 b2 ec 98 b6 5b d5 6d 1d 46 7f |.E.X......[.m.F.| +00000020 e9 20 99 a2 03 02 20 4b 5f 9f d7 42 e5 1b a0 e0 |. .... K_..B....| +00000030 3f 0c 0c a0 ac a5 cb 23 34 42 a7 48 ab 81 b3 8b |?......#4B.H....| +00000040 ba dd 84 ec eb 18 d4 |.......|" +"2020-05-20 18:21:42.002 UTC [cauthdsl] func2 -> DEBU 1dea 0xc0009f9ed0 principal evaluation succeeds for identity 0" +"2020-05-20 18:21:42.002 UTC [cauthdsl] func1 -> DEBU 1deb 0xc0009f9ed0 gate 1589998902000496700 evaluation succeeds" +"2020-05-20 18:21:42.002 UTC [policies] Evaluate -> DEBU 1dec Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:42.002 UTC [policies] Evaluate -> DEBU 1ded == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-05-20 18:21:42.002 UTC [policies] Evaluate -> DEBU 1dee Signature set satisfies policy /Channel/Orderer/Readers" +"2020-05-20 18:21:42.002 UTC [policies] Evaluate -> DEBU 1def == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-05-20 18:21:42.003 UTC [policies] Evaluate -> DEBU 1df0 Signature set satisfies policy /Channel/Readers" +"2020-05-20 18:21:42.003 UTC [policies] Evaluate -> DEBU 1df1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-05-20 18:21:42.003 UTC [common.deliver] deliverBlocks -> DEBU 1df2 [channel: testchainid] Received seekInfo (0xc001113cc0) start: > stop: > from 172.18.0.9:53692" +"2020-05-20 18:21:42.003 UTC [fsblkstorage] Next -> DEBU 1df3 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-05-20 18:21:42.003 UTC [fsblkstorage] newBlockfileStream -> DEBU 1df4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-05-20 18:21:42.003 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1df5 Remaining bytes=[30409], Going to peek [8] bytes" +"2020-05-20 18:21:42.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1df6 Returning blockbytes - length=[30406], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-05-20 18:21:42.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1df7 blockbytes [30406] read from file [0]" +"2020-05-20 18:21:42.004 UTC [common.deliver] deliverBlocks -> DEBU 1df8 [channel: testchainid] Delivering block [1] for (0xc001113cc0) for 172.18.0.9:53692" +"2020-05-20 18:21:42.004 UTC [common.deliver] deliverBlocks -> DEBU 1df9 [channel: testchainid] Done delivering to 172.18.0.9:53692 for (0xc001113cc0)" +"2020-05-20 18:21:42.004 UTC [common.deliver] Handle -> DEBU 1dfa Waiting for new SeekInfo from 172.18.0.9:53692" +"2020-05-20 18:21:42.004 UTC [common.deliver] Handle -> DEBU 1dfb Attempting to read seek info message from 172.18.0.9:53692" +"2020-05-20 18:21:42.013 UTC [common.deliver] Handle -> WARN 1dfc Error reading from 172.18.0.9:53692: rpc error: code = Canceled desc = context canceled" +"2020-05-20 18:21:42.014 UTC [orderer.common.server] func1 -> DEBU 1dfd Closing Deliver stream" +"2020-05-20 18:21:42.015 UTC [comm.grpc.server] 1 -> INFO 1dff streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:53692 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.936ms +"2020-05-20 18:21:42.014 UTC [grpc] infof -> DEBU 1dfe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-05-20 18:21:42.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e00 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:42.321 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e01 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-05-20 18:21:42.321 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.7µs " +"2020-05-20 18:21:42.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e03 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2020-05-20 18:21:42.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e04 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2020-05-20 18:21:42.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.9µs " +"2020-05-20 18:21:42.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.3µs " +"2020-05-20 18:21:42.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e07 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:42.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e08 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:42.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e09 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:42.822 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e0a Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-05-20 18:21:42.822 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.9µs " +"2020-05-20 18:21:42.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e0c Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +"2020-05-20 18:21:42.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e0d Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +"2020-05-20 18:21:42.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +"2020-05-20 18:21:42.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.1µs " +"2020-05-20 18:21:42.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e10 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:42.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e11 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:43.322 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e12 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:43.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e13 Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +"2020-05-20 18:21:43.323 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 321.4µs " +"2020-05-20 18:21:43.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e15 Sending msg of 28 bytes to 2 on channel businesschannel took 48.4µs" +"2020-05-20 18:21:43.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e16 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2020-05-20 18:21:43.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.2µs " +"2020-05-20 18:21:43.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.5µs " +"2020-05-20 18:21:43.355 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e19 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:43.356 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e1a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:43.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e1b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:43.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e1c Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +"2020-05-20 18:21:43.821 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.1µs " +"2020-05-20 18:21:43.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e1e Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +"2020-05-20 18:21:43.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e1f Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +"2020-05-20 18:21:43.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.7µs " +"2020-05-20 18:21:43.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.8µs " +"2020-05-20 18:21:43.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e22 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:43.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e23 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:44.323 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e24 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:44.324 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e25 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +"2020-05-20 18:21:44.324 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e26 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 359.4µs " +"2020-05-20 18:21:44.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e27 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +"2020-05-20 18:21:44.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e28 Sending msg of 28 bytes to 3 on channel businesschannel took 29.1µs" +"2020-05-20 18:21:44.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 344.4µs " +"2020-05-20 18:21:44.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 907.3µs " +"2020-05-20 18:21:44.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e2b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:44.346 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e2c Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:44.823 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e2d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:44.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e2e Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2020-05-20 18:21:44.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.5µs " +"2020-05-20 18:21:44.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e30 Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +"2020-05-20 18:21:44.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e32 Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" +"2020-05-20 18:21:44.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e33 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:44.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 324.2µs " +"2020-05-20 18:21:44.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs " +"2020-05-20 18:21:44.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e35 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:45.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e36 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:45.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e37 Sending msg of 28 bytes to 3 on channel testchainid took 67.3µs" +"2020-05-20 18:21:45.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.8µs " +"2020-05-20 18:21:45.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e39 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +"2020-05-20 18:21:45.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e3a Sending msg of 28 bytes to 3 on channel businesschannel took 34.7µs" +"2020-05-20 18:21:45.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.1µs " +"2020-05-20 18:21:45.343 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.366ms " +"2020-05-20 18:21:45.349 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e3d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:45.350 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e3e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:45.821 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e3f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:45.821 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e40 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2020-05-20 18:21:45.821 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +"2020-05-20 18:21:45.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e42 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2020-05-20 18:21:45.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e43 Sending msg of 28 bytes to 2 on channel businesschannel took 123µs" +"2020-05-20 18:21:45.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " +"2020-05-20 18:21:45.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.7µs " +"2020-05-20 18:21:45.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e46 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:45.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e47 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:46.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e48 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:46.321 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e49 Sending msg of 28 bytes to 3 on channel testchainid took 35.6µs" +"2020-05-20 18:21:46.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.1µs " +"2020-05-20 18:21:46.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e4b Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +"2020-05-20 18:21:46.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e4c Sending msg of 28 bytes to 3 on channel businesschannel took 10.5µs" +"2020-05-20 18:21:46.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.9µs " +"2020-05-20 18:21:46.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.5µs " +"2020-05-20 18:21:46.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e4f Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:46.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e50 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:46.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e51 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:46.822 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e52 Sending msg of 28 bytes to 3 on channel testchainid took 9µs" +"2020-05-20 18:21:46.828 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e53 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 5.6055ms " +"2020-05-20 18:21:46.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e54 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +"2020-05-20 18:21:46.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e55 Sending msg of 28 bytes to 3 on channel businesschannel took 7.1µs" +"2020-05-20 18:21:46.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.4µs " +"2020-05-20 18:21:46.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.4µs " +"2020-05-20 18:21:46.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e58 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:46.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e59 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:47.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e5a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:47.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5b Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-05-20 18:21:47.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e5c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +"2020-05-20 18:21:47.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5d Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +"2020-05-20 18:21:47.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e5e Sending msg of 28 bytes to 3 on channel businesschannel took 31.3µs" +"2020-05-20 18:21:47.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.9µs " +"2020-05-20 18:21:47.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71.3µs " +"2020-05-20 18:21:47.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e61 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:47.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e62 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:47.824 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e63 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:47.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e64 Sending msg of 28 bytes to 3 on channel testchainid took 22µs" +"2020-05-20 18:21:47.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.9µs " +"2020-05-20 18:21:47.857 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e66 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2020-05-20 18:21:47.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e67 Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" +"2020-05-20 18:21:47.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.1µs " +"2020-05-20 18:21:47.859 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 997.6µs " +"2020-05-20 18:21:47.862 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6a Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:47.865 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:48.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e6c Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:48.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e6d Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +"2020-05-20 18:21:48.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 400.3µs " +"2020-05-20 18:21:48.371 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e6f Sending msg of 28 bytes to 2 on channel businesschannel took 209.6µs" +"2020-05-20 18:21:48.371 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e70 Sending msg of 28 bytes to 3 on channel businesschannel took 26.4µs" +"2020-05-20 18:21:48.372 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.6µs " +"2020-05-20 18:21:48.372 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 574.9µs " +"2020-05-20 18:21:48.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e73 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:48.454 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e74 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:48.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e75 Sending msg of 28 bytes to 2 on channel businesschannel took 46µs" +"2020-05-20 18:21:48.843 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e76 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2020-05-20 18:21:48.844 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1972ms " +"2020-05-20 18:21:48.845 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2264ms " +"2020-05-20 18:21:48.867 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e79 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:48.893 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7a Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:48.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e7b Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +"2020-05-20 18:21:48.897 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0379ms " +"2020-05-20 18:21:48.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7d Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:49.324 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7e Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:49.326 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e7f Sending msg of 28 bytes to 3 on channel testchainid took 202.9µs" +"2020-05-20 18:21:49.326 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.5µs " +"2020-05-20 18:21:49.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e81 Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +"2020-05-20 18:21:49.442 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e82 Sending msg of 28 bytes to 3 on channel businesschannel took 47.9µs" +"2020-05-20 18:21:49.458 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " +"2020-05-20 18:21:49.461 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.2091ms " +"2020-05-20 18:21:49.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e85 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:49.462 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e86 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:49.913 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e87 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +"2020-05-20 18:21:49.913 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e88 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +"2020-05-20 18:21:49.914 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 181.7µs " +"2020-05-20 18:21:49.914 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.5µs " +"2020-05-20 18:21:49.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e8b Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:49.916 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 298.4µs " +"2020-05-20 18:21:49.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e8d Sending msg of 28 bytes to 3 on channel testchainid took 113.9µs" +"2020-05-20 18:21:49.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e8e Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:49.930 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e8f Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:50.333 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e90 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:50.336 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e91 Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +"2020-05-20 18:21:50.338 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1249ms " +"2020-05-20 18:21:50.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e93 Sending msg of 28 bytes to 2 on channel businesschannel took 38µs" +"2020-05-20 18:21:50.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e94 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +"2020-05-20 18:21:50.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.1µs " +"2020-05-20 18:21:50.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.4µs " +"2020-05-20 18:21:50.352 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e97 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:50.354 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e98 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:50.822 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e99 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:50.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e9a Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +"2020-05-20 18:21:50.823 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 246µs " +"2020-05-20 18:21:50.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e9c Sending msg of 28 bytes to 2 on channel businesschannel took 24.1µs" +"2020-05-20 18:21:50.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e9d Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2020-05-20 18:21:50.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.6µs " +"2020-05-20 18:21:50.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 242.5µs " +"2020-05-20 18:21:50.843 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ea0 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:50.844 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ea1 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:51.321 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ea2 Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel testchainid with payload of size 28" +"2020-05-20 18:21:51.322 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ea3 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +"2020-05-20 18:21:51.322 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ea4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.5µs " +"2020-05-20 18:21:51.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ea5 Sending msg of 28 bytes to 2 on channel businesschannel took 28.8µs" +"2020-05-20 18:21:51.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ea6 Sending msg of 28 bytes to 3 on channel businesschannel took 52.8µs" +"2020-05-20 18:21:51.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ea7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.4µs " +"2020-05-20 18:21:51.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.5µs " +"2020-05-20 18:21:51.342 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ea9 Received message from orderer1.example.com(172.18.0.4:45494): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-05-20 18:21:51.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1eaa Received message from orderer2.example.com(172.18.0.3:44052): ConsensusRequest for channel businesschannel with payload of size 28" diff --git a/hyperledger_fabric/v1.4.7/raft/logs/dev_peer0.log b/hyperledger_fabric/v1.4.7/raft/logs/dev_peer0.log new file mode 100644 index 00000000..c2ba9b5a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/raft/logs/dev_peer0.log @@ -0,0 +1,25944 @@ +[001 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +[002 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +[003 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +[004 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +[005 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +[006 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +[007 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +[008 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +[009 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +[00a 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +[00b 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +[00c 05-20 18:19:47.90 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +[00d 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[00e 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +[00f 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[010 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +[011 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +[012 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[013 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +[014 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[015 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +[016 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[017 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +[018 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[019 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +[01a 05-20 18:19:47.91 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +[01b 05-20 18:19:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +[01c 05-20 18:19:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +[01d 05-20 18:19:47.92 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +[01e 05-20 18:19:47.95 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem +[01f 05-20 18:19:47.96 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +[020 05-20 18:19:47.98 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +[021 05-20 18:19:47.99 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +[022 05-20 18:19:48.00 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +[023 05-20 18:19:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +[024 05-20 18:19:48.01 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +[025 05-20 18:19:48.02 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +[026 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +[027 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +[028 05-20 18:19:48.04 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +[029 05-20 18:19:48.05 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +[02a 05-20 18:19:48.06 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +[02b 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[02c 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[02d 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +[02e 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[02f 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[030 05-20 18:19:48.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[031 05-20 18:19:48.11 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce] at [/etc/hyperledger/fabric/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk]... +[032 05-20 18:19:48.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[033 05-20 18:19:48.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +[034 05-20 18:19:48.12 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: + Version: 1.4.7 + Commit SHA: development build + Go version: go1.13.11 + OS/Arch: linux/amd64 + Chaincode: + Base Image Version: 0.4.20 + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger +[035 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[036 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +[037 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +[038 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +[039 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +[03a 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +[03b 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +[03c 05-20 18:19:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +[03d 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +[03e 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +[03f 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +[040 05-20 18:19:48.21 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +[041 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +[042 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +[043 05-20 18:19:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +[044 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +[045 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +[046 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +[047 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +[048 05-20 18:19:48.37 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +[049 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +[04a 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +[04b 05-20 18:19:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +[04c 05-20 18:19:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +[04d 05-20 18:19:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +[04e 05-20 18:19:48.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +[04f 05-20 18:19:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +[050 05-20 18:19:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +[051 05-20 18:19:48.52 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +[052 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +[053 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +[054 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +[055 05-20 18:19:48.62 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +[056 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +[057 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +[058 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +[059 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +[05a 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[05b 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +[05c 05-20 18:19:48.67 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[05d 05-20 18:19:48.70 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +[05e 05-20 18:19:48.71 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +[05f 05-20 18:19:48.71 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +[060 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.7 +[061 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +[062 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.7 +[063 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +[064 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.7 +[065 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +[066 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +[067 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +[068 05-20 18:19:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[069 05-20 18:19:48.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +[06a 05-20 18:19:48.74 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +[06b 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +[06c 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +[06d 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +[06e 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[06f 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +[070 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +[071 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +[072 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +[073 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +[074 05-20 18:19:48.75 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[075 05-20 18:19:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +[076 05-20 18:19:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +[077 05-20 18:19:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +[078 05-20 18:19:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +[079 05-20 18:19:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +[07a 05-20 18:19:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +[07b 05-20 18:19:48.80 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +[07c 05-20 18:19:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[07d 05-20 18:19:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[07e 05-20 18:19:48.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[07f 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[080 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[081 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[082 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +[083 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[084 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A209901CDE7C48A747A...455254494649434154452D2D2D2D2D0A +[085 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF186C4BF240BED45F0BBCF7135C6BDC1830908603084DC2B567543C23E28B78 +[086 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-<, total items: 1 +[087 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +[088 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +[089 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[08a 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[08b 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C2237C5BA1BE11CE29EDC845034AC234A64B0FB9839D6F631A0DE83EBC647D8 +[08c 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[08d 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[08e 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[08f 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +[090 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[091 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.7 +[092 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[093 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=lscc:1.4.7 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[094 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +[095 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +[096 05-20 18:19:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.7 +[097 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +[09a 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.7) lock +[09b 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.7) lock +[098 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.7 +[099 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.7 +[09c 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[09d 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[09e 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.7 +[09f 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.7" , sending back REGISTERED +[0a0 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.7" +[0a1 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.7" +[0a2 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.7" +[0a3 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0a4 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0a5 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [8e8f8ec3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0a6 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [8e8f8ec3] notifying Txid:8e8f8ec3-335e-4dfa-8a0e-11e150ae5eb6, channelID: +[0a7 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0a8 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +[0a9 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[0aa 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.7 +[0ab 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0ac 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=cscc:1.4.7 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[0ad 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +[0ae 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +[0af 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.7 +[0b0 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +[0b1 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.7) lock +[0b2 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.7) lock +[0b3 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.7) +[0b4 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.7 +[0b5 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.7 +[0b6 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[0b7 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[0b8 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.7 +[0b9 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.7" , sending back REGISTERED +[0ba 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.7" +[0bb 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.7" +[0bc 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.7" +[0bd 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0be 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0bf 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[0c0 05-20 18:19:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU [44e4eb7f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0c1 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU [44e4eb7f] notifying Txid:44e4eb7f-95a6-4334-a654-b296410a7886, channelID: +[0c2 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0c3 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +[0c4 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.7,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[0c5 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.7 +[0c6 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0c7 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=qscc:1.4.7 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[0c8 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +[0c9 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +[0ca 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.7 +[0cb 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +[0cc 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.7) lock +[0cd 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.7) lock +[0ce 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.7) +[0cf 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.7 +[0d0 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.7 +[0d1 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[0d2 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[0d3 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.7 +[0d4 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.7" , sending back REGISTERED +[0d5 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.7" +[0d6 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.7" +[0d7 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.7" +[0d8 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0d9 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0da 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[0db 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU [74847802] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0dc 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU [74847802] notifying Txid:74847802-de82-4628-be5a-8f13b7a6a6bd, channelID: +[0dd 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0de 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +[0df 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +[0e0 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +[0e1 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +[0e2 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.7) +[0e3 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +[0e4 05-20 18:19:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +[0e5 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[0e6 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[0e7 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +[0e8 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +[0e9 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +[0ea 05-20 18:19:48.86 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +[0eb 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:19:51.331Z grpc.peer_address=172.18.0.8:57896 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=180µs +[0ec 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[0ed 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[0ee 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[0ef 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:57896 +[0f0 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57896 +[0f1 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[0f2 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[0f3 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[0f4 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[0f5 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[0f6 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 08 09 e9 92 07 8e 41 64 ee 84 |0E.!........Ad..| +00000010 10 c0 16 ca a4 28 1c 70 75 2c 6c 8e 87 1a f7 4f |.....(.pu,l....O| +00000020 e5 c3 72 9c 37 02 20 67 68 84 9c bb 09 e9 e0 aa |..r.7. gh.......| +00000030 69 81 3f 1b a6 ff 3f be d7 1d 53 b3 30 65 92 3d |i.?...?...S.0e.=| +00000040 86 b9 b5 a9 e3 0b 44 |......D| +[0f7 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57896 +[0f8 05-20 18:19:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57896 +[0f9 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[0fa 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[0fb 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:57896 disconnected +[0fc 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[0fd 05-20 18:19:49.34 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:19:59.335Z grpc.peer_address=172.18.0.8:57896 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6161ms +[0fe 05-20 18:19:49.35 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:19:51.357Z grpc.peer_address=172.18.0.8:57898 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=905.3µs +[0ff 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[100 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[101 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[102 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:57898 +[103 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57898 +[104 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[105 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 36 63 79 cf 1e 7c 56 f1 08 c6 80 |0D. .6cy..|V....| +00000010 6a 6e b3 67 3a 6f 2a 9c a9 45 56 a2 d9 20 af cb |jn.g:o*..EV.. ..| +00000020 d9 f7 64 15 02 20 10 a4 59 b5 61 df 99 ae 6a c8 |..d.. ..Y.a...j.| +00000030 83 8c f9 b7 fe 8e ba db 02 ef 99 a7 2b c3 09 54 |............+..T| +00000040 ae 9a 94 47 b1 74 |...G.t| +[106 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57898 +[107 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57898 +[108 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:12637676837674361505 tag:EMPTY mem_req:R@\300\000\261\223o\"\230~\316M\031\004p\373\020\017\361\367\377\312" secret_envelope: > > , Envelope: 1109 bytes, Signature: 0 bytes +[109 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12637676837674361505 tag:EMPTY mem_req:R@\300\000\261\223o\"\230~\316M\031\004p\373\020\017\361\367\377\312" secret_envelope: > > , Envelope: 1109 bytes, Signature: 0 bytes +[10b 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 3a 7f cc 30 86 01 0f 77 52 25 f8 e7 c0 59 ca |.:..0...wR%...Y.| +00000010 0f 37 13 25 18 ec 09 2d 76 b4 64 3b 27 03 1d fe |.7.%...-v.d;'...| +[10c 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 14 2d 20 12 7a d4 11 90 01 f0 45 |0D. ..- .z.....E| +00000010 d0 0b 43 ba 1b 27 0f b9 1f d7 b7 80 7d a3 13 5c |..C..'......}..\| +00000020 72 5e bd 2d 02 20 00 a0 90 17 f2 9a cc 68 cb 3e |r^.-. .......h.>| +00000030 52 40 c0 00 b1 93 6f 22 98 7e ce 4d 19 04 70 fb |R@....o".~.M..p.| +00000040 10 0f f1 f7 ff ca |......| +[10d 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[10e 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab b3 ea ef 20 25 5e a6 cb 7d df |0E.!..... %^..}.| +00000010 ee 89 4a 7d 7f 15 7b 72 1c 9a 8f 98 a6 1d 11 e4 |..J}..{r........| +00000020 aa 75 95 84 69 02 20 3d 22 4c 77 9e cd 65 03 10 |.u..i. ="Lw..e..| +00000030 fe d0 33 c5 06 61 bf 9c 30 f2 d2 ac 43 9d 37 14 |..3..a..0...C.7.| +00000040 fb 92 2e 28 d5 31 b7 |...(.1.| +[10f 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[110 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +[111 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[112 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[113 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[114 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[115 05-20 18:19:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[116 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[117 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[118 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BC61319887B21DA0240872DAB08DB169BE5C7371B8E0D271155BF818A06D2EEB +[119 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[11a 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[11b 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[11c 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12637676837674361505, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2203 bytes, Signature: 0 bytes to 1 peers +[11d 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:R@\300\000\261\223o\"\230~\316M\031\004p\373\020\017\361\367\377\312" secret_envelope: > alive: > +[11e 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12637676837674361505, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2203 bytes, Signature: 0 bytes +[11f 05-20 18:19:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[120 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +[121 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +[122 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[123 05-20 18:19:52.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[124 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +[125 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[126 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +[127 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 17 0f f0 6e dd d4 84 7e c5 5d 11 2d 8d 4b b4 |i...n...~.].-.K.| +00000010 96 8e cd 96 04 f8 84 55 4e 6d cf 63 57 43 38 ed |.......UNm.cWC8.| +[128 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 1b 2e 12 eb 83 f9 10 3d 71 4d ed |0D. ^.......=qM.| +00000010 0d ca 58 33 9a 97 84 66 bb b0 ce ec 3d d1 db 78 |..X3...f....=..x| +00000020 d4 d3 d0 02 02 20 73 f4 40 7c 9b 6a c2 0b 40 18 |..... s.@|.j..@.| +00000030 df ae 7f f5 28 5b 7b b8 85 4c bc a7 58 65 8b 50 |....([{..L..Xe.P| +00000040 eb e3 6f 87 79 34 |..o.y4| +[129 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[12a 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 a1 17 85 1a 87 cc 0f cc 7f |0E.!............| +00000010 32 a1 b8 08 5b 79 26 af 6e b1 61 dd c0 66 83 c4 |2...[y&.n.a..f..| +00000020 74 dc 1e a1 b2 02 20 59 36 25 ec 57 52 b2 8a ca |t..... Y6%.WR...| +00000030 a1 83 19 e0 99 f0 64 a4 61 88 69 6b 4e dc e4 07 |......d.a.ikN...| +00000040 54 af fe 03 75 91 bd |T...u..| +[12b 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[12c 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[12d 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[12e 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[12f 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[130 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[131 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[132 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[133 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[134 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[135 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[136 05-20 18:19:52.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 39E45FEE82E234499BE6219C93047E9610BA21F10E903D2636EBEDADB59BD183 +[137 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[138 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[139 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[13a 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes to 1 peers +[13b 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +[13c 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +[13d 05-20 18:19:52.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13e 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[140 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[13f 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[141 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[142 05-20 18:19:52.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[143 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[144 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC1949D14958F48D0BAE465F9FB22697204D4F21365F9E921B9F54D075BE10A6 +[145 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[146 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[147 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[148 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\350Y\207\202\007r\253\223\270y\254@g\274\013\251\224\354\327X\360\202\252\262\254\027%\317`\332\002 \272\352V\365\324\001\033\227\372r\207\262]\221-\315d\255\267\322\260 > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +[149 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\350Y\207\202\007r\253\223\270y\254@g\274\013\251\224\354\327X\360\202\252\262\254\027%\317`\332\002 \272\352V\365\324\001\033\227\372r\207\262]\221-\315d\255\267\322\260 > > , Envelope: 1098 bytes, Signature: 0 bytes +[14a 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14b 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[14c 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[14d 05-20 18:19:52.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[14f 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[150 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[151 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 19 49 d1 49 58 f4 8d 0b ae 46 5f 9f b2 26 97 |..I.IX....F_..&.| +00000010 20 4d 4f 21 36 5f 9e 92 1b 9f 54 d0 75 be 10 a6 | MO!6_....T.u...| +[152 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 3e e8 59 87 82 07 72 ab 93 b8 79 |0D. d>.Y...r...y| +00000010 ac 40 67 bc 0b a9 94 ec d7 58 f0 82 aa b2 ac 17 |.@g......X......| +00000020 25 cf 60 da 02 20 20 ba ea 56 f5 d4 01 1b 97 fa |%.`.. ..V......| +00000030 72 87 b2 5d 91 2d cd 64 ad b7 d2 b0 3c 6d bd 29 |r..].-.d.... DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[154 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 9c 88 91 12 09 51 ae 00 d9 8b |0E.!.......Q....| +00000010 23 12 35 86 0a fd 87 49 fe b1 84 b8 e7 2b 4f 34 |#.5....I.....+O4| +00000020 59 85 30 56 ed 02 20 39 2a e0 f9 2f 2e f0 fb 31 |Y.0V.. 9*../...1| +00000030 9c 52 6e aa a7 fd 71 19 58 dc 0f a5 a1 ca b5 8d |.Rn...q.X.......| +00000040 0c d0 c2 84 cb 1d 02 |.......| +[155 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[156 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[157 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[158 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 2b ed fd 1c 18 ae a3 35 2a 4d 08 23 53 15 e5 |.+......5*M.#S..| +00000010 5b 73 15 bd 6b 1c 6a 51 75 d6 a9 6d 3d a8 1f 18 |[s..k.jQu..m=...| +[159 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 01 79 29 6a b8 c8 ae a5 dc 1f b1 |0D. X.y)j.......| +00000010 43 d3 df 68 00 99 38 fe bc f9 0f 90 a7 67 e7 07 |C..h..8......g..| +00000020 21 83 17 64 02 20 18 b3 2c 27 da 5e 69 95 c9 1b |!..d. ..,'.^i...| +00000030 e9 2f 14 ab 28 0b 9b 94 62 9e 5b ce 15 cb e4 95 |./..(...b.[.....| +00000040 c1 2f 6f 92 e7 6a |./o..j| +[15a 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[15b 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 a8 da e0 6b f3 77 4d 66 b0 8e |0E.!.....k.wMf..| +00000010 1d 10 89 8c d3 3e 0b ff c8 b4 37 b0 e0 bf 5b b7 |.....>....7...[.| +00000020 2d bc c8 58 37 02 20 05 2a f6 4b ba 2a 6a 98 56 |-..X7. .*.K.*j.V| +00000030 f0 d0 93 5f dd be 8d 74 21 be 36 9b 7f c6 52 1f |..._...t!.6...R.| +00000040 df 26 3d f8 07 ce 8d |.&=....| +[15c 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[15d 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[15e 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[15f 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[160 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[161 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[162 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[163 05-20 18:19:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[164 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[165 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[166 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[167 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 8b 20 ba 92 a0 89 50 eb 9d 4c 61 de 94 cc db |.. ....P..La....| +00000010 f4 f7 34 4d 4b 05 ce 0e 31 21 15 0c ad a0 87 60 |..4MK...1!.....`| +[168 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d fc 6b ec 21 a7 d2 ef 11 3b f5 a4 |0D. ..k.!....;..| +00000010 85 67 b0 3b 68 b7 ac 6e ea 2c 71 fa 3d 45 2c 52 |.g.;h..n.,q.=E,R| +00000020 ce ec 44 1a 02 20 26 81 03 3e 6d 5b 9c ee b7 55 |..D.. &..>m[...U| +00000030 30 f6 4b 8e 2d f3 84 99 b2 e5 34 90 90 f4 3a db |0.K.-.....4...:.| +00000040 45 ca 19 f0 f8 3e |E....>| +[169 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[16a 05-20 18:19:53.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 22 df ba 48 3f 6f c0 3e 36 45 |0E.!.."..H?o.>6E| +00000010 88 22 31 0e 5c 60 b8 da ba 90 b7 ea f9 0d c8 f4 |."1.\`..........| +00000020 0b 32 c9 08 54 02 20 12 34 ba 82 70 63 4a a9 3c |.2..T. .4..pcJ.<| +00000030 5c b5 2e 9d 47 bc a2 3e c0 fc 53 80 70 95 98 9b |\...G..>..S.p...| +00000040 ab 9c b5 9e e9 e8 2f |....../| +[16b 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 49 bytes, Signature: 0 bytes +[16c 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 49 bytes, Signature: 0 bytes +[16d 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16e 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[16f 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[170 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[171 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[172 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[173 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[174 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[175 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[176 05-20 18:19:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[177 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[178 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[179 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A95952BD2B0A0C5F90D492B7AB3DDF4655B6DD33E08B9948B3A7418D4585298B +[17a 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[17b 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[17c 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[17d 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[17e 05-20 18:19:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[17f 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[180 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[181 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer1.org1.example.com:7051 +[182 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +[183 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[184 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[185 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17945473675397379181, Envelope: 962 bytes, Signature: 0 bytes +[186 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +[187 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 ae f9 7a e5 d1 ac 53 38 2b b1 |0E.!....z...S8+.| +00000010 a4 cb 80 08 b7 ab 83 46 ae 06 e5 b5 80 70 49 aa |.......F.....pI.| +00000020 ea 8e 39 c1 94 02 20 0a e7 4c 7c 7c a9 d9 3d 86 |..9... ..L||..=.| +00000030 ac 68 b3 6b bb 47 20 35 e4 b9 cd c4 8a b8 3d cb |.h.k.G 5......=.| +00000040 ba 34 00 cf cd be 1f |.4.....| +[188 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17945473675397379181, Envelope: 962 bytes, Signature: 0 bytes +[189 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[18a 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 2 +[18b 05-20 18:19:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18c 05-20 18:19:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18d 05-20 18:19:56.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18e 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[18f 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\022/$\025*\177O\013\022\277(\222\307z\343\310\311u\203\327c\254\201\337\224\244)\357\224\025\002 Y7\276\272,`\030\0054\177s$\270\246\3370\364\t\004\344\342\262\263>\261 > > , Envelope: 1098 bytes, Signature: 0 bytes +[191 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[192 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\022/$\025*\177O\013\022\277(\222\307z\343\310\311u\203\327c\254\201\337\224\244)\357\224\025\002 Y7\276\272,`\030\0054\177s$\270\246\3370\364\t\004\344\342\262\263>\261 > > , Envelope: 1098 bytes, Signature: 0 bytes +[193 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac ed 57 d1 23 ce 9e 34 60 91 ef 9f f8 ea 2c de |..W.#..4`.....,.| +00000010 ad 16 a4 4a 11 6b 51 c3 a7 42 cc 68 fa 13 d3 21 |...J.kQ..B.h...!| +[194 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 3e 12 2f 24 15 2a 7f 4f 0b 12 bf |0D. .>./$.*.O...| +00000010 28 92 c7 7a e3 c8 c9 75 83 d7 63 ac 81 df 94 a4 |(..z...u..c.....| +00000020 29 ef 94 15 02 20 59 37 be ba 2c 60 18 05 34 7f |).... Y7..,`..4.| +00000030 73 24 b8 a6 df 30 f4 09 04 e4 e2 b2 b3 3e b1 3c |s$...0.......>.<| +00000040 66 2c f3 13 83 80 |f,....| +[195 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[196 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 a7 fa dc ac 17 0a 15 f5 0b 65 |0E.!...........e| +00000010 62 ef be 76 36 63 ac 33 d8 bd 50 f7 0e 1a 61 91 |b..v6c.3..P...a.| +00000020 e6 ae 5f 13 46 02 20 15 1a 8f 0c df 81 51 b4 90 |.._.F. ......Q..| +00000030 0d f4 e5 ac 9c 47 27 27 17 87 c3 8f e9 0d be 2e |.....G''........| +00000040 dc 95 3f 93 f5 41 1c |..?..A.| +[197 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[198 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[199 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[19a 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[19b 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[19c 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19e 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19f 05-20 18:19:56.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1a0 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +[1a1 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\022/$\025*\177O\013\022\277(\222\307z\343\310\311u\203\327c\254\201\337\224\244)\357\224\025\002 Y7\276\272,`\030\0054\177s$\270\246\3370\364\t\004\344\342\262\263>\261 > alive: > +[1a2 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[1a3 05-20 18:19:56.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a4 05-20 18:19:56.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1a5 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1a6 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1a7 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a8 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1a9 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[1aa 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F82B7271D8DE868ECDEAC699556B0E4C6D6AF94C0683BE7BC48EF821A108DFE7 +[1ab 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1ac 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1ad 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1ae 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\333\233\313\253\362\270|\3622\244\233\274\365'" > > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +[1af 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\333\233\313\253\362\270|\3622\244\233\274\365'" > > > , Envelope: 1098 bytes, Signature: 0 bytes +[1b0 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b1 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[1b2 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[1b3 05-20 18:19:56.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b4 05-20 18:19:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[1b5 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b6 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[1b7 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 2b 72 71 d8 de 86 8e cd ea c6 99 55 6b 0e 4c |.+rq........Uk.L| +00000010 6d 6a f9 4c 06 83 be 7b c4 8e f8 21 a1 08 df e7 |mj.L...{...!....| +[1b8 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 a8 3f 06 fb e9 0a 21 a2 65 41 ba |0D. %.?....!.eA.| +00000010 e0 60 9d 93 8e 99 4c a7 9a f2 64 2e dd 26 d7 f4 |.`....L...d..&..| +00000020 89 dc cf 95 02 20 04 fe 65 20 e9 fc 46 e4 71 2d |..... ..e ..F.q-| +00000030 1c 2f 71 bb 9a 87 95 2b c7 52 34 86 11 1b 5d 96 |./q....+.R4...].| +00000040 07 55 ae c3 52 e1 |.U..R.| +[1b9 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1ba 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a d4 28 f5 7a 34 c5 05 64 98 fd |0E.!...(.z4..d..| +00000010 8d 5a c1 c1 fe da 5f e8 5c 12 5e 20 8d 84 cc e4 |.Z...._.\.^ ....| +00000020 fb 52 70 b4 1b 02 20 13 82 ba be 77 e9 39 bc c9 |.Rp... ....w.9..| +00000030 55 f8 a9 53 f2 93 16 68 3e db 9b cb ab f2 b8 7c |U..S...h>......|| +00000040 f2 32 a4 9b bc f5 27 |.2....'| +[1bb 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1bc 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1bd 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be 05-20 18:19:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1c0 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c1 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1c2 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1c3 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 45 7b 4b 12 0d c8 d7 08 f2 be 72 c9 fb f4 c9 |.E{K.......r....| +00000010 d8 2a ef 81 33 d0 18 a9 d4 e8 00 59 8f d5 2b 4d |.*..3......Y..+M| +[1c4 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d a7 fb f6 33 22 d3 9d 10 22 50 6b |0D. ]...3"..."Pk| +00000010 d6 49 52 9d d4 37 e6 a3 f8 3d 70 68 7b db 89 05 |.IR..7...=ph{...| +00000020 5f 00 d5 fa 02 20 6a 33 ca 3b b5 85 e6 5d 46 d4 |_.... j3.;...]F.| +00000030 ae 16 c4 8d ee a5 87 b0 24 b9 dd b5 f3 a9 44 54 |........$.....DT| +00000040 b7 93 be c8 d5 3b |.....;| +[1c5 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1c6 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 e8 cd 64 e3 ff 8c bd 91 c6 b7 81 |0D. 1..d........| +00000010 0f 19 9c d7 00 f1 1c 64 b0 14 f4 d7 11 e8 0b 83 |.......d........| +00000020 7b 9d 20 ac 02 20 7a f2 84 d4 09 64 f1 2b 3c 32 |{. .. z....d.+<2| +00000030 77 c2 49 1e 15 d8 24 27 57 77 4c 58 8e 75 a6 02 |w.I...$'WwLX.u..| +00000040 46 52 b9 7a 5c 40 |FR.z\@| +[1c7 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1c8 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1c9 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1ca 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1cb 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1cc 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cd 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ce 05-20 18:19:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cf 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1d0 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161008 +[1d1 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1250BB7DBCD423F53997B659572FBE857BAE27A3D5F6A5F44D92F19CF8DEC53F +[1d2 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1d3 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1d4 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1d5 05-20 18:19:58.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1d6 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[1d7 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1d8 05-20 18:19:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d9 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37006 +[1da 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002838410 +[1db 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[1dc 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[1dd 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[1df 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[1e0 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[1e1 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1e2 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[1e3 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 19 96 0f 8f f8 9e 9f ec b0 55 2e 7e b6 a1 bb |..........U.~...| +00000010 dd 96 47 b1 46 c6 a3 72 db bf 98 56 e7 fe 51 03 |..G.F..r...V..Q.| +[1e4 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 dd c0 e2 a6 db 26 91 70 63 35 |0E.!.......&.pc5| +00000010 bb c3 69 ea c8 d2 ce 50 1b f8 f4 f6 23 9b 36 d8 |..i....P....#.6.| +00000020 e5 c8 ee 99 04 02 20 56 b7 55 1a 3c 46 ad 43 16 |...... V.U...3p..y_...BJF.| +00000040 bc 7b 4c f2 72 e5 a0 |.{L.r..| +[1e5 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[1e6 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000267570, header 0xc002838d20 +[1e7 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[1e8 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU [][a90fb794] processing txid: a90fb7940e66ef0e4f0ddcc4afb11d94de4e06dcc6118772434b3ca1e9d9a130 +[1e9 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU [][a90fb794] Entry chaincode: name:"cscc" +[1ea 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> INFO [][a90fb794] Entry chaincode: name:"cscc" +[1eb 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[1ec 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +[1ed 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[1ee 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[1ef 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[1f0 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1f1 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[1f2 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1f3 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 19 96 0f 8f f8 9e 9f ec b0 55 2e 7e b6 a1 bb |..........U.~...| +00000010 dd 96 47 b1 46 c6 a3 72 db bf 98 56 e7 fe 51 03 |..G.F..r...V..Q.| +[1f4 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 dd c0 e2 a6 db 26 91 70 63 35 |0E.!.......&.pc5| +00000010 bb c3 69 ea c8 d2 ce 50 1b f8 f4 f6 23 9b 36 d8 |..i....P....#.6.| +00000020 e5 c8 ee 99 04 02 20 56 b7 55 1a 3c 46 ad 43 16 |...... V.U...3p..y_...BJF.| +00000040 bc 7b 4c f2 72 e5 a0 |.{L.r..| +[1f5 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +[1f6 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +[1f7 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +[1f8 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +[1f9 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +[1fa 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +[1fb 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +[1fc 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +[1fd 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +[1fe 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +[1ff 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +[200 05-20 18:19:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0028a5660)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +[201 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +[202 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +[203 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +[204 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +[205 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +[206 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +[207 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +[208 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +[209 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +[20a 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +[20b 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +[20c 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +[20d 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +[20e 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +[20f 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[210 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +[211 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +[212 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +[213 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +[214 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[215 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[216 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[217 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +[218 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[219 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[21a 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[21b 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[21c 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[21d 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[21e 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[21f 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[220 05-20 18:19:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[221 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[222 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +[223 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002921a80)} +[224 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[225 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[226 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[227 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +[228 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +[229 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +[22a 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +[22b 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xfa, 0x23, 0xe2, 0xb8, 0x2a, 0x9a, 0x88, 0xab, 0xe1, 0x10, 0x81, 0xae, 0xa5, 0x6, 0xf5, 0xf1, 0x22, 0x82, 0x0, 0xe, 0x6e, 0x5c, 0x2d, 0x5e, 0xf7, 0xc1, 0x60, 0xa4, 0x8c, 0xf3, 0x4, 0xc7} txOffsets= +txId=bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5 locPointer=offset=39, bytesLength=28429 +] +[22c 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to txid-index +[22d 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bafc2f682dad66872769e042ea00ef5e1bea98801118a528ea9e6dc8964f23b5] to blockNumTranNum index +[22e 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +[22f 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +[230 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +[231 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +[233 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[232 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +[234 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +[235 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +[236 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +[237 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[238 05-20 18:19:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +[239 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +[23a 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +[23b 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[23c 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[23d 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[23e 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[23f 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +[240 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[241 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +[242 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +[243 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[244 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +[245 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +[246 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=5ms block_and_pvtdata_commit=6ms state_commit=3ms) commitHash=[] +[247 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +[248 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +[249 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [37199412-645b-49ef-a2cd-57dda620760d] +[24a 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +[24b 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [37199412-645b-49ef-a2cd-57dda620760d] +[24c 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[24d 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[24e 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[24f 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[250 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[251 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[252 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[253 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[254 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[255 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[256 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[257 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[258 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[259 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +[25a 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[25b 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[25c 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[25d 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[25e 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[25f 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[260 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[261 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[262 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[263 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +[264 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[265 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[266 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[267 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[268 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[269 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[26a 05-20 18:19:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[26b 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[26c 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[26d 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[26e 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[26f 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[270 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[271 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[272 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[273 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[274 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[275 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[276 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[277 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[278 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[279 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[27a 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[27b 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[27c 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[27d 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[27e 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[27f 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[280 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[281 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[282 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[283 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +[284 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[285 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[286 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[287 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +[288 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[289 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[28a 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[28b 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[28c 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[28d 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[28e 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[28f 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[290 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[291 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[292 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[293 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[294 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[295 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[296 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[297 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[298 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[299 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[29a 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[29b 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[29c 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[29d 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[29e 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[29f 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[2a0 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[2a1 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[2a2 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[2a3 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[2a4 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[2a5 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +[2a6 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[2a7 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[2a8 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[2a9 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[2aa 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[2ab 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[2ac 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[2ad 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[2ae 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +[2af 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[2b0 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[2b1 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[2b2 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[2b3 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[2b4 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[2b5 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[2b6 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[2b7 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[2b8 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[2b9 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[2ba 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[2bb 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[2bc 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[2bd 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[2be 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[2bf 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[2c0 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[2c1 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[2c2 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[2c3 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[2c4 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[2c5 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[2c6 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[2c7 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[2c8 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[2c9 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[2ca 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[2cb 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[2cc 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[2cd 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[2ce 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[2cf 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[2d0 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[2d1 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[2d2 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[2d3 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[2d4 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[2d5 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[2d6 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +[2d7 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +[2d8 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[2d9 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[2da 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[2db 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +[2dc 05-20 18:19:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[2dd 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[2de 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[2df 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[2e0 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[2e1 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +[2e2 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +[2e3 05-20 18:19:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +[2e4 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[2e5 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2e6 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +[2e7 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +[2e8 05-20 18:19:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +[2e9 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +[2ea 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +[2eb 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2ec 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8EB97EEBEEFB38816...096D8DADEA4206176416CB532A020801 +[2ed 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D63F0F08BF65DB766A2A7590DC74DAD29420359A7BEBA8666718ACAD657ACDE0 +[2ee 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +[2ef 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +[2f0 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +[2f1 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2f2 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [34e0b9ba-4c8f-4f56-84d6-dec84f247c40] +[2f3 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2f4 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[2f5 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[2f6 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [34e0b9ba] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f7 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [34e0b9ba] notifying Txid:34e0b9ba-4c8f-4f56-84d6-dec84f247c40, channelID:businesschannel +[2f8 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f9 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +[2fa 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [34e0b9ba-4c8f-4f56-84d6-dec84f247c40] +[2fb 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2fc 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b79cb1bd-408f-4bb9-9020-0c3720046c49] +[2fd 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2fe 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[2ff 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [b79cb1bd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[300 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [b79cb1bd] notifying Txid:b79cb1bd-408f-4bb9-9020-0c3720046c49, channelID:businesschannel +[301 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[302 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +[303 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b79cb1bd-408f-4bb9-9020-0c3720046c49] +[304 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[305 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [663d5f9e-363e-429c-b9ca-ce3518cdba03] +[306 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[307 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[308 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [663d5f9e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[309 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [663d5f9e] notifying Txid:663d5f9e-363e-429c-b9ca-ce3518cdba03, channelID:businesschannel +[30a 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[30b 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +[30c 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [663d5f9e-363e-429c-b9ca-ce3518cdba03] +[30d 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +[30e 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f9d4ee41-f9b6-43da-ab52-f3c2282470e0] +[30f 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +[310 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f9d4ee41-f9b6-43da-ab52-f3c2282470e0] +[311 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[312 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8EB97EEBEEFB38816...096D8DADEA4206176416CB532A020801 +[313 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2F3E5C4A11E1A369D428304DF7E23D3FB51C6F96B3EFB9A2DCD4AA302570C729 +[314 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +[315 05-20 18:19:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [a90fb794] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[316 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [a90fb794] notifying Txid:a90fb7940e66ef0e4f0ddcc4afb11d94de4e06dcc6118772434b3ca1e9d9a130, channelID: +[317 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[318 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> INFO [][a90fb794] Exit chaincode: name:"cscc" (86ms) +[319 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [][a90fb794] Exit +[31a 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37006 +[31b 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37006 grpc.code=OK grpc.call_duration=89.8091ms +[31c 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37006: read: connection reset by peer +[31d 05-20 18:19:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[31e 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[31f 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[320 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[321 05-20 18:20:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[322 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[323 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[324 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[325 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 41 41 86 aa 65 08 61 04 69 fe fb 6f 7c fe eb |YAA..e.a.i..o|..| +00000010 5d 11 98 de 46 cc 8d 30 2b 4b b7 34 63 19 36 65 |]...F..0+K.4c.6e| +[326 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 5b 25 b4 2f 11 46 97 d5 a2 e9 |0E.!..[%./.F....| +00000010 cc 84 7c f7 7b c8 4f 6d 80 2c 19 21 72 71 02 1e |..|.{.Om.,.!rq..| +00000020 64 76 43 a6 a0 02 20 61 c2 7e 36 e7 8d 91 c6 07 |dvC... a.~6.....| +00000030 73 af 67 ca 01 46 2a d9 86 e5 cb 68 c2 1d 6a c8 |s.g..F*....h..j.| +00000040 f2 a3 fa bd 94 34 1d |.....4.| +[327 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[328 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 58 67 31 2a 17 9a 9e 54 af 00 |0E.!..Xg1*...T..| +00000010 10 9b e2 4f 30 58 b0 a4 17 b0 54 4e cf 9b e8 d5 |...O0X....TN....| +00000020 be df 31 ff d2 02 20 5c ed 38 53 26 4f 27 d3 82 |..1... \.8S&O'..| +00000030 54 b7 cc 52 39 7f 43 f0 0d e2 1d b5 3d 52 ce d7 |T..R9.C.....=R..| +00000040 2f f5 3a b9 98 10 b7 |/.:....| +[329 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[32a 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[32b 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[32c 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[32d 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[32e 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32f 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[330 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[331 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[332 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers +[333 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\320\200\336\365:\247\350\005\037\006\345c\267&\034.\021j\317\000\263\250\216R\277\227\002 \\(i\365\246hy\006\313#$\226\020\255>+\314_\252\231C\26483\333\215\361\273\005b\026\332" > > +[334 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes +[335 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[336 05-20 18:20:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[337 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting, peers found 0 +[338 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[339 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[33a 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[33b 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[33c 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...2D3C120C0884D2B080BFEFB388161001 +[33d 05-20 18:20:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FEBBF7FABC056C7D56C1D6BAA7E5837DD487C2465D7B065F3259115AF0F539A4 +[33e 05-20 18:20:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[33f 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[340 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[341 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[342 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[343 05-20 18:20:00.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[344 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[345 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[346 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[347 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161009 +[348 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C8B9CBC8E447352F6627D7DE1F52F90C5DFB4CA3BA388C83821A5F5591668CC8 +[349 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[34a 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[34b 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[34c 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\302\320\333\256\304>m\016\321~\334\035\301\363L\230M\316\201\0043a\346\206\002 v2\372\007\177H\214\305^\244\002L\312\227\300qq\304\234\220\005\315\345\361\252\365\264\325\327\275u\201" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[34d 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\302\320\333\256\304>m\016\321~\334\035\301\363L\230M\316\201\0043a\346\206\002 v2\372\007\177H\214\305^\244\002L\312\227\300qq\304\234\220\005\315\345\361\252\365\264\325\327\275u\201" > > > , Envelope: 271 bytes, Signature: 0 bytes +[34e 05-20 18:20:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34f 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +[350 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[351 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +[352 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[353 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 b9 cb c8 e4 47 35 2f 66 27 d7 de 1f 52 f9 0c |.....G5/f'...R..| +00000010 5d fb 4c a3 ba 38 8c 83 82 1a 5f 55 91 66 8c c8 |].L..8...._U.f..| +[354 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 b2 bc d5 c1 6e 15 d6 68 c5 b5 |0E.!......n..h..| +00000010 ff 52 6a 09 8c b3 3c 2c b8 14 46 78 91 7a 77 0d |.Rj...<,..Fx.zw.| +00000020 b6 3d 92 f8 29 02 20 56 99 7b 5c 5a 2c 57 85 e4 |.=..). V.{\Z,W..| +00000030 6d ee 3d 99 c6 b4 81 b0 a0 c4 17 8d 8e f0 17 37 |m.=............7| +00000040 3f 93 15 2e 08 53 5b |?....S[| +[355 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[356 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f 4e 48 9d a2 b1 47 3e c2 d0 db ae |0D. .NH...G>....| +00000010 c4 3e 6d 0e d1 7e dc 1d c1 f3 4c 98 4d ce 81 04 |.>m..~....L.M...| +00000020 33 61 e6 86 02 20 76 32 fa 07 7f 48 8c c5 5e a4 |3a... v2...H..^.| +00000030 02 4c ca 97 c0 71 71 c4 9c 90 05 cd e5 f1 aa f5 |.L...qq.........| +00000040 b4 d5 d7 bd 75 81 |....u.| +[357 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[358 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[359 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35a 05-20 18:20:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35b 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37014 +[35c 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0030a6b40 +[35d 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[35e 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[35f 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[360 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[361 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 35 03 67 9d 68 c3 9a 34 6c 74 42 67 37 58 03 |;5.g.h..4ltBg7X.| +00000010 96 61 1d 93 1f a0 c3 4b bb d1 a2 e6 21 48 e9 93 |.a.....K....!H..| +[362 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 b3 e9 b2 0b cc f4 1f 7f ee 8f |0E.!............| +00000010 64 09 01 60 3c 70 cd 14 ad fd db cd 3e 61 a1 78 |d..`a.x| +00000020 26 40 42 6a c4 02 20 5e 6f 9c 4a 4f 85 60 bf 0d |&@Bj.. ^o.JO.`..| +00000030 02 6a f7 18 e8 41 c1 90 6d ed 49 1f 7e 29 45 88 |.j...A..m.I.~)E.| +00000040 e7 a7 ef fe ad a5 3f |......?| +[363 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[364 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002b46f50, header 0xc0030a6f50 +[365 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[366 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU [][098005f9] processing txid: 098005f9a4c9063aa8e2392b8225912443a9be27b57494d9463a4a0e21b9c17e +[367 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU [][098005f9] Entry chaincode: name:"cscc" +[368 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> INFO [][098005f9] Entry chaincode: name:"cscc" +[369 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[36a 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[36b 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[36c 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[36d 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[36e 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 35 03 67 9d 68 c3 9a 34 6c 74 42 67 37 58 03 |;5.g.h..4ltBg7X.| +00000010 96 61 1d 93 1f a0 c3 4b bb d1 a2 e6 21 48 e9 93 |.a.....K....!H..| +[36f 05-20 18:20:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 b3 e9 b2 0b cc f4 1f 7f ee 8f |0E.!............| +00000010 64 09 01 60 3c 70 cd 14 ad fd db cd 3e 61 a1 78 |d..`a.x| +00000020 26 40 42 6a c4 02 20 5e 6f 9c 4a 4f 85 60 bf 0d |&@Bj.. ^o.JO.`..| +00000030 02 6a f7 18 e8 41 c1 90 6d ed 49 1f 7e 29 45 88 |.j...A..m.I.~)E.| +00000040 e7 a7 ef fe ad a5 3f |......?| +[370 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU [098005f9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[371 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU [098005f9] notifying Txid:098005f9a4c9063aa8e2392b8225912443a9be27b57494d9463a4a0e21b9c17e, channelID: +[372 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[373 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> INFO [][098005f9] Exit chaincode: name:"cscc" (5ms) +[374 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][098005f9] Exit +[375 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37014 +[376 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37014 grpc.code=OK grpc.call_duration=9.9988ms +[377 05-20 18:20:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[378 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37022 +[379 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002b534a0 +[37a 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[37b 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[37c 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[37d 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[37e 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 84 e3 82 58 a8 c2 00 03 b3 2d 2a 7d 1a eb bd |....X.....-*}...| +00000010 f7 46 19 4c 30 5e 7a e3 96 11 cf 8f 7a 87 7c 05 |.F.L0^z.....z.|.| +[37f 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df b0 6a f0 17 75 7a e8 8b 50 3a |0E.!...j..uz..P:| +00000010 06 d8 3b fb aa 91 64 4c 28 e6 17 e9 e8 76 65 0c |..;...dL(....ve.| +00000020 54 ad 96 b2 00 02 20 54 4a 55 8b d9 8c 53 8f c9 |T..... TJU...S..| +00000030 c7 c6 bd 91 9a 96 32 c6 5f ec 2e 64 36 db b6 1d |......2._..d6...| +00000040 23 fe 89 56 fc 01 9d |#..V...| +[380 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[381 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002a268c0, header 0xc002b538b0 +[382 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[383 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU [][fbf4ab07] processing txid: fbf4ab07628a4581a4fdf127813900858f84bcc6985588794072b1c6a9aaa029 +[384 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU [][fbf4ab07] Entry chaincode: name:"qscc" +[385 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> INFO [][fbf4ab07] Entry chaincode: name:"qscc" +[386 05-20 18:20:02.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[387 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[388 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[389 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[38a 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[38b 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38c 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38d 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38e 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[38f 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 gate 1589998802032327000 evaluation starts +[390 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 signed by 0 principal evaluation starts (used [false]) +[391 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 processing identity 0 with bytes of 115a110 +[392 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[393 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 principal evaluation fails +[394 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e9ba0 gate 1589998802032327000 evaluation fails +[395 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[396 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[397 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[398 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 gate 1589998802032975000 evaluation starts +[399 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 signed by 0 principal evaluation starts (used [false]) +[39a 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 processing identity 0 with bytes of 115a110 +[39b 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[39c 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[39d 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[39e 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 principal matched by identity 0 +[39f 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 84 e3 82 58 a8 c2 00 03 b3 2d 2a 7d 1a eb bd |....X.....-*}...| +00000010 f7 46 19 4c 30 5e 7a e3 96 11 cf 8f 7a 87 7c 05 |.F.L0^z.....z.|.| +[3a0 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df b0 6a f0 17 75 7a e8 8b 50 3a |0E.!...j..uz..P:| +00000010 06 d8 3b fb aa 91 64 4c 28 e6 17 e9 e8 76 65 0c |..;...dL(....ve.| +00000020 54 ad 96 b2 00 02 20 54 4a 55 8b d9 8c 53 8f c9 |T..... TJU...S..| +00000030 c7 c6 bd 91 9a 96 32 c6 5f ec 2e 64 36 db b6 1d |......2._..d6...| +00000040 23 fe 89 56 fc 01 9d |#..V...| +[3a1 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 principal evaluation succeeds for identity 0 +[3a2 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031729f0 gate 1589998802032975000 evaluation succeeds +[3a3 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3a4 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a5 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a6 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a7 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU [fbf4ab07] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3a8 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU [fbf4ab07] notifying Txid:fbf4ab07628a4581a4fdf127813900858f84bcc6985588794072b1c6a9aaa029, channelID: +[3a9 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3aa 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> INFO [][fbf4ab07] Exit chaincode: name:"qscc" (5ms) +[3ab 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU [][fbf4ab07] Exit +[3ac 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37022 +[3ad 05-20 18:20:02.03 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37022 grpc.code=OK grpc.call_duration=7.5735ms +[3ae 05-20 18:20:02.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37022: read: connection reset by peer +[3af 05-20 18:20:02.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3b0 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3b1 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b2 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3b3 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3b4 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 3d 45 05 c4 e3 37 e7 19 ca 0d 55 14 a1 c9 f8 |.=E...7....U....| +00000010 7d 90 b8 c7 d0 e5 85 08 31 f5 78 63 45 c8 56 6e |}.......1.xcE.Vn| +[3b5 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 40 f5 7f 31 3e 74 08 9a 19 fe |0E.!..@..1>t....| +00000010 af b9 aa 70 f7 fb 87 05 f5 56 9b 9a 26 11 a7 a8 |...p.....V..&...| +00000020 7e fd a8 9f 1a 02 20 06 c5 90 00 29 bf 80 8f 1b |~..... ....)....| +00000030 74 f5 55 58 4f 42 23 f0 8e ec 88 29 76 8a 76 0c |t.UXOB#....)v.v.| +00000040 b6 35 5a 39 1d db a2 |.5Z9...| +[3b6 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3b7 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 33 62 6a 54 4f 52 bc a9 84 7a ad |0D. e3bjTOR...z.| +00000010 78 9f c7 f2 ae 6e cb ca 57 20 a2 8e 3d df 88 1e |x....n..W ..=...| +00000020 a1 95 c8 f4 02 20 7d 54 e9 e4 4a 6f 9c 90 9a 58 |..... }T..Jo...X| +00000030 72 04 ab 63 9a 2a 2c af 64 0f fc 8b c4 c2 ee 90 |r..c.*,.d.......| +00000040 a2 33 1d 2b 74 7f |.3.+t.| +[3b8 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3b9 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3ba 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3bb 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3bc 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[3bd 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3be 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bf 05-20 18:20:03.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c0 05-20 18:20:03.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +[3c1 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c2 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c3 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[3c4 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +[3c5 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +00000040 1f 39 c2 0b 9a b3 5c |.9....\| +[3c6 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c7 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c8 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c9 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ca 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3cb 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cc 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[3cd 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 gate 1589998803647489100 evaluation starts +[3ce 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 signed by 0 principal evaluation starts (used [false]) +[3cf 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 processing identity 0 with bytes of 115a110 +[3d0 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3d1 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 principal evaluation fails +[3d2 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a0700 gate 1589998803647489100 evaluation fails +[3d3 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3d4 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d5 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3d6 05-20 18:20:03.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 gate 1589998803649932800 evaluation starts +[3d7 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 signed by 0 principal evaluation starts (used [false]) +[3d8 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 processing identity 0 with bytes of 115a110 +[3d9 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[3da 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[3db 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[3dc 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 principal matched by identity 0 +[3dd 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +[3de 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +00000040 1f 39 c2 0b 9a b3 5c |.9....\| +[3df 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 principal evaluation succeeds for identity 0 +[3e0 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031a1550 gate 1589998803649932800 evaluation succeeds +[3e1 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3e2 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3e3 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e4 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e5 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e6 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +[3e7 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[3e8 05-20 18:20:03.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e9 05-20 18:20:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3ea 05-20 18:20:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816100A +[3eb 05-20 18:20:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AC960A795E9A97AAC80BC7C0EB6262E65F5B36D860CEF8BFDAFB8BD3D7385639 +[3ec 05-20 18:20:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3ed 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3ee 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3ef 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3f0 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[3f1 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3f2 05-20 18:20:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f3 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3f4 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3f5 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f6 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3f7 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[3f9 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +[3fa 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +00000040 1f 39 c2 0b 9a b3 5c |.9....\| +[3fb 05-20 18:20:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fc 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3fd 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3fe 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3ff 05-20 18:20:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[400 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[401 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[402 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[403 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[404 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 7b 2d c1 c8 c7 ee 49 60 52 b0 7d b4 af 59 9d |c{-....I`R.}..Y.| +00000010 be ea 24 41 12 7d d2 d2 d6 77 c3 cf c2 a1 a5 57 |..$A.}...w.....W| +[405 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 45 4a 9a 6b 52 01 68 dd af 50 3c |0D. YEJ.kR.h..P<| +00000010 e5 58 98 39 4e ea c1 06 0b de 04 57 67 c9 7e 60 |.X.9N......Wg.~`| +00000020 ac 5c 8e a5 02 20 52 be 0a 1f 21 4d 7c 01 ad 6c |.\... R...!M|..l| +00000030 28 ed 0a 3c ba e9 1a 1b 46 c1 7b 59 ac f4 c7 1c |(..<....F.{Y....| +00000040 38 e4 e2 20 67 37 |8.. g7| +[406 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[407 05-20 18:20:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 54 4e 7f 6c 77 a2 13 7c 26 31 c0 |0D. dTN.lw..|&1.| +00000010 ba 8a 41 35 bf 2c b0 f6 a4 b9 ce 11 0a 6c 1b c6 |..A5.,.......l..| +00000020 a9 05 f4 42 02 20 37 46 0a 7e dd 0d e1 16 2e 08 |...B. 7F.~......| +00000030 9d 73 c8 8e d6 0d f7 b1 1d 97 13 cf d8 e3 36 5c |.s............6\| +00000040 46 32 23 fd a6 41 |F2#..A| +[408 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[409 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[40a 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[40b 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[40c 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[40d 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40f 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[410 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[411 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers +[412 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +[413 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[414 05-20 18:20:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +[415 05-20 18:20:04.63 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] +[416 05-20 18:20:04.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[417 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[418 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[419 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41a 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[41b 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[41c 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[41e 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816100B +[41f 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 13D01978FB980EB60893D92C7B3A6F90F5CAF85CABB40B1AB960C14A0E180D04 +[420 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[421 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[422 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[423 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[424 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[425 05-20 18:20:04.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[426 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:57898 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +[427 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[428 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +[429 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[42a 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d0 19 78 fb 98 0e b6 08 93 d9 2c 7b 3a 6f 90 |...x.......,{:o.| +00000010 f5 ca f8 5c ab b4 0b 1a b9 60 c1 4a 0e 18 0d 04 |...\.....`.J....| +[42b 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 c1 e4 ec e2 ef 33 30 a4 a0 64 |0E.!.......30..d| +00000010 d3 f0 e6 58 fa e0 9b 5e ee ac a5 88 2c f7 5e af |...X...^....,.^.| +00000020 83 eb 87 fb d2 02 20 71 39 a5 46 d8 c5 5f 25 9d |...... q9.F.._%.| +00000030 9d 97 7f de 30 cf 8f 3f 98 51 9e 61 d0 9d e1 69 |....0..?.Q.a...i| +00000040 22 33 b7 54 1c e0 e3 |"3.T...| +[42c 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[42d 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 01 cb 78 66 24 77 3b c8 ab |0E.!..`..xf$w;..| +00000010 f6 68 7e cb 79 f3 7e 74 58 4c cc e4 2e 26 f0 65 |.h~.y.~tXL...&.e| +00000020 22 03 02 8f 77 02 20 02 d9 e5 17 00 4b 0f 1b 5a |"...w. .....K..Z| +00000030 b5 2b 6c 6a c6 bd 0f 86 98 5d b9 06 8e 4b 74 9b |.+lj.....]...Kt.| +00000040 b3 00 fa ac 39 47 ed |....9G.| +[42e 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[42f 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[430 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[431 05-20 18:20:04.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[432 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[433 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> INFO 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Becoming a leader +[434 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +[435 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +[436 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[437 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[438 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[439 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610021801 +[43a 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FF53A31DD1A68861A0EAD657E78E3C104ED989C685D5CAFDAA5DA6060C1439CF +[43b 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[43c 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +[43d 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[43e 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[43f 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }] +[440 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[441 05-20 18:20:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003250780, CONNECTING +[442 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[443 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[444 05-20 18:20:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[445 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003250780, READY +[446 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer2.example.com:7050 [OrdererMSP]} +[447 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer2.example.com:7050 +[448 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer2.example.com:7050 ... +[449 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +[44a 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +[44b 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[44c 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[44d 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608D5E995F60522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +[44e 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92289707CDADB33A24D38FA666F190B40BB8DC44C10DEE6A89E5567D9A72A623 +[44f 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[450 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[451 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[452 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[453 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[454 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[455 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[456 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +WFUnXFrrWMedpv6WCUtVYuZy +-----END CERTIFICATE----- +[457 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 gate 1589998805709132800 evaluation starts +[458 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 signed by 0 principal evaluation starts (used [false]) +[459 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 processing identity 0 with bytes of 115a110 +[45a 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +[45b 05-20 18:20:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[45c 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[45d 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 principal matched by identity 0 +[45e 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 ae 1e 93 ef 16 d3 72 49 19 6b 54 2f e7 67 ae |.......rI.kT/.g.| +00000010 76 03 6f 1e 50 5e 5f e2 01 92 44 1d 09 fa cc 1e |v.o.P^_...D.....| +[45f 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 02 46 89 6e 97 c7 75 13 33 1e |0E.!...F.n..u.3.| +00000010 68 38 d3 b3 23 63 c2 d8 9d 35 62 e2 6c a1 f2 02 |h8..#c...5b.l...| +00000020 56 ee aa df 2a 02 20 6e 96 d4 a5 5f 14 02 95 75 |V...*. n..._...u| +00000030 e5 72 89 6e 58 73 a9 02 10 de c2 6d 7a 54 e9 1f |.r.nXs.....mzT..| +00000040 9d 16 cd cf a2 88 f6 |.......| +[460 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 principal evaluation succeeds for identity 0 +[461 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8a50 gate 1589998805709132800 evaluation succeeds +[462 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[463 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[464 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[465 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[466 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +[467 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +[468 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +[469 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +[46a 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +[46b 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +[46c 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +[46d 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[46e 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0030cdac0 env 0xc0032632c0 txn 0 +[46f 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0032632c0 +[470 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +[471 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[472 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[473 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[474 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[475 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[476 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[477 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[478 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[479 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[47a 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 b8 81 45 57 b3 76 22 8f e3 1a 03 c3 91 2f 86 |...EW.v"....../.| +00000010 7e 72 d9 f3 aa 71 79 97 65 bc 30 9d 33 cc e6 12 |~r...qy.e.0.3...| +[47b 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 a0 2b cc a7 6e 38 18 f4 da de |0E.!...+..n8....| +00000010 55 a1 da 90 8d 69 4c 45 cd 0b c0 36 18 d5 5a 21 |U....iLE...6..Z!| +00000020 fa 5f 93 bc 1f 02 20 5b 9e 95 84 5c e6 2b cc d1 |._.... [...\.+..| +00000030 f5 6c a3 3f bd 2e 63 05 ad db bb 57 a1 1c cd 2d |.l.?..c....W...-| +00000040 85 68 ef ee ee 6d 09 |.h...m.| +[47c 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[47d 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00333b500, header channel_header:"\010\001\032\006\010\323\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\002E\204\207j|i\376\336\000H\321\313R\2117%\265\n\377\211iZX" +[47e 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[47f 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[480 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[481 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[482 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[483 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[484 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[485 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[486 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[487 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[488 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[489 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[48a 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[48b 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[48c 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[48d 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[48e 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +[48f 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +[490 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[491 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[492 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[493 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[494 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[495 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[496 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +[497 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[498 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[499 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +[49a 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +[49b 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 gate 1589998805727402400 evaluation starts +[49c 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 signed by 0 principal evaluation starts (used [false]) +[49d 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 processing identity 0 with bytes of 115a110 +[49e 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[49f 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[4a0 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[4a1 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4a2 05-20 18:20:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[4a3 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [1] +[4a4 05-20 18:20:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes to the block puller +[4a5 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +[4a6 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4a7 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[4a8 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[4a9 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4aa 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[4ab 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 gate 1589998805731809100 evaluation starts +[4ac 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 signed by 0 principal evaluation starts (used [false]) +[4ad 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 processing identity 0 with bytes of 115a110 +[4ae 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 principal matched by identity 0 +[4b0 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 a4 1e f0 21 bc 6d 6f dd 04 f4 ee 97 a0 5b e2 |....!.mo......[.| +00000010 8d e4 d8 70 1c 40 6f dd d0 21 0f 26 bb 5b b4 87 |...p.@o..!.&.[..| +[4b1 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 d6 4d c8 5c 8c 2f 50 b5 60 98 |0E.!...M.\./P.`.| +00000010 60 31 c4 3f 7b 2a fa f4 cf 19 bf 22 cd 96 db 2a |`1.?{*....."...*| +00000020 02 5e fb 02 b2 02 20 4c f9 d7 8f 34 1a 07 5a 22 |.^.... L...4..Z"| +00000030 bc 54 70 3d a2 f4 c9 07 28 fb aa 82 3f 42 71 05 |.Tp=....(...?Bq.| +00000040 dc e8 c0 83 d2 f1 3f |......?| +[4af 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[4b2 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4b3 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 principal matched by identity 0 +[4b4 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 79 bb bc d5 66 a7 32 64 00 1d cd ec 20 e4 b3 |.y...f.2d.... ..| +00000010 34 24 69 04 47 d4 24 d2 a8 5d 0c 8a e0 13 68 a2 |4$i.G.$..]....h.| +[4b5 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 principal evaluation succeeds for identity 0 +[4b6 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337e530 gate 1589998805731809100 evaluation succeeds +[4b7 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[4b8 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 7e fe 1f 62 8c ba d5 cb b7 7c |0E.!..~..b.....|| +00000010 34 2b e8 b7 b3 40 bb 06 00 09 85 73 86 fb 9c 60 |4+...@.....s...`| +00000020 d0 c6 0c 45 45 02 20 46 0f 5e bd be 67 22 84 74 |...EE. F.^..g".t| +00000030 3d 69 0a 77 0f 98 6d 66 d7 d8 b6 99 ec 7b 8a a5 |=i.w..mf.....{..| +00000040 b6 a1 df 24 f2 fb af |...$...| +[4b9 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[4ba 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[4bb 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[4bc 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +[4bd 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 principal evaluation succeeds for identity 0 +[4be 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003370a20 gate 1589998805727402400 evaluation succeeds +[4bf 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +[4c0 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[4c1 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +[4c2 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +[4c3 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +[4c4 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [1] +[4c5 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to the block puller +[4c6 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +[4c7 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4c8 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4c9 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4ca 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4cb 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes to 1 peers +[4cc 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to 1 peers +[4cd 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes +[4ce 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cf 05-20 18:20:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4d0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[4d1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4d2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28179 bytes, seq: 1}, Envelope: 28212 bytes, Signature: 0 bytes +[4d4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4d3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4d5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[4d6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4d7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4d8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[4d9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[4da 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[4db 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4dc 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4dd 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4de 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +[4df 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[4e0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4e1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4e2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4e3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[4e4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[4e5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[4e6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[4e7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[4e8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4e9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[4ea 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[4eb 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4ec 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4ed 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4ee 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4ef 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4f0 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +[4f1 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[4f2 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4f3 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4f4 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[4f5 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[4f6 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4f7 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4f8 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4f9 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4fa 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[4fb 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[4fc 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4fd 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4fe 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[4ff 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[500 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[501 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[502 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[503 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[504 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[505 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[506 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[507 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[508 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[509 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[50a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[50b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[50c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[50d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[50e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[50f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[510 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[511 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[512 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[513 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[514 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[515 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +[516 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[517 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[518 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[519 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[51a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[51b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[51c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[51d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[51e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[51f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[520 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[521 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[522 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[523 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[524 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[525 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[526 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[527 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[528 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[529 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[52a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[52b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[52c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[52d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[52e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +[52f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[530 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[531 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[532 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[533 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[534 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[535 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[536 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[537 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[538 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[539 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[53a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[53b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[53c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[53d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[53e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[53f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[540 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[541 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[542 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[543 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[544 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[545 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[546 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[547 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[548 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[549 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[54a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[54b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[54c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[54d 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[54e 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[54f 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[550 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[551 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[552 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[553 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[554 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[555 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[556 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[557 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[558 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[559 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[55a 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[55b 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[55c 05-20 18:20:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[55d 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[55e 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[55f 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[560 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[561 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[562 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[563 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[564 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[565 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[566 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[567 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[568 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[569 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[56a 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[56b 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[56c 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[56d 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[56e 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +[56f 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[570 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[571 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[572 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[573 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[574 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[575 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[576 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 gate 1589998805757367100 evaluation starts +[577 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 signed by 0 principal evaluation starts (used [false]) +[578 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 processing identity 0 with bytes of 115a110 +[579 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[57a 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 principal evaluation fails +[57b 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b67f0 gate 1589998805757367100 evaluation fails +[57c 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[57d 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[57e 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[57f 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 gate 1589998805758241100 evaluation starts +[580 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 signed by 0 principal evaluation starts (used [false]) +[581 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 processing identity 0 with bytes of 115a110 +[582 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 principal matched by identity 0 +[583 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +[584 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +00000040 1f 39 c2 0b 9a b3 5c |.9....\| +[585 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 principal evaluation succeeds for identity 0 +[586 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b6d60 gate 1589998805758241100 evaluation succeeds +[587 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[588 05-20 18:20:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[589 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[58a 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[58b 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[58c 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[58d 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[58e 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[58f 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[590 05-20 18:20:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[591 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[592 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[593 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[594 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[595 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[596 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[597 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 61ms +[598 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[599 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[59a 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[59b 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +[59c 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[59d 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[59e 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[59f 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +[5a0 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[5a1 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[5a2 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[5a3 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[5a4 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[5a5 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[5a6 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[5a7 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[5a8 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[5a9 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[5aa 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +[5ab 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003353780)} +[5ac 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[5ad 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[5ae 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[5af 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +[5b0 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +[5b1 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +[5b2 05-20 18:20:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0030cdac0 env 0xc0032632c0 txn 0 +[5b3 05-20 18:20:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +[5b4 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xa6, 0xe9, 0x70, 0x63, 0xe3, 0xe8, 0x98, 0x1e, 0x14, 0xfd, 0x2a, 0x6f, 0x3d, 0xd9, 0x24, 0x28, 0x30, 0xda, 0x1, 0x2c, 0xc0, 0x6d, 0x3f, 0xca, 0x43, 0xa9, 0xc8, 0x4, 0x6b, 0x7f, 0xa7, 0x8c} txOffsets= +txId=5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d locPointer=offset=71, bytesLength=27137 +] +[5b5 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to txid-index +[5b6 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27137] for tx number:[0] ID: [5686d787bd9a929b38c20f376e5a5a336c800c364ae4b7b2b2eb634f57bca25d] to blockNumTranNum index +[5b7 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56676], isChainEmpty=[false], lastBlockNumber=[1] +[5b8 05-20 18:20:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +[5b9 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +[5ba 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +[5bb 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[5bc 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[5bd 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[5be 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[5bf 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[5c0 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[5c1 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +[5c2 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[5c3 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +[5c4 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +[5c5 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[5c6 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +[5c7 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +[5c8 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +[5c9 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 29ms (state_validation=1ms block_and_pvtdata_commit=21ms state_commit=4ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +[5ca 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[5cb 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8EB97EEBEEFB38816...096D8DADEA4206176416CB532A020802 +[5cc 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 86347A966D89593B6686FD01C5C368E5FE69B8666FBB32AE8F4943EC7943B307 +[5cd 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +[5ce 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +[5cf 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +[5d0 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +[5d1 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +[5d2 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[5d3 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003353a40 env 0xc0035cc190 txn 0 +[5d4 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0035cc190 +[5d5 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +[5d6 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[5d7 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[5d8 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[5d9 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5da 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[5db 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[5dc 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[5dd 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[5de 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[5df 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 37 bb 71 60 be 2a 5d cc c1 22 4e 4f 27 d1 58 |<7.q`.*].."NO'.X| +00000010 61 69 d0 5c 2e e4 d9 b0 e3 9c e2 21 7e 90 49 40 |ai.\.......!~.I@| +[5e0 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 60 c6 0c 5d 48 6b 58 d3 55 d6 |0E.!..`..]HkX.U.| +00000010 55 aa 91 32 59 e9 96 66 be 0b b5 dc d7 6d 1e cd |U..2Y..f.....m..| +00000020 f6 0e 3e eb ae 02 20 0b 84 cd 3c d4 a3 21 14 67 |..>... ...<..!.g| +00000030 cc 8e d7 67 bd 5d 55 59 2b de 4a 52 0f f7 5f bf |...g.]UY+.JR.._.| +00000040 23 c2 cc 10 3c 4b c5 |#... DEBU exits successfully +[5e2 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00362c000, header channel_header:"\010\001\032\006\010\325\351\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\307\307\227\3547p\266\023.y\313k\321\220\275\301\212\275\034\002(\264\247\345" +[5e3 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[5e4 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[5e5 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[5e6 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[5e7 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[5e8 05-20 18:20:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[5e9 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[5ea 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[5eb 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[5ec 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[5ed 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[5ee 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[5ef 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[5f0 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[5f1 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[5f2 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[5f3 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +[5f4 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +[5f5 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[5f6 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[5f7 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[5f8 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[5f9 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[5fa 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[5fb 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +[5fc 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[5fd 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[5fe 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +[5ff 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +[600 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[601 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- +[602 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 gate 1589998805811037200 evaluation starts +[603 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 signed by 0 principal evaluation starts (used [false]) +[604 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 processing identity 0 with bytes of 115a110 +[605 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +[606 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +[607 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[608 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[609 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +[60a 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[60b 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 principal matched by identity 0 +[60c 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 92 7b f9 46 89 05 92 38 4c 6d 5f c3 a9 62 6e |..{.F...8Lm_..bn| +00000010 e3 f5 76 68 2d 5f a6 fd 78 61 e4 6a e2 87 1f 44 |..vh-_..xa.j...D| +[60d 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca b3 e8 23 c3 60 45 94 c5 83 b6 |0E.!....#.`E....| +00000010 fc c1 91 74 fb 6f 45 ce 5f 37 57 4f 63 17 4a 13 |...t.oE._7WOc.J.| +00000020 b4 6d e4 31 24 02 20 30 62 9e 56 8c 0a 59 5b d4 |.m.1$. 0b.V..Y[.| +00000030 60 3b 0e 10 97 e5 49 08 ce 97 42 a9 c5 f6 35 99 |`;....I...B...5.| +00000040 c1 0e dd 4e f6 78 ea |...N.x.| +[60e 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 principal evaluation succeeds for identity 0 +[60f 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036685a0 gate 1589998805811037200 evaluation succeeds +[610 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +[611 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +[612 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +[613 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[614 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[615 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[616 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:07.813Z grpc.peer_address=172.18.0.8:57948 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=596µs +[617 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[618 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[619 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[61a 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:57948 +[61b 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[61c 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[61d 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57948 +[61e 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[61f 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 99 a5 6e 71 1d 23 52 88 60 98 67 |0D. j..nq.#R.`.g| +00000010 0d 0a e6 7c 1c 62 ff 2d 7d 7c d3 e6 86 12 9e 51 |...|.b.-}|.....Q| +00000020 77 4f b9 9f 02 20 37 61 d0 a9 d5 bd 40 89 8c d1 |wO... 7a....@...| +00000030 ac 1f 2b 7e 96 7f ca fd 54 92 8e b7 9a b7 39 7b |..+~....T.....9{| +00000040 e3 59 b7 2d 63 e5 |.Y.-c.| +[620 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57948 +[621 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57948 +[622 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[623 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:57898 disconnected +[624 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:57898 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=16.4915915s +[625 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[626 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:57948 disconnected +[627 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:15.816Z grpc.peer_address=172.18.0.8:57948 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.1346ms +[628 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +[629 05-20 18:20:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[62a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[62b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[62c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[62d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[62e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +[62f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[630 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[631 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[632 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[633 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[634 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[635 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[636 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[637 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[638 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[639 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[63a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[63b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[63c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[63d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[63e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[63f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[640 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[641 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[642 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[643 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[644 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[645 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[646 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[647 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +[648 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[649 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[64a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[64b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[64c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[64d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[64e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[64f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[650 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[651 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[652 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[653 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[654 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[655 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[656 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[657 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[658 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[659 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[65a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[65b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[65c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[65d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[65e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[65f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[660 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[661 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[662 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[663 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[664 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[665 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[666 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[667 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[668 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[669 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[66a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[66b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[66c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[66d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[66e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[66f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[670 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[671 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[672 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[673 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[674 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[675 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[676 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[677 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[678 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[679 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[67a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[67b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[67c 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[67d 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[67e 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[67f 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[680 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[681 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[682 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[683 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[684 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[685 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[686 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[687 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[688 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[689 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[68a 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[68b 05-20 18:20:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[68c 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[68d 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[68e 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[68f 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[690 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[691 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[692 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[693 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[694 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[695 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[696 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[697 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[698 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[699 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[69a 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[69b 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[69c 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[69d 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[69e 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[69f 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[6a0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[6a1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[6a2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[6a3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[6a4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[6a5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[6a6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[6a7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[6a8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[6a9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[6aa 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[6ab 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[6ac 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[6ad 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[6ae 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[6af 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[6b0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[6b1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[6b2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[6b3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[6b4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[6b5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[6b6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[6b7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[6b8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[6b9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[6ba 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[6bb 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[6bc 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[6bd 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[6be 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[6bf 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[6c0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[6c1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[6c2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[6c3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[6c4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[6c5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[6c6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +[6c7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[6c8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[6c9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[6ca 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[6cb 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[6cc 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[6cd 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[6ce 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6cf 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[6d0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 gate 1589998805832978600 evaluation starts +[6d1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 signed by 0 principal evaluation starts (used [false]) +[6d2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 processing identity 0 with bytes of 115a110 +[6d3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[6d4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 principal evaluation fails +[6d5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773460 gate 1589998805832978600 evaluation fails +[6d6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[6d7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[6d8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[6d9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 gate 1589998805833450600 evaluation starts +[6da 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 signed by 0 principal evaluation starts (used [false]) +[6db 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 processing identity 0 with bytes of 115a110 +[6dc 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[6dd 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[6de 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[6df 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 principal matched by identity 0 +[6e0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 f9 73 d6 9e 23 e1 55 b0 41 59 63 58 57 12 f6 |..s..#.U.AYcXW..| +00000010 36 22 4a 80 31 9a 67 74 07 49 75 d3 a2 af f5 02 |6"J.1.gt.Iu.....| +[6e1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 dd 80 a5 88 67 11 5c 52 d1 30 |0E.!......g.\R.0| +00000010 c6 d6 e4 78 22 f4 7f 2e 69 f2 75 d2 0b 23 b5 0c |...x"...i.u..#..| +00000020 87 00 8a c8 57 02 20 18 ae e9 da 24 7d ac a0 02 |....W. ....$}...| +00000030 32 e8 f3 e0 eb e3 37 79 ba ff 78 9d 7d 47 ab 02 |2.....7y..x.}G..| +00000040 1f 39 c2 0b 9a b3 5c |.9....\| +[6e2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 principal evaluation succeeds for identity 0 +[6e3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00378a2b0 gate 1589998805833450600 evaluation succeeds +[6e4 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[6e5 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[6e6 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[6e7 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[6e8 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[6e9 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +[6ea 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +[6ec 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[6ed 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[6ee 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[6ef 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[6f0 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037a9b00, CONNECTING +[6eb 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[6f1 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[6f2 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[6f3 05-20 18:20:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[6f4 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[6f5 05-20 18:20:05.84 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037a9b00, READY +[6f6 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[6f7 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[6f8 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[6f9 05-20 18:20:05.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +[6fa 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +[6fb 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6fc 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6fd 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- +[6fe 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[6ff 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[700 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[701 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[702 05-20 18:20:05.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[703 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[704 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[705 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[706 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[707 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[708 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[709 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[70a 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[70b 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[70c 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[70d 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[70e 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[70f 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[710 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[711 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- +[712 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 gate 1589998805877283000 evaluation starts +[713 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003353a40 env 0xc0035cc190 txn 0 +[714 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[715 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 70ms +[716 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[717 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[718 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[719 05-20 18:20:05.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 signed by 0 principal evaluation starts (used [false]) +[71b 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 processing identity 0 with bytes of 115a110 +[71a 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +[71c 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[71d 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[71e 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[71f 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +[720 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[721 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[722 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[723 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[724 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[725 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[726 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[727 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[728 05-20 18:20:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[729 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[72a 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +[72b 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00380de40)} +[72c 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[72d 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[72e 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[72f 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +[730 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +[731 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +[732 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[733 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[734 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[735 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +[736 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 principal matched by identity 0 +[737 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[738 05-20 18:20:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 8e fd 78 8c 51 b2 e9 7f a4 15 a2 |0D. y..x.Q......| +00000010 a3 5e ae bd c9 b9 f6 5a b9 c4 32 df 87 0b f6 fc |.^.....Z..2.....| +00000020 7b 05 e8 0c 02 20 2b b2 9b 06 5a a7 0f 7c 6e 1e |{.... +...Z..|n.| +00000030 3e f2 a9 0c ad 99 73 15 33 17 9f 6b ff 0e b6 5c |>.....s.3..k...\| +00000040 ab 32 01 69 fa e7 |.2.i..| +[739 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 principal evaluation succeeds for identity 0 +[73a 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830cb0 gate 1589998805877283000 evaluation succeeds +[73b 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[73c 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[73d 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[73e 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xf5, 0x87, 0x9d, 0xf3, 0xcd, 0xbf, 0xbf, 0x43, 0x96, 0xe2, 0xb0, 0xb9, 0x62, 0xaf, 0x50, 0x91, 0xe3, 0xeb, 0x80, 0x22, 0x57, 0x52, 0xd1, 0xfd, 0x79, 0x4c, 0xe4, 0xfe, 0xe5, 0xa7, 0x26, 0x2a} txOffsets= +txId=11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0 locPointer=offset=71, bytesLength=27141 +] +[73f 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56747, bytesLength=27141] for tx ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to txid-index +[740 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56747, bytesLength=27141] for tx number:[0] ID: [11bed32b3d0600d2b81b1150f707432787a4d33094128b1ba3efbbe6374c1cf0] to blockNumTranNum index +[741 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[742 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +[743 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[744 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[745 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[746 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161011 +[747 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84881], isChainEmpty=[false], lastBlockNumber=[2] +[748 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +[749 05-20 18:20:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3EE13C74A68B071D38C535DA0DDB119CF99557941C0DF8BACF878EA7D3E8901B +[74a 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[74b 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[74c 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[74d 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[74e 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:8401356067006766998 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +[74f 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:8401356067006766998 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[750 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[751 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +[752 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +[753 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[754 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[755 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[756 05-20 18:20:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[757 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[758 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[759 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[75a 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[75b 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[75c 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[75d 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +[75e 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +[75f 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +[760 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[761 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +[762 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +[763 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[764 05-20 18:20:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003947d50, CONNECTING +[765 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +[766 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 50ms (state_validation=11ms block_and_pvtdata_commit=25ms state_commit=6ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +[767 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[768 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8EB97EEBEEFB38816...096D8DADEA4206176416CB532A020803 +[769 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8E7EE9C5538D1B6243BF2378D59AED6607558C5C9BB46A06AC3166B0B70AC3DE +[76a 05-20 18:20:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +[76b 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003947d50, READY +[76c 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[76d 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[76e 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[76f 05-20 18:20:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +[770 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +[771 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[772 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[773 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[774 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[775 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[776 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[777 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[778 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[779 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[77a 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[77b 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[77c 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[77d 05-20 18:20:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[77e 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 gate 1589998805962140700 evaluation starts +[77f 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 signed by 0 principal evaluation starts (used [false]) +[780 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 processing identity 0 with bytes of 115a110 +[781 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 principal matched by identity 0 +[782 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[783 05-20 18:20:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 03 40 1d 4a 00 9d db bd f3 |0E.!....@.J.....| +00000010 35 c4 6e 2f 81 83 34 a3 fd 64 55 ad 6d 79 c4 bc |5.n/..4..dU.my..| +00000020 f2 92 0b 2b e2 02 20 67 e5 ea 88 8c 0b d0 80 a3 |...+.. g........| +00000030 62 e4 af d5 8b 12 15 23 07 85 42 66 bc 90 ba c2 |b......#..Bf....| +00000040 7d c3 da 0e 3d e6 ea |}...=..| +[784 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 principal evaluation succeeds for identity 0 +[785 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d4f40 gate 1589998805962140700 evaluation succeeds +[786 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[787 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[788 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[789 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[78a 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +[78b 05-20 18:20:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[78c 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[78d 05-20 18:20:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[78e 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:07.992Z grpc.peer_address=172.18.0.8:57956 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=249.1µs +[78f 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[790 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[791 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[792 05-20 18:20:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:57956 +[793 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:57956 +[794 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[795 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e1 90 a0 43 ca 0e 11 20 b5 57 84 |0D. ^...C... .W.| +00000010 d5 b7 8a dc 55 3a 28 02 ce 94 4b ed b5 84 2c 56 |....U:(...K...,V| +00000020 76 a7 02 22 02 20 11 6c 30 50 f2 a7 2c 26 b2 1f |v..". .l0P..,&..| +00000030 e4 41 20 68 e5 2c 82 9d e5 bc 59 c7 c8 67 41 80 |.A h.,....Y..gA.| +00000040 20 56 df ba 68 67 | V..hg| +[796 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:57956 +[797 05-20 18:20:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:57956 +[798 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8401356067006766998, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +[799 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 8401356067006766998, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +[79a 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[79b 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 8401356067006766998, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +[79c 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[79d 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e e1 3c 74 a6 8b 07 1d 38 c5 35 da 0d db 11 9c |>. DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ad b4 b4 8a c4 89 d7 65 8f e3 |0E.!.........e..| +00000010 14 ac 36 09 8b e1 3a 52 3b a7 7a 17 f7 03 b6 7c |..6...:R;.z....|| +00000020 14 4a c3 48 fe 02 20 10 fd 31 39 00 32 79 56 d0 |.J.H.. ..19.2yV.| +00000030 c7 71 61 8b 4a ef 34 f7 20 66 f1 ae 3f 73 0f a4 |.qa.J.4. f..?s..| +00000040 83 ee 02 33 57 83 98 |...3W..| +[79f 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[7a0 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[7a1 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7a2 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[7a3 05-20 18:20:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7a4 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7a5 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7a6 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7a7 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[7a8 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:57956 disconnected +[7a9 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:15.998Z grpc.peer_address=172.18.0.8:57956 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.5076ms +[7aa 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7ab 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7ac 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7ad 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 gate 1589998806043740000 evaluation starts +[7ae 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 signed by 0 principal evaluation starts (used [false]) +[7af 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 processing identity 0 with bytes of 115a110 +[7b0 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 principal matched by identity 0 +[7b1 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 23 57 95 6b d7 8b e3 45 12 ee ef 02 4d 59 c0 |.#W.k...E....MY.| +00000010 21 9c 88 f7 69 25 2e f6 47 8b 5b 3e a4 50 a7 45 |!...i%..G.[>.P.E| +[7b2 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 8c ee 60 61 00 08 aa 89 78 a3 b4 |0D. ...`a....x..| +00000010 eb 15 c2 43 72 5e c6 1d d3 d9 a6 89 1a 3f b9 d5 |...Cr^.......?..| +00000020 3e 3c e9 6e 02 20 7e 78 79 7c de 4a 02 d5 05 8f |><.n. ~xy|.J....| +00000030 29 ef ad 69 d8 40 1a 5c 46 bd 96 8f f1 e9 44 43 |)..i.@.\F.....DC| +00000040 ef ad a7 74 0c c8 |...t..| +[7b3 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 principal evaluation succeeds for identity 0 +[7b4 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34f90 gate 1589998806043740000 evaluation succeeds +[7b5 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[7b6 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7b7 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7b8 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7b9 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[7ba 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +[7bb 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[7bc 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7bd 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7be 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7bf 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7c0 05-20 18:20:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7c1 05-20 18:20:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7c2 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.341Z grpc.peer_address=172.18.0.5:34180 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=235.9µs +[7c3 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7c4 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[7c5 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[7c6 05-20 18:20:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:34180 +[7c7 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34180 +[7c8 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7c9 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7ca 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7cb 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7cc 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7cd 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7ce 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7cf 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7d0 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7d1 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7d2 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7d3 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 gate 1589998806350999100 evaluation starts +[7d4 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 signed by 0 principal evaluation starts (used [false]) +[7d5 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 processing identity 0 with bytes of 115a110 +[7d6 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 principal matched by identity 0 +[7d7 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[7d8 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d fb 1f 30 08 62 04 b5 c7 6f 0f |0E.!....0.b...o.| +00000010 ed 89 8b 39 3b 08 23 03 11 60 08 0a 2d e1 9d 96 |...9;.#..`..-...| +00000020 fb 3c ec 78 8b 02 20 0a af ce a7 67 d3 06 ab b4 |.<.x.. ....g....| +00000030 47 53 24 6d 2f 1c 99 1d 9a 17 f9 78 07 8c 9a 06 |GS$m/......x....| +00000040 d8 c8 c5 0e 57 62 88 |....Wb.| +[7d9 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 principal evaluation succeeds for identity 0 +[7da 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a877b0 gate 1589998806350999100 evaluation succeeds +[7db 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[7dc 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7dd 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7de 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7df 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34180 +[7e0 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34180 +[7e1 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7e2 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[7e3 05-20 18:20:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7e4 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7e5 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[7e6 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34180 disconnected +[7e7 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.344Z grpc.peer_address=172.18.0.5:34180 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1689ms +[7e8 05-20 18:20:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7e9 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.395Z grpc.peer_address=172.18.0.5:34182 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.1µs +[7ea 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7eb 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[7ec 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[7ed 05-20 18:20:06.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:34182 +[7ee 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34182 +[7ef 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7f0 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7f1 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7f2 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7f3 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7f4 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7f5 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7f6 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7f7 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7f8 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7f9 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7fa 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 gate 1589998806406296500 evaluation starts +[7fb 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 signed by 0 principal evaluation starts (used [false]) +[7fc 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 processing identity 0 with bytes of 115a110 +[7fd 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 principal matched by identity 0 +[7fe 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[7ff 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c3 86 12 b3 a4 8a fd 21 e7 e8 4e |0D. *.......!..N| +00000010 63 e1 72 4a 70 9d 40 1b 22 ae e1 4a 6d d2 ae 34 |c.rJp.@."..Jm..4| +00000020 93 2a 83 d3 02 20 7a cf e5 36 d6 d7 8b dd 3e df |.*... z..6....>.| +00000030 3b 15 49 9e f6 ff 6e 39 b3 b5 3a c7 ff 45 62 3d |;.I...n9..:..Eb=| +00000040 bd 8b de 1c 4c 88 |....L.| +[800 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 principal evaluation succeeds for identity 0 +[801 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae45c0 gate 1589998806406296500 evaluation succeeds +[802 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[803 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[804 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[805 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[806 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34182 +[807 05-20 18:20:06.40 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34182 +[808 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:34182 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:3336462012843755474 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[809 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[80a 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:3336462012843755474 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[80b 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[80c 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[80d 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[80e 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[80f 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[810 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[811 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[812 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[813 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 gate 1589998806422241200 evaluation starts +[814 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 signed by 0 principal evaluation starts (used [false]) +[815 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 processing identity 0 with bytes of 115a110 +[816 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 principal matched by identity 0 +[817 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 5d e0 d3 1d fd 9f e7 47 3a 10 60 81 5a 10 1e |.]......G:.`.Z..| +00000010 57 bc 60 16 28 15 43 43 64 b5 b2 76 fc a9 94 6f |W.`.(.CCd..v...o| +[818 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f df b9 40 2a ca b1 23 ed 7d d2 07 |0D. ?..@*..#.}..| +00000010 50 7f c9 ed b1 cd 43 06 f3 9d 5b c2 c4 07 ac 2a |P.....C...[....*| +00000020 a3 29 62 32 02 20 28 82 16 04 72 df ae 90 8c 23 |.)b2. (...r....#| +00000030 b2 b3 12 bc 9c bd ac 66 db 9c 5a 57 71 8e c7 23 |.......f..ZWq..#| +00000040 f9 11 d0 b5 1b 23 |.....#| +[819 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 principal evaluation succeeds for identity 0 +[81a 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac6e70 gate 1589998806422241200 evaluation succeeds +[81b 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[81c 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[81d 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[81e 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[81f 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[820 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[821 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[822 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[823 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[824 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[825 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[826 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[827 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[828 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[829 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 3336462012843755474, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes to 1 peers +[82a 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +[82b 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3336462012843755474, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 495 bytes, Signature: 0 bytes +[82c 05-20 18:20:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[82d 05-20 18:20:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[82e 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.511Z grpc.peer_address=172.18.0.5:34184 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=803.8µs +[82f 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[830 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[831 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[832 05-20 18:20:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:34184 +[833 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34184 +[834 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[835 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[836 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[837 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[838 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[839 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[83a 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[83b 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[83c 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[83d 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[83e 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[83f 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 gate 1589998806522247100 evaluation starts +[840 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 signed by 0 principal evaluation starts (used [false]) +[841 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 processing identity 0 with bytes of 115a110 +[842 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 principal matched by identity 0 +[843 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[844 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 e1 33 69 3c af c3 b4 e7 84 24 |0D. V7.3i<.....$| +00000010 fe fe 30 7d bc 5f 62 53 88 3f 79 af 36 ea 78 cd |..0}._bS.?y.6.x.| +00000020 bf 76 31 30 02 20 73 4d 74 a3 05 33 e1 58 89 75 |.v10. sMt..3.X.u| +00000030 c0 ce 2a 45 f8 b0 b4 41 91 47 d7 bc 4b 6f 8b 67 |..*E...A.G..Ko.g| +00000040 75 46 ed c9 9f fd |uF....| +[845 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 principal evaluation succeeds for identity 0 +[846 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b13d70 gate 1589998806522247100 evaluation succeeds +[847 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[848 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[849 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[84a 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[84b 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34184 +[84c 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34184 +[84d 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34182 disconnected +[84e 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:34182 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=124.93ms +[84f 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[850 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34184 disconnected +[851 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.514Z grpc.peer_address=172.18.0.5:34184 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.9263ms +[852 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[853 05-20 18:20:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[854 05-20 18:20:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[855 05-20 18:20:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[856 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.631Z grpc.peer_address=172.18.0.6:33988 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=288.6µs +[857 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[858 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[859 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[85a 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:33988 +[85b 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:33988 +[85c 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[85d 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[85e 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- +[85f 05-20 18:20:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[860 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[861 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[862 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[863 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[864 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[865 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[866 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[867 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[868 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[869 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[86a 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[86b 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[86c 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 gate 1589998806643637000 evaluation starts +[86d 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 signed by 0 principal evaluation starts (used [false]) +[86e 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 processing identity 0 with bytes of 115a110 +[86f 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[870 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[871 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[872 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 principal matched by identity 0 +[873 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[874 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 22 05 66 a4 d6 c8 d1 b2 90 db |0E.!..".f.......| +00000010 a5 4f df f5 59 eb 99 d7 1a 3d a1 7e 09 ae 91 46 |.O..Y....=.~...F| +00000020 24 03 b2 f3 38 02 20 09 4f b3 7f c2 e6 d0 ba 3e |$...8. .O......>| +00000030 34 3c b2 b3 c6 8a 64 3d ae db 61 f5 ec 39 68 3d |4<....d=..a..9h=| +00000040 5a 28 c7 0a 7c c2 e5 |Z(..|..| +[875 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 principal evaluation succeeds for identity 0 +[876 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9df70 gate 1589998806643637000 evaluation succeeds +[877 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[878 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[879 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[87a 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[87b 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:33988 +[87c 05-20 18:20:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:33988 +[87d 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[87e 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:33988 disconnected +[87f 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.635Z grpc.peer_address=172.18.0.6:33988 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.7896ms +[880 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[881 05-20 18:20:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[882 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.69Z grpc.peer_address=172.18.0.6:33990 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=124.9µs +[883 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[884 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[885 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[886 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:33990 +[887 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:33990 +[888 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[889 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[88a 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[88b 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[88c 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[88d 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[88e 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[88f 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[890 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[891 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[892 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[893 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 gate 1589998806697693100 evaluation starts +[894 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 signed by 0 principal evaluation starts (used [false]) +[895 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 processing identity 0 with bytes of 115a110 +[896 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 principal matched by identity 0 +[897 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[898 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 75 fa 71 a1 b6 fa 45 d2 73 ad f7 |0D. .u.q...E.s..| +00000010 0e 87 1b 0b 35 bb 01 ad 77 b5 53 bd 22 fa a3 93 |....5...w.S."...| +00000020 7e de 93 40 02 20 56 92 5c 69 fc 3e a1 b3 d4 a7 |~..@. V.\i.>....| +00000030 9a 19 9f 36 f0 38 d8 1c 37 b2 a8 64 df 55 0b 92 |...6.8..7..d.U..| +00000040 69 2b 25 7e 1d 37 |i+%~.7| +[899 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 principal evaluation succeeds for identity 0 +[89a 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bfecc0 gate 1589998806697693100 evaluation succeeds +[89b 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[89c 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[89d 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[89e 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[89f 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:33990 +[8a0 05-20 18:20:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:33990 +[8a1 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:33990 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:9761545360067544221 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[8a2 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8a3 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9761545360067544221 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[8a4 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[8a5 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8a6 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8a7 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[8a8 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[8a9 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[8aa 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[8ab 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[8ac 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 gate 1589998806704526100 evaluation starts +[8ad 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 signed by 0 principal evaluation starts (used [false]) +[8ae 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 processing identity 0 with bytes of 115a110 +[8af 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 principal matched by identity 0 +[8b0 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 4b 22 28 29 09 30 18 96 67 d9 9c ce 66 e9 a8 |.K"().0..g...f..| +00000010 65 fb be 6f 81 56 3c 02 38 5c 35 92 29 ff 9c 7c |e..o.V<.8\5.)..|| +[8b1 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 1e b1 55 6c d3 c1 84 27 a5 d3 |0E.!....Ul...'..| +00000010 99 c5 ed 5b f0 54 c0 ff ad ae 9d b2 10 98 fd 5b |...[.T.........[| +00000020 86 6f fa b3 2e 02 20 4f 97 63 7d 65 c4 81 4f 4e |.o.... O.c}e..ON| +00000030 ea e8 a5 57 6d eb 43 6d 5a d1 c8 38 2a f9 4b 0d |...Wm.CmZ..8*.K.| +00000040 5a 18 37 a9 4a 2d 7b |Z.7.J-{| +[8b2 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 principal evaluation succeeds for identity 0 +[8b3 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c570 gate 1589998806704526100 evaluation succeeds +[8b4 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8b5 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8b6 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8b7 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8b8 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[8b9 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +[8ba 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[8bb 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8bc 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8bd 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[8be 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8bf 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8c0 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8c1 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 9761545360067544221, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +[8c2 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[8c3 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9761545360067544221, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[8c4 05-20 18:20:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8c5 05-20 18:20:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8c6 05-20 18:20:06.78 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:20:08.786Z grpc.peer_address=172.18.0.6:33994 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=109.7µs +[8c7 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[8c8 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[8c9 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[8ca 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:33994 +[8cb 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:33994 +[8cc 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8cd 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8ce 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8cf 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8d0 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8d1 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8d2 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[8d3 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[8d4 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[8d5 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[8d6 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[8d7 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 gate 1589998806796049400 evaluation starts +[8d8 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 signed by 0 principal evaluation starts (used [false]) +[8d9 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 processing identity 0 with bytes of 115a110 +[8da 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 principal matched by identity 0 +[8db 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[8dc 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 dd a9 e4 88 b0 a2 82 48 e6 a8 07 |0D. U.......H...| +00000010 6b be 96 31 36 22 e7 75 75 d5 e2 cc cd 36 4d 8f |k..16".uu....6M.| +00000020 dd 52 67 47 02 20 5c 26 50 74 3d d8 01 95 6d dc |.RgG. \&Pt=...m.| +00000030 39 61 b4 85 97 7d fd 25 a9 96 ac 0b 23 df ce ac |9a...}.%....#...| +00000040 c4 b3 14 a7 3f 0f |....?.| +[8dd 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 principal evaluation succeeds for identity 0 +[8de 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39de0 gate 1589998806796049400 evaluation succeeds +[8df 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8e0 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8e1 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8e2 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8e3 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:33994 +[8e4 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:33994 +[8e5 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[8e6 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:33990 disconnected +[8e7 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:33990 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=104.4844ms +[8e9 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:33994 disconnected +[8ea 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:20:16.789Z grpc.peer_address=172.18.0.6:33994 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=7.1054ms +[8eb 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[8ec 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[8e8 05-20 18:20:06.79 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[8ed 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[8ee 05-20 18:20:06.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[8ef 05-20 18:20:07.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8f0 05-20 18:20:07.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8f1 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[8f2 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[8f3 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[8f4 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[8f5 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[8f6 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +[8f7 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[8f8 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003cc41f0, CONNECTING +[8f9 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[8fa 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[8fb 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[8fc 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[8fd 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[8fe 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[8ff 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +[900 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[901 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003ce79a0, CONNECTING +[902 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[903 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[904 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[905 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[906 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[907 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[908 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[909 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[90a 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[90b 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers +[90c 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[90d 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[90e 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[90f 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[910 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[911 05-20 18:20:07.64 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003d20e30, CONNECTING +[912 05-20 18:20:07.65 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003cc41f0, READY +[913 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[914 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[915 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[916 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +[917 05-20 18:20:07.66 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003ce79a0, READY +[918 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003d20e30, READY +[91a 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[91b 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[919 05-20 18:20:07.67 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +[91c 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[91e 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:7051 +[91d 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[91f 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[920 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[921 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[922 05-20 18:20:07.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[923 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +[924 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[925 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 62 de a9 06 3a 8f ef b2 11 06 |0E.!..b...:.....| +00000010 e2 17 31 a2 b5 18 bf 74 bb 95 60 cb 81 b6 88 e3 |..1....t..`.....| +00000020 64 c7 44 47 e1 02 20 61 03 21 56 9b 23 ca f8 9e |d.DG.. a.!V.#...| +00000030 4d 4e b9 56 4e 8d 86 ca f3 01 e2 f7 c2 90 4d 54 |MN.VN.........MT| +00000040 8d 2c 51 31 39 dc 64 |.,Q19.d| +[926 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +[927 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[928 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[929 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[92a 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[92b 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[92c 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[92d 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[92e 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[92f 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +[930 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[931 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[932 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[933 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[934 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[935 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[936 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 gate 1589998807694773900 evaluation starts +[937 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 signed by 0 principal evaluation starts (used [false]) +[938 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 processing identity 0 with bytes of 115a110 +[939 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 principal matched by identity 0 +[93a 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[93b 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 e6 23 8c a8 59 16 ab 0f 92 9c 1c |0D. ..#..Y......| +00000010 5e 9c 06 db b8 cb 74 db f9 92 c0 0e ab ab 6e 1b |^.....t.......n.| +00000020 93 27 25 a8 02 20 78 58 09 87 77 5b 24 c9 a8 41 |.'%.. xX..w[$..A| +00000030 29 6d 07 ca f7 ef 5b 90 11 1b dd 71 70 ae 33 07 |)m....[....qp.3.| +00000040 3c 5e b0 14 18 88 |<^....| +[93c 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 principal evaluation succeeds for identity 0 +[93d 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7b90 gate 1589998807694773900 evaluation succeeds +[93e 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[93f 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[940 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[941 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[942 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +[943 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[944 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[945 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[946 05-20 18:20:07.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[947 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +[948 05-20 18:20:07.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[949 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[94a 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[94b 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[94c 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[94d 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[94e 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[94f 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[950 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[951 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[952 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[953 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 gate 1589998807719000300 evaluation starts +[954 05-20 18:20:07.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 signed by 0 principal evaluation starts (used [false]) +[956 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 processing identity 0 with bytes of 115a110 +[955 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +[957 05-20 18:20:07.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +[958 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 principal matched by identity 0 +[959 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[95a 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c da 07 c5 8d b7 76 71 5f 86 ad de |0D. \.....vq_...| +00000010 e5 fa 56 e3 49 e0 f7 7d 5d 63 2a c7 14 92 27 dd |..V.I..}]c*...'.| +00000020 e1 56 1e b6 02 20 6d e6 b4 36 77 2c e1 ef 36 f6 |.V... m..6w,..6.| +00000030 fe 85 8c f6 d4 01 03 50 b2 51 cb 6d 6e 11 ca fe |.......P.Q.mn...| +00000040 ef ff a0 f4 e4 a5 |......| +[95b 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 principal evaluation succeeds for identity 0 +[95d 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e270f0 gate 1589998807719000300 evaluation succeeds +[95e 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +[95f 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[960 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[961 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[962 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[963 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +[964 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[965 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[966 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 3e 5c 4a 11 e1 a3 69 d4 28 30 4d f7 e2 3d 3f |/>\J...i.(0M..=?| +00000010 b5 1c 6f 96 b3 ef b9 a2 dc d4 aa 30 25 70 c7 29 |..o........0%p.)| +[968 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 86 23 6c 12 fe e6 23 43 2b a1 |0E.!...#l...#C+.| +00000010 35 62 8d ab 15 e5 77 95 57 d4 f5 4c 02 79 bd 58 |5b....w.W..L.y.X| +00000020 84 96 b6 36 97 02 20 30 a1 f7 0f 63 f5 dd 55 6d |...6.. 0...c..Um| +00000030 9d bf b7 42 24 ef 9a 3e cb 01 23 53 09 7e 68 09 |...B$..>..#S.~h.| +00000040 4b 61 c8 f9 67 09 9a |Ka..g..| +[95c 05-20 18:20:07.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[967 05-20 18:20:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[969 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[96a 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[96b 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[96c 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[96d 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[96e 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[96f 05-20 18:20:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[970 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[971 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[972 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +[973 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[974 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 gate 1589998807764809300 evaluation starts +[975 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 signed by 0 principal evaluation starts (used [false]) +[976 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 processing identity 0 with bytes of 115a110 +[977 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[978 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 principal evaluation fails +[979 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e54730 gate 1589998807764809300 evaluation fails +[97a 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[97b 05-20 18:20:07.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[97c 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[97d 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 gate 1589998807771636300 evaluation starts +[97e 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 signed by 0 principal evaluation starts (used [false]) +[97f 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 processing identity 0 with bytes of 115a110 +[980 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[981 05-20 18:20:07.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[982 05-20 18:20:07.78 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[983 05-20 18:20:07.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 principal matched by identity 0 +[984 05-20 18:20:07.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[985 05-20 18:20:07.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[986 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 principal evaluation succeeds for identity 0 +[987 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e55580 gate 1589998807771636300 evaluation succeeds +[988 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[989 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[98a 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[98b 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[98c 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[98d 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +[98e 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[98f 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[990 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[991 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[992 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[993 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[994 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[995 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[996 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[997 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 gate 1589998807792670000 evaluation starts +[998 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 signed by 0 principal evaluation starts (used [false]) +[999 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 processing identity 0 with bytes of 115a110 +[99a 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 principal matched by identity 0 +[99b 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[99c 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[99d 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 principal evaluation succeeds for identity 0 +[99e 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70c60 gate 1589998807792670000 evaluation succeeds +[99f 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9a0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9a1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9a2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9a3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9a4 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9a5 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9a6 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9a7 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9a8 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9a9 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 gate 1589998807793841800 evaluation starts +[9aa 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 signed by 0 principal evaluation starts (used [false]) +[9ab 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 processing identity 0 with bytes of 115a110 +[9ac 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 principal matched by identity 0 +[9ad 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[9ae 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[9af 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 principal evaluation succeeds for identity 0 +[9b0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e717a0 gate 1589998807793841800 evaluation succeeds +[9b1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9b2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9b3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9b4 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9b5 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9b6 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[9b7 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[9b8 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9b9 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +[9ba 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9bb 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9bc 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9bd 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[9be 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9bf 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9c0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9c1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9c2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9c3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 gate 1589998807796841000 evaluation starts +[9c4 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 signed by 0 principal evaluation starts (used [false]) +[9c5 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 processing identity 0 with bytes of 115a110 +[9c6 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 principal matched by identity 0 +[9c7 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[9c8 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e8ae40 principal evaluation succeeds for identity 0 +[9ca 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ae40 gate 1589998807796841000 evaluation succeeds +[9cb 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9cc 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9cd 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9ce 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9cf 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9d0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9d1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9d2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9d3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9d4 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9d5 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 gate 1589998807798473300 evaluation starts +[9d6 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 signed by 0 principal evaluation starts (used [false]) +[9d7 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 processing identity 0 with bytes of 115a110 +[9d8 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 principal matched by identity 0 +[9d9 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[9da 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e8b980 principal evaluation succeeds for identity 0 +[9dc 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b980 gate 1589998807798473300 evaluation succeeds +[9dd 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9de 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9df 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9e0 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9e1 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[9e2 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[9e3 05-20 18:20:07.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9e4 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[9e5 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[9e6 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9e7 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9e8 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9e9 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[9ea 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[9eb 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[9ec 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[9ed 05-20 18:20:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9ee 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[9ef 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[9f0 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[9f1 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[9f2 05-20 18:20:07.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9f3 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[9f4 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[9f5 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[9f6 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[9f7 05-20 18:20:08.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9f8 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > > , Envelope: 270 bytes, Signature: 0 bytes +[9f9 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > > , Envelope: 270 bytes, Signature: 0 bytes +[9fa 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9fb 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > > , Envelope: 270 bytes, Signature: 0 bytes +[9fc 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[9fd 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 31 17 4c 37 d2 16 39 ee 1d 34 cb a7 ec 6d 0b |.1.L7..9..4...m.| +00000010 93 d6 49 dc 35 ca f7 32 c4 ad 4c 9a 6f a6 25 dc |..I.5..2..L.o.%.| +[9fe 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 e7 d9 63 91 ab 58 49 8d d8 c1 1b |0D. ..c..XI....| +00000010 36 d1 52 33 88 f9 5b b7 26 f9 34 f3 da bf 18 96 |6.R3..[.&.4.....| +00000020 a1 81 9b 85 02 20 3a d3 0c f2 31 e3 af 14 c2 42 |..... :...1....B| +00000030 7a 1c fe 58 a4 37 7b f8 29 5f 9d f8 8b 8d 94 9c |z..X.7{.)_......| +00000040 fa 29 4f 83 25 35 |.)O.%5| +[9ff 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[a00 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 0f 93 c1 dc 13 ac 64 ee b1 75 76 |0D. s......d..uv| +00000010 46 8d 13 75 3e 65 69 99 ff df 16 2e 88 9e b8 15 |F..u>ei.........| +00000020 7e 93 5a 3c 02 20 3c c2 ce 79 b6 5d cf 51 49 b3 |~.Z<. <..y.].QI.| +00000030 c7 ef c1 56 9b a3 a0 93 93 df 32 4f 98 9b 92 b9 |...V......2O....| +00000040 b7 a1 63 f6 db 01 |..c...| +[a01 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[a02 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[a03 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[a04 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[a05 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[a06 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a07 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a08 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a09 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[a0a 05-20 18:20:08.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a0b 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a0c 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a0d 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a0e 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a0f 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[a10 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a11 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 2c be 09 b9 0b 47 60 0a 3a a4 cf 3a 6b 85 35 |.,....G`.:..:k.5| +00000010 31 f2 31 83 c2 f9 b0 8f 4b bc e6 5c 8f fa ba 24 |1.1.....K..\...$| +[a12 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers +[a14 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:ei\231\377\337\026.\210\236\270\025~\223Z<\002 <\302\316y\266]\317QI\263\307\357\301V\233\243\240\223\223\3372O\230\233\222\271\267\241c\366\333\001" > > alive: > +[a13 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 94 cb a9 cc 91 a3 94 50 d4 03 |0E.!.........P..| +00000010 c3 f0 8d c2 b6 9b 58 46 fa 17 5e 65 db 99 45 62 |......XF..^e..Eb| +00000020 1a 3b 3f ba 29 02 20 44 a2 ac 27 3f 57 3b 2d cf |.;?.). D..'?W;-.| +00000030 29 8e 40 7f 26 0e cc fb 30 74 4b 87 4d 71 ee 07 |).@.&...0tK.Mq..| +00000040 1f fa 80 50 13 08 61 |...P..a| +[a15 05-20 18:20:08.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +[a16 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a17 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a18 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1589998788301091000, 23 but got ts: inc_num:1589998788301091000 seq_num:22 +[a19 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a1a 05-20 18:20:08.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a1b 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a1c 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a1d 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a1e 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[a1f 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a20 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[a21 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a22 05-20 18:20:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a23 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a24 05-20 18:20:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a25 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a26 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a27 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a28 05-20 18:20:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a29 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[a2a 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a2b 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[a2c 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a2d 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a2e 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a2f 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a30 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a31 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 gate 1589998808652832200 evaluation starts +[a32 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 signed by 0 principal evaluation starts (used [false]) +[a33 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 processing identity 0 with bytes of 115a110 +[a34 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 principal matched by identity 0 +[a35 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 8f 94 b2 f5 5e f5 1d 04 e9 db 06 83 16 6e f7 |.....^........n.| +00000010 a7 84 9c 47 f1 77 4e af 36 5d 13 80 8b 6a ae d2 |...G.wN.6]...j..| +[a36 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 3e 18 0a 80 68 5a f7 bd 3a 71 |0E.!..>...hZ..:q| +00000010 bd fa 2b 39 06 97 ae f9 4b f8 9a 8a 76 6d 2e 26 |..+9....K...vm.&| +00000020 29 93 a7 dc dc 02 20 6a 8d 11 c7 7e 6f d4 2b 65 |)..... j...~o.+e| +00000030 6a 5a d7 ca 9d 26 ac e0 7a 2a fb 5d b5 4c e8 0f |jZ...&..z*.].L..| +00000040 b7 1d 24 9c b8 1a 71 |..$...q| +[a37 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 principal evaluation succeeds for identity 0 +[a38 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3ab70 gate 1589998808652832200 evaluation succeeds +[a39 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a3a 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a3b 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a3c 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a3d 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a3e 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[a3f 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[a40 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[a41 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[a42 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a43 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a44 05-20 18:20:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a45 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a46 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a47 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a48 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a49 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a4a 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a4b 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a4c 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[a4d 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a4e 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a4f 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a50 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a51 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[a52 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a53 05-20 18:20:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a54 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[a55 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[a56 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161012 +[a58 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F3BE99BD209F3B249AC0651508367BB416312A4A62C4D48EEBDAD0D3E9146E22 +[a57 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[a59 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[a5b 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[a5c 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[a5d 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[a5e 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[a5f 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a5a 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[a60 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[a62 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[a63 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[a61 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[a64 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[a66 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[a65 05-20 18:20:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[a68 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[a6a 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[a6b 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161013 +[a6c 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6BB1916D60776A67F71CF49C693E62935998CDCFB6B466A6FA970F5F336DB060 +[a6d 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[a6e 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[a6f 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[a70 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a71 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[a72 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a73 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[a74 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[a75 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[a76 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a77 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[a78 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a79 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[a7a 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a7b 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a7c 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a7d 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a7e 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[a7f 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a69 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a67 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a80 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[a81 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[a82 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[a83 05-20 18:20:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a84 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[a86 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[a87 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[a88 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a89 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a8a 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a8b 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[a8c 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[a8d 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a8e 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[a8f 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[a90 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +[a91 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +00000040 5c de b0 54 71 0f |\..Tq.| +[a92 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[a93 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 83 cb 98 a2 23 01 d4 81 0a 7a 5f |0D. b....#....z_| +00000010 d7 67 ba 78 1d 46 b6 81 cc 40 93 22 53 49 79 21 |.g.x.F...@."SIy!| +00000020 df ae ad 64 02 20 7e a9 50 8b 93 50 a1 16 c2 80 |...d. ~.P..P....| +00000030 a9 df 0e c0 2f ad 9c c5 2a 0a 6e 5f ca 41 fc b3 |..../...*.n_.A..| +00000040 eb 4c 99 27 bd 2a |.L.'.*| +[a94 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[a95 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[a85 05-20 18:20:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[a96 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a97 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[a98 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a99 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a9a 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a9b 05-20 18:20:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a9c 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a9d 05-20 18:20:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a9e 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +[a9f 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +[aa0 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +[aa1 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aa2 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +[aa3 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +[aa4 05-20 18:20:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[aa5 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa6 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[aa7 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[aa8 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[aa9 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[aaa 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[aab 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[aac 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 gate 1589998808874457100 evaluation starts +[aad 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 signed by 0 principal evaluation starts (used [false]) +[aae 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 processing identity 0 with bytes of 115a110 +[aaf 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 principal matched by identity 0 +[ab0 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd d2 00 d0 d0 5e f9 4d 5a 09 b2 18 18 25 61 eb |.....^.MZ....%a.| +00000010 66 4c 30 42 ad 18 21 9e 82 50 3b 9e 85 29 9f 32 |fL0B..!..P;..).2| +[ab1 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 45 8d 27 72 c7 ff 0b 7e ea 47 6d |0D. vE.'r...~.Gm| +00000010 58 28 0e 09 6e dc bc c2 9c 75 3e 7e 96 fa 08 a0 |X(..n....u>~....| +00000020 09 44 2b a9 02 20 06 32 d3 88 1f a7 de 51 c2 db |.D+.. .2.....Q..| +00000030 7a c1 d9 d1 a3 69 d0 fa bb c3 4b ab d6 c1 b2 2b |z....i....K....+| +00000040 15 d2 f7 7c b7 2c |...|.,| +[ab2 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 principal evaluation succeeds for identity 0 +[ab3 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faa040 gate 1589998808874457100 evaluation succeeds +[ab4 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ab5 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ab6 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ab7 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ab8 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ab9 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[aba 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[abb 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[abc 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[abd 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[abe 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[abf 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[ac0 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +[ac1 05-20 18:20:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +00000040 5c de b0 54 71 0f |\..Tq.| +[ac2 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ac3 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ac4 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ac5 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ac6 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[ac7 05-20 18:20:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ac8 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ac9 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[aca 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[acb 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[acc 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[acd 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ace 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 gate 1589998808905150600 evaluation starts +[acf 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 signed by 0 principal evaluation starts (used [false]) +[ad0 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 processing identity 0 with bytes of 115a110 +[ad1 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 principal matched by identity 0 +[ad2 05-20 18:20:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 7a 04 1b e5 5a 1f 7e 57 ab 83 08 b9 ef fa 20 |Vz...Z.~W...... | +00000010 5e 70 ee 1f bf 26 77 4c 9f bc 49 8c 2a 9c 67 fd |^p...&wL..I.*.g.| +[ad3 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 77 bc 45 e4 a3 06 30 b7 4a 3d e1 |0D. Ew.E...0.J=.| +00000010 0e 5e 9e e8 e0 02 f8 d6 84 b6 49 0f 02 41 da d8 |.^........I..A..| +00000020 7d 97 95 e7 02 20 4f d8 cb 54 17 6d dc ce 92 5b |}.... O..T.m...[| +00000030 72 b8 9e 69 10 a9 b6 73 61 a5 4f 8c d3 52 07 b9 |r..i...sa.O..R..| +00000040 aa 95 e5 42 bc 6c |...B.l| +[ad4 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 principal evaluation succeeds for identity 0 +[ad5 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff8230 gate 1589998808905150600 evaluation succeeds +[ad6 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ad7 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ad8 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ad9 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ada 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[adb 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[adc 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[add 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[ade 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[adf 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ae0 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ae1 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ae2 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" > > , Envelope: 166 bytes, Signature: 0 bytes +[ae3 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[ae4 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ae5 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ae6 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ae7 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ae8 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ae9 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[aea 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[aeb 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 gate 1589998808916739200 evaluation starts +[aec 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 signed by 0 principal evaluation starts (used [false]) +[aed 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 processing identity 0 with bytes of 115a110 +[aee 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 principal matched by identity 0 +[aef 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 08 8f 14 76 15 70 52 57 25 c4 d3 89 11 fa cc |-...v.pRW%......| +00000010 42 b7 cd c1 31 b5 56 99 69 7a dd b0 8d 5c b4 34 |B...1.V.iz...\.4| +[af0 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 2d 6b 9d a2 9f cf cf 60 bb 56 |0E.!..-k.....`.V| +00000010 f3 70 27 ff 85 ff 42 a6 92 a1 b0 e3 7b 7e 50 f6 |.p'...B.....{~P.| +00000020 e3 ac f3 a1 85 02 20 60 e4 64 0a 0e 8e 68 87 da |...... `.d...h..| +00000030 8b 46 51 54 06 3f 96 59 52 00 02 3c 4d fa 27 51 |.FQT.?.YR..| +[af1 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 principal evaluation succeeds for identity 0 +[af2 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff99e0 gate 1589998808916739200 evaluation succeeds +[af3 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[af4 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[af5 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[af6 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[af7 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[af8 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[af9 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[afa 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[afb 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[afc 05-20 18:20:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[afd 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[afe 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aff 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[b00 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b01 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b02 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b03 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[b04 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:~\226\372\010\240\tD+\251\002 \0062\323\210\037\247\336Q\302\333z\301\331\321\243i\320\372\273\303K\253\326\301\262+\025\322\367|\267," > alive:" > alive: +[b05 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[b06 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b07 05-20 18:20:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b08 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[b09 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b0a 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[b0b 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[b0c 05-20 18:20:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b0d 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b0e 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b0f 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b10 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b11 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b12 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b13 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 gate 1589998808942748700 evaluation starts +[b14 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 signed by 0 principal evaluation starts (used [false]) +[b15 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 processing identity 0 with bytes of 115a110 +[b16 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 principal matched by identity 0 +[b17 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 08 8f 14 76 15 70 52 57 25 c4 d3 89 11 fa cc |-...v.pRW%......| +00000010 42 b7 cd c1 31 b5 56 99 69 7a dd b0 8d 5c b4 34 |B...1.V.iz...\.4| +[b18 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 2d 6b 9d a2 9f cf cf 60 bb 56 |0E.!..-k.....`.V| +00000010 f3 70 27 ff 85 ff 42 a6 92 a1 b0 e3 7b 7e 50 f6 |.p'...B.....{~P.| +00000020 e3 ac f3 a1 85 02 20 60 e4 64 0a 0e 8e 68 87 da |...... `.d...h..| +00000030 8b 46 51 54 06 3f 96 59 52 00 02 3c 4d fa 27 51 |.FQT.?.YR..| +[b19 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 principal evaluation succeeds for identity 0 +[b1a 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040159c0 gate 1589998808942748700 evaluation succeeds +[b1b 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b1c 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b1d 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b1e 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b1f 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[b20 05-20 18:20:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b21 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[b22 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 31 17 4c 37 d2 16 39 ee 1d 34 cb a7 ec 6d 0b |.1.L7..9..4...m.| +00000010 93 d6 49 dc 35 ca f7 32 c4 ad 4c 9a 6f a6 25 dc |..I.5..2..L.o.%.| +[b23 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 e7 d9 63 91 ab 58 49 8d d8 c1 1b |0D. ..c..XI....| +00000010 36 d1 52 33 88 f9 5b b7 26 f9 34 f3 da bf 18 96 |6.R3..[.&.4.....| +00000020 a1 81 9b 85 02 20 3a d3 0c f2 31 e3 af 14 c2 42 |..... :...1....B| +00000030 7a 1c fe 58 a4 37 7b f8 29 5f 9d f8 8b 8d 94 9c |z..X.7{.)_......| +00000040 fa 29 4f 83 25 35 |.)O.%5| +[b24 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[b25 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b26 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[b27 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b b1 91 6d 60 77 6a 67 f7 1c f4 9c 69 3e 62 93 |k..m`wjg....i>b.| +00000010 59 98 cd cf b6 b4 66 a6 fa 97 0f 5f 33 6d b0 60 |Y.....f...._3m.`| +[b28 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fb 74 35 f0 dc 4c 49 57 96 c5 d1 |0D. U.t5..LIW...| +00000010 dc 6b 51 52 45 a2 f1 58 8d 8a 8c b9 a4 ff 1e 45 |.kQRE..X.......E| +00000020 56 e2 d5 78 02 20 35 9d b8 b1 65 93 c0 cf 58 3a |V..x. 5...e...X:| +00000030 84 7c 10 c9 e3 d3 73 fa 43 08 84 4a cb eb e9 d6 |.|....s.C..J....| +00000040 5c de b0 54 71 0f |\..Tq.| +[b29 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[b2a 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[b2b 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b2c 05-20 18:20:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b2d 05-20 18:20:09.63 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]] +[b2e 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37078 +[b2f 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002498ff0 +[b30 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[b31 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[b32 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[b33 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[b34 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 aa 9a 2a 86 0c 6b 49 35 f1 9d 5d 3b c6 a7 b2 |T..*..kI5..];...| +00000010 f4 03 40 82 c9 c7 e3 99 cf 53 41 12 6a 78 db 0a |..@......SA.jx..| +[b35 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 a8 e4 73 2f 8b 18 d6 c8 b6 01 16 |0D. y..s/.......| +00000010 74 2a bf 4a 62 ad e5 79 7e 06 22 48 7e e8 66 0e |t*.Jb..y~."H~.f.| +00000020 11 73 b7 eb 02 20 19 48 cc cf 1b 47 24 a0 23 2b |.s... .H...G$.#+| +00000030 a1 94 f8 29 a9 5e 0a d2 e2 d2 0d cc e0 ed b0 5c |...).^.........\| +00000040 b2 d9 b8 9c 00 6b |.....k| +[b36 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[b37 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001715e0, header 0xc002499450 +[b38 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[b39 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][35006658] processing txid: 350066582fdbaccb4f227226a0435fcb122622726f92ecfa4ee6f7ef9f6cf234 +[b3a 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][35006658] Entry chaincode: name:"lscc" +[b3b 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> INFO [][35006658] Entry chaincode: name:"lscc" +[b3c 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[b3d 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 aa 9a 2a 86 0c 6b 49 35 f1 9d 5d 3b c6 a7 b2 |T..*..kI5..];...| +00000010 f4 03 40 82 c9 c7 e3 99 cf 53 41 12 6a 78 db 0a |..@......SA.jx..| +[b3e 05-20 18:20:09.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 a8 e4 73 2f 8b 18 d6 c8 b6 01 16 |0D. y..s/.......| +00000010 74 2a bf 4a 62 ad e5 79 7e 06 22 48 7e e8 66 0e |t*.Jb..y~."H~.f.| +00000020 11 73 b7 eb 02 20 19 48 cc cf 1b 47 24 a0 23 2b |.s... .H...G$.#+| +00000030 a1 94 f8 29 a9 5e 0a d2 e2 d2 0d cc e0 ed b0 5c |...).^.........\| +00000040 b2 d9 b8 9c 00 6b |.....k| +[b3f 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +[b40 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +[b41 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +[b42 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8053d927-6c31-43b6-a803-eacf4ebfc1ea] +[b43 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[b44 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8053d927-6c31-43b6-a803-eacf4ebfc1ea] +[b45 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +[b46 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +[b47 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU [35006658] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[b48 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU [35006658] notifying Txid:350066582fdbaccb4f227226a0435fcb122622726f92ecfa4ee6f7ef9f6cf234, channelID: +[b49 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[b4a 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> INFO [][35006658] Exit chaincode: name:"lscc" (2ms) +[b4b 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU [][35006658] Exit +[b4c 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37078 +[b4d 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37078 grpc.code=OK grpc.call_duration=6.8163ms +[b4e 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[b4f 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37078: read: connection reset by peer +[b50 05-20 18:20:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[b51 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +[b52 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +[b53 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +[b54 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +[b55 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[b56 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b57 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[b58 05-20 18:20:09.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b59 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6739994221805968038, Envelope: 957 bytes, Signature: 0 bytes +[b5a 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6739994221805968038, Envelope: 957 bytes, Signature: 0 bytes +[b5c 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b5d 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b5e 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b5f 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b60 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b61 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b62 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b63 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 gate 1589998809839901600 evaluation starts +[b64 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 signed by 0 principal evaluation starts (used [false]) +[b65 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 processing identity 0 with bytes of 115a110 +[b66 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 principal matched by identity 0 +[b5b 05-20 18:20:09.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16133348451842637739, Envelope: 962 bytes, Signature: 0 bytes +[b67 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +[b68 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 73 5e bb 22 1a ce fd c4 d7 e3 |0E.!..s^."......| +00000010 05 e7 7c f9 6a 1e b1 b4 ed 2e fe 4c 41 ed 4c 42 |..|.j......LA.LB| +00000020 e5 c0 02 0a 19 02 20 29 12 fd de 2e 6e 26 1b 7d |...... )....n&.}| +00000030 53 e4 ef 11 8d 21 11 42 ee 45 74 fc ef 59 2a c7 |S....!.B.Et..Y*.| +00000040 2c 53 7a ce 90 71 cc |,Sz..q.| +[b69 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 principal evaluation succeeds for identity 0 +[b6a 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a310 gate 1589998809839901600 evaluation succeeds +[b6b 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b6c 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b6d 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b6e 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b6f 05-20 18:20:09.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b70 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b71 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 6739994221805968038, Envelope: 957 bytes, Signature: 0 bytes +[b72 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b73 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b74 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b75 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b76 05-20 18:20:09.85 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[b77 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 3 +[b78 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b79 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16133348451842637739, Envelope: 962 bytes, Signature: 0 bytes +[b7a 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b7b 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b7c 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b7d 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b7e 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b7f 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b80 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b81 05-20 18:20:09.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 gate 1589998809869668900 evaluation starts +[b82 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 signed by 0 principal evaluation starts (used [false]) +[b83 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 processing identity 0 with bytes of 115a110 +[b84 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 principal matched by identity 0 +[b85 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +[b86 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 99 79 7b 92 b7 58 27 f8 68 51 |0E.!...y{..X'.hQ| +00000010 e9 4d 29 a0 c1 f2 8e 3e b0 be a3 54 d3 c2 c6 e7 |.M)....>...T....| +00000020 7e e2 56 cc c6 02 20 22 29 78 c2 5a a5 a5 88 c2 |~.V... ")x.Z....| +00000030 f8 57 2f 1f 8f 8e 08 26 d1 18 29 5c 37 fa 22 bf |.W/....&..)\7.".| +00000040 fe 29 d3 32 f6 2c c2 |.).2.,.| +[b87 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 principal evaluation succeeds for identity 0 +[b88 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042cdd0 gate 1589998809869668900 evaluation succeeds +[b89 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b8a 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b8b 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b8c 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b8d 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b8e 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b8f 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16133348451842637739, Envelope: 962 bytes, Signature: 0 bytes +[b90 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b91 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b92 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b93 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b94 05-20 18:20:09.87 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[b95 05-20 18:20:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 4 +[b96 05-20 18:20:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b97 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[b98 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[b99 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[b9a 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610031801 +[b9b 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1DEF86033A83223C56916EA0CC9093889BAC36CB56F97CBAA7A186247BA8931B +[b9c 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[b9d 05-20 18:20:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b9e 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b9f 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ba0 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ba1 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[ba2 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ba3 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ba4 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[ba5 05-20 18:20:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ba6 05-20 18:20:11.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ba7 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ba8 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[ba9 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[baa 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bab 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[bac 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bad 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +[bae 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +[baf 05-20 18:20:11.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb0 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb1 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb2 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bb3 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[bb4 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[bb5 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[bb6 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[bb7 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[bb8 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 gate 1589998811652744700 evaluation starts +[bb9 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 signed by 0 principal evaluation starts (used [false]) +[bba 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 processing identity 0 with bytes of 115a110 +[bbb 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 principal matched by identity 0 +[bbc 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[bbd 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[bbe 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 principal evaluation succeeds for identity 0 +[bbf 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cde70 gate 1589998811652744700 evaluation succeeds +[bc1 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +[bc2 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bc3 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bc4 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[bc5 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bc6 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bc7 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[bc8 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[bc9 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bc0 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[bca 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[bcb 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[bcc 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[bcd 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[bce 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[bcf 05-20 18:20:11.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[bd0 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bd1 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bd2 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bd3 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[bd4 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[bd5 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[bd6 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[bd7 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[bd8 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 gate 1589998811661778900 evaluation starts +[bd9 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 signed by 0 principal evaluation starts (used [false]) +[bda 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 processing identity 0 with bytes of 115a110 +[bdb 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 principal matched by identity 0 +[bdd 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[bde 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0003bbe20 principal evaluation succeeds for identity 0 +[be0 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bbe20 gate 1589998811661778900 evaluation succeeds +[be1 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[be2 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[be3 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[be4 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[be5 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[be6 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +[be7 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[be8 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[be9 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[bea 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[beb 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bdc 05-20 18:20:11.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bec 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[bed 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[bee 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bef 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bf0 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[bf1 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[bf2 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[bf3 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[bf4 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[bf5 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 gate 1589998811678190700 evaluation starts +[bf6 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 signed by 0 principal evaluation starts (used [false]) +[bf7 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 processing identity 0 with bytes of 115a110 +[bf8 05-20 18:20:11.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 principal matched by identity 0 +[bf9 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[bfa 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc000428150 principal evaluation succeeds for identity 0 +[bfc 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000428150 gate 1589998811678190700 evaluation succeeds +[bfd 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[bfe 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[bff 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[c00 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[c01 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c02 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[c03 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c04 05-20 18:20:11.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c05 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c06 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[c07 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[c08 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[c09 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[c0a 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[c0b 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[c0c 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 gate 1589998811691457400 evaluation starts +[c0d 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 signed by 0 principal evaluation starts (used [false]) +[c0e 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 processing identity 0 with bytes of 115a110 +[c0f 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 principal matched by identity 0 +[c10 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[c11 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc000429780 principal evaluation succeeds for identity 0 +[c13 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000429780 gate 1589998811691457400 evaluation succeeds +[c14 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[c15 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[c16 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[c17 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[c18 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[c19 05-20 18:20:11.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[c1a 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[c1b 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[c1c 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c1d 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c1e 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[c1f 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[c20 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[c21 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[c22 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[c23 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[c24 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 gate 1589998811705311100 evaluation starts +[c25 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 signed by 0 principal evaluation starts (used [false]) +[c26 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 processing identity 0 with bytes of 115a110 +[c27 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 principal matched by identity 0 +[c28 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[c29 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[c2a 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 principal evaluation succeeds for identity 0 +[c2b 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003dfa10 gate 1589998811705311100 evaluation succeeds +[c2c 05-20 18:20:11.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[c2d 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[c2e 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[c2f 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[c30 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c31 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[c32 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[c33 05-20 18:20:11.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c34 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c35 05-20 18:20:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c36 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c37 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c38 05-20 18:20:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c39 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[c3a 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[c3b 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[c3c 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[c3d 05-20 18:20:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c3e 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c3f 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c40 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c41 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c42 05-20 18:20:12.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c43 05-20 18:20:12.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c44 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c45 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c46 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c47 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[c48 05-20 18:20:12.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c49 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[c4a 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[c4b 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c4c 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[c4d 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[c4e 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 67 ce 93 74 e5 19 22 b2 26 ec ea 8d 67 38 1e |.g..t..".&...g8.| +00000010 75 9b 51 ad 1d 21 34 73 34 72 0c bd 71 d7 d9 c3 |u.Q..!4s4r..q...| +[c4f 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 1c c4 89 f0 1b c1 72 4e d2 71 6c |0D. A......rN.ql| +00000010 b2 10 11 61 44 58 5a 52 ce f5 87 73 80 86 52 47 |...aDXZR...s..RG| +00000020 5c a3 c9 59 02 20 36 a3 ed 95 eb 45 e3 c5 6d 45 |\..Y. 6....E..mE| +00000030 a0 04 b4 b8 cf bb 4b f7 55 6c 55 8d 51 72 fe 08 |......K.UlU.Qr..| +00000040 1c c0 58 4f af 5d |..XO.]| +[c50 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[c51 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 ef 66 e4 67 af cb 37 3f 92 bc |0E.!...f.g..7?..| +00000010 b6 96 6a c7 eb d3 21 20 81 da 4c 7a 61 d8 ec 03 |..j...! ..Lza...| +00000020 35 bd 67 9f ee 02 20 7a f5 fc ec 21 ff a4 6b 9c |5.g... z...!..k.| +00000030 1b 07 46 af d9 c4 9d e8 e1 31 3f 75 b8 9a 96 ae |..F......1?u....| +00000040 c3 60 d4 98 8e 6a 6d |.`...jm| +[c52 05-20 18:20:12.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[c53 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[c54 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[c55 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[c56 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[c57 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c58 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c59 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[c5a 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c5b 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c5c 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c5d 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[c5e 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[c5f 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[c60 05-20 18:20:12.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c61 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c62 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c63 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c64 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c65 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c66 05-20 18:20:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c67 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37094 +[c68 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00252a640 +[c69 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[c6a 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[c6b 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[c6c 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c6d 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[c6e 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[c6f 05-20 18:20:12.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[c70 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c71 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[c72 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 43 f3 9e 54 ee c3 c0 32 14 16 ca cb 78 df 6f |.C..T...2....x.o| +00000010 5a ba ac f3 1b 4e c8 a4 37 f5 fa 32 ab f6 17 c4 |Z....N..7..2....| +[c73 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd d8 85 f9 7f ca ff 23 ae bb 8e |0E.!........#...| +00000010 0c 51 62 57 05 32 0d fa ae 9d 46 ad 67 31 25 75 |.QbW.2....F.g1%u| +00000020 f8 c8 5a 64 28 02 20 1c a9 aa c7 eb 0e cd 7b 4e |..Zd(. .......{N| +00000030 d4 cf 03 d6 39 f4 72 45 18 c2 32 89 89 97 c4 34 |....9.rE..2....4| +00000040 1f 1f 43 e6 87 d7 73 |..C...s| +[c74 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[c75 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002665b0, header 0xc00252ab40 +[c76 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[c77 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] processing txid: d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb +[c78 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +[c79 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[c7a 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +[c7b 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] Entry chaincode: name:"lscc" +[c7c 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d4839f2a] Entry chaincode: name:"lscc" +[c7d 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[c7e 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[c7f 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] handling GET_STATE from chaincode +[c80 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] getting state for chaincode lscc, key exp02, channel businesschannel +[c81 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[c82 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] No state associated with key: exp02. Sending RESPONSE with an empty payload +[c83 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Completed GET_STATE. Sending RESPONSE +[c84 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[c85 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 gate 1589998812556936000 evaluation starts +[c86 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 signed by 0 principal evaluation starts (used [false]) +[c87 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 processing identity 0 with bytes of 115a110 +[c88 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[c89 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[c8a 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[c8b 05-20 18:20:12.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c8c 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[c8d 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c8e 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 principal matched by identity 0 +[c8f 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 43 f3 9e 54 ee c3 c0 32 14 16 ca cb 78 df 6f |.C..T...2....x.o| +00000010 5a ba ac f3 1b 4e c8 a4 37 f5 fa 32 ab f6 17 c4 |Z....N..7..2....| +[c90 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd d8 85 f9 7f ca ff 23 ae bb 8e |0E.!........#...| +00000010 0c 51 62 57 05 32 0d fa ae 9d 46 ad 67 31 25 75 |.QbW.2....F.g1%u| +00000020 f8 c8 5a 64 28 02 20 1c a9 aa c7 eb 0e cd 7b 4e |..Zd(. .......{N| +00000030 d4 cf 03 d6 39 f4 72 45 18 c2 32 89 89 97 c4 34 |....9.rE..2....4| +00000040 1f 1f 43 e6 87 d7 73 |..C...s| +[c91 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 principal evaluation succeeds for identity 0 +[c92 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 signed by 1 principal evaluation starts (used [true]) +[c93 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 skipping identity 0 because it has already been used +[c94 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 principal evaluation fails +[c95 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e160 gate 1589998812556936000 evaluation succeeds +[c96 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[c97 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] handling PUT_STATE from chaincode +[c98 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Completed PUT_STATE. Sending RESPONSE +[c99 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU No collection configuration specified +[c9a 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[c9b 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] notifying Txid:d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, channelID:businesschannel +[c9c 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[c9d 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[c9e 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:1.0 +[c9f 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[ca0 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=exp02:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[ca1 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +[ca2 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +[ca3 05-20 18:20:12.56 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-1.0 +[ca4 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[ca5 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-1.0 +[ca6 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[ca7 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-1.0 +[ca8 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[ca9 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[caa 05-20 18:20:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[cab 05-20 18:20:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU +FROM hyperledger/fabric-baseos:amd64-0.4.20 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.4.7" \ + org.hyperledger.fabric.base.version="0.4.20" +ENV CORE_CHAINCODE_BUILDLEVEL=1.4.7 +[cac 05-20 18:20:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[cad 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +[cae 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:latest +[caf 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[cb0 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[cb1 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[cb2 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cb3 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cb4 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cb5 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cb6 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cb7 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cb8 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[cb9 05-20 18:20:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cba 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[cbb 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[cbc 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cbd 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[cbe 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[cbf 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cc0 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[cc1 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[cc2 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[cc3 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[cc4 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[cc5 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[cc6 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 gate 1589998812665221400 evaluation starts +[cc7 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 signed by 0 principal evaluation starts (used [false]) +[cc8 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 processing identity 0 with bytes of 115a110 +[cc9 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 principal matched by identity 0 +[cca 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +00000040 7c 58 26 3b 84 ff e8 ||X&;...| +[ccc 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 principal evaluation succeeds for identity 0 +[ccd 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257a5e0 gate 1589998812665221400 evaluation succeeds +[cce 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ccf 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[cd0 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[cd1 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[cd2 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[cd3 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[cd4 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[cd5 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[cd6 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[cd7 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cd8 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cd9 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cda 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[cdb 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cdc 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cdd 05-20 18:20:12.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cde 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[cdf 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ce0 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ce1 05-20 18:20:12.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" > alive: alive: +[ce2 05-20 18:20:12.70 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[ce3 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[ce4 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[ce5 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[ce6 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[ce7 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ce8 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[ce9 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[cea 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[ceb 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[cec 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ced 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[cee 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cef 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[cf0 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[cf1 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[cf2 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cf3 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +[cf4 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +[cf5 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +[cf6 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cf7 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[cf8 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161014 +[cf9 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 54C3D9699444DB4FA430FBD57997E12A3CBCAFAFADCCE9B3BEC73D38AA600545 +[cfa 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[cfb 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[cfc 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[cfd 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[cfe 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cff 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[d00 05-20 18:20:12.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d01 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d02 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d03 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d04 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d05 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d06 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d07 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d08 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d09 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d0a 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[d0b 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d0c 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[d0d 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[d0e 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[d0f 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d10 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[d11 05-20 18:20:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d12 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[d13 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[d14 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d15 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[d16 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[d17 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +[d18 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +[d1a 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[d1b 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc d6 e6 4e 08 59 b9 38 e5 64 df |0E.!....N.Y.8.d.| +00000010 24 79 1d 83 72 59 f5 fa 41 f4 b7 c9 07 6a 07 f2 |$y..rY..A....j..| +00000020 a0 ce 22 a4 e6 02 20 27 98 e7 14 ad b2 6f 62 bb |.."... '.....ob.| +00000030 b3 1f dd 97 89 34 33 c2 58 cd 7d 8f 14 ae a4 33 |.....43.X.}....3| +00000040 dc f0 85 1a 75 98 ed |....u..| +[d1c 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[d1d 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[d1e 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d1f 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d19 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes +[d20 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d21 05-20 18:20:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[d22 05-20 18:20:12.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[d24 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[d25 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d26 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[d27 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[d28 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d29 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\r\207\366Pc,$\0060U\034j\221\350\317C\013\"Wh.\304\260\247\202\002 i{\300\000\005\3334\216\316\357=\321}\241}{\003\337\030\201?>[\273\353\237aoE(N\314" > > , Envelope: 166 bytes, Signature: 0 bytes +[d2a 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d2b 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d2c 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d23 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[d2d 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[d2e 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d2f 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d30 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d31 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d32 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 gate 1589998812865600900 evaluation starts +[d33 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 signed by 0 principal evaluation starts (used [false]) +[d34 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 processing identity 0 with bytes of 115a110 +[d35 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 principal matched by identity 0 +[d36 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 be 1d 08 f5 f9 de be 46 91 77 21 ff 06 64 6c |h.......F.w!..dl| +00000010 20 0d 02 64 2b 59 29 3f 4f b4 d8 3f ed 7b 0d c3 | ..d+Y)?O..?.{..| +[d37 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 90 99 23 ee e2 94 a9 79 5c a2 |0E.!....#....y\.| +00000010 42 32 39 ac 9b 2b 93 28 74 c0 ba 10 2b e5 20 f3 |B29..+.(t...+. .| +00000020 77 2d d7 b8 09 02 20 09 f6 9c d1 22 dd 6b f7 e3 |w-.... ....".k..| +00000030 a1 b3 98 05 27 06 b0 bd b0 21 e4 1d c8 eb c6 05 |....'....!......| +00000040 6f b9 c4 e5 c2 f8 5d |o.....]| +[d38 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 principal evaluation succeeds for identity 0 +[d39 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e980 gate 1589998812865600900 evaluation succeeds +[d3a 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d3b 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d3c 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d3d 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d3e 05-20 18:20:12.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d3f 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[d40 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[d41 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[d42 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[d43 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d44 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d46 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[d47 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d48 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d49 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d4a 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[d4b 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[d4c 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[d4d 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d45 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d4e 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[d4f 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[d51 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d50 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[d52 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d53 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d54 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d55 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d56 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d57 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d58 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 gate 1589998812879447300 evaluation starts +[d59 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 signed by 0 principal evaluation starts (used [false]) +[d5a 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 processing identity 0 with bytes of 115a110 +[d5b 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 principal matched by identity 0 +[d5c 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 be 1d 08 f5 f9 de be 46 91 77 21 ff 06 64 6c |h.......F.w!..dl| +00000010 20 0d 02 64 2b 59 29 3f 4f b4 d8 3f ed 7b 0d c3 | ..d+Y)?O..?.{..| +[d5d 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 90 99 23 ee e2 94 a9 79 5c a2 |0E.!....#....y\.| +00000010 42 32 39 ac 9b 2b 93 28 74 c0 ba 10 2b e5 20 f3 |B29..+.(t...+. .| +00000020 77 2d d7 b8 09 02 20 09 f6 9c d1 22 dd 6b f7 e3 |w-.... ....".k..| +00000030 a1 b3 98 05 27 06 b0 bd b0 21 e4 1d c8 eb c6 05 |....'....!......| +00000040 6f b9 c4 e5 c2 f8 5d |o.....]| +[d5e 05-20 18:20:12.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 principal evaluation succeeds for identity 0 +[d5f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d60 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[d61 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c200 gate 1589998812879447300 evaluation succeeds +[d62 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d63 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d64 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d65 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d66 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d67 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d68 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[d69 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 67 ce 93 74 e5 19 22 b2 26 ec ea 8d 67 38 1e |.g..t..".&...g8.| +00000010 75 9b 51 ad 1d 21 34 73 34 72 0c bd 71 d7 d9 c3 |u.Q..!4s4r..q...| +[d6a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 1c c4 89 f0 1b c1 72 4e d2 71 6c |0D. A......rN.ql| +00000010 b2 10 11 61 44 58 5a 52 ce f5 87 73 80 86 52 47 |...aDXZR...s..RG| +00000020 5c a3 c9 59 02 20 36 a3 ed 95 eb 45 e3 c5 6d 45 |\..Y. 6....E..mE| +00000030 a0 04 b4 b8 cf bb 4b f7 55 6c 55 8d 51 72 fe 08 |......K.UlU.Qr..| +00000040 1c c0 58 4f af 5d |..XO.]| +[d6b 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[d6c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d6d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[d6e 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +[d6f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +[d70 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d71 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d72 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d73 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d75 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d74 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[d76 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[d77 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d78 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d79 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d7a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d7b 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d7c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d7d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d7e 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 gate 1589998812886838700 evaluation starts +[d7f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 signed by 0 principal evaluation starts (used [false]) +[d80 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 processing identity 0 with bytes of 115a110 +[d81 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 principal matched by identity 0 +[d82 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 31 31 b8 4e 33 e6 f4 25 c3 1e 4a 6d d8 3c 4e |.11.N3..%..Jm. DEBU Verify: sig = 00000000 30 45 02 21 00 ee 83 bc 1c 58 0b 3c 2c fd 75 49 |0E.!.....X.<,.uI| +00000010 d3 4f cb b5 11 c4 5c eb 01 37 f4 09 77 5f c3 08 |.O....\..7..w_..| +00000020 19 d7 81 2d 3a 02 20 1f 6b 46 82 69 39 95 88 6a |...-:. .kF.i9..j| +00000030 db bb 3f 51 bd 81 05 16 ff 90 f7 a4 43 75 bc da |..?Q........Cu..| +00000040 7c 58 26 3b 84 ff e8 ||X&;...| +[d84 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 principal evaluation succeeds for identity 0 +[d85 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec930 gate 1589998812886838700 evaluation succeeds +[d86 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d87 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d88 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d89 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d8a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d8b 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d8c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[d8d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 c3 d9 69 94 44 db 4f a4 30 fb d5 79 97 e1 2a |T..i.D.O.0..y..*| +00000010 3c bc af af ad cc e9 b3 be c7 3d 38 aa 60 05 45 |<.........=8.`.E| +[d8e 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 69 d4 1d 82 f6 3e 0d 87 f6 50 |0E.!..i....>...P| +00000010 63 2c 24 06 30 55 1c 6a 91 e8 cf 43 0b 22 57 68 |c,$.0U.j...C."Wh| +00000020 2e c4 b0 a7 82 02 20 69 7b c0 00 05 db 34 8e ce |...... i{....4..| +00000030 ef 3d d1 7d a1 7d 7b 03 df 18 81 3f 3e 5b bb eb |.=.}.}{....?>[..| +00000040 9f 61 6f 45 28 4e cc |.aoE(N.| +[d8f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d90 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d91 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d92 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[d93 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d94 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d95 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d96 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d97 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d98 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d99 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d9a 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 gate 1589998812889168100 evaluation starts +[d9b 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 signed by 0 principal evaluation starts (used [false]) +[d9c 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 processing identity 0 with bytes of 115a110 +[d9d 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 principal matched by identity 0 +[d9e 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 7a 04 1b e5 5a 1f 7e 57 ab 83 08 b9 ef fa 20 |Vz...Z.~W...... | +00000010 5e 70 ee 1f bf 26 77 4c 9f bc 49 8c 2a 9c 67 fd |^p...&wL..I.*.g.| +[d9f 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 77 bc 45 e4 a3 06 30 b7 4a 3d e1 |0D. Ew.E...0.J=.| +00000010 0e 5e 9e e8 e0 02 f8 d6 84 b6 49 0f 02 41 da d8 |.^........I..A..| +00000020 7d 97 95 e7 02 20 4f d8 cb 54 17 6d dc ce 92 5b |}.... O..T.m...[| +00000030 72 b8 9e 69 10 a9 b6 73 61 a5 4f 8c d3 52 07 b9 |r..i...sa.O..R..| +00000040 aa 95 e5 42 bc 6c |...B.l| +[da0 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 principal evaluation succeeds for identity 0 +[da1 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002844770 gate 1589998812889168100 evaluation succeeds +[da2 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[da3 05-20 18:20:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[da4 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[da5 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[da6 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[da7 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1589998788850055200, 23 but got ts: inc_num:1589998788850055200 seq_num:21 +[da8 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[da9 05-20 18:20:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[daa 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dab 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dac 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dad 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dae 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[daf 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 7e b6 cf fe 56 ff c0 74 f9 46 fa f5 77 c8 2b |Y~...V..t.F..w.+| +00000010 0b 14 02 5b 13 d7 29 c2 f9 ba 2b f2 4a 8b 88 50 |...[..)...+.J..P| +[db0 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 22 52 27 23 46 4a 10 4c 84 59 |0E.!.."R'#FJ.L.Y| +00000010 a4 14 d5 d0 e0 ee 35 36 b2 c6 9b 17 aa ae ab d4 |......56........| +00000020 9c a5 4a 03 4c 02 20 56 70 85 1b 5e 22 85 8c 2e |..J.L. Vp..^"...| +00000030 73 bf 44 ee 28 37 36 62 8e 1b 73 a8 24 23 ab a2 |s.D.(76b..s.$#..| +00000040 26 fe 94 3f da f1 0f |&..?...| +[db1 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[db2 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[db3 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[db4 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[db5 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[db6 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[db7 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[db8 05-20 18:20:13.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[db9 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dba 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dbb 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dbc 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[dbd 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dbe 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[dbf 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc0 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dc1 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc2 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dc3 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc4 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc5 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dc6 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc7 05-20 18:20:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dc8 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc9 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dca 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dcb 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dcc 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[dcd 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dce 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[dcf 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[dd0 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[dd1 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[dd2 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[dd3 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[dd4 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 gate 1589998813645171400 evaluation starts +[dd5 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 signed by 0 principal evaluation starts (used [false]) +[dd6 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 processing identity 0 with bytes of 115a110 +[dd7 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 principal matched by identity 0 +[dd8 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d b7 3d 67 fc 8b 03 4f 16 5d 1f d2 35 c7 b2 11 |M.=g...O.]..5...| +00000010 00 ba 15 dd 15 89 63 f4 f6 b3 37 77 68 6e 70 1e |......c...7whnp.| +[dd9 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 0c 35 eb be 9f 24 d1 6c 03 c6 |0E.!...5...$.l..| +00000010 0e a1 61 51 f7 73 cb 16 68 66 92 97 84 30 6e 73 |..aQ.s..hf...0ns| +00000020 64 b3 25 ed 2f 02 20 1a 76 fa c0 20 97 0d ef 4c |d.%./. .v.. ...L| +00000030 d3 75 ba d4 80 be ee ba 27 66 83 c3 0a 9c 00 7c |.u......'f.....|| +00000040 c8 05 15 44 20 fd 6b |...D .k| +[dda 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 principal evaluation succeeds for identity 0 +[ddb 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c50f0 gate 1589998813645171400 evaluation succeeds +[ddc 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ddd 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[dde 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ddf 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[de0 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[de1 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[de2 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[de3 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[de4 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[de5 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[de6 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[de7 05-20 18:20:13.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[de8 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[de9 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dea 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[deb 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dec 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ded 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dee 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[def 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[df0 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[df1 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[df2 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[df3 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df4 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[df5 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df6 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[df7 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[df8 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df9 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dfa 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dfb 05-20 18:20:13.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dfc 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dfe 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dff 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dfd 05-20 18:20:13.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e00 05-20 18:20:13.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[e01 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[e02 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161015 +[e03 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F8A9179FAB79F98C06CCA753966767433706B028539A14493DF2B939A43F1C91 +[e04 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[e05 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[e06 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[e07 05-20 18:20:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[e08 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e09 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e0a 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e0b 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e0c 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e0d 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e0e 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e0f 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e10 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e11 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e12 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e13 05-20 18:20:13.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e14 05-20 18:20:13.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e15 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[e16 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e17 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[e18 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[e19 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e1a 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e1b 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e1c 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e1d 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e1e 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[e1f 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e21 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[e22 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[e23 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[e24 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[e25 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[e26 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[e27 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 gate 1589998813863951700 evaluation starts +[e28 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 signed by 0 principal evaluation starts (used [false]) +[e29 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 processing identity 0 with bytes of 115a110 +[e2a 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 principal matched by identity 0 +[e2b 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f a1 3e 51 e0 fc 3e 0e 1b d6 72 68 c9 a1 c2 bd |..>Q..>...rh....| +00000010 76 c3 28 1a aa e3 ea c8 4d a3 48 fc 36 1e b9 c4 |v.(.....M.H.6...| +[e2c 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 52 31 04 3a 1b d7 19 fc 70 89 0d |0D. wR1.:....p..| +00000010 9d 12 bb f6 36 6a 10 64 70 0a 13 09 17 a0 4c 59 |....6j.dp.....LY| +00000020 dc b6 5e 86 02 20 26 e1 03 20 ff 73 d8 2f 98 62 |..^.. &.. .s./.b| +00000030 4c 7f 54 09 f1 b5 a5 af 72 f1 12 93 62 d2 ce 45 |L.T.....r...b..E| +00000040 66 8c 4b ea 8f 10 |f.K...| +[e20 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[e2d 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 principal evaluation succeeds for identity 0 +[e2e 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f91b0 gate 1589998813863951700 evaluation succeeds +[e2f 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e30 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e31 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e32 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e33 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e34 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[e35 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e36 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e37 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[e38 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e39 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e3a 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e3b 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3c 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3d 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3e 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3f 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e40 05-20 18:20:13.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e41 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e42 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e43 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e44 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e45 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e46 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e47 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e48 05-20 18:20:13.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e49 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e4a 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e4b 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e4c 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e4d 05-20 18:20:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e4e 05-20 18:20:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e4f 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e50 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[e51 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e54 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e52 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e56 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e53 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e55 05-20 18:20:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +[e57 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[e58 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e59 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +[e5a 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +[e5b 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[e5c 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[e5d 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[e5e 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[e5f 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e60 05-20 18:20:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e61 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[e62 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[e63 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[e64 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[e65 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[e66 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[e67 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 gate 1589998815661183000 evaluation starts +[e68 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 signed by 0 principal evaluation starts (used [false]) +[e69 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 processing identity 0 with bytes of 115a110 +[e6a 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 principal matched by identity 0 +[e6b 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[e6c 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc002b48470 principal evaluation succeeds for identity 0 +[e6e 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b48470 gate 1589998815661183000 evaluation succeeds +[e6f 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e70 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e71 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e72 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e73 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e74 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[e75 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e76 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e77 05-20 18:20:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e78 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[e79 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[e7a 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[e7b 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[e7c 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[e7d 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[e7e 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 gate 1589998815673355400 evaluation starts +[e7f 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 signed by 0 principal evaluation starts (used [false]) +[e80 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 processing identity 0 with bytes of 115a110 +[e81 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 principal matched by identity 0 +[e82 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[e83 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc002b49a00 principal evaluation succeeds for identity 0 +[e85 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49a00 gate 1589998815673355400 evaluation succeeds +[e86 05-20 18:20:15.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e87 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e88 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[e89 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e8a 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e8b 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[e8c 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[e8d 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e8e 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[e8f 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e90 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e91 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e92 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e93 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[e94 05-20 18:20:15.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[e95 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[e96 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610041801 +[e97 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A2297637CCBEE250C4EA080F319D3AE9AA7EB27F36B167424098AFD1555A0DBA +[e98 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[e99 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e9a 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e9b 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e9c 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e9d 05-20 18:20:15.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[e9e 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e9f 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ea0 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[ea1 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ea2 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[ea3 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[ea4 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[ea5 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[ea6 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ea7 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ea8 05-20 18:20:15.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ea9 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[eaa 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[eab 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[eac 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ead 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[eae 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 gate 1589998815715185900 evaluation starts +[eaf 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 signed by 0 principal evaluation starts (used [false]) +[eb0 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 processing identity 0 with bytes of 115a110 +[eb1 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 principal matched by identity 0 +[eb2 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[eb3 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[eb4 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 principal evaluation succeeds for identity 0 +[eb5 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b879e0 gate 1589998815715185900 evaluation succeeds +[eb6 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[eb7 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[eb8 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[eb9 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[eba 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ebb 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 548 bytes, Signature: 0 bytes +[ebc 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ebd 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ebe 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ebf 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ec0 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ec1 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ec2 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ec3 05-20 18:20:15.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ec4 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ec5 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 gate 1589998815720329000 evaluation starts +[ec6 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 signed by 0 principal evaluation starts (used [false]) +[ec7 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 processing identity 0 with bytes of 115a110 +[ec8 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 principal matched by identity 0 +[ec9 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[eca 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[ecb 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 principal evaluation succeeds for identity 0 +[ecc 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb0e90 gate 1589998815720329000 evaluation succeeds +[ecd 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ece 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ecf 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ed0 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ed1 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[ed2 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[ed3 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ed4 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ed5 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ed6 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ed7 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ed8 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ed9 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[eda 05-20 18:20:15.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[edb 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 gate 1589998815730229700 evaluation starts +[edc 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 signed by 0 principal evaluation starts (used [false]) +[edd 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 processing identity 0 with bytes of 115a110 +[ede 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 principal matched by identity 0 +[edf 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[ee0 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc002fcc7a0 principal evaluation succeeds for identity 0 +[ee2 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc7a0 gate 1589998815730229700 evaluation succeeds +[ee3 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ee4 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ee5 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ee6 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ee7 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee8 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[ee9 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[eea 05-20 18:20:15.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eeb 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[eec 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[eed 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eee 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eef 05-20 18:20:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ef0 05-20 18:20:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[ef1 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[ef2 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[ef3 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[ef4 05-20 18:20:15.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ef5 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ef6 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ef7 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ef8 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ef9 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[efa 05-20 18:20:16.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[efb 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[efc 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[efd 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[efe 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[eff 05-20 18:20:16.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f00 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[f01 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[f02 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f03 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[f04 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[f05 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +[f06 05-20 18:20:16.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +00000040 20 37 05 ef 50 1d | 7..P.| +[f07 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[f08 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 93 09 64 9b 02 aa 2e 75 97 e8 |0E.!....d....u..| +00000010 86 92 b5 1a 44 78 da e7 71 43 ae 86 74 36 9b 2c |....Dx..qC..t6.,| +00000020 ae 42 06 4f 06 02 20 27 6c f7 04 85 ca ac 49 66 |.B.O.. 'l.....If| +00000030 ef b4 b8 38 6c 91 9d ee f9 12 0d 10 32 9b b5 06 |...8l.......2...| +00000040 82 04 ee 03 6f f8 bb |....o..| +[f09 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[f0a 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[f0b 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[f0c 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[f0d 05-20 18:20:16.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[f0e 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f0f 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f10 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f11 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[f12 05-20 18:20:16.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f13 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f14 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[f15 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[f16 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[f17 05-20 18:20:16.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f18 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[f19 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[f1a 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f1b 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f1c 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f1d 05-20 18:20:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f1e 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[f1f 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[f20 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[f21 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f22 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f23 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f24 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f25 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f26 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f27 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[f28 05-20 18:20:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f29 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +[f2a 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +[f2b 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f2c 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; > , Envelope: 166 bytes, Signature: 0 bytes +[f2d 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[f2e 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f2f 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f30 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f31 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f32 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f33 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f34 05-20 18:20:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f35 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 gate 1589998816670872900 evaluation starts +[f36 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 signed by 0 principal evaluation starts (used [false]) +[f37 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 processing identity 0 with bytes of 115a110 +[f38 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 principal matched by identity 0 +[f39 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +[f3a 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU 0xc003081d60 principal evaluation succeeds for identity 0 +[f3c 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081d60 gate 1589998816670872900 evaluation succeeds +[f3d 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f3e 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f3f 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f40 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f41 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[f42 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[f43 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[f44 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[f45 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[f46 05-20 18:20:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f47 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f48 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[f49 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4a 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4b 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4c 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[f4d 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; alive: alive: +[f4e 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[f4f 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f50 05-20 18:20:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f51 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[f52 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[f53 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[f54 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[f55 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[f56 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[f57 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[f58 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f59 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f5a 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f5b 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f5c 05-20 18:20:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f5d 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[f5e 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[f5f 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[f60 05-20 18:20:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f61 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[f62 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[f63 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[f64 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f65 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[f66 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f67 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[f68 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[f69 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f6a 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f6b 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f6c 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f6d 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f6e 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f6f 05-20 18:20:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f70 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f71 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f72 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[f73 05-20 18:20:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f74 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[f75 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161016 +[f76 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 59ACC572969B92D798BC0D28F1F3328DD541FFD3F6184F84B0B0E0E75A686001 +[f77 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[f78 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[f79 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[f7a 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7b 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[f7c 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7d 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[f7e 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[f7f 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[f80 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f81 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[f82 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f83 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[f84 05-20 18:20:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f85 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[f86 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[f87 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f88 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[f89 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[f8a 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f8b 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f8c 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f8d 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f8e 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f8f 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f90 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f91 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 gate 1589998816876645900 evaluation starts +[f92 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 signed by 0 principal evaluation starts (used [false]) +[f93 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 processing identity 0 with bytes of 115a110 +[f94 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 principal matched by identity 0 +[f95 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +[f96 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +00000040 5e da f7 a5 da 3d |^....=| +[f97 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 principal evaluation succeeds for identity 0 +[f98 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5b90 gate 1589998816876645900 evaluation succeeds +[f99 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f9a 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f9b 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f9c 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f9d 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f9e 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[f9f 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[fa0 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[fa1 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[fa2 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa3 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa4 05-20 18:20:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa5 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[fa6 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[fa7 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa8 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[fa9 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[faa 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fab 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[fac 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[fad 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[fae 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[faf 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[fb0 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[fb1 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 gate 1589998816884354700 evaluation starts +[fb2 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 signed by 0 principal evaluation starts (used [false]) +[fb3 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 processing identity 0 with bytes of 115a110 +[fb4 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 principal matched by identity 0 +[fb5 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 33 52 8d 1a 90 38 b6 46 fe 95 03 7f 40 b7 af |=3R...8.F....@..| +00000010 92 07 ae 28 49 b3 e9 47 ff 61 d2 b4 9b 66 36 6c |...(I..G.a...f6l| +[fb6 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 95 97 73 1e 0b 1c 6e 42 7f 42 1e |0D. ...s...nB.B.| +00000010 56 31 4e 03 85 2e 82 d1 21 76 87 c0 c8 ad f7 c8 |V1N.....!v......| +00000020 c5 98 98 1f 02 20 6c 3d 21 81 0b 39 fe 0c 49 b2 |..... l=!..9..I.| +00000030 fa c7 3f 39 d3 84 3c d6 3c 3c a5 76 93 90 22 ff |..?9..<.<<.v..".| +00000040 5e da f7 a5 da 3d |^....=| +[fb7 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 principal evaluation succeeds for identity 0 +[fb8 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172220 gate 1589998816884354700 evaluation succeeds +[fb9 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[fba 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[fbb 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[fbc 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[fbd 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[fbe 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fbf 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[fc0 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +[fc1 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +00000040 20 37 05 ef 50 1d | 7..P.| +[fc2 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[fc3 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fc4 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[fc5 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +[fc6 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +00000040 be e2 7e ca bd f3 |..~...| +[fc7 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[fc8 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[fc9 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fca 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fcb 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[fcc 05-20 18:20:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[fcd 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fce 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fcf 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fd0 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[fd1 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[fd2 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fd3 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[fd4 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[fd5 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +[fd6 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +00000040 be e2 7e ca bd f3 |..~...| +[fd7 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[fd8 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a c6 44 a9 71 5a 23 41 e7 8c b5 bb |0D. j.D.qZ#A....| +00000010 58 94 4a eb 36 18 48 bf eb 1f 86 b9 54 bc 74 11 |X.J.6.H.....T.t.| +00000020 b1 b5 b8 c2 02 20 78 de 28 b5 09 ef af 75 77 75 |..... x.(....uwu| +00000030 c9 19 d3 d7 de 67 78 78 8e 24 3b 33 7c e6 7f 39 |.....gxx.$;3|..9| +00000040 65 b0 fa 94 b4 61 |e....a| +[fd9 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[fda 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[fdb 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fdc 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fdd 05-20 18:20:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\302\305K\327!\030\225q\361\333zB\214\r\014\\\002 @\203\323\250\234\374q\227\335\005 \r\375t?{\241; alive: alive: +[fde 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[fdf 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe0 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[fe1 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[fe2 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe3 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[fe4 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[fe5 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fe6 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[fe7 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[fe8 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[fe9 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[fea 05-20 18:20:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[feb 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[fec 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 gate 1589998816910812900 evaluation starts +[fed 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 signed by 0 principal evaluation starts (used [false]) +[fee 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 processing identity 0 with bytes of 115a110 +[fef 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 principal matched by identity 0 +[ff0 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 5c 2a 7b 58 5f f8 81 e2 21 10 eb 5c b6 77 db |.\*{X_...!..\.w.| +00000010 5d 7b 1e e7 2e 05 82 16 51 72 35 15 5e f0 73 94 |]{......Qr5.^.s.| +[ff1 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 23 8c 81 26 25 ca 58 13 2e 55 |0E.!..#..&%.X..U| +00000010 ca e4 5b 81 3e c2 c5 4b d7 21 18 95 71 f1 db 7a |..[.>..K.!..q..z| +00000020 42 8c 0d 0c 5c 02 20 40 83 d3 a8 9c fc 71 97 dd |B...\. @.....q..| +00000030 05 20 0d fd 74 3f 7b a1 3b 3c 78 85 62 47 4d 91 |. ..t?{.; DEBU 0xc003121b60 principal evaluation succeeds for identity 0 +[ff3 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121b60 gate 1589998816910812900 evaluation succeeds +[ff4 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ff5 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ff6 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ff7 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ff8 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ff9 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ffa 05-20 18:20:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[ffb 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 ac c5 72 96 9b 92 d7 98 bc 0d 28 f1 f3 32 8d |Y..r.......(..2.| +00000010 d5 41 ff d3 f6 18 4f 84 b0 b0 e0 e7 5a 68 60 01 |.A....O.....Zh`.| +[ffc 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 96 28 9d 55 9f e1 cf f7 59 d2 de |0D. ..(.U....Y..| +00000010 be 13 16 b4 3d 57 76 a5 18 25 f5 f7 ed 79 1b 42 |....=Wv..%...y.B| +00000020 cd 27 08 59 02 20 74 bc 15 81 94 bc 2d 95 9a 65 |.'.Y. t.....-..e| +00000030 90 67 58 c6 a8 14 24 39 1d 20 c6 b3 98 16 bd 6d |.gX...$9. .....m| +00000040 be e2 7e ca bd f3 |..~...| +[ffd 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ffe 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[fff 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1000 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1001 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 94 1e db 93 91 ed b9 e9 44 fa 9e 53 1b ab f0 |u........D..S...| +00000010 d6 a3 a9 0d 84 4a 6e f4 ae c2 6d d9 32 26 d7 6a |.....Jn...m.2&.j| +[1002 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 ed 24 d3 75 8e 13 e9 7a 6f fb dd |0D. b.$.u...zo..| +00000010 8e 9d 97 46 21 99 1b d6 f4 3a 3b c8 ed 55 63 b9 |...F!....:;..Uc.| +00000020 6b c4 31 72 02 20 59 b7 23 28 ba ad 4d 83 2e 71 |k.1r. Y.#(..M..q| +00000030 7c 16 57 ff 5f 1e bf 6a 9f a2 45 56 16 07 22 fc ||.W._..j..EV..".| +00000040 20 37 05 ef 50 1d | 7..P.| +[1003 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1004 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1005 05-20 18:20:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1006 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1007 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1008 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1009 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[100a 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[100b 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 24 ad 0d 5d ff 78 c0 a5 d0 de e0 d7 da ae e3 |8$..].x.........| +00000010 4b c7 2a 3f c6 1f 29 25 a5 96 37 1f 82 42 74 eb |K.*?..)%..7..Bt.| +[100c 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 2e 64 fa 37 6f bd ab cb aa a3 |0E.!...d.7o.....| +00000010 3d b7 40 ee cf 08 50 26 25 b7 e5 08 ef 27 d8 6d |=.@...P&%....'.m| +00000020 18 8e cf 62 3c 02 20 27 4e 85 47 75 c1 dc 4f 5d |...b<. 'N.Gu..O]| +00000030 63 65 e4 4d f6 54 28 aa 7f 1e e1 4d cb 72 2b 31 |ce.M.T(....M.r+1| +00000040 bd 4b 42 c1 09 11 f7 |.KB....| +[100d 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[100e 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[100f 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1010 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1011 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1012 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1013 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1014 05-20 18:20:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1015 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1016 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1017 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1018 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1019 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[101a 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[101c 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[101d 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[101b 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[101e 05-20 18:20:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[101f 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1020 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1021 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1022 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1023 05-20 18:20:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1024 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1025 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1026 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1027 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1028 05-20 18:20:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1029 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[102a 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[102b 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[102c 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[102d 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[102e 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[102f 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1030 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1031 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1032 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1033 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1034 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1035 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 gate 1589998818703239300 evaluation starts +[1036 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 signed by 0 principal evaluation starts (used [false]) +[1037 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 processing identity 0 with bytes of 115a110 +[1038 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 principal matched by identity 0 +[1039 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 53 a2 26 ab 7b 16 84 8d b7 8e 72 ff 9f 08 fa |&S.&.{.....r....| +00000010 0f 2e d6 67 68 27 ac 07 bb a3 7e 59 44 44 7e 31 |...gh'....~YDD~1| +[103a 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 be b8 67 b8 54 e4 3a 00 46 0b d6 |0D. X..g.T.:.F..| +00000010 ed 64 eb 0d 9b 5e 17 e3 fd da fb 34 1d 8e 07 2c |.d...^.....4...,| +00000020 1d f0 37 35 02 20 39 ce d5 a0 79 f9 9d 7c 5a 84 |..75. 9...y..|Z.| +00000030 75 58 f9 08 53 d8 4a 16 b8 ae ad f2 4e 30 4d 45 |uX..S.J.....N0ME| +00000040 f6 f9 c7 bf 90 86 |......| +[103b 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 principal evaluation succeeds for identity 0 +[103c 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00321c100 gate 1589998818703239300 evaluation succeeds +[103d 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[103e 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[103f 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1040 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1041 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1042 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1043 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1044 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1045 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1046 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1047 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1048 05-20 18:20:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1049 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[104a 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[104b 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[104c 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[104d 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[104e 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[104f 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1050 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1051 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1052 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1053 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1054 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1055 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1056 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1057 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1058 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1059 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[105a 05-20 18:20:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[105b 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[105c 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[105d 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[105e 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[105f 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1060 05-20 18:20:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1061 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1062 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161017 +[1063 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE0E666E816BEB9C9855BEB105C144A81C494F3D9FE99A462438229CC8987076 +[1064 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1065 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1066 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1067 05-20 18:20:18.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1068 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1069 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[106a 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[106b 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[106c 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[106d 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[106e 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[106f 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1070 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1071 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1072 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1073 05-20 18:20:18.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1074 05-20 18:20:18.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1075 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1076 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1077 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1078 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1079 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[107a 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[107b 05-20 18:20:18.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[107c 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[107e 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[107d 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[107f 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1080 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1081 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1082 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1083 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 gate 1589998818884466600 evaluation starts +[1084 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 signed by 0 principal evaluation starts (used [false]) +[1085 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 processing identity 0 with bytes of 115a110 +[1086 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 principal matched by identity 0 +[1087 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 17 55 c6 9b df 54 f4 4a dd d3 2c 5e 18 c1 62 |..U...T.J..,^..b| +00000010 49 e9 22 2f 7c ac c6 c7 b8 3c ae 9e 2b 12 05 15 |I."/|....<..+...| +[1088 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad 60 e7 7a df 7e e1 07 bb 89 7f |0E.!..`.z.~.....| +00000010 4d e7 7f 80 a2 08 5a d9 52 42 d2 d8 80 f5 c9 d5 |M.....Z.RB......| +00000020 4c 19 da a0 2c 02 20 54 d0 07 d5 e0 ec ca 8c 68 |L...,. T.......h| +00000030 bd 74 71 f2 48 ba f0 21 41 17 7a 4b ff da 84 55 |.tq.H..!A.zK...U| +00000040 51 86 04 b5 64 99 02 |Q...d..| +[1089 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 principal evaluation succeeds for identity 0 +[108a 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243630 gate 1589998818884466600 evaluation succeeds +[108b 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[108c 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[108d 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[108e 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[108f 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1090 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1091 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1092 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1093 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1094 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1095 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1096 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1097 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1098 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1099 05-20 18:20:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[109a 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109b 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109c 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109d 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109e 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109f 05-20 18:20:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10a0 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10a1 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10a2 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10a3 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10a4 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a5 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10a6 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10a7 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a8 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10a9 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10aa 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ab 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10ac 05-20 18:20:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ad 05-20 18:20:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10ae 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10af 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[10b0 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[10b1 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10b2 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[10b5 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10b3 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[10b4 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[10b7 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[10b8 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10b9 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[10b6 05-20 18:20:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ba 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10bc 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10bd 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[10bb 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[10be 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[10bf 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[10c0 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[10c1 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[10c2 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[10c3 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 gate 1589998819657658800 evaluation starts +[10c4 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 signed by 0 principal evaluation starts (used [false]) +[10c5 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 processing identity 0 with bytes of 115a110 +[10c6 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 principal matched by identity 0 +[10c7 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[10c8 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003371580 principal evaluation succeeds for identity 0 +[10ca 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003371580 gate 1589998819657658800 evaluation succeeds +[10cb 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[10cc 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[10cd 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[10ce 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[10cf 05-20 18:20:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[10d0 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[10d1 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[10d2 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[10d3 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10d4 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10d5 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[10d6 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[10d7 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[10d8 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[10d9 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[10da 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[10db 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 gate 1589998819666387300 evaluation starts +[10dc 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 signed by 0 principal evaluation starts (used [false]) +[10dd 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 processing identity 0 with bytes of 115a110 +[10de 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 principal matched by identity 0 +[10df 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[10e0 05-20 18:20:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[10e1 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 principal evaluation succeeds for identity 0 +[10e2 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f5c0 gate 1589998819666387300 evaluation succeeds +[10e3 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[10e4 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[10e5 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[10e6 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[10e7 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e8 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[10e9 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[10ea 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[10eb 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[10ec 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[10ed 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10ee 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10ef 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[10f0 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[10f1 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[10f2 05-20 18:20:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[10f3 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[10f4 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[10f5 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 gate 1589998819680927400 evaluation starts +[10f6 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 signed by 0 principal evaluation starts (used [false]) +[10f7 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 processing identity 0 with bytes of 115a110 +[10f8 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10f9 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10fa 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[10fb 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10fc 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10fd 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[10fe 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[10ff 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1100 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1101 05-20 18:20:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 principal matched by identity 0 +[1102 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1103 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0034f77d0 principal evaluation succeeds for identity 0 +[1105 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f77d0 gate 1589998819680927400 evaluation succeeds +[1106 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1107 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1108 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1109 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[110a 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[110b 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[110c 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[110d 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[110e 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[110f 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1110 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1111 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1112 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 gate 1589998819698077100 evaluation starts +[1113 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 signed by 0 principal evaluation starts (used [false]) +[1114 05-20 18:20:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 processing identity 0 with bytes of 115a110 +[1115 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 principal matched by identity 0 +[1116 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1117 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1118 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 principal evaluation succeeds for identity 0 +[1119 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a00 gate 1589998819698077100 evaluation succeeds +[111a 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[111b 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[111c 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[111d 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[111e 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[111f 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1120 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1121 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1122 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1123 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1124 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1125 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1126 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1127 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1128 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1129 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 gate 1589998819708201200 evaluation starts +[112a 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 signed by 0 principal evaluation starts (used [false]) +[112b 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 processing identity 0 with bytes of 115a110 +[112c 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 principal matched by identity 0 +[112d 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[112e 05-20 18:20:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[112f 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 principal evaluation succeeds for identity 0 +[1130 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003599f10 gate 1589998819708201200 evaluation succeeds +[1131 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1132 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1133 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1134 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1135 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1136 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1137 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1138 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1139 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[113a 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[113b 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[113c 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[113d 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[113e 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[113f 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 gate 1589998819718485700 evaluation starts +[1140 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 signed by 0 principal evaluation starts (used [false]) +[1141 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 processing identity 0 with bytes of 115a110 +[1142 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 principal matched by identity 0 +[1143 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1144 05-20 18:20:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00368d800 principal evaluation succeeds for identity 0 +[1146 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d800 gate 1589998819718485700 evaluation succeeds +[1147 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1148 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1149 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[114a 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[114b 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[114c 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[114d 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[114e 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[114f 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1150 05-20 18:20:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1151 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1152 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1153 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1154 05-20 18:20:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1155 05-20 18:20:19.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1156 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1157 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1158 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1159 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[115a 05-20 18:20:19.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[115b 05-20 18:20:20.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[115c 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[115d 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[115e 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[115f 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1160 05-20 18:20:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1161 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1162 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1163 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1164 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1165 05-20 18:20:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1166 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > > , Envelope: 271 bytes, Signature: 0 bytes +[1167 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > > , Envelope: 271 bytes, Signature: 0 bytes +[1168 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1169 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > > , Envelope: 271 bytes, Signature: 0 bytes +[116a 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[116b 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +[116c 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +00000040 04 bf a2 07 40 7b |....@{| +[116d 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[116e 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 57 9e c3 0a c0 6c 0b 8d 97 3d |0E.!..W....l...=| +00000010 31 10 db 43 4f 10 02 b1 d1 11 c8 1f 51 84 45 75 |1..CO.......Q.Eu| +00000020 47 3a eb a3 09 02 20 1b e8 84 10 4c d7 5f 0f 3e |G:.... ....L._.>| +00000030 74 51 d9 be 09 9d f8 7e 54 19 19 fe 27 ac 29 54 |tQ.....~T...'.)T| +00000040 22 83 8a 9c 16 3f 22 |"....?"| +[116f 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1170 05-20 18:20:20.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1171 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1172 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1173 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1174 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1175 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1176 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1177 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1178 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1179 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[117a 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[117b 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:tQ\331\276\t\235\370~T\031\031\376'\254)T\"\203\212\234\026?\"" > > alive: +[117c 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[117d 05-20 18:20:20.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[117e 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[117f 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1180 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1181 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1182 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1183 05-20 18:20:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1184 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1185 05-20 18:20:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1186 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1187 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1188 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1189 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[118a 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[118b 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[118c 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[118d 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[118e 05-20 18:20:20.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[118f 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1190 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1191 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1192 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1193 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1194 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1195 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1196 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1197 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1198 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1199 05-20 18:20:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[119a 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[119b 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 gate 1589998820671940100 evaluation starts +[119c 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 signed by 0 principal evaluation starts (used [false]) +[119d 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 processing identity 0 with bytes of 115a110 +[119e 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 principal matched by identity 0 +[119f 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +[11a0 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +00000040 fd 70 a7 84 6e b5 |.p..n.| +[11a1 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 principal evaluation succeeds for identity 0 +[11a2 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037263d0 gate 1589998820671940100 evaluation succeeds +[11a3 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11a4 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11a5 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11a6 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11a7 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[11a8 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[11a9 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[11aa 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[11ab 05-20 18:20:20.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[11ac 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11ad 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11ae 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[11af 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b0 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b1 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b2 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[11b3 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[11b5 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11b4 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[11b6 05-20 18:20:20.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11b7 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[11b8 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[11b9 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[11ba 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610051801 +[11bb 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4640DA97C9A7C9E4FC52C8A6C530F145851A530BF010D1E7F417A1DDDAAB46F9 +[11bc 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[11bd 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11be 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11bf 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11c0 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11c1 05-20 18:20:20.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[11c2 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11c3 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[11c4 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11c5 05-20 18:20:20.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11c6 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[11c7 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[11c8 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[11c9 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[11cb 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11ca 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[11cc 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[11ce 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[11cd 05-20 18:20:20.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[11cf 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11d0 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11d1 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11d2 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[11d3 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[11d4 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[11d5 05-20 18:20:20.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11d6 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[11d7 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[11d8 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[11d9 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11da 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11db 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11dc 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11dd 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11de 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11df 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e0 05-20 18:20:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e1 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e2 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e3 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[11e4 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[11e5 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11e6 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[11e7 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[11e8 05-20 18:20:20.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11e9 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[11ea 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161018 +[11eb 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 730E466552CB5BD7210A5EF67F5BD9A32691A743B487C214987A1AF5FDD8ED3E +[11ec 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[11ed 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[11ee 05-20 18:20:20.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[11ef 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\366\270\336's" secret_envelope:=\225\214[\233\371\013\322`\241\324\236\326\002\253\313@i\n\030<\2279\002 \023\325\342\314\2161X.5T\271\032j\255\376p\263\272\342\220\026!\355\212\270L\034_\355\207\032\347" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[11f0 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11f1 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[11f2 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11f3 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[11f6 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes +[11f7 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11f4 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\366\270\336's" > > , Envelope: 165 bytes, Signature: 0 bytes +[11f8 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11f5 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\366\270\336's" secret_envelope:=\225\214[\233\371\013\322`\241\324\236\326\002\253\313@i\n\030<\2279\002 \023\325\342\314\2161X.5T\271\032j\255\376p\263\272\342\220\026!\355\212\270L\034_\355\207\032\347" > > > , Envelope: 271 bytes, Signature: 0 bytes +[11f9 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11fa 05-20 18:20:20.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[11fc 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[11fb 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[11fd 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11ff 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[11fe 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1200 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1201 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1202 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1203 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1204 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1205 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1206 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1207 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1208 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 gate 1589998820897915900 evaluation starts +[1209 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 signed by 0 principal evaluation starts (used [false]) +[120a 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 processing identity 0 with bytes of 115a110 +[120b 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 principal matched by identity 0 +[120c 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +[120d 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +00000040 cd dc 6d 0d 94 00 0a |..m....| +[120e 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 principal evaluation succeeds for identity 0 +[120f 05-20 18:20:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753440 gate 1589998820897915900 evaluation succeeds +[1210 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1211 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1212 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1213 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1214 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1215 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1216 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1217 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1218 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1219 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[121a 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[121b 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[121d 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[121f 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[121c 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1220 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1221 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1222 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1223 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[121e 05-20 18:20:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1224 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +[1225 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1226 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1227 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1229 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1228 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +00000030 17 39 d7 6d 8c e4 fd e8 88 36 f0 c8 1d 02 66 57 |.9.m.....6....fW| +00000040 3e f6 b8 de 27 73 |>...'s| +[122a 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[122b 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[122c 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 5e 0f 15 1b e6 ef 5d 3e 3d 95 |0E.!..^.....]>=.| +00000010 8c 5b 9b f9 0b d2 60 a1 d4 9e d6 02 ab cb 40 69 |.[....`.......@i| +00000020 0a 18 3c 97 39 02 20 13 d5 e2 cc 8e 31 58 2e 35 |..<.9. .....1X.5| +00000030 54 b9 1a 6a ad fe 70 b3 ba e2 90 16 21 ed 8a b8 |T..j..p.....!...| +00000040 4c 1c 5f ed 87 1a e7 |L._....| +[122d 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[122e 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[122f 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1230 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1231 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1232 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1233 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1234 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1235 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1236 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1237 05-20 18:20:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1238 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1239 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[123a 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[123b 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 gate 1589998820920939000 evaluation starts +[123c 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 signed by 0 principal evaluation starts (used [false]) +[123d 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 processing identity 0 with bytes of 115a110 +[123e 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 principal matched by identity 0 +[123f 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 50 d8 6a a5 24 28 e9 b0 74 33 6b 92 14 e1 33 |.P.j.$(..t3k...3| +00000010 ae 2b e1 56 3a e5 39 e8 cf 14 70 b8 a3 34 65 be |.+.V:.9...p..4e.| +[1240 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 54 b7 30 04 ae 1e ff fd 2d 7b |0E.!..T.0.....-{| +00000010 34 d5 72 cd 15 f5 da e8 28 2a 04 95 fb 4b d0 0a |4.r.....(*...K..| +00000020 15 8d 2c e9 27 02 20 09 8c 85 97 b6 24 b1 71 42 |..,.'. .....$.qB| +00000030 89 b6 ce a6 98 ed 47 19 f0 4f ed 9f f1 a4 42 8c |......G..O....B.| +00000040 cd dc 6d 0d 94 00 0a |..m....| +[1241 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 principal evaluation succeeds for identity 0 +[1242 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773fb0 gate 1589998820920939000 evaluation succeeds +[1243 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1244 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1245 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1246 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1247 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1248 05-20 18:20:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1249 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[124a 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +[124b 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +00000040 04 bf a2 07 40 7b |....@{| +[124c 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[124d 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[124e 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[124f 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +[1250 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +00000030 17 39 d7 6d 8c e4 fd e8 88 36 f0 c8 1d 02 66 57 |.9.m.....6....fW| +00000040 3e f6 b8 de 27 73 |>...'s| +[1251 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1252 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1253 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1254 05-20 18:20:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1255 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1256 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1257 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1258 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1259 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[125a 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[125b 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[125c 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[125d 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[125e 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[125f 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1260 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1261 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 gate 1589998820956893600 evaluation starts +[1262 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 signed by 0 principal evaluation starts (used [false]) +[1263 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 processing identity 0 with bytes of 115a110 +[1264 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 principal matched by identity 0 +[1265 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 30 a5 2b b7 f4 ef 94 67 e2 ef 6d fa f3 f1 c8 |.0.+....g..m....| +00000010 9d 1c d8 de dc 12 a4 05 49 bf 78 9d 53 2d 6f f8 |........I.x.S-o.| +[1266 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 d9 28 4e 8a d3 df 35 0a c9 1f fb |0D. &.(N...5....| +00000010 98 92 5c 1b 6e 67 7b a4 f7 75 c8 f5 3f 63 ca 04 |..\.ng{..u..?c..| +00000020 64 86 8a 52 02 20 56 13 67 df 25 5a 71 71 32 c0 |d..R. V.g.%Zqq2.| +00000030 3a e1 ec d5 6e 17 7a 84 97 e4 24 e5 6a f8 72 0c |:...n.z...$.j.r.| +00000040 fd 70 a7 84 6e b5 |.p..n.| +[1267 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 principal evaluation succeeds for identity 0 +[1268 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830960 gate 1589998820956893600 evaluation succeeds +[1269 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[126a 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[126b 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[126c 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[126d 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[126e 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[126f 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1270 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 0e 46 65 52 cb 5b d7 21 0a 5e f6 7f 5b d9 a3 |s.FeR.[.!.^..[..| +00000010 26 91 a7 43 b4 87 c2 14 98 7a 1a f5 fd d8 ed 3e |&..C.....z.....>| +[1271 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 b2 ed ad e4 4f 68 b6 b7 53 ed 4c |0D. P....Oh..S.L| +00000010 88 76 26 c4 76 50 7b 28 94 b4 23 3f 4e 5e 8a 21 |.v&.vP{(..#?N^.!| +00000020 af 8a 78 9e 02 20 5c 63 76 0f 7d 2c 9a fd 53 38 |..x.. \cv.},..S8| +00000030 17 39 d7 6d 8c e4 fd e8 88 36 f0 c8 1d 02 66 57 |.9.m.....6....fW| +00000040 3e f6 b8 de 27 73 |>...'s| +[1272 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1273 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1274 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1275 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1276 05-20 18:20:20.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 12 d8 10 0b ae df 95 c7 63 2e 86 59 b7 08 e7 |+........c..Y...| +00000010 78 32 c4 7c 2a 41 87 8e 2e aa 1f 37 6a f3 e5 c2 |x2.|*A.....7j...| +[1277 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 04 73 17 ab c6 36 90 da 2c 7d 11 |0D. q.s...6..,}.| +00000010 5c 4f 42 fe 4e 2b 27 6c 64 b8 8b 6d dd af 85 46 |\OB.N+'ld..m...F| +00000020 dc b4 8f 90 02 20 45 9b 1d a0 d1 15 10 0c c6 09 |..... E.........| +00000030 37 83 33 ce 1d 10 ac ce f5 5f 50 dd 3b eb 45 f2 |7.3......_P.;.E.| +00000040 04 bf a2 07 40 7b |....@{| +[1278 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1279 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[127a 05-20 18:20:20.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[127b 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[127c 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[127d 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[127e 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[127f 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1280 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 00 5f 18 f5 59 2c 41 d7 46 ee 2f 9a ce 91 32 |.._..Y,A.F./...2| +00000010 bf 29 0d 8e d2 19 56 25 42 28 0d 9f af 6f 8f dc |.)....V%B(...o..| +[1281 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a be 29 8d 7c e9 5f e9 a0 cf 6f bc |0D. ..).|._...o.| +00000010 f6 99 4f 15 64 5e e7 8d 70 8a c3 af 5b 07 7c d7 |..O.d^..p...[.|.| +00000020 df fb c1 36 02 20 23 c2 cd b7 41 35 e6 56 0b f5 |...6. #...A5.V..| +00000030 4c 92 96 49 83 d6 22 f4 1c 92 30 93 21 79 36 f7 |L..I.."...0.!y6.| +00000040 f1 f0 7c 36 56 64 |..|6Vd| +[1282 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1283 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1284 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1285 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1286 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1287 05-20 18:20:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1288 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1289 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[128a 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[128b 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[128c 05-20 18:20:23.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[128d 05-20 18:20:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[128e 05-20 18:20:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[128f 05-20 18:20:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1290 05-20 18:20:23.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1291 05-20 18:20:23.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1292 05-20 18:20:23.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1293 05-20 18:20:23.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1294 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1295 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1296 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1297 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1298 05-20 18:20:23.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1299 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[129a 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[129b 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[129c 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[129d 05-20 18:20:23.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[129e 05-20 18:20:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[129f 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12a0 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[12a1 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12a2 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a3 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12a4 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12a5 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a6 05-20 18:20:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a7 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[12a8 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[12ac 05-20 18:20:23.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[12ad 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[12ae 05-20 18:20:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[12af 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[12b0 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b1 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b2 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[12aa 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ab 05-20 18:20:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[12b3 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[12b4 05-20 18:20:23.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12a9 05-20 18:20:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[12b5 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12b6 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[12b7 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[12b8 05-20 18:20:23.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12b9 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[12ba 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12bc 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12bd 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[12be 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[12bf 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12bb 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[12c0 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[12c1 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 gate 1589998823768818900 evaluation starts +[12c2 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 signed by 0 principal evaluation starts (used [false]) +[12c3 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 processing identity 0 with bytes of 115a110 +[12c4 05-20 18:20:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 principal matched by identity 0 +[12c5 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[12c6 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161019 +[12c7 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 62A1CCB5C88C412BB371E7502C0A478744E28F248CB9FE7B56434A742A4169B2 +[12c8 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[12c9 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[12ca 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[12cb 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[12cc 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12cd 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[12ce 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003837c60 principal evaluation succeeds for identity 0 +[12d0 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003837c60 gate 1589998823768818900 evaluation succeeds +[12d1 05-20 18:20:23.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[12d2 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12d3 05-20 18:20:23.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[12d4 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[12d5 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[12d6 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12d7 05-20 18:20:23.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12d8 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[12d9 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[12da 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[12db 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[12dc 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[12dd 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[12de 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 gate 1589998823894082200 evaluation starts +[12df 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 signed by 0 principal evaluation starts (used [false]) +[12e0 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 processing identity 0 with bytes of 115a110 +[12e1 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 principal matched by identity 0 +[12e2 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[12e3 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[12e4 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 principal evaluation succeeds for identity 0 +[12e5 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398ee60 gate 1589998823894082200 evaluation succeeds +[12e6 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[12e7 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[12e8 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[12e9 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[12ea 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12eb 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[12ec 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ed 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ee 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ef 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[12f0 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[12f1 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[12f2 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[12f3 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[12f4 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[12f5 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 gate 1589998823898861900 evaluation starts +[12f6 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 signed by 0 principal evaluation starts (used [false]) +[12f7 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 processing identity 0 with bytes of 115a110 +[12f8 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 principal matched by identity 0 +[12f9 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[12fa 05-20 18:20:23.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[12fb 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 principal evaluation succeeds for identity 0 +[12fc 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a342e0 gate 1589998823898861900 evaluation succeeds +[12fd 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[12ff 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1300 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[12fe 05-20 18:20:23.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1301 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1303 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1304 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1305 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1306 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1307 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1308 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1309 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[130a 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[130b 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[130c 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[130d 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 gate 1589998823933102200 evaluation starts +[130e 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 signed by 0 principal evaluation starts (used [false]) +[130f 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 processing identity 0 with bytes of 115a110 +[1310 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 principal matched by identity 0 +[1311 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1312 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003a35c90 principal evaluation succeeds for identity 0 +[1314 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35c90 gate 1589998823933102200 evaluation succeeds +[1315 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1316 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1317 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1318 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1302 05-20 18:20:23.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1319 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[131a 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[131b 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[131c 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[131d 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[131e 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[131f 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1320 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1321 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1323 05-20 18:20:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1322 05-20 18:20:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1324 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1325 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1326 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1327 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1329 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1328 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 gate 1589998823952183500 evaluation starts +[132a 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 signed by 0 principal evaluation starts (used [false]) +[132b 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 processing identity 0 with bytes of 115a110 +[132c 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 principal matched by identity 0 +[132d 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[132e 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1330 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1331 05-20 18:20:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1332 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1333 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1334 05-20 18:20:23.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1335 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1336 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1339 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[133a 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1337 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 principal evaluation succeeds for identity 0 +[133b 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5810 gate 1589998823952183500 evaluation succeeds +[133c 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[133d 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[133e 05-20 18:20:24.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1338 05-20 18:20:23.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[133f 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1340 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1341 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1342 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1343 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1344 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1345 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1346 05-20 18:20:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1347 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1348 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1349 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[134a 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[134b 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[134c 05-20 18:20:24.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[134d 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 gate 1589998824087457500 evaluation starts +[134e 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 signed by 0 principal evaluation starts (used [false]) +[134f 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 processing identity 0 with bytes of 115a110 +[1350 05-20 18:20:24.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 principal matched by identity 0 +[1351 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1352 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1353 05-20 18:20:24.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 principal evaluation succeeds for identity 0 +[1354 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391fb50 gate 1589998824087457500 evaluation succeeds +[1355 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1356 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1357 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1358 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1359 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[135a 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[135b 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[135c 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[135d 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[135e 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[135f 05-20 18:20:24.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1360 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1361 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1362 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1363 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1364 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1365 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1366 05-20 18:20:24.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 gate 1589998824143241700 evaluation starts +[1368 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1367 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 signed by 0 principal evaluation starts (used [false]) +[1369 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 processing identity 0 with bytes of 115a110 +[136a 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 principal matched by identity 0 +[136b 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 9f 80 de 10 a7 9b ce a7 85 4d 51 12 0e cc 19 |..........MQ....| +00000010 fc 82 40 99 b5 4c 4e 13 d3 1e 58 a6 c3 aa 13 8f |..@..LN...X.....| +[136c 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 f6 29 b1 8b ce 2d df d5 62 e8 72 |0D. E.)...-..b.r| +00000010 74 0a d5 8d a8 19 72 11 c3 b1 1e f2 0a d2 ee 23 |t.....r........#| +00000020 28 2f c0 ad 02 20 1c 2b db 4d 43 9d af c5 09 d6 |(/... .+.MC.....| +00000030 e6 b1 de 0f 63 06 ca e1 2d a2 05 b6 11 bc 04 86 |....c...-.......| +00000040 1e 65 36 23 13 f1 |.e6#..| +[136d 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 principal evaluation succeeds for identity 0 +[136e 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c500 gate 1589998824143241700 evaluation succeeds +[136f 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1370 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1371 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1372 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1373 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1374 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1375 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1376 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1377 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1378 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1379 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[137a 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[137b 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[137c 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[137d 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[137e 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[137f 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1380 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1381 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1382 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1383 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1384 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1385 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1386 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1387 05-20 18:20:24.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1388 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1389 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[138a 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[138b 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[138c 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 gate 1589998824207358500 evaluation starts +[138d 05-20 18:20:24.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 signed by 0 principal evaluation starts (used [false]) +[138e 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1390 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1391 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1392 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1393 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[138f 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1394 05-20 18:20:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1395 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1396 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1397 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1398 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1399 05-20 18:20:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[139c 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[139d 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[139e 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[139f 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[13a0 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13a1 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[139a 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 processing identity 0 with bytes of 115a110 +[13a2 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 principal matched by identity 0 +[13a3 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 44 5d df 21 54 e4 bf 96 6b 82 14 02 fa f6 af |.D].!T...k......| +00000010 62 81 39 11 9e d8 d2 1c bf 0b 54 fc be 6d 73 30 |b.9.......T..ms0| +[13a4 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 94 3c c8 9c 02 78 52 ce 35 34 c3 |0D. ..<...xR.54.| +00000010 43 5f 8e 1b c0 bd 3d ac b7 17 69 ad c5 fd a8 65 |C_....=...i....e| +00000020 14 33 62 fd 02 20 38 b1 5f ab 65 1a c3 fe 5a 75 |.3b.. 8._.e...Zu| +00000030 f0 11 d6 a2 47 90 03 8b d8 86 4c 87 19 51 8d 99 |....G.....L..Q..| +00000040 9b 63 bf fa e3 4e |.c...N| +[13a5 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 principal evaluation succeeds for identity 0 +[13a6 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0300 gate 1589998824207358500 evaluation succeeds +[13a7 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[13a8 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[13a9 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[13aa 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[13ab 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13ac 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[13ad 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[139b 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13ae 05-20 18:20:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[13af 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[13b0 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13b1 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13b2 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[13b3 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13b4 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13b5 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13b6 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13b7 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[13b8 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13b9 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13ba 05-20 18:20:24.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13bb 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13bc 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13bd 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13be 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[13bf 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13c0 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13c1 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13c2 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13c3 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c4 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13c5 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c6 05-20 18:20:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13c7 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c8 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13c9 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13ca 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13cb 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13cc 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13cd 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13ce 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[13cf 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13d0 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13d1 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[13d2 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13d3 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13d4 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13d5 05-20 18:20:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13d6 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[13d7 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[13d8 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[13d9 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[13da 05-20 18:20:24.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13db 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[13dc 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[13dd 05-20 18:20:24.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13de 05-20 18:20:24.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[13df 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[13e0 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13e1 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13e2 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13e3 05-20 18:20:24.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13e4 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[13e5 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[13e6 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +[13e7 05-20 18:20:24.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +00000040 e4 ae 12 f5 e7 e8 |......| +[13e8 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[13e9 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 73 b3 4b 7a 2f bd ea 38 84 d9 |0E.!..s.Kz/..8..| +00000010 87 99 7f 55 39 4f 9a da 85 b1 92 de 07 91 c7 de |...U9O..........| +00000020 a7 0a 08 05 02 02 20 58 a7 10 de 08 19 9d 45 e7 |...... X......E.| +00000030 7b 38 ce 2b 58 e9 4f a9 fb 21 9b 26 5b cd a7 30 |{8.+X.O..!.&[..0| +00000040 ed 04 38 d2 5e aa b9 |..8.^..| +[13ea 05-20 18:20:24.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[13eb 05-20 18:20:24.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[13ec 05-20 18:20:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[13ed 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[13ee 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[13ef 05-20 18:20:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f0 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f1 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f2 05-20 18:20:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[13f3 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13f4 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13f5 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[13f6 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[13f7 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f8 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[13f9 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[13fa 05-20 18:20:24.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[13fb 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[13fc 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13fd 05-20 18:20:24.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13ff 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13fe 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1400 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1401 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1402 05-20 18:20:24.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1403 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1404 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1405 05-20 18:20:24.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1406 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1407 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1408 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1409 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[140a 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[140b 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[140c 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[140d 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[140e 05-20 18:20:24.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[140f 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1410 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 gate 1589998824721063200 evaluation starts +[1411 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 signed by 0 principal evaluation starts (used [false]) +[1412 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 processing identity 0 with bytes of 115a110 +[1413 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 principal matched by identity 0 +[1414 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +[1415 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +00000040 dd f0 8e b9 81 1a 5a |......Z| +[1416 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 principal evaluation succeeds for identity 0 +[1417 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce60b0 gate 1589998824721063200 evaluation succeeds +[1418 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1419 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[141a 05-20 18:20:24.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[141b 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[141c 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[141d 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[141e 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[141f 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1420 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1421 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1422 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1423 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1424 05-20 18:20:24.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1425 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1426 05-20 18:20:24.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1427 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1428 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1429 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[142a 05-20 18:20:24.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[142b 05-20 18:20:24.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[142c 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[142d 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[142e 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[142f 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1430 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1431 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1432 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1433 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1434 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1435 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1436 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1437 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1438 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1439 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[143a 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[143b 05-20 18:20:24.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[143c 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[143d 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[143e 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[143f 05-20 18:20:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1440 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1441 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101A +[1442 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C45E67E68823150712285332AC3567328DC417D4A78A63EBCC5FB61C7872310C +[1443 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1444 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1445 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1446 05-20 18:20:24.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1447 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1448 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1449 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[144a 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[144b 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[144c 05-20 18:20:24.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[144d 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[144e 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[144f 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1450 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1451 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1452 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1453 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1454 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1455 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1456 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 gate 1589998824903411600 evaluation starts +[1457 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 signed by 0 principal evaluation starts (used [false]) +[1458 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 processing identity 0 with bytes of 115a110 +[1459 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 principal matched by identity 0 +[145a 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +[145b 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +00000040 dd 9f 8d e4 ef 46 ea |.....F.| +[145c 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 principal evaluation succeeds for identity 0 +[145d 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c960 gate 1589998824903411600 evaluation succeeds +[145e 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[145f 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1460 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1461 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1462 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1463 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1464 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1465 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1466 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1467 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1468 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1469 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[146a 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146b 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146c 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146d 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146e 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146f 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1470 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1471 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1472 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1473 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1474 05-20 18:20:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1475 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1476 05-20 18:20:24.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1477 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1478 05-20 18:20:24.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1479 05-20 18:20:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[147a 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[147b 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[147c 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[147d 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[147e 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[147f 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1480 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1481 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1482 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1483 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1484 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +[1485 05-20 18:20:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +00000040 9b a8 d0 60 85 bd 70 |...`..p| +[1486 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1487 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1488 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1489 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[148a 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[148b 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[148c 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[148d 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148e 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148f 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1490 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1491 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1492 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 00 2c 36 11 c2 a7 49 65 0d bf |0E.!...,6...Ie..| +00000010 9b 8a e3 97 a9 60 29 b7 fd b4 b3 7d 2e a0 38 8b |.....`)....}..8.| +00000020 5f 74 26 94 79 02 20 24 94 3d b8 7d df d9 7d be |_t&.y. $.=.}..}.| +00000030 6e ea 63 65 2b 8a c7 d4 79 2b 93 99 80 f6 11 1a |n.ce+...y+......| +00000040 46 38 d5 d5 dc a5 b7 |F8.....| +[1493 05-20 18:20:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1494 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1495 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1496 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1497 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1498 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1499 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[149a 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[149b 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[149c 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[149d 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[149e 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[149f 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[14a0 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[14a1 05-20 18:20:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 gate 1589998825007214700 evaluation starts +[14a2 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 signed by 0 principal evaluation starts (used [false]) +[14a3 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 processing identity 0 with bytes of 115a110 +[14a4 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 principal matched by identity 0 +[14a5 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 67 a2 2c 3d f5 77 8f 3c f2 d3 5e 93 d7 d0 ab |{g.,=.w.<..^....| +00000010 89 a1 7b 87 c2 c1 03 db 05 b7 ff ec 83 b8 ec 3c |..{............<| +[14a6 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 f9 db 50 19 31 bb f7 5e 2b cd |0E.!....P.1..^+.| +00000010 02 b4 62 83 6f 3b 25 66 70 c4 66 9f cf 1d 70 78 |..b.o;%fp.f...px| +00000020 cb 18 e0 df b7 02 20 0c 22 b6 db 5e 12 e1 05 30 |...... ."..^...0| +00000030 0a c2 dd eb 7d a9 1f 16 5e 5a 3b 19 b1 cd 00 71 |....}...^Z;....q| +00000040 dd 9f 8d e4 ef 46 ea |.....F.| +[14a7 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 principal evaluation succeeds for identity 0 +[14a8 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7a00 gate 1589998825007214700 evaluation succeeds +[14a9 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[14aa 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[14ab 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[14ac 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[14ad 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14ae 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14af 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[14b0 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +[14b1 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +00000040 e4 ae 12 f5 e7 e8 |......| +[14b2 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[14b3 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14b4 05-20 18:20:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[14b5 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +[14b6 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +00000040 9b a8 d0 60 85 bd 70 |...`..p| +[14b7 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14b8 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14b9 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14ba 05-20 18:20:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14bb 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14bc 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14bd 05-20 18:20:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14be 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14bf 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[14c0 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14c1 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[14c2 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[14c3 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[14c4 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[14c5 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[14c6 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[14c7 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 gate 1589998825050531900 evaluation starts +[14c8 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 signed by 0 principal evaluation starts (used [false]) +[14c9 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 processing identity 0 with bytes of 115a110 +[14ca 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 principal matched by identity 0 +[14cb 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 0e 1d 2c 85 8e 24 2b 6e 71 8f 0c 4c 12 49 d7 |U..,..$+nq..L.I.| +00000010 b5 e3 4f 2c 6b eb 61 65 0f 53 33 ec a9 4b 3b df |..O,k.ae.S3..K;.| +[14cc 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd c0 fc 54 7e 2e be 7a a8 8f c1 |0E.!....T~..z...| +00000010 8b 87 4a d5 4e 50 91 aa 31 a4 de 2c 60 42 b0 32 |..J.NP..1..,`B.2| +00000020 bb cd 27 42 35 02 20 4a 71 06 46 7d 0a 57 a5 1e |..'B5. Jq.F}.W..| +00000030 4f e7 19 55 d2 76 86 52 43 29 75 71 11 45 d5 03 |O..U.v.RC)uq.E..| +00000040 dd f0 8e b9 81 1a 5a |......Z| +[14cd 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 principal evaluation succeeds for identity 0 +[14ce 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb350 gate 1589998825050531900 evaluation succeeds +[14cf 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[14d0 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[14d1 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[14d2 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[14d3 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14d4 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14d5 05-20 18:20:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[14d6 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 5e 67 e6 88 23 15 07 12 28 53 32 ac 35 67 32 |.^g..#...(S2.5g2| +00000010 8d c4 17 d4 a7 8a 63 eb cc 5f b6 1c 78 72 31 0c |......c.._..xr1.| +[14d7 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 1d 34 43 fb 1e 42 38 bf a0 c1 |0E.!...4C..B8...| +00000010 38 35 42 dd 17 6f 37 6d b8 10 ef 1f 7c 27 92 f3 |85B..o7m....|'..| +00000020 0e 1f 2f 6b 9d 02 20 24 2f 1d 2d b8 37 39 51 d4 |../k.. $/.-.79Q.| +00000030 97 cc 3c bf 6a 08 85 9d f9 81 f6 aa ed 54 81 f9 |..<.j........T..| +00000040 9b a8 d0 60 85 bd 70 |...`..p| +[14d8 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14d9 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14da 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14db 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[14dc 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de eb 2f 69 9e b5 25 2a f7 f9 15 10 c7 a0 49 88 |../i..%*......I.| +00000010 4d 60 63 44 f0 33 d6 56 69 6c 99 65 a3 c1 48 39 |M`cD.3.Vil.e..H9| +[14dd 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d1 83 cb 8f 70 cd 99 b5 2c 6d b6 |0D. 9....p...,m.| +00000010 f4 11 fa bb 5c 10 c6 47 5c 2f 51 8f 80 6a 75 d3 |....\..G\/Q..ju.| +00000020 43 c2 2f 2f 02 20 26 9d 1b 91 88 10 77 b2 2d ec |C.//. &.....w.-.| +00000030 dc 7f 4c 1a 42 ed 82 7d 76 60 29 ba b6 47 b1 c6 |..L.B..}v`)..G..| +00000040 e4 ae 12 f5 e7 e8 |......| +[14de 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[14df 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e0 05-20 18:20:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e1 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[14e2 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[14e3 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[14e4 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610061801 +[14e5 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ECA08B6A6133E16B7EED3E23981FFDBD11D3A33B2FC4F89EEFC0FB79146811F9 +[14e6 05-20 18:20:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[14e7 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14e8 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14e9 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ea 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14eb 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[14ec 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ed 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ee 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[14ef 05-20 18:20:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14f0 05-20 18:20:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f1 05-20 18:20:27.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f2 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[14f3 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14f4 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14f5 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14f6 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14f7 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14f8 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14f9 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[14fa 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[14fb 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14fc 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14fd 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14fe 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[14ff 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1500 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1501 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1502 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1503 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1504 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 gate 1589998827649124200 evaluation starts +[1505 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 signed by 0 principal evaluation starts (used [false]) +[1506 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 processing identity 0 with bytes of 115a110 +[1507 05-20 18:20:27.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 principal matched by identity 0 +[1508 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1509 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[150b 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[150c 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 principal evaluation succeeds for identity 0 +[150d 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e70200 gate 1589998827649124200 evaluation succeeds +[150e 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[150f 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[150a 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1510 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1511 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1512 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1513 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1514 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1515 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1516 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1517 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1518 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1519 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[151a 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[151b 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[151c 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 gate 1589998827655778700 evaluation starts +[151d 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 signed by 0 principal evaluation starts (used [false]) +[151e 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 processing identity 0 with bytes of 115a110 +[151f 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 principal matched by identity 0 +[1520 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1521 05-20 18:20:27.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e71af0 principal evaluation succeeds for identity 0 +[1523 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e71af0 gate 1589998827655778700 evaluation succeeds +[1524 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1525 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1526 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1527 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1528 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1529 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[152a 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[152b 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[152c 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[152d 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[152e 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[152f 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1530 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1531 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1532 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1533 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1534 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1535 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 gate 1589998827667229700 evaluation starts +[1536 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 signed by 0 principal evaluation starts (used [false]) +[1537 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 processing identity 0 with bytes of 115a110 +[1538 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 principal matched by identity 0 +[1539 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[153a 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e8b640 principal evaluation succeeds for identity 0 +[153c 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b640 gate 1589998827667229700 evaluation succeeds +[153d 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[153e 05-20 18:20:27.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[153f 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1540 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1541 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1542 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1543 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1544 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1545 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1546 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1547 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1548 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1549 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[154a 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[154b 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[154c 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[154d 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 gate 1589998827677144600 evaluation starts +[154e 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 signed by 0 principal evaluation starts (used [false]) +[154f 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 processing identity 0 with bytes of 115a110 +[1550 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 principal matched by identity 0 +[1551 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1552 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1553 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 principal evaluation succeeds for identity 0 +[1554 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea9620 gate 1589998827677144600 evaluation succeeds +[1555 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1556 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1557 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1558 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1559 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[155a 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[155b 05-20 18:20:27.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[155c 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[155d 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[155e 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[155f 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1560 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1561 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1562 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1563 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1564 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1565 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1566 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1567 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 gate 1589998827681411200 evaluation starts +[1568 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 signed by 0 principal evaluation starts (used [false]) +[1569 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 processing identity 0 with bytes of 115a110 +[156a 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 principal matched by identity 0 +[156b 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[156c 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003f39820 principal evaluation succeeds for identity 0 +[156e 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39820 gate 1589998827681411200 evaluation succeeds +[156f 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1570 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1571 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1572 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1573 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1574 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1575 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1576 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1577 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1578 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1579 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[157a 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[157b 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 gate 1589998827687086300 evaluation starts +[157c 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 signed by 0 principal evaluation starts (used [false]) +[157d 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 processing identity 0 with bytes of 115a110 +[157e 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 principal matched by identity 0 +[157f 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1580 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1581 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 principal evaluation succeeds for identity 0 +[1582 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3aa20 gate 1589998827687086300 evaluation succeeds +[1583 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1584 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1585 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1586 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1587 05-20 18:20:27.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1588 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1589 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[158a 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[158b 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[158c 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[158d 05-20 18:20:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[158e 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[158f 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1590 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1591 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1592 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1593 05-20 18:20:27.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1594 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1595 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1596 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1597 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1598 05-20 18:20:27.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1599 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[159a 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[159b 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[159c 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[159d 05-20 18:20:27.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[159e 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[159f 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[15a0 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15a1 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15a2 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15a3 05-20 18:20:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15a4 05-20 18:20:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15a5 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15a6 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15a7 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15a8 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[15a9 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 43 16 86 31 55 c4 31 65 ed 50 7a 05 d4 d0 d8 |.C..1U.1e.Pz....| +00000010 5c f8 57 c3 8c 57 5d 69 ef 9f a3 0d f7 f1 37 b3 |\.W..W]i......7.| +[15aa 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 06 50 c9 08 20 3f 6d 90 8c 93 |0E.!...P.. ?m...| +00000010 d4 f6 c7 b3 95 7d 32 ff a9 68 a2 b3 af 8a a2 01 |.....}2..h......| +00000020 84 7f f6 22 00 02 20 5c a0 40 84 4f 94 b1 b5 94 |...".. \.@.O....| +00000030 3c 38 62 3b a4 4f 06 07 b8 84 a7 75 0e fb 3f e0 |<8b;.O.....u..?.| +00000040 b8 a5 fa 87 8e 3c 1c |.....<.| +[15ab 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15ac 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[15ad 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[15ae 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[15af 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[15b0 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b1 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b2 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b3 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b4 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b5 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b6 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[15b7 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b8 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[15b9 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15ba 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15bb 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15bc 05-20 18:20:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15bd 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15be 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15bf 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15c0 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[15c1 05-20 18:20:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15c2 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15c3 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15c4 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15c5 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15c6 05-20 18:20:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15c7 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[15c8 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[15c9 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ca 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[15cb 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[15cc 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +[15cd 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +00000040 3f 6e 14 09 c8 0c 87 |?n.....| +[15ce 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[15cf 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 79 2c 4d 70 44 7b 24 49 9f b2 |0E.!..y,MpD{$I..| +00000010 e5 54 8f 26 f9 e1 9a ff fc 4b 8c 78 ce da fb 41 |.T.&.....K.x...A| +00000020 29 b6 12 13 0a 02 20 21 41 86 39 0b 6c 59 53 04 |)..... !A.9.lYS.| +00000030 06 a9 50 a2 5d b8 0a 3c a3 63 a6 d2 3f e6 ab b5 |..P.]..<.c..?...| +00000040 3b 3b b4 95 d4 25 7d |;;...%}| +[15d0 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[15d1 05-20 18:20:28.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[15d2 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[15d3 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[15d4 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[15d5 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15d6 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15d7 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[15d8 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d9 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15da 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15db 05-20 18:20:28.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[15dc 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[15dd 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15de 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[15df 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15e0 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15e1 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e2 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15e3 05-20 18:20:28.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e4 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[15e5 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[15e6 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15e7 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15e8 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15e9 05-20 18:20:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ea 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15eb 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15ec 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15ed 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15ee 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15ef 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15f0 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15f1 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15f2 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15f3 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[15f4 05-20 18:20:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f5 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +[15f6 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +[15f7 05-20 18:20:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f8 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:b\007L\273l\377\335Q\370\333" > > , Envelope: 165 bytes, Signature: 0 bytes +[15f9 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[15fa 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15fb 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[15fc 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[15fd 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[15fe 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[15ff 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1600 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1601 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 gate 1589998828692826400 evaluation starts +[1602 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 signed by 0 principal evaluation starts (used [false]) +[1603 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 processing identity 0 with bytes of 115a110 +[1604 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 principal matched by identity 0 +[1605 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 9d 6c 58 ae 31 24 cc db f7 5f 55 14 c0 ce c3 |6.lX.1$..._U....| +00000010 61 18 49 32 74 23 32 16 04 44 5a 7b 2f 94 f3 44 |a.I2t#2..DZ{/..D| +[1606 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 07 47 1b eb ae 8c ef cc b3 2a b7 |0D. ..G.......*.| +00000010 85 23 60 3f dd c5 53 d9 70 81 27 1a 7e c5 c3 9b |.#`?..S.p.'.~...| +00000020 b0 48 5d 89 02 20 36 63 a8 de 99 74 6e 28 f5 da |.H].. 6c...tn(..| +00000030 11 23 58 53 d6 3d bb f4 ba 39 3d 3e 62 07 4c bb |.#XS.=...9=>b.L.| +00000040 6c ff dd 51 f8 db |l..Q..| +[1607 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 principal evaluation succeeds for identity 0 +[1608 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fabb70 gate 1589998828692826400 evaluation succeeds +[1609 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[160a 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[160b 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[160c 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[160d 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[160e 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[160f 05-20 18:20:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1610 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1612 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1613 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1614 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1615 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1616 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1617 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1618 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1619 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[161a 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[161b 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[161d 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[161c 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[161e 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1621 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1622 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[161f 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:b\007L\273l\377\335Q\370\333" > alive: alive: +[1620 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1611 05-20 18:20:28.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1623 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1624 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1625 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1626 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1627 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1628 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1629 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[162a 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[162b 05-20 18:20:28.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[162c 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 gate 1589998828760325200 evaluation starts +[162d 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 signed by 0 principal evaluation starts (used [false]) +[162e 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 processing identity 0 with bytes of 115a110 +[162f 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 principal matched by identity 0 +[1630 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 5e 22 63 2e 10 12 65 2c a2 fa 9a 28 3e 33 3c |'^"c...e,...(>3<| +00000010 b8 d6 e4 c1 89 60 b0 de bb bd 6d ef 35 08 3c 88 |.....`....m.5.<.| +[1631 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 87 19 6c 50 2a 4f 0d e8 d0 e6 14 |0D. (..lP*O.....| +00000010 d9 dd b8 a8 16 37 11 41 d3 0f bc 1a 4f d8 b9 40 |.....7.A....O..@| +00000020 96 0c ad f0 02 20 3d 26 43 81 f5 37 df e4 5e 05 |..... =&C..7..^.| +00000030 f7 49 ab c2 13 57 6e 8f 38 64 8b 1c 9b 0c 74 fa |.I...Wn.8d....t.| +00000040 36 67 2c ed 73 95 |6g,.s.| +[1632 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 principal evaluation succeeds for identity 0 +[1633 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712f0 gate 1589998828760325200 evaluation succeeds +[1634 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1635 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1636 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1637 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1638 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1639 05-20 18:20:28.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[163a 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[163b 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[163c 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[163d 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[163e 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[163f 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1640 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1641 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1643 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1644 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1646 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1647 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1648 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1649 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1645 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1642 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[164a 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[164b 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[164c 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[164d 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[164f 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1650 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[164e 05-20 18:20:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1652 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1651 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1653 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1654 05-20 18:20:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1655 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1656 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1657 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1658 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1659 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[165b 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[165a 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[165c 05-20 18:20:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[165e 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[165f 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[165d 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1660 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1661 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1662 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1663 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1664 05-20 18:20:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1665 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1666 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1667 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1668 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1669 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[166a 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[166b 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[166c 05-20 18:20:28.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[166d 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[166e 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101B +[166f 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BEB0EF21031B0F67697269EA79EDB88F236B5DF48E310AF4486E1A779F94219D +[1670 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1671 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1672 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1673 05-20 18:20:28.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1674 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1675 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1676 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1677 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1678 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1679 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[167a 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +[167b 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[167c 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[167d 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[167e 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[167f 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1680 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1681 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1682 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1683 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1684 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1685 05-20 18:20:28.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +[1686 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 gate 1589998828840117400 evaluation starts +[1687 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 signed by 0 principal evaluation starts (used [false]) +[1688 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 processing identity 0 with bytes of 115a110 +[168a 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +[168b 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[168c 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 principal matched by identity 0 +[168d 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 d4 03 95 0b 28 3c 00 86 94 c3 1d ef b2 33 b4 |W....(<.......3.| +00000010 39 a0 29 39 9e b2 1b d2 b1 f6 4b da 0a 82 db de |9.)9......K.....| +[168f 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 de 89 ad cc 1a 7d 8b ab 4b 1a |0E.!.......}..K.| +00000010 84 34 4c 8d 59 e5 b7 84 cd 7c 4b f7 3f 0c 36 64 |.4L.Y....|K.?.6d| +00000020 2b 9d 5f d8 a6 02 20 3d b9 e5 68 dc da 42 7a 74 |+._... =..h..Bzt| +00000030 58 39 5b ad a9 ad ac d6 e6 2e eb c8 56 24 f5 ff |X9[.........V$..| +00000040 f5 85 8c fa cc 84 c6 |.......| +[1690 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 principal evaluation succeeds for identity 0 +[168e 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +[1689 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes to 1 peers +[1691 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332dee0 gate 1589998828840117400 evaluation succeeds +[1692 05-20 18:20:28.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1693 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes +[1695 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1694 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1696 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1697 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1698 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1699 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[169a 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[169b 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[169c 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[169d 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[169e 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[169f 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[16a0 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a1 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a2 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a3 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[16a4 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a5 05-20 18:20:28.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a6 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16a7 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16a8 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16a9 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16aa 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ab 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ac 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[16ad 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ae 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16af 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[16b0 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[16b1 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16b2 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[16b3 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16b4 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[16b5 05-20 18:20:28.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[16b6 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[16b7 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16b8 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16b9 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ba 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16bb 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16bc 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16bd 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[16be 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16bf 05-20 18:20:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +[16c0 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +[16c1 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16c2 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > > , Envelope: 166 bytes, Signature: 0 bytes +[16c3 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[16c4 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16c5 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[16c6 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[16c7 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[16c8 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[16c9 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[16ca 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[16cb 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 gate 1589998828883038400 evaluation starts +[16cc 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 signed by 0 principal evaluation starts (used [false]) +[16cd 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 processing identity 0 with bytes of 115a110 +[16ce 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 principal matched by identity 0 +[16cf 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +[16d0 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +00000040 d7 3c bb f3 1c bf d5 |.<.....| +[16d1 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 principal evaluation succeeds for identity 0 +[16d2 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c20a0 gate 1589998828883038400 evaluation succeeds +[16d3 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[16d4 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[16d5 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[16d6 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[16d7 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[16d8 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[16d9 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[16da 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[16db 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[16dc 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16dd 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16de 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16df 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[16e0 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16e1 05-20 18:20:28.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16e2 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16e3 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[16e4 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[16e5 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[16e6 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16e7 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive: alive: alive: +[16e8 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[16e9 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[16ea 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16eb 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16ec 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[16ed 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101C +[16ee 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 29540D67B2E81D744B7BCF63F269299A02D3DAF9670B301038F6325DDE44A9AD +[16ef 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[16f0 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[16f1 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[16f2 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[16f3 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16f4 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[16f5 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16f6 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[16f7 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes +[16f8 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16f9 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[16fa 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16fb 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\247d\311\221d{\001\376G\362\305,\242i\376\001\314\\\035\313P\302\346\243z\275o" > > , Envelope: 166 bytes, Signature: 0 bytes +[16fc 05-20 18:20:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16fd 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[16fe 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[16ff 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1700 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1701 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1702 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1703 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1704 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1705 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1706 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1707 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1708 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1709 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 gate 1589998828907295200 evaluation starts +[170a 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 signed by 0 principal evaluation starts (used [false]) +[170b 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 processing identity 0 with bytes of 115a110 +[170c 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 principal matched by identity 0 +[170d 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +[170e 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +00000040 d7 3c bb f3 1c bf d5 |.<.....| +[170f 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 principal evaluation succeeds for identity 0 +[1710 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8d50 gate 1589998828907295200 evaluation succeeds +[1711 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1712 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1713 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1714 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1715 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1716 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1717 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1718 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +[1719 05-20 18:20:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +00000040 3f 6e 14 09 c8 0c 87 |?n.....| +[171a 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[171b 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[171c 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[171d 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +[171e 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +[171f 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1720 05-20 18:20:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1721 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1722 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1723 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1724 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1725 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1726 05-20 18:20:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1727 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1728 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +[1729 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +[172a 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[172b 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 18 64 fb 10 a0 b6 34 9c 5e 89 27 |0D. 7.d....4.^.'| +00000010 72 54 20 9f 2f 2c fc 82 41 25 86 34 f8 b3 f9 73 |rT ./,..A%.4...s| +00000020 ef bd 05 ff 02 20 5f e0 6f 1c 1c a1 ee 7a e1 f6 |..... _.o....z..| +00000030 e1 dc 82 64 b9 1c a5 7b fb eb cc 63 92 67 72 88 |...d...{...c.gr.| +00000040 8b 40 7e 46 1c 2c |.@~F.,| +[172d 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[172e 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[172c 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[172f 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1730 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1731 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1732 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1733 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1734 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1735 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 81 b6 ca dc e3 35 56 c1 f8 5a 0f b8 a5 9a f3 |......5V..Z.....| +00000010 50 b3 61 e8 ce 21 c6 44 33 49 42 58 7e 09 36 1f |P.a..!.D3IBX~.6.| +[1736 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a6 ef a4 b4 89 7e 00 dd 9f f7 |0E.!.......~....| +00000010 cc cb c8 33 ff d1 5a a4 4b 86 cc 45 29 ef a6 fc |...3..Z.K..E)...| +00000020 ad 8e cd fc 61 02 20 64 46 83 65 dc 18 03 23 0c |....a. dF.e...#.| +00000030 9f 6b 55 3b 0e 48 12 8c 66 27 29 3d 53 9f 51 e5 |.kU;.H..f')=S.Q.| +00000040 3f 6e 14 09 c8 0c 87 |?n.....| +[1737 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1738 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1739 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[173a 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 54 0d 67 b2 e8 1d 74 4b 7b cf 63 f2 69 29 9a |)T.g...tK{.c.i).| +00000010 02 d3 da f9 67 0b 30 10 38 f6 32 5d de 44 a9 ad |....g.0.8.2].D..| +[173b 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc e7 81 22 ca 10 f7 af 08 d7 64 |0E.!...."......d| +00000010 a1 0c cf f2 da 33 69 44 35 99 38 8a f5 63 df 8e |.....3iD5.8..c..| +00000020 7e c9 e2 57 04 02 20 4d ac e3 db 3e a7 64 c9 91 |~..W.. M...>.d..| +00000030 64 7b 01 fe 47 f2 c5 2c a2 69 fe 01 cc 5c 1d cb |d{..G..,.i...\..| +00000040 50 c2 e6 a3 7a bd 6f |P...z.o| +[173c 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[173d 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[173e 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[173f 05-20 18:20:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1740 05-20 18:20:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[1741 05-20 18:20:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[1742 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1743 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610071801 +[1744 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82710F14E505C82501701AF2141718B5483EB65D3C473F52E9DC3E8C086694BF +[1745 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[1746 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1747 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1748 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1749 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[174a 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[174b 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[174c 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[174d 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[174e 05-20 18:20:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[174f 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1750 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1751 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1752 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1753 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1754 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1755 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1756 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1757 05-20 18:20:31.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1758 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1759 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[175b 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[175c 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[175a 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[175d 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[175e 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[175f 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1760 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1761 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1762 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1763 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1764 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1765 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 gate 1589998831613870600 evaluation starts +[1766 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 signed by 0 principal evaluation starts (used [false]) +[1767 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 processing identity 0 with bytes of 115a110 +[1768 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 principal matched by identity 0 +[1769 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[176a 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[176b 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 principal evaluation succeeds for identity 0 +[176c 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034398f0 gate 1589998831613870600 evaluation succeeds +[176d 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[176e 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[176f 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1770 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1771 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1772 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1773 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1774 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1775 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1776 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1777 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1778 05-20 18:20:31.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1779 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[177a 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[177b 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 gate 1589998831621598800 evaluation starts +[177c 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 signed by 0 principal evaluation starts (used [false]) +[177d 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 processing identity 0 with bytes of 115a110 +[177e 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 principal matched by identity 0 +[177f 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1780 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00345b1e0 principal evaluation succeeds for identity 0 +[1782 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b1e0 gate 1589998831621598800 evaluation succeeds +[1783 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1784 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1785 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1786 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1787 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1788 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1789 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[178a 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[178b 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[178c 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[178d 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[178e 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[178f 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1790 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1791 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1792 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1793 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1794 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 gate 1589998831627714100 evaluation starts +[1795 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 signed by 0 principal evaluation starts (used [false]) +[1796 05-20 18:20:31.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 processing identity 0 with bytes of 115a110 +[1797 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 principal matched by identity 0 +[1798 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1799 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00347ad20 principal evaluation succeeds for identity 0 +[179b 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00347ad20 gate 1589998831627714100 evaluation succeeds +[179c 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[179d 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[179e 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[179f 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17a0 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[17a1 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[17a2 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[17a3 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[17a4 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17a5 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17a6 05-20 18:20:31.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17a7 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17a8 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17a9 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17aa 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17ab 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17ac 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 gate 1589998831640491300 evaluation starts +[17ad 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 signed by 0 principal evaluation starts (used [false]) +[17ae 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 processing identity 0 with bytes of 115a110 +[17af 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 principal matched by identity 0 +[17b0 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[17b1 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[17b2 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 principal evaluation succeeds for identity 0 +[17b3 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003496d00 gate 1589998831640491300 evaluation succeeds +[17b4 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17b5 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17b6 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17b7 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17b8 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17b9 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[17ba 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[17bb 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[17bc 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[17bd 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[17be 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17bf 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17c0 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17c1 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17c2 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17c3 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17c4 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17c5 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17c6 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 gate 1589998831648825100 evaluation starts +[17c7 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 signed by 0 principal evaluation starts (used [false]) +[17c8 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 processing identity 0 with bytes of 115a110 +[17c9 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 principal matched by identity 0 +[17ca 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[17cb 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0034ace80 principal evaluation succeeds for identity 0 +[17cd 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ace80 gate 1589998831648825100 evaluation succeeds +[17ce 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17cf 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17d0 05-20 18:20:31.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17d1 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17d2 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17d3 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17d4 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17d5 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17d6 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17d7 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17d8 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17d9 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17da 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 gate 1589998831655930700 evaluation starts +[17db 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 signed by 0 principal evaluation starts (used [false]) +[17dc 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 processing identity 0 with bytes of 115a110 +[17dd 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 principal matched by identity 0 +[17de 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[17df 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[17e0 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 principal evaluation succeeds for identity 0 +[17e1 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c8080 gate 1589998831655930700 evaluation succeeds +[17e2 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17e3 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17e4 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17e5 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17e6 05-20 18:20:31.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17e7 05-20 18:20:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17e8 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17e9 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[17ea 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17eb 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17ec 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[17ed 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[17ee 05-20 18:20:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17ef 05-20 18:20:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[17f0 05-20 18:20:32.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[17f1 05-20 18:20:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[17f2 05-20 18:20:32.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17f3 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[17f4 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[17f5 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17f6 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17f7 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17f8 05-20 18:20:32.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17f9 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[17fa 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[17fb 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17fc 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17fd 05-20 18:20:32.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17fe 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[17ff 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1800 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1801 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1802 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1803 05-20 18:20:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1804 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1805 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1806 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1807 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1808 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1809 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[180a 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[180b 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[180c 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[180d 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[180e 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[180f 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1810 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1811 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1812 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1813 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +[1814 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +00000040 ca 73 24 a5 8e 95 b2 |.s$....| +[1815 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1816 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 75 e3 05 4a 52 2a d4 fc 22 77 e6 |0D. ~u..JR*.."w.| +00000010 13 1e 53 ea 72 bc cb 53 9a 37 15 76 8b 1a 6d 9d |..S.r..S.7.v..m.| +00000020 05 c7 46 a3 02 20 73 ca c7 88 91 7f 05 da 5c f1 |..F.. s.......\.| +00000030 4e 03 0a 69 9c 9e 67 52 bd 84 54 5a ba 51 fa c1 |N..i..gR..TZ.Q..| +00000040 7f a4 ab aa 74 fd |....t.| +[1817 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1818 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1819 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[181a 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[181b 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[181c 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[181d 05-20 18:20:32.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[181e 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[181f 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1820 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1821 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1822 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +[1823 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1824 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[1825 05-20 18:20:32.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1826 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1827 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1828 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1829 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[182a 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[182b 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[182c 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[182d 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[182e 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[182f 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1830 05-20 18:20:32.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1831 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1832 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1833 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1834 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1835 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1836 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1837 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1838 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1839 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[183a 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[183b 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[183c 05-20 18:20:32.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[183d 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[183e 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[183f 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1840 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1841 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1842 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1843 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1844 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1845 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1846 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1847 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1848 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1849 05-20 18:20:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 gate 1589998832818011300 evaluation starts +[184a 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 signed by 0 principal evaluation starts (used [false]) +[184b 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 processing identity 0 with bytes of 115a110 +[184c 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 principal matched by identity 0 +[184d 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +[184e 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +00000040 35 7d 56 8e 1f d6 |5}V...| +[184f 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 principal evaluation succeeds for identity 0 +[1850 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c200 gate 1589998832818011300 evaluation succeeds +[1851 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1852 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1853 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1854 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1855 05-20 18:20:32.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1856 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1857 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1858 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1859 05-20 18:20:32.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[185a 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[185b 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[185c 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[185d 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[185e 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[185f 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1860 05-20 18:20:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1861 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1862 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101D +[1863 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4686D4B0023938706A1B7BE1225A58B98D22E3EAECE389D5A5A812D17C2E221F +[1864 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1865 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1866 05-20 18:20:32.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1867 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[1868 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1869 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[186a 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:j$\227\013\226\306 \326\371\243x*Qu\310\322\022\240\334\222\327<\273\363\034\277\325" > alive: +[186b 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[186c 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[186d 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186e 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[186f 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1870 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[1871 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1872 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1873 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1874 05-20 18:20:32.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1875 05-20 18:20:32.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1876 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1877 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1878 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1879 05-20 18:20:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[187a 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[187b 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[187c 05-20 18:20:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[187d 05-20 18:20:33.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[187e 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[187f 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1880 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1881 05-20 18:20:33.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1882 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1883 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1884 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1885 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1886 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1887 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1888 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1889 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[188a 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[188b 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[188c 05-20 18:20:33.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[188d 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[188e 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[188f 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1890 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1891 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1892 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1893 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1894 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1895 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1896 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1897 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1898 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1899 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 gate 1589998833152963500 evaluation starts +[189a 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 signed by 0 principal evaluation starts (used [false]) +[189b 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 processing identity 0 with bytes of 115a110 +[189c 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 principal matched by identity 0 +[189d 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 30 0b d1 02 88 00 a6 3f 0b b3 be 7a 4b 35 bc |.0......?...zK5.| +00000010 e2 d2 42 2f 17 2c e3 30 bf a0 03 b3 ea cf 36 50 |..B/.,.0......6P| +[189e 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 26 ca 86 55 15 5c cb f4 a0 57 77 |0D. o&..U.\...Ww| +00000010 f3 34 72 6b d5 21 fc a8 e4 e3 b0 04 34 0d 80 c5 |.4rk.!......4...| +00000020 bd 25 0e 1b 02 20 2b d7 b2 e8 e0 43 60 56 cc 26 |.%... +....C`V.&| +00000030 da ae fd f7 ec a4 f7 82 12 50 e7 09 be 39 2f f5 |.........P...9/.| +00000040 1c 76 cc 3b 71 aa |.v.;q.| +[189f 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 principal evaluation succeeds for identity 0 +[18a0 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a01b0 gate 1589998833152963500 evaluation succeeds +[18a1 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[18a2 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[18a3 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[18a4 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[18a5 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18a6 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[18a7 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[18a8 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[18a9 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[18aa 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ab 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ac 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ad 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[18ae 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18af 05-20 18:20:33.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18b0 05-20 18:20:33.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18b1 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[18b2 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[18b3 05-20 18:20:33.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18b4 05-20 18:20:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[18b5 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18b6 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18b7 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18b8 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18b9 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[18ba 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18bb 05-20 18:20:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[18bc 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[18bd 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[18be 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[18bf 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[18c0 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[18c1 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 gate 1589998833201379000 evaluation starts +[18c2 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 signed by 0 principal evaluation starts (used [false]) +[18c3 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 processing identity 0 with bytes of 115a110 +[18c4 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 principal matched by identity 0 +[18c5 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0d 28 37 d2 ac c4 d7 9b 69 17 d1 02 d2 c2 ac 78 |.(7.....i......x| +00000010 44 be d9 10 3e 3c 38 02 c1 d4 a3 bf c9 01 70 ab |D...><8.......p.| +[18c6 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d a9 0d 9b 5f d3 69 c1 cb 60 58 |0E.!....._.i..`X| +00000010 84 66 c8 c3 1b 7d 06 96 c4 5a ca 35 7a 1f 04 f6 |.f...}...Z.5z...| +00000020 ad 92 87 84 0d 02 20 2c b8 18 02 3e 6a 24 97 0b |...... ,...>j$..| +00000030 96 c6 20 d6 f9 a3 78 2a 51 75 c8 d2 12 a0 dc 92 |.. ...x*Qu......| +00000040 d7 3c bb f3 1c bf d5 |.<.....| +[18c7 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 principal evaluation succeeds for identity 0 +[18c8 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d8050 gate 1589998833201379000 evaluation succeeds +[18c9 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[18ca 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[18cb 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[18cc 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[18cd 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18ce 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1589998788850055200, 32 but got ts: inc_num:1589998788850055200 seq_num:31 +[18cf 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18d0 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[18d1 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +[18d2 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +00000040 ca 73 24 a5 8e 95 b2 |.s$....| +[18d3 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[18d4 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18d5 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[18d6 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +[18d7 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +00000040 ea 2b 5a 57 a9 df |.+ZW..| +[18d8 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18d9 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18da 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18db 05-20 18:20:33.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18dc 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[18dd 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[18de 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18df 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[18e0 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[18e1 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +[18e2 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +00000040 ea 2b 5a 57 a9 df |.+ZW..| +[18e3 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[18e4 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e ba 8f a3 5e a6 01 27 c8 75 60 14 |0D. N...^..'.u`.| +00000010 54 ba 12 aa 12 6f 61 d3 28 08 30 5d 78 8a ba fa |T....oa.(.0]x...| +00000020 a7 b8 21 1a 02 20 0d 3a 19 68 fc 03 05 99 f6 60 |..!.. .:.h.....`| +00000030 1b c4 ef 42 16 39 a0 60 4a fd d9 21 22 12 2f 8a |...B.9.`J..!"./.| +00000040 9b d2 08 72 70 44 |...rpD| +[18e5 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[18e6 05-20 18:20:33.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[18e7 05-20 18:20:33.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18e8 05-20 18:20:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18e9 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18ea 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18eb 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ec 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18ed 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[18ee 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18ef 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[18f0 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[18f1 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[18f2 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[18f3 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[18f4 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[18f5 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 gate 1589998833327008400 evaluation starts +[18f6 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 signed by 0 principal evaluation starts (used [false]) +[18f7 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 processing identity 0 with bytes of 115a110 +[18f8 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 principal matched by identity 0 +[18f9 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 fa 5e 0c 7c ba c5 48 aa a7 7d 17 d0 0d c6 4a |F.^.|..H..}....J| +00000010 2f ee 52 73 88 ec 2f 59 3d 8f 8b 4e 26 c2 10 e8 |/.Rs../Y=..N&...| +[18fa 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 72 f3 59 f7 45 db 89 20 d1 2a 05 |0D. .r.Y.E.. .*.| +00000010 0c 3a a2 80 13 ac 57 da 4b ed 91 66 34 6d f7 12 |.:....W.K..f4m..| +00000020 78 d2 4a 63 02 20 5f 8b e6 ac 61 b5 d2 ce c9 17 |x.Jc. _...a.....| +00000030 c9 51 98 af fe 4e f5 6c 8e 87 14 1e 57 2f 6c f5 |.Q...N.l....W/l.| +00000040 35 7d 56 8e 1f d6 |5}V...| +[18fb 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 principal evaluation succeeds for identity 0 +[18fc 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003569b40 gate 1589998833327008400 evaluation succeeds +[18fd 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[18fe 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[18ff 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1900 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1901 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1902 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1903 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1904 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 86 d4 b0 02 39 38 70 6a 1b 7b e1 22 5a 58 b9 |F....98pj.{."ZX.| +00000010 8d 22 e3 ea ec e3 89 d5 a5 a8 12 d1 7c 2e 22 1f |."..........|.".| +[1905 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 62 51 52 91 0e e3 a1 d3 d4 68 e0 |0D. .bQR......h.| +00000010 12 42 ff 3d c1 87 d0 c2 9c 52 73 1d 3d 60 a4 ba |.B.=.....Rs.=`..| +00000020 a1 6b a9 d4 02 20 48 13 d1 26 5d 94 d8 c9 b8 0e |.k... H..&].....| +00000030 32 af bc 28 43 1f 4e b8 aa 42 a7 84 ce 42 e4 3b |2..(C.N..B...B.;| +00000040 ea 2b 5a 57 a9 df |.+ZW..| +[1906 05-20 18:20:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1907 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1908 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1909 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[190a 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 02 27 d1 56 26 44 eb e5 60 fa 62 0b 6c 65 dd |..'.V&D..`.b.le.| +00000010 52 3d 41 ef 76 ed c6 f0 22 d6 0a c8 29 e7 e9 b7 |R=A.v..."...)...| +[190b 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 bd 02 63 c4 e3 2a 41 1d ac 98 |0E.!....c..*A...| +00000010 57 a1 84 af c6 18 61 b4 2b 33 b6 97 45 35 62 e3 |W.....a.+3..E5b.| +00000020 cf b8 7e 3b be 02 20 2d 94 1a 02 3b 81 40 12 f3 |..~;.. -...;.@..| +00000030 26 3b 45 3a a0 30 99 bf 92 04 13 5c 30 85 99 c2 |&;E:.0.....\0...| +00000040 ca 73 24 a5 8e 95 b2 |.s$....| +[190c 05-20 18:20:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[190d 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190e 05-20 18:20:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190f 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1910 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1911 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1912 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1913 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1914 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 3b 8b 5b aa 3c 23 45 fc e5 83 b7 ad 24 dc 53 |.;.[.<#E.....$.S| +00000010 73 05 cc e8 23 0f fb 19 48 a4 8c d6 4f 13 46 4a |s...#...H...O.FJ| +[1915 05-20 18:20:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 3c 33 0a 7b a6 e7 5c fa bb 07 18 |0D. %<3.{..\....| +00000010 9a f7 bc 3f 05 97 ae f5 d2 ec 49 8d 47 84 5b 8e |...?......I.G.[.| +00000020 b4 ac cc 95 02 20 78 62 92 53 65 53 2d 0e 03 84 |..... xb.SeS-...| +00000030 ce 0f 74 ae 71 04 06 4b b1 85 80 f5 bb af 6f c4 |..t.q..K......o.| +00000040 95 7a 23 62 e6 a2 |.z#b..| +[1916 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1917 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1918 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1919 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[191a 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[191b 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[191c 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[191d 05-20 18:20:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[191e 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[191f 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1920 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1921 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1922 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1923 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1924 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1925 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1926 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1927 05-20 18:20:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1928 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1929 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[192a 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[192b 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[192c 05-20 18:20:33.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[192d 05-20 18:20:33.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[192e 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[192f 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1930 05-20 18:20:33.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1931 05-20 18:20:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1932 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1933 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101E +[1934 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8A2B3D471196B162D35EC57BF95F03FF430FF2135EF890410AB4559FBC023E47 +[1935 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1936 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1937 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1938 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1939 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193a 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193b 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193c 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[193d 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193e 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193f 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1940 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1941 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1942 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1943 05-20 18:20:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1944 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1945 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1946 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1947 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 gate 1589998834000121000 evaluation starts +[1948 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 signed by 0 principal evaluation starts (used [false]) +[1949 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 processing identity 0 with bytes of 115a110 +[194a 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 principal matched by identity 0 +[194b 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb a0 7e 49 c8 bd 4b 9e 8a 70 52 7b b1 10 c2 a3 |..~I..K..pR{....| +00000010 b7 f0 4d b5 21 5b 9f d6 45 99 4b 15 a9 25 37 2c |..M.![..E.K..%7,| +[194c 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 0a d0 c1 d4 96 4a ed c0 db 47 58 |0D. C.....J...GX| +00000010 03 ee 34 79 83 82 7a 2a 46 e8 6e 87 fe da fd 64 |..4y..z*F.n....d| +00000020 18 08 2f 7d 02 20 57 73 7b 3a 7f 38 48 33 c0 8b |../}. Ws{:.8H3..| +00000030 2f ff a7 c1 44 f4 ed a6 8a 3e 1d b7 73 83 7d 9a |/...D....>..s.}.| +00000040 dc cc 0a ab bb bc |......| +[194d 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 principal evaluation succeeds for identity 0 +[194e 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003662760 gate 1589998834000121000 evaluation succeeds +[194f 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1950 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1951 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1952 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1953 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1954 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1955 05-20 18:20:34.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1956 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1957 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1958 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[195a 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1959 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[195b 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[195c 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[195d 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[195e 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1960 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[195f 05-20 18:20:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1963 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1961 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1964 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1965 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1966 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1967 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1968 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1962 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1969 05-20 18:20:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[196a 05-20 18:20:34.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196b 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[196c 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[196d 05-20 18:20:34.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[196e 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[196f 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1970 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1972 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1971 05-20 18:20:34.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1973 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1974 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1975 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1976 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1977 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 gate 1589998834068981000 evaluation starts +[1978 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 signed by 0 principal evaluation starts (used [false]) +[1979 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 processing identity 0 with bytes of 115a110 +[197a 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 principal matched by identity 0 +[197b 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 df 24 11 a4 32 62 18 97 72 4a 73 00 e0 3b 5d |8.$..2b..rJs..;]| +00000010 d4 e9 c7 ac d4 51 f0 d9 69 4b 06 d0 8a 16 d4 ff |.....Q..iK......| +[197c 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 57 8a 43 f9 8b 9e 3b 58 86 ab 11 |0D. MW.C...;X...| +00000010 e6 aa 4f 20 88 b1 98 1f 02 ec 52 ab 7d 91 48 6b |..O ......R.}.Hk| +00000020 b6 78 5b 93 02 20 31 52 31 51 f6 37 10 5e 17 9f |.x[.. 1R1Q.7.^..| +00000030 9c 00 63 fc 5d ec 7a 00 5d 32 4c 73 23 6e fd d2 |..c.].z.]2Ls#n..| +00000040 ab bd e1 98 8b 4d |.....M| +[197d 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 principal evaluation succeeds for identity 0 +[197e 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1a90 gate 1589998834068981000 evaluation succeeds +[197f 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1980 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1981 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1982 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1983 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1984 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1985 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1986 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1987 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1988 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1989 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[198a 05-20 18:20:34.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[198b 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[198c 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[198d 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[198e 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[198f 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1990 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1991 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1992 05-20 18:20:34.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1993 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1994 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1995 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1996 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1997 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1998 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1999 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[199a 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[199b 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[199c 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[199d 05-20 18:20:34.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[199e 05-20 18:20:34.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[199f 05-20 18:20:34.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a0 05-20 18:20:34.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a1 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19a2 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a3 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19a4 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a5 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19a6 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19a7 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a8 05-20 18:20:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a9 05-20 18:20:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19aa 05-20 18:20:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ab 05-20 18:20:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ac 05-20 18:20:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ad 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19ae 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19af 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19b0 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19b1 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b2 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19b3 05-20 18:20:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b4 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19b5 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19b6 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[19b7 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19b9 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19ba 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19bb 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b8 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19bc 05-20 18:20:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19bd 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[19be 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[19bf 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19c0 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19c1 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19c2 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[19c3 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[19c4 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[19c5 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[19c6 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[19c7 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[19c8 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 gate 1589998835616878700 evaluation starts +[19c9 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 signed by 0 principal evaluation starts (used [false]) +[19ca 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 processing identity 0 with bytes of 115a110 +[19cc 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[19cb 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 principal matched by identity 0 +[19cd 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[19ce 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[19d0 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 principal evaluation succeeds for identity 0 +[19d1 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368b810 gate 1589998835616878700 evaluation succeeds +[19d2 05-20 18:20:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[19d3 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[19d4 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[19d5 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[19d6 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[19d7 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[19d8 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[19d9 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[19da 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19db 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19dc 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[19dd 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[19de 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[19df 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[19e0 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[19e1 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[19e2 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 gate 1589998835627451100 evaluation starts +[19e3 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 signed by 0 principal evaluation starts (used [false]) +[19e4 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 processing identity 0 with bytes of 115a110 +[19e5 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 principal matched by identity 0 +[19e6 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[19e7 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[19e8 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 principal evaluation succeeds for identity 0 +[19e9 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a17f0 gate 1589998835627451100 evaluation succeeds +[19ea 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[19eb 05-20 18:20:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[19ec 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[19ed 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[19ee 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19ef 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[19f0 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19f1 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19f2 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19f3 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[19f4 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[19f5 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[19f6 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[19f7 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[19f8 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[19f9 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 gate 1589998835636452200 evaluation starts +[19fa 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 signed by 0 principal evaluation starts (used [false]) +[19fb 05-20 18:20:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 processing identity 0 with bytes of 115a110 +[19fc 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 principal matched by identity 0 +[19fd 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[19fe 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[19ff 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 principal evaluation succeeds for identity 0 +[1a00 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0c40 gate 1589998835636452200 evaluation succeeds +[1a01 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a02 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a03 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a04 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a05 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1a06 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1a07 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a08 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a09 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a0a 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a0b 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a0c 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a0d 05-20 18:20:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a0e 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a0f 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 gate 1589998835650231500 evaluation starts +[1a10 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 signed by 0 principal evaluation starts (used [false]) +[1a11 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 processing identity 0 with bytes of 115a110 +[1a12 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 principal matched by identity 0 +[1a13 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1a14 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003800530 principal evaluation succeeds for identity 0 +[1a16 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003800530 gate 1589998835650231500 evaluation succeeds +[1a17 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a18 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a19 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a1a 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a1b 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1a1c 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1a1d 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a1e 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1a1f 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1a20 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1a21 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1a22 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1a23 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a24 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a25 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a26 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a27 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a28 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a29 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a2a 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a2b 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 gate 1589998835658794700 evaluation starts +[1a2c 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 signed by 0 principal evaluation starts (used [false]) +[1a2d 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 processing identity 0 with bytes of 115a110 +[1a2e 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 principal matched by identity 0 +[1a2f 05-20 18:20:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1a30 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003826da0 principal evaluation succeeds for identity 0 +[1a32 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826da0 gate 1589998835658794700 evaluation succeeds +[1a33 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a34 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a35 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a36 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a37 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a38 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a39 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a3a 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a3b 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a3c 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a3d 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a3e 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a3f 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 gate 1589998835666729100 evaluation starts +[1a40 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 signed by 0 principal evaluation starts (used [false]) +[1a41 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 processing identity 0 with bytes of 115a110 +[1a42 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 principal matched by identity 0 +[1a43 05-20 18:20:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1a44 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1a45 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 principal evaluation succeeds for identity 0 +[1a46 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827fa0 gate 1589998835666729100 evaluation succeeds +[1a47 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a48 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a49 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a4b 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a4a 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[1a4c 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[1a4e 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1a4f 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610081801 +[1a50 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F63FED5919F6E1CAEDC7D877E9052B154456C1ABD68984E57696241405921F22 +[1a51 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[1a4d 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a52 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a53 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a54 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a55 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a56 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[1a57 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a58 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a59 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[1a5a 05-20 18:20:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a5b 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a5c 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a5d 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1a5e 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a5f 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a60 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1a61 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1a62 05-20 18:20:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a63 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1a64 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1a65 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1a66 05-20 18:20:35.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a67 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes +[1a68 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes +[1a69 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a6a 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1835904277815662645 tag:EMPTY mem_req: > > , Envelope: 280 bytes, Signature: 0 bytes +[1a6b 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1a6c 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 47 3e 64 5c e5 76 eb c0 8e 79 a5 0a bb 2d 36 |.G>d\.v...y...-6| +00000010 79 ce 45 16 82 d3 c5 c3 72 dd b3 1f 62 65 30 56 |y.E.....r...be0V| +[1a6d 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 6a 8e aa 45 e4 e2 32 78 16 22 ca |0D. xj..E..2x.".| +00000010 ae ee 9e 98 3b ad 47 7f f6 e5 15 e7 bc 9f 22 12 |....;.G.......".| +00000020 a6 99 ee 31 02 20 4b ac ab 25 f5 d9 7b a4 c4 71 |...1. K..%..{..q| +00000030 62 b0 dc c3 81 27 cf 9f b1 d4 d5 62 06 47 a7 b6 |b....'.....b.G..| +00000040 15 9d 35 e7 fd 1c |..5...| +[1a6e 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1a6f 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e e9 84 33 ff 23 ba 2b 68 f5 b5 c9 |0D. ...3.#.+h...| +00000010 4a 99 2f 5c 88 b6 35 38 43 43 c2 61 b6 9a c3 ac |J./\..58CC.a....| +00000020 9a 37 9a b5 02 20 3f ef e2 f4 9c 27 42 ea ff 1a |.7... ?....'B...| +00000030 7a 3b ac 6c fc 0f d2 90 5f 85 6a 97 2d 88 85 d4 |z;.l...._.j.-...| +00000040 37 7a 14 ba 8a 23 |7z...#| +[1a70 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a71 05-20 18:20:35.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1a72 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a73 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a74 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1835904277815662645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes to 1 peers +[1a75 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1835904277815662645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +[1a77 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a76 05-20 18:20:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: +[1a78 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a79 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a7a 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a7b 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a7c 05-20 18:20:35.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a7d 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes +[1a7e 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes +[1a7f 05-20 18:20:36.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a80 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:12575490344503309973 tag:EMPTY mem_req:M\275\217\322c\007\376\336\243\002\037n\226\256\210\003 > > , Envelope: 282 bytes, Signature: 0 bytes +[1a81 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1a82 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 1b 2b 06 43 17 a1 52 16 81 a2 dd 43 99 8f 9d |..+.C..R....C...| +00000010 c8 33 9f 16 b1 32 61 c8 97 b9 58 26 80 b1 4a 87 |.3...2a...X&..J.| +[1a83 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 83 9d 33 67 eb 26 94 a8 69 f8 |0E.!....3g.&..i.| +00000010 b0 49 1b 77 86 a6 ff 65 0b 61 4c 98 a1 8b 48 18 |.I.w...e.aL...H.| +00000020 48 6e 07 7d 9c 02 20 2b 63 d6 a5 d4 84 73 c4 3a |Hn.}.. +c....s.:| +00000030 e4 9b fc b0 6a 90 84 74 32 96 2c 10 f8 cb c0 51 |....j..t2.,....Q| +00000040 a4 c3 91 c6 0f 7c 0f |.....|.| +[1a84 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1a85 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 93 98 e4 50 9e de 37 c4 5c de 47 |0D.!....P..7.\.G| +00000010 b7 db 55 cf 4d c6 f3 47 d2 f1 29 3e 4d bd 8f d2 |..U.M..G..)>M...| +00000020 63 07 fe de a3 02 1f 6e 96 ae 88 03 3c 78 d0 41 |c......n.... DEBU Exiting +[1a87 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1a88 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a89 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a8a 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 12575490344503309973, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes to 1 peers +[1a8b 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12575490344503309973, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +[1a8c 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a8d 05-20 18:20:36.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: +[1a8e 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a8f 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a90 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a91 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a92 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a93 05-20 18:20:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a94 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1a95 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1a96 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1a97 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1a98 05-20 18:20:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a99 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a9a 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a9b 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a9c 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a9d 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a9e 05-20 18:20:36.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a9f 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[1aa0 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[1aa1 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1aa2 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:3017408182641646088 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[1aa3 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1aa4 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aa5 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1aa6 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1aa7 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1aa8 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1aa9 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1aaa 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1aab 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 gate 1589998836503521900 evaluation starts +[1aac 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 signed by 0 principal evaluation starts (used [false]) +[1aad 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 processing identity 0 with bytes of 115a110 +[1aae 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 principal matched by identity 0 +[1aaf 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 0e 2b b5 72 27 3e 05 24 03 11 6f 63 15 5f da |..+.r'>.$..oc._.| +00000010 7e 4e d0 66 26 b9 e0 48 86 68 67 d7 64 f5 1b 6d |~N.f&..H.hg.d..m| +[1ab0 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 96 d4 b3 1c bb 48 83 9a cd aa |0E.!.......H....| +00000010 4a 6e 5d 71 a2 06 4e 12 dd b9 63 5d bd d5 0b f1 |Jn]q..N...c]....| +00000020 61 c9 4c 56 7b 02 20 12 24 5b 70 ba 9c 8a 3a 70 |a.LV{. .$[p...:p| +00000030 9b ac 45 40 4c fd b7 7b 1f 11 d3 0d 09 f7 ad d6 |..E@L..{........| +00000040 87 0d c4 0b 25 9b 95 |....%..| +[1ab1 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 principal evaluation succeeds for identity 0 +[1ab2 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a13f0 gate 1589998836503521900 evaluation succeeds +[1ab3 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ab4 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ab5 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ab6 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ab7 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ab8 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1ab9 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aba 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1abb 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1abc 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 3017408182641646088, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers +[1abd 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3017408182641646088, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes +[1abe 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1abf 05-20 18:20:36.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\035\267s\203}\232\334\314\n\253\273\274" > alive: alive: +[1ac0 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1ac1 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1ac2 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1ac3 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1ac4 05-20 18:20:36.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ac5 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1ac6 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1ac7 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ac8 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1ac9 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1aca 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +[1acb 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +00000040 8f 8f b3 24 c4 46 |...$.F| +[1acc 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1acd 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 9f da 3a 58 39 b8 aa 7e 71 df 45 |0D. ...:X9..~q.E| +00000010 38 e3 61 22 6f 00 b1 0a 45 c2 63 35 3c 70 93 f5 |8.a"o...E.c5 DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1acf 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1ad0 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1ad1 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1ad2 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1ad3 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ad4 05-20 18:20:36.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ad5 05-20 18:20:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ad6 05-20 18:20:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1ad7 05-20 18:20:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad8 05-20 18:20:36.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad9 05-20 18:20:36.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[1ada 05-20 18:20:36.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1adb 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1adc 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1add 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1ade 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1adf 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1ae0 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1ae1 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1ae2 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1ae3 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ae4 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1ae5 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ae6 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ae7 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ae8 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ae9 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1aea 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1aeb 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aec 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aed 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aee 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aef 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af0 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af1 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1af2 05-20 18:20:36.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1af3 05-20 18:20:36.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > alive: +[1af6 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1af7 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +00000040 db 83 fc d7 53 f3 3d |....S.=| +[1b08 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003924420 principal evaluation succeeds for identity 0 +[1b09 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003924420 gate 1589998836869692400 evaluation succeeds +[1b0a 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b0b 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b0c 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b0d 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b0e 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b0f 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1b10 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1b11 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1b12 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1b13 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b14 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b15 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b16 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1b17 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b18 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b19 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b1a 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1afd 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1b1b 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1b1c 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1b1d 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1afe 05-20 18:20:36.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b1e 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +[1b1f 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1b20 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b21 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b22 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b23 05-20 18:20:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b24 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1b25 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1b26 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b27 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:8846407952849447841 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1b28 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1b29 05-20 18:20:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b2a 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1b2b 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1b2c 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1b2d 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1b2e 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1b2f 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1b30 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 gate 1589998836954075400 evaluation starts +[1b31 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 signed by 0 principal evaluation starts (used [false]) +[1b32 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 processing identity 0 with bytes of 115a110 +[1b33 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 principal matched by identity 0 +[1b34 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 42 f3 d7 64 55 fc b2 58 5a 09 38 4b db ce 02 |.B..dU..XZ.8K...| +00000010 c4 37 a5 c1 5b 66 2e d6 b9 14 9d 36 d8 d1 e3 3c |.7..[f.....6...<| +[1b35 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 8e 92 67 d3 19 14 f8 7b ec 66 6c |0D. h..g....{.fl| +00000010 c2 f4 3f c6 7f ce ed 3b 36 a6 31 50 4c 93 6c ae |..?....;6.1PL.l.| +00000020 d0 0b 11 56 02 20 6b 08 4f 73 76 d5 02 a7 a9 9c |...V. k.Osv.....| +00000030 71 08 27 81 66 b7 64 e5 e8 0d 99 96 da 89 0a d8 |q.'.f.d.........| +00000040 ee 64 f6 56 b8 68 |.d.V.h| +[1b36 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 principal evaluation succeeds for identity 0 +[1b37 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039623e0 gate 1589998836954075400 evaluation succeeds +[1b38 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b39 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b3a 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b3b 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b3c 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b3d 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1b3e 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b3f 05-20 18:20:36.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b40 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b41 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 8846407952849447841, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +[1b42 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +[1b43 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8846407952849447841, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[1b44 05-20 18:20:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b45 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1b46 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816101F +[1b47 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B0F76BE3DA85DA11E9AEF97C4D21F800C085618247C636BD49E8C8B39652F0E9 +[1b48 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1b49 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1b4a 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1b4b 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\030\221\247\375Kz\002 \023\\\207\201\207\213\206\365#\343\241t\r\350\2631\362\303\310\376\305\347\340\367\003H\244\261\365 \243=" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[1b4c 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b4d 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[1b4e 05-20 18:20:36.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b4f 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[1b50 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1b51 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b52 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1b53 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b54 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\030\221\247\375Kz\002 \023\\\207\201\207\213\206\365#\343\241t\r\350\2631\362\303\310\376\305\347\340\367\003H\244\261\365 \243=" > > > , Envelope: 271 bytes, Signature: 0 bytes +[1b55 05-20 18:20:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b56 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1b57 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1b58 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b59 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1b5a 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1b5b 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +[1b5c 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +00000040 a6 d7 b2 26 29 cb |...&).| +[1b5d 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1b5e 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 e1 ca 30 06 bf 00 cc 8a eb 63 |0E.!....0......c| +00000010 0c c5 1c 7e fb 13 9e 54 12 67 64 b4 64 fe 3e 18 |...~...T.gd.d.>.| +00000020 91 a7 fd 4b 7a 02 20 13 5c 87 81 87 8b 86 f5 23 |...Kz. .\......#| +00000030 e3 a1 74 0d e8 b3 31 f2 c3 c8 fe c5 e7 e0 f7 03 |..t...1.........| +00000040 48 a4 b1 f5 20 a3 3d |H... .=| +[1b5f 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1b60 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1b61 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b62 05-20 18:20:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b63 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[1b64 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[1b65 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b66 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[1b67 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1b68 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +[1b69 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +00000040 8f 8f b3 24 c4 46 |...$.F| +[1b6a 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1b6b 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b6c 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1b6d 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +[1b6e 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +00000040 a6 d7 b2 26 29 cb |...&).| +[1b6f 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1b70 05-20 18:20:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1b71 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b72 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b73 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1b74 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1b75 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1b76 05-20 18:20:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b77 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b78 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b79 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b7a 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b7b 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b7c 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b7d 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b7e 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b7f 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b80 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1b81 05-20 18:20:37.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b82 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1b83 05-20 18:20:37.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1b84 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b85 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1b86 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1b87 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b88 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1b89 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1b8a 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1b8b 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1b8c 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1b8d 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1b8e 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 gate 1589998837115093300 evaluation starts +[1b8f 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 signed by 0 principal evaluation starts (used [false]) +[1b90 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 processing identity 0 with bytes of 115a110 +[1b91 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 principal matched by identity 0 +[1b92 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 b0 43 44 7a 33 50 45 89 55 b1 ca 35 0f 06 79 |".CDz3PE.U..5..y| +00000010 97 46 1a fa 0e a8 02 69 21 3d 57 64 d1 72 b1 dc |.F.....i!=Wd.r..| +[1b93 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 28 aa 9c e5 87 aa 50 c6 ea 97 |0E.!..(.....P...| +00000010 36 18 78 14 8d 66 d3 91 24 b3 30 90 8f 0e 09 40 |6.x..f..$.0....@| +00000020 c9 59 ce d8 83 02 20 30 66 30 1b a9 c7 c4 f5 c1 |.Y.... 0f0......| +00000030 89 94 1a f6 d7 84 a3 9b be c3 07 ab 15 6b d5 1b |.............k..| +00000040 db 83 fc d7 53 f3 3d |....S.=| +[1b94 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 principal evaluation succeeds for identity 0 +[1b95 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039bd680 gate 1589998837115093300 evaluation succeeds +[1b96 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b97 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b98 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b99 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b9a 05-20 18:20:37.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b9b 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b9c 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1b9d 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 f7 6b e3 da 85 da 11 e9 ae f9 7c 4d 21 f8 00 |..k........|M!..| +00000010 c0 85 61 82 47 c6 36 bd 49 e8 c8 b3 96 52 f0 e9 |..a.G.6.I....R..| +[1b9e 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 63 69 93 c7 a0 fc b9 6b 11 18 73 |0D. .ci.....k..s| +00000010 1a 88 b5 bf 71 a2 d6 9a 0b ca 1d 40 27 2a 4e 78 |....q......@'*Nx| +00000020 5d fd 6e 4d 02 20 54 84 ac b6 89 2f 37 57 cb 7b |].nM. T..../7W.{| +00000030 04 1c a5 5c a3 b5 37 e1 25 bb f1 5a 02 28 f8 c6 |...\..7.%..Z.(..| +00000040 a6 d7 b2 26 29 cb |...&).| +[1b9f 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ba0 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ba1 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ba2 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1ba3 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6a 8f 08 da 85 2b eb cb 53 21 16 9d 79 0d be 6b |j....+..S!..y..k| +00000010 04 d2 b8 db 66 c8 43 8b 7e b3 71 9a 22 69 bb 5d |....f.C.~.q."i.]| +[1ba4 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 e5 c6 9b 3c f2 f2 08 42 77 a4 71 |0D. i...<...Bw.q| +00000010 ed b7 3f ba 1b 64 d4 af af 79 41 fb 5a a5 d1 e9 |..?..d...yA.Z...| +00000020 6f 88 26 2c 02 20 4b 8d 86 cb a4 ba fc 98 20 18 |o.&,. K....... .| +00000030 5b f8 f4 f7 20 e2 30 d4 d3 a2 70 d5 ca 27 ef 31 |[... .0...p..'.1| +00000040 8f 8f b3 24 c4 46 |...$.F| +[1ba5 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ba6 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ba7 05-20 18:20:37.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ba8 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1ba9 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1baa 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bab 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1bac 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1bad 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bae 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1baf 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1bb0 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1bb1 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1bb2 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1bb3 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1bb4 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 gate 1589998837197565400 evaluation starts +[1bb5 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 signed by 0 principal evaluation starts (used [false]) +[1bb6 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 processing identity 0 with bytes of 115a110 +[1bb7 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 principal matched by identity 0 +[1bb8 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 df 8e 75 41 28 3c 92 bd e8 fd 1c 2a ca e1 ff |...uA(<.....*...| +00000010 e2 3b da db 51 5c ab 6d 9f 6a ef 09 55 47 ae 53 |.;..Q\.m.j..UG.S| +[1bb9 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 37 2d 39 bd 82 9d 7e e7 78 8e ca |0D. V7-9...~.x..| +00000010 72 18 11 31 44 d3 9d 70 bb ab dd d9 2a 04 da 69 |r..1D..p....*..i| +00000020 21 82 ce 59 02 20 60 bd e8 cc f9 2a 63 95 fa a4 |!..Y. `....*c...| +00000030 22 eb b5 da 6b 84 0c ff 38 07 3f 03 6a 78 9e 5a |"...k...8.?.jx.Z| +00000040 72 b3 60 b0 47 92 |r.`.G.| +[1bba 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 principal evaluation succeeds for identity 0 +[1bbb 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f7f90 gate 1589998837197565400 evaluation succeeds +[1bbc 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1bbd 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1bbe 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1bbf 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1bc0 05-20 18:20:37.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bc1 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1bc2 05-20 18:20:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1bc3 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1bc4 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1bc5 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bc6 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bc7 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bc8 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1bc9 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bca 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bcb 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bcc 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1bcd 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +[1bce 05-20 18:20:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1bcf 05-20 18:20:37.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd0 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bd1 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bd2 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd3 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bd4 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1bd5 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c d1 ee 27 18 66 b5 4e bf 41 4f 60 c1 af e1 be ||..'.f.N.AO`....| +00000010 bf d2 ac 60 2b 84 14 f7 2b 76 24 b5 d5 05 f0 d6 |...`+...+v$.....| +[1bd6 05-20 18:20:38.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 85 11 f5 d9 91 17 b5 ea a8 b4 |0E.!............| +00000010 0f 77 2e 11 89 7b 3f 5a ce 89 70 8e bf ce 72 11 |.w...{?Z..p...r.| +00000020 1d 2e 5e b0 e8 02 20 54 09 75 69 c8 73 64 cd 91 |..^... T.ui.sd..| +00000030 83 5a 8c 52 03 22 1a b8 ed 36 76 fd 32 cd c0 21 |.Z.R."...6v.2..!| +00000040 0d d3 81 3a 39 f5 ca |...:9..| +[1bd7 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bd8 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1bd9 05-20 18:20:38.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1bda 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1bdb 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bdc 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bdd 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[1bde 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bdf 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be0 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be1 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be2 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1be3 05-20 18:20:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be4 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1be5 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1be6 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be7 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1be8 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be9 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bea 05-20 18:20:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1beb 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bec 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1bed 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bee 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1bef 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bf0 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf1 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bf2 05-20 18:20:38.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf3 05-20 18:20:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bf4 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bf5 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf6 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bf7 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1bf8 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bf9 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1bfa 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1bfb 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1bfc 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1bfd 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1bfe 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1bff 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 gate 1589998838708401500 evaluation starts +[1c00 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 signed by 0 principal evaluation starts (used [false]) +[1c01 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 processing identity 0 with bytes of 115a110 +[1c02 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 principal matched by identity 0 +[1c03 05-20 18:20:38.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 a3 07 42 10 8f 78 e7 04 b0 14 b3 8c ed a6 26 |...B..x........&| +00000010 8e b3 fd e0 b4 3a 86 f5 92 5d 42 54 63 5e d9 0d |.....:...]BTc^..| +[1c04 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 27 17 18 11 8b 44 4d 7d 3c a5 |0E.!..'....DM}<.| +00000010 1e 6a c3 10 82 fb d2 2c 82 b4 3b 2d b5 90 93 f8 |.j.....,..;-....| +00000020 73 de 82 5b 64 02 20 69 21 63 02 3c 8a 27 0f 3a |s..[d. i!c.<.'.:| +00000030 f2 69 a8 f3 bc 66 6e 6f a2 6f af ff 79 eb 0e 25 |.i...fno.o..y..%| +00000040 f7 8e 05 a4 10 d8 f4 |.......| +[1c05 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 principal evaluation succeeds for identity 0 +[1c06 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c8a0 gate 1589998838708401500 evaluation succeeds +[1c07 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c08 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c09 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c0a 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1c0b 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c0c 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1c0d 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c0e 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c0f 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1c10 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c11 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c12 05-20 18:20:38.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c13 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c14 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c15 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c16 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c17 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c18 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c19 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c1a 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c1b 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c1c 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c1d 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c1e 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c1f 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c20 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c21 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c22 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c23 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c24 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c25 05-20 18:20:38.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c26 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c27 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c28 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c29 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c2a 05-20 18:20:38.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c2b 05-20 18:20:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[1c2c 05-20 18:20:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c2e 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c2f 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c30 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c2d 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c31 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1c33 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c32 05-20 18:20:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c34 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1c35 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1c36 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1c37 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1c38 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1c39 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1c3a 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 gate 1589998838951780800 evaluation starts +[1c3b 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 signed by 0 principal evaluation starts (used [false]) +[1c3c 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 processing identity 0 with bytes of 115a110 +[1c3d 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 principal matched by identity 0 +[1c3e 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 96 fc 2d 67 a4 0f f4 72 ce 8a e4 73 f3 62 43 |$..-g...r...s.bC| +00000010 68 3b 4e 74 38 20 a9 14 5d 48 48 3a 5e 60 ca ee |h;Nt8 ..]HH:^`..| +[1c3f 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 08 bc b7 84 09 73 fb 85 4c 06 5b |0D. E.....s..L.[| +00000010 ff b8 b5 ca 69 e1 bb 46 4a cf d1 f4 67 9a 22 c3 |....i..FJ...g.".| +00000020 f9 a8 24 ef 02 20 33 77 44 ec db 96 9d d7 e3 80 |..$.. 3wD.......| +00000030 0c f8 26 9f 43 49 b1 b4 5f 3d 26 b0 df 52 34 8e |..&.CI.._=&..R4.| +00000040 f3 1a 3b 62 3b 6c |..;b;l| +[1c40 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 principal evaluation succeeds for identity 0 +[1c41 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaf1f0 gate 1589998838951780800 evaluation succeeds +[1c42 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c43 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c44 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c45 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1c46 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c47 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1c48 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c49 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c4a 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1c4b 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c4c 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c4d 05-20 18:20:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c4e 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c4f 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c50 05-20 18:20:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c51 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c52 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c53 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c54 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c55 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c56 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c57 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c58 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c59 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5a 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c5b 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c5c 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c5d 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c5e 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c5f 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1c60 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161020 +[1c61 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6D375C42813110B38F44F4300393CB5E99B87B8B4E5F31D387A68C6DD34C84CC +[1c62 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1c63 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1c64 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1c65 05-20 18:20:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1c66 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c67 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c68 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[1c69 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c6a 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c6b 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c6c 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c6d 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c6e 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c6f 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c70 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c71 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c72 05-20 18:20:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c73 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c74 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c75 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c76 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c77 05-20 18:20:39.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c78 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c79 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c7a 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c7b 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c7c 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1c7d 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d 37 5c 42 81 31 10 b3 8f 44 f4 30 03 93 cb 5e |m7\B.1...D.0...^| +00000010 99 b8 7b 8b 4e 5f 31 d3 87 a6 8c 6d d3 4c 84 cc |..{.N_1....m.L..| +[1c7e 05-20 18:20:39.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 5b 5a 43 23 ff ef 1f 75 75 6c |0E.!..[ZC#...uul| +00000010 b7 22 f3 e2 7f bc f1 8b 7b e3 93 73 f9 83 3e f5 |."......{..s..>.| +00000020 70 2a b1 d4 79 02 20 6e 4f d6 33 3a 21 87 f5 ac |p*..y. nO.3:!...| +00000030 51 10 af 61 a4 e4 9f 3a 4f b3 70 14 cb 57 f5 4b |Q..a...:O.p..W.K| +00000040 15 71 49 ed 71 c4 78 |.qI.q.x| +[1c7f 05-20 18:20:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c80 05-20 18:20:39.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c81 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c82 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c83 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1c84 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1c87 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c85 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1c86 05-20 18:20:39.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1c89 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c88 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1c8a 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1c8b 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c8c 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c8d 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c8e 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1c8f 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1c90 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1c91 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1c92 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1c93 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1c94 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 gate 1589998839614147800 evaluation starts +[1c95 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 signed by 0 principal evaluation starts (used [false]) +[1c96 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 processing identity 0 with bytes of 115a110 +[1c97 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 principal matched by identity 0 +[1c98 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1c99 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003b2abf0 principal evaluation succeeds for identity 0 +[1c9b 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b2abf0 gate 1589998839614147800 evaluation succeeds +[1c9c 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c9d 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c9e 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c9f 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ca0 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1ca1 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1ca2 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1ca3 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1ca4 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ca5 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ca6 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1ca7 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1ca8 05-20 18:20:39.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ca9 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1caa 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cab 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cac 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cad 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cae 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1caf 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 gate 1589998839623192400 evaluation starts +[1cb0 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 signed by 0 principal evaluation starts (used [false]) +[1cb1 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 processing identity 0 with bytes of 115a110 +[1cb2 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 principal matched by identity 0 +[1cb3 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1cb4 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1cb5 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 principal evaluation succeeds for identity 0 +[1cb6 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b56bd0 gate 1589998839623192400 evaluation succeeds +[1cb7 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1cb8 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1cb9 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cba 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1cbb 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cbc 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1cbd 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1cbe 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1cbf 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1cc0 05-20 18:20:39.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1cc1 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cc2 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cc3 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1cc4 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cc5 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cc6 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cc7 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cc8 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cc9 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 gate 1589998839639461800 evaluation starts +[1cca 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 signed by 0 principal evaluation starts (used [false]) +[1ccb 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 processing identity 0 with bytes of 115a110 +[1ccc 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 principal matched by identity 0 +[1ccd 05-20 18:20:39.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1cce 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003b86d50 principal evaluation succeeds for identity 0 +[1cd0 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b86d50 gate 1589998839639461800 evaluation succeeds +[1cd1 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1cd2 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1cd3 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cd4 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1cd5 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cd6 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cd7 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1cd8 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cd9 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cda 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cdb 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cdc 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cdd 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 gate 1589998839642570500 evaluation starts +[1cde 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 signed by 0 principal evaluation starts (used [false]) +[1cdf 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 processing identity 0 with bytes of 115a110 +[1ce0 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 principal matched by identity 0 +[1ce1 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1ce2 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1ce3 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 principal evaluation succeeds for identity 0 +[1ce4 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b87f50 gate 1589998839642570500 evaluation succeeds +[1ce5 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ce6 05-20 18:20:39.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ce7 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ce8 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ce9 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cea 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1ceb 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cec 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ced 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cee 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1cef 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cf0 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cf1 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cf2 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cf3 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cf4 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 gate 1589998839656149500 evaluation starts +[1cf5 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 signed by 0 principal evaluation starts (used [false]) +[1cf6 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 processing identity 0 with bytes of 115a110 +[1cf7 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 principal matched by identity 0 +[1cf8 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1cf9 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1cfa 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 principal evaluation succeeds for identity 0 +[1cfb 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb73a0 gate 1589998839656149500 evaluation succeeds +[1cfc 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1cfd 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1cfe 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cff 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d00 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1d01 05-20 18:20:39.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1d02 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d03 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d04 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d05 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d06 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d07 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d08 05-20 18:20:39.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d09 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d0a 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 gate 1589998839670046700 evaluation starts +[1d0b 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 signed by 0 principal evaluation starts (used [false]) +[1d0c 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 processing identity 0 with bytes of 115a110 +[1d0d 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 principal matched by identity 0 +[1d0e 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1d0f 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003be6c90 principal evaluation succeeds for identity 0 +[1d11 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be6c90 gate 1589998839670046700 evaluation succeeds +[1d12 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d13 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d14 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d15 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d16 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1d17 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1d18 05-20 18:20:39.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d19 05-20 18:20:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d1a 05-20 18:20:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d1b 05-20 18:20:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1d1c 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d1d 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d1e 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1d1f 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1d20 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d21 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1d22 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1d23 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1d24 05-20 18:20:39.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d25 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d26 05-20 18:20:39.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d27 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d28 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d29 05-20 18:20:39.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d2a 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d2b 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d2c 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d2d 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d2e 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d2f 05-20 18:20:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d30 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d31 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d32 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d33 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d34 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d35 05-20 18:20:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d36 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d37 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d38 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d39 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1d3a 05-20 18:20:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d3b 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1d3c 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1d3d 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1d3e 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1d3f 05-20 18:20:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d40 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > > , Envelope: 272 bytes, Signature: 0 bytes +[1d41 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > > , Envelope: 272 bytes, Signature: 0 bytes +[1d42 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d43 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > > , Envelope: 272 bytes, Signature: 0 bytes +[1d44 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1d45 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +[1d46 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1d48 05-20 18:20:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa ee 9a c2 5f 24 c3 d5 92 db 2f |0E.!....._$..../| +00000010 50 b1 52 89 87 ff db a2 24 9b 3c 7b fc 8c e8 8e |P.R.....$.<{....| +00000020 da d8 3a 56 2a 02 20 01 7b 8e 4f 67 dc f4 60 3e |..:V*. .{.Og..`>| +00000030 9a ed ab 48 d9 80 3a 68 f3 7a 59 17 f7 1c 98 77 |...H..:h.zY....w| +00000040 c7 bc cb ef f5 f3 9c |.......| +[1d49 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1d4a 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1d4b 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1d4c 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1d4d 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1d4e 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d4f 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d51 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1d52 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d53 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d54 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[1d55 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\232\355\253H\331\200:h\363zY\027\367\034\230w\307\274\313\357\365\363\234" > > alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > +[1d56 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1d57 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d50 05-20 18:20:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d58 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[1d59 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[1d5a 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1d5b 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610091801 +[1d5c 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC27F7397872FE7ADD4AF19B38DDF3601DE545E7D59663E870440D8A5123A730 +[1d5d 05-20 18:20:40.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[1d5e 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d5f 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d60 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d61 05-20 18:20:40.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d62 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[1d63 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d64 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d65 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[1d66 05-20 18:20:40.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d67 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1d68 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1d69 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1d6a 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1d6b 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1d6c 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1d6d 05-20 18:20:40.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d6e 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d6f 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d70 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d71 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d72 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d73 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d74 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1d75 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d76 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d77 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d78 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d79 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d7a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d7b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1d7c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d7d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d7e 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d7f 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d80 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1d81 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d82 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d83 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d84 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d85 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d86 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d87 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d88 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 gate 1589998840855841300 evaluation starts +[1d89 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 signed by 0 principal evaluation starts (used [false]) +[1d8a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 processing identity 0 with bytes of 115a110 +[1d8b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 principal matched by identity 0 +[1d8c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +[1d8d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU 0xc003ccaa60 principal evaluation succeeds for identity 0 +[1d8f 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccaa60 gate 1589998840855841300 evaluation succeeds +[1d90 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d91 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d92 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d93 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d94 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1d95 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1d96 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1d97 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1d98 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1d99 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d9a 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d9b 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d9c 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1d9d 05-20 18:20:40.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d9e 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d9f 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1da0 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1da1 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > +[1da2 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1da3 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1da4 05-20 18:20:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1da5 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1da6 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1da7 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1da8 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1da9 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1daa 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1dab 05-20 18:20:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dac 05-20 18:20:40.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1dad 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dae 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1daf 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1db0 05-20 18:20:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1db1 05-20 18:20:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1db2 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1db3 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161021 +[1db4 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2B1CAD36E5E1909BF3DDEF8510B2BEE5F1CBE663E6266212D2F0E31FE49BED63 +[1db5 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1db6 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1db7 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1db8 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1db9 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dba 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1dbb 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dbc 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1dbd 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1dbe 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dbf 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1dc0 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc1 05-20 18:20:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1dc2 05-20 18:20:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc3 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1dc4 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1dc5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1dc7 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1dc8 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +[1dc9 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +00000040 11 9d 80 32 33 39 28 |...239(| +[1dca 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1dcb 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 dc 60 27 14 79 f0 f5 b0 aa 6f |0E.!...`'.y....o| +00000010 66 03 dc 40 7d 21 c0 46 ca 76 c2 8c 9d eb da a5 |f..@}!.F.v......| +00000020 da 23 6a 69 eb 02 20 41 5e b0 6e 5a d3 74 c2 b7 |.#ji.. A^.nZ.t..| +00000030 08 cc ff af 59 bf c2 55 77 46 24 2c ff 76 8d de |....Y..UwF$,.v..| +00000040 29 f9 0a ba f2 bc 82 |)......| +[1dcc 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1dcd 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1dce 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dcf 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dd0 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1dd1 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1dd2 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dd3 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1dd4 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1dd5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +[1dd6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1dd8 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dd9 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1dda 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +[1ddb 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +00000040 11 9d 80 32 33 39 28 |...239(| +[1ddc 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ddd 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1dde 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ddf 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1de0 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1de1 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1de2 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1de3 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1de4 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1de5 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de6 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1de7 05-20 18:20:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1de8 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1de9 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1dea 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1deb 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1dec 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 gate 1589998841104467000 evaluation starts +[1ded 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 signed by 0 principal evaluation starts (used [false]) +[1dee 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 processing identity 0 with bytes of 115a110 +[1def 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 principal matched by identity 0 +[1df0 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 05 91 5e cf e8 d6 f1 9f f0 ba dd 0a 6a 6c 89 |...^.........jl.| +00000010 c8 25 ef c4 b7 78 cf 7a 36 17 f5 9a 7e b0 7c 98 |.%...x.z6...~.|.| +[1df1 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 97 4b 61 cc 8a 04 4a 81 d9 98 |0E.!...Ka...J...| +00000010 12 f1 77 cd 9e 36 76 d8 cc 81 b8 b1 83 e5 d5 59 |..w..6v........Y| +00000020 8d 04 b2 4b 1a 02 20 03 15 3a d8 be 44 2f 37 cb |...K.. ..:..D/7.| +00000030 c4 f2 bc 3c 4c 7d 8a c0 e8 57 7f e5 85 40 60 88 |... DEBU 0xc003c77e00 principal evaluation succeeds for identity 0 +[1df3 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77e00 gate 1589998841104467000 evaluation succeeds +[1df4 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1df5 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1df6 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1df7 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1df8 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1df9 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dfa 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1dfb 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 1c ad 36 e5 e1 90 9b f3 dd ef 85 10 b2 be e5 |+..6............| +00000010 f1 cb e6 63 e6 26 62 12 d2 f0 e3 1f e4 9b ed 63 |...c.&b........c| +[1dfc 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 89 9c 27 b5 04 f9 11 ec c2 21 |0E.!....'......!| +00000010 12 85 e9 85 94 38 d4 c5 71 3b 63 e3 43 e2 c2 91 |.....8..q;c.C...| +00000020 f7 d7 6b 67 cc 02 20 59 bf fc a4 94 15 64 9c a4 |..kg.. Y.....d..| +00000030 d7 10 39 ff bd 30 c1 bd 62 5f b8 48 70 38 55 2a |..9..0..b_.Hp8U*| +00000040 11 9d 80 32 33 39 28 |...239(| +[1dfd 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1dfe 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1dff 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e00 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1e01 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 4e 31 2d 28 5c c9 a7 50 e6 63 02 b3 96 54 d4 |kN1-(\..P.c...T.| +00000010 c7 37 1e 8d 0f 05 7d 97 e8 0f 93 df 32 19 aa a4 |.7....}.....2...| +[1e02 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 a0 21 ce 87 5e ea 60 68 33 7a |0E.!...!..^.`h3z| +00000010 e3 46 1b 57 14 2b b9 89 17 30 09 6a 75 48 eb 7c |.F.W.+...0.juH.|| +00000020 d4 2b 23 a1 e7 02 20 76 d1 85 0b 0e 3a bf b1 9a |.+#... v....:...| +00000030 c8 9d c7 67 e8 3d 88 94 27 ae 8e e1 f9 ab 4c d6 |...g.=..'.....L.| +00000040 ec 3a 13 f8 3c 58 90 |.:.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e04 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e05 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e06 05-20 18:20:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1e07 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1e08 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1e09 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0a 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0b 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0c 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0d 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0e 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0f 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1e10 05-20 18:20:41.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e11 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1e12 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1e13 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e14 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1e15 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1e16 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e17 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e18 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e19 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e1a 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e1b 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e1c 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e1d 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 gate 1589998841181692500 evaluation starts +[1e1e 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 signed by 0 principal evaluation starts (used [false]) +[1e1f 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 processing identity 0 with bytes of 115a110 +[1e20 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 principal matched by identity 0 +[1e21 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c e5 cb 16 bd 61 d4 9b e5 2a 86 90 6a 45 97 1e |.....a...*..jE..| +00000010 05 a2 7b af 51 95 55 4f bc d1 f1 36 ac f2 d2 d8 |..{.Q.UO...6....| +[1e22 05-20 18:20:41.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d7 a5 c5 56 75 be 07 90 2c 38 |0E.!.....Vu...,8| +00000010 a1 91 ac 5e 14 93 6a b3 65 05 56 1d 81 c9 19 e3 |...^..j.e.V.....| +00000020 8a 92 6b 71 8a 02 20 6e 59 61 20 d6 93 0a 55 7c |..kq.. nYa ...U|| +00000030 38 62 e8 a8 81 23 9a 30 1e 10 31 70 24 ca 52 91 |8b...#.0..1p$.R.| +00000040 e0 ac 9f 07 6e 10 21 |....n.!| +[1e23 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 principal evaluation succeeds for identity 0 +[1e24 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0150 gate 1589998841181692500 evaluation succeeds +[1e25 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e26 05-20 18:20:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e27 05-20 18:20:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e28 05-20 18:20:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e29 05-20 18:20:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e2a 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1e2b 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e2c 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e2d 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1e2e 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e2f 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e30 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e31 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1e32 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e33 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e34 05-20 18:20:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e35 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[1e36 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1e37 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e38 05-20 18:20:41.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\365p*\261\324y\002 nO\3263:!\207\365\254Q\020\257a\244\344\237:O\263p\024\313W\365K\025qI\355q\304x" > +[1e39 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e3a 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e3b 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e3c 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e3d 05-20 18:20:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1e3e 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 6f 7f 35 85 7a 0f bd 66 24 3d 1f 5e e1 bb 98 |.o.5.z..f$=.^...| +00000010 bc 51 8f 42 ab f4 c7 8c f0 f9 54 ec 7c 00 e3 0e |.Q.B......T.|...| +[1e3f 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 2b 05 f5 27 8c 2b 74 2a 45 8b 68 |0D. 2+..'.+t*E.h| +00000010 b3 e5 3c 2e 12 ee 1d d1 70 18 5d e4 bd 87 7f 3c |..<.....p.]....<| +00000020 22 6f 54 93 02 20 6d 9b 96 2c dd 2c 93 e1 43 a9 |"oT.. m..,.,..C.| +00000030 02 8d 2d 00 95 1f 87 67 52 fc f8 94 1b 4a 97 8a |..-....gR....J..| +00000040 e6 61 09 95 52 e0 |.a..R.| +[1e40 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e41 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1e42 05-20 18:20:43.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e43 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e44 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1e45 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e46 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e47 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e48 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e49 05-20 18:20:43.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e4a 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e4b 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1e4c 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e4e 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e4f 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e4d 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1e50 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e51 05-20 18:20:43.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e52 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e53 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e54 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e55 05-20 18:20:43.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e56 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e57 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e58 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e59 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e5a 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e5b 05-20 18:20:43.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e5c 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e5d 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e5e 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1e5f 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e60 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e61 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e63 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e62 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e64 05-20 18:20:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e65 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1e66 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1e67 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e68 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e69 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e6a 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e6b 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e6d 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e6e 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e6f 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1e70 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e71 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e72 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 gate 1589998843619209500 evaluation starts +[1e6c 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1e73 05-20 18:20:43.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 signed by 0 principal evaluation starts (used [false]) +[1e74 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 processing identity 0 with bytes of 115a110 +[1e75 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 principal matched by identity 0 +[1e76 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1e77 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003f4b230 principal evaluation succeeds for identity 0 +[1e79 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b230 gate 1589998843619209500 evaluation succeeds +[1e7a 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e7b 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e7c 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e7d 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e7e 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1e7f 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1e80 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1e81 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1e82 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e83 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e84 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e85 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e86 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e87 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e88 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e89 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e8a 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 gate 1589998843628189600 evaluation starts +[1e8b 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 signed by 0 principal evaluation starts (used [false]) +[1e8c 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 processing identity 0 with bytes of 115a110 +[1e8d 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 principal matched by identity 0 +[1e8e 05-20 18:20:43.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1e8f 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1e90 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 principal evaluation succeeds for identity 0 +[1e91 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf220 gate 1589998843628189600 evaluation succeeds +[1e92 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e93 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e94 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e95 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e96 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e97 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1e98 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1e99 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1e9a 05-20 18:20:43.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1e9b 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1e9c 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9d 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9e 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e9f 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ea0 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ea1 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ea2 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ea3 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ea4 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 gate 1589998843647657800 evaluation starts +[1ea5 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 signed by 0 principal evaluation starts (used [false]) +[1ea6 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 processing identity 0 with bytes of 115a110 +[1ea7 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 principal matched by identity 0 +[1ea8 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1ea9 05-20 18:20:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0040c73a0 principal evaluation succeeds for identity 0 +[1eab 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c73a0 gate 1589998843647657800 evaluation succeeds +[1eac 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ead 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1eae 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1eaf 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1eb0 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1eb1 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1eb2 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1eb3 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1eb4 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1eb5 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1eb6 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1eb7 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1eb8 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 gate 1589998843655596600 evaluation starts +[1eb9 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 signed by 0 principal evaluation starts (used [false]) +[1eba 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 processing identity 0 with bytes of 115a110 +[1ebb 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 principal matched by identity 0 +[1ebc 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1ebd 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1ebe 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 principal evaluation succeeds for identity 0 +[1ebf 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e85a0 gate 1589998843655596600 evaluation succeeds +[1ec0 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ec1 05-20 18:20:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ec2 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ec3 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ec4 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ec5 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[1ec6 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec7 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec8 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec9 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1eca 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ecb 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ecc 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ecd 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ece 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ecf 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 gate 1589998843668321200 evaluation starts +[1ed0 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 signed by 0 principal evaluation starts (used [false]) +[1ed1 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 processing identity 0 with bytes of 115a110 +[1ed2 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 principal matched by identity 0 +[1ed3 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[1ed4 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[1ed5 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 principal evaluation succeeds for identity 0 +[1ed6 05-20 18:20:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e99f0 gate 1589998843668321200 evaluation succeeds +[1ed7 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ed8 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ed9 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1eda 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1edb 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[1edc 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[1edd 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ede 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1edf 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ee0 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ee1 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ee2 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ee3 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ee4 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ee5 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 gate 1589998843674012000 evaluation starts +[1ee6 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 signed by 0 principal evaluation starts (used [false]) +[1ee7 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 processing identity 0 with bytes of 115a110 +[1ee8 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 principal matched by identity 0 +[1ee9 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[1eea 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0041052e0 principal evaluation succeeds for identity 0 +[1eec 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041052e0 gate 1589998843674012000 evaluation succeeds +[1eed 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1eee 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1eef 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ef0 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ef1 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[1ef2 05-20 18:20:43.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[1ef3 05-20 18:20:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef4 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ef5 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ef6 05-20 18:20:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef7 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ef8 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1ef9 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1efa 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1efb 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1efc 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1efd 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1efe 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1eff 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f00 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 gate 1589998843706288600 evaluation starts +[1f01 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 signed by 0 principal evaluation starts (used [false]) +[1f02 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 processing identity 0 with bytes of 115a110 +[1f03 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 principal matched by identity 0 +[1f04 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b fa d0 07 0e 9d e6 c4 9a 2b 8f 44 cb 40 4e 3e |.........+.D.@N>| +00000010 89 3f ec ce 57 79 55 45 bc 39 73 a3 8c ba ec eb |.?..WyUE.9s.....| +[1f05 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 98 59 7a fe 80 99 02 b5 64 69 |0E.!...Yz.....di| +00000010 e5 30 cc 6c 6a 13 a3 6e b6 c3 64 bf 0b 6f 3c e5 |.0.lj..n..d..o<.| +00000020 43 20 ed b0 16 02 20 46 4e 6e d7 3e c2 a8 1a aa |C .... FNn.>....| +00000030 8f 0c b5 b3 1f ef 86 34 16 54 51 c7 b3 a2 0e 28 |.......4.TQ....(| +00000040 5a a1 de a2 fa 8b 03 |Z......| +[1f06 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 principal evaluation succeeds for identity 0 +[1f07 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132480 gate 1589998843706288600 evaluation succeeds +[1f08 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f09 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f0a 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f0b 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f0c 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f0d 05-20 18:20:43.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1f0e 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1f0f 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1f10 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f11 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1f12 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f13 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f14 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f15 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f16 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f17 05-20 18:20:43.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f18 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f19 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f1a 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f1b 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f1c 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f1d 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f1e 05-20 18:20:43.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f1f 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f20 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1f21 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f22 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f23 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f24 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1f25 05-20 18:20:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f26 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f27 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f28 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f29 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f2a 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f2b 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f2c 05-20 18:20:43.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f2d 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f2e 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1f2f 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f30 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f31 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1f32 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1f33 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f34 05-20 18:20:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1f35 05-20 18:20:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1f36 05-20 18:20:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1f37 05-20 18:20:43.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f38 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f39 05-20 18:20:43.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f3a 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f3b 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f3c 05-20 18:20:43.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f3d 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f3e 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f3f 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f40 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f41 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1f42 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f43 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f44 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f45 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f46 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f47 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f48 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f49 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 gate 1589998843932511000 evaluation starts +[1f4a 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 signed by 0 principal evaluation starts (used [false]) +[1f4b 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 processing identity 0 with bytes of 115a110 +[1f4c 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 principal matched by identity 0 +[1f4d 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 86 b0 5c c2 e3 83 1e 58 ad 3c a4 47 df 79 56 0a |..\....X.<.G.yV.| +00000010 6a cb e2 89 a5 79 3d 0c 4d 6e 08 a0 3a 8b 8f 01 |j....y=.Mn..:...| +[1f4e 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e d9 ae d2 ca ac 52 8f 5c fa e0 66 |0D. ~.....R.\..f| +00000010 64 8f 5a 79 19 cb bb 16 e0 72 db cc 26 01 9b 2a |d.Zy.....r..&..*| +00000020 8d 11 d5 a3 02 20 5d be 9b 01 2a ce a8 9e 05 5e |..... ]...*....^| +00000030 23 6f b0 b2 99 59 67 ba df c9 f5 3e 4d 19 4e db |#o...Yg....>M.N.| +00000040 a2 ca 5e 89 4f 84 |..^.O.| +[1f4f 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 principal evaluation succeeds for identity 0 +[1f50 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411fd00 gate 1589998843932511000 evaluation succeeds +[1f51 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f52 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f53 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f54 05-20 18:20:43.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f55 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f56 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1f57 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1f58 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1f59 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1f5a 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f5b 05-20 18:20:43.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f5c 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f5d 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f5e 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f5f 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f60 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f61 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f62 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f63 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1f64 05-20 18:20:43.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f65 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f66 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f67 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f68 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1f69 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f6a 05-20 18:20:43.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f6b 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f6c 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f6d 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f6e 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f6f 05-20 18:20:43.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f70 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1f71 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161022 +[1f72 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 070E9440B711BFFC4BB9ED8341DDC0AD4868A0EEB2C552CBF27DB6F7BC1C5C12 +[1f73 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1f74 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1f75 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1f76 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1f77 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f78 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f79 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f7a 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1f7b 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1f7c 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f7d 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1f7e 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f7f 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f82 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f80 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f83 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f81 05-20 18:20:44.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f84 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f85 05-20 18:20:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f86 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f87 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f88 05-20 18:20:44.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f89 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f8a 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f8b 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f8c 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f8d 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f8e 05-20 18:20:44.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f8f 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f90 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f91 05-20 18:20:44.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f92 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f93 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f94 05-20 18:20:44.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f95 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1f96 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1f97 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1f98 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1f99 05-20 18:20:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f9a 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1f9b 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1f9c 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1f9d 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1f9e 05-20 18:20:44.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f9f 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1fa0 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1fa1 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fa2 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1fa3 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1fa4 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +[1fa5 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +00000040 39 4a 2b 6c 50 54 |9J+lPT| +[1fa6 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1fa7 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 52 89 35 2a 71 4b 02 a9 8c a5 a6 |0D. /R.5*qK.....| +00000010 7d a5 e1 69 46 e8 15 8b 63 2a 3f 9f be d0 17 32 |}..iF...c*?....2| +00000020 8a 04 d8 7c 02 20 76 ac d8 a8 9d e7 cd 44 9f 47 |...|. v......D.G| +00000030 1e 8b 11 f0 97 a4 bc a5 84 03 32 bf ee 58 e5 f7 |..........2..X..| +00000040 35 58 8c 6e a3 f1 |5X.n..| +[1fa8 05-20 18:20:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1fa9 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1faa 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1fab 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1fac 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1fad 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fae 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1faf 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fb0 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1fb1 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fb2 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fb3 05-20 18:20:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[1fb4 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1fb5 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fb6 05-20 18:20:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1fb8 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fb7 05-20 18:20:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1fb9 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fbb 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fbc 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fbd 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fba 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1fbe 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fc0 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fc1 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fc2 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fc3 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fbf 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1fc4 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1fc5 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fc6 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1fc7 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fc8 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1fc9 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1fca 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fcb 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fcc 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1fcd 05-20 18:20:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fce 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1fcf 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1fd0 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1fd1 05-20 18:20:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fd2 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1fd3 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1fd4 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1fd5 05-20 18:20:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fd6 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1fd7 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1fd8 05-20 18:20:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fd9 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1fda 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1fdb 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fdc 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1fdd 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1fde 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1fdf 05-20 18:20:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fe0 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1fe1 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1fe2 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1fe3 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1fe4 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1fe5 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1fe6 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 gate 1589998844908975500 evaluation starts +[1fe7 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 signed by 0 principal evaluation starts (used [false]) +[1fe8 05-20 18:20:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 processing identity 0 with bytes of 115a110 +[1fe9 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 principal matched by identity 0 +[1fea 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +[1feb 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +00000040 8b cf ff 7c a3 dd |...|..| +[1fec 05-20 18:20:44.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 principal evaluation succeeds for identity 0 +[1fed 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b7c40 gate 1589998844908975500 evaluation succeeds +[1fee 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1fef 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ff0 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ff1 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ff2 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ff3 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1ff4 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1ff5 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1ff6 05-20 18:20:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1ff7 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ff8 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ff9 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ffa 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1ffb 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ffc 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ffd 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ffe 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1fff 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:M\031N\333\242\312^\211O\204" > alive: +[2000 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2001 05-20 18:20:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2002 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2003 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161023 +[2004 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0ED3069D6411A75ADC559E49089D2D23A4539C8BEA26AC05D2EAF8FED5779FA1 +[2005 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2006 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2007 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2008 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[2009 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[200a 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[200b 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[200c 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[200d 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[200f 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[200e 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[2010 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2011 05-20 18:20:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2012 05-20 18:20:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2013 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2014 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2015 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2016 05-20 18:20:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2017 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2018 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +[2019 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[201b 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 ec 46 a0 7a 2b cd d9 0a c0 a2 b1 |0D. ..F.z+......| +00000010 82 cb c1 e8 f9 5b 19 90 23 f2 f0 d4 aa 91 fc c7 |.....[..#.......| +00000020 9e a1 d7 7d 02 20 43 0b 08 7c dd d7 6b da 3c db |...}. C..|..k.<.| +00000030 c3 74 b3 7c 2a 7c 07 ea a7 2f 05 13 55 43 98 46 |.t.|*|.../..UC.F| +00000040 c9 a1 31 27 93 7a |..1'.z| +[201c 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[201d 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[201e 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[201f 05-20 18:20:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2020 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2021 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2022 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2023 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2024 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2025 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +[2026 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +00000040 39 4a 2b 6c 50 54 |9J+lPT| +[2027 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2028 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2029 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[202a 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +[202b 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[202d 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[202e 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[202f 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2030 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2031 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2032 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2033 05-20 18:20:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2034 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2035 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2036 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2037 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2038 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2039 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[203a 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[203b 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[203c 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 gate 1589998845061600200 evaluation starts +[203d 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 signed by 0 principal evaluation starts (used [false]) +[203e 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 processing identity 0 with bytes of 115a110 +[203f 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 principal matched by identity 0 +[2040 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7b 76 aa bf af c9 80 24 69 f0 15 d8 95 b9 f8 99 |{v.....$i.......| +00000010 bd a5 ed 90 23 56 39 b2 40 09 33 31 a3 73 4a e5 |....#V9.@.31.sJ.| +[2041 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 29 d9 60 f1 0c 22 73 b9 37 61 e1 |0D. %).`.."s.7a.| +00000010 11 d8 f7 d3 1a a5 9f ab 7d 04 86 18 33 28 a9 b0 |........}...3(..| +00000020 60 45 96 73 02 20 65 36 9c 99 99 50 fe 7b 1f 8e |`E.s. e6...P.{..| +00000030 45 61 78 66 1c 5b 83 7c e5 83 ce 67 87 21 ec a1 |Eaxf.[.|...g.!..| +00000040 8b cf ff 7c a3 dd |...|..| +[2042 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2044 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2045 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2046 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2043 05-20 18:20:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 principal evaluation succeeds for identity 0 +[2047 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2048 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004256670 gate 1589998845061600200 evaluation succeeds +[204a 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2049 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[204b 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[204d 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[204c 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[204e 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[204f 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2050 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2051 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2052 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2053 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2054 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2055 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2056 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e d3 06 9d 64 11 a7 5a dc 55 9e 49 08 9d 2d 23 |....d..Z.U.I..-#| +00000010 a4 53 9c 8b ea 26 ac 05 d2 ea f8 fe d5 77 9f a1 |.S...&.......w..| +[2057 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 07 ac e1 81 da 8a a4 b8 51 05 |0E.!..........Q.| +00000010 2e d5 ba 28 2f 3b 64 33 17 aa e4 e7 50 d3 a8 dd |...(/;d3....P...| +00000020 3c 5a 86 97 2e 02 20 26 c7 56 12 d6 d7 54 86 ad | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2059 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[205a 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[205b 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[205c 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 78 0f 34 76 80 e2 0e a5 6c 0c 38 e0 64 02 58 |.x.4v....l.8.d.X| +00000010 60 3a bb 29 b6 2f 56 dc 61 6c e4 1a 80 33 5f 8e |`:.)./V.al...3_.| +[205d 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 0f 05 57 be eb 2e 8e 79 f1 7e db |0D. ...W....y.~.| +00000010 c0 81 2e f3 2b c6 09 81 29 49 02 38 29 ac 44 1f |....+...)I.8).D.| +00000020 9f 48 a3 ba 02 20 35 19 97 c7 de f9 fe b1 7a af |.H... 5.......z.| +00000030 62 fc 6a 5f 75 59 6e ac da a0 25 97 01 6d 89 0d |b.j_uYn...%..m..| +00000040 39 4a 2b 6c 50 54 |9J+lPT| +[205e 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[205f 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2060 05-20 18:20:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2061 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2062 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2063 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2064 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2065 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2066 05-20 18:20:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2067 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2068 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2069 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[206a 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[206b 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[206c 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[206d 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 gate 1589998845188569400 evaluation starts +[206e 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 signed by 0 principal evaluation starts (used [false]) +[206f 05-20 18:20:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 processing identity 0 with bytes of 115a110 +[2070 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 principal matched by identity 0 +[2071 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 92 a4 6a 04 fc ba 49 0d df c1 0b de 1f 0d 44 |...j...I.......D| +00000010 d7 89 7e e9 e5 7f 35 79 08 bf a0 23 69 94 93 4e |..~...5y...#i..N| +[2072 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 97 84 c6 58 9a 9d 00 38 ff 64 |0E.!.....X...8.d| +00000010 82 c8 33 44 2c ed a4 2b 84 e2 40 b6 04 97 e0 d8 |..3D,..+..@.....| +00000020 fe 4a 7b 50 f1 02 20 4b 80 45 90 2f 7d f8 eb 69 |.J{P.. K.E./}..i| +00000030 63 64 af 08 65 dd 09 6b 6f 8d 65 b2 bc 23 28 2c |cd..e..ko.e..#(,| +00000040 bb a2 00 d5 f6 25 77 |.....%w| +[2073 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 principal evaluation succeeds for identity 0 +[2074 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275560 gate 1589998845188569400 evaluation succeeds +[2075 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2076 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2077 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2078 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2079 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[207a 05-20 18:20:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[207b 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[207c 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[207d 05-20 18:20:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[207e 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[207f 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2080 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[2081 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2082 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2083 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2084 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2085 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[2086 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2087 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2088 05-20 18:20:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2089 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[208a 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[208b 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[208c 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100A1801 +[208d 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7A41CDCC6DBE0F3D17188A5D3379FDC0C4F0B3BF5039D71E422905CE2D9F36E8 +[208e 05-20 18:20:45.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[208f 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2090 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2091 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2092 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2093 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[2094 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2095 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2096 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[2097 05-20 18:20:45.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2098 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2099 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[209a 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[209b 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[209e 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[209c 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[209f 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[209d 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[20a0 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20a1 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[20a2 05-20 18:20:47.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[20a3 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[20a4 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[20a5 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[20a6 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[20a7 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[20a8 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[20a9 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20aa 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20ab 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[20ac 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[20ad 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[20ae 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[20af 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[20b0 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[20b1 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 gate 1589998847615145500 evaluation starts +[20b2 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 signed by 0 principal evaluation starts (used [false]) +[20b3 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 processing identity 0 with bytes of 115a110 +[20b4 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 principal matched by identity 0 +[20b5 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[20b6 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0042937d0 principal evaluation succeeds for identity 0 +[20b8 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042937d0 gate 1589998847615145500 evaluation succeeds +[20b9 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20ba 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20bb 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20bc 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[20bd 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20be 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20bf 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[20c0 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[20c1 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[20c2 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[20c3 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[20c4 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[20c5 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 gate 1589998847619263000 evaluation starts +[20c6 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 signed by 0 principal evaluation starts (used [false]) +[20c7 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 processing identity 0 with bytes of 115a110 +[20c8 05-20 18:20:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 principal matched by identity 0 +[20c9 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[20ca 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[20cb 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 principal evaluation succeeds for identity 0 +[20cc 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d29d0 gate 1589998847619263000 evaluation succeeds +[20cd 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20ce 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20cf 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20d0 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[20d1 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20d2 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[20d3 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20d4 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20d5 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20d6 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[20d7 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[20d8 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[20d9 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[20da 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[20db 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[20dc 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 gate 1589998847624665500 evaluation starts +[20dd 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 signed by 0 principal evaluation starts (used [false]) +[20de 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 processing identity 0 with bytes of 115a110 +[20df 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 principal matched by identity 0 +[20e0 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[20e1 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[20e2 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 principal evaluation succeeds for identity 0 +[20e3 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d3e20 gate 1589998847624665500 evaluation succeeds +[20e4 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20e5 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20e6 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20e7 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[20e8 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[20e9 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[20ea 05-20 18:20:47.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20eb 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20ec 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[20ed 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[20ee 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[20ef 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[20f0 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[20f1 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[20f2 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 gate 1589998847630675800 evaluation starts +[20f3 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 signed by 0 principal evaluation starts (used [false]) +[20f4 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 processing identity 0 with bytes of 115a110 +[20f5 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 principal matched by identity 0 +[20f6 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[20f7 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0042f5710 principal evaluation succeeds for identity 0 +[20f9 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5710 gate 1589998847630675800 evaluation succeeds +[20fa 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20fb 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20fc 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20fd 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[20fe 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[20ff 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2100 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2101 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2102 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2103 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2104 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2105 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2106 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2107 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2108 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2109 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[210a 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[210b 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 gate 1589998847636192100 evaluation starts +[210c 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 signed by 0 principal evaluation starts (used [false]) +[210d 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 processing identity 0 with bytes of 115a110 +[210e 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 principal matched by identity 0 +[210f 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2110 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004313250 principal evaluation succeeds for identity 0 +[2112 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313250 gate 1589998847636192100 evaluation succeeds +[2113 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2114 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2115 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2116 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2117 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2118 05-20 18:20:47.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2119 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[211a 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[211b 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211c 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211d 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[211e 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[211f 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2120 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2121 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2122 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2123 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 gate 1589998847646631600 evaluation starts +[2124 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 signed by 0 principal evaluation starts (used [false]) +[2125 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 processing identity 0 with bytes of 115a110 +[2126 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 principal matched by identity 0 +[2127 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2128 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2129 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 principal evaluation succeeds for identity 0 +[212a 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329230 gate 1589998847646631600 evaluation succeeds +[212b 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[212c 05-20 18:20:47.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[212d 05-20 18:20:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[212e 05-20 18:20:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[212f 05-20 18:20:47.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2130 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2131 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2132 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2133 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2134 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2135 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2136 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2137 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2138 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2139 05-20 18:20:47.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[213a 05-20 18:20:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[213b 05-20 18:20:47.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[213c 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[213d 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[213e 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[213f 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2140 05-20 18:20:47.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2141 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2142 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2143 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2144 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2145 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2146 05-20 18:20:48.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2147 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2148 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2149 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[214a 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[214b 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[214c 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 bc 7d fa e6 d7 bc 86 20 f3 4a 80 d3 37 ed 33 |..}..... .J..7.3| +00000010 10 30 2f b8 1e b7 24 c5 62 79 d1 9e b8 b8 50 ac |.0/...$.by....P.| +[214d 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 56 eb 8c f1 e0 38 a8 e4 33 8f |0E.!..V....8..3.| +00000010 24 ab 01 5a ba 89 fb 31 da d7 71 f9 14 af 83 40 |$..Z...1..q....@| +00000020 7f d3 b8 c0 26 02 20 25 a0 64 d9 c9 29 20 9a 76 |....&. %.d..) .v| +00000030 06 b6 7b 30 31 47 1e ff 51 b1 3c 2d 90 61 ec f5 |..{01G..Q.<-.a..| +00000040 ad 76 0b 27 f5 52 ce |.v.'.R.| +[214e 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[214f 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2150 05-20 18:20:48.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2151 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2152 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2153 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2154 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2155 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2156 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2157 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2158 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2159 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[215a 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[215b 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[215c 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[215d 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[215e 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[215f 05-20 18:20:48.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2160 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2161 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2162 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2163 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2164 05-20 18:20:48.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2165 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2166 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2167 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2168 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2169 05-20 18:20:48.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[216a 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[216b 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[216c 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[216d 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[216e 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[216f 05-20 18:20:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2170 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2171 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2172 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2173 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2174 05-20 18:20:48.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2175 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2176 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2177 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2178 05-20 18:20:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2179 05-20 18:20:48.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[217a 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[217b 05-20 18:20:48.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[217c 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[217d 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[217e 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[217f 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +[2180 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +00000040 25 6b a6 b5 b0 54 |%k...T| +[2181 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2182 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 83 e2 9b 56 0f d6 46 69 be 86 75 |0D. +...V..Fi..u| +00000010 8a 59 bc c6 c8 9e 08 86 48 4b 9d 4b a1 8a 3a 6d |.Y......HK.K..:m| +00000020 2e de c4 29 02 20 6d 05 aa 5f ea 13 30 2c a8 f8 |...). m.._..0,..| +00000030 fd 30 36 c8 4c ca ec 9f 2f 13 41 a3 39 9a e0 67 |.06.L.../.A.9..g| +00000040 cc 0d ea b5 5f 5d |...._]| +[2183 05-20 18:20:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2184 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[2185 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2186 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2187 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2188 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2189 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[218a 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[218b 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[218c 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[218d 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[218e 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[218f 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[2190 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2191 05-20 18:20:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2192 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2193 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2194 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2195 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2196 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2197 05-20 18:20:48.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2198 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2199 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[219a 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[219b 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[219c 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[219d 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[219e 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 gate 1589998848713660700 evaluation starts +[219f 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 signed by 0 principal evaluation starts (used [false]) +[21a0 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 processing identity 0 with bytes of 115a110 +[21a1 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 principal matched by identity 0 +[21a2 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 0e dd a6 56 1e 33 8c 33 07 b2 7a 2f 48 df 21 |....V.3.3..z/H.!| +00000010 43 b0 83 26 19 b6 bd 8b a0 f4 64 a9 a2 55 3f 1d |C..&......d..U?.| +[21a3 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c5 bb 02 1c 00 96 e2 f1 3a b7 21 |0D. =........:.!| +00000010 c8 f0 e1 da 60 d2 fa a9 08 03 da d6 9b 56 be 3a |....`........V.:| +00000020 44 69 b8 9f 02 20 57 d6 1b 15 c4 f9 7a 32 05 1d |Di... W.....z2..| +00000030 d4 2b e2 a9 17 9f 00 6b bd 25 70 40 e2 b3 1c e8 |.+.....k.%p@....| +00000040 47 ee 39 68 42 d1 |G.9hB.| +[21a4 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 principal evaluation succeeds for identity 0 +[21a5 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004353dc0 gate 1589998848713660700 evaluation succeeds +[21a6 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[21a7 05-20 18:20:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[21a8 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[21a9 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[21aa 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21ab 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[21ac 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[21ad 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[21ae 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[21af 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21b0 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21b2 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21b3 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21b1 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21b4 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21b5 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21b6 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21b7 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21b8 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21b9 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21ba 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21bb 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21bc 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21bd 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21be 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[21bf 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21c0 05-20 18:20:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[21c1 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21c2 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21c3 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21c4 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21c5 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21c6 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21c7 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21c8 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21c9 05-20 18:20:48.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21ca 05-20 18:20:48.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21cb 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21cc 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21cd 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21ce 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21cf 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21d0 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21d1 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21d2 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21d3 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[21d4 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21d5 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[21d6 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[21d7 05-20 18:20:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[21d8 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[21d9 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[21da 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[21db 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21dc 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21dd 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21df 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21de 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[21e0 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21e1 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[21e4 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[21e2 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21e3 05-20 18:20:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21e5 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[21e6 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21e7 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21e8 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21e9 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21ea 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21eb 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21ec 05-20 18:20:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21ed 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[21ee 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[21ef 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21f0 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[21f1 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[21f2 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21f3 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[21f4 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[21f5 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[21f6 05-20 18:20:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[21f7 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[21f8 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[21f9 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 gate 1589998848891110000 evaluation starts +[21fa 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 signed by 0 principal evaluation starts (used [false]) +[21fb 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 processing identity 0 with bytes of 115a110 +[21fc 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 principal matched by identity 0 +[21fd 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +[21fe 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +00000040 89 09 92 92 88 98 |......| +[21ff 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 principal evaluation succeeds for identity 0 +[2200 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8c70 gate 1589998848891110000 evaluation succeeds +[2201 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2202 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2203 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2204 05-20 18:20:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2205 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2206 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2207 05-20 18:20:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2208 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2209 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[220a 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[220b 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[220c 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[220d 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[220e 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[220f 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2210 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2211 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[2212 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2213 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2214 05-20 18:20:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2215 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2216 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2217 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2218 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2219 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[221a 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[221b 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[221c 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[221d 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[221e 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[221f 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2220 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2221 05-20 18:20:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 gate 1589998848938202100 evaluation starts +[2222 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 signed by 0 principal evaluation starts (used [false]) +[2223 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 processing identity 0 with bytes of 115a110 +[2224 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 principal matched by identity 0 +[2225 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 84 b7 05 0e 5f 05 e1 de 17 51 80 b6 87 3c af | ...._....Q...<.| +00000010 f2 59 4e 93 ea d1 42 e2 f4 ab fb 8f 3c 75 1f 47 |.YN...B..... DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 54 18 8a 70 ef a2 dd 21 73 |0E.!...T..p...!s| +00000010 5a 3d 3b aa 4b 47 ac 6e e8 3f c7 84 3a 72 e9 10 |Z=;.KG.n.?..:r..| +00000020 74 71 94 62 0f 02 20 06 bf 32 71 81 42 80 25 a4 |tq.b.. ..2q.B.%.| +00000030 cd b7 1a a9 8a 88 10 71 d0 99 52 97 cd d0 7c 9b |.......q..R...|.| +00000040 b3 75 80 f1 f2 e9 9b |.u.....| +[2227 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 principal evaluation succeeds for identity 0 +[2228 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043db4f0 gate 1589998848938202100 evaluation succeeds +[2229 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[222a 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[222b 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[222c 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[222d 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[222e 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[222f 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2230 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2231 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2232 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2233 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2234 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2235 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2236 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2237 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2238 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2239 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223a 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223b 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223c 05-20 18:20:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[223d 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223e 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[223f 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2240 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2241 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2244 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2242 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2243 05-20 18:20:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2245 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2246 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2247 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2248 05-20 18:20:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2249 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[224a 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[224b 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[224c 05-20 18:20:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[224d 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[224e 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161024 +[224f 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 10E7B0C98097DDF22009C0E0F963DC2FF69D79A6FC08C5BA2A163DD2A9E99083 +[2250 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2251 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2252 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2253 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2254 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2255 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2256 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2257 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2258 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2259 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[225a 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[225b 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[225c 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[225d 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[225e 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[225f 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2260 05-20 18:20:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2261 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2262 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161025 +[2263 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 990324FFBEC5521A42F8C777AF2264939F1481A442D61F2C0597A0541E841E53 +[2264 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2265 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2266 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2267 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[2268 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2269 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[226a 05-20 18:20:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[226b 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[226c 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[226d 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[226e 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[226f 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2270 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2271 05-20 18:20:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2272 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[2273 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[2274 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2275 05-20 18:20:49.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[2276 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2277 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +[2278 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +00000040 4c 13 5c 32 79 9e bf |L.\2y..| +[2279 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[227a 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 9c 79 ea 71 19 fa 17 f3 ab 16 |0E.!...y.q......| +00000010 28 cd a5 6a ed 8f 9b 82 72 86 ec e3 f6 ac e3 57 |(..j....r......W| +00000020 79 ab 3a aa 63 02 20 36 e3 3d 49 f5 82 af 2e 24 |y.:.c. 6.=I....$| +00000030 80 a0 67 75 ca a0 45 ff f9 e7 92 d3 4f 6d 7a 09 |..gu..E.....Omz.| +00000040 24 37 1b 80 97 3b 28 |$7...;(| +[227b 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[227c 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[227d 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[227e 05-20 18:20:49.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[227f 05-20 18:20:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2280 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2281 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2282 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2283 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2284 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2285 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2286 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2287 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2288 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2289 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[228a 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[228b 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 gate 1589998849072819500 evaluation starts +[228c 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 signed by 0 principal evaluation starts (used [false]) +[228d 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 processing identity 0 with bytes of 115a110 +[228e 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 principal matched by identity 0 +[228f 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 e8 96 e2 7f 6d d1 17 d7 81 60 d8 91 81 5b dd |s....m....`...[.| +00000010 4e 32 51 cd 9b ef 13 60 6f ed fd 5c 4a 3c 96 6b |N2Q....`o..\J<.k| +[2290 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 79 30 e4 4e 5d f8 6e 6b 1f 4b ec |0D. 0y0.N].nk.K.| +00000010 18 14 42 44 c2 da b3 a6 48 aa f4 bc f7 53 b7 82 |..BD....H....S..| +00000020 2a 23 36 f3 02 20 6d cd d1 9e 99 c7 f8 70 84 29 |*#6.. m......p.)| +00000030 d2 d8 23 0e e3 77 b6 af 1c f0 52 49 63 db 28 37 |..#..w....RIc.(7| +00000040 89 09 92 92 88 98 |......| +[2291 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 principal evaluation succeeds for identity 0 +[2292 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004461bb0 gate 1589998849072819500 evaluation succeeds +[2293 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2294 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2295 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2296 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2297 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2298 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2299 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[229a 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +[229b 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +00000040 4c 13 5c 32 79 9e bf |L.\2y..| +[229c 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[229d 05-20 18:20:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[229e 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[229f 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[22a0 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a1 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a2 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a3 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a4 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a5 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a6 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[22a7 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22a8 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22a9 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22aa 05-20 18:20:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[22ab 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +[22ac 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +00000040 25 6b a6 b5 b0 54 |%k...T| +[22ad 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[22ae 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22af 05-20 18:20:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22b0 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[22b1 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[22b2 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22b3 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[22b4 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[22b5 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 3e 4b e0 8d 40 17 56 d1 3a 1b 2f 95 c7 f7 5b |3>K..@.V.:./...[| +00000010 48 41 d9 9c 57 1a 30 37 19 4a 5c da 79 66 2e ac |HA..W.07.J\.yf..| +[22b6 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 8b 1a 24 0f 26 35 95 ac 4a 19 c0 |0D. ...$.&5..J..| +00000010 78 7f 04 e3 10 e7 a9 d2 dc a1 9c 02 d2 ac a8 b9 |x...............| +00000020 7c 3f 68 4a 02 20 78 8a 29 0c f6 19 43 29 70 f8 ||?hJ. x.)...C)p.| +00000030 9f d5 c9 aa 2d 86 12 7f 91 0c 3c 7b 51 1c 69 a7 |....-.....<{Q.i.| +00000040 25 6b a6 b5 b0 54 |%k...T| +[22b7 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[22b8 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22b9 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[22ba 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 03 24 ff be c5 52 1a 42 f8 c7 77 af 22 64 93 |..$...R.B..w."d.| +00000010 9f 14 81 a4 42 d6 1f 2c 05 97 a0 54 1e 84 1e 53 |....B..,...T...S| +[22bb 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd fa f9 2d 56 dc 62 66 8e cc a8 |0E.!....-V.bf...| +00000010 c8 24 aa b0 ac 26 f6 32 47 d1 a3 c7 27 46 03 62 |.$...&.2G...'F.b| +00000020 b5 f6 1b 2c fc 02 20 57 2e de 73 ae d3 ee 16 1d |...,.. W..s.....| +00000030 a7 c5 73 82 5f 2a 86 ed 16 cb 46 ab e9 28 c1 51 |..s._*....F..(.Q| +00000040 4c 13 5c 32 79 9e bf |L.\2y..| +[22bc 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22bd 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22be 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22bf 05-20 18:20:49.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c0 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +[22c1 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +[22c2 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c3 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > > , Envelope: 166 bytes, Signature: 0 bytes +[22c4 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[22c5 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c6 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[22c7 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[22c8 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[22c9 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[22ca 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[22cb 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[22cc 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 gate 1589998849216112700 evaluation starts +[22cd 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 signed by 0 principal evaluation starts (used [false]) +[22ce 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 processing identity 0 with bytes of 115a110 +[22cf 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 principal matched by identity 0 +[22d0 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +[22d1 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +00000040 e7 1b f2 46 8c 8a 80 |...F...| +[22d2 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 principal evaluation succeeds for identity 0 +[22d3 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00449ba90 gate 1589998849216112700 evaluation succeeds +[22d4 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[22d5 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[22d6 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[22d7 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[22d8 05-20 18:20:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22d9 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[22da 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[22db 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[22dc 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[22dd 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22de 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22df 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[22e0 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22e1 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22e2 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22e3 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[22e4 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > alive: alive: +[22e5 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[22e6 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22e7 05-20 18:20:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22e8 05-20 18:20:50.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[22e9 05-20 18:20:50.67 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[22ea 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[22eb 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100B1801 +[22ec 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1E523162A5E6B9D6F62547F5DA4ABCDD1FA03F731348B9FD277AD6424FD43E2A +[22ed 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[22ee 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ef 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f0 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f1 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f2 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[22f3 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f4 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f5 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[22f6 05-20 18:20:50.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22f7 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f8 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f9 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[22fa 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22fc 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22fb 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22fd 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22fe 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22ff 05-20 18:20:51.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2300 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2301 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2302 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2303 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2304 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2305 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2306 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2307 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2308 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2309 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[230a 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[230b 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[230c 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[230d 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[230e 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[230f 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2310 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 gate 1589998851617537800 evaluation starts +[2311 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 signed by 0 principal evaluation starts (used [false]) +[2312 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 processing identity 0 with bytes of 115a110 +[2313 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 principal matched by identity 0 +[2314 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2315 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004502490 principal evaluation succeeds for identity 0 +[2317 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004502490 gate 1589998851617537800 evaluation succeeds +[2318 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2319 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[231a 05-20 18:20:51.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[231b 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[231c 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[231d 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[231e 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[231f 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2320 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2321 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2322 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2323 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2324 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 gate 1589998851624934600 evaluation starts +[2325 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 signed by 0 principal evaluation starts (used [false]) +[2326 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 processing identity 0 with bytes of 115a110 +[2327 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 principal matched by identity 0 +[2328 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2329 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[232a 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 principal evaluation succeeds for identity 0 +[232b 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004503690 gate 1589998851624934600 evaluation succeeds +[232c 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[232d 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[232e 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[232f 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2330 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2331 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2332 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2333 05-20 18:20:51.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2334 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2335 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2336 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2337 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2338 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2339 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[233a 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[233b 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 gate 1589998851631591300 evaluation starts +[233c 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 signed by 0 principal evaluation starts (used [false]) +[233d 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 processing identity 0 with bytes of 115a110 +[233e 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 principal matched by identity 0 +[233f 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2340 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2341 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 principal evaluation succeeds for identity 0 +[2342 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451eae0 gate 1589998851631591300 evaluation succeeds +[2343 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2344 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2345 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2346 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2347 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2348 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2349 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[234a 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[234b 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[234c 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[234d 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[234e 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[234f 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2350 05-20 18:20:51.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2351 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 gate 1589998851639869000 evaluation starts +[2352 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 signed by 0 principal evaluation starts (used [false]) +[2353 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 processing identity 0 with bytes of 115a110 +[2354 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 principal matched by identity 0 +[2355 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2356 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00453e3d0 principal evaluation succeeds for identity 0 +[2358 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453e3d0 gate 1589998851639869000 evaluation succeeds +[2359 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[235a 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[235b 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[235c 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[235d 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[235e 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[235f 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2360 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2361 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2362 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2363 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2364 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2365 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2366 05-20 18:20:51.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2367 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2368 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2369 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[236a 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 gate 1589998851650842300 evaluation starts +[236b 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 signed by 0 principal evaluation starts (used [false]) +[236c 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 processing identity 0 with bytes of 115a110 +[236d 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 principal matched by identity 0 +[236e 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[236f 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00453ff10 principal evaluation succeeds for identity 0 +[2371 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453ff10 gate 1589998851650842300 evaluation succeeds +[2372 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2373 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2374 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2375 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2376 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2377 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2378 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2379 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[237a 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[237b 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[237c 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[237d 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[237e 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[237f 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2380 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2381 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2382 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 gate 1589998851656452100 evaluation starts +[2383 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 signed by 0 principal evaluation starts (used [false]) +[2384 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 processing identity 0 with bytes of 115a110 +[2385 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 principal matched by identity 0 +[2386 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2387 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2388 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 principal evaluation succeeds for identity 0 +[2389 05-20 18:20:51.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004553ef0 gate 1589998851656452100 evaluation succeeds +[238a 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[238b 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[238c 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[238d 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[238e 05-20 18:20:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[238f 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2390 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2391 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2392 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2393 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2394 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[2395 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2396 05-20 18:20:51.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2397 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2398 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2399 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[239a 05-20 18:20:51.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[239b 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[239c 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[239d 05-20 18:20:51.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[239e 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[239f 05-20 18:20:51.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23a0 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[23a1 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[23a2 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23a3 05-20 18:20:52.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23a4 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23a5 05-20 18:20:52.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23a6 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[23a7 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[23a8 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23a9 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23aa 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23ab 05-20 18:20:52.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23ac 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[23ad 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[23ae 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[23af 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[23b0 05-20 18:20:52.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23b1 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[23b2 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[23b3 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[23b4 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[23b5 05-20 18:20:52.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23b6 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[23b7 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[23b8 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23b9 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[23ba 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[23bb 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +[23bc 05-20 18:20:52.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +[23bd 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[23be 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c a2 01 ff ed 1d 4b e4 d6 a9 74 34 |0D. <.....K...t4| +00000010 36 97 c9 0b 7d 18 f8 af cc 02 46 16 11 41 b7 5d |6...}.....F..A.]| +00000020 de fa fe 28 02 20 7c 5a 69 f4 0f a9 f8 21 7c cd |...(. |Zi....!|.| +00000030 be 28 16 f8 1b 81 76 4a ac ac 62 14 a1 7c 72 99 |.(....vJ..b..|r.| +00000040 d4 43 f6 67 c6 d4 |.C.g..| +[23bf 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[23c0 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[23c1 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[23c2 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[23c3 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[23c4 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23c5 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23c6 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23c7 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[23c8 05-20 18:20:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23c9 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23ca 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[23cb 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[23cc 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23cd 05-20 18:20:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" secret_envelope: > alive: +[23ce 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[23cf 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[23d0 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[23d1 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23d2 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23d3 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23d4 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23d5 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23d6 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23d7 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[23d8 05-20 18:20:52.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23d9 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[23da 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[23db 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[23dc 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[23dd 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23de 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[23df 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[23e0 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[23e1 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[23e2 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23e3 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[23e4 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[23e5 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[23e6 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23e7 05-20 18:20:52.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[23e8 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[23e9 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[23ea 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[23eb 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23ec 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23ed 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[23ee 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[23ef 05-20 18:20:52.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[23f0 05-20 18:20:52.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23f1 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[23f2 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[23f3 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23f4 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[23f5 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[23f6 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23f7 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[23f8 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[23f9 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[23fa 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[23fb 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[23fc 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[23fd 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 gate 1589998852898930900 evaluation starts +[23fe 05-20 18:20:52.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 signed by 0 principal evaluation starts (used [false]) +[23ff 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 processing identity 0 with bytes of 115a110 +[2400 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 principal matched by identity 0 +[2401 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +[2402 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +00000040 91 06 28 1a bc 4f |..(..O| +[2403 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 principal evaluation succeeds for identity 0 +[2404 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d13c0 gate 1589998852898930900 evaluation succeeds +[2405 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2406 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2407 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2408 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2409 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[240a 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[240b 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[240c 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[240d 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[240e 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[240f 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2410 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2411 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2412 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2413 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2414 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[2415 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\252y\267x\\\002\n\274\370K\252\216\324\007\337\251\004\274t\363\316^1\323\347\033\362F\214\212\200" > alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > alive: +[2416 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2417 05-20 18:20:52.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2418 05-20 18:20:52.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2419 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[241a 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161026 +[241b 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E0E872408F610EA36EC189974CA5AE1CC044DD8DC73735AC852AAC8A115C57C9 +[241c 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[241d 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[241e 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[241f 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2420 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[2421 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2422 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[2423 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O`\323k\274\257\002 \\\322G<#\314\005\316\327V|\010\226u\347\253]a\260\373\205\031\270\371z\224\031\0105\016\207\n" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[2424 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O`\323k\274\257\002 \\\322G<#\314\005\316\327V|\010\226u\347\253]a\260\373\205\031\270\371z\224\031\0105\016\207\n" > > > , Envelope: 271 bytes, Signature: 0 bytes +[2425 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2426 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes +[2427 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2428 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\001\270+\303\220\002 \036\236/A\302Joc\244O > , Envelope: 165 bytes, Signature: 0 bytes +[2429 05-20 18:20:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[242a 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[242b 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[242c 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[242d 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[242e 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[242f 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +[2430 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[2432 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 06 47 a5 e6 30 2b d3 9c e2 29 |0E.!...G..0+...)| +00000010 b8 72 db a8 dc 03 ba f4 a5 fd 7a 1f 65 ee 23 3e |.r........z.e.#>| +00000020 60 d3 6b bc af 02 20 5c d2 47 3c 23 cc 05 ce d7 |`.k... \.G<#....| +00000030 56 7c 08 96 75 e7 ab 5d 61 b0 fb 85 19 b8 f9 7a |V|..u..]a......z| +00000040 94 19 08 35 0e 87 0a |...5...| +[2433 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2434 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2435 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2436 05-20 18:20:53.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2437 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2438 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2439 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[243a 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[243b 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[243c 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[243d 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[243e 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[243f 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2440 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2441 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2442 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2443 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 gate 1589998853054534900 evaluation starts +[2444 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 signed by 0 principal evaluation starts (used [false]) +[2445 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 processing identity 0 with bytes of 115a110 +[2446 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 principal matched by identity 0 +[2447 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 11 1d 5b 88 3a cc d4 75 ea 53 b1 0c 9d d8 a7 |...[.:..u.S.....| +00000010 1a 38 2d 84 14 34 ac c7 84 04 a3 fd f7 13 a5 34 |.8-..4.........4| +[2448 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 58 ac 98 01 a7 a5 36 3a 5a 97 0d |0D. kX.....6:Z..| +00000010 33 6a 68 08 f4 99 4a 88 55 4e d2 fe 37 b3 c8 fc |3jh...J.UN..7...| +00000020 c3 14 f0 38 02 20 7e f9 fe 7f 0f ff 2c 64 b3 32 |...8. ~.....,d.2| +00000030 7e 40 5a 56 21 6c 19 fd db 61 37 0e b3 35 4b d6 |~@ZV!l...a7..5K.| +00000040 91 06 28 1a bc 4f |..(..O| +[2449 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 principal evaluation succeeds for identity 0 +[244a 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004624c10 gate 1589998853054534900 evaluation succeeds +[244b 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[244c 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[244d 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[244e 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[244f 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2450 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2451 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2452 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +[2453 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2455 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2456 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2457 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2458 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +[2459 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +[245a 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[245b 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[245c 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[245d 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[245e 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[245f 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2460 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2461 05-20 18:20:53.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2462 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2463 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2464 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2465 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2466 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2467 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2468 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2469 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 gate 1589998853061770800 evaluation starts +[246a 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 signed by 0 principal evaluation starts (used [false]) +[246b 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 processing identity 0 with bytes of 115a110 +[246c 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 principal matched by identity 0 +[246d 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 08 da ba ba 82 1a d6 bf f5 82 59 0c b9 cb c1 |(..........Y....| +00000010 d9 1a 3d 58 40 c0 20 ae e9 32 98 02 98 71 ab be |..=X@. ..2...q..| +[246e 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de c2 38 48 50 35 16 cd f3 89 c8 |0E.!...8HP5.....| +00000010 17 1f 51 84 92 ab f3 1f 23 b0 8c cb 7d 22 cc dd |..Q.....#...}"..| +00000020 b1 0c 49 8e 54 02 20 3e aa 79 b7 78 5c 02 0a bc |..I.T. >.y.x\...| +00000030 f8 4b aa 8e d4 07 df a9 04 bc 74 f3 ce 5e 31 d3 |.K........t..^1.| +00000040 e7 1b f2 46 8c 8a 80 |...F...| +[246f 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 principal evaluation succeeds for identity 0 +[2470 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00463d320 gate 1589998853061770800 evaluation succeeds +[2471 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2472 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2473 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2474 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2475 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2476 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2477 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2478 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 c6 a4 3d ce 1a 10 f2 88 f6 ab 61 8f 7d 12 01 |...=.......a.}..| +00000010 eb fd e1 e3 af 6c 6a f9 de 6e fb 9d a5 12 80 bf |.....lj..n......| +[2479 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea 3d bf 00 21 2d 33 10 86 fd b1 |0E.!..=..!-3....| +00000010 4c 46 79 1b e0 3e 54 8d 00 90 ba ad 11 d4 ee 93 |LFy..>T.........| +00000020 95 53 9f 24 6b 02 20 55 b7 fb c5 5a bb 10 5c 5e |.S.$k. U...Z..\^| +00000030 33 5d 9c 8f 21 ab 27 c9 b4 68 80 d7 25 25 5f fd |3]..!.'..h..%%_.| +00000040 e7 20 49 f9 ac 7b 10 |. I..{.| +[247a 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[247b 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[247c 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[247d 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 e8 72 40 8f 61 0e a3 6e c1 89 97 4c a5 ae 1c |..r@.a..n...L...| +00000010 c0 44 dd 8d c7 37 35 ac 85 2a ac 8a 11 5c 57 c9 |.D...75..*...\W.| +[247e 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d6 b4 8a 55 5e a8 bb 24 6c ea 5d |0D. x...U^..$l.]| +00000010 d5 d0 8b 2c fd b8 07 a0 60 4a c6 72 86 9a 3e 01 |...,....`J.r..>.| +00000020 b8 2b c3 90 02 20 1e 9e 2f 41 c2 4a 6f 63 a4 4f |.+... ../A.Joc.O| +00000030 3c 2f 48 6a a9 44 e7 27 a9 03 ed d3 9b b3 98 6b | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2480 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2481 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2482 05-20 18:20:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2483 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2484 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2485 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2486 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2487 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2488 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2489 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[248a 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[248b 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[248c 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[248d 05-20 18:20:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[248e 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +[248f 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +[2490 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2491 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > > , Envelope: 166 bytes, Signature: 0 bytes +[2492 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2493 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2494 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2495 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2496 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2497 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2498 05-20 18:20:53.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2499 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[249a 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 gate 1589998853180605600 evaluation starts +[249b 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 signed by 0 principal evaluation starts (used [false]) +[249c 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 processing identity 0 with bytes of 115a110 +[249d 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 principal matched by identity 0 +[249e 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 d6 90 3e f2 aa bc 5b a6 80 fb fc 9b 45 69 7a |...>...[.....Eiz| +00000010 f7 6c ea 99 c0 59 1f 09 96 bf 9e ca 2b 1e 53 b6 |.l...Y......+.S.| +[249f 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 f4 7d 30 51 9c 1a 5f 60 e6 ff |0E.!...}0Q.._`..| +00000010 52 ea cf 2e 54 fe e3 61 d3 fc f1 1c ec de dc 83 |R...T..a........| +00000020 9a e6 80 0d 8a 02 20 3e 07 57 d4 28 98 87 8e 7e |...... >.W.(...~| +00000030 64 88 3a 7a 4c dc dd 28 27 97 d6 5f bc 23 d4 64 |d.:zL..('.._.#.d| +00000040 e7 a7 61 f9 1d fe 41 |..a...A| +[24a0 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 principal evaluation succeeds for identity 0 +[24a1 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7fe0 gate 1589998853180605600 evaluation succeeds +[24a2 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[24a3 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[24a4 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[24a5 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[24a6 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24a7 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[24a8 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[24a9 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[24aa 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[24ab 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ac 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ad 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ae 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[24af 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b0 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b1 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b2 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[24b3 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\007W\324(\230\207\216~d\210:zL\334\335('\227\326_\274#\324d\347\247a\371\035\376A" > alive:T\215\000\220\272\255\021\324\356\223\225S\237$k\002 U\267\373\305Z\273\020\\^3]\234\217!\253'\311\264h\200\327%%_\375\347 I\371\254{\020" > alive: alive: +[24b4 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[24b5 05-20 18:20:53.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24b6 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24b7 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24b8 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24b9 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24ba 05-20 18:20:53.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[24bb 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 ad b6 db 1e 04 e2 43 0a cf 75 92 d2 07 8c c8 |.......C..u.....| +00000010 4d 26 12 7c b9 76 15 45 22 7a 09 0f 2d ed 63 c0 |M&.|.v.E"z..-.c.| +[24bc 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 21 60 77 7b b8 cf a6 dd 05 c4 71 |0D. .!`w{......q| +00000010 bf ae f5 e4 1d 85 3c da 32 97 97 cd 27 c0 68 63 |......<.2...'.hc| +00000020 c8 b7 59 4b 02 20 2b 73 e0 7a 00 f3 eb 66 9a 3d |..YK. +s.z...f.=| +00000030 60 b4 a0 67 87 b2 c2 8f b9 ca d0 38 cb b0 c6 76 |`..g.......8...v| +00000040 eb 44 14 d3 1d 41 |.D...A| +[24bd 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24be 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[24bf 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[24c0 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[24c1 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[24c2 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24c3 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24c4 05-20 18:20:53.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24c5 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24c6 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24c7 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24c8 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24c9 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ca 05-20 18:20:53.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24cb 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24cc 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24cd 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[24ce 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24d0 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[24d1 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24d2 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24cf 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24d3 05-20 18:20:53.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24d4 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24d5 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24d6 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24d7 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24d8 05-20 18:20:53.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24d9 05-20 18:20:53.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24da 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24db 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24dc 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24dd 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[24de 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24df 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[24e0 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[24e1 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[24e2 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[24e3 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[24e4 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[24e5 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 gate 1589998853715869500 evaluation starts +[24e6 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 signed by 0 principal evaluation starts (used [false]) +[24e7 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 processing identity 0 with bytes of 115a110 +[24e8 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 principal matched by identity 0 +[24e9 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2c f1 57 d9 a7 7f 43 35 30 72 01 71 fe 97 6a 3f |,.W...C50r.q..j?| +00000010 90 a4 86 4c 1d 5f 21 9b 1e 65 db 17 ad 07 b0 48 |...L._!..e.....H| +[24ea 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 43 b8 68 ef 6b 30 f5 07 d1 d2 |0E.!..C.h.k0....| +00000010 5a 43 40 36 72 6f 84 1b 19 25 a3 86 b5 56 94 34 |ZC@6ro...%...V.4| +00000020 bf f8 2d eb 5b 02 20 4c e3 e3 0f f6 6b dc fa 44 |..-.[. L....k..D| +00000030 15 9e e3 49 f0 d8 3e 20 e4 e6 d8 07 59 d5 0d e1 |...I..> ....Y...| +00000040 f4 51 ed 10 c1 82 b0 |.Q.....| +[24eb 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 principal evaluation succeeds for identity 0 +[24ec 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6430 gate 1589998853715869500 evaluation succeeds +[24ed 05-20 18:20:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[24ee 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[24ef 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[24f0 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[24f1 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24f2 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[24f3 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[24f4 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[24f5 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[24f6 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f7 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f8 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f9 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24fa 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24fb 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24fc 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24fd 05-20 18:20:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24fe 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24ff 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2500 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2501 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2502 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2503 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2504 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2505 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2506 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2507 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2508 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2509 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[250a 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[250b 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[250c 05-20 18:20:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[250d 05-20 18:20:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[250e 05-20 18:20:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[250f 05-20 18:20:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2510 05-20 18:20:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2511 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2512 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2513 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2514 05-20 18:20:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2515 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2516 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2517 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2518 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2519 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[251a 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[251b 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[251c 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[251d 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 gate 1589998853947226400 evaluation starts +[251e 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 signed by 0 principal evaluation starts (used [false]) +[251f 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 processing identity 0 with bytes of 115a110 +[2520 05-20 18:20:53.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 principal matched by identity 0 +[2521 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 73 65 da f1 da 2f b4 3f 71 1b 7e 99 fe 9f 4c |Sse.../.?q.~...L| +00000010 6f 9d f2 a6 60 43 ba 41 9d b5 df 10 15 e3 52 24 |o...`C.A......R$| +[2522 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 a2 4d e0 c2 01 63 32 e0 d5 55 ac |0D. b.M...c2..U.| +00000010 f0 9b d4 e5 64 82 74 86 6e 5e fb bb df 75 d8 bf |....d.t.n^...u..| +00000020 bd 73 b5 1e 02 20 7b 52 4b e1 38 a6 ec 59 18 42 |.s... {RK.8..Y.B| +00000030 07 ec 13 e9 59 8d 8e 2b a3 97 6f a0 f8 78 91 d8 |....Y..+..o..x..| +00000040 fb 04 ed 3e 10 28 |...>.(| +[2523 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 principal evaluation succeeds for identity 0 +[2524 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ee6c0 gate 1589998853947226400 evaluation succeeds +[2526 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2527 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2525 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2528 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2529 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[252a 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[252b 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[252c 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[252d 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[252e 05-20 18:20:53.95 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[252f 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2530 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2531 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2532 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2533 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2534 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2535 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2536 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2537 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2538 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2539 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[253a 05-20 18:20:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[253b 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[253c 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[253d 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[253e 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[253f 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2540 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2541 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2542 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2543 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2544 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2545 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2547 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2546 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2548 05-20 18:20:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2549 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[254a 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161027 +[254b 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CD593046A7C992E4B230C89AE78AE1B47F897F937356D4D912E8BF655EB77BCE +[254c 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[254d 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[254e 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[254f 05-20 18:20:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2550 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2551 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2552 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[2553 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2554 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2555 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2556 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2557 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2558 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2559 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[255a 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[255b 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[255c 05-20 18:20:54.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[255d 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[255e 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[255f 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2560 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2561 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2562 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2563 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2564 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2565 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2566 05-20 18:20:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2567 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2569 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[256a 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[256b 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[256c 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[256d 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2568 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[256e 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[256f 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2570 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2571 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2572 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2573 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 gate 1589998855612660000 evaluation starts +[2574 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 signed by 0 principal evaluation starts (used [false]) +[2575 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 processing identity 0 with bytes of 115a110 +[2576 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 principal matched by identity 0 +[2577 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2578 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2579 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 principal evaluation succeeds for identity 0 +[257a 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004717840 gate 1589998855612660000 evaluation succeeds +[257b 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[257c 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[257d 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[257e 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[257f 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2580 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2581 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2582 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2583 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2584 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2585 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2586 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2587 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2588 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2589 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 gate 1589998855615234500 evaluation starts +[258a 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 signed by 0 principal evaluation starts (used [false]) +[258b 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 processing identity 0 with bytes of 115a110 +[258c 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 principal matched by identity 0 +[258d 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[258e 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004745130 principal evaluation succeeds for identity 0 +[2590 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004745130 gate 1589998855615234500 evaluation succeeds +[2591 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2592 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2593 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2594 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2595 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2596 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2597 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2598 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2599 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[259a 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[259b 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[259c 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[259d 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[259e 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[259f 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25a0 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25a1 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25a2 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 gate 1589998855618307600 evaluation starts +[25a3 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 signed by 0 principal evaluation starts (used [false]) +[25a4 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 processing identity 0 with bytes of 115a110 +[25a5 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 principal matched by identity 0 +[25a6 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[25a7 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004762c70 principal evaluation succeeds for identity 0 +[25a9 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004762c70 gate 1589998855618307600 evaluation succeeds +[25aa 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25ab 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25ac 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25ad 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25ae 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[25af 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[25b0 05-20 18:20:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[25b1 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[25b2 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25b3 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25b4 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[25b5 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25b6 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25b7 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25b8 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25b9 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25ba 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 gate 1589998855621455600 evaluation starts +[25bb 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 signed by 0 principal evaluation starts (used [false]) +[25bc 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 processing identity 0 with bytes of 115a110 +[25bd 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 principal matched by identity 0 +[25be 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[25bf 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[25c0 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 principal evaluation succeeds for identity 0 +[25c1 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004782c50 gate 1589998855621455600 evaluation succeeds +[25c2 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25c3 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25c4 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25c5 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25c6 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25c7 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[25c8 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[25c9 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[25ca 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[25cb 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[25cc 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25cd 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25ce 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[25cf 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25d0 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25d1 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25d2 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25d3 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25d4 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 gate 1589998855627111300 evaluation starts +[25d5 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 signed by 0 principal evaluation starts (used [false]) +[25d6 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 processing identity 0 with bytes of 115a110 +[25d7 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 principal matched by identity 0 +[25d8 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[25d9 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0047a0dd0 principal evaluation succeeds for identity 0 +[25db 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a0dd0 gate 1589998855627111300 evaluation succeeds +[25dc 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25dd 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25de 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25df 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25e0 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25e1 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25e2 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[25e3 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25e4 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25e5 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25e6 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25e7 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25e8 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 gate 1589998855629765800 evaluation starts +[25e9 05-20 18:20:55.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 signed by 0 principal evaluation starts (used [false]) +[25ea 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 processing identity 0 with bytes of 115a110 +[25eb 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 principal matched by identity 0 +[25ec 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[25ed 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[25ee 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 principal evaluation succeeds for identity 0 +[25ef 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047a1fd0 gate 1589998855629765800 evaluation succeeds +[25f0 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25f1 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25f2 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25f3 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25f4 05-20 18:20:55.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f5 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[25f6 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[25f7 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[25f8 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100C1801 +[25f9 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7B8931900261A8E15D1DCDE285EBA34407083A047A94DACAF0A0E35FE925D423 +[25fa 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[25fb 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25fc 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25fd 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25fe 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25ff 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[2600 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2601 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2602 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[2603 05-20 18:20:55.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2604 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2605 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2606 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2607 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2608 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2609 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[260a 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[260b 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[260c 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[260d 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[260e 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[260f 05-20 18:20:55.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2610 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2611 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2612 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2613 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2614 05-20 18:20:55.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2615 05-20 18:20:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2616 05-20 18:20:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2617 05-20 18:20:56.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2618 05-20 18:20:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2619 05-20 18:20:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[261a 05-20 18:20:56.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[261b 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[261c 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[261d 05-20 18:20:56.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[261e 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[261f 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2620 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2621 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2622 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2623 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2624 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2625 05-20 18:20:56.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2626 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2627 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2628 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2629 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[262a 05-20 18:20:56.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[262b 05-20 18:20:56.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[262c 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[262d 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[262e 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[262f 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2630 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +[2631 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +00000040 7d 0f 08 fd 0a 01 1e |}......| +[2632 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2633 05-20 18:20:56.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 1d 22 8a a0 61 fa 16 4d 9d d3 ce |0D. v."..a..M...| +00000010 5f 07 1d 5c fa 1c b9 5e 24 f1 7b 66 53 c7 59 81 |_..\...^$.{fS.Y.| +00000020 64 93 fa 64 02 20 29 c9 27 17 5e e6 16 37 6f 12 |d..d. ).'.^..7o.| +00000030 95 59 06 6e 50 44 a8 f0 b1 8e e2 b9 66 89 84 5e |.Y.nPD......f..^| +00000040 e1 23 87 0f ab e9 |.#....| +[2634 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2635 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[2636 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2637 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2638 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2639 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[263a 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[263b 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[263c 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[263d 05-20 18:20:56.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[263e 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[263f 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[2640 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[2641 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2642 05-20 18:20:56.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2643 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2644 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2645 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2646 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2647 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2648 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2649 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[264a 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[264b 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[264c 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[264d 05-20 18:20:56.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[264e 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[264f 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2650 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2652 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2653 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2655 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2651 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2657 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2654 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2658 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2656 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2659 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[265a 05-20 18:20:56.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[265b 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[265c 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[265d 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[265e 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[265f 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2660 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2661 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2662 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2663 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2664 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2665 05-20 18:20:56.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2666 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2667 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2668 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2669 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[266a 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[266b 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[266c 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[266d 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[266e 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[266f 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2670 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2671 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2672 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 gate 1589998856919188600 evaluation starts +[2673 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 signed by 0 principal evaluation starts (used [false]) +[2674 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 processing identity 0 with bytes of 115a110 +[2675 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 principal matched by identity 0 +[2676 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +[2677 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +00000040 84 7f 49 97 a7 8c 2a |..I...*| +[2678 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 principal evaluation succeeds for identity 0 +[2679 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482d5d0 gate 1589998856919188600 evaluation succeeds +[267a 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[267b 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[267c 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[267d 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[267e 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[267f 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2680 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2681 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2682 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2683 05-20 18:20:56.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2684 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2685 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2686 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2687 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2688 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2689 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[268a 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[268b 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020(" > alive: alive: alive: +[268c 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[268d 05-20 18:20:56.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[268e 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[268f 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161028 +[2690 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F7DE2BA309707656379692C3265849ECE16CF82FCFD3F8ABFEB7DB6F3FCE17AF +[2691 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2692 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2693 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2694 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2695 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[2696 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2697 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[2698 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" secret_envelope:\277\220\210\236" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[2699 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" secret_envelope:\277\220\210\236" > > > , Envelope: 270 bytes, Signature: 0 bytes +[269a 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[269b 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes +[269c 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[269d 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\227:\032\373d\321Ns\014t\373\261W3\016\031\257)\227\204\265\376ImE\2034\310\263\025" > > , Envelope: 165 bytes, Signature: 0 bytes +[269e 05-20 18:20:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[269f 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[26a0 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[26a1 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26a2 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[26a3 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[26a4 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +[26a5 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +00000040 45 83 34 c8 b3 15 |E.4...| +[26a6 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[26a7 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 3a a0 90 ad 38 79 cd 7e 49 3c c7 |0D. .:...8y.~I<.| +00000010 59 a0 3c 7c f6 f9 56 4e 65 68 78 a9 29 45 63 36 |Y.<|..VNehx.)Ec6| +00000020 3a 11 26 7c 02 20 0c 6f 91 5e 38 c3 4f 7c 6e 70 |:.&|. .o.^8.O|np| +00000030 b6 c0 40 c3 c0 67 c0 7c 69 70 02 0a b9 c6 92 2e |..@..g.|ip......| +00000040 99 3e bf 90 88 9e |.>....| +[26a8 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[26a9 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[26aa 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26ab 05-20 18:20:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26ac 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[26ad 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[26ae 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26af 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[26b0 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[26b1 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +[26b2 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +00000040 7d 0f 08 fd 0a 01 1e |}......| +[26b3 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[26b4 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26b5 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[26b6 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +[26b7 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +00000040 45 83 34 c8 b3 15 |E.4...| +[26b8 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[26b9 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[26ba 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26bb 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26bc 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[26bd 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[26be 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26bf 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[26c0 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[26c1 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26c2 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[26c3 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[26c4 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[26c5 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[26c6 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[26c7 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[26c8 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 gate 1589998857058615500 evaluation starts +[26c9 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 signed by 0 principal evaluation starts (used [false]) +[26ca 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 processing identity 0 with bytes of 115a110 +[26cb 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 principal matched by identity 0 +[26cc 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 26 f1 d3 f4 bb d7 d3 78 7d 01 44 93 91 f5 8b |h&......x}.D....| +00000010 2b 81 e4 18 a4 04 22 48 a3 54 69 d7 d4 12 dd 10 |+....."H.Ti.....| +[26cd 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 54 62 97 0c 95 d3 61 af 95 62 |0E.!..Tb....a..b| +00000010 0e 40 42 3d 29 8f 5a d4 65 91 fe 76 56 dd 2c 55 |.@B=).Z.e..vV.,U| +00000020 58 85 be aa 2c 02 20 63 fe c9 f2 c9 d6 e7 bb 60 |X...,. c.......`| +00000030 31 3f e2 1e 4e b0 63 c7 9e ec a2 b4 9e d4 73 6e |1?..N.c.......sn| +00000040 84 7f 49 97 a7 8c 2a |..I...*| +[26ce 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 principal evaluation succeeds for identity 0 +[26cf 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004896160 gate 1589998857058615500 evaluation succeeds +[26d0 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[26d1 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[26d2 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[26d3 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[26d4 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[26d5 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26d6 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[26d7 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 de 2b a3 09 70 76 56 37 96 92 c3 26 58 49 ec |..+..pvV7...&XI.| +00000010 e1 6c f8 2f cf d3 f8 ab fe b7 db 6f 3f ce 17 af |.l./.......o?...| +[26d8 05-20 18:20:57.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 8b fc ae 83 58 8c 2c a2 f2 1b ee |0D. .....X.,....| +00000010 9d c3 a8 44 b3 84 fa 9c 0e d9 3b e7 dd f3 3c 9d |...D......;...<.| +00000020 a8 78 32 2e 02 20 53 3e 97 3a 1a fb 64 d1 4e 73 |.x2.. S>.:..d.Ns| +00000030 0c 74 fb b1 57 33 0e 19 af 29 97 84 b5 fe 49 6d |.t..W3...)....Im| +00000040 45 83 34 c8 b3 15 |E.4...| +[26d9 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[26da 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[26db 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26dc 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[26dd 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 4e 5a db 7e 6c 42 03 b8 1a 32 49 23 cd cb 15 |'NZ.~lB...2I#...| +00000010 21 24 36 4d b4 d8 e5 86 2f 6e ac 25 c4 2e 2a e7 |!$6M..../n.%..*.| +[26de 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 4e 92 51 10 98 d1 a4 77 97 a7 |0E.!..N.Q....w..| +00000010 51 c5 37 e1 61 a2 2a 6d 9c 8c 8d 9d c5 ba ef b6 |Q.7.a.*m........| +00000020 fc 1e e2 50 54 02 20 7c 7f fb 59 8e f7 c0 f6 dd |...PT. |..Y.....| +00000030 c2 f7 a7 88 35 48 0b 4d ea 27 16 10 f8 79 f4 53 |....5H.M.'...y.S| +00000040 7d 0f 08 fd 0a 01 1e |}......| +[26df 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[26e0 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26e1 05-20 18:20:57.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26e2 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[26e3 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[26e4 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[26e5 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e6 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e7 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e8 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e9 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26ea 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26eb 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[26ec 05-20 18:20:57.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26ed 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[26ee 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[26ef 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26f0 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[26f1 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[26f2 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26f3 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[26f4 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[26f5 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[26f6 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[26f7 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[26f8 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[26f9 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 gate 1589998857199528500 evaluation starts +[26fa 05-20 18:20:57.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 signed by 0 principal evaluation starts (used [false]) +[26fb 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 processing identity 0 with bytes of 115a110 +[26fc 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 principal matched by identity 0 +[26fd 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 1c db c9 74 93 b8 4c e8 82 0a 49 dc 15 91 |.X...t..L...I...| +00000010 7f 2e 44 0c 38 2f 84 e5 90 4b c9 78 fe cd 3b 83 |..D.8/...K.x..;.| +[26fe 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 1d f6 f9 ce 95 89 bc 1d ea 08 |0E.!............| +00000010 ad 89 66 54 97 b1 c1 e8 c1 19 5a 44 5b a8 5a 8d |..fT......ZD[.Z.| +00000020 5e 6b a5 91 98 02 20 72 b3 d0 3c 6c 56 ab 6b 7d |^k.... r.. DEBU 0xc0048b1290 principal evaluation succeeds for identity 0 +[2700 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b1290 gate 1589998857199528500 evaluation succeeds +[2701 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2702 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2703 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2704 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2705 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2706 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2707 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2708 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2709 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[270a 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[270b 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[270c 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[270d 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[270e 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[270f 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2710 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2711 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[2712 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2713 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[2714 05-20 18:20:57.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2715 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2716 05-20 18:20:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2717 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2718 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2719 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[271a 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 06 6e f0 5d 5a 1a 16 b7 cd 74 72 41 50 db 79 |..n.]Z....trAP.y| +00000010 d8 e8 68 bf e7 8d 16 c3 7a 9d eb 98 7e b9 af f5 |..h.....z...~...| +[271b 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 cd 7c 8c 79 45 5b bb cc 4b 91 78 |0D. B.|.yE[..K.x| +00000010 f3 6f e2 9a 3a 0b cc cf 06 57 76 61 65 59 05 68 |.o..:....WvaeY.h| +00000020 f9 11 1c f7 02 20 23 d9 dc 2d 16 6b 7d ef 6a 56 |..... #..-.k}.jV| +00000030 7e d1 bb e2 b2 c9 83 af 33 48 f3 b0 ac fe d5 69 |~.......3H.....i| +00000040 aa 02 04 ae da 0f |......| +[271c 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[271d 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[271e 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[271f 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2720 05-20 18:20:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2721 05-20 18:20:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2722 05-20 18:20:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2723 05-20 18:20:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2724 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2725 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2726 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2727 05-20 18:20:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2728 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2729 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[272a 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[272b 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[272c 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[272d 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[272e 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[272f 05-20 18:20:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2730 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2731 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2732 05-20 18:20:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2733 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2734 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2735 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2736 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2737 05-20 18:20:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2738 05-20 18:20:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2739 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[273a 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[273b 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[273c 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[273d 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[273e 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[273f 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2740 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2741 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2742 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2743 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2745 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 gate 1589998858710576300 evaluation starts +[2746 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 signed by 0 principal evaluation starts (used [false]) +[2747 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 processing identity 0 with bytes of 115a110 +[2748 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 principal matched by identity 0 +[2744 05-20 18:20:58.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[274a 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2749 05-20 18:20:58.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 e2 95 d2 b0 95 a4 91 7b 7c 73 6f 04 e7 42 86 |........{|so..B.| +00000010 4b 34 1c 03 4d 62 24 de a3 f2 13 30 73 2a aa 85 |K4..Mb$....0s*..| +[274b 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 7d 4d 4e fc d8 96 fe 27 b7 27 |0E.!..}MN....'.'| +00000010 93 ca c7 40 04 af 4f c4 52 0c d7 2c 4d b1 b6 da |...@..O.R..,M...| +00000020 68 84 c4 fc c2 02 20 1e df 06 61 02 f2 08 4f 52 |h..... ...a...OR| +00000030 cc 1f fc 75 9e d0 8d 25 78 1e d4 72 1d f6 71 fe |...u...%x..r..q.| +00000040 81 f0 4c e3 78 dd 29 |..L.x.)| +[274c 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 principal evaluation succeeds for identity 0 +[274d 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fe7b0 gate 1589998858710576300 evaluation succeeds +[274e 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[274f 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2750 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2751 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2752 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2753 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2754 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2755 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2756 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2757 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2758 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2759 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[275a 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[275b 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[275c 05-20 18:20:58.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[275d 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[275e 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[275f 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2760 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2761 05-20 18:20:58.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2762 05-20 18:20:58.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2763 05-20 18:20:58.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2764 05-20 18:20:58.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2765 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2766 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2767 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2768 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2769 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[276a 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[276b 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[276c 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[276d 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[276e 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[276f 05-20 18:20:58.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2770 05-20 18:20:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2771 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2772 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161029 +[2773 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D615589DF87D8960DD94DB4724B1163B6E4BAEC71EDBDE4E6FD71E59231D5D02 +[2774 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2775 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2776 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2777 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2778 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2779 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[277a 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[277b 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[277c 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[277d 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[277e 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[277f 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2780 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2781 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2782 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 gate 1589998859021118100 evaluation starts +[2783 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 signed by 0 principal evaluation starts (used [false]) +[2784 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 processing identity 0 with bytes of 115a110 +[2785 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 principal matched by identity 0 +[2786 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 6b 24 2a 5a a9 0e fc 2c 35 44 de 2d ba 08 b4 |.k$*Z...,5D.-...| +00000010 5d a5 6a 28 ee bd 61 d8 4a d2 e8 d3 a9 eb 6b 02 |].j(..a.J.....k.| +[2787 05-20 18:20:59.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf c0 75 b3 f3 7f 8f f4 5d 3b 9b |0E.!...u.....];.| +00000010 e1 3e ce fb b3 a9 50 11 a4 20 dd 41 e2 c9 ef 1a |.>....P.. .A....| +00000020 2b 78 43 79 d8 02 20 12 73 5b f2 9f d1 f8 4b 85 |+xCy.. .s[....K.| +00000030 23 91 28 1f 7f 95 14 09 93 83 92 1d 0d 7f 54 0c |#.(...........T.| +00000040 1f de 4c 17 d0 eb 93 |..L....| +[2788 05-20 18:20:59.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2789 05-20 18:20:59.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[278a 05-20 18:20:59.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[278b 05-20 18:20:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 principal evaluation succeeds for identity 0 +[278c 05-20 18:20:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004921450 gate 1589998859021118100 evaluation succeeds +[278d 05-20 18:20:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[278e 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[278f 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2790 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2791 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2792 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2793 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2794 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2795 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2796 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2797 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2798 05-20 18:20:59.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2799 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[279a 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[279b 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[279c 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[279d 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[279e 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[279f 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[27a0 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a1 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[27a2 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[27a3 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a4 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a5 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a6 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a7 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a8 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[27a9 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27aa 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[27ab 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27ac 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27ad 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27ae 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27af 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27b0 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b1 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27b2 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b3 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27b4 05-20 18:20:59.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b5 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27b6 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27b7 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b8 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27b9 05-20 18:20:59.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27ba 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27bb 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27bc 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[27bd 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[27be 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27bf 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[27c0 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27c1 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[27c2 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27c3 05-20 18:20:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[27c5 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[27c4 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[27c6 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[27c7 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[27c8 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[27c9 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[27ca 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[27cb 05-20 18:20:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27cc 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27cd 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27ce 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27cf 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27d0 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27d1 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27d2 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27d3 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 gate 1589998859592512600 evaluation starts +[27d4 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 signed by 0 principal evaluation starts (used [false]) +[27d5 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 processing identity 0 with bytes of 115a110 +[27d6 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 principal matched by identity 0 +[27d7 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[27d8 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc004967a50 principal evaluation succeeds for identity 0 +[27da 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967a50 gate 1589998859592512600 evaluation succeeds +[27db 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27dc 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27dd 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27de 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27df 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27e0 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27e1 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27e2 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27e3 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27e5 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27e6 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27e4 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +[27e7 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +[27e8 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +[27e9 05-20 18:20:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27ea 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 gate 1589998859602589000 evaluation starts +[27eb 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 signed by 0 principal evaluation starts (used [false]) +[27ec 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 processing identity 0 with bytes of 115a110 +[27ed 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 principal matched by identity 0 +[27ee 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[27ef 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[27f0 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 principal evaluation succeeds for identity 0 +[27f1 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004992c50 gate 1589998859602589000 evaluation succeeds +[27f2 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27f3 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27f4 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27f5 05-20 18:20:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27f6 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27f7 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[27f8 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27f9 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27fa 05-20 18:20:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27fb 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27fc 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27fd 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27fe 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27ff 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2800 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2801 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 gate 1589998859623465100 evaluation starts +[2802 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 signed by 0 principal evaluation starts (used [false]) +[2803 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 processing identity 0 with bytes of 115a110 +[2804 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 principal matched by identity 0 +[2805 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2806 05-20 18:20:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2807 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 principal evaluation succeeds for identity 0 +[2808 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049be0a0 gate 1589998859623465100 evaluation succeeds +[2809 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[280a 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[280b 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[280c 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[280d 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[280e 05-20 18:20:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[280f 05-20 18:20:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2810 05-20 18:20:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2811 05-20 18:20:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2812 05-20 18:20:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2813 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2814 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2815 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2816 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2817 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 gate 1589998859652184300 evaluation starts +[2818 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 signed by 0 principal evaluation starts (used [false]) +[2819 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 processing identity 0 with bytes of 115a110 +[281a 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 principal matched by identity 0 +[281b 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[281c 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0049bf990 principal evaluation succeeds for identity 0 +[281e 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049bf990 gate 1589998859652184300 evaluation succeeds +[281f 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2820 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2821 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2822 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2823 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2824 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2825 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2826 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2827 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2828 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2829 05-20 18:20:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[282a 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[282b 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[282c 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[282d 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[282e 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[282f 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2830 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 gate 1589998859664832700 evaluation starts +[2831 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 signed by 0 principal evaluation starts (used [false]) +[2832 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 processing identity 0 with bytes of 115a110 +[2833 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 principal matched by identity 0 +[2834 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2835 05-20 18:20:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0049dd4d0 principal evaluation succeeds for identity 0 +[2837 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dd4d0 gate 1589998859664832700 evaluation succeeds +[2838 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2839 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[283a 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[283b 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[283c 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[283d 05-20 18:20:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[283e 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[283f 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2840 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2841 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2842 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2843 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2844 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2845 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2846 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2847 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2848 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 gate 1589998859683448600 evaluation starts +[2849 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 signed by 0 principal evaluation starts (used [false]) +[284a 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 processing identity 0 with bytes of 115a110 +[284b 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 principal matched by identity 0 +[284c 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[284d 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[284e 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 principal evaluation succeeds for identity 0 +[284f 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049f94b0 gate 1589998859683448600 evaluation succeeds +[2850 05-20 18:20:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2851 05-20 18:20:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2852 05-20 18:20:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2853 05-20 18:20:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2854 05-20 18:20:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2855 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2856 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2857 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2858 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2859 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[285a 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[285b 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[285c 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[285d 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[285e 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[285f 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2860 05-20 18:20:59.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2861 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2862 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2863 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2864 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2865 05-20 18:20:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2866 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2867 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2868 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2869 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[286a 05-20 18:21:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[286b 05-20 18:21:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[286c 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[286d 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[286e 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[286f 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2870 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2871 05-20 18:21:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2872 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2873 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2874 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2875 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2876 05-20 18:21:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2877 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2878 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2879 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[287a 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[287b 05-20 18:21:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[287c 05-20 18:21:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[287d 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[287e 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[287f 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[2880 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2881 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +[2882 05-20 18:21:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +00000040 47 e0 a3 4a 24 d6 |G..J$.| +[2883 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2884 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 7b 40 97 64 c9 7c fc 4f 4f 59 90 |0D. 6{@.d.|.OOY.| +00000010 27 0c f2 46 a3 cf 27 a5 92 5b 0c 9e 10 77 95 45 |'..F..'..[...w.E| +00000020 c8 c3 a7 69 02 20 70 0e 7f b5 8a d2 af e9 89 55 |...i. p........U| +00000030 cb 00 f8 67 6c d2 f3 f7 ee e9 86 ba d7 e9 17 47 |...gl..........G| +00000040 a5 59 55 ab 85 9b |.YU...| +[2885 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2886 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[2887 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2888 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2889 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[288a 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[288b 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[288c 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[288d 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[288e 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[288f 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2890 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +[2891 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[2892 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[2893 05-20 18:21:00.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2894 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[2895 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[2896 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2897 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100D1801 +[2898 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 94FF3563E9AC6A3121B18E543AF52D9512993BC6F0B7D24D2368CE5BE602AB51 +[2899 05-20 18:21:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[289a 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[289b 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[289c 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[289d 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[289e 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[289f 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a0 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[28a1 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28a2 05-20 18:21:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a3 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[28a4 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[28a5 05-20 18:21:00.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[28a6 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a7 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a8 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a9 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28aa 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28ab 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28ac 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[28ad 05-20 18:21:00.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ae 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[28af 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[28b0 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[28b1 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[28b2 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[28b3 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[28b4 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[28b7 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28b5 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[28b8 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28b6 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[28b9 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ba 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28bb 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28bc 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28bd 05-20 18:21:00.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28be 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28bf 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28c0 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28c1 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28c2 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28c3 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28c4 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[28c5 05-20 18:21:00.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28c6 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[28c7 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[28c8 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28c9 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[28ca 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[28cb 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28cc 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[28cd 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[28ce 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[28cf 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[28d0 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[28d1 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[28d2 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 gate 1589998860866654900 evaluation starts +[28d3 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 signed by 0 principal evaluation starts (used [false]) +[28d4 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 processing identity 0 with bytes of 115a110 +[28d5 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 principal matched by identity 0 +[28d6 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +[28d7 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +00000040 da 1d a6 b8 a8 1b 7f |.......| +[28d8 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 principal evaluation succeeds for identity 0 +[28d9 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a80b00 gate 1589998860866654900 evaluation succeeds +[28da 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[28db 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[28dc 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[28dd 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[28de 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[28df 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[28e0 05-20 18:21:00.86 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[28e1 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[28e2 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[28e3 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28e4 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28e5 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28e6 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[28e7 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28e8 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28e9 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28ea 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[28eb 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\316\373\263\251P\021\244 \335A\342\311\357\032+xCy\330\002 \022s[\362\237\321\370K\205#\221(\037\177\225\024\t\223\203\222\035\r\177T\014\037\336L\027\320\353\223" > alive: +[28ec 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[28ed 05-20 18:21:00.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ee 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[28ef 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102A +[28f0 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9362A72BC007CC7F95DABC24928616878FC44CB0A8B0DB70D8144CC79B1DFDA2 +[28f1 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[28f2 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[28f3 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[28f4 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[28f5 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28f6 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[28f8 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28f7 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[28f9 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28fb 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[28fa 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[28fc 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28fd 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[28fe 05-20 18:21:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ff 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2900 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2901 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2902 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2903 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2904 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +[2905 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +[2906 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[2907 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce e9 ae cf 71 86 0b 98 40 b1 2a |0E.!.....q...@.*| +00000010 5b 89 df 24 63 ac 05 12 53 2e de 2a 71 0a 76 d2 |[..$c...S..*q.v.| +00000020 89 4c 0e 94 5c 02 20 11 59 c3 d3 b9 f1 16 1b af |.L..\. .Y.......| +00000030 ae 05 20 65 f5 cc e1 02 10 53 1f 53 0f 97 24 6f |.. e.....S.S..$o| +00000040 49 d8 42 f3 e6 ed 6e |I.B...n| +[2908 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2909 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[290a 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[290b 05-20 18:21:01.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[290c 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[290d 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[290e 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[290f 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2910 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2911 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2912 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2913 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2914 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2915 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2916 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2917 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2918 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 gate 1589998861021358300 evaluation starts +[2919 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 signed by 0 principal evaluation starts (used [false]) +[291a 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[291b 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[291c 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 processing identity 0 with bytes of 115a110 +[291d 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 principal matched by identity 0 +[291e 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 41 40 5c 2c 11 a2 45 9e d3 2d 17 79 94 17 30 |.A@\,..E..-.y..0| +00000010 93 55 34 72 1d e0 f1 91 17 39 52 c1 89 c7 23 7e |.U4r.....9R...#~| +[291f 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 0e cd a3 ac 70 b6 01 26 e7 38 |0E.!......p..&.8| +00000010 13 2e a0 43 ea 20 68 d8 37 c8 c1 7a 05 9d 44 db |...C. h.7..z..D.| +00000020 13 b5 a6 28 56 02 20 52 09 5a ca 85 61 db e2 33 |...(V. R.Z..a..3| +00000030 40 b2 da 2b c5 01 69 ad f0 d0 8b 24 64 24 d7 05 |@..+..i....$d$..| +00000040 da 1d a6 b8 a8 1b 7f |.......| +[2920 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 principal evaluation succeeds for identity 0 +[2921 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac6500 gate 1589998861021358300 evaluation succeeds +[2922 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2923 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2924 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2925 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2926 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2927 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2928 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2929 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +[292a 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +[292b 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[292c 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[292d 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[292e 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[292f 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +[2930 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +00000040 47 e0 a3 4a 24 d6 |G..J$.| +[2931 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2932 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2933 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2934 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2935 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2936 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 14 c9 b0 b9 dc 06 ac 36 7f ba 57 2d 6c 98 99 |........6..W-l..| +00000010 2c 5f 44 9a 14 b3 57 2e a8 46 0e cd d6 37 70 95 |,_D...W..F...7p.| +[2937 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 4d fd dd 04 ee 91 1c ac f2 f0 29 |0D. kM.........)| +00000010 f7 91 17 79 ba 72 40 bf 8c 96 f5 69 7c 1f 0c 4d |...y.r@....i|..M| +00000020 bd 47 5a 07 02 20 5a 1f bc d4 b2 e7 f8 85 4a 31 |.GZ.. Z.......J1| +00000030 71 ed 7a 45 57 a4 a0 b3 7e 85 14 af 8f 1c ca 1b |q.zEW...~.......| +00000040 47 e0 a3 4a 24 d6 |G..J$.| +[2939 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[293a 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[293b 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2938 05-20 18:21:01.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[293c 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 62 a7 2b c0 07 cc 7f 95 da bc 24 92 86 16 87 |.b.+.......$....| +00000010 8f c4 4c b0 a8 b0 db 70 d8 14 4c c7 9b 1d fd a2 |..L....p..L.....| +[293d 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b8 5e 70 d7 da 50 d5 00 73 65 ae |0E.!..^p..P..se.| +00000010 41 0a d8 ec 83 74 d5 58 16 d0 0d 33 55 90 17 10 |A....t.X...3U...| +00000020 2e 2a 15 aa cc 02 20 4e b5 83 89 39 26 0e e2 95 |.*.... N...9&...| +00000030 ae 2c f2 1c d0 0d bb 8e f3 54 6b 55 6b 4d 3d d2 |.,.......TkUkM=.| +00000040 23 ee 70 7a 5d eb d3 |#.pz]..| +[293e 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[293f 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2940 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2941 05-20 18:21:01.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2942 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2943 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2944 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2945 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2946 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2947 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2948 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2949 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[294a 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[294b 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[294c 05-20 18:21:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[294d 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[294e 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[294f 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2950 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2951 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2952 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2953 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2954 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2955 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2956 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2957 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2958 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2959 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 gate 1589998861162924000 evaluation starts +[295a 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 signed by 0 principal evaluation starts (used [false]) +[295b 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 processing identity 0 with bytes of 115a110 +[295c 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 principal matched by identity 0 +[295d 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c2 49 b4 94 19 ac 01 e0 9c bf d9 ad 7f 6b dc 81 |.I...........k..| +00000010 91 0f 1a eb 2d d4 8c df 09 9a b6 5a 12 b8 59 e8 |....-......Z..Y.| +[295e 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 70 e7 1e d9 c9 83 30 29 6e 49 42 |0D. p.....0)nIB| +00000010 af 5d 2b 71 c7 6f 15 fc ce 10 50 15 7f e2 1b 67 |.]+q.o....P....g| +00000020 f3 04 ae e0 02 20 44 78 31 d6 0d 50 0c ea 5a b2 |..... Dx1..P..Z.| +00000030 b2 90 45 f0 b3 a6 de 01 67 fe 77 95 b2 80 d3 4a |..E.....g.w....J| +00000040 ed b4 ac cf 07 b5 |......| +[295f 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 principal evaluation succeeds for identity 0 +[2960 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac74b0 gate 1589998861162924000 evaluation succeeds +[2961 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2962 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2963 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2964 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2965 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2966 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2967 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2968 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2969 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[296a 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[296b 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[296c 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[296d 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[296e 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[296f 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2970 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2971 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2972 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2973 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2974 05-20 18:21:01.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2975 05-20 18:21:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is # examples/chaincode/go/chaincode_example02 +/tmp/go-link-893163648/000001.o: In function `pluginOpen': +/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-893163648/000021.o: In function `mygetgrouplist': +/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-893163648/000020.o: In function `mygetgrgid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-893163648/000020.o: In function `mygetgrnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-893163648/000020.o: In function `mygetpwnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-893163648/000020.o: In function `mygetpwuid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-893163648/000006.o: In function `_cgo_7e1b3c2abc8d_C2func_getaddrinfo': +/tmp/go-build/cgo-gcc-prolog:57: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +[2976 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2977 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2978 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2979 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[297a 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[297b 05-20 18:21:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b ab 66 01 c3 50 4d 84 f5 de f4 13 8b 08 c0 74 |K.f..PM........t| +00000010 cb b3 c5 21 22 6c 2f 80 86 ad f2 1c 0f 02 9e 28 |...!"l/........(| +[297c 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 21 7b 3e b7 a0 15 80 2f f8 86 69 |0D. [!{>..../..i| +00000010 57 47 2a 89 fd 28 6c ac 67 6e a7 e2 3e 9a a6 80 |WG*..(l.gn..>...| +00000020 75 ce 4e ef 02 20 19 0f 49 17 b3 92 a8 4d a5 7a |u.N.. ..I....M.z| +00000030 3c e0 85 17 e2 99 a8 f4 cb 36 af f7 3f 56 e4 8d |<........6..?V..| +00000040 09 83 0f 9f 3e 54 |....>T| +[297d 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[297e 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[297f 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2980 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2981 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2982 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2983 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2984 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2985 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2986 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2987 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2988 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2989 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[298a 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[298b 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[298c 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[298d 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[298e 05-20 18:21:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[298f 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2990 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2991 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2992 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2993 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2994 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2995 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2996 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2997 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2998 05-20 18:21:03.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2999 05-20 18:21:03.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[299a 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[299b 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[299c 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[299d 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[299e 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[299f 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29a0 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29a1 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29a2 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[29a3 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[29a4 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29a5 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29a6 05-20 18:21:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29a7 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[29a8 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[29a9 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[29aa 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[29ab 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[29ac 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[29ad 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 gate 1589998863584217100 evaluation starts +[29ae 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 signed by 0 principal evaluation starts (used [false]) +[29af 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 processing identity 0 with bytes of 115a110 +[29b0 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 principal matched by identity 0 +[29b1 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[29b2 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[29b3 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 principal evaluation succeeds for identity 0 +[29b4 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8b9e0 gate 1589998863584217100 evaluation succeeds +[29b5 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[29b6 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[29b7 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[29b8 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[29b9 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[29ba 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[29bb 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29bc 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29bd 05-20 18:21:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[29c0 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[29c1 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[29c2 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[29c3 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[29c4 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[29c5 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 gate 1589998863593090800 evaluation starts +[29c6 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 signed by 0 principal evaluation starts (used [false]) +[29c7 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 processing identity 0 with bytes of 115a110 +[29c8 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 principal matched by identity 0 +[29c9 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[29ca 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e555f0 principal evaluation succeeds for identity 0 +[29cc 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e555f0 gate 1589998863593090800 evaluation succeeds +[29be 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[29bf 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[29cd 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[29ce 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[29cf 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[29d0 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[29d1 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[29d2 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[29d3 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29d4 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[29d5 05-20 18:21:03.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29d6 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29d7 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29d8 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[29d9 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[29da 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[29db 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[29dc 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[29dd 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[29de 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 gate 1589998863602203100 evaluation starts +[29df 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 signed by 0 principal evaluation starts (used [false]) +[29e0 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 processing identity 0 with bytes of 115a110 +[29e1 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 principal matched by identity 0 +[29e2 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[29e3 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003e27150 principal evaluation succeeds for identity 0 +[29e5 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27150 gate 1589998863602203100 evaluation succeeds +[29e6 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[29e7 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[29e8 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[29e9 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[29ea 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[29eb 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[29ec 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[29ed 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[29ee 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29ef 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29f0 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[29f1 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[29f2 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[29f3 05-20 18:21:03.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[29f4 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[29f5 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[29f6 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 gate 1589998863610623600 evaluation starts +[29f7 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 signed by 0 principal evaluation starts (used [false]) +[29f8 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 processing identity 0 with bytes of 115a110 +[29f9 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 principal matched by identity 0 +[29fa 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[29fb 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[29fc 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 principal evaluation succeeds for identity 0 +[29fd 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1f160 gate 1589998863610623600 evaluation succeeds +[29fe 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[29ff 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a00 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a01 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a02 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a03 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2a04 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2a05 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2a06 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2a07 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2a08 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a09 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a0a 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a0b 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a0c 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a0d 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a0e 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a0f 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a10 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 gate 1589998863619645900 evaluation starts +[2a11 05-20 18:21:03.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 signed by 0 principal evaluation starts (used [false]) +[2a12 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 processing identity 0 with bytes of 115a110 +[2a13 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 principal matched by identity 0 +[2a14 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2a15 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003dfb2e0 principal evaluation succeeds for identity 0 +[2a17 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfb2e0 gate 1589998863619645900 evaluation succeeds +[2a18 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a19 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a1a 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a1b 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a1c 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a1d 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a1e 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a1f 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a20 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a21 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a22 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a23 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a24 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 gate 1589998863621161900 evaluation starts +[2a25 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 signed by 0 principal evaluation starts (used [false]) +[2a26 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 processing identity 0 with bytes of 115a110 +[2a27 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 principal matched by identity 0 +[2a28 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2a29 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2a2a 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 principal evaluation succeeds for identity 0 +[2a2b 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd65c0 gate 1589998863621161900 evaluation succeeds +[2a2c 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a2d 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a2e 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a2f 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a30 05-20 18:21:03.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a31 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a32 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a33 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a34 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a35 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2a36 05-20 18:21:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a37 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a38 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a39 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a3a 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a3b 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a3c 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a3d 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 gate 1589998863686410700 evaluation starts +[2a3e 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 signed by 0 principal evaluation starts (used [false]) +[2a3f 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 processing identity 0 with bytes of 115a110 +[2a40 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 principal matched by identity 0 +[2a41 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 79 dd 11 27 ae a5 5c d3 41 99 e1 2d 78 96 fc |dy..'..\.A..-x..| +00000010 02 92 52 d8 37 b0 04 7e c8 20 48 5b 3b e7 01 90 |..R.7..~. H[;...| +[2a42 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 a3 40 f1 8c 72 2c 60 aa 44 24 30 |0D. '.@..r,`.D$0| +00000010 92 b2 85 f0 87 e3 d4 91 5f 8a 45 8e d1 26 fa 2f |........_.E..&./| +00000020 ef f6 20 83 02 20 0a 30 d1 82 2e 34 4b 1a 49 27 |.. .. .0...4K.I'| +00000030 db d2 ea c0 a7 d9 c8 c5 5f be 71 cb b7 6d 8a 55 |........_.q..m.U| +00000040 fc 7c bf 1c df c6 |.|....| +[2a43 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 principal evaluation succeeds for identity 0 +[2a44 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2c6d0 gate 1589998863686410700 evaluation succeeds +[2a45 05-20 18:21:03.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a46 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a47 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a48 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a49 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a4a 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2a4b 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2a4c 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2a4d 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2a4e 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a4f 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a50 05-20 18:21:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a51 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a52 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a53 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a54 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a55 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a56 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a57 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2a58 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a59 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a5a 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2a5b 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a5c 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a5d 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a5e 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a5f 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a60 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a61 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a62 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a63 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a64 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a65 05-20 18:21:03.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a66 05-20 18:21:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a67 05-20 18:21:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2a68 05-20 18:21:03.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a69 05-20 18:21:03.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[2a6a 05-20 18:21:03.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a6b 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a6c 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2a6d 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a6e 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a6f 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2a70 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2a71 05-20 18:21:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a72 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2a73 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2a74 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2a75 05-20 18:21:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a76 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2a77 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2a78 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a79 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a7a 05-20 18:21:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a7b 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a7c 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a7d 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a7e 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a7f 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2a80 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a81 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a82 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a83 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a84 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a85 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a86 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a87 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 gate 1589998863909236000 evaluation starts +[2a88 05-20 18:21:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 signed by 0 principal evaluation starts (used [false]) +[2a89 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 processing identity 0 with bytes of 115a110 +[2a8a 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 principal matched by identity 0 +[2a8b 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 44 a6 09 a1 27 0f 76 20 b2 32 88 4a b0 60 a4 |.D...'.v .2.J.`.| +00000010 d2 e8 ab 8c 95 60 43 3c 59 d9 cd b5 39 af 00 5e |.....`C DEBU Verify: sig = 00000000 30 45 02 21 00 f1 82 df af 16 73 79 86 19 f5 ae |0E.!......sy....| +00000010 b6 f1 66 55 44 7c 0e 65 50 6e 8f 35 30 de 70 df |..fUD|.ePn.50.p.| +00000020 89 2b e0 a1 15 02 20 36 6c 17 a1 4e 3f 96 2e fe |.+.... 6l..N?...| +00000030 63 04 d4 e2 c3 ac 4f d2 db 35 e1 41 46 74 e6 7b |c.....O..5.AFt.{| +00000040 ab bb 5a bd c6 9e dc |..Z....| +[2a8d 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 principal evaluation succeeds for identity 0 +[2a8e 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d214f0 gate 1589998863909236000 evaluation succeeds +[2a8f 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a90 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a91 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a92 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a93 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a94 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2a95 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2a96 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2a97 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2a98 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a99 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a9a 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a9b 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a9c 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a9d 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a9e 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a9f 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2aa0 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2aa1 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2aa2 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2aa3 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2aa4 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2aa5 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aa6 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2aa7 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aa8 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aa9 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2aaa 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aab 05-20 18:21:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2aac 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aad 05-20 18:21:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2aae 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aaf 05-20 18:21:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ab0 05-20 18:21:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ab1 05-20 18:21:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ab2 05-20 18:21:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ab3 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2ab4 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102B +[2ab5 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 089974BE002399E7430E6330A345ADDA64C1696E6CD5DBB741DC87AECBEC80DD +[2ab6 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2ab7 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2ab8 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2ab9 05-20 18:21:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2aba 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2abb 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2abc 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[2abd 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2abe 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2abf 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ac0 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2ac1 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2ac2 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ac3 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2ac4 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ac5 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2ac6 05-20 18:21:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ac7 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2ac8 05-20 18:21:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2ac9 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2aca 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2acb 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2acc 05-20 18:21:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2acd 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2ace 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2acf 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ad0 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ad1 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ad2 05-20 18:21:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ad3 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2ad4 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2ad5 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2ad6 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2ad7 05-20 18:21:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ad8 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2ad9 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2ada 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2adb 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2adc 05-20 18:21:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2add 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > > , Envelope: 270 bytes, Signature: 0 bytes +[2ade 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > > , Envelope: 270 bytes, Signature: 0 bytes +[2adf 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ae0 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > > , Envelope: 270 bytes, Signature: 0 bytes +[2ae1 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2ae2 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +[2ae3 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +00000040 b1 ad 93 da a3 d9 |......| +[2ae4 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2ae5 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 8c 2c 1a fe 0e a5 35 3e f7 a6 8f |0D. ..,....5>...| +00000010 b9 d9 d1 5e 28 f6 00 d3 bb fb 14 62 67 97 6a b6 |...^(......bg.j.| +00000020 4f b5 f5 4a 02 20 64 2b 43 19 96 04 38 c7 5c 10 |O..J. d+C...8.\.| +00000030 23 23 b8 f0 b8 a5 21 25 25 b7 2a e4 f6 32 5b f2 |##....!%%.*..2[.| +00000040 da c7 77 a5 67 c9 |..w.g.| +[2ae6 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2ae7 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[2ae8 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2ae9 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2aea 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2aeb 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2aec 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2aed 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2aee 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2aef 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af0 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af1 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +[2af2 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\367\246\217\271\331\321^(\366\000\323\273\373\024bg\227j\266O\265\365J\002 d+C\031\226\0048\307\\\020##\270\360\270\245!%%\267*\344\3662[\362\332\307w\245g\311" > > alive: +[2af3 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[2af4 05-20 18:21:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2af5 05-20 18:21:04.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2af6 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2af7 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2af8 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2af9 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2afa 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2afb 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2afc 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2afd 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2afe 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2aff 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2b00 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b01 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2b02 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2b03 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2b04 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2b05 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b06 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b07 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b08 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b09 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b0a 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b0b 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2b0c 05-20 18:21:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b0d 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2b0e 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b0f 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2b10 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2b11 05-20 18:21:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b12 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b13 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b14 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b15 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b16 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b17 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b18 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 gate 1589998864902202500 evaluation starts +[2b19 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 signed by 0 principal evaluation starts (used [false]) +[2b1a 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 processing identity 0 with bytes of 115a110 +[2b1b 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 principal matched by identity 0 +[2b1c 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +[2b1d 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +00000040 25 c7 a9 62 01 f4 |%..b..| +[2b1e 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 principal evaluation succeeds for identity 0 +[2b1f 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c1c560 gate 1589998864902202500 evaluation succeeds +[2b20 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b21 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b22 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b23 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b24 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b25 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2b26 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2b27 05-20 18:21:04.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2b28 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2b29 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b2a 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b2b 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b2c 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2b2d 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2e 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2f 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b30 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2b31 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2b32 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2b33 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b34 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2b35 05-20 18:21:04.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2b36 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2b37 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b38 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2b39 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2b3a 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2b3b 05-20 18:21:04.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b3c 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2b3d 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2b3e 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2b3f 05-20 18:21:04.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b40 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2b41 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102C +[2b42 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 595F1CCB1B9783D3769ED4A6F2F0F618FCA5BBD433669101BD6BB21FCCCB0E38 +[2b43 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2b44 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2b45 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2b46 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[2b47 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b48 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2b49 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b4a 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2b4b 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2b4c 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b4d 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[2b4e 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b4f 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2b50 05-20 18:21:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b51 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2b52 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2b53 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b54 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2b55 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2b56 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +[2b57 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +[2b58 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[2b59 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee c7 f2 87 fc b1 5c 59 0c 33 98 |0E.!.......\Y.3.| +00000010 c2 4d 5a 5f 83 40 bc fc e3 5e a8 4c 1b bc 72 32 |.MZ_.@...^.L..r2| +00000020 05 dc 1e 50 3f 02 20 2e 3f 1d a4 87 df df ba c6 |...P?. .?.......| +00000030 a3 32 d9 63 cb 69 9d 73 91 c8 b6 b5 3c 03 a8 d6 |.2.c.i.s....<...| +00000040 d9 7e 28 4c f5 9d b1 |.~(L...| +[2b5a 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2b5b 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2b5c 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b5d 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b5e 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2b5f 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2b60 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b61 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2b62 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2b63 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b64 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b65 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b66 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b67 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b68 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b69 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b6a 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 gate 1589998865019008200 evaluation starts +[2b6b 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 signed by 0 principal evaluation starts (used [false]) +[2b6c 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 processing identity 0 with bytes of 115a110 +[2b6d 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 principal matched by identity 0 +[2b6e 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 c5 18 b4 c0 96 f2 21 05 ba 97 5d 2d 64 ab d1 |e......!...]-d..| +00000010 6f f7 b0 8e 1c 79 75 d9 ce f9 c2 78 43 95 85 28 |o....yu....xC..(| +[2b6f 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 75 74 43 35 59 68 5b ca 1c 13 4b |0D. 8utC5Yh[...K| +00000010 37 e4 32 a6 3b b9 84 5e 92 9c a5 85 0b 13 83 e0 |7.2.;..^........| +00000020 d2 c9 76 f8 02 20 7d 56 8f 6c cc e8 51 da 54 5a |..v.. }V.l..Q.TZ| +00000030 80 d7 a6 4d a9 17 97 62 df e2 f7 f8 2a d8 de ba |...M...b....*...| +00000040 25 c7 a9 62 01 f4 |%..b..| +[2b70 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 principal evaluation succeeds for identity 0 +[2b71 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5bb40 gate 1589998865019008200 evaluation succeeds +[2b72 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b73 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b74 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b75 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b76 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b77 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b78 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2b79 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +[2b7a 05-20 18:21:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +[2b7b 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b7c 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b7d 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b7e 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2b7f 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +[2b80 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +00000040 b1 ad 93 da a3 d9 |......| +[2b81 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b82 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b83 05-20 18:21:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b84 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2b85 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2b86 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2b87 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b88 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b89 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b8a 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b8b 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b8c 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b8d 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2b8e 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b8f 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2b90 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2b91 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b92 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2b93 05-20 18:21:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2b94 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 11 dc 30 a1 6f e6 0c 75 e7 78 62 d2 3b 27 bc |...0.o..u.xb.;'.| +00000010 c6 c5 dd 21 3d 68 96 3f 73 2d bd cd 03 12 04 95 |...!=h.?s-......| +[2b95 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d f1 0c cc 11 25 f5 95 26 08 f4 ae |0D. M....%..&...| +00000010 84 53 9f cc 6e ef ea a3 71 e4 76 2c 9f b3 6c 43 |.S..n...q.v,..lC| +00000020 6c 3a 49 59 02 20 6e b7 0d 91 b7 63 1e 2c 70 b5 |l:IY. n....c.,p.| +00000030 43 d3 31 fe 1a 66 6e e9 00 4f e7 12 9e 70 08 5f |C.1..fn..O...p._| +00000040 b1 ad 93 da a3 d9 |......| +[2b96 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b97 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b98 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2b99 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 59 5f 1c cb 1b 97 83 d3 76 9e d4 a6 f2 f0 f6 18 |Y_......v.......| +00000010 fc a5 bb d4 33 66 91 01 bd 6b b2 1f cc cb 0e 38 |....3f...k.....8| +[2b9a 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa 5c 27 ab ee 09 8c 9c b6 6c 91 |0E.!..\'......l.| +00000010 a9 50 1e 1c a7 82 73 3a c7 23 6c 2c ad ce a0 cb |.P....s:.#l,....| +00000020 64 cd 24 f5 6d 02 20 08 d9 98 b4 12 c1 8b b4 29 |d.$.m. ........)| +00000030 66 23 61 81 63 e6 6d 81 26 00 f6 6d da 5e 0e e3 |f#a.c.m.&..m.^..| +00000040 f2 d0 a1 4f 79 d6 48 |...Oy.H| +[2b9b 05-20 18:21:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b9c 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b9d 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b9e 05-20 18:21:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b9f 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2ba0 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2ba1 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ba2 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2ba3 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2ba4 05-20 18:21:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ba5 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2ba6 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ba7 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2ba8 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ba9 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2baa 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2bab 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 gate 1589998865211667200 evaluation starts +[2bac 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 signed by 0 principal evaluation starts (used [false]) +[2bad 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 processing identity 0 with bytes of 115a110 +[2bae 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 principal matched by identity 0 +[2baf 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4e ea e7 a9 e4 3b f6 4c 73 8e 01 af 9d f2 b2 |;N....;.Ls......| +00000010 56 1f a7 0c 28 27 18 76 63 0b 4f 35 92 63 78 26 |V...('.vc.O5.cx&| +[2bb0 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 8c 21 4b d6 64 c6 02 f9 13 8d 47 |0D. v.!K.d.....G| +00000010 35 b7 ef ba 4a c7 aa d5 51 dd a7 5f b6 e3 18 44 |5...J...Q.._...D| +00000020 bc 82 36 a9 02 20 47 0f 37 bd 06 54 93 8c f7 85 |..6.. G.7..T....| +00000030 f9 4f 98 df 9c b6 0f 0c b1 72 45 58 f0 bb 42 22 |.O.......rEX..B"| +00000040 2f 6a 21 87 9e d1 |/j!...| +[2bb1 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 principal evaluation succeeds for identity 0 +[2bb2 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9cf00 gate 1589998865211667200 evaluation succeeds +[2bb3 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2bb4 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2bb5 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2bb6 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2bb7 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bb8 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2bb9 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2bba 05-20 18:21:05.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2bbb 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2bbc 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bbd 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bbe 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bbf 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[2bc0 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc1 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc2 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc3 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[2bc4 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2bc5 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[2bc6 05-20 18:21:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bc7 05-20 18:21:05.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[2bc8 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[2bc9 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2bca 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100E1801 +[2bcb 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0332D51B7AE0DF028CBD59832DC67088A7A35609B96105CE0952BCB0CA5FB800 +[2bcc 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[2bcd 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bce 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bcf 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd0 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd1 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[2bd2 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd3 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd4 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[2bd5 05-20 18:21:05.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bd6 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd7 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd8 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2bd9 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2bda 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2bdb 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bdc 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bdd 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2bde 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bdf 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2be0 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2be1 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2be2 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2be3 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2be4 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2be5 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2be6 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2be7 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2be8 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2be9 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2bea 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2beb 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2bec 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2bed 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2bee 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 gate 1589998867576300900 evaluation starts +[2bef 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 signed by 0 principal evaluation starts (used [false]) +[2bf0 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 processing identity 0 with bytes of 115a110 +[2bf1 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 principal matched by identity 0 +[2bf2 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2bf3 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00391b920 principal evaluation succeeds for identity 0 +[2bf5 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391b920 gate 1589998867576300900 evaluation succeeds +[2bf6 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2bf7 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2bf8 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2bf9 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2bfa 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bfb 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bfc 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2bfd 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2bfe 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2bff 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c00 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c01 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c02 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 gate 1589998867578665300 evaluation starts +[2c03 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 signed by 0 principal evaluation starts (used [false]) +[2c04 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 processing identity 0 with bytes of 115a110 +[2c05 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 principal matched by identity 0 +[2c06 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2c07 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2c08 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 principal evaluation succeeds for identity 0 +[2c09 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003836c40 gate 1589998867578665300 evaluation succeeds +[2c0a 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c0b 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c0c 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c0d 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c0e 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c0f 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2c10 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c11 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c12 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c13 05-20 18:21:07.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c14 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c15 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c16 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c17 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c18 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c19 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 gate 1589998867580266000 evaluation starts +[2c1a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 signed by 0 principal evaluation starts (used [false]) +[2c1b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 processing identity 0 with bytes of 115a110 +[2c1c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 principal matched by identity 0 +[2c1d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2c1e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2c1f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 principal evaluation succeeds for identity 0 +[2c20 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038301c0 gate 1589998867580266000 evaluation succeeds +[2c21 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c22 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c23 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c24 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c25 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2c26 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2c27 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c28 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c29 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c2a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c2b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c2c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c2d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c2e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c2f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 gate 1589998867582695500 evaluation starts +[2c30 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 signed by 0 principal evaluation starts (used [false]) +[2c31 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 processing identity 0 with bytes of 115a110 +[2c32 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 principal matched by identity 0 +[2c33 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2c34 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003831bd0 principal evaluation succeeds for identity 0 +[2c36 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003831bd0 gate 1589998867582695500 evaluation succeeds +[2c37 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c38 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c39 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c3a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c3b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2c3c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2c3d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2c3e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c3f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2c40 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c41 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c42 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c43 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c44 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c45 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c46 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c47 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c48 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c49 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 gate 1589998867584973800 evaluation starts +[2c4a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 signed by 0 principal evaluation starts (used [false]) +[2c4b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 processing identity 0 with bytes of 115a110 +[2c4c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 principal matched by identity 0 +[2c4d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2c4e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0037df720 principal evaluation succeeds for identity 0 +[2c50 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037df720 gate 1589998867584973800 evaluation succeeds +[2c51 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c52 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c53 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c54 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c55 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2c56 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2c57 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2c58 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2c59 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c5a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c5b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c5c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c5d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c5e 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c5f 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c60 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c61 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 gate 1589998867587684700 evaluation starts +[2c62 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 signed by 0 principal evaluation starts (used [false]) +[2c63 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 processing identity 0 with bytes of 115a110 +[2c64 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 principal matched by identity 0 +[2c65 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2c66 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2c67 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 principal evaluation succeeds for identity 0 +[2c68 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003773720 gate 1589998867587684700 evaluation succeeds +[2c69 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c6a 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c6b 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c6c 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c6d 05-20 18:21:07.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c6e 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6f 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c70 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2c71 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c72 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c73 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2c74 05-20 18:21:07.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2c75 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c76 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2c77 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2c78 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2c79 05-20 18:21:07.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c7a 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2c7b 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2c7c 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c7d 05-20 18:21:07.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c7e 05-20 18:21:07.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c7f 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2c80 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2c81 05-20 18:21:08.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c82 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c83 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c84 05-20 18:21:08.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c85 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c86 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c87 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c88 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c89 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2c8a 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 5e 6c 7c 2f d7 44 b1 cc 2c ab 28 a1 ac 76 67 |f^l|/.D..,.(..vg| +00000010 a7 2f 23 b3 3e 98 07 78 81 6f 9b 25 9b 98 93 86 |./#.>..x.o.%....| +[2c8b 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 ae 0b 6a 17 54 ab 33 82 e3 7e |0E.!....j.T.3..~| +00000010 bf ba 15 32 0d ba f5 85 c7 69 10 8f 28 17 73 19 |...2.....i..(.s.| +00000020 a0 00 4b 56 49 02 20 09 21 95 2f c1 56 29 da cf |..KVI. .!./.V)..| +00000030 5f 84 ac 23 64 f1 ab 0b e9 98 46 87 b3 40 3a 60 |_..#d.....F..@:`| +00000040 fa f9 49 b8 1c b9 67 |..I...g| +[2c8c 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c8d 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2c8e 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2c8f 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2c90 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2c91 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c92 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c93 05-20 18:21:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c94 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c95 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c96 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c97 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2c98 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c99 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c9a 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c9b 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2c9c 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c9d 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c9e 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c9f 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ca0 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ca1 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ca2 05-20 18:21:08.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ca3 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ca4 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ca5 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ca6 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ca7 05-20 18:21:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ca8 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2ca9 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2caa 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cab 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cac 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cad 05-20 18:21:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cae 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2caf 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2cb0 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2cb1 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2cb2 05-20 18:21:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cb3 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2cb4 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2cb5 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2cb6 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2cb7 05-20 18:21:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cb8 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[2cb9 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[2cba 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cbb 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[2cbc 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2cbd 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +[2cbe 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +00000040 aa 6c 6c 08 50 44 |.ll.PD| +[2cbf 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2cc0 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 61 9f 42 4c 38 47 4f 62 bc 24 |0E.!..a.BL8GOb.$| +00000010 96 2f fa b1 21 34 f8 fd bc 85 94 9f d1 20 8d e6 |./..!4....... ..| +00000020 ba b4 74 ba 99 02 20 7c 9c 3a 2b c8 17 05 0e 48 |..t... |.:+....H| +00000030 54 95 b8 76 f4 d7 f6 7b 84 dc 07 65 0e 39 c2 ec |T..v...{...e.9..| +00000040 b6 30 70 ce fb a5 0c |.0p....| +[2cc1 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2cc2 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2cc3 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2cc4 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2cc5 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2cc6 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cc7 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cc8 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cc9 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2cca 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ccb 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ccc 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[2ccd 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[2cce 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2ccf 05-20 18:21:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cd0 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cd1 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cd2 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cd3 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cd4 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2cd5 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cd6 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2cd7 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2cd8 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2cd9 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2cda 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2cdb 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2cdc 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 gate 1589998868683037100 evaluation starts +[2cdd 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 signed by 0 principal evaluation starts (used [false]) +[2cde 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 processing identity 0 with bytes of 115a110 +[2cdf 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 principal matched by identity 0 +[2ce0 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 41 ce eb 92 77 7b 35 6e 91 56 13 55 2b c8 ec |.A...w{5n.V.U+..| +00000010 ee be 04 d3 2d db 61 f8 37 23 08 40 98 4a ec df |....-.a.7#.@.J..| +[2ce1 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d 20 39 e5 9a a4 2d 7f 71 ac 45 19 |0D. - 9...-.q.E.| +00000010 04 4f 7f f9 3b 84 8a 8a 8b c4 e1 ab e3 3c 57 f6 |.O..;........ DEBU 0xc003741500 principal evaluation succeeds for identity 0 +[2ce3 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003741500 gate 1589998868683037100 evaluation succeeds +[2ce4 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2ce5 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ce6 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ce7 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ce8 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2ce9 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2cea 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2ceb 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2cec 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2ced 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cee 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cef 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cf0 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf1 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf2 05-20 18:21:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf3 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf4 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf5 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf6 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf7 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2cf8 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf9 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2cfa 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cfb 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cfc 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cfd 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cfe 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cff 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2d00 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d01 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2d02 05-20 18:21:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d03 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2d04 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2d05 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d06 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2d07 05-20 18:21:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d08 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2d09 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2d0a 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2d0b 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d0c 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d0d 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d0e 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d0f 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d10 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d11 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2d12 05-20 18:21:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d13 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +[2d14 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +[2d15 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d16 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\300\215_8pQ\253" > > , Envelope: 166 bytes, Signature: 0 bytes +[2d17 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2d18 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d19 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d1a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d1b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d1c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d1d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d1e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d1f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2d20 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 gate 1589998868886362600 evaluation starts +[2d21 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 signed by 0 principal evaluation starts (used [false]) +[2d22 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2d23 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 processing identity 0 with bytes of 115a110 +[2d24 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2d25 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 principal matched by identity 0 +[2d26 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2d27 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +[2d28 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2d29 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +[2d2a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2d2b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2d2c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d2d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 principal evaluation succeeds for identity 0 +[2d2e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f7d70 gate 1589998868886362600 evaluation succeeds +[2d2f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2d30 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d31 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d32 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d33 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d34 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d35 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2d36 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d37 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d38 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2d39 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2d3a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2d3b 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2d3c 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d3d 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d3e 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d3f 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2d40 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d41 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d42 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d43 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2d44 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\300\215_8pQ\253" > alive: alive: +[2d45 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2d46 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d47 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d48 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d49 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d4a 05-20 18:21:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d4b 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d4c 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d4d 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d4e 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d4f 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d50 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d51 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2d52 05-20 18:21:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d53 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d54 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d55 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d56 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d57 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2d58 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d59 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d5a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d5b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d5c 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d5d 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d5e 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d5f 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 gate 1589998868907304000 evaluation starts +[2d60 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 signed by 0 principal evaluation starts (used [false]) +[2d61 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 processing identity 0 with bytes of 115a110 +[2d62 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 principal matched by identity 0 +[2d63 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad ad 2b 75 1e ad 78 e0 e3 62 e3 f2 d3 83 b7 66 |..+u..x..b.....f| +00000010 2d 27 c3 08 fb 78 71 67 31 56 65 d7 50 c6 99 c8 |-'...xqg1Ve.P...| +[2d64 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 0e 74 ab 02 3d e2 f5 2c ff d9 |0E.!...t..=..,..| +00000010 7a c7 ea 8e bb 0f fe c6 e3 74 6f b3 55 a8 f4 22 |z........to.U.."| +00000020 46 c4 6a 09 05 02 20 30 66 93 fb 65 cf e7 b0 cf |F.j... 0f..e....| +00000030 7c 9e a1 cd f2 d6 77 2c e0 8a fd ad 73 5c e6 68 ||.....w,....s\.h| +00000040 04 28 2e ed 6a 3c c6 |.(..j<.| +[2d65 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 principal evaluation succeeds for identity 0 +[2d66 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00368d0d0 gate 1589998868907304000 evaluation succeeds +[2d67 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d68 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d69 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d6a 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d6b 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d6c 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2d6d 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2d6e 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2d6f 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2d70 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d71 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d72 05-20 18:21:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d73 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d74 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d75 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d76 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d77 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d78 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d79 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2d7a 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d7b 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d7c 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2d7d 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d7f 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d7e 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d80 05-20 18:21:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d81 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d82 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d83 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d84 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d85 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d86 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d87 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d88 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d89 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d8a 05-20 18:21:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d8b 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2d8c 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102D +[2d8d 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 29FFAC9606D480AF71FF81D7A474FCE03C63AA893C8668D5357F9D95BF7C1537 +[2d8e 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2d8f 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2d90 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2d91 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d92 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2d93 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d94 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2d95 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2d96 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d97 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[2d98 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[2d99 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d9a 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2d9b 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d9c 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2d9d 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2d9e 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d9f 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2da0 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2da1 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +[2da3 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[2da4 05-20 18:21:09.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 79 47 74 6e 24 a6 15 c9 cc dd 6e |0D. NyGtn$.....n| +00000010 e9 9e f4 bb 7e 37 d5 f2 48 7a 19 af ba 33 c3 e5 |....~7..Hz...3..| +00000020 ec 83 25 4e 02 20 37 80 00 eb 8d 1a 89 28 15 f4 |..%N. 7......(..| +00000030 40 dc 84 a9 3b eb 46 71 e1 d9 56 a4 33 56 4b 6a |@...;.Fq..V.3VKj| +00000040 dc 69 9f cd 4d 61 |.i..Ma| +[2da5 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2da6 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2da7 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2da8 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2da9 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2daa 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2dab 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dac 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2dad 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2dae 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2daf 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2db0 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2db1 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2db2 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2db3 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2db4 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2db5 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 gate 1589998869012861700 evaluation starts +[2db6 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 signed by 0 principal evaluation starts (used [false]) +[2db7 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 processing identity 0 with bytes of 115a110 +[2db8 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 principal matched by identity 0 +[2db9 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e e4 61 7d 87 5d 2c fa 78 e5 d3 e8 9f 8e 79 99 |..a}.],.x.....y.| +00000010 91 33 53 e8 e7 98 ee 20 0c 33 54 50 44 f3 77 7a |.3S.... .3TPD.wz| +[2dba 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 6a a4 9b aa ea 75 2d 56 f9 2f |0E.!..j....u-V./| +00000010 a9 45 87 17 80 97 14 2d 88 9e c4 5c 74 3d 4a 8f |.E.....-...\t=J.| +00000020 16 20 a9 b0 d1 02 20 24 92 67 9c da f7 cc 10 61 |. .... $.g.....a| +00000030 ad 95 9d fd e8 a4 ce 56 b8 61 af a1 46 a6 99 3e |.......V.a..F..>| +00000040 c0 8d 5f 38 70 51 ab |.._8pQ.| +[2dbb 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 principal evaluation succeeds for identity 0 +[2dbc 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337f050 gate 1589998869012861700 evaluation succeeds +[2dbd 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2dbe 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2dbf 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2dc0 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2dc1 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dc2 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dc3 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2dc4 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +[2dc6 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dc7 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dc8 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dc9 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2dca 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +[2dcb 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +00000040 aa 6c 6c 08 50 44 |.ll.PD| +[2dcc 05-20 18:21:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2dcd 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dce 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dcf 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2dd0 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102E +[2dd1 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 45C69000A54E5E59F0F3BD2BADEA9AA81ED387B1031729BBB947053EECF3D8A3 +[2dd2 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2dd3 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2dd4 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2dd5 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2dd6 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2dd7 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dd8 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dd9 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dda 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2ddb 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ddc 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2ddd 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2dde 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ddf 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2de0 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2de1 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2de2 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2de3 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2de4 05-20 18:21:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2de5 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2de6 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2de7 05-20 18:21:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2de8 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 ec d9 eb d3 b3 0c 1e a1 6d 8a cc 72 19 3b 16 |.........m..r.;.| +00000010 97 f0 f1 62 c7 11 9f 03 21 1e d2 3e bc 29 d1 53 |...b....!..>.).S| +[2de9 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 1c 56 3b 0a 75 97 b4 34 0d 09 3b |0D. r.V;.u..4..;| +00000010 90 ee 36 02 66 ea 0c 11 90 6c c4 b5 a8 2e d4 fe |..6.f....l......| +00000020 9b ee 78 92 02 20 29 5f 3a d5 ad b2 c2 cb 2a 30 |..x.. )_:.....*0| +00000030 d6 b7 c8 a3 02 76 32 fc 05 71 71 67 bc ab 47 17 |.....v2..qqg..G.| +00000040 aa 6c 6c 08 50 44 |.ll.PD| +[2dea 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2deb 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dec 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2ded 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 ff ac 96 06 d4 80 af 71 ff 81 d7 a4 74 fc e0 |).......q....t..| +00000010 3c 63 aa 89 3c 86 68 d5 35 7f 9d 95 bf 7c 15 37 | DEBU Verify: sig = 00000000 30 45 02 21 00 bb 5d f0 0c 9d 8f 0d 6c db c1 bf |0E.!..].....l...| +00000010 3c e6 3d 3b e0 4d 0d 02 35 ff 15 a5 94 40 34 2b |<.=;.M..5....@4+| +00000020 21 c9 0e 08 69 02 20 5d 8a cb 05 bc 2f 1f dc 77 |!...i. ]..../..w| +00000030 ac 9a 5a dd 9e 3c 05 12 da 23 35 07 61 05 54 97 |..Z..<...#5.a.T.| +00000040 be 51 39 5f a7 36 fb |.Q9_.6.| +[2def 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2df0 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2df1 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2df2 05-20 18:21:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2df3 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2df4 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2df5 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2df6 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2df7 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2df8 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2df9 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dfa 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dfb 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dfc 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2dfd 05-20 18:21:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dfe 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +[2dff 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +[2e00 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e01 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > > , Envelope: 165 bytes, Signature: 0 bytes +[2e02 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2e03 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e04 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2e05 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2e06 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2e07 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2e08 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e09 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2e0a 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 gate 1589998869197640000 evaluation starts +[2e0b 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 signed by 0 principal evaluation starts (used [false]) +[2e0c 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 processing identity 0 with bytes of 115a110 +[2e0d 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 principal matched by identity 0 +[2e0e 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +[2e0f 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +00000040 b4 f6 fc 88 53 db |....S.| +[2e10 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 principal evaluation succeeds for identity 0 +[2e11 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242740 gate 1589998869197640000 evaluation succeeds +[2e12 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2e13 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2e14 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2e15 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2e16 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e17 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2e18 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2e19 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2e1a 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2e1b 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e1c 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e1d 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e1e 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[2e1f 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e20 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e21 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e22 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[2e23 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\300\215_8pQ\253" > alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > alive: +[2e24 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2e25 05-20 18:21:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e26 05-20 18:21:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 +[2e27 05-20 18:21:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[2e28 05-20 18:21:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[2e29 05-20 18:21:10.39 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[2e2a 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[2e2b 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[2e2c 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2e2d 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB38816100F1801 +[2e2e 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2211477076BB0074A91277DA290083B91891BDE1433E0273D30A588ED0BE46BA +[2e2f 05-20 18:21:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[2e30 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e31 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e32 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e33 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e34 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[2e35 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e36 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e37 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[2e38 05-20 18:21:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e39 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-1.0 +[2e3a 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +[2e3b 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +[2e3c 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +[2e3d 05-20 18:21:10.86 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +[2e3e 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:1.0 's authentication is authorized +[2e3f 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[2e40 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[2e41 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:1.0 +[2e42 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED +[2e43 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"exp02:1.0" +[2e44 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"exp02:1.0" +[2e45 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"exp02:1.0" +[2e46 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[2e47 05-20 18:21:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2e48 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2e49 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] handling PUT_STATE from chaincode +[2e4a 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Completed PUT_STATE. Sending RESPONSE +[2e4b 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2e4c 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] handling PUT_STATE from chaincode +[2e4d 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Completed PUT_STATE. Sending RESPONSE +[2e4e 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2e4f 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [d4839f2a] notifying Txid:d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, channelID:businesschannel +[2e50 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2e51 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d4839f2a] Exit chaincode: name:"lscc" (58441ms) +[2e52 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2e53 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +[2e54 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] Exit +[2e55 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] Entry chaincode: name:"lscc" +[2e56 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] escc for chaincode name:"lscc" is escc +[2e57 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, chaincode: lscc} +[2e58 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20DCD7CFAA3070856E7CF4B834E38B...455254494649434154452D2D2D2D2D0A +[2e59 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 21B7CE887AF7528B0CA8744EF14808DAAC9928D2A148CD612FAF2EF642023F61 +[2e5a 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, chaincode: lscc} +[2e5b 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d4839f2a] Exit +[2e5c 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +[2e5d 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37094 +[2e5e 05-20 18:21:10.92 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37094 grpc.code=OK grpc.call_duration=58.4495216s +[2e5f 05-20 18:21:10.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e60 05-20 18:21:10.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e61 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e62 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e63 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2e64 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2e65 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e66 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2e67 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e68 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2e69 05-20 18:21:11.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e6a 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e6b 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e6c 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2e6d 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e6e 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e6f 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2e70 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2e71 05-20 18:21:11.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e72 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2e73 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2e74 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e75 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e76 05-20 18:21:11.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e77 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2e78 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2e79 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e7a 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e7b 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e7c 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2e7d 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2e7e 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2e7f 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2e80 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e81 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2e82 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 gate 1589998871909991000 evaluation starts +[2e84 05-20 18:21:11.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2e85 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2e83 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 signed by 0 principal evaluation starts (used [false]) +[2e86 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 processing identity 0 with bytes of 115a110 +[2e87 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 principal matched by identity 0 +[2e88 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2e89 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2e8a 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 principal evaluation succeeds for identity 0 +[2e8b 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003172490 gate 1589998871909991000 evaluation succeeds +[2e8c 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2e8d 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2e8e 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2e8f 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2e90 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2e91 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2e92 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2e93 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e94 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e95 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2e96 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2e97 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2e98 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2e99 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e9a 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2e9b 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 gate 1589998871917728600 evaluation starts +[2e9c 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 signed by 0 principal evaluation starts (used [false]) +[2e9d 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 processing identity 0 with bytes of 115a110 +[2e9e 05-20 18:21:11.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 principal matched by identity 0 +[2e9f 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2ea0 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0031735a0 principal evaluation succeeds for identity 0 +[2ea2 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031735a0 gate 1589998871917728600 evaluation succeeds +[2ea3 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2ea4 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ea5 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ea7 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ea6 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37122 +[2ea8 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003358320 +[2ea9 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2eaa 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2eab 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2eac 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2ead 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2eae 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 39 bd 73 a0 b0 0c 04 c7 24 b6 79 18 41 6f c9 |M9.s.....$.y.Ao.| +00000010 08 ad 1a 50 bb 10 17 c3 c4 33 f5 21 e6 11 bd a9 |...P.....3.!....| +[2eaf 05-20 18:21:11.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 99 3b 29 5e 46 20 ad 04 59 fb |0E.!...;)^F ..Y.| +00000010 fe 59 ac b4 58 6f 7a ba d2 da 94 c5 f4 b4 33 6c |.Y..Xoz.......3l| +00000020 f6 cf 6e fe a5 02 20 0d e4 f8 ee 77 d9 bc d9 bb |..n... ....w....| +00000030 97 3c 50 b8 4c 53 46 31 86 16 1e fd 26 54 6b e8 |. DEBU exits successfully +[2eb1 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0034a3ea0, header 0xc003358780 +[2eb2 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2eb3 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][14165957] processing txid: 141659578851823e465eac79d45415f0368da100f62c863f4a4c8d8619bf7a42 +[2eb4 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [141659578851823e465eac79d45415f0368da100f62c863f4a4c8d8619bf7a42] +[2eb5 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2eb6 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2eb7 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2eb8 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2eb9 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2eba 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 gate 1589998871933641300 evaluation starts +[2ebb 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 signed by 0 principal evaluation starts (used [false]) +[2ebc 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 processing identity 0 with bytes of 115a110 +[2ebd 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[2ebe 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[2ebf 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[2ec0 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 principal matched by identity 0 +[2ec1 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 39 bd 73 a0 b0 0c 04 c7 24 b6 79 18 41 6f c9 |M9.s.....$.y.Ao.| +00000010 08 ad 1a 50 bb 10 17 c3 c4 33 f5 21 e6 11 bd a9 |...P.....3.!....| +[2ec2 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 99 3b 29 5e 46 20 ad 04 59 fb |0E.!...;)^F ..Y.| +00000010 fe 59 ac b4 58 6f 7a ba d2 da 94 c5 f4 b4 33 6c |.Y..Xoz.......3l| +00000020 f6 cf 6e fe a5 02 20 0d e4 f8 ee 77 d9 bc d9 bb |..n... ....w....| +00000030 97 3c 50 b8 4c 53 46 31 86 16 1e fd 26 54 6b e8 |. DEBU 0xc003121430 principal evaluation succeeds for identity 0 +[2ec4 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003121430 gate 1589998871933641300 evaluation succeeds +[2ec5 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[2ec6 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2ec7 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2ec8 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2ec9 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2eca 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [141659578851823e465eac79d45415f0368da100f62c863f4a4c8d8619bf7a42] +[2ecb 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][14165957] Entry chaincode: name:"exp02" +[2ecc 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2ecd 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][14165957] Exit +[2ece 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [141659578851823e465eac79d45415f0368da100f62c863f4a4c8d8619bf7a42] +[2ecf 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37122 +[2ed0 05-20 18:21:11.93 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37122 grpc.code=OK grpc.call_duration=15.8106ms +[2ed1 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2ed2 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2ed3 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ed4 05-20 18:21:11.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2ed5 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2ed6 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2ed7 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2ed8 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2ed9 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2eda 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2edb 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2edc 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2edd 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2ede 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2edf 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2ee0 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ee1 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ee2 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ee3 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 gate 1589998871954754500 evaluation starts +[2ee4 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 signed by 0 principal evaluation starts (used [false]) +[2ee5 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 processing identity 0 with bytes of 115a110 +[2ee6 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 principal matched by identity 0 +[2ee7 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2ee8 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003080000 principal evaluation succeeds for identity 0 +[2eea 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003080000 gate 1589998871954754500 evaluation succeeds +[2eeb 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2eec 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2eed 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2eee 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2eef 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ef0 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ef1 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2ef2 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ef3 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2ef4 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ef5 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ef6 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ef7 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 gate 1589998871957158300 evaluation starts +[2ef8 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 signed by 0 principal evaluation starts (used [false]) +[2ef9 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 processing identity 0 with bytes of 115a110 +[2efa 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 principal matched by identity 0 +[2efb 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2efc 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2efd 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 principal evaluation succeeds for identity 0 +[2efe 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003081230 gate 1589998871957158300 evaluation succeeds +[2eff 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2f00 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2f01 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2f02 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2f03 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f04 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 723 bytes, Signature: 0 bytes +[2f05 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f06 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f07 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f08 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2f09 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2f0a 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2f0b 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2f0c 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2f0d 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2f0e 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 gate 1589998871958787700 evaluation starts +[2f0f 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 signed by 0 principal evaluation starts (used [false]) +[2f10 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 processing identity 0 with bytes of 115a110 +[2f11 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 principal matched by identity 0 +[2f12 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[2f13 05-20 18:21:11.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc003060730 principal evaluation succeeds for identity 0 +[2f15 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003060730 gate 1589998871958787700 evaluation succeeds +[2f16 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2f17 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2f18 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2f19 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2f1a 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[2f1b 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[2f1c 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[2f1d 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[2f1e 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f1f 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f20 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2f21 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2f22 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2f23 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2f24 05-20 18:21:11.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2f25 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2f26 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 gate 1589998871970928700 evaluation starts +[2f27 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 signed by 0 principal evaluation starts (used [false]) +[2f28 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 processing identity 0 with bytes of 115a110 +[2f29 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 principal matched by identity 0 +[2f2a 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[2f2b 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[2f2c 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 principal evaluation succeeds for identity 0 +[2f2d 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fcc730 gate 1589998871970928700 evaluation succeeds +[2f2e 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2f2f 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2f30 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2f31 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2f32 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f33 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2f34 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2f35 05-20 18:21:11.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f36 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2f37 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2f38 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f39 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f3a 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f3b 05-20 18:21:12.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f3c 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2f3d 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2f3e 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f3f 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f40 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f41 05-20 18:21:12.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f42 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2f43 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2f44 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2f45 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2f46 05-20 18:21:12.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f47 05-20 18:21:12.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2f48 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2f49 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2f4a 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2f4b 05-20 18:21:12.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f4c 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2f4d 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2f4e 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f4f 05-20 18:21:12.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2f50 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2f51 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +[2f52 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +00000040 aa 43 54 c4 43 28 |.CT.C(| +[2f53 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2f54 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 7a bc 5a 65 7a 98 1f 6d 7b bd |0E.!..z.Zez..m{.| +00000010 8d 4d 6c db f1 02 71 ec 95 b1 b2 ff 4e 19 3c 6f |.Ml...q.....N. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2f56 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2f57 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2f58 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2f59 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[2f5a 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f5b 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f5c 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f5d 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2f5e 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f5f 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f60 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[2f61 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" secret_envelope: > alive: +[2f62 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2f63 05-20 18:21:12.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f64 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2f65 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2f66 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2f67 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f68 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f69 05-20 18:21:12.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f6a 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f6b 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f6c 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f6d 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2f6e 05-20 18:21:12.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f6f 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2f70 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2f71 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2f72 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2f73 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2f74 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2f75 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2f76 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2f77 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f78 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2f79 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f7a 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2f7b 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f7c 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2f7d 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f7e 05-20 18:21:12.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2f7f 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2f80 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2f81 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2f82 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2f83 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2f84 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2f86 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2f85 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f88 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f89 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f8a 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f87 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2f8b 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 gate 1589998872897882500 evaluation starts +[2f8c 05-20 18:21:12.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 signed by 0 principal evaluation starts (used [false]) +[2f8d 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 processing identity 0 with bytes of 115a110 +[2f8e 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 principal matched by identity 0 +[2f8f 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +[2f91 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +00000040 b1 d4 22 e0 e0 7d |.."..}| +[2f90 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f92 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 principal evaluation succeeds for identity 0 +[2f93 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c5d20 gate 1589998872897882500 evaluation succeeds +[2f94 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f95 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2f96 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2f97 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2f98 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2f99 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2f9a 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2f9b 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2f9c 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2f9d 05-20 18:21:12.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2f9e 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2f9f 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2fa0 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fa1 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fa2 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fa3 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2fa4 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fa5 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fa6 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fa7 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2fa8 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2fa9 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2faa 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2fab 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2fac 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2fad 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fae 05-20 18:21:12.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > alive: alive:\357F\220\253\035\313L\002 ;\372 1\356\334Rla\312\027\271\033\200/Q\342#\372\360\032\324\375\261\351\236\264\366\374\210S\333" > alive: +[2faf 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2fb0 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[2fb1 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[2fb2 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2fb3 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[2fb4 05-20 18:21:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fb5 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +WFUnXFrrWMedpv6WCUtVYuZy +-----END CERTIFICATE----- +[2fb6 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 gate 1589998872980456200 evaluation starts +[2fb7 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 signed by 0 principal evaluation starts (used [false]) +[2fb8 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 processing identity 0 with bytes of 115a110 +[2fb9 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +[2fba 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[2fbb 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[2fbc 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 principal matched by identity 0 +[2fbd 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 a3 4b 58 7d 3a 8c 7a 8a 5a 35 e1 14 b2 ed 1d |..KX}:.z.Z5.....| +00000010 77 84 8b fb f0 74 b1 e4 89 cf f7 aa 5e 2c 5d 82 |w....t......^,].| +[2fbe 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 85 0e 94 fc 33 9e 4b ab b1 ae 2d |0D. .....3.K...-| +00000010 23 bd fa 52 b0 58 eb 31 08 63 6c 33 c9 2a c4 71 |#..R.X.1.cl3.*.q| +00000020 7d e9 4b 53 02 20 68 18 fe 74 c6 55 ca 39 b3 74 |}.KS. h..t.U.9.t| +00000030 50 8c 72 93 21 b5 23 53 29 12 d5 b8 3a fb ec f3 |P.r.!.#S)...:...| +00000040 ca 96 1f 39 90 b6 |...9..| +[2fbf 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 principal evaluation succeeds for identity 0 +[2fc0 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b87350 gate 1589998872980456200 evaluation succeeds +[2fc1 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[2fc2 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[2fc3 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[2fc4 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[2fc5 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +[2fc6 05-20 18:21:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +[2fc7 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +[2fc8 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +[2fc9 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +[2fca 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +[2fcb 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +[2fcc 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[2fcd 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003922280 env 0xc003359f40 txn 0 +[2fce 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003359f40 +[2fcf 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +[2fd0 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2fd1 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2fd2 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2fd3 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2fd4 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2fd5 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +[2fd6 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +00000040 cf eb d4 a9 50 ef |....P.| +[2fd7 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2fd8 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0029d0a80, header channel_header:"\010\003\032\014\010\334\351\225\366\005\020\340\223\265\204\002\"\017businesschannel*@d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\004T\221\221|\252m\016\324Ko@d\334\307g \301\366\247c\303\037X" +[2fd9 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[2fda 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[2fdb 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[2fdc 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[2fdd 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] +[2fde 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[2fdf 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002a0a000 +[2fe0 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +[2fe1 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2e32c32b-451a-4771-911f-12c089f30ac2] +[2fe2 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2e32c32b-451a-4771-911f-12c089f30ac2] +[2fe3 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fe4 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[2fe5 05-20 18:21:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[2fe6 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +[2fe7 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes to the block puller +[2fe8 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +[2fe9 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 gate 1589998873007453400 evaluation starts +[2fea 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 signed by 0 principal evaluation starts (used [false]) +[2feb 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2fed 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816102F +[2fee 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 96FB5B2BCB725928B472DA5110E6A54DF315A26E9E9205B24AC69A8F38928402 +[2fef 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2ff0 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2fec 05-20 18:21:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 processing identity 0 with bytes of 115a110 +[2ff1 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2ff3 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[2ff4 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ff5 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2ff2 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[2ff6 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ffa 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2ffb 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes +[2ffc 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ff7 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2ff8 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ffe 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fff 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ff9 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[2ffd 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:~\027\343\254\326S\333(Xkw\\{\006^\200\335\353\205" > > , Envelope: 166 bytes, Signature: 0 bytes +[3000 05-20 18:21:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3001 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3002 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3003 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3004 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[3005 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3006 05-20 18:21:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes to 1 peers +[3007 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3008 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 principal matched by identity 0 +[3009 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[300a 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[300b 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[300f 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4559 bytes, seq: 3}, Envelope: 4589 bytes, Signature: 0 bytes +[3011 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[300d 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[300e 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3010 05-20 18:21:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[300c 05-20 18:21:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 21 b7 ce 88 7a f7 52 8b 0c a8 74 4e f1 48 08 da |!...z.R...tN.H..| +00000010 ac 99 28 d2 a1 48 cd 61 2f af 2e f6 42 02 3f 61 |..(..H.a/...B.?a| +[3012 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +[3013 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 c2 7c 26 22 5d be 68 cd a6 f6 e5 |0D. ..|&"].h....| +00000010 48 53 b9 c3 e0 ae de 08 64 67 26 f6 31 27 88 f2 |HS......dg&.1'..| +00000020 a9 e6 9d 32 02 20 73 44 51 76 29 d5 24 65 bf 5f |...2. sDQv).$e._| +00000030 e3 1c 3f 4b d3 cf 58 b5 0f f6 c2 d8 95 42 68 80 |..?K..X......Bh.| +00000040 9b 73 66 c0 4e 99 |.sf.N.| +[3015 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 principal evaluation succeeds for identity 0 +[3016 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 signed by 1 principal evaluation starts (used [true]) +[3017 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 skipping identity 0 because it has already been used +[3018 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 principal evaluation fails +[3019 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a9c0d0 gate 1589998873007453400 evaluation succeeds +[301a 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +[301b 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[3014 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +00000040 7b 06 5e 80 dd eb 85 |{.^....| +[301c 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[301e 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +[301f 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +[3020 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [fd5fe183-6959-4d86-b6e7-20c3e36fa818] +[3021 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3022 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fd5fe183-6959-4d86-b6e7-20c3e36fa818] +[3023 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +[3024 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4164c32d-e256-49f6-bc95-d119af04c871] +[3025 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[3026 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4164c32d-e256-49f6-bc95-d119af04c871] +[3027 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 gate 1589998873058523900 evaluation starts +[3028 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 signed by 0 principal evaluation starts (used [false]) +[3029 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 processing identity 0 with bytes of 115a110 +[302a 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 principal matched by identity 0 +[302b 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 41 98 45 52 45 2b 0c 02 df 58 d0 60 41 2f 54 |.A.ERE+...X.`A/T| +00000010 c0 e4 95 dc 83 54 0f be 3a 30 98 bf b3 57 8d 19 |.....T..:0...W..| +[302c 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 50 0f b6 3c f0 cc 03 32 46 8e 35 |0D. .P..<...2F.5| +00000010 8c 1f 7c fa 3e e0 bf 3e e3 39 01 46 2a aa fb f4 |..|.>..>.9.F*...| +00000020 84 2b e8 d3 02 20 5f 6c 68 06 4f 92 1a 07 f7 f3 |.+... _lh.O.....| +00000030 bc f1 bb 1a 9d 37 7a 3f ad 41 4f e0 f1 ba 66 d0 |.....7z?.AO...f.| +00000040 cf eb d4 a9 50 ef |....P.| +[302d 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 principal evaluation succeeds for identity 0 +[302e 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 signed by 1 principal evaluation starts (used [true]) +[302f 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 skipping identity 0 because it has already been used +[3030 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 principal evaluation fails +[3031 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f9400 gate 1589998873058523900 evaluation succeeds +[3032 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +[3033 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb appears to be valid +[3034 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002a0a000 +[3035 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003922280 env 0xc003359f40 txn 0 +[3036 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[3037 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 70ms +[3038 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[3039 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[303a 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +[303b 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[301d 05-20 18:21:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[303c 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[303d 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[303e 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 d0 ba 12 7b d9 ac e5 8c 46 05 94 |0D. i...{....F..| +00000010 19 21 5d c6 85 4d e0 ce 98 a7 6b 2d 10 71 cb 11 |.!]..M....k-.q..| +00000020 58 a4 dd 49 02 20 31 7f 5e f0 e4 19 4c 80 58 05 |X..I. 1.^...L.X.| +00000030 04 f4 88 f0 35 ac 16 e5 ca 5a 0c 29 47 b3 95 dd |....5....Z.)G...| +00000040 47 52 22 06 66 3b |GR".f;| +[303f 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +[3040 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[3041 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[3042 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3044 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +[3043 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3045 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] marked as valid by state validator +[3046 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3047 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003749ec0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003749f00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc003749f40)} +[3048 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3049 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[304a 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[304b 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[304c 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[304d 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[304e 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0030a7540)}} +[304f 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3050 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +[3051 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[3052 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +[3053 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +[3054 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +00000040 aa 43 54 c4 43 28 |.CT.C(| +[3055 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3056 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3057 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3058 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +[3059 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +00000040 7b 06 5e 80 dd eb 85 |{.^....| +[305a 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[305b 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[305c 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[305d 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[305e 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[305f 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3060 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3061 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3062 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3063 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3064 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +[3065 05-20 18:21:13.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3066 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 gate 1589998873070045900 evaluation starts +[3067 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 signed by 0 principal evaluation starts (used [false]) +[3068 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 processing identity 0 with bytes of 115a110 +[3069 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 principal matched by identity 0 +[306a 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a c7 07 de f1 32 c9 84 d2 1f 5c f6 9c d1 5b 3b |.....2....\...[;| +00000010 35 10 64 0b 99 9d 32 39 43 30 7d 8c a7 c0 04 92 |5.d...29C0}.....| +[306b 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +[306c 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +[306d 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +[306e 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[306f 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 130 0 82 231 27 197 206 34 190 230 222 52 236 211 2 162 124 108 59 61 106 121 33 236 98 31 142 3 81 185 239 26 2 32 55 199 95 66 93 215 81 148 237 34 138 208 80 139 173 252 126 144 208 206 53 74 104 254 207 40 134 46 79 136 11 0]} 0x1519b80}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0028c7500 0xc002843860 {{0 0} 0 0 0 0} {false}})]} +[3070 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[3071 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00021e820})} +[3072 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +[3073 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +[3074 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +[3075 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 92 be 28 eb 48 c1 94 8b 11 f6 ee |0D. ?..(.H......| +00000010 56 9b 61 af f1 90 34 02 90 bb a5 e5 3e ef 46 90 |V.a...4.....>.F.| +00000020 ab 1d cb 4c 02 20 3b fa 20 31 ee dc 52 6c 61 ca |...L. ;. 1..Rla.| +00000030 17 b9 1b 80 2f 51 e2 23 fa f0 1a d4 fd b1 e9 9e |..../Q.#........| +00000040 b4 f6 fc 88 53 db |....S.| +[3076 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 principal evaluation succeeds for identity 0 +[3077 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c5cd0 gate 1589998873070045900 evaluation succeeds +[3078 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3079 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[307a 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[307b 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[307c 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[307d 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[307e 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[307f 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3080 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +[3082 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xe4, 0xd0, 0x6e, 0x11, 0x83, 0x40, 0x38, 0x1c, 0x2a, 0x25, 0xb9, 0x5b, 0xef, 0x40, 0xdf, 0xab, 0x76, 0x31, 0x92, 0x2e, 0xb6, 0x6d, 0xd2, 0x76, 0xed, 0x67, 0x48, 0xc4, 0x26, 0xd8, 0xcb, 0xd9} txOffsets= +txId=d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb locPointer=offset=70, bytesLength=3519 +] +[3083 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84951, bytesLength=3519] for tx ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to txid-index +[3081 05-20 18:21:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3084 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3085 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3086 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3087 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3088 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3089 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[308a 05-20 18:21:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84951, bytesLength=3519] for tx number:[0] ID: [d4839f2a1464e3ebb0afeb8434c6704fffc4e3fe867038247f4733dbb573a5cb] to blockNumTranNum index +[308b 05-20 18:21:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[308c 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[308d 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[308e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[308f 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3090 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 gate 1589998873102172600 evaluation starts +[3091 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 signed by 0 principal evaluation starts (used [false]) +[3092 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 processing identity 0 with bytes of 115a110 +[3093 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 principal matched by identity 0 +[3094 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 a4 8f 34 32 23 35 7d 5a a3 bf 14 50 c6 63 74 |P..42#5}Z...P.ct| +00000010 f9 ed f5 02 82 d6 6c 4c 25 fc 16 68 b7 5b 29 9b |......lL%..h.[).| +[3095 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 a9 25 2b f1 76 aa bc 31 5e 54 9c |0D. 1.%+.v..1^T.| +00000010 14 0a 7d 78 51 7c 85 4e cf 95 02 15 92 f2 15 da |..}xQ|.N........| +00000020 1f 8a b1 ba 02 20 2a 7d 00 7e 29 d2 e2 2e 2b 81 |..... *}.~)...+.| +00000030 b1 d1 26 d3 7b bb 20 28 f0 94 18 d1 0d a5 83 fb |..&.{. (........| +00000040 b1 d4 22 e0 e0 7d |.."..}| +[3096 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 principal evaluation succeeds for identity 0 +[3097 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ec560 gate 1589998873102172600 evaluation succeeds +[3098 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3099 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[309a 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[309b 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[309c 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[309d 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[309e 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[309f 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 96 fb 5b 2b cb 72 59 28 b4 72 da 51 10 e6 a5 4d |..[+.rY(.r.Q...M| +00000010 f3 15 a2 6e 9e 92 05 b2 4a c6 9a 8f 38 92 84 02 |...n....J...8...| +[30a0 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c9 ef 25 4c 58 33 60 af 78 03 |0E.!....%LX3`.x.| +00000010 f5 90 3b 39 a4 6b f0 13 de aa ef ee aa ec ce 19 |..;9.k..........| +00000020 11 ff 19 55 85 02 20 60 be 87 05 ce 70 c0 4b 21 |...U.. `....p.K!| +00000030 8d 88 e2 3e 7e 17 e3 ac d6 53 db 28 58 6b 77 5c |...>~....S.(Xkw\| +00000040 7b 06 5e 80 dd eb 85 |{.^....| +[30a1 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[30a2 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[30a3 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30a4 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[30a5 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 74 4a 9f 46 ce 28 25 06 0a e3 e0 fb 2c e6 90 |.tJ.F.(%.....,..| +00000010 a8 59 46 74 c8 b9 03 49 7c 82 23 a5 91 78 5b 74 |.YFt...I|.#..x[t| +[30a6 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 35 c6 e7 7d 1c 2e af e6 fb 34 7b |0D. N5..}.....4{| +00000010 06 4b dc 86 4e 8a 89 45 a8 b7 9f 32 46 69 25 be |.K..N..E...2Fi%.| +00000020 4d 1d fc 4a 02 20 33 98 3e 97 94 b7 a9 f7 0a 7a |M..J. 3.>......z| +00000030 19 d4 79 be 16 c3 3e 5a 11 98 49 19 a9 d7 02 98 |..y...>Z..I.....| +00000040 aa 43 54 c4 43 28 |.CT.C(| +[30a7 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30a8 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30a9 05-20 18:21:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30aa 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89462], isChainEmpty=[false], lastBlockNumber=[3] +[30ab 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +[30ac 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[30ad 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[30ae 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[30af 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b0 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b1 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b2 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b3 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b4 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b5 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[30b6 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b7 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +[30b8 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +[30b9 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[30ba 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[30bb 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[30bc 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[30bd 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +[30be 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[30bf 05-20 18:21:13.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[30c0 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[30c1 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2de64933-8af3-48dd-bbd1-6037a4a10852] +[30c2 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +[30c3 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[30c4 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +[30c5 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2de64933-8af3-48dd-bbd1-6037a4a10852] +[30c6 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +[30c7 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[30c8 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08031A0C0A0565787030321203312E30 +[30c9 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6DEBC8D5F6B31BF78931D1929E3A6C9D796A18FCAB0A92FCA37BA330A0E79110 +[30ca 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +[30cb 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +[30cc 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[30cd 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +[30ce 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +[30cf 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +[30d0 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +[30d1 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +[30d2 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 64ms (state_validation=10ms block_and_pvtdata_commit=43ms state_commit=7ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +[30d3 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[30d4 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08041A0C0A0565787030321203312E30 +[30d5 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F5EBCD54A3A3BDF042C87D0459C3EDA07CD735A7838202381BA3E8823A20D29E +[30d6 05-20 18:21:13.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +[30d7 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[30d8 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[30d9 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30da 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[30db 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[30dc 05-20 18:21:13.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30dd 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[30de 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[30df 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[30e0 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[30e1 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[30e2 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[30e3 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 gate 1589998873213065200 evaluation starts +[30e4 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 signed by 0 principal evaluation starts (used [false]) +[30e5 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 processing identity 0 with bytes of 115a110 +[30e6 05-20 18:21:13.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 principal matched by identity 0 +[30e7 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 00 66 c9 fb 7f 38 5f 33 14 12 37 25 cf 84 14 |..f...8_3..7%...| +00000010 c4 d1 d8 f0 e5 a6 1e e9 af 66 62 30 20 44 41 c2 |.........fb0 DA.| +[30e8 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9b 75 c8 e1 e3 f5 36 76 b9 39 |0E.!...u....6v.9| +00000010 15 26 2e 42 81 95 e6 21 43 80 e0 c4 fc 34 a7 8f |.&.B...!C....4..| +00000020 9e 70 87 73 d5 02 20 03 2e 58 4b 18 0f a8 76 8b |.p.s.. ..XK...v.| +00000030 72 4f 72 05 e4 d2 df af 41 1d 62 9c 53 15 70 de |rOr.....A.b.S.p.| +00000040 f6 ae e1 80 c3 48 12 |.....H.| +[30e9 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 principal evaluation succeeds for identity 0 +[30ea 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274c2a0 gate 1589998873213065200 evaluation succeeds +[30eb 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[30ec 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[30ed 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[30ee 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[30ef 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[30f0 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[30f1 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[30f2 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[30f3 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[30f4 05-20 18:21:13.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f5 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f6 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f7 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[30f8 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30f9 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30fa 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30fb 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[30fc 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\227\224\267\251\367\nz\031\324y\276\026\303>Z\021\230I\031\251\327\002\230\252CT\304C(" > alive: alive: alive: +[30fd 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[30fe 05-20 18:21:13.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30ff 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3100 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3101 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3102 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3103 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 0c b2 b9 77 27 15 1f ae a2 15 63 05 ca 95 69 |....w'.....c...i| +00000010 ee 71 b8 c3 1a a0 91 b3 e6 16 df 31 9f 5a 49 8d |.q.........1.ZI.| +[3104 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 48 b8 f8 ab 39 a4 1b d1 95 0b |0E.!..H...9.....| +00000010 49 42 29 12 fc 81 06 38 3b bd 00 6f 51 fe 6a 23 |IB)....8;..oQ.j#| +00000020 ff 4f 06 23 6c 02 20 4c a4 f5 57 b9 2b a7 e1 cf |.O.#l. L..W.+...| +00000030 6e 4c ae 68 50 ce 9c 66 13 99 88 61 e4 d9 e9 2d |nL.hP..f...a...-| +00000040 86 d7 f9 ac 33 9f 93 |....3..| +[3105 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3106 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3107 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3108 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3109 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[310a 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[310b 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[310c 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[310d 05-20 18:21:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[310e 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[310f 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3110 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3111 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3112 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3113 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3114 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3115 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3116 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3117 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3118 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3119 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[311a 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[311b 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[311c 05-20 18:21:13.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[311d 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[311e 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[311f 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3120 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3121 05-20 18:21:13.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3122 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3123 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3124 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3125 05-20 18:21:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3126 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3127 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3128 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3129 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[312a 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[312b 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[312c 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[312d 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[312e 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 gate 1589998873694998500 evaluation starts +[312f 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 signed by 0 principal evaluation starts (used [false]) +[3130 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 processing identity 0 with bytes of 115a110 +[3131 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 principal matched by identity 0 +[3132 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 5c 30 e1 0e bf 69 da de a0 54 59 19 94 c1 0a |.\0...i...TY....| +00000010 24 16 2c df aa 4a f0 59 f0 c9 31 0e 64 c4 1d 8e |$.,..J.Y..1.d...| +[3133 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 37 e7 8d a9 ee d3 fd b2 d1 20 |0E.!..7........ | +00000010 86 10 4d 6c 7a 3d 84 1e 2d 5a 3c 90 61 24 9b 8c |..Mlz=..-Z<.a$..| +00000020 5a 0f a9 40 d7 02 20 4b c2 4b 07 1c 02 f9 6a 40 |Z..@.. K.K....j@| +00000030 e8 4c 29 92 df e6 e5 64 23 b3 20 aa e8 b9 e8 58 |.L)....d#. ....X| +00000040 35 28 6b ee f7 af 8b |5(k....| +[3134 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 principal evaluation succeeds for identity 0 +[3135 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261b5d0 gate 1589998873694998500 evaluation succeeds +[3136 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3137 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3138 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3139 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[313a 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[313b 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[313c 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[313d 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[313e 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[313f 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3140 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3141 05-20 18:21:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3142 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3143 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3144 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3145 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3146 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3148 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3149 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[314a 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[314b 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3147 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[314c 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[314d 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[314e 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[314f 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3150 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3151 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3152 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3153 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3154 05-20 18:21:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3155 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3156 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3157 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3158 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3159 05-20 18:21:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[315a 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[315b 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[315c 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[315d 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[315e 05-20 18:21:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[315f 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3160 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3161 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3162 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3163 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3164 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3165 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3166 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 gate 1589998873913437000 evaluation starts +[3167 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 signed by 0 principal evaluation starts (used [false]) +[3168 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 processing identity 0 with bytes of 115a110 +[3169 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 principal matched by identity 0 +[316a 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 ab be cd ba 92 e5 e0 72 e9 86 7e d5 90 ba 69 |........r..~...i| +00000010 87 f6 a7 89 b8 f1 bb fc 10 a5 53 98 60 53 30 57 |..........S.`S0W| +[316b 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a c7 ab cf 32 de 2c a7 b4 bb 7b d8 |0D. z...2.,...{.| +00000010 dc a7 57 f7 55 61 ff 29 30 7d 90 36 6d ae e9 29 |..W.Ua.)0}.6m..)| +00000020 a8 59 90 39 02 20 38 0c cd 0b dd 8e ef 64 26 0d |.Y.9. 8......d&.| +00000030 99 a2 53 65 84 7b 95 27 4e 5c 2f 88 cb 7f 05 1b |..Se.{.'N\/.....| +00000040 9e cb ec 6a b3 91 |...j..| +[316c 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 principal evaluation succeeds for identity 0 +[316d 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268feb0 gate 1589998873913437000 evaluation succeeds +[316e 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[316f 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3170 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3171 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3172 05-20 18:21:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3173 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3174 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3175 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3176 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3177 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3178 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3179 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[317a 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[317b 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[317c 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[317d 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[317e 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[317f 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3180 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3181 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3182 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3183 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3184 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3185 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3186 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3187 05-20 18:21:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3188 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3189 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[318a 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[318b 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[318c 05-20 18:21:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[318d 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[318e 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[318f 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3190 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3191 05-20 18:21:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3192 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3193 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161030 +[3194 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 80643CDBE40F17FCC6DFC3FAAE81C9EC2227838FC6A5A8E07ABDF9E6E97C4E2D +[3195 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3196 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3197 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3198 05-20 18:21:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3199 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[319a 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[319b 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[319c 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[319d 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[319f 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31a1 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[31a2 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[319e 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31a0 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31a3 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31a4 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31a5 05-20 18:21:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31a6 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37126 +[31a7 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002b536d0 +[31a8 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[31a9 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[31aa 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[31ab 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[31ac 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[31ad 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 63 ce 05 0a 89 fe 06 6f 09 41 3e fe 55 d4 f1 |.c......o.A>.U..| +00000010 f4 bb 54 93 f0 3a 98 c1 46 67 e3 48 e9 de 2b c0 |..T..:..Fg.H..+.| +[31ae 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 0d 03 bb d4 f1 92 e1 3f 9a c3 |0E.!.........?..| +00000010 76 c2 5d b1 51 62 02 96 eb 54 d4 e2 27 1c 5b 61 |v.].Qb...T..'.[a| +00000020 e9 39 c5 32 d7 02 20 7f 10 3b e7 47 f5 4c 81 43 |.9.2.. ..;.G.L.C| +00000030 82 8d d2 43 cf 92 bf c2 60 0b b1 2e 4b 25 c1 a2 |...C....`...K%..| +00000040 52 41 98 75 55 ea 7e |RA.uU.~| +[31af 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[31b0 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001393b0, header 0xc002b53ae0 +[31b1 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[31b2 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] processing txid: 8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49 +[31b3 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49] +[31b4 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[31b5 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[31b6 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[31b7 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[31b8 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[31b9 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 gate 1589998874212707800 evaluation starts +[31ba 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 signed by 0 principal evaluation starts (used [false]) +[31bb 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 processing identity 0 with bytes of 115a110 +[31bc 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 principal matched by identity 0 +[31bd 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 63 ce 05 0a 89 fe 06 6f 09 41 3e fe 55 d4 f1 |.c......o.A>.U..| +00000010 f4 bb 54 93 f0 3a 98 c1 46 67 e3 48 e9 de 2b c0 |..T..:..Fg.H..+.| +[31be 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 0d 03 bb d4 f1 92 e1 3f 9a c3 |0E.!.........?..| +00000010 76 c2 5d b1 51 62 02 96 eb 54 d4 e2 27 1c 5b 61 |v.].Qb...T..'.[a| +00000020 e9 39 c5 32 d7 02 20 7f 10 3b e7 47 f5 4c 81 43 |.9.2.. ..;.G.L.C| +00000030 82 8d d2 43 cf 92 bf c2 60 0b b1 2e 4b 25 c1 a2 |...C....`...K%..| +00000040 52 41 98 75 55 ea 7e |RA.uU.~| +[31bf 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 principal evaluation succeeds for identity 0 +[31c0 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00257b2b0 gate 1589998874212707800 evaluation succeeds +[31c1 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[31c2 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[31c3 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[31c4 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[31c5 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[31c6 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49] +[31c7 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] Entry chaincode: name:"exp02" +[31c8 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[31c9 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[31ca 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8518a715] Entry chaincode: name:"exp02" +[31cb 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[31cc 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[31cd 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] handling GET_STATE from chaincode +[31ce 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] getting state for chaincode exp02, key a, channel businesschannel +[31cf 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[31d0 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] Completed GET_STATE. Sending RESPONSE +[31d1 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[31d2 05-20 18:21:14.21 UTC] [%{longpkg}] %{callpath} -> DEBU [8518a715] notifying Txid:8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49, channelID:businesschannel +[31d3 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[31d4 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8518a715] Exit chaincode: name:"exp02" (6ms) +[31d5 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[31d6 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49] +[31d7 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] Exit +[31d8 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] Entry chaincode: name:"exp02" +[31d9 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] escc for chaincode name:"exp02" is escc +[31da 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49, chaincode: exp02} +[31db 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20E84406E0A1C34F0CEEA9F3FA63A9...455254494649434154452D2D2D2D2D0A +[31dc 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5EE4747F4EC471CA851ED9CDD0B01A1758FF85BE2130EF80C2171D81D8E4AA31 +[31dd 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49, chaincode: exp02} +[31de 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8518a715] Exit +[31df 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8518a715f329bc0207c5c3b040398a14dd65ca3c129267716c2dc873008d3f49] +[31e0 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37126 +[31e1 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37126 grpc.code=OK grpc.call_duration=14.8869ms +[31e2 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[31e3 05-20 18:21:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[31e4 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37130 +[31e5 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002ab89b0 +[31e6 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[31e7 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[31e8 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[31e9 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[31ea 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[31eb 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f c3 64 ad 57 9f c8 1e 3f 52 36 79 4d 8b 4f ff |o.d.W...?R6yM.O.| +00000010 6b b2 08 cf 3e 06 8c b0 3d fb f3 bd b2 f4 80 18 |k...>...=.......| +[31ec 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 c9 4a 63 43 e5 13 cf 49 3b 29 |0E.!...JcC...I;)| +00000010 65 7f 70 37 8c e5 f0 be 61 38 03 e4 8b 70 d6 71 |e.p7....a8...p.q| +00000020 67 ab 7c b0 85 02 20 6b fc bb 04 37 c3 80 f3 03 |g.|... k...7....| +00000030 bb 83 1a 8e 03 8a f9 64 4f ef 03 94 73 5f a3 a0 |.......dO...s_..| +00000040 3d bc 9f 99 b1 38 9e |=....8.| +[31ed 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[31ee 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000139a40, header 0xc002ab8dc0 +[31ef 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[31f0 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] processing txid: 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb +[31f1 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +[31f2 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[31f3 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[31f4 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[31f5 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[31f6 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[31f7 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 gate 1589998874528956000 evaluation starts +[31f8 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 signed by 0 principal evaluation starts (used [false]) +[31f9 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 processing identity 0 with bytes of 115a110 +[31fa 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 principal matched by identity 0 +[31fb 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f c3 64 ad 57 9f c8 1e 3f 52 36 79 4d 8b 4f ff |o.d.W...?R6yM.O.| +00000010 6b b2 08 cf 3e 06 8c b0 3d fb f3 bd b2 f4 80 18 |k...>...=.......| +[31fc 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 c9 4a 63 43 e5 13 cf 49 3b 29 |0E.!...JcC...I;)| +00000010 65 7f 70 37 8c e5 f0 be 61 38 03 e4 8b 70 d6 71 |e.p7....a8...p.q| +00000020 67 ab 7c b0 85 02 20 6b fc bb 04 37 c3 80 f3 03 |g.|... k...7....| +00000030 bb 83 1a 8e 03 8a f9 64 4f ef 03 94 73 5f a3 a0 |.......dO...s_..| +00000040 3d bc 9f 99 b1 38 9e |=....8.| +[31fd 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 principal evaluation succeeds for identity 0 +[31fe 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002573ef0 gate 1589998874528956000 evaluation succeeds +[31ff 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[3200 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[3201 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[3202 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[3203 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3204 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +[3205 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] Entry chaincode: name:"exp02" +[3206 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3207 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[3208 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][523b8dde] Entry chaincode: name:"exp02" +[3209 05-20 18:21:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[320a 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[320b 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] handling GET_STATE from chaincode +[320c 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] getting state for chaincode exp02, key a, channel businesschannel +[320d 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[320e 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Completed GET_STATE. Sending RESPONSE +[320f 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[3210 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] handling GET_STATE from chaincode +[3211 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] getting state for chaincode exp02, key b, channel businesschannel +[3212 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[3213 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Completed GET_STATE. Sending RESPONSE +[3214 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[3215 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] handling PUT_STATE from chaincode +[3216 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Completed PUT_STATE. Sending RESPONSE +[3217 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[3218 05-20 18:21:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] handling PUT_STATE from chaincode +[3219 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Completed PUT_STATE. Sending RESPONSE +[321a 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[321b 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [523b8dde] notifying Txid:523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, channelID:businesschannel +[321c 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[321d 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][523b8dde] Exit chaincode: name:"exp02" (12ms) +[321e 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[321f 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +[3220 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] Exit +[3221 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] Entry chaincode: name:"exp02" +[3222 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] escc for chaincode name:"exp02" is escc +[3223 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, chaincode: exp02} +[3224 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20B949A68968C82EA1BD42F8BFCBA4...455254494649434154452D2D2D2D2D0A +[3225 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8DB57902A01324AFEE36B8E5CE524737AE23CBECC79B1B57151A12C373ABE133 +[3226 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, chaincode: exp02} +[3227 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][523b8dde] Exit +[3228 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +[3229 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37130 +[322a 05-20 18:21:14.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37130 grpc.code=OK grpc.call_duration=18.0775ms +[322b 05-20 18:21:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[322c 05-20 18:21:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[322d 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37136 +[322e 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002ab9770 +[322f 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3230 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3231 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3232 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3233 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- +[3234 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[3235 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3236 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3237 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3238 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 51 89 11 ee c5 4a e1 5c 92 86 34 89 d2 a9 8d |MQ....J.\..4....| +00000010 e3 09 61 29 9d d9 af b6 f3 bb 28 ee 10 a2 cc 74 |..a)......(....t| +[3239 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 ec 2a 0b 5b c2 99 87 e9 c2 c2 1d |0D. $.*.[.......| +00000010 86 cf 75 e3 51 61 5f 04 1b 1e 3d 26 37 3e f2 55 |..u.Qa_...=&7>.U| +00000020 18 13 fe 3e 02 20 31 ff 3b 43 40 cc b8 cd dd 72 |...>. 1.;C@....r| +00000030 84 22 06 39 92 b5 2e 88 ee 12 eb 8b a5 23 05 d4 |.".9.........#..| +00000040 62 d8 7e 4a 95 cc |b.~J..| +[323a 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[323b 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002630a0, header 0xc002ab9b80 +[323c 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[323d 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] processing txid: 3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f +[323e 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f] +[323f 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[3240 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[3241 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[3242 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3243 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[3244 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 gate 1589998874744143400 evaluation starts +[3245 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 signed by 0 principal evaluation starts (used [false]) +[3246 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 processing identity 0 with bytes of 115a110 +[3247 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3248 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 principal evaluation fails +[3249 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253d520 gate 1589998874744143400 evaluation fails +[324a 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +[324b 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[324c 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[324d 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 gate 1589998874744500200 evaluation starts +[324e 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 signed by 0 principal evaluation starts (used [false]) +[324f 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 processing identity 0 with bytes of 115a110 +[3250 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[3251 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3252 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3253 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 principal matched by identity 0 +[3254 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 51 89 11 ee c5 4a e1 5c 92 86 34 89 d2 a9 8d |MQ....J.\..4....| +00000010 e3 09 61 29 9d d9 af b6 f3 bb 28 ee 10 a2 cc 74 |..a)......(....t| +[3255 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 ec 2a 0b 5b c2 99 87 e9 c2 c2 1d |0D. $.*.[.......| +00000010 86 cf 75 e3 51 61 5f 04 1b 1e 3d 26 37 3e f2 55 |..u.Qa_...=&7>.U| +00000020 18 13 fe 3e 02 20 31 ff 3b 43 40 cc b8 cd dd 72 |...>. 1.;C@....r| +00000030 84 22 06 39 92 b5 2e 88 ee 12 eb 8b a5 23 05 d4 |.".9.........#..| +00000040 62 d8 7e 4a 95 cc |b.~J..| +[3256 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 principal evaluation succeeds for identity 0 +[3257 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00253dab0 gate 1589998874744500200 evaluation succeeds +[3258 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[3259 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[325a 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[325b 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[325c 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[325d 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f] +[325e 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] Entry chaincode: name:"exp02" +[325f 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3260 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[3261 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3caefe83] Entry chaincode: name:"exp02" +[3262 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3263 05-20 18:21:14.74 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[3264 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] handling GET_STATE from chaincode +[3265 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] getting state for chaincode exp02, key a, channel businesschannel +[3266 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[3267 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] Completed GET_STATE. Sending RESPONSE +[3268 05-20 18:21:14.75 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3269 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [3caefe83] notifying Txid:3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f, channelID:businesschannel +[326a 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[326b 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3caefe83] Exit chaincode: name:"exp02" (17ms) +[326c 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[326d 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f] +[326e 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] Exit +[326f 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] Entry chaincode: name:"exp02" +[3270 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] escc for chaincode name:"exp02" is escc +[3271 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f, chaincode: exp02} +[3272 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A204CC4A260B336FF1D22A82D6280E9...455254494649434154452D2D2D2D2D0A +[3273 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 43910A6709966C77268EF78FFF632B3B18F931720DCC4D25FEF71B30B0ACA503 +[3274 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f, chaincode: exp02} +[3275 05-20 18:21:14.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3caefe83] Exit +[3276 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3caefe83c35f7d4d5987df8302be882e5ff78991cdf1611d495cab55ab5ede8f] +[3277 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37136 +[3278 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37136 grpc.code=OK grpc.call_duration=28.8691ms +[3279 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[327a 05-20 18:21:14.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[327b 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[327c 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[327d 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[327e 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[327f 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3280 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3282 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3281 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3284 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3285 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +[3286 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3287 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3288 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3289 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3283 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[328a 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[328b 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[328c 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[328d 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[328e 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[328f 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes +[3290 05-20 18:21:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes +[3291 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[3292 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[3293 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3294 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3295 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3296 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3297 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3298 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3299 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[329a 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[329b 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 gate 1589998875581618900 evaluation starts +[329c 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 signed by 0 principal evaluation starts (used [false]) +[329d 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 processing identity 0 with bytes of 115a110 +[329e 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 principal matched by identity 0 +[329f 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[32a0 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc00245f8f0 principal evaluation succeeds for identity 0 +[32a2 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00245f8f0 gate 1589998875581618900 evaluation succeeds +[32a3 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32a4 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32a5 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32a6 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32a7 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32a8 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32a9 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 752 bytes, Signature: 0 bytes +[32aa 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32ab 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32ac 05-20 18:21:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32ad 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32ae 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32af 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32b0 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 gate 1589998875592937900 evaluation starts +[32b1 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 signed by 0 principal evaluation starts (used [false]) +[32b2 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 processing identity 0 with bytes of 115a110 +[32b3 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 principal matched by identity 0 +[32b4 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[32b5 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[32b6 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 principal evaluation succeeds for identity 0 +[32b7 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000408af0 gate 1589998875592937900 evaluation succeeds +[32b8 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32b9 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32ba 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32bb 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes +[32bc 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32bd 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +[32be 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +00000040 3e a0 4f b3 e6 c4 |>.O...| +[32bf 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32c0 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32c1 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32c2 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32c3 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32c4 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 gate 1589998875599718200 evaluation starts +[32c5 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 signed by 0 principal evaluation starts (used [false]) +[32c6 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 processing identity 0 with bytes of 115a110 +[32c7 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[32c8 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 principal evaluation fails +[32c9 05-20 18:21:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000409de0 gate 1589998875599718200 evaluation fails +[32ca 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[32cb 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32cc 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[32cd 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 gate 1589998875606865800 evaluation starts +[32ce 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 signed by 0 principal evaluation starts (used [false]) +[32cf 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 processing identity 0 with bytes of 115a110 +[32d0 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 principal matched by identity 0 +[32d1 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +[32d2 05-20 18:21:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +00000040 3e a0 4f b3 e6 c4 |>.O...| +[32d3 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 principal evaluation succeeds for identity 0 +[32d4 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 gate 1589998875606865800 evaluation succeeds +[32d5 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[32d6 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[32d7 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32d8 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32d9 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32da 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 752 bytes, Signature: 0 bytes +[32db 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32dc 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[32dd 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[32de 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32df 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32e0 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32e1 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32e2 05-20 18:21:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32e3 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32e4 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32e5 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32e6 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 gate 1589998875620435000 evaluation starts +[32e7 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 signed by 0 principal evaluation starts (used [false]) +[32e8 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 processing identity 0 with bytes of 115a110 +[32e9 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 principal matched by identity 0 +[32ea 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 e0 7f 36 80 b3 e7 90 1d 7e 68 3b f8 a7 be 8d |...6.....~h;....| +00000010 a0 0a c4 f4 2a f4 a0 fd ef 80 7c 41 43 be 67 0e |....*.....|AC.g.| +[32eb 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 33 2f a9 f1 7e 91 20 58 37 c7 5d |0D. A3/..~. X7.]| +00000010 05 dd d0 3e e9 d4 32 03 9a 0e 6c f4 56 ed 99 c4 |...>..2...l.V...| +00000020 a6 db a0 d7 02 20 51 b9 6e 50 74 d3 88 7b aa d2 |..... Q.nPt..{..| +00000030 8c 6a eb 7d 43 c2 30 6b fb 76 f9 38 1a 20 bb 39 |.j.}C.0k.v.8. .9| +00000040 fa b0 68 85 ee f6 |..h...| +[32ec 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 principal evaluation succeeds for identity 0 +[32ed 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00040c0b0 gate 1589998875620435000 evaluation succeeds +[32ee 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32ef 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32f0 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32f1 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32f2 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32f3 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32f4 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32f5 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32f6 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32f7 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32f8 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32f9 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32fa 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 gate 1589998875625537900 evaluation starts +[32fb 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 signed by 0 principal evaluation starts (used [false]) +[32fc 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 processing identity 0 with bytes of 115a110 +[32fd 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 principal matched by identity 0 +[32fe 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +[32ff 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +00000040 e4 5a da 7d e5 48 |.Z.}.H| +[3300 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 principal evaluation succeeds for identity 0 +[3301 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bc370 gate 1589998875625537900 evaluation succeeds +[3302 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3303 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3304 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3305 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3306 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3307 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3308 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3309 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[330a 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[330b 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[330c 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 gate 1589998875628202600 evaluation starts +[330d 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 signed by 0 principal evaluation starts (used [false]) +[330e 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 processing identity 0 with bytes of 115a110 +[330f 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 principal matched by identity 0 +[3310 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +[3311 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +00000040 e4 5a da 7d e5 48 |.Z.}.H| +[3312 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 principal evaluation succeeds for identity 0 +[3313 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001bdad0 gate 1589998875628202600 evaluation succeeds +[3314 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3315 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3316 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3317 05-20 18:21:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3318 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +[3319 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +00000040 ac 24 01 88 e6 29 e6 |.$...).| +[331a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[331b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 737 bytes, Signature: 0 bytes +[331c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[331d 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 7e e9 c5 53 8d 1b 62 43 bf 23 78 d5 9a ed 66 |.~..S..bC.#x...f| +00000010 07 55 8c 5c 9b b4 6a 06 ac 31 66 b0 b7 0a c3 de |.U.\..j..1f.....| +[331e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 65 27 47 90 a9 e6 6b 4c be 3b aa |0D. .e'G...kL.;.| +00000010 26 92 ee c7 d8 c6 ad 46 05 9d 8a c5 cb e5 bb ec |&......F........| +00000020 b9 d0 55 5d 02 20 27 60 ba 04 67 d6 33 93 a4 2b |..U]. '`..g.3..+| +00000030 d0 c9 8e 84 6c 39 fc 11 65 ad e4 16 aa 9b 2c 71 |....l9..e.....,q| +00000040 0e 74 be f2 58 6c |.t..Xl| +[331f 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3320 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3321 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3322 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3323 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3324 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3325 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3326 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3327 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 gate 1589998875631255200 evaluation starts +[3328 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 signed by 0 principal evaluation starts (used [false]) +[3329 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 processing identity 0 with bytes of 115a110 +[332a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 principal matched by identity 0 +[332b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc a7 81 e9 17 70 77 c3 85 f6 e9 eb 6c 31 b4 28 |.....pw.....l1.(| +00000010 1a 63 f7 6c 2d c1 f9 45 38 b9 42 99 50 dd 54 4f |.c.l-..E8.B.P.TO| +[332c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 36 2e 22 b3 b8 ed 40 cf 11 a0 56 |0D. .6."...@...V| +00000010 7e 1e a4 5f 04 eb c4 04 72 45 13 0c 6a 87 74 7a |~.._....rE..j.tz| +00000020 14 dd cd 88 02 20 3c d6 3c 68 0a 4b 8e 93 6a 3c |..... <. DEBU 0xc0003b62e0 principal evaluation succeeds for identity 0 +[332e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b62e0 gate 1589998875631255200 evaluation succeeds +[332f 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3330 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3331 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3332 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3333 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 90 d9 ca ae cb c3 7d 3e 02 03 70 85 29 d4 7a |k......}>..p.).z| +00000010 85 3f 60 19 04 5c 5c eb 92 23 50 b6 6f ad b5 21 |.?`..\\..#P.o..!| +[3334 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 78 1e 3c df 0f da a6 75 38 de e6 |0D. Jx.<....u8..| +00000010 da 53 a0 41 f6 48 bb 07 38 6f 52 5c 6a b1 14 9d |.S.A.H..8oR\j...| +00000020 d4 bb 75 d7 02 20 04 3b cf fd ba 43 29 2d be 32 |..u.. .;...C)-.2| +00000030 5a a1 57 ec 92 8b 4d fe 77 95 28 23 90 65 8f 1a |Z.W...M.w.(#.e..| +00000040 44 85 f3 ea d6 67 |D....g| +[3335 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3336 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3337 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3338 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3339 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[333a 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[333b 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[333c 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[333d 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 gate 1589998875639470900 evaluation starts +[333e 05-20 18:21:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 signed by 0 principal evaluation starts (used [false]) +[333f 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 processing identity 0 with bytes of 115a110 +[3340 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 principal matched by identity 0 +[3341 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +[3342 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +00000040 ee 25 7d 3b 62 82 |.%};b.| +[3343 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 principal evaluation succeeds for identity 0 +[3344 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003b7cf0 gate 1589998875639470900 evaluation succeeds +[3345 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3346 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3347 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3348 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3349 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[334a 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[334b 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[334c 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[334d 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[334e 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[334f 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 gate 1589998875643403600 evaluation starts +[3350 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 signed by 0 principal evaluation starts (used [false]) +[3351 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 processing identity 0 with bytes of 115a110 +[3352 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 principal matched by identity 0 +[3353 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +[3354 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +00000040 ee 25 7d 3b 62 82 |.%};b.| +[3355 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 principal evaluation succeeds for identity 0 +[3356 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de860 gate 1589998875643403600 evaluation succeeds +[3357 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3358 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3359 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[335a 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[335b 05-20 18:21:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[335c 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[335d 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[335e 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[335f 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610101801 +[3360 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B4113FEAAB70A896728057585FF5C6B99B4A597FCFE2063721B9BD56FF94D03 +[3361 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[3362 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3363 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3364 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3365 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3366 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[3367 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3368 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3369 05-20 18:21:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[336a 05-20 18:21:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[336b 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[336c 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[336d 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[336e 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[336f 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3370 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[3371 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3372 05-20 18:21:15.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3373 05-20 18:21:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +[3374 05-20 18:21:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +[3375 05-20 18:21:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +[3376 05-20 18:21:15.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3377 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3378 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3379 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[337a 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[337b 05-20 18:21:15.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[337c 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[337d 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[337e 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +[337f 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +00000040 3e a0 4f b3 e6 c4 |>.O...| +[3380 05-20 18:21:15.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3381 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3382 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3383 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +[3384 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +00000040 3e a0 4f b3 e6 c4 |>.O...| +[3385 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3386 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3387 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3388 05-20 18:21:15.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3389 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +[338a 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +00000040 3e a0 4f b3 e6 c4 |>.O...| +[338b 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[338c 05-20 18:21:15.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[338d 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[338e 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[338f 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3390 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3391 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3392 05-20 18:21:16.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3393 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3394 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3395 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3396 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3397 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3398 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3399 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[339a 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[339b 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[339c 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 gate 1589998876136567500 evaluation starts +[339d 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 signed by 0 principal evaluation starts (used [false]) +[339e 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 processing identity 0 with bytes of 115a110 +[339f 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 principal matched by identity 0 +[33a0 05-20 18:21:16.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +[33a2 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +00000040 e4 5a da 7d e5 48 |.Z.}.H| +[33a3 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 principal evaluation succeeds for identity 0 +[33a4 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000339990 gate 1589998876136567500 evaluation succeeds +[33a5 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[33a6 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[33a7 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33a8 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[33a9 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33aa 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33a1 05-20 18:21:16.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[33ab 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[33ac 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33ad 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[33ae 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[33af 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[33b0 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[33b1 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[33b2 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[33b3 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 gate 1589998876163415600 evaluation starts +[33b4 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 signed by 0 principal evaluation starts (used [false]) +[33b5 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 processing identity 0 with bytes of 115a110 +[33b6 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 principal matched by identity 0 +[33b7 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +[33b8 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +00000040 e4 5a da 7d e5 48 |.Z.}.H| +[33b9 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 principal evaluation succeeds for identity 0 +[33ba 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ba5d0 gate 1589998876163415600 evaluation succeeds +[33bb 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[33bc 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[33bd 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33be 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[33bf 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33c0 05-20 18:21:16.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33c1 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[33c2 05-20 18:21:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[33c3 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33c4 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33c5 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33c6 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33c7 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[33c8 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[33c9 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33ca 05-20 18:21:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[33cb 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[33cc 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[33cd 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[33ce 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[33cf 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[33d0 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 gate 1589998876437216700 evaluation starts +[33d1 05-20 18:21:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 signed by 0 principal evaluation starts (used [false]) +[33d2 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 processing identity 0 with bytes of 115a110 +[33d3 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 principal matched by identity 0 +[33d4 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +[33d5 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +00000040 ee 25 7d 3b 62 82 |.%};b.| +[33d6 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 principal evaluation succeeds for identity 0 +[33d7 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cc8e0 gate 1589998876437216700 evaluation succeeds +[33d8 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[33d9 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[33da 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33db 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[33dc 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33dd 05-20 18:21:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33de 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[33df 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[33e0 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[33e1 05-20 18:21:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[33e2 05-20 18:21:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33e3 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[33e4 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[33e5 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[33e6 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[33e7 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33e8 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[33e9 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[33ea 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[33eb 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[33ec 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[33ed 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 gate 1589998876589398000 evaluation starts +[33ee 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 signed by 0 principal evaluation starts (used [false]) +[33ef 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 processing identity 0 with bytes of 115a110 +[33f0 05-20 18:21:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 principal matched by identity 0 +[33f1 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 a3 ec 61 a4 ad 59 ea 0d d4 21 2b 5b 17 ab 9a |`..a..Y...!+[...| +00000010 9c a0 1a 50 b3 8f 56 15 01 e6 88 09 86 5e bd cd |...P..V......^..| +[33f2 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 48 aa fc f8 38 9b 88 7c 3f 1b |0E.!..H...8..|?.| +00000010 33 c7 ff 2b 76 bb aa af ac cb 54 f5 33 53 2f 7f |3..+v.....T.3S/.| +00000020 c4 c8 ab b7 90 02 20 63 73 30 8d 2b 48 d1 6b 6c |...... cs0.+H.kl| +00000030 ba a4 0e 90 77 93 77 24 a2 66 27 82 ed 77 88 a8 |....w.w$.f'..w..| +00000040 d0 41 f6 eb c5 5f 62 |.A..._b| +[33f3 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 principal evaluation succeeds for identity 0 +[33f4 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003cd920 gate 1589998876589398000 evaluation succeeds +[33f5 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[33f6 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[33f7 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[33f8 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[33f9 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +[33fa 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +[33fb 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[33fc 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +[33fd 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +[33fe 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +[33ff 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +[3400 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +[3401 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[3402 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0034ca6c0 env 0xc0028394f0 txn 0 +[3403 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0028394f0 +[3404 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +[3405 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3406 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +[3407 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3408 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes to the block puller +[3409 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[340a 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +[340b 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[340c 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[340d 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a 7e c4 71 ef b0 20 ae cd 05 10 be 77 ae f6 68 |.~.q.. .....w..h| +00000010 4b 20 de 34 61 55 df 2a 9b 70 6c 05 f8 d9 58 f1 |K .4aU.*.pl...X.| +[340e 05-20 18:21:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 f1 17 4c a9 a9 d6 1e 50 a5 18 |0E.!....L....P..| +00000010 e7 94 ff 3a 5b 3e 7f 2a d7 2f 47 85 a5 2a e8 5a |...:[>.*./G..*.Z| +00000020 8a 68 49 69 f0 02 20 3c f9 13 4b 83 24 18 9c c7 |.hIi.. <..K.$...| +00000030 06 c2 76 90 44 10 43 e8 4b 7a ea 74 b6 08 d1 7e |..v.D.C.Kz.t...~| +00000040 9d 56 77 6a 8e 23 e5 |.Vwj.#.| +[340f 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3410 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002680800, header channel_header:"\010\003\032\014\010\232\352\225\366\005\020\204\304\243\373\001\"\017businesschannel*@523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\216\022\313a<\313s\313\270\344\016\002L\035V\177h>tb[\327\315\311" +[3411 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[3412 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[3413 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[3414 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[3415 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] +[3416 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[3417 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00261d800 +[3418 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1aa5a4ec-ef09-4241-983e-1e35c5c71757] +[3419 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[341a 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1aa5a4ec-ef09-4241-983e-1e35c5c71757] +[341b 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +[341c 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b481a9f7-4842-4b1f-b04f-1e32c1820c6c] +[341d 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b481a9f7-4842-4b1f-b04f-1e32c1820c6c] +[341e 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 gate 1589998876601436800 evaluation starts +[341f 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 signed by 0 principal evaluation starts (used [false]) +[3420 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 processing identity 0 with bytes of 115a110 +[3421 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 principal matched by identity 0 +[3422 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d b5 79 02 a0 13 24 af ee 36 b8 e5 ce 52 47 37 |..y...$..6...RG7| +00000010 ae 23 cb ec c7 9b 1b 57 15 1a 12 c3 73 ab e1 33 |.#.....W....s..3| +[3423 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 c0 40 ba fd 54 d1 92 c4 ba 63 |0E.!...@..T....c| +00000010 18 50 b5 27 31 85 77 5c 74 2d 19 c2 1e 4b 9d e3 |.P.'1.w\t-...K..| +00000020 38 f5 37 e3 7c 02 20 0c 58 b1 88 a5 16 5e d1 c6 |8.7.|. .X....^..| +00000030 6d 9f 41 d6 b1 4c 07 49 8c b4 f5 07 dd 09 10 78 |m.A..L.I.......x| +00000040 2b 80 b1 b5 92 a5 b3 |+......| +[3424 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3425 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 principal evaluation succeeds for identity 0 +[3427 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3426 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 signed by 1 principal evaluation starts (used [true]) +[3428 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 skipping identity 0 because it has already been used +[3429 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[342a 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 principal evaluation fails +[342b 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00043a8d0 gate 1589998876601436800 evaluation succeeds +[342c 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[342d 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f6419456-2439-4e8f-858a-28987f0f2083] +[342e 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f6419456-2439-4e8f-858a-28987f0f2083] +[342f 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes to 1 peers +[3430 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +[3431 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb appears to be valid +[3432 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3433 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00261d800 +[3434 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3435 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0034ca6c0 env 0xc0028394f0 txn 0 +[3436 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[3437 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4023 bytes, seq: 4}, Envelope: 4053 bytes, Signature: 0 bytes +[3438 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3439 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 6ms +[343a 05-20 18:21:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[343b 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[343c 05-20 18:21:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +[343d 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[343e 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[343f 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[3440 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +[3441 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[3442 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[3443 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[3444 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[3445 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[3446 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[3447 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3448 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[3449 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] marked as valid by state validator +[344a 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034cb740), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034cb780)} +[344b 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[344c 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[344d 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[344e 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +[344f 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +[3450 05-20 18:21:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +[3451 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +[3452 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3453 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3454 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3455 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3456 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3457 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +[3458 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +00000040 40 06 f5 13 60 a2 52 |@...`.R| +[3459 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[345a 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 96 f4 fd d3 fa 0a bd 96 aa eb |0E.!............| +00000010 f8 03 a4 45 c3 11 50 7e 34 52 72 c5 91 94 39 81 |...E..P~4Rr...9.| +00000020 06 a3 30 e1 40 02 20 77 bf 22 c6 3b 50 88 07 42 |..0.@. w.".;P..B| +00000030 96 4d c1 89 f6 e0 a9 3c b1 d5 ed 88 83 56 0e 3f |.M.....<.....V.?| +00000040 05 be cf 44 ef e8 b8 |...D...| +[345b 05-20 18:21:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0xa4, 0x2e, 0x9a, 0xd0, 0x47, 0x9a, 0xd6, 0x54, 0xc0, 0x1a, 0xaa, 0x8c, 0xcf, 0x92, 0x89, 0x7b, 0x18, 0x78, 0x45, 0x2d, 0x50, 0x36, 0x95, 0xaf, 0xa8, 0x78, 0xd1, 0xa7, 0xb2, 0x8a, 0xb1, 0xaf} txOffsets= +txId=523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb locPointer=offset=70, bytesLength=2982 +] +[345c 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2982] for tx ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to txid-index +[345d 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2982] for tx number:[0] ID: [523b8ddec72553d199efaae72e880522dbce43076f8b0024687c9ecdbd0760bb] to blockNumTranNum index +[345e 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[345f 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[3460 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3461 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3462 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3463 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3464 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3465 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3466 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3467 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3468 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3469 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[346a 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[346b 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[346c 05-20 18:21:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[346d 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93507], isChainEmpty=[false], lastBlockNumber=[4] +[346e 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +[346f 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +[3470 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +[3471 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[3472 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[3473 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[3474 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[3475 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[3476 05-20 18:21:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[3477 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[3478 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +[3479 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +[347a 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +[347b 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[347c 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +[347d 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +[347e 05-20 18:21:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +[347f 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 60ms (state_validation=6ms block_and_pvtdata_commit=40ms state_commit=7ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +[3480 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3481 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08051A0C0A0565787030321203312E30 +[3482 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 183899186ECD66C583B6CFE6179CB80F29AB8A6CB5675FDD377B09AFF4BBCE4F +[3483 05-20 18:21:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +[3484 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3485 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3486 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3487 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3488 05-20 18:21:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3489 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[348a 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[348b 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[348c 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[348d 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[348e 05-20 18:21:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[348f 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3490 05-20 18:21:16.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3491 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3492 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3493 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[3494 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3495 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3496 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3497 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3498 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3499 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[349a 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[349b 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[349c 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[349d 05-20 18:21:16.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[349e 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[349f 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34a0 05-20 18:21:16.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34a2 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[34a3 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[34a4 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[34a5 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[34a6 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[34a7 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[34a8 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 gate 1589998876921927800 evaluation starts +[34a9 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 signed by 0 principal evaluation starts (used [false]) +[34aa 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 processing identity 0 with bytes of 115a110 +[34ab 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 principal matched by identity 0 +[34ac 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +[34ad 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +00000040 b3 67 a8 db 29 82 |.g..).| +[34ae 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 principal evaluation succeeds for identity 0 +[34af 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000303420 gate 1589998876921927800 evaluation succeeds +[34b0 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[34b1 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[34b2 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[34b3 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[34b4 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[34b5 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[34b6 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[34b7 05-20 18:21:16.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[34b8 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[34b9 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34ba 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34bb 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34bc 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[34bd 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34be 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34bf 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34c0 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[34c1 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[34c2 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[34c3 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34a1 05-20 18:21:16.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[34c4 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[34c5 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[34c6 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34c7 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[34c8 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[34c9 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[34cb 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34ca 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[34cc 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[34cd 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[34ce 05-20 18:21:16.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34cf 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[34d0 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161031 +[34d1 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A831E61CCFF16F6CF97C1DADAC967635AE6CF5695BD8CFDB87E5069E0CD9B891 +[34d2 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[34d3 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[34d4 05-20 18:21:17.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[34d5 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34d6 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[34d7 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[34d9 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34d8 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[34da 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34db 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[34dc 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[34de 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34dd 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[34df 05-20 18:21:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34e0 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[34e1 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[34e2 05-20 18:21:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34e3 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[34e4 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[34e5 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +[34e6 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +00000040 5e cf 4f 22 10 20 d1 |^.O". .| +[34e7 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[34e8 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 7f 63 58 74 ca eb 90 bc 99 7e 32 |0D. H.cXt.....~2| +00000010 a7 05 d9 6b 6b 30 19 c9 98 42 fc 7c e6 59 68 17 |...kk0...B.|.Yh.| +00000020 28 4b 3a 7b 02 20 2b 92 9f bf c4 f9 9e 83 c7 26 |(K:{. +........&| +00000030 45 9c 44 9d ea f2 c7 43 05 8c 54 fe de 02 25 85 |E.D....C..T...%.| +00000040 90 80 be 60 b5 48 |...`.H| +[34e9 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[34ea 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[34eb 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34ec 05-20 18:21:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34ed 05-20 18:21:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[34ee 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[34ef 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34f0 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[34f1 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[34f2 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34f3 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[34f4 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[34f5 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[34f6 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[34f7 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[34f8 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[34f9 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 gate 1589998877065881200 evaluation starts +[34fa 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 signed by 0 principal evaluation starts (used [false]) +[34fb 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 processing identity 0 with bytes of 115a110 +[34fc 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 principal matched by identity 0 +[34fd 05-20 18:21:17.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ce ce ce c4 86 af bb d9 18 70 f6 e7 2f f9 fe |..........p../..| +00000010 1b 23 8a d4 51 95 ac 30 2d 07 b1 80 4a f9 59 dd |.#..Q..0-...J.Y.| +[34fe 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 ef 0e 57 d8 8b 4a df fa 11 5a 8f |0D. i..W..J...Z.| +00000010 12 49 28 4a ed 64 41 00 68 4a dc bb 0b 3a f3 39 |.I(J.dA.hJ...:.9| +00000020 36 81 a9 a2 02 20 5e 2e 83 62 73 55 b2 a6 17 9d |6.... ^..bsU....| +00000030 01 ef 93 a0 29 e2 f2 73 06 8f 5a 69 bd 67 10 b4 |....)..s..Zi.g..| +00000040 b3 67 a8 db 29 82 |.g..).| +[34ff 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 principal evaluation succeeds for identity 0 +[3500 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4410 gate 1589998877065881200 evaluation succeeds +[3501 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3502 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3503 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3504 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3505 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3506 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3507 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3508 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +[3509 05-20 18:21:17.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +00000040 5e cf 4f 22 10 20 d1 |^.O". .| +[350a 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[350b 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[350c 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[350d 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[350e 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[350f 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3510 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +[3511 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +00000040 40 06 f5 13 60 a2 52 |@...`.R| +[3512 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3513 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3514 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3515 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[3516 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3517 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 53 9e 7e 78 67 e3 60 ee b5 ac ab 05 76 40 56 |.S.~xg.`.....v@V| +00000010 43 f0 a8 37 50 79 d3 0d 00 e8 28 b5 ea ee 8f 41 |C..7Py....(....A| +[3518 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 ff 4e ff 02 28 55 cf 3b 0b 1a |0E.!...N..(U.;..| +00000010 25 d4 0a c4 d2 36 83 4e 8d 38 77 12 b0 04 1d 5d |%....6.N.8w....]| +00000020 71 c1 15 24 02 02 20 0d 68 13 9c c8 cd c1 1a 1c |q..$.. .h.......| +00000030 43 d5 b8 d2 a7 6f 8e 81 0d 09 60 e8 4e b4 11 3a |C....o....`.N..:| +00000040 40 06 f5 13 60 a2 52 |@...`.R| +[3519 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[351a 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[351b 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[351c 05-20 18:21:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[351d 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 31 e6 1c cf f1 6f 6c f9 7c 1d ad ac 96 76 35 |.1....ol.|....v5| +00000010 ae 6c f5 69 5b d8 cf db 87 e5 06 9e 0c d9 b8 91 |.l.i[...........| +[351e 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff ec 5a 87 35 31 57 ef 5e 92 3d |0E.!...Z.51W.^.=| +00000010 42 df bf df 38 30 f4 b2 e2 41 de 20 e7 30 ad 12 |B...80...A. .0..| +00000020 d0 59 48 be be 02 20 4c c2 50 16 21 5b 87 ae d4 |.YH... L.P.![...| +00000030 cb 9d b1 55 ea eb ad 27 17 7d 8b 10 c7 b7 91 ad |...U...'.}......| +00000040 5e cf 4f 22 10 20 d1 |^.O". .| +[351f 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3520 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3521 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3522 05-20 18:21:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3523 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3524 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3525 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3526 05-20 18:21:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3527 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3528 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3529 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[352a 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[352b 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[352c 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[352d 05-20 18:21:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[352e 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37140 +[352f 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000322280 +[3530 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3531 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3532 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3533 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[3534 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3535 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 bb 7c 6f 95 ef 22 03 2c c1 03 39 06 19 6e ee |7.|o..".,..9..n.| +00000010 5d 4d 29 1f c7 32 04 22 df 23 38 02 70 0d 4d 33 |]M)..2.".#8.p.M3| +[3536 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 7f fb 46 45 f9 78 ad 06 f3 20 |0E.!....FE.x... | +00000010 5b 5f 5d 54 81 af d8 02 7f 05 12 0e 9d e3 6d f7 |[_]T..........m.| +00000020 c9 5f 58 e8 15 02 20 4d 84 e6 a9 42 d1 14 86 9a |._X... M...B....| +00000030 bc fe 2e 8c 92 ec d7 c0 68 43 f8 7e 72 de 2c 91 |........hC.~r.,.| +00000040 87 e9 2d bd 39 5a 8b |..-.9Z.| +[3537 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3538 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00037aa80, header 0xc000322690 +[3539 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[353a 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] processing txid: 80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f +[353b 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f] +[353c 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[353d 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[353e 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[353f 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3540 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[3541 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 gate 1589998877198223400 evaluation starts +[3542 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 signed by 0 principal evaluation starts (used [false]) +[3543 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 processing identity 0 with bytes of 115a110 +[3544 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3545 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 principal evaluation fails +[3546 05-20 18:21:17.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004945b60 gate 1589998877198223400 evaluation fails +[3547 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +[3548 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[3549 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[354a 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 gate 1589998877201494400 evaluation starts +[354b 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 signed by 0 principal evaluation starts (used [false]) +[354c 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 processing identity 0 with bytes of 115a110 +[354d 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 principal matched by identity 0 +[354e 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 bb 7c 6f 95 ef 22 03 2c c1 03 39 06 19 6e ee |7.|o..".,..9..n.| +00000010 5d 4d 29 1f c7 32 04 22 df 23 38 02 70 0d 4d 33 |]M)..2.".#8.p.M3| +[354f 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 7f fb 46 45 f9 78 ad 06 f3 20 |0E.!....FE.x... | +00000010 5b 5f 5d 54 81 af d8 02 7f 05 12 0e 9d e3 6d f7 |[_]T..........m.| +00000020 c9 5f 58 e8 15 02 20 4d 84 e6 a9 42 d1 14 86 9a |._X... M...B....| +00000030 bc fe 2e 8c 92 ec d7 c0 68 43 f8 7e 72 de 2c 91 |........hC.~r.,.| +00000040 87 e9 2d bd 39 5a 8b |..-.9Z.| +[3550 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 principal evaluation succeeds for identity 0 +[3551 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a200d0 gate 1589998877201494400 evaluation succeeds +[3552 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[3553 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[3554 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[3555 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[3556 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3557 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f] +[3558 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] Entry chaincode: name:"exp02" +[3559 05-20 18:21:17.20 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[355a 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[355b 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][80971321] Entry chaincode: name:"exp02" +[355c 05-20 18:21:17.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[355d 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[355e 05-20 18:21:17.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[355f 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3560 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3561 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3562 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3563 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3564 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3565 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3566 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3567 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3568 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3569 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 gate 1589998877246567500 evaluation starts +[356a 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 signed by 0 principal evaluation starts (used [false]) +[356b 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 processing identity 0 with bytes of 115a110 +[356c 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 principal matched by identity 0 +[356d 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 85 a1 71 0f 13 04 53 48 63 2b 13 cb 00 a6 c9 |8..q...SHc+.....| +00000010 e9 08 2c a5 e0 f6 74 db 59 27 df 90 4b ba 91 0c |..,...t.Y'..K...| +[356e 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 07 6d 0c eb de 11 0c 58 65 7b |0E.!...m.....Xe{| +00000010 03 0c f3 04 a5 57 c7 4f 39 04 ae ef 9b 31 75 2f |.....W.O9....1u/| +00000020 55 71 b2 62 9d 02 20 76 b2 3a 92 b3 da 40 9d ea |Uq.b.. v.:...@..| +00000030 65 69 b4 7c 72 a3 7c ed 23 92 41 83 85 78 af f1 |ei.|r.|.#.A..x..| +00000040 f7 89 17 55 8d 58 a8 |...U.X.| +[356f 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 principal evaluation succeeds for identity 0 +[3570 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d9b0 gate 1589998877246567500 evaluation succeeds +[3571 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3572 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3573 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3574 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3575 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3576 05-20 18:21:17.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3577 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3578 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3579 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[357a 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[357c 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[357d 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[357e 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[357f 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3580 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3581 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3582 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[3583 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3584 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3585 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[357b 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[3586 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] handling GET_STATE from chaincode +[3587 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] getting state for chaincode exp02, key a, channel businesschannel +[3588 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[3589 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] Completed GET_STATE. Sending RESPONSE +[358a 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[358b 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [80971321] notifying Txid:80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f, channelID:businesschannel +[358c 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[358d 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][80971321] Exit chaincode: name:"exp02" (48ms) +[358e 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[358f 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f] +[3590 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] Exit +[3591 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] Entry chaincode: name:"exp02" +[3592 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] escc for chaincode name:"exp02" is escc +[3593 05-20 18:21:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f, chaincode: exp02} +[3594 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A207889D5FF5CD303F2B49E9E532936...455254494649434154452D2D2D2D2D0A +[3595 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 51256D1FC7CEF52FA967A8006D3CF9F37D6B88276F9C7771445D5A2C622B604D +[3596 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f, chaincode: exp02} +[3597 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][80971321] Exit +[3598 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [80971321a78c7eed69d27590c88a4c13bfdc51cac07217626afe08708a00e92f] +[3599 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37140 +[359a 05-20 18:21:17.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37140 grpc.code=OK grpc.call_duration=71.9182ms +[359b 05-20 18:21:17.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[359c 05-20 18:21:17.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[359d 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37144 +[359e 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003c06e0 +[359f 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[35a0 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[35a1 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[35a2 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[35a3 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[35a4 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 81 b2 3e fd 64 d5 51 2e 92 ce 21 72 9b 55 45 |2..>.d.Q...!r.UE| +00000010 08 b4 35 96 a3 c5 ea 99 20 08 5e 9a 11 12 f6 4a |..5..... .^....J| +[35a5 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 04 17 47 9b 11 6d 57 4e c4 bf |0E.!....G..mWN..| +00000010 22 d2 3f ae 23 ca 61 a4 dd bb e0 53 aa 81 32 9d |".?.#.a....S..2.| +00000020 e3 ac 47 e2 95 02 20 06 3f e4 54 8a fa f3 30 42 |..G... .?.T...0B| +00000030 48 1c 96 9e 0a 53 59 de 36 84 a6 62 31 61 a3 1d |H....SY.6..b1a..| +00000040 ba 30 71 c8 b3 40 cd |.0q..@.| +[35a6 05-20 18:21:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[35a7 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000170af0, header 0xc0003c0af0 +[35a8 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[35a9 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] processing txid: f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 +[35aa 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +[35ab 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[35ac 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[35ad 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[35ae 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[35af 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[35b0 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 gate 1589998877501339900 evaluation starts +[35b1 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 signed by 0 principal evaluation starts (used [false]) +[35b2 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 processing identity 0 with bytes of 115a110 +[35b3 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[35b4 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 principal evaluation fails +[35b5 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afcb30 gate 1589998877501339900 evaluation fails +[35b6 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +[35b7 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[35b8 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[35b9 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 gate 1589998877503408000 evaluation starts +[35ba 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 signed by 0 principal evaluation starts (used [false]) +[35bb 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 processing identity 0 with bytes of 115a110 +[35bc 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 principal matched by identity 0 +[35bd 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 81 b2 3e fd 64 d5 51 2e 92 ce 21 72 9b 55 45 |2..>.d.Q...!r.UE| +00000010 08 b4 35 96 a3 c5 ea 99 20 08 5e 9a 11 12 f6 4a |..5..... .^....J| +[35be 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 04 17 47 9b 11 6d 57 4e c4 bf |0E.!....G..mWN..| +00000010 22 d2 3f ae 23 ca 61 a4 dd bb e0 53 aa 81 32 9d |".?.#.a....S..2.| +00000020 e3 ac 47 e2 95 02 20 06 3f e4 54 8a fa f3 30 42 |..G... .?.T...0B| +00000030 48 1c 96 9e 0a 53 59 de 36 84 a6 62 31 61 a3 1d |H....SY.6..b1a..| +00000040 ba 30 71 c8 b3 40 cd |.0q..@.| +[35bf 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 principal evaluation succeeds for identity 0 +[35c0 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004afd0a0 gate 1589998877503408000 evaluation succeeds +[35c1 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[35c2 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[35c3 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[35c4 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[35c5 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[35c6 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +[35c7 05-20 18:21:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] Entry chaincode: name:"exp02" +[35c8 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[35c9 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[35ca 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f7da02c4] Entry chaincode: name:"exp02" +[35cb 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[35cc 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[35cd 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] handling GET_STATE from chaincode +[35ce 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] getting state for chaincode exp02, key a, channel businesschannel +[35cf 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[35d0 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Completed GET_STATE. Sending RESPONSE +[35d1 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[35d2 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] handling GET_STATE from chaincode +[35d3 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] getting state for chaincode exp02, key b, channel businesschannel +[35d4 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[35d5 05-20 18:21:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Completed GET_STATE. Sending RESPONSE +[35d6 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[35d7 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] handling PUT_STATE from chaincode +[35d8 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Completed PUT_STATE. Sending RESPONSE +[35d9 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[35da 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] handling PUT_STATE from chaincode +[35db 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Completed PUT_STATE. Sending RESPONSE +[35dc 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[35dd 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [f7da02c4] notifying Txid:f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, channelID:businesschannel +[35de 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[35df 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f7da02c4] Exit chaincode: name:"exp02" (14ms) +[35e0 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[35e1 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +[35e2 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] Exit +[35e3 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] Entry chaincode: name:"exp02" +[35e4 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] escc for chaincode name:"exp02" is escc +[35e5 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, chaincode: exp02} +[35e6 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20B57D90A38DDE60D7CDE95F55FA89...455254494649434154452D2D2D2D2D0A +[35e7 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AE84BA80897D6FBB1B4CACE4DD01E33CDE3DF067ADC1136CAB14C818D0A72997 +[35e8 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, chaincode: exp02} +[35e9 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7da02c4] Exit +[35ea 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +[35eb 05-20 18:21:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37144 +[35ec 05-20 18:21:17.53 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37144 grpc.code=OK grpc.call_duration=35.0697ms +[35ed 05-20 18:21:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[35ee 05-20 18:21:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[35ef 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37150 +[35f0 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000323b80 +[35f1 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[35f2 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[35f3 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[35f4 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[35f5 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[35f6 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e4 fa d5 ba 29 ad 1d 18 a5 22 50 19 c2 26 7b |.....)...."P..&{| +00000010 32 1f 0a de 10 c4 bb 8b 58 9e 9f 4d 2c b3 8e 81 |2.......X..M,...| +[35f7 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 7f 1f 46 f0 48 21 d2 3e 5a 26 |0E.!....F.H!.>Z&| +00000010 e4 8c b0 5d 23 27 8c 6a 89 47 22 57 93 98 70 c4 |...]#'.j.G"W..p.| +00000020 03 21 e3 9e 21 02 20 4e 63 81 63 ec e1 77 76 8f |.!..!. Nc.c..wv.| +00000030 e3 fa 09 1d c2 20 cb 03 fc ed 3c 0f 9c 09 c7 c2 |..... ....<.....| +00000040 2b 92 5e 5d 4c ee f4 |+.^]L..| +[35f8 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[35f9 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00037b570, header 0xc000323f90 +[35fa 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[35fb 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] processing txid: a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa +[35fc 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa] +[35fd 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[35fe 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[35ff 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[3600 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3601 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[3602 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 gate 1589998877929684500 evaluation starts +[3603 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 signed by 0 principal evaluation starts (used [false]) +[3604 05-20 18:21:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 processing identity 0 with bytes of 115a110 +[3605 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 principal matched by identity 0 +[3606 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e4 fa d5 ba 29 ad 1d 18 a5 22 50 19 c2 26 7b |.....)...."P..&{| +00000010 32 1f 0a de 10 c4 bb 8b 58 9e 9f 4d 2c b3 8e 81 |2.......X..M,...| +[3607 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 7f 1f 46 f0 48 21 d2 3e 5a 26 |0E.!....F.H!.>Z&| +00000010 e4 8c b0 5d 23 27 8c 6a 89 47 22 57 93 98 70 c4 |...]#'.j.G"W..p.| +00000020 03 21 e3 9e 21 02 20 4e 63 81 63 ec e1 77 76 8f |.!..!. Nc.c..wv.| +00000030 e3 fa 09 1d c2 20 cb 03 fc ed 3c 0f 9c 09 c7 c2 |..... ....<.....| +00000040 2b 92 5e 5d 4c ee f4 |+.^]L..| +[3608 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 principal evaluation succeeds for identity 0 +[3609 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003568c00 gate 1589998877929684500 evaluation succeeds +[360a 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[360b 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[360c 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[360d 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[360e 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[360f 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa] +[3610 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] Entry chaincode: name:"exp02" +[3611 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3612 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[3613 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a58d159c] Entry chaincode: name:"exp02" +[3614 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3615 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[3616 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] handling GET_STATE from chaincode +[3617 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] getting state for chaincode exp02, key a, channel businesschannel +[3618 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[3619 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] Completed GET_STATE. Sending RESPONSE +[361a 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[361b 05-20 18:21:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU [a58d159c] notifying Txid:a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa, channelID:businesschannel +[361c 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[361d 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a58d159c] Exit chaincode: name:"exp02" (6ms) +[361e 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[361f 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa] +[3620 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] Exit +[3621 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] Entry chaincode: name:"exp02" +[3622 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] escc for chaincode name:"exp02" is escc +[3623 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa, chaincode: exp02} +[3624 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C4428E6EA59D8F3593FC924E4350...455254494649434154452D2D2D2D2D0A +[3625 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3751A47567E8F3D3B6ED3077B0641A49B60AF0C290156EAA88B52CE746FEA341 +[3626 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa, chaincode: exp02} +[3627 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a58d159c] Exit +[3628 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a58d159c72b5b8a0799c4cec8a9cc3208ba333094041115b4455820e2cd260aa] +[3629 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37150 +[362a 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37150 grpc.code=OK grpc.call_duration=21.4332ms +[362b 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[362c 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37150: read: connection reset by peer +[362d 05-20 18:21:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[362e 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[362f 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3630 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3631 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3632 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3633 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 f6 d9 38 52 06 dd c7 51 57 e7 64 fb b8 df ff |...8R...QW.d....| +00000010 16 b9 6b 34 81 ff 7b 79 35 d2 9c a8 e2 0a a7 52 |..k4..{y5......R| +[3634 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 4d 13 6e 93 cb 99 64 dd cc b8 |0E.!..M.n...d...| +00000010 d5 ec e1 7b bb c0 26 d3 5f 7d a1 5e 6b e5 36 af |...{..&._}.^k.6.| +00000020 50 5e f3 6a 6a 02 20 0c 96 69 07 04 73 77 a3 77 |P^.jj. ..i..sw.w| +00000030 e5 74 a6 c4 1f d9 12 7a b3 23 6e 6b 74 82 08 b2 |.t.....z.#nkt...| +00000040 cc 4b 07 50 38 e3 4d |.K.P8.M| +[3635 05-20 18:21:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3636 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3637 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3638 05-20 18:21:18.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3639 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[363a 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[363b 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[363c 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[363d 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[363e 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[363f 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3640 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3641 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3643 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3644 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3645 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3642 05-20 18:21:18.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3646 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3647 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3648 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3649 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[364a 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[364b 05-20 18:21:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[364c 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[364d 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[364e 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[364f 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3650 05-20 18:21:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3651 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3652 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3653 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3654 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3655 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3656 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3657 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3658 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3659 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[365a 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[365b 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[365c 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[365d 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 gate 1589998878687572600 evaluation starts +[365e 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 signed by 0 principal evaluation starts (used [false]) +[365f 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 processing identity 0 with bytes of 115a110 +[3660 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 principal matched by identity 0 +[3661 05-20 18:21:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 09 e9 ba f6 ba 81 60 61 82 5a cc 3e 87 e5 0a |i......`a.Z.>...| +00000010 00 0d 9f 4a aa c9 93 ec 11 90 ac 79 9f 00 58 2d |...J.......y..X-| +[3662 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 88 bf 1b 78 8b 0d b6 bf b3 41 0b |0D. `...x.....A.| +00000010 00 89 a1 2d e9 a4 c1 03 65 e1 f0 2b 7a bb 03 87 |...-....e..+z...| +00000020 fd 1f c4 3e 02 20 4d d6 3c fa 0f 2f ad 38 62 94 |...>. M.<../.8b.| +00000030 01 89 33 cc 0f 8e 42 76 27 5f 8b 9c e5 a9 09 54 |..3...Bv'_.....T| +00000040 67 9f 36 b5 5a fb |g.6.Z.| +[3663 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 principal evaluation succeeds for identity 0 +[3664 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003587670 gate 1589998878687572600 evaluation succeeds +[3665 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3667 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3668 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3666 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3669 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[366a 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[366b 05-20 18:21:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[366c 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[366d 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[366e 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[366f 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3670 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3671 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3672 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3673 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3674 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3675 05-20 18:21:18.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3676 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3677 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3678 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3679 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[367a 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[367b 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[367c 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[367d 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[367e 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[367f 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3680 05-20 18:21:18.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3681 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3682 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3683 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3684 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3685 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3686 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3687 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3688 05-20 18:21:18.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3689 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[368a 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[368b 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[368c 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[368d 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[368e 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[368f 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3690 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3691 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3692 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3693 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3694 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3695 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 gate 1589998878923826400 evaluation starts +[3696 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 signed by 0 principal evaluation starts (used [false]) +[3697 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 processing identity 0 with bytes of 115a110 +[3698 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 principal matched by identity 0 +[3699 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 f5 cf b1 26 88 36 e3 91 86 31 95 e4 31 39 82 |....&.6...1..19.| +00000010 a2 b8 2c c3 d9 01 f1 2f 11 a6 d8 40 96 99 c0 b0 |..,..../...@....| +[369a 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 a0 b9 28 48 8a 6a 74 3a d8 16 f4 |0D. 2..(H.jt:...| +00000010 cc 0a 44 32 63 7f a2 37 99 57 8a 07 e5 d0 1d a8 |..D2c..7.W......| +00000020 7e de 0d 5c 02 20 6e e7 21 36 ee 96 33 80 3d 73 |~..\. n.!6..3.=s| +00000030 2d 7b 26 10 7e a8 b8 e2 08 39 38 f6 3c dc 63 7c |-{&.~....98.<.c|| +00000040 11 c1 6f 7a 49 29 |..ozI)| +[369b 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 principal evaluation succeeds for identity 0 +[369c 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003600cc0 gate 1589998878923826400 evaluation succeeds +[369d 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[369e 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[369f 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36a0 05-20 18:21:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36a1 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36a2 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[36a3 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36a4 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36a5 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[36a6 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[36a7 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36a8 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[36a9 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36aa 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ab 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ac 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ad 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36ae 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36af 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b0 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b1 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36b2 05-20 18:21:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b3 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36b4 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36b5 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36b6 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36b7 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36b8 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36b9 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[36ba 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36bb 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36bc 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[36bd 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36be 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36bf 05-20 18:21:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36c0 05-20 18:21:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36c1 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[36c2 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161032 +[36c3 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8B9394CA94358026C90CD2F3699D130C2B981317D5977EFAE8C5B1CAAAA7EFD8 +[36c4 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[36c5 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[36c6 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[36c7 05-20 18:21:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[36c8 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c9 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36ca 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36cb 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[36cc 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[36cd 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36ce 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[36cf 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36d0 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36d1 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36d2 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36d3 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36d4 05-20 18:21:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36d5 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d6 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d7 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d8 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d9 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +[36da 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[36db 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36dc 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[36dd 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36de 05-20 18:21:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36df 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[36e0 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[36e2 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36e1 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36e3 05-20 18:21:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[36e4 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36e5 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[36e6 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36e7 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[36e9 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[36e8 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[36eb 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[36ec 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[36ed 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[36ee 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 gate 1589998879598336300 evaluation starts +[36ef 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 signed by 0 principal evaluation starts (used [false]) +[36f0 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 processing identity 0 with bytes of 115a110 +[36f1 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 principal matched by identity 0 +[36f2 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c d2 c0 ed c4 0d 9d 19 e2 6d ec 9d 39 f9 4c 81 |l........m..9.L.| +00000010 7a 1d b7 69 ac 32 79 ae ff 19 c5 56 5c 20 d1 1b |z..i.2y....V\ ..| +[36f3 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[36f4 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 72 cf 47 ba a7 3c d1 29 ce 51 67 |0D. qr.G..<.).Qg| +00000010 8b 1d ec 33 b2 bb d0 94 17 0a 4f ba ca 53 66 fa |...3......O..Sf.| +00000020 d3 20 7a 6a 02 20 60 80 81 60 7c 44 fd 13 ef 6a |. zj. `..`|D...j| +00000030 37 ed 6f c6 ed 11 ec b5 2f 13 79 39 26 22 c0 e2 |7.o...../.y9&"..| +00000040 2d 26 72 55 6f 1b |-&rUo.| +[36f5 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[36f6 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36f7 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 principal evaluation succeeds for identity 0 +[36f8 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364e3f0 gate 1589998879598336300 evaluation succeeds +[36f9 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[36fa 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[36fb 05-20 18:21:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[36fd 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +[36fc 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[36fe 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +[3700 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +[3701 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[3702 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[36ff 05-20 18:21:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +00000040 ac 24 01 88 e6 29 e6 |.$...).| +[3705 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +[3706 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +00000040 3e a0 4f b3 e6 c4 |>.O...| +[3703 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[3707 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +[3708 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes to the block puller +[3709 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +[3704 05-20 18:21:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +[370a 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +[370b 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +[370c 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +[370d 05-20 18:21:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +[370e 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[370f 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0030a8840 env 0xc002499ae0 txn 0 +[3710 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002499ae0 +[3711 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +[3712 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3713 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3714 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3715 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[3716 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3717 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 39 ad 16 51 9c 3a 63 61 b3 8b e7 78 81 98 26 |.9..Q.:ca...x..&| +00000010 fa 45 70 07 9c c9 7e c2 9a 96 46 22 d6 5c 7d 38 |.Ep...~...F".\}8| +[3718 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 04 e6 28 19 1c 5d a6 e5 ec 93 0a |0D. J..(..].....| +00000010 c1 a3 fe a2 2d b1 5e 21 14 5f 55 25 ee 8b 39 22 |....-.^!._U%..9"| +00000020 ee 75 f0 7e 02 20 77 94 f8 8e ec a2 44 4a 6b 45 |.u.~. w.....DJkE| +00000030 a4 95 29 d7 fa ec 6f 2a f1 ac 43 a8 e4 d6 92 5b |..)...o*..C....[| +00000040 b2 87 c3 52 76 5a |...RvZ| +[3719 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[371a 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc003694000, header channel_header:"\010\003\032\014\010\235\352\225\366\005\020\240\301\334\353\001\"\017businesschannel*@f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\016\373\342[\355@H\316\025\300/m\325\025[J\273.\230\3073z>\213" +[371b 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[371c 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[371d 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[371e 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[371f 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] +[3720 05-20 18:21:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[3721 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc003686000 +[3722 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [36d7a45f-6736-4eb9-a283-97d0922ef6cf] +[3723 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3724 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [36d7a45f-6736-4eb9-a283-97d0922ef6cf] +[3725 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +[3726 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0474797c-3ada-4527-bf6e-cb528b49f359] +[3727 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0474797c-3ada-4527-bf6e-cb528b49f359] +[3728 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 gate 1589998879661465300 evaluation starts +[3729 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 signed by 0 principal evaluation starts (used [false]) +[372a 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 processing identity 0 with bytes of 115a110 +[372b 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 principal matched by identity 0 +[372c 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 84 ba 80 89 7d 6f bb 1b 4c ac e4 dd 01 e3 3c |.....}o..L.....<| +00000010 de 3d f0 67 ad c1 13 6c ab 14 c8 18 d0 a7 29 97 |.=.g...l......).| +[372d 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b ca ab ee 53 59 e9 ea bd 6b ce eb |0D. +...SY...k..| +00000010 73 f7 b4 85 d4 e7 7a 7a 2d af 6d 89 29 d0 72 64 |s.....zz-.m.).rd| +00000020 4e 19 45 16 02 20 30 07 e9 a8 42 37 31 ec 39 c0 |N.E.. 0...B71.9.| +00000030 52 64 a4 91 aa d1 22 59 f7 d5 d3 21 13 00 c7 8b |Rd...."Y...!....| +00000040 ca d7 50 8a 5e 9f |..P.^.| +[372e 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 principal evaluation succeeds for identity 0 +[372f 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 signed by 1 principal evaluation starts (used [true]) +[3730 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 skipping identity 0 because it has already been used +[3731 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 principal evaluation fails +[3732 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003698f10 gate 1589998879661465300 evaluation succeeds +[3733 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [57b5853c-bc06-4a6b-8b05-581592e5b61e] +[3734 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [57b5853c-bc06-4a6b-8b05-581592e5b61e] +[3735 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +[3736 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 appears to be valid +[3737 05-20 18:21:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc003686000 +[3738 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0030a8840 env 0xc002499ae0 txn 0 +[3739 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[373a 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 23ms +[373b 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[373c 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[373d 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +[373e 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[373f 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[3740 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[3741 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +[3742 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[3743 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[3744 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[3745 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +[3746 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[3747 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +[3748 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3749 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[374a 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[374b 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[374c 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[374d 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[374e 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[374f 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3750 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3751 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 gate 1589998879681383700 evaluation starts +[3752 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 signed by 0 principal evaluation starts (used [false]) +[3753 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 processing identity 0 with bytes of 115a110 +[3754 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 principal matched by identity 0 +[3755 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +[3756 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +00000040 ee 25 7d 3b 62 82 |.%};b.| +[3757 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 principal evaluation succeeds for identity 0 +[3758 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00364ffb0 gate 1589998879681383700 evaluation succeeds +[3759 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[375a 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[375b 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[375c 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[375d 05-20 18:21:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[375f 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] marked as valid by state validator +[375e 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3760 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0030a9d80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0030a9dc0)} +[3761 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[3762 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[3763 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[3764 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3765 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +[3766 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +[3767 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +[3768 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36ea 05-20 18:21:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3769 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[376a 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[376b 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[376c 05-20 18:21:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[376e 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[376f 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[376d 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3770 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3771 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes to 1 peers +[3772 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3773 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3774 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4020 bytes, seq: 5}, Envelope: 4050 bytes, Signature: 0 bytes +[3775 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3776 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3777 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 gate 1589998879696282800 evaluation starts +[3778 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 signed by 0 principal evaluation starts (used [false]) +[3779 05-20 18:21:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 processing identity 0 with bytes of 115a110 +[377a 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 principal matched by identity 0 +[377b 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 4c f1 c1 42 24 69 95 71 cc 4a 01 9b 7e 0c f0 |.L..B$i.q.J..~..| +00000010 bb 7f 97 a4 96 85 a9 49 46 56 3e 2c 9d 59 f8 82 |.......IFV>,.Y..| +[377c 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 48 94 0e fe 7a 74 16 34 10 ae 39 |0D. yH...zt.4..9| +00000010 4f 61 57 e8 06 00 f2 ab f1 c9 76 25 39 b3 e3 d5 |OaW.......v%9...| +00000020 da e2 e7 87 02 20 64 3e 55 6b c3 df 3e fa 14 b8 |..... d>Uk..>...| +00000030 9d cf fe 12 13 cd 41 76 11 f3 60 e5 e0 a2 0d fa |......Av..`.....| +00000040 ed 4c 76 0d 84 13 |.Lv...| +[377d 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 principal evaluation succeeds for identity 0 +[377e 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +[377f 05-20 18:21:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f4d90 gate 1589998879696282800 evaluation succeeds +[3781 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3782 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3783 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3780 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x60, 0xc5, 0x4f, 0x44, 0x0, 0x2d, 0xfc, 0xe6, 0x2a, 0x7, 0x13, 0xb5, 0xf5, 0xfc, 0xb9, 0xf0, 0xb, 0x61, 0x18, 0xa, 0xe3, 0x93, 0x45, 0xfc, 0x9f, 0x46, 0x5c, 0xc4, 0x56, 0x14, 0x37, 0xcd} txOffsets= +txId=f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397 locPointer=offset=70, bytesLength=2980 +] +[3784 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93577, bytesLength=2980] for tx ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to txid-index +[3785 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93577, bytesLength=2980] for tx number:[0] ID: [f7da02c45f04c055a9f73c3efd332b85497af54d5400f841673307c6dadbc397] to blockNumTranNum index +[3786 05-20 18:21:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3787 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3788 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3789 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[378a 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[378b 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[378c 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97549], isChainEmpty=[false], lastBlockNumber=[5] +[378d 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +[378e 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[378f 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 gate 1589998879724774000 evaluation starts +[3790 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 signed by 0 principal evaluation starts (used [false]) +[3791 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 processing identity 0 with bytes of 115a110 +[3792 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 principal matched by identity 0 +[3793 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dc 4c f1 c1 42 24 69 95 71 cc 4a 01 9b 7e 0c f0 |.L..B$i.q.J..~..| +00000010 bb 7f 97 a4 96 85 a9 49 46 56 3e 2c 9d 59 f8 82 |.......IFV>,.Y..| +[3794 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 48 94 0e fe 7a 74 16 34 10 ae 39 |0D. yH...zt.4..9| +00000010 4f 61 57 e8 06 00 f2 ab f1 c9 76 25 39 b3 e3 d5 |OaW.......v%9...| +00000020 da e2 e7 87 02 20 64 3e 55 6b c3 df 3e fa 14 b8 |..... d>Uk..>...| +00000030 9d cf fe 12 13 cd 41 76 11 f3 60 e5 e0 a2 0d fa |......Av..`.....| +00000040 ed 4c 76 0d 84 13 |.Lv...| +[3795 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 principal evaluation succeeds for identity 0 +[3796 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5970 gate 1589998879724774000 evaluation succeeds +[3797 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3798 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3799 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[379a 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[379b 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[379c 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[379d 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[379e 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +[379f 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +00000040 ac 24 01 88 e6 29 e6 |.$...).| +[37a0 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +[37a1 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +[37a2 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[37a3 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[37a4 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[37a5 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[37a6 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[37a7 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[37a8 05-20 18:21:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 0d d3 9b 6e 1c a2 08 9c 66 d9 b6 a1 e4 ff c7 |....n....f......| +00000010 b6 98 9b 93 fd 7b 30 2c 55 29 27 8e 14 37 c1 a2 |.....{0,U)'..7..| +[37a9 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a4 14 e2 af a4 8d 9d a6 7c 7f 3c |0D. ~........|.<| +00000010 21 9b e1 a2 42 04 90 76 75 22 de 2e e1 4e 7a 83 |!...B..vu"...Nz.| +00000020 c1 71 68 1c 02 20 76 7c 61 7f 02 74 de fc 9b 88 |.qh.. v|a..t....| +00000030 69 c2 2c 23 b8 94 82 3f 0f 75 f6 25 91 df 0a 66 |i.,#...?.u.%...f| +00000040 3e a0 4f b3 e6 c4 |>.O...| +[37aa 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37ab 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37ac 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37ad 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37ae 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37af 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37b0 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37b1 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[37b2 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 gate 1589998879731293900 evaluation starts +[37b3 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 signed by 0 principal evaluation starts (used [false]) +[37b4 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 processing identity 0 with bytes of 115a110 +[37b5 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 principal matched by identity 0 +[37b6 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +[37b7 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +00000040 e4 5a da 7d e5 48 |.Z.}.H| +[37b8 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 principal evaluation succeeds for identity 0 +[37b9 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a9ba0 gate 1589998879731293900 evaluation succeeds +[37ba 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[37bb 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[37bc 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[37bd 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[37be 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37bf 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37c0 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37c1 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37c3 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37c4 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37c5 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37c2 05-20 18:21:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[37c7 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +[37c6 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[37c9 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 gate 1589998879743874300 evaluation starts +[37ca 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 signed by 0 principal evaluation starts (used [false]) +[37cb 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 processing identity 0 with bytes of 115a110 +[37cc 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 principal matched by identity 0 +[37cd 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 7e 93 13 3b 68 8f ee a9 e2 fa 97 d7 a5 35 4c |*~..;h........5L| +00000010 11 52 36 b1 fa a2 f3 91 0d 2b 3f 53 2a 48 b9 e1 |.R6......+?S*H..| +[37ce 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 05 8f 71 8f b5 00 47 e8 1e f1 61 |0D. 1..q...G...a| +00000010 8a 24 1b 7b 09 92 c9 bb 27 a3 9e 28 35 21 5c e7 |.$.{....'..(5!\.| +00000020 f6 3f d4 98 02 20 7c 43 69 98 f0 12 7d 18 52 bf |.?... |Ci...}.R.| +00000030 ce d0 d3 0f b6 13 c9 e3 68 3f 3d 4c 95 dd 41 f2 |........h?=L..A.| +00000040 33 03 3d 40 2c 6f |3.=@,o| +[37cf 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 principal evaluation succeeds for identity 0 +[37d0 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ece20 gate 1589998879743874300 evaluation succeeds +[37d1 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[37d2 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[37d3 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[37d4 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[37d5 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37d6 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37d7 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37d8 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37d9 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37da 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[37db 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 gate 1589998879745704500 evaluation starts +[37dc 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 signed by 0 principal evaluation starts (used [false]) +[37dd 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 processing identity 0 with bytes of 115a110 +[37de 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 principal matched by identity 0 +[37df 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 7e 93 13 3b 68 8f ee a9 e2 fa 97 d7 a5 35 4c |*~..;h........5L| +00000010 11 52 36 b1 fa a2 f3 91 0d 2b 3f 53 2a 48 b9 e1 |.R6......+?S*H..| +[37e0 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 05 8f 71 8f b5 00 47 e8 1e f1 61 |0D. 1..q...G...a| +00000010 8a 24 1b 7b 09 92 c9 bb 27 a3 9e 28 35 21 5c e7 |.$.{....'..(5!\.| +00000020 f6 3f d4 98 02 20 7c 43 69 98 f0 12 7d 18 52 bf |.?... |Ci...}.R.| +00000030 ce d0 d3 0f b6 13 c9 e3 68 3f 3d 4c 95 dd 41 f2 |........h?=L..A.| +00000040 33 03 3d 40 2c 6f |3.=@,o| +[37e1 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +[37e2 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +[37c8 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[37e3 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +[37e4 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +[37e5 05-20 18:21:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 principal evaluation succeeds for identity 0 +[37e6 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ed960 gate 1589998879745704500 evaluation succeeds +[37e7 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[37e8 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[37e9 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[37ea 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[37eb 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37ec 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[37ed 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +[37ee 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 80ms (state_validation=10ms block_and_pvtdata_commit=43ms state_commit=21ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +[37ef 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[37f0 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08061A0C0A0565787030321203312E30 +[37f1 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C84BC1AA61CFC2E1D8CABEB0C0A92D688628E692BA44AF8D66D9C464A7959AE9 +[37f2 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +[37f3 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 eb cd 54 a3 a3 bd f0 42 c8 7d 04 59 c3 ed a0 |...T....B.}.Y...| +00000010 7c d7 35 a7 83 82 02 38 1b a3 e8 82 3a 20 d2 9e ||.5....8....: ..| +[37f4 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 34 3c fb 1c 53 36 57 79 4a fa |0E.!..4<..S6WyJ.| +00000010 d5 af 79 21 c5 0e 8f 95 b9 d0 ae 98 5c 20 74 72 |..y!........\ tr| +00000020 de df f4 ef a0 02 20 75 ee 0e d0 af 91 b4 8b 40 |...... u.......@| +00000030 c0 62 60 79 f9 ec 68 99 da 42 83 39 bf 28 a1 26 |.b`y..h..B.9.(.&| +00000040 ac 24 01 88 e6 29 e6 |.$...).| +[37f5 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f6 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f7 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37f8 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37f9 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37fa 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37fb 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37fc 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[37fd 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 gate 1589998879757073100 evaluation starts +[37fe 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 signed by 0 principal evaluation starts (used [false]) +[37ff 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 processing identity 0 with bytes of 115a110 +[3800 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 principal matched by identity 0 +[3801 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 bf 29 7f 97 e6 3e 4e 88 a7 ad 12 20 c1 38 28 |..)...>N.... .8(| +00000010 be 64 30 3e 0e 93 ac fa 63 84 25 88 ba c7 de 89 |.d0>....c.%.....| +[3802 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 7f 63 b8 6c bb d6 c8 35 52 5c 13 |0D. ..c.l...5R\.| +00000010 8c db 54 11 5a 2e 83 12 a3 3f 66 6d 50 b8 10 29 |..T.Z....?fmP..)| +00000020 aa c9 db 67 02 20 1c 05 5b 1e 02 90 39 dc 5f e9 |...g. ..[...9._.| +00000030 81 15 7f db 49 df 96 d3 d6 51 90 00 ff ca cf 3e |....I....Q.....>| +00000040 e4 5a da 7d e5 48 |.Z.}.H| +[3803 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 principal evaluation succeeds for identity 0 +[3804 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00381d3f0 gate 1589998879757073100 evaluation succeeds +[3805 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3806 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3807 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3808 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3809 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[380a 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[380b 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[380c 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[380d 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[380e 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[380f 05-20 18:21:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3810 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3811 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3812 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3813 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3814 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3815 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3816 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3817 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3818 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3819 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 gate 1589998879762032100 evaluation starts +[381a 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 signed by 0 principal evaluation starts (used [false]) +[381b 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 processing identity 0 with bytes of 115a110 +[381c 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 principal matched by identity 0 +[381d 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 22 09 24 c3 90 0a e4 ae 24 4f cf 97 3c 82 f9 |.".$.....$O..<..| +00000010 6d 0e 38 bf 52 95 54 4e 1a 78 4f 70 fd d8 9a af |m.8.R.TN.xOp....| +[381e 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 17 37 c4 15 58 b8 e3 6c 08 49 cb |0D. Q.7..X..l.I.| +00000010 ea d2 39 52 d5 18 c2 1d 59 8e f6 c1 37 02 b1 49 |..9R....Y...7..I| +00000020 d3 c8 23 d3 02 20 46 f9 fb 92 49 c2 04 56 16 20 |..#.. F...I..V. | +00000030 bd 2f b9 0f 6f 52 a7 7f 27 4a 29 eb 89 41 20 c4 |./..oR..'J)..A .| +00000040 ee 25 7d 3b 62 82 |.%};b.| +[381f 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3820 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 principal evaluation succeeds for identity 0 +[3821 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385a5f0 gate 1589998879762032100 evaluation succeeds +[3822 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3823 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3824 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3825 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3826 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 2a 16 d0 73 a9 fe 19 01 a7 07 7e 26 da 5c 62 |.*..s......~&.\b| +00000010 e4 93 34 cb 9e 46 36 bd 65 18 06 50 14 53 6f 10 |..4..F6.e..P.So.| +[3827 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 53 b8 38 ad 05 14 b9 c3 2e 45 |0E.!..S.8......E| +00000010 ec 65 9d 94 0d 81 63 35 0e 07 75 08 a7 4d 4e 02 |.e....c5..u..MN.| +00000020 f0 46 30 82 ec 02 20 56 b8 a1 ad 72 6a 2e 06 8c |.F0... V...rj...| +00000030 ff a6 eb f5 de 8b 33 20 6d 28 26 e1 ba fe 2d d1 |......3 m(&...-.| +00000040 a2 c6 aa c1 8a 69 d6 |.....i.| +[3828 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3829 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[382a 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[382b 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[382c 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[382d 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 gate 1589998879767763300 evaluation starts +[382e 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 signed by 0 principal evaluation starts (used [false]) +[382f 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 processing identity 0 with bytes of 115a110 +[3830 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3831 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 principal evaluation fails +[3832 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385b770 gate 1589998879767763300 evaluation fails +[3833 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3834 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3835 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3836 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 gate 1589998879768320000 evaluation starts +[3837 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 signed by 0 principal evaluation starts (used [false]) +[3838 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 processing identity 0 with bytes of 115a110 +[3839 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 principal matched by identity 0 +[383a 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 2a 16 d0 73 a9 fe 19 01 a7 07 7e 26 da 5c 62 |.*..s......~&.\b| +00000010 e4 93 34 cb 9e 46 36 bd 65 18 06 50 14 53 6f 10 |..4..F6.e..P.So.| +[383b 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 53 b8 38 ad 05 14 b9 c3 2e 45 |0E.!..S.8......E| +00000010 ec 65 9d 94 0d 81 63 35 0e 07 75 08 a7 4d 4e 02 |.e....c5..u..MN.| +00000020 f0 46 30 82 ec 02 20 56 b8 a1 ad 72 6a 2e 06 8c |.F0... V...rj...| +00000030 ff a6 eb f5 de 8b 33 20 6d 28 26 e1 ba fe 2d d1 |......3 m(&...-.| +00000040 a2 c6 aa c1 8a 69 d6 |.....i.| +[383c 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 principal evaluation succeeds for identity 0 +[383d 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00385bce0 gate 1589998879768320000 evaluation succeeds +[383e 05-20 18:21:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[383f 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3840 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3841 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3842 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3843 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3844 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3845 05-20 18:21:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3846 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3847 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3848 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3849 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[384a 05-20 18:21:19.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[384b 05-20 18:21:19.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[384c 05-20 18:21:19.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[384d 05-20 18:21:19.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[384e 05-20 18:21:19.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[384f 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3850 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3851 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3852 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3853 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3854 05-20 18:21:19.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3855 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 gate 1589998879901656100 evaluation starts +[3857 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3856 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 signed by 0 principal evaluation starts (used [false]) +[3858 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 processing identity 0 with bytes of 115a110 +[3859 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[385a 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 principal evaluation fails +[385b 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c3e20 gate 1589998879901656100 evaluation fails +[385c 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[385d 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[385e 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[385f 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 gate 1589998879909870800 evaluation starts +[3860 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 signed by 0 principal evaluation starts (used [false]) +[3861 05-20 18:21:19.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 processing identity 0 with bytes of 115a110 +[3862 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 principal matched by identity 0 +[3863 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[3864 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[3865 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 principal evaluation succeeds for identity 0 +[3866 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888390 gate 1589998879909870800 evaluation succeeds +[3867 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3868 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3869 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[386a 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[386b 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[386c 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[386d 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[386e 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[386f 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3870 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3871 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3872 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3873 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3874 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[3875 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3876 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3877 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3878 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3879 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[387a 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[387b 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[387c 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[387d 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[387e 05-20 18:21:19.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[387f 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3880 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3881 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3882 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3883 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3884 05-20 18:21:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3885 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3886 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3887 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3888 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3889 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[388a 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[388b 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[388c 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[388d 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[388e 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 gate 1589998880144296000 evaluation starts +[388f 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 signed by 0 principal evaluation starts (used [false]) +[3890 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 processing identity 0 with bytes of 115a110 +[3891 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 principal matched by identity 0 +[3892 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[3893 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[3894 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 principal evaluation succeeds for identity 0 +[3895 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ca940 gate 1589998880144296000 evaluation succeeds +[3896 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3897 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3898 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3899 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[389a 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[389b 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[389c 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[389d 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[389e 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[389f 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38a0 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38a1 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 gate 1589998880145977600 evaluation starts +[38a2 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 signed by 0 principal evaluation starts (used [false]) +[38a3 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 processing identity 0 with bytes of 115a110 +[38a4 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 principal matched by identity 0 +[38a5 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[38a6 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[38a7 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 principal evaluation succeeds for identity 0 +[38a8 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038cb530 gate 1589998880145977600 evaluation succeeds +[38a9 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38aa 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38ab 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38ac 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38ad 05-20 18:21:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38ae 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38af 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38b0 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[38b1 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38b2 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38b3 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[38b4 05-20 18:21:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38b5 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[38b6 05-20 18:21:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38b7 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[38b8 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[38b9 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38ba 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[38bb 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[38bc 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[38bd 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[38be 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38bf 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38c0 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 gate 1589998880178272700 evaluation starts +[38c1 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 signed by 0 principal evaluation starts (used [false]) +[38c2 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 processing identity 0 with bytes of 115a110 +[38c3 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 principal matched by identity 0 +[38c4 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[38c5 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[38c6 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 principal evaluation succeeds for identity 0 +[38c7 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00390e930 gate 1589998880178272700 evaluation succeeds +[38c8 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38c9 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38ca 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38cb 05-20 18:21:20.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38cc 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38cd 05-20 18:21:20.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38ce 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37154 +[38cf 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004a3ed20 +[38d0 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[38d1 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[38d2 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[38d3 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[38d4 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[38d5 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 a4 a6 3d e9 c6 74 3d ff 76 92 1b ca 15 f6 bc |...=..t=.v......| +00000010 8c b6 76 bd 37 8a 4a 08 95 2c 0d c0 6d 85 12 21 |..v.7.J..,..m..!| +[38d6 05-20 18:21:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 de 1a fe 46 0d d6 53 10 e1 |0E.!......F..S..| +00000010 23 a9 87 fc 9a 6e 2b 17 9e 98 06 be 87 7d b6 f0 |#....n+......}..| +00000020 94 55 0b f4 62 02 20 27 0b cd c5 55 bd c7 ba b4 |.U..b. '...U....| +00000030 cb b8 53 af 24 24 4b 83 ef 80 4e 40 14 31 2d 5e |..S.$$K...N@.1-^| +00000040 be 5d 18 31 c4 3a 9c |.].1.:.| +[38d7 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[38d8 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00362af50, header 0xc004a3f180 +[38d9 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[38da 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] processing txid: 179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c +[38db 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c] +[38dc 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[38dd 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[38de 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[38df 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38e0 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[38e1 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 gate 1589998880222348300 evaluation starts +[38e2 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 signed by 0 principal evaluation starts (used [false]) +[38e3 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 processing identity 0 with bytes of 115a110 +[38e4 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 principal matched by identity 0 +[38e5 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 a4 a6 3d e9 c6 74 3d ff 76 92 1b ca 15 f6 bc |...=..t=.v......| +00000010 8c b6 76 bd 37 8a 4a 08 95 2c 0d c0 6d 85 12 21 |..v.7.J..,..m..!| +[38e6 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 a3 de 1a fe 46 0d d6 53 10 e1 |0E.!......F..S..| +00000010 23 a9 87 fc 9a 6e 2b 17 9e 98 06 be 87 7d b6 f0 |#....n+......}..| +00000020 94 55 0b f4 62 02 20 27 0b cd c5 55 bd c7 ba b4 |.U..b. '...U....| +00000030 cb b8 53 af 24 24 4b 83 ef 80 4e 40 14 31 2d 5e |..S.$$K...N@.1-^| +00000040 be 5d 18 31 c4 3a 9c |.].1.:.| +[38e7 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 principal evaluation succeeds for identity 0 +[38e8 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393e460 gate 1589998880222348300 evaluation succeeds +[38e9 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[38ea 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[38eb 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[38ec 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[38ed 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[38ee 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c] +[38ef 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] Entry chaincode: name:"exp02" +[38f0 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[38f1 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[38f2 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][179578d2] Entry chaincode: name:"exp02" +[38f3 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[38f4 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[38f5 05-20 18:21:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] handling GET_STATE from chaincode +[38f6 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] getting state for chaincode exp02, key a, channel businesschannel +[38f7 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[38f8 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] Completed GET_STATE. Sending RESPONSE +[38f9 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[38fa 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [179578d2] notifying Txid:179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c, channelID:businesschannel +[38fb 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[38fc 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][179578d2] Exit chaincode: name:"exp02" (4ms) +[38fd 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[38fe 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c] +[38ff 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] Exit +[3900 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] Entry chaincode: name:"exp02" +[3901 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] escc for chaincode name:"exp02" is escc +[3902 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c, chaincode: exp02} +[3903 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C59211E7F3BBF6722BAB430C648C...455254494649434154452D2D2D2D2D0A +[3904 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 978D2E6EAAD9F3ED16D0D068630C5529CCBB6B6B4C47594470E716FDCBA19062 +[3905 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c, chaincode: exp02} +[3906 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][179578d2] Exit +[3907 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [179578d2eb251871d7dc5beb29c4687cb42bb35cc7740cbede566d167036f05c] +[3908 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37154 +[3909 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37154 grpc.code=OK grpc.call_duration=16.9338ms +[390a 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[390b 05-20 18:21:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[390c 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[390d 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[390e 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[390f 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3910 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3911 05-20 18:21:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3912 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[3913 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[3914 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3915 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3916 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3917 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3918 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3919 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[391a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[391b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 gate 1589998880421414800 evaluation starts +[391c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 signed by 0 principal evaluation starts (used [false]) +[391d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 processing identity 0 with bytes of 115a110 +[391e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 principal matched by identity 0 +[391f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[3920 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[3921 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 principal evaluation succeeds for identity 0 +[3922 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393fcc0 gate 1589998880421414800 evaluation succeeds +[3923 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3924 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3925 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3926 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3927 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3928 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3929 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[392a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[392b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[392c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[392d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[392e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 gate 1589998880422352700 evaluation starts +[392f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 signed by 0 principal evaluation starts (used [false]) +[3930 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 processing identity 0 with bytes of 115a110 +[3931 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 principal matched by identity 0 +[3932 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[3933 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[3934 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 principal evaluation succeeds for identity 0 +[3935 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399e8b0 gate 1589998880422352700 evaluation succeeds +[3936 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3937 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3938 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3939 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[393a 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[393b 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[393c 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[393d 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[393e 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[393f 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3940 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[3941 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3942 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[3943 05-20 18:21:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3944 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3945 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3946 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3947 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3948 05-20 18:21:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3949 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[394a 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[394b 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[394c 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[394d 05-20 18:21:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[394e 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[394f 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[3950 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3951 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[3952 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3953 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +[3954 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +00000040 02 e5 d6 78 aa a2 6b |...x..k| +[3955 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3956 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 02 82 6e 08 f3 fe 69 b6 7a 95 db |0D. t..n...i.z..| +00000010 56 4a d8 ee 90 9a a0 a9 3c 92 f9 bb 26 fc 77 7b |VJ......<...&.w{| +00000020 a9 ae 75 85 02 20 43 39 da d8 16 59 45 31 e7 f9 |..u.. C9...YE1..| +00000030 fe b2 15 d4 8b 49 94 f0 82 85 1b 79 36 c6 94 ca |.....I.....y6...| +00000040 e3 c1 a1 3f 64 ac |...?d.| +[3957 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3958 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3959 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[395a 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[395b 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[395c 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[395d 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[395e 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[395f 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3960 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3961 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3962 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[3963 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[3964 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3965 05-20 18:21:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3966 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[3967 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[3968 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3969 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610111801 +[396a 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 409B5BF64D03281822B89C911587FCDDA04B153319CC735AFEFD6129E9DAF85C +[396b 05-20 18:21:20.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[396c 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[396d 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[396e 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[396f 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3970 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[3971 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3972 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[3973 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3974 05-20 18:21:20.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3975 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37158 +[3976 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0039b3450 +[3977 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3978 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3979 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[397a 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[397b 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[397c 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 6e f0 92 6e a8 68 b6 53 c8 1e d5 43 d4 0e 14 |.n..n.h.S...C...| +00000010 5e 07 c2 f4 2a f2 9f b3 0d 2b dc 33 00 a3 f0 4a |^...*....+.3...J| +[397d 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 8b ff 1c ff 30 03 3f 85 06 e5 |0E.!......0.?...| +00000010 16 31 ba bb de 1f 43 0b 49 ee de 75 67 01 e8 13 |.1....C.I..ug...| +00000020 60 e8 8d 71 76 02 20 26 d5 df 05 b7 83 09 5f 11 |`..qv. &......_.| +00000030 09 c5 66 f8 54 52 30 19 84 79 32 72 80 6d cb e7 |..f.TR0..y2r.m..| +00000040 56 09 01 f8 ff 58 d1 |V....X.| +[397e 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[397f 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00362b810, header 0xc0039b3860 +[3980 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[3981 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] processing txid: 8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1 +[3982 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1] +[3983 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3984 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1] +[3985 05-20 18:21:20.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] Entry chaincode: name:"lscc" +[3986 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8e3e1896] Entry chaincode: name:"lscc" +[3987 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3988 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists +[3989 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[398a 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[398b 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[398c 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[398d 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 gate 1589998880742234200 evaluation starts +[398e 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 signed by 0 principal evaluation starts (used [false]) +[398f 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 processing identity 0 with bytes of 115a110 +[3990 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3991 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 principal evaluation fails +[3992 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d000 gate 1589998880742234200 evaluation fails +[3993 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3994 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3995 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3996 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 gate 1589998880745575400 evaluation starts +[3997 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 signed by 0 principal evaluation starts (used [false]) +[3998 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 processing identity 0 with bytes of 115a110 +[3999 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 principal matched by identity 0 +[399a 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 6e f0 92 6e a8 68 b6 53 c8 1e d5 43 d4 0e 14 |.n..n.h.S...C...| +00000010 5e 07 c2 f4 2a f2 9f b3 0d 2b dc 33 00 a3 f0 4a |^...*....+.3...J| +[399b 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 8b ff 1c ff 30 03 3f 85 06 e5 |0E.!......0.?...| +00000010 16 31 ba bb de 1f 43 0b 49 ee de 75 67 01 e8 13 |.1....C.I..ug...| +00000020 60 e8 8d 71 76 02 20 26 d5 df 05 b7 83 09 5f 11 |`..qv. &......_.| +00000030 09 c5 66 f8 54 52 30 19 84 79 32 72 80 6d cb e7 |..f.TR0..y2r.m..| +00000040 56 09 01 f8 ff 58 d1 |V....X.| +[399c 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 principal evaluation succeeds for identity 0 +[399d 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1d590 gate 1589998880745575400 evaluation succeeds +[399e 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[399f 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[39a0 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[39a1 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[39a2 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[39a3 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] handling GET_STATE from chaincode +[39a4 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] getting state for chaincode lscc, key exp02, channel businesschannel +[39a5 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[39a6 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] Completed GET_STATE. Sending RESPONSE +[39a7 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[39a8 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [8e3e1896] notifying Txid:8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1, channelID:businesschannel +[39a9 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[39aa 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8e3e1896] Exit chaincode: name:"lscc" (8ms) +[39ab 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[39ac 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1] +[39ad 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] Exit +[39ae 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] Entry chaincode: name:"lscc" +[39af 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] escc for chaincode name:"lscc" is escc +[39b0 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1, chaincode: lscc} +[39b1 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20E33167429C08FCCA7CFE8415DF23...455254494649434154452D2D2D2D2D0A +[39b2 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F1E578FDB5D53E4162ECB47475489BCCA37AD42B2BE3DC53E757B7F45C0B5A33 +[39b3 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1, chaincode: lscc} +[39b4 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8e3e1896] Exit +[39b5 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8e3e18961cc604de9ab364766afe6acf6a7dd04571edf88ca43e043d24c553a1] +[39b6 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37158 +[39b7 05-20 18:21:20.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37158 grpc.code=OK grpc.call_duration=14.3785ms +[39b8 05-20 18:21:20.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[39b9 05-20 18:21:20.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37158: read: connection reset by peer +[39ba 05-20 18:21:20.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[39bb 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[39bc 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[39bd 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[39be 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39bf 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c0 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c1 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c2 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c3 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c4 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[39c5 05-20 18:21:20.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39c6 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[39c7 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[39c8 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39c9 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[39ca 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[39cb 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39cc 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[39cd 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[39ce 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[39d0 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[39cf 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[39d1 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[39d3 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[39d2 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[39d4 05-20 18:21:20.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 gate 1589998880899849500 evaluation starts +[39d5 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 signed by 0 principal evaluation starts (used [false]) +[39d6 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 processing identity 0 with bytes of 115a110 +[39d8 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 principal matched by identity 0 +[39d7 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[39d9 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +[39da 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +00000040 db 73 5e d1 c9 7c bd |.s^..|.| +[39db 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[39dc 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[39dd 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 principal evaluation succeeds for identity 0 +[39de 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[39df 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94310 gate 1589998880899849500 evaluation succeeds +[39e0 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[39e2 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39e1 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[39e3 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[39e4 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[39e7 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[39e6 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[39e9 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39e8 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39e5 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[39ea 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39eb 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[39ec 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[39ed 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[39ee 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ef 05-20 18:21:20.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[39f0 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[39f1 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[39f2 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[39f3 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39f4 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39f5 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39f6 05-20 18:21:20.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[39f7 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[39f8 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[39f9 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[39fa 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39fb 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[39fc 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[39fd 05-20 18:21:20.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[39fe 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ff 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a00 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a01 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a02 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[3a03 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3a04 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3a05 05-20 18:21:20.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a06 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37162 +[3a07 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004a9ed70 +[3a08 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3a09 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3a0a 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3a0b 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3a0c 05-20 18:21:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3a0d 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 ef 09 95 24 d2 95 01 f4 a9 48 2f ee 45 2a ac |Q...$.....H/.E*.| +00000010 16 6a e0 fd 6e 74 c5 46 c0 a9 d5 94 2c ba a5 13 |.j..nt.F....,...| +[3a0e 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 fb 73 46 76 0b 33 1b b5 ed ff 0e |0D. y.sFv.3.....| +00000010 aa fb fa 9f 5b 37 18 55 c1 27 70 63 09 80 ca de |....[7.U.'pc....| +00000020 bf a6 b6 f4 02 20 1f 58 3e a7 16 70 a4 00 d3 13 |..... .X>..p....| +00000030 f3 a8 6f 9e a2 85 d8 f7 69 4d d2 68 a2 b1 8e 1f |..o.....iM.h....| +00000040 06 02 53 33 66 71 |..S3fq| +[3a0f 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3a10 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad05b0, header 0xc004a9f180 +[3a11 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[3a12 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] processing txid: 1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd +[3a13 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd] +[3a14 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3a15 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd] +[3a16 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] Entry chaincode: name:"lscc" +[3a17 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1b8b8d4c] Entry chaincode: name:"lscc" +[3a18 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3a19 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec +[3a1a 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3a1b 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a1c 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a1d 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a1e 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 gate 1589998881012990300 evaluation starts +[3a1f 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 signed by 0 principal evaluation starts (used [false]) +[3a20 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 processing identity 0 with bytes of 115a110 +[3a21 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3a22 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 principal evaluation fails +[3a23 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b34c50 gate 1589998881012990300 evaluation fails +[3a24 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3a25 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a26 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3a27 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 gate 1589998881014075200 evaluation starts +[3a28 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 signed by 0 principal evaluation starts (used [false]) +[3a29 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 processing identity 0 with bytes of 115a110 +[3a2a 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 principal matched by identity 0 +[3a2b 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 ef 09 95 24 d2 95 01 f4 a9 48 2f ee 45 2a ac |Q...$.....H/.E*.| +00000010 16 6a e0 fd 6e 74 c5 46 c0 a9 d5 94 2c ba a5 13 |.j..nt.F....,...| +[3a2c 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 fb 73 46 76 0b 33 1b b5 ed ff 0e |0D. y.sFv.3.....| +00000010 aa fb fa 9f 5b 37 18 55 c1 27 70 63 09 80 ca de |....[7.U.'pc....| +00000020 bf a6 b6 f4 02 20 1f 58 3e a7 16 70 a4 00 d3 13 |..... .X>..p....| +00000030 f3 a8 6f 9e a2 85 d8 f7 69 4d d2 68 a2 b1 8e 1f |..o.....iM.h....| +00000040 06 02 53 33 66 71 |..S3fq| +[3a2d 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 principal evaluation succeeds for identity 0 +[3a2e 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b351c0 gate 1589998881014075200 evaluation succeeds +[3a2f 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3a30 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3a31 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a32 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a33 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[3a34 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] handling GET_STATE from chaincode +[3a35 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] getting state for chaincode lscc, key exp02, channel businesschannel +[3a36 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3a37 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] Completed GET_STATE. Sending RESPONSE +[3a38 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3a39 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1b8b8d4c] notifying Txid:1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd, channelID:businesschannel +[3a3a 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3a3b 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1b8b8d4c] Exit chaincode: name:"lscc" (6ms) +[3a3c 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3a3d 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd] +[3a3e 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] Exit +[3a3f 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] Entry chaincode: name:"lscc" +[3a40 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] escc for chaincode name:"lscc" is escc +[3a41 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd, chaincode: lscc} +[3a42 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20EC6D75C79641BAE5A8A68C7EBA64...455254494649434154452D2D2D2D2D0A +[3a43 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 202E8CE6D052CE6DDC857801A9452E7140A0F52C33E00349BE91241A3AF205CD +[3a44 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd, chaincode: lscc} +[3a45 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1b8b8d4c] Exit +[3a46 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1b8b8d4ce798f4f29d72814c39c28d40f5d4130f2c90d73fbb94a879da11c8fd] +[3a47 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37162 +[3a48 05-20 18:21:21.01 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37162 grpc.code=OK grpc.call_duration=9.9654ms +[3a49 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3a4a 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161033 +[3a4b 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0E7E6E0CDACAD22AC9688BB4D35E29A8016453E15A0EE5484FCF8AFCB9589D3B +[3a4c 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3a4d 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3a4e 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3a4f 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[3a50 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a51 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3a52 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a53 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3a54 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes +[3a55 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a56 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[3a57 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a58 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\177\035\3139V\027&\022\253O\002 f\251\373\370\0251\365\262EC\334\273M\313\224\321\327=\224\035\324\225\325oaf\247X\320\317\276\234" > > , Envelope: 165 bytes, Signature: 0 bytes +[3a59 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a5a 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3a5b 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37162: read: connection reset by peer +[3a5c 05-20 18:21:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3a5d 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3a5e 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3a5f 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a60 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3a61 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3a62 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3a63 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3a64 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3a65 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +[3a66 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +00000040 a7 58 d0 cf be 9c |.X....| +[3a67 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3a68 05-20 18:21:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 ed ec cf dc 2f 25 84 1f 8e 5f da |0D. q..../%..._.| +00000010 76 4a e0 9d 64 0a 2b e9 63 2c 2a 74 60 75 dc ef |vJ..d.+.c,*t`u..| +00000020 43 61 ff 11 02 20 1b 1e 2b 88 73 31 9e f1 84 38 |Ca... ..+.s1...8| +00000030 cb 09 67 0a 59 e5 0e 0c 46 da a8 67 b7 1a e1 ae |..g.Y...F..g....| +00000040 bd d9 eb dc 25 4f |....%O| +[3a69 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3a6a 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3a6b 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a6c 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a6d 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3a6e 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3a6f 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +[3a70 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +00000040 02 e5 d6 78 aa a2 6b |...x..k| +[3a71 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a72 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3a73 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a74 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a75 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3a76 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +[3a77 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +00000040 a7 58 d0 cf be 9c |.X....| +[3a78 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a79 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a7a 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a7b 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a7c 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3a7d 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3a7e 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 ff ce a8 2f 25 6b b5 4b 71 0e 35 0e f8 18 dd |..../%k.Kq.5....| +00000010 da 38 07 b0 61 79 dc 31 3d 64 63 04 ae ec 58 64 |.8..ay.1=dc...Xd| +[3a7f 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 b3 e8 ec 0a 45 67 b3 a8 77 1b |0E.!......Eg..w.| +00000010 17 cd 2a ea 58 4f 49 4e 3b 34 ae a3 79 06 42 29 |..*.XOIN;4..y.B)| +00000020 37 f9 74 b6 7b 02 20 49 98 d5 9e 25 b2 27 e3 55 |7.t.{. I...%.'.U| +00000030 3c c2 55 ae 70 a6 94 be ee cb ec 8b eb 11 a0 1d |<.U.p...........| +00000040 02 e5 d6 78 aa a2 6b |...x..k| +[3a80 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a81 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a82 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a83 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3a84 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a85 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3a86 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a87 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a88 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a89 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a8a 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a8b 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 gate 1589998881044422600 evaluation starts +[3a8c 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 signed by 0 principal evaluation starts (used [false]) +[3a8d 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 processing identity 0 with bytes of 115a110 +[3a8e 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 principal matched by identity 0 +[3a8f 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 36 b6 f1 64 fe 8f e5 a0 9b a0 d7 be ee 1d ab |.6..d...........| +00000010 96 08 04 55 76 ec 0d d9 86 f6 f1 cc 56 9c 0b 5c |...Uv.......V..\| +[3a90 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c ff 24 f4 4f f3 57 7d 64 79 1a |0E.!...$.O.W}dy.| +00000010 e6 1e f7 61 82 6e 3c 15 bd 6c c9 66 3f f6 d6 75 |...a.n<..l.f?..u| +00000020 25 86 e4 84 f3 02 20 07 d6 33 41 f9 36 81 c1 20 |%..... ..3A.6.. | +00000030 18 aa 7b 7e de 0a 15 10 07 c2 c0 8d 3b a5 62 e5 |..{~........;.b.| +00000040 db 73 5e d1 c9 7c bd |.s^..|.| +[3a91 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 principal evaluation succeeds for identity 0 +[3a92 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd19f0 gate 1589998881044422600 evaluation succeeds +[3a93 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3a94 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a95 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a96 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a97 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a98 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a99 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3a9a 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0e 7e 6e 0c da ca d2 2a c9 68 8b b4 d3 5e 29 a8 |.~n....*.h...^).| +00000010 01 64 53 e1 5a 0e e5 48 4f cf 8a fc b9 58 9d 3b |.dS.Z..HO....X.;| +[3a9b 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 7d a5 0c cd 21 2d 5c 98 a2 62 77 |0D. O}...!-\..bw| +00000010 64 2e b8 dc 00 e6 3d 4f 3e 0a 7f 1d cb 39 56 17 |d.....=O>....9V.| +00000020 26 12 ab 4f 02 20 66 a9 fb f8 15 31 f5 b2 45 43 |&..O. f....1..EC| +00000030 dc bb 4d cb 94 d1 d7 3d 94 1d d4 95 d5 6f 61 66 |..M....=.....oaf| +00000040 a7 58 d0 cf be 9c |.X....| +[3a9c 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a9d 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a9e 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a9f 05-20 18:21:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3aa0 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3aa1 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3aa2 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3aa3 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa4 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa5 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa6 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa7 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa8 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa9 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3aaa 05-20 18:21:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3aab 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3aac 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3aad 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3aae 05-20 18:21:21.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3aaf 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3ab0 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ab1 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ab2 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ab3 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ab4 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ab5 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ab6 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ab7 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 gate 1589998881218039100 evaluation starts +[3ab8 05-20 18:21:21.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 signed by 0 principal evaluation starts (used [false]) +[3ab9 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 processing identity 0 with bytes of 115a110 +[3aba 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 principal matched by identity 0 +[3abb 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d9 1e e7 0c 37 ab 5b 5f f1 3d d1 11 4f 4e 43 |D....7.[_.=..ONC| +00000010 ee 0c d8 f5 08 2a 60 c0 32 c2 fa 43 67 59 81 46 |.....*`.2..CgY.F| +[3abc 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 92 be a4 7a ce 13 5b 41 e4 0c 8c |0D. ....z..[A...| +00000010 32 70 7b 0e 4b 3d a4 d2 bf dc ed 0d e9 ce 00 0c |2p{.K=..........| +00000020 32 5c a3 ab 02 20 67 34 2a a2 04 06 20 ad 57 a9 |2\... g4*... .W.| +00000030 e5 78 9f d4 46 98 c4 24 47 29 71 69 15 de 5a 9c |.x..F..$G)qi..Z.| +00000040 b0 0e 27 08 eb 69 |..'..i| +[3abd 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 principal evaluation succeeds for identity 0 +[3abe 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c28450 gate 1589998881218039100 evaluation succeeds +[3abf 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ac0 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ac1 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3ac2 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3ac3 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3ac4 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3ac5 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3ac6 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3ac7 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3ac8 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ac9 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3aca 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3acb 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3acc 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3acd 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ace 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3acf 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[3ad0 05-20 18:21:21.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3ad1 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3ad2 05-20 18:21:21.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ad3 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37166 +[3ad4 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003b86ff0 +[3ad5 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3ad6 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3ad7 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3ad8 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3ad9 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3ada 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b ae e8 50 99 c2 fc 87 3a e8 fd f0 af dd 41 ac |...P....:.....A.| +00000010 22 51 34 54 6c f5 e5 a2 74 1d fc 07 1a 04 a3 89 |"Q4Tl...t.......| +[3adb 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 a3 b5 c3 87 41 81 53 9b b4 a2 ca |0D. b....A.S....| +00000010 c4 f2 b7 66 7c 94 4a c2 18 2d a5 b9 79 fc 30 e5 |...f|.J..-..y.0.| +00000020 d1 5c e9 20 02 20 22 d0 38 4a a6 33 4c c4 5f 30 |.\. . ".8J.3L._0| +00000030 99 77 0c 05 25 4a 09 6a d6 5d 21 ea 97 02 28 b0 |.w..%J.j.]!...(.| +00000040 e6 9e 6c 39 12 08 |..l9..| +[3adc 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3add 05-20 18:21:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003b905b0, header 0xc003b87400 +[3ade 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[3adf 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] processing txid: f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1 +[3ae0 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1] +[3ae1 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3ae2 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1] +[3ae3 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] Entry chaincode: name:"lscc" +[3ae4 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f7d98548] Entry chaincode: name:"lscc" +[3ae5 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3ae6 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData +[3ae7 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3ae8 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ae9 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3aea 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3aeb 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 gate 1589998881301621700 evaluation starts +[3aec 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 signed by 0 principal evaluation starts (used [false]) +[3aed 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 processing identity 0 with bytes of 115a110 +[3aee 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3aef 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 principal evaluation fails +[3af0 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca2b50 gate 1589998881301621700 evaluation fails +[3af1 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3af2 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3af3 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3af4 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 gate 1589998881302383800 evaluation starts +[3af5 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 signed by 0 principal evaluation starts (used [false]) +[3af6 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 processing identity 0 with bytes of 115a110 +[3af7 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 principal matched by identity 0 +[3af8 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b ae e8 50 99 c2 fc 87 3a e8 fd f0 af dd 41 ac |...P....:.....A.| +00000010 22 51 34 54 6c f5 e5 a2 74 1d fc 07 1a 04 a3 89 |"Q4Tl...t.......| +[3af9 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 a3 b5 c3 87 41 81 53 9b b4 a2 ca |0D. b....A.S....| +00000010 c4 f2 b7 66 7c 94 4a c2 18 2d a5 b9 79 fc 30 e5 |...f|.J..-..y.0.| +00000020 d1 5c e9 20 02 20 22 d0 38 4a a6 33 4c c4 5f 30 |.\. . ".8J.3L._0| +00000030 99 77 0c 05 25 4a 09 6a d6 5d 21 ea 97 02 28 b0 |.w..%J.j.]!...(.| +00000040 e6 9e 6c 39 12 08 |..l9..| +[3afa 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 principal evaluation succeeds for identity 0 +[3afb 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca30c0 gate 1589998881302383800 evaluation succeeds +[3afc 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3afd 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3afe 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3aff 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3b00 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[3b01 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] handling GET_STATE from chaincode +[3b02 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] getting state for chaincode lscc, key exp02, channel businesschannel +[3b03 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3b04 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] Completed GET_STATE. Sending RESPONSE +[3b05 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3b06 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [f7d98548] notifying Txid:f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1, channelID:businesschannel +[3b07 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3b08 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f7d98548] Exit chaincode: name:"lscc" (6ms) +[3b09 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3b0a 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1] +[3b0b 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] Exit +[3b0c 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] Entry chaincode: name:"lscc" +[3b0d 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] escc for chaincode name:"lscc" is escc +[3b0e 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1, chaincode: lscc} +[3b0f 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F6095DC6194EDA83E337248F8590...455254494649434154452D2D2D2D2D0A +[3b10 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3D1A9FA47970F510A2F236A3FCACD615A24DCD722E586640FDA3AEFA6C7B0E6E +[3b11 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1, chaincode: lscc} +[3b12 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][f7d98548] Exit +[3b13 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f7d9854809ce349af116ec34f592f83a86f568ca894c1e939e72f994b36e5fe1] +[3b14 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37166 +[3b15 05-20 18:21:21.30 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37166 grpc.code=OK grpc.call_duration=9.4049ms +[3b16 05-20 18:21:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3b17 05-20 18:21:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3b18 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37170 +[3b19 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003d46230 +[3b1a 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3b1b 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3b1c 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3b1d 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3b1e 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3b1f 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 0b 4b d7 b9 c7 57 c9 dc 83 02 70 33 97 65 a1 |..K...W....p3.e.| +00000010 88 5a 7e 3c 31 1e a1 d6 72 29 f0 73 33 79 61 3b |.Z~<1...r).s3ya;| +[3b20 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 48 c6 16 54 f9 64 f4 62 8f 61 |0E.!..H..T.d.b.a| +00000010 7e 23 ab 4f a1 41 79 cb d0 ec 83 a3 ac ca 53 e6 |~#.O.Ay.......S.| +00000020 57 91 ef 6d 27 02 20 11 44 1b cb 19 63 13 f9 75 |W..m'. .D...c..u| +00000030 63 bb cb 42 f7 c5 2d de 0b ed 40 40 eb 84 61 6e |c..B..-...@@..an| +00000040 d3 15 52 1f c6 8b eb |..R....| +[3b21 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3b22 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad11f0, header 0xc003d46640 +[3b23 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[3b24 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] processing txid: cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af +[3b25 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af] +[3b26 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3b27 05-20 18:21:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af] +[3b28 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] Entry chaincode: name:"lscc" +[3b29 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cafd5ae5] Entry chaincode: name:"lscc" +[3b2a 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3b2b 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 0b 4b d7 b9 c7 57 c9 dc 83 02 70 33 97 65 a1 |..K...W....p3.e.| +00000010 88 5a 7e 3c 31 1e a1 d6 72 29 f0 73 33 79 61 3b |.Z~<1...r).s3ya;| +[3b2c 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 48 c6 16 54 f9 64 f4 62 8f 61 |0E.!..H..T.d.b.a| +00000010 7e 23 ab 4f a1 41 79 cb d0 ec 83 a3 ac ca 53 e6 |~#.O.Ay.......S.| +00000020 57 91 ef 6d 27 02 20 11 44 1b cb 19 63 13 f9 75 |W..m'. .D...c..u| +00000030 63 bb cb 42 f7 c5 2d de 0b ed 40 40 eb 84 61 6e |c..B..-...@@..an| +00000040 d3 15 52 1f c6 8b eb |..R....| +[3b2d 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [cafd5ae5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3b2e 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [cafd5ae5] notifying Txid:cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af, channelID:businesschannel +[3b2f 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3b30 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cafd5ae5] Exit chaincode: name:"lscc" (2ms) +[3b31 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3b32 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af] +[3b33 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] Exit +[3b34 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] Entry chaincode: name:"lscc" +[3b35 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] escc for chaincode name:"lscc" is escc +[3b36 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af, chaincode: lscc} +[3b37 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A201B7EEF268A1A8B6478AD98EB6BB8...455254494649434154452D2D2D2D2D0A +[3b38 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 28F011693BC3988D020CFE5AB7F1556141293652C81402789FA922528BD431D0 +[3b39 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af, chaincode: lscc} +[3b3a 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][cafd5ae5] Exit +[3b3b 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cafd5ae56732ecf528c683d74fa5f0af0dbc74d6cf2a5583c4af0faface589af] +[3b3c 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37170 +[3b3d 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37170 grpc.code=OK grpc.call_duration=4.4884ms +[3b3e 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3b3f 05-20 18:21:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3b40 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37174 +[3b41 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003d479a0 +[3b42 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3b43 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3b44 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3b45 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3b46 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3b47 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 74 17 12 d3 2e 43 68 00 d6 01 ea 55 80 3a 05 |.t....Ch....U.:.| +00000010 ac 48 bd 15 b3 54 35 57 05 2a e4 42 cd 40 f0 bf |.H...T5W.*.B.@..| +[3b48 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 41 51 34 c2 98 3a d7 28 19 57 b0 |0D. 7AQ4..:.(.W.| +00000010 7f 7a 61 0a c6 40 87 a7 f0 7c 5c dc 59 5c b9 5c |.za..@...|\.Y\.\| +00000020 19 2a 25 d3 02 20 13 b5 3d 98 9b f6 85 dc 55 52 |.*%.. ..=.....UR| +00000030 7f 68 c0 52 80 a7 5d 1c ac b0 60 e9 ba a3 9b af |.h.R..]...`.....| +00000040 53 b1 ab ee 3b c8 |S...;.| +[3b49 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3b4a 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad16c0, header 0xc003d47db0 +[3b4b 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[3b4c 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] processing txid: 1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647 +[3b4d 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647] +[3b4e 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3b4f 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647] +[3b50 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] Entry chaincode: name:"lscc" +[3b51 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1625e6d9] Entry chaincode: name:"lscc" +[3b52 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3b53 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes +[3b54 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3b55 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3b56 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3b57 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3b58 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 gate 1589998881719267700 evaluation starts +[3b59 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 signed by 0 principal evaluation starts (used [false]) +[3b5a 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 processing identity 0 with bytes of 115a110 +[3b5b 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3b5c 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 principal evaluation fails +[3b5d 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dabeb0 gate 1589998881719267700 evaluation fails +[3b5e 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3b5f 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3b60 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3b61 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 gate 1589998881719718200 evaluation starts +[3b62 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 signed by 0 principal evaluation starts (used [false]) +[3b63 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 processing identity 0 with bytes of 115a110 +[3b64 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 principal matched by identity 0 +[3b65 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 74 17 12 d3 2e 43 68 00 d6 01 ea 55 80 3a 05 |.t....Ch....U.:.| +00000010 ac 48 bd 15 b3 54 35 57 05 2a e4 42 cd 40 f0 bf |.H...T5W.*.B.@..| +[3b66 05-20 18:21:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 41 51 34 c2 98 3a d7 28 19 57 b0 |0D. 7AQ4..:.(.W.| +00000010 7f 7a 61 0a c6 40 87 a7 f0 7c 5c dc 59 5c b9 5c |.za..@...|\.Y\.\| +00000020 19 2a 25 d3 02 20 13 b5 3d 98 9b f6 85 dc 55 52 |.*%.. ..=.....UR| +00000030 7f 68 c0 52 80 a7 5d 1c ac b0 60 e9 ba a3 9b af |.h.R..]...`.....| +00000040 53 b1 ab ee 3b c8 |S...;.| +[3b67 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 principal evaluation succeeds for identity 0 +[3b68 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56420 gate 1589998881719718200 evaluation succeeds +[3b69 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3b6a 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3b6b 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3b6c 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3b6d 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +[3b6e 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] handling GET_STATE_BY_RANGE from chaincode +[3b6f 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +[3b70 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Adding a result +[3b71 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got keys and values. Sending RESPONSE +[3b72 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Completed GET_STATE_BY_RANGE. Sending RESPONSE +[3b73 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +[3b74 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] handling QUERY_STATE_CLOSE from chaincode +[3b75 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Completed QUERY_STATE_CLOSE. Sending RESPONSE +[3b76 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3b77 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [1625e6d9] notifying Txid:1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647, channelID:businesschannel +[3b78 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3b79 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1625e6d9] Exit chaincode: name:"lscc" (3ms) +[3b7a 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3b7b 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647] +[3b7c 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] Exit +[3b7d 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] Entry chaincode: name:"lscc" +[3b7e 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] escc for chaincode name:"lscc" is escc +[3b7f 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647, chaincode: lscc} +[3b80 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209737844B1DAB8C805F37E69E2B9A...455254494649434154452D2D2D2D2D0A +[3b81 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EAF45BA6759663D8377CA15DD12B1E3B6F431F8606FD08BC9AF8A665FB0E260C +[3b82 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647, chaincode: lscc} +[3b83 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][1625e6d9] Exit +[3b84 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1625e6d90a7c29c3571ff2507c9f46e8c02398fb342bdf6647706bdd831f5647] +[3b85 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37174 +[3b86 05-20 18:21:21.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37174 grpc.code=OK grpc.call_duration=12.8907ms +[3b87 05-20 18:21:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3b88 05-20 18:21:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3b89 05-20 18:21:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37178 +[3b8a 05-20 18:21:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e2ff40 +[3b8b 05-20 18:21:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3b8c 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3b8d 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3b8e 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3b8f 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3b90 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 58 20 a2 59 7f df b2 f1 bb 20 21 cb db b5 86 |FX .Y..... !....| +00000010 ae 19 aa f1 4a 0e 15 78 86 c9 c3 6d 8d c8 1d 27 |....J..x...m...'| +[3b91 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 68 c9 c3 b6 f1 1a 1d 86 33 8d |0E.!..h.......3.| +00000010 5d 9a dc ac 36 35 af 97 8d f0 81 d5 b6 8d 59 d8 |]...65........Y.| +00000020 fb 31 e6 8e 13 02 20 2b 35 69 6b cb 7e 9b 1b 8c |.1.... +5ik.~...| +00000030 3e 99 b0 52 0e 80 5f b8 fd 03 95 6c dc 7e a8 b5 |>..R.._....l.~..| +00000040 47 81 0d 3a 5e 01 54 |G..:^.T| +[3b92 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3b93 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003e9e2a0, header 0xc003f5a370 +[3b94 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[3b95 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] processing txid: 27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487 +[3b96 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487] +[3b97 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] Entry chaincode: name:"qscc" +[3b98 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][27941c18] Entry chaincode: name:"qscc" +[3b99 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3b9a 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[3b9b 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[3b9c 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3b9d 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3b9e 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3b9f 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ba0 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 gate 1589998882138483900 evaluation starts +[3ba1 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 signed by 0 principal evaluation starts (used [false]) +[3ba2 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 processing identity 0 with bytes of 115a110 +[3ba3 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3ba4 05-20 18:21:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 principal evaluation fails +[3ba5 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ee7d90 gate 1589998882138483900 evaluation fails +[3ba6 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3ba7 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ba8 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ba9 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 gate 1589998882141085200 evaluation starts +[3baa 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 signed by 0 principal evaluation starts (used [false]) +[3bab 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 processing identity 0 with bytes of 115a110 +[3bac 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 principal matched by identity 0 +[3bad 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 58 20 a2 59 7f df b2 f1 bb 20 21 cb db b5 86 |FX .Y..... !....| +00000010 ae 19 aa f1 4a 0e 15 78 86 c9 c3 6d 8d c8 1d 27 |....J..x...m...'| +[3bae 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 68 c9 c3 b6 f1 1a 1d 86 33 8d |0E.!..h.......3.| +00000010 5d 9a dc ac 36 35 af 97 8d f0 81 d5 b6 8d 59 d8 |]...65........Y.| +00000020 fb 31 e6 8e 13 02 20 2b 35 69 6b cb 7e 9b 1b 8c |.1.... +5ik.~...| +00000030 3e 99 b0 52 0e 80 5f b8 fd 03 95 6c dc 7e a8 b5 |>..R.._....l.~..| +00000040 47 81 0d 3a 5e 01 54 |G..:^.T| +[3baf 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 principal evaluation succeeds for identity 0 +[3bb0 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6e300 gate 1589998882141085200 evaluation succeeds +[3bb1 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3bb2 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3bb3 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3bb4 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3bb5 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [27941c18] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3bb6 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [27941c18] notifying Txid:27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487, channelID:businesschannel +[3bb7 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3bb8 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][27941c18] Exit chaincode: name:"qscc" (7ms) +[3bb9 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] Exit +[3bba 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] Entry chaincode: name:"qscc" +[3bbb 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] escc for chaincode name:"qscc" is escc +[3bbc 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487, chaincode: qscc} +[3bbd 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20317D6E208956FEFD39DB61A80380...455254494649434154452D2D2D2D2D0A +[3bbe 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 131598BA47C527C3CC325E62F934CE351DBCE338BB30A0CB46543B809B72A324 +[3bbf 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 27941c181b0eb7f9947330388e3aecfdf41e2990c0d54965f7c728b565607487, chaincode: qscc} +[3bc0 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][27941c18] Exit +[3bc1 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37178 +[3bc2 05-20 18:21:22.14 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37178 grpc.code=OK grpc.call_duration=19.1131ms +[3bc3 05-20 18:21:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3bc4 05-20 18:21:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3bc5 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37182 +[3bc6 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003f5b310 +[3bc7 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3bc8 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3bc9 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3bca 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3bcb 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3bcc 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 1d 67 72 e3 73 06 63 73 49 50 16 ab 04 dd 7b |..gr.s.csIP....{| +00000010 f5 03 69 0c f5 0f f3 b8 ca f0 d5 bb f8 63 6c 2d |..i..........cl-| +[3bcd 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 e1 2e e1 84 b7 31 bb 6e f5 e6 |0E.!.......1.n..| +00000010 2c 9e 0f 2e 7a 09 dd 75 dc 14 70 ad e1 ae d2 44 |,...z..u..p....D| +00000020 e3 f6 8a a7 71 02 20 26 c4 ad c4 c0 50 85 9f b9 |....q. &....P...| +00000030 35 ae eb 28 f8 cf 69 07 21 d4 cd be 0f 03 94 26 |5..(..i.!......&| +00000040 f7 37 0f 4b 34 d1 b8 |.7.K4..| +[3bce 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3bcf 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003e9e700, header 0xc003f5b720 +[3bd0 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[3bd1 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] processing txid: c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225 +[3bd2 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225] +[3bd3 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] Entry chaincode: name:"qscc" +[3bd4 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c8c489f9] Entry chaincode: name:"qscc" +[3bd5 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3bd6 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +[3bd7 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber +[3bd8 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3bd9 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3bda 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3bdb 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3bdc 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 gate 1589998882358399300 evaluation starts +[3bdd 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 signed by 0 principal evaluation starts (used [false]) +[3bde 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 processing identity 0 with bytes of 115a110 +[3bdf 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3be0 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 principal evaluation fails +[3be1 05-20 18:21:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fccc60 gate 1589998882358399300 evaluation fails +[3be2 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3be3 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3be4 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3be5 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 gate 1589998882361305700 evaluation starts +[3be6 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 signed by 0 principal evaluation starts (used [false]) +[3be7 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 processing identity 0 with bytes of 115a110 +[3be8 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 principal matched by identity 0 +[3be9 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 1d 67 72 e3 73 06 63 73 49 50 16 ab 04 dd 7b |..gr.s.csIP....{| +00000010 f5 03 69 0c f5 0f f3 b8 ca f0 d5 bb f8 63 6c 2d |..i..........cl-| +[3bea 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 e1 2e e1 84 b7 31 bb 6e f5 e6 |0E.!.......1.n..| +00000010 2c 9e 0f 2e 7a 09 dd 75 dc 14 70 ad e1 ae d2 44 |,...z..u..p....D| +00000020 e3 f6 8a a7 71 02 20 26 c4 ad c4 c0 50 85 9f b9 |....q. &....P...| +00000030 35 ae eb 28 f8 cf 69 07 21 d4 cd be 0f 03 94 26 |5..(..i.!......&| +00000040 f7 37 0f 4b 34 d1 b8 |.7.K4..| +[3beb 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 principal evaluation succeeds for identity 0 +[3bec 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fcd1d0 gate 1589998882361305700 evaluation succeeds +[3bed 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3bee 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3bef 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3bf0 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3bf1 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2] +[3bf2 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[56676] +[3bf3 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[40873], Going to peek [8] bytes +[3bf4 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[28202], placementInfo={fileNum=[0], startOffset=[56676], bytesOffset=[56679]} +[3bf5 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [c8c489f9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3bf6 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [c8c489f9] notifying Txid:c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225, channelID:businesschannel +[3bf7 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3bf8 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c8c489f9] Exit chaincode: name:"qscc" (11ms) +[3bf9 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] Exit +[3bfa 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] Entry chaincode: name:"qscc" +[3bfb 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] escc for chaincode name:"qscc" is escc +[3bfc 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225, chaincode: qscc} +[3bfd 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2007937044121078B02AEB2D23DBEE...455254494649434154452D2D2D2D2D0A +[3bfe 05-20 18:21:22.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 98506D37D45860292C79373262AE14BA1E3364636C22879D29E92728BEE7AE36 +[3bff 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: c8c489f907efb4414a4c41f81f2dd3caf5ca6a569cace66c1a9497ee353fa225, chaincode: qscc} +[3c00 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c8c489f9] Exit +[3c01 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37182 +[3c02 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37182 grpc.code=OK grpc.call_duration=20.1951ms +[3c03 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c04 05-20 18:21:22.37 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c05 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37186 +[3c06 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003d1ac80 +[3c07 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3c08 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3c09 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3c0a 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3c0b 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3c0c 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 42 fc e4 5f bc 26 53 73 07 18 bb 0d b0 3b 4a |.B.._.&Ss.....;J| +00000010 8c 25 2e 5f 19 90 fa 6c 7e 7e b0 40 4e d1 01 23 |.%._...l~~.@N..#| +[3c0d 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af b5 f7 40 f9 06 81 de a1 a1 a7 |0E.!....@.......| +00000010 62 40 54 ee d5 b5 f2 69 27 81 63 42 09 78 34 74 |b@T....i'.cB.x4t| +00000020 fb 2b 6d 9a ca 02 20 5d 87 aa 63 b9 4a bb 16 43 |.+m... ]..c.J..C| +00000030 a5 86 a7 cc 12 c0 4b 5a 14 0b a8 d0 eb 97 47 85 |......KZ......G.| +00000040 ac af b2 1f ae d8 fe |.......| +[3c0e 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3c0f 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003b90af0, header 0xc003d1b090 +[3c10 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[3c11 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] processing txid: e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161 +[3c12 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161] +[3c13 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] Entry chaincode: name:"cscc" +[3c14 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e01630d0] Entry chaincode: name:"cscc" +[3c15 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3c16 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock +[3c17 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock +[3c18 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3c19 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c1a 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c1b 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c1c 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 gate 1589998882825327900 evaluation starts +[3c1d 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 signed by 0 principal evaluation starts (used [false]) +[3c1e 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 processing identity 0 with bytes of 115a110 +[3c1f 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3c20 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 principal evaluation fails +[3c21 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de3bd0 gate 1589998882825327900 evaluation fails +[3c22 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3c23 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c24 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3c25 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 gate 1589998882825972500 evaluation starts +[3c26 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 signed by 0 principal evaluation starts (used [false]) +[3c27 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 processing identity 0 with bytes of 115a110 +[3c28 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 principal matched by identity 0 +[3c29 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 42 fc e4 5f bc 26 53 73 07 18 bb 0d b0 3b 4a |.B.._.&Ss.....;J| +00000010 8c 25 2e 5f 19 90 fa 6c 7e 7e b0 40 4e d1 01 23 |.%._...l~~.@N..#| +[3c2a 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af b5 f7 40 f9 06 81 de a1 a1 a7 |0E.!....@.......| +00000010 62 40 54 ee d5 b5 f2 69 27 81 63 42 09 78 34 74 |b@T....i'.cB.x4t| +00000020 fb 2b 6d 9a ca 02 20 5d 87 aa 63 b9 4a bb 16 43 |.+m... ]..c.J..C| +00000030 a5 86 a7 cc 12 c0 4b 5a 14 0b a8 d0 eb 97 47 85 |......KZ......G.| +00000040 ac af b2 1f ae d8 fe |.......| +[3c2b 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 principal evaluation succeeds for identity 0 +[3c2c 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158140 gate 1589998882825972500 evaluation succeeds +[3c2d 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3c2e 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3c2f 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c30 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c31 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [e01630d0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3c32 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [e01630d0] notifying Txid:e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161, channelID:businesschannel +[3c33 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3c34 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e01630d0] Exit chaincode: name:"cscc" (3ms) +[3c35 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] Exit +[3c36 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] Entry chaincode: name:"cscc" +[3c37 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] escc for chaincode name:"cscc" is escc +[3c38 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161, chaincode: cscc} +[3c39 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20FC1BD9B1E8AFB278A66A87613B44...455254494649434154452D2D2D2D2D0A +[3c3a 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4C072DC29A1DBE644BD0542C23540A321FDC31B3F6C8FFD7C6D45408BBB7A429 +[3c3b 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e01630d03d942b8246bbb00a969d43e86f0dd354c198d41f3b2a6ec08c009161, chaincode: cscc} +[3c3c 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e01630d0] Exit +[3c3d 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37186 +[3c3e 05-20 18:21:22.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37186 grpc.code=OK grpc.call_duration=6.1274ms +[3c3f 05-20 18:21:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c40 05-20 18:21:22.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c41 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37190 +[3c42 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040108c0 +[3c43 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3c44 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3c45 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3c46 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3c47 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3c48 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 74 26 78 59 2a c0 30 72 96 28 72 46 bb f0 07 | t&xY*.0r.(rF...| +00000010 41 ed 9a 4b 0f 71 e3 1d d0 be cb 25 04 d1 5d ec |A..K.q.....%..].| +[3c49 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 ef c9 cf 81 db 8f 01 df 29 2d 16 |0D. s........)-.| +00000010 eb 79 e3 da 14 f8 4e c1 d8 8e 86 7f 3e c2 3f cb |.y....N.....>.?.| +00000020 1c a9 2e 0f 02 20 08 e6 54 47 89 d3 bd 42 a5 f4 |..... ..TG...B..| +00000030 4b 8f cc 84 89 02 fc fa d8 fd dd 3e cd 25 2a 41 |K..........>.%*A| +00000040 81 14 ee b9 5a 90 |....Z.| +[3c4a 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3c4b 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003e9eb60, header 0xc004010cd0 +[3c4c 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[3c4d 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] processing txid: 6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df +[3c4e 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df] +[3c4f 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] Entry chaincode: name:"cscc" +[3c50 05-20 18:21:23.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][6af84bf7] Entry chaincode: name:"cscc" +[3c51 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3c52 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[3c53 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 74 26 78 59 2a c0 30 72 96 28 72 46 bb f0 07 | t&xY*.0r.(rF...| +00000010 41 ed 9a 4b 0f 71 e3 1d d0 be cb 25 04 d1 5d ec |A..K.q.....%..].| +[3c54 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 ef c9 cf 81 db 8f 01 df 29 2d 16 |0D. s........)-.| +00000010 eb 79 e3 da 14 f8 4e c1 d8 8e 86 7f 3e c2 3f cb |.y....N.....>.?.| +00000020 1c a9 2e 0f 02 20 08 e6 54 47 89 d3 bd 42 a5 f4 |..... ..TG...B..| +00000030 4b 8f cc 84 89 02 fc fa d8 fd dd 3e cd 25 2a 41 |K..........>.%*A| +00000040 81 14 ee b9 5a 90 |....Z.| +[3c55 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [6af84bf7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3c56 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [6af84bf7] notifying Txid:6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df, channelID:businesschannel +[3c57 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3c58 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][6af84bf7] Exit chaincode: name:"cscc" (2ms) +[3c59 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] Exit +[3c5a 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] Entry chaincode: name:"cscc" +[3c5b 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] escc for chaincode name:"cscc" is escc +[3c5c 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df, chaincode: cscc} +[3c5d 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20F2F05901F40AE1A5A5F2FDE0F3E1...455254494649434154452D2D2D2D2D0A +[3c5e 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0A369227B9CD0809754838D980480355DDABCBF66BB6DC543E411DEC6C0625C4 +[3c5f 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 6af84bf7d4f7b84962088bc81c4f26c36bc2166a02f5bc7978eaea422eaed1df, chaincode: cscc} +[3c60 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][6af84bf7] Exit +[3c61 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37190 +[3c62 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37190 grpc.code=OK grpc.call_duration=9.8485ms +[3c63 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c64 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:37190: read: connection reset by peer +[3c65 05-20 18:21:23.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c66 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c67 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c68 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c69 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c6a 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3c6b 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 b2 ec 03 5c 98 83 21 3e ae a1 60 77 aa 4d ec |X...\..!>..`w.M.| +00000010 a8 2b c8 cd d9 96 cd 1b fc d4 18 5c c4 71 7f 01 |.+.........\.q..| +[3c6c 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 74 a1 cb f2 c0 13 0b 6a f9 00 d5 22 |0D. t......j..."| +00000010 dc bf 2d d8 f4 3f f8 8f e1 c1 7f 0d 68 d2 8c e3 |..-..?......h...| +00000020 45 bf be 7c 02 20 55 e1 92 1e bf 5d 1d 69 69 52 |E..|. U....].iiR| +00000030 aa 42 35 c7 c5 bc a4 e0 f1 57 ea 29 ba 2a 48 2e |.B5......W.).*H.| +00000040 b7 f5 bb 7d ee 59 |...}.Y| +[3c6d 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c6e 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3c6f 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3c70 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3c71 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3c72 05-20 18:21:23.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c73 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c74 05-20 18:21:23.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c75 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c76 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c77 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c78 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3c79 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c7a 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c7b 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c7c 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3c7d 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c7e 05-20 18:21:23.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c7f 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c80 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c81 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c82 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c83 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c84 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c85 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c86 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c87 05-20 18:21:23.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3c88 05-20 18:21:23.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c89 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c8a 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c8b 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3c8c 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c8d 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c8e 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c8f 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c90 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c91 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c92 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3c93 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3c94 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[3c95 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[3c96 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[3c97 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[3c98 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c99 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c9a 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c9b 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c9c 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c9d 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c9e 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c9f 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ca0 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 gate 1589998883576663700 evaluation starts +[3ca1 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 signed by 0 principal evaluation starts (used [false]) +[3ca2 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 processing identity 0 with bytes of 115a110 +[3ca3 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 principal matched by identity 0 +[3ca4 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[3ca5 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[3ca6 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 principal evaluation succeeds for identity 0 +[3ca7 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f96c0 gate 1589998883576663700 evaluation succeeds +[3ca8 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ca9 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3caa 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3cab 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3cac 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cad 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cae 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3caf 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3cb0 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3cb1 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3cb2 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3cb3 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3cb4 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 gate 1589998883578617400 evaluation starts +[3cb5 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 signed by 0 principal evaluation starts (used [false]) +[3cb6 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 processing identity 0 with bytes of 115a110 +[3cb7 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 principal matched by identity 0 +[3cb8 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[3cb9 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[3cba 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 principal evaluation succeeds for identity 0 +[3cbb 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043128c0 gate 1589998883578617400 evaluation succeeds +[3cbc 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3cbd 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3cbe 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3cbf 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3cc0 05-20 18:21:23.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cc1 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3cc2 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3cc3 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cc4 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cc5 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cc6 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3cc7 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3cc8 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3cc9 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cca 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ccb 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ccd 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3cce 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ccf 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 gate 1589998883588818000 evaluation starts +[3cd0 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 signed by 0 principal evaluation starts (used [false]) +[3cd1 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 processing identity 0 with bytes of 115a110 +[3cd2 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3ccc 05-20 18:21:23.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +[3cd3 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 principal matched by identity 0 +[3cd4 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cd6 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cd7 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3cd5 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[3cd8 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3cdc 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cd9 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3cdd 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cda 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cdb 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[3cde 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 principal evaluation succeeds for identity 0 +[3cdf 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7430 gate 1589998883588818000 evaluation succeeds +[3ce0 05-20 18:21:23.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ce1 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ce2 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3ce3 05-20 18:21:23.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3ce4 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[3ce5 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[3ce6 05-20 18:21:23.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ce7 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ce8 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ce9 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3cea 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ceb 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3cec 05-20 18:21:23.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ced 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3cee 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 gate 1589998883633776400 evaluation starts +[3cef 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 signed by 0 principal evaluation starts (used [false]) +[3cf0 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 processing identity 0 with bytes of 115a110 +[3cf1 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 principal matched by identity 0 +[3cf2 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[3cf3 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[3cf4 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 principal evaluation succeeds for identity 0 +[3cf5 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345040 gate 1589998883633776400 evaluation succeeds +[3cf6 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3cf7 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3cf8 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3cf9 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3cfa 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[3cfb 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[3cfc 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cfd 05-20 18:21:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3cfe 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cff 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d00 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d01 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d02 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d03 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d04 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d05 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d06 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d07 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 gate 1589998883642713600 evaluation starts +[3d08 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 signed by 0 principal evaluation starts (used [false]) +[3d09 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 processing identity 0 with bytes of 115a110 +[3d0a 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 principal matched by identity 0 +[3d0b 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[3d0c 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[3d0d 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 principal evaluation succeeds for identity 0 +[3d0e 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435cb80 gate 1589998883642713600 evaluation succeeds +[3d0f 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d10 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d11 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d12 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d13 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[3d14 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[3d15 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[3d16 05-20 18:21:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[3d17 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d18 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d19 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d1a 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d1b 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d1c 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d1d 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d1e 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d1f 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 gate 1589998883653404300 evaluation starts +[3d20 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 signed by 0 principal evaluation starts (used [false]) +[3d21 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 processing identity 0 with bytes of 115a110 +[3d22 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 principal matched by identity 0 +[3d23 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[3d24 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[3d25 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 principal evaluation succeeds for identity 0 +[3d26 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004380b60 gate 1589998883653404300 evaluation succeeds +[3d27 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d28 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d29 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d2a 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d2b 05-20 18:21:23.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d2c 05-20 18:21:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d2d 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d2e 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d2f 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d30 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3d31 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d32 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d33 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d34 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d35 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d36 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d37 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d38 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 gate 1589998883692264600 evaluation starts +[3d39 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 signed by 0 principal evaluation starts (used [false]) +[3d3a 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 processing identity 0 with bytes of 115a110 +[3d3b 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 principal matched by identity 0 +[3d3c 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 e9 73 9f 56 17 b9 e6 d3 0f 25 32 4b 95 c3 f5 |5.s.V.....%2K...| +00000010 8b c3 08 f1 84 c8 e6 e8 c1 7b 18 d9 2c 71 e0 22 |.........{..,q."| +[3d3d 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 f5 62 e9 51 96 e5 13 e3 12 9b |0E.!...b.Q......| +00000010 03 8b 78 67 11 ef 40 46 cb 24 0b 3f 0d ab d9 72 |..xg..@F.$.?...r| +00000020 49 18 73 b9 3a 02 20 26 95 f9 43 b0 34 6f b1 d3 |I.s.:. &..C.4o..| +00000030 47 25 59 1c e4 17 64 e8 ec 18 2b c9 fb fd de 97 |G%Y...d...+.....| +00000040 1c 28 1e 1d 82 98 4d |.(....M| +[3d3e 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 principal evaluation succeeds for identity 0 +[3d3f 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439c430 gate 1589998883692264600 evaluation succeeds +[3d40 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d41 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d42 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d43 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d44 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d45 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3d46 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3d47 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3d48 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3d49 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d4a 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d4b 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d4c 05-20 18:21:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d4d 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d4e 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d4f 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d50 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d51 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d52 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d53 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3d54 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d55 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3d56 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d57 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d58 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d59 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d5b 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d5d 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d5e 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d5f 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d5a 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d5c 05-20 18:21:23.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d60 05-20 18:21:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d61 05-20 18:21:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3d62 05-20 18:21:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d63 05-20 18:21:23.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d64 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d65 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d66 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3d67 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d68 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d69 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3d6a 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3d6b 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d6c 05-20 18:21:23.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3d6d 05-20 18:21:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3d6e 05-20 18:21:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3d6f 05-20 18:21:23.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d70 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3d71 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3d72 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d73 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d74 05-20 18:21:23.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d75 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d76 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d77 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d78 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d79 05-20 18:21:23.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3d7a 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d7b 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d7c 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d7d 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d7e 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d7f 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d80 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d81 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 gate 1589998883943017900 evaluation starts +[3d82 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 signed by 0 principal evaluation starts (used [false]) +[3d83 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 processing identity 0 with bytes of 115a110 +[3d84 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 principal matched by identity 0 +[3d85 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae ba aa f2 24 29 99 42 b5 68 89 5b a2 64 26 78 |....$).B.h.[.d&x| +00000010 51 13 28 2c 68 6a cd 60 8d 56 7d 83 b7 b3 1c 69 |Q.(,hj.`.V}....i| +[3d86 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e d5 2e 0f fa 16 f4 f9 e6 69 36 bc |0D. .........i6.| +00000010 ef f8 a3 9a 55 37 19 71 17 ff 46 d7 3d ca 2d f3 |....U7.q..F.=.-.| +00000020 0f 7a 9f 9f 02 20 1a 1b 29 51 86 0f 02 b5 7e e9 |.z... ..)Q....~.| +00000030 95 84 e0 4a ff e1 b3 22 15 df 6b 07 ad fb 66 8d |...J..."..k...f.| +00000040 33 da f0 35 1e ad |3..5..| +[3d87 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 principal evaluation succeeds for identity 0 +[3d88 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bf280 gate 1589998883943017900 evaluation succeeds +[3d89 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d8a 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d8b 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d8c 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d8d 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d8e 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3d8f 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3d90 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3d91 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3d92 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d93 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d94 05-20 18:21:23.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d95 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d96 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d97 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d98 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d99 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d9a 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d9b 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d9c 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d9d 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3d9e 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d9f 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da0 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da1 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da2 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da3 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da4 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da5 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3da6 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da7 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3da8 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3da9 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3daa 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dab 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3dac 05-20 18:21:23.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dad 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3dae 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161034 +[3daf 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8CC96043DD5D6005B7FA4C05B57A1DE6D2FF2B4CF174E3EA2A7DFFDC7C998920 +[3db0 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3db1 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3db2 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3db3 05-20 18:21:24.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3db4 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3db5 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3db6 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3db7 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3db8 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3db9 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dba 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3dbb 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3dbd 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dbc 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3dbf 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dbe 05-20 18:21:24.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3dc0 05-20 18:21:24.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dc1 05-20 18:21:24.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3dc2 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3dc3 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dc4 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dc5 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dc6 05-20 18:21:24.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dc7 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3dc8 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3dc9 05-20 18:21:24.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dca 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dcb 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dcc 05-20 18:21:24.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dcd 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3dce 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3dcf 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3dd0 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3dd1 05-20 18:21:24.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dd2 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3dd3 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3dd4 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3dd5 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3dd6 05-20 18:21:24.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dd7 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[3dd8 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[3dd9 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dda 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[3ddb 05-20 18:21:24.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3ddc 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +[3ddd 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +00000040 17 32 b4 90 25 64 99 |.2..%d.| +[3dde 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3ddf 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 3a 6f 96 72 1d bd 6a f9 50 e0 |0E.!..:o.r..j.P.| +00000010 2d 9f d0 d9 6f ec 8c 62 05 c1 9c 67 4d de 0e 32 |-...o..b...gM..2| +00000020 10 ca 21 99 31 02 20 40 fa 15 5b 14 bc 3c 77 4d |..!.1. @..[.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3de1 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[3de2 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3de3 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3de4 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3de5 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3de6 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3de7 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3de8 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3de9 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dea 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3deb 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[3dec 05-20 18:21:24.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" secret_envelope: > alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +[3ded 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3dee 05-20 18:21:24.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3def 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3df0 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3df1 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3df2 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df3 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df4 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df5 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df6 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df7 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df8 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3df9 05-20 18:21:24.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dfa 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3dfb 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3dfc 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3dfd 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3dff 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[3e00 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3e01 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e02 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3e03 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3e04 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dfe 05-20 18:21:24.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3e05 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e06 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3e07 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3e08 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3e09 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3e0a 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3e0b 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e0c 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3e0d 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3e0e 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e0f 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3e10 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3e11 05-20 18:21:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e12 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +[3e13 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +[3e14 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e15 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > > , Envelope: 165 bytes, Signature: 0 bytes +[3e16 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3e17 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e18 05-20 18:21:24.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e19 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e1a 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3e1b 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3e1c 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3e1d 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3e1e 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 gate 1589998884934275500 evaluation starts +[3e1f 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 signed by 0 principal evaluation starts (used [false]) +[3e20 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 processing identity 0 with bytes of 115a110 +[3e21 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 principal matched by identity 0 +[3e22 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +[3e23 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +00000040 fe 14 6f 1a 6f 3b |..o.o;| +[3e24 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 principal evaluation succeeds for identity 0 +[3e25 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044726d0 gate 1589998884934275500 evaluation succeeds +[3e26 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e27 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e28 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e29 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e2a 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e2b 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3e2c 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3e2d 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3e2e 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3e2f 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e30 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e31 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e32 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[3e33 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e34 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e35 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e36 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[3e37 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > alive: alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +[3e38 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3e39 05-20 18:21:24.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e3a 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e3b 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161035 +[3e3c 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3D0A95993D0E77D691A7A148CF3680F4A27DEF2CF051658036C329E8F5E17F54 +[3e3d 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e3e 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3e3f 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3e40 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e41 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3e42 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[3e44 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e45 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3e47 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes +[3e43 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" > > , Envelope: 165 bytes, Signature: 0 bytes +[3e46 05-20 18:21:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\252\330\323\350\370e\276\204\304\266\343O\365\277#\232F_@\036\034\005\342\002 W\315a~\3134\177\256\202\333g\300OaR0\022v65=\2740H\356;\275\350\227x[L" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[3e48 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e49 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e4a 05-20 18:21:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e4b 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[3e4c 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[3e4d 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e4e 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[3e4f 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3e50 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +[3e51 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +00000040 bd e8 97 78 5b 4c |...x[L| +[3e52 05-20 18:21:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3e53 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3e54 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3e55 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 3d 9f c4 1d b5 e6 49 a1 c7 04 af |0D. 1=.....I....| +00000010 f9 a8 0d d0 37 b4 21 df ae 99 8c 00 7b 96 50 cd |....7.!.....{.P.| +00000020 71 40 a3 1b 02 20 13 4b d0 c2 9c cb 9d 40 1f 58 |q@... .K.....@.X| +00000030 6b ae db 46 f7 cb c4 1b d8 28 1f 07 e7 93 a1 9a |k..F.....(......| +00000040 af fe aa 58 f2 69 |...X.i| +[3e56 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3e57 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3e58 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e59 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e5a 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3e5b 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3e5c 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e5d 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e5e 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e5f 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e60 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3e61 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3e62 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3e63 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3e64 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 gate 1589998885058007200 evaluation starts +[3e65 05-20 18:21:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 signed by 0 principal evaluation starts (used [false]) +[3e66 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 processing identity 0 with bytes of 115a110 +[3e67 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 principal matched by identity 0 +[3e68 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 06 64 b3 15 16 bc 3a 61 01 a0 52 5a ff 28 1e 4a |.d....:a..RZ.(.J| +00000010 67 7a af 8e ab 87 98 6f 15 37 f1 bc 2f cf da 6d |gz.....o.7../..m| +[3e69 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 8b 37 81 dc 38 81 65 9b fe 74 98 |0D. ".7..8.e..t.| +00000010 d4 e2 f1 73 78 e5 da f0 7a 78 8e c0 55 3e 6e 23 |...sx...zx..U>n#| +00000020 a3 33 04 c2 02 20 0e 6e cb 63 09 2f d2 81 a2 99 |.3... .n.c./....| +00000030 44 20 0f 9a d8 5d 55 43 2e 3a 8b 9c d2 56 d0 31 |D ...]UC.:...V.1| +00000040 fe 14 6f 1a 6f 3b |..o.o;| +[3e6a 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 principal evaluation succeeds for identity 0 +[3e6b 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b6c10 gate 1589998885058007200 evaluation succeeds +[3e6d 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e6e 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e6c 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3e70 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3e6f 05-20 18:21:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e71 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e72 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e73 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e74 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3e75 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +[3e76 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +00000040 bd e8 97 78 5b 4c |...x[L| +[3e77 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e78 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e79 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e7a 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3e7b 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +[3e7c 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +00000040 17 32 b4 90 25 64 99 |.2..%d.| +[3e7d 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3e7e 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e7f 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e80 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3e82 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3e83 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f e3 f3 a9 fa 06 8c 57 12 9e a7 d2 be 3e 13 8a |?......W.....>..| +00000010 e8 09 fe 98 ff 1a 8f af fc d9 70 f7 53 a9 3d 46 |..........p.S.=F| +[3e84 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 3c cc 6e 29 67 fe 90 2b 54 95 |0E.!..<.n)g..+T.| +00000010 de 89 76 15 eb 00 14 6f ba b2 9a 53 b7 7d ec fe |..v....o...S.}..| +00000020 54 99 1a 6f 20 02 20 3e 10 57 3a dc 05 97 39 2f |T..o . >.W:...9/| +00000030 bd a1 fe bb 39 c9 0a 5e a2 d9 ff 23 39 86 8c 21 |....9..^...#9..!| +00000040 17 32 b4 90 25 64 99 |.2..%d.| +[3e81 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e85 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3e86 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e87 05-20 18:21:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3e88 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 0a 95 99 3d 0e 77 d6 91 a7 a1 48 cf 36 80 f4 |=...=.w....H.6..| +00000010 a2 7d ef 2c f0 51 65 80 36 c3 29 e8 f5 e1 7f 54 |.}.,.Qe.6.)....T| +[3e89 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 08 40 d4 8d da ed dd 7b 3e aa d8 d3 |0D. .@.....{>...| +00000010 e8 f8 65 be 84 c4 b6 e3 4f f5 bf 23 9a 46 5f 40 |..e.....O..#.F_@| +00000020 1e 1c 05 e2 02 20 57 cd 61 7e cb 34 7f ae 82 db |..... W.a~.4....| +00000030 67 c0 4f 61 52 30 12 76 36 35 3d bc 30 48 ee 3b |g.OaR0.v65=.0H.;| +00000040 bd e8 97 78 5b 4c |...x[L| +[3e8a 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e8b 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e8c 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e8d 05-20 18:21:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e8e 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3e8f 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3e90 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3e91 05-20 18:21:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e92 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e93 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e94 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e95 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e96 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e97 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3e98 05-20 18:21:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e99 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3e9a 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3e9b 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e9c 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3e9d 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3e9e 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e9f 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ea0 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ea1 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ea2 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ea3 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ea4 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ea5 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 gate 1589998885216571000 evaluation starts +[3ea6 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 signed by 0 principal evaluation starts (used [false]) +[3ea7 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 processing identity 0 with bytes of 115a110 +[3ea8 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 principal matched by identity 0 +[3ea9 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 17 ca 1c e9 94 63 04 ee b0 29 0d 30 67 8d 01 |......c...).0g..| +00000010 1d 4b 42 72 7c 6f 36 9b 97 86 eb 47 d9 8e f0 2d |.KBr|o6....G...-| +[3eaa 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 8e dd 23 fa 21 3c f0 19 20 e2 |0E.!....#.!<.. .| +00000010 b5 34 85 9e a9 24 67 bb 0c b5 51 ba 8d d2 c0 46 |.4...$g...Q....F| +00000020 25 5d fc 57 58 02 20 65 dd ea c7 45 18 d0 0a b3 |%].WX. e...E....| +00000030 3d 15 ce bc 17 04 6f ff 99 5b 87 e8 95 9f 51 61 |=.....o..[....Qa| +00000040 f5 4c ff 9c 63 33 48 |.L..c3H| +[3eab 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 principal evaluation succeeds for identity 0 +[3eac 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044dd3e0 gate 1589998885216571000 evaluation succeeds +[3ead 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3eae 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3eaf 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3eb0 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3eb1 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3eb2 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3eb3 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3eb4 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3eb5 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3eb6 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3eb7 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3eb8 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3eb9 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3eba 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ebb 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ebc 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ebd 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[3ebe 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020W:\334\005\2279/\275\241\376\2739\311\n^\242\331\377#9\206\214!\0272\264\220%d\231" > alive:n#\2433\004\302\002 \016n\313c\t/\322\201\242\231D \017\232\330]UC.:\213\234\322V\3201\376\024o\032o;" > alive: alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +[3ebf 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3ec0 05-20 18:21:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ec1 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[3ec2 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[3ec3 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3ec4 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610121801 +[3ec5 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BFBB526AE637BF39588E041A31529426104E84EB02F04D014FA825B8F8F5F27D +[3ec6 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[3ec7 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ec8 05-20 18:21:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ec9 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3eca 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ecb 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[3ecc 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ecd 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ece 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[3ecf 05-20 18:21:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ed0 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ed1 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ed2 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3ed3 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3ed4 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ed5 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3ed6 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ed7 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3ed8 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ed9 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3eda 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3edb 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[3edc 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[3edd 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[3ede 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[3edf 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee0 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee1 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ee2 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ee3 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ee4 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ee5 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ee6 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ee7 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 gate 1589998887574997100 evaluation starts +[3ee8 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 signed by 0 principal evaluation starts (used [false]) +[3ee9 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 processing identity 0 with bytes of 115a110 +[3eea 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 principal matched by identity 0 +[3eeb 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[3eec 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[3eed 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 principal evaluation succeeds for identity 0 +[3eee 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453a610 gate 1589998887574997100 evaluation succeeds +[3eef 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ef0 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ef1 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3ef2 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3ef3 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ef4 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ef5 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ef6 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ef7 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ef8 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ef9 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3efa 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3efb 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 gate 1589998887576045200 evaluation starts +[3efc 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 signed by 0 principal evaluation starts (used [false]) +[3efd 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 processing identity 0 with bytes of 115a110 +[3efe 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 principal matched by identity 0 +[3eff 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[3f00 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[3f01 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 principal evaluation succeeds for identity 0 +[3f02 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453b810 gate 1589998887576045200 evaluation succeeds +[3f03 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f04 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f05 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f06 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f07 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f08 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3f09 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3f0a 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f0b 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f0c 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f0d 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f0e 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f0f 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f10 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f11 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f12 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3f13 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f14 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 gate 1589998887579324100 evaluation starts +[3f15 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 signed by 0 principal evaluation starts (used [false]) +[3f16 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 processing identity 0 with bytes of 115a110 +[3f17 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 principal matched by identity 0 +[3f18 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[3f19 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[3f1a 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 principal evaluation succeeds for identity 0 +[3f1b 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004552d70 gate 1589998887579324100 evaluation succeeds +[3f1c 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f1d 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f1e 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f1f 05-20 18:21:27.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f20 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[3f21 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[3f22 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f23 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f24 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f25 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f26 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f27 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f28 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f29 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f2a 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 gate 1589998887581571100 evaluation starts +[3f2b 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 signed by 0 principal evaluation starts (used [false]) +[3f2c 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 processing identity 0 with bytes of 115a110 +[3f2d 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 principal matched by identity 0 +[3f2e 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[3f2f 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[3f30 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 principal evaluation succeeds for identity 0 +[3f31 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004576660 gate 1589998887581571100 evaluation succeeds +[3f32 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f33 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f34 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f35 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f36 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[3f37 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[3f38 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f39 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[3f3a 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f3b 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f3c 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f3d 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f3e 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f3f 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f40 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f41 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f42 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f43 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 gate 1589998887583078200 evaluation starts +[3f44 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 signed by 0 principal evaluation starts (used [false]) +[3f45 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 processing identity 0 with bytes of 115a110 +[3f46 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 principal matched by identity 0 +[3f47 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[3f48 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[3f49 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 principal evaluation succeeds for identity 0 +[3f4a 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458c1a0 gate 1589998887583078200 evaluation succeeds +[3f4b 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f4c 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f4d 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f4e 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f4f 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[3f50 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[3f51 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[3f52 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[3f53 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f54 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f55 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f56 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f57 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f58 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f59 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f5a 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f5b 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 gate 1589998887584613100 evaluation starts +[3f5c 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 signed by 0 principal evaluation starts (used [false]) +[3f5d 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 processing identity 0 with bytes of 115a110 +[3f5e 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 principal matched by identity 0 +[3f5f 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[3f60 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[3f61 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 principal evaluation succeeds for identity 0 +[3f62 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6180 gate 1589998887584613100 evaluation succeeds +[3f63 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f64 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f65 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f66 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f67 05-20 18:21:27.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f68 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f69 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f6a 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3f6b 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f6c 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f6d 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3f6e 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3f6f 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f70 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3f71 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3f72 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3f73 05-20 18:21:27.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f74 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3f75 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3f76 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f77 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f78 05-20 18:21:27.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f79 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3f7a 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3f7b 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7c 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7d 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7e 05-20 18:21:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f7f 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f80 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f81 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f82 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f83 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3f84 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce ed 34 6b 9c 51 19 9a c6 0f 9a 68 d0 e0 3d b6 |..4k.Q.....h..=.| +00000010 47 f9 3a cc e9 16 f7 fb fd 63 7c 25 67 8a 8e b9 |G.:......c|%g...| +[3f85 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 24 ff 7f ca 7a b9 68 05 4b 1c |0E.!..$...z.h.K.| +00000010 02 3e 74 0f 29 b6 5e c5 ff 8a c6 a2 73 47 99 36 |.>t.).^.....sG.6| +00000020 36 f2 3a 88 bb 02 20 01 f2 a0 26 e0 25 f4 06 0f |6.:... ...&.%...| +00000030 8b 14 85 16 c0 12 fc f9 cd a7 be 08 10 c2 ca e5 |................| +00000040 31 0a 3c f0 1f bc 33 |1.<...3| +[3f86 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f87 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3f88 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3f89 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3f8a 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[3f8b 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8c 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8d 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8e 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f8f 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f90 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f91 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3f92 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f93 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3f94 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f95 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f96 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f97 05-20 18:21:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f98 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f99 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f9a 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f9b 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f9c 05-20 18:21:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f9d 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f9e 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f9f 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fa0 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fa1 05-20 18:21:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fa2 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3fa3 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3fa4 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fa5 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fa6 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fa7 05-20 18:21:28.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fa8 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3fa9 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3faa 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3fab 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3fac 05-20 18:21:28.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fad 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3fae 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3faf 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3fb0 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3fb1 05-20 18:21:28.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fb2 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3fb3 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3fb4 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fb5 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3fb6 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3fb7 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +[3fb8 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +[3fb9 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3fba 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf e6 0f fb f5 4d f0 04 22 c8 22 |0E.!......M.."."| +00000010 0e 55 75 77 02 40 0c b6 fc 3f 2b 66 31 2b d6 26 |.Uuw.@...?+f1+.&| +00000020 ee d9 99 f2 fd 02 20 2a 11 c9 45 25 9e ff 78 8c |...... *..E%..x.| +00000030 60 71 67 87 85 5b 3a 75 c7 a4 0a 72 fe ef d9 23 |`qg..[:u...r...#| +00000040 b4 9b f7 07 dd cc 41 |......A| +[3fbb 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3fbc 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[3fbd 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3fbe 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3fbf 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3fc0 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fc1 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fc2 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fc3 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3fc4 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fc5 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fc6 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[3fc7 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +[3fc8 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3fc9 05-20 18:21:28.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fca 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fcb 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fcc 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fcd 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fce 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3fcf 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fd0 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3fd1 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3fd2 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3fd3 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3fd4 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3fd5 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3fd6 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 gate 1589998888647690600 evaluation starts +[3fd7 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 signed by 0 principal evaluation starts (used [false]) +[3fd8 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 processing identity 0 with bytes of 115a110 +[3fd9 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 principal matched by identity 0 +[3fda 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 25 c1 a0 94 7e 60 34 8e 31 4c 35 2f 35 77 91 |K%...~`4.1L5/5w.| +00000010 b0 b5 05 2a 7e d6 75 24 44 f4 1d 18 c0 ee 0a 61 |...*~.u$D......a| +[3fdb 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 8c 59 83 51 56 ab 18 ae f2 ec |0E.!...Y.QV.....| +00000010 89 66 e1 ed 13 1e f4 c0 00 11 f0 d6 a1 de e8 e5 |.f..............| +00000020 41 ab 99 45 db 02 20 68 de 29 84 16 d0 11 2f 31 |A..E.. h.)..../1| +00000030 70 57 84 92 a1 49 94 95 dc 82 87 cc 9c 49 44 f3 |pW...I.......ID.| +00000040 5d ef a4 a3 26 cd c6 |]...&..| +[3fdc 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 principal evaluation succeeds for identity 0 +[3fdd 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046280d0 gate 1589998888647690600 evaluation succeeds +[3fde 05-20 18:21:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3fdf 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3fe0 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3fe1 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3fe2 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fe3 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3fe4 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3fe5 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3fe6 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3fe7 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fe8 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fe9 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fea 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3feb 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fec 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fed 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fee 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fef 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ff0 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ff1 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3ff2 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ff3 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3ff4 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ff5 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ff6 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ff7 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ff8 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ff9 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ffa 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ffb 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ffc 05-20 18:21:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ffd 05-20 18:21:28.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ffe 05-20 18:21:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3fff 05-20 18:21:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4000 05-20 18:21:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4001 05-20 18:21:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4002 05-20 18:21:28.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[4003 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4004 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4005 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4006 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4007 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4008 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4009 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[400a 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[400b 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[400c 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[400d 05-20 18:21:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[400e 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[400f 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4010 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4011 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4012 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4013 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4014 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4015 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4016 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4017 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4018 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4019 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[401a 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[401b 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[401c 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[401d 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[401e 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[401f 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4020 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4021 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4022 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4023 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4024 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4025 05-20 18:21:28.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4026 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4027 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4028 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4029 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[402a 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[402b 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[402c 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[402d 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[402e 05-20 18:21:28.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[402f 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4031 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4032 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4030 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4033 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 gate 1589998888908133600 evaluation starts +[4034 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 signed by 0 principal evaluation starts (used [false]) +[4035 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4037 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4038 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4036 05-20 18:21:28.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 processing identity 0 with bytes of 115a110 +[4039 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 principal matched by identity 0 +[403a 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 1e 74 7c 7e b9 e3 9f 9f a7 fb f1 a8 7d df ee |8.t|~........}..| +00000010 68 7e 2a 3f 2e 2b 10 2e 4a 64 bb d2 e9 77 f8 a1 |h~*?.+..Jd...w..| +[403b 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 fd cd 4c f8 c1 51 90 7e 36 0b |0E.!....L..Q.~6.| +00000010 42 28 0c 3a 7b e5 84 a3 1f e3 88 4e 2f 01 3c e7 |B(.:{......N/.<.| +00000020 0e d1 cb fe 77 02 20 34 5c 17 c5 c1 40 1b e9 55 |....w. 4\...@..U| +00000030 89 dd ae 66 19 2c a2 ff 23 2b 86 b5 9e 5c d7 02 |...f.,..#+...\..| +00000040 ee 64 9e 75 a1 03 51 |.d.u..Q| +[403c 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 principal evaluation succeeds for identity 0 +[403d 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff910 gate 1589998888908133600 evaluation succeeds +[403e 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[403f 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4040 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4041 05-20 18:21:28.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4042 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4043 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4044 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4045 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4046 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4047 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4048 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4049 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[404a 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[404b 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[404c 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[404d 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[404e 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[404f 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4050 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4051 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4052 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4053 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4055 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4056 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4054 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4057 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4058 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4059 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[405a 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[405b 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[405d 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[405c 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[405e 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[405f 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4060 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4061 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4062 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4063 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4064 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4065 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4066 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4067 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 gate 1589998888928027200 evaluation starts +[4068 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 signed by 0 principal evaluation starts (used [false]) +[4069 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 processing identity 0 with bytes of 115a110 +[406a 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 principal matched by identity 0 +[406b 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +[406c 05-20 18:21:28.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +00000040 93 28 ee af 6b 85 c5 |.(..k..| +[406d 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 principal evaluation succeeds for identity 0 +[406e 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00468a6b0 gate 1589998888928027200 evaluation succeeds +[406f 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4070 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4071 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4072 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4073 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4074 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4075 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4076 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4077 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4078 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4079 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[407a 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[407b 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[407c 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[407d 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[407e 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[407f 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4080 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4081 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4082 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[4083 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\327W\014O?/\333&\3078\357\204@\277\\\334G[S\375>Ji\032mo\345" > +[4084 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4085 05-20 18:21:28.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4086 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4087 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161036 +[4088 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D563CD7111F2668C92FA2EBB3F29B84EAB965F683633BDDA154C56D3F4DFC433 +[4089 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[408a 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[408b 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[408c 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[408d 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[408e 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[408f 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4090 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[4091 05-20 18:21:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4092 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[4093 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4094 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4095 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4096 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4097 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4098 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161037 +[4099 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1C069EAB2F17AC20ACAC13E8813987BA1B35BAD6EDBC07A394FC647CC66FE64D +[409a 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[409b 05-20 18:21:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[409c 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[409d 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[409e 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[409f 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40a0 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40a1 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[40a2 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40a3 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[40a4 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[40a5 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[40a6 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40a7 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[40a8 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[40a9 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40aa 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[40ab 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40ac 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[40ae 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40ad 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[40af 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[40b0 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[40b1 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[40b2 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +[40b3 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +[40b4 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[40b5 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40b6 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40b7 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[40b8 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +[40b9 05-20 18:21:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +[40ba 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40bb 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40bc 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40bd 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40be 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[40bf 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[40c0 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40c1 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[40c2 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[40c3 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[40c4 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[40c5 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[40c6 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[40c7 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 gate 1589998889026867800 evaluation starts +[40c9 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 signed by 0 principal evaluation starts (used [false]) +[40c8 05-20 18:21:29.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40cb 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 processing identity 0 with bytes of 115a110 +[40cc 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 principal matched by identity 0 +[40cd 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d 95 c0 00 7a aa 1c d1 22 08 84 a2 54 3a 9a 3b |}...z..."...T:.;| +00000010 85 bb 09 02 e9 d8 50 fb ed d4 73 98 63 f8 29 65 |......P...s.c.)e| +[40ce 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe a8 cd 3c 34 a5 f7 30 67 13 43 |0E.!....<4..0g.C| +00000010 9f fc fd 2a 5e 49 14 28 8d 34 a7 f4 9e 44 3c ee |...*^I.(.4...D<.| +00000020 cd 9b a1 bd 5d 02 20 6e 0c a0 ed cc 6a 65 1c 2e |....]. n....je..| +00000030 73 1d db 0f 47 8a b3 41 56 f0 b8 ca 76 08 fc 7b |s...G..AV...v..{| +00000040 93 28 ee af 6b 85 c5 |.(..k..| +[40ca 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[40cf 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 principal evaluation succeeds for identity 0 +[40d0 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e76c0 gate 1589998889026867800 evaluation succeeds +[40d1 05-20 18:21:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[40d2 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[40d3 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[40d4 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[40d5 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40d6 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40d7 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[40d8 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +[40d9 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +[40da 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40db 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40dc 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40dd 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[40de 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 98 bf 8c bb 61 59 46 5d c8 2d eb 94 2a 37 c1 |.....aYF].-..*7.| +00000010 86 1f 9e 4a 91 26 44 45 da 4d b7 89 12 39 a9 20 |...J.&DE.M...9. | +[40df 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 b8 f6 a9 1b b0 b2 f2 01 44 ab |0E.!..........D.| +00000010 ec 33 70 4c 6d bf 9a d7 4a f9 65 d9 30 20 82 af |.3pLm...J.e.0 ..| +00000020 6b a1 5d d2 5d 02 20 24 e7 05 c9 f7 b4 95 2d 64 |k.].]. $......-d| +00000030 40 0f 5f da d5 d9 cd 0e e2 5e 9b 0c b7 ae ab 0a |@._......^......| +00000040 c4 0f 5e a5 e4 bb 3a |..^...:| +[40e0 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40e1 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e2 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e3 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[40e4 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e5 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[40e6 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 63 cd 71 11 f2 66 8c 92 fa 2e bb 3f 29 b8 4e |.c.q..f.....?).N| +00000010 ab 96 5f 68 36 33 bd da 15 4c 56 d3 f4 df c4 33 |.._h63...LV....3| +[40e7 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 33 17 a3 c2 5e 64 ee da bb 5f |0E.!..3...^d..._| +00000010 b7 da 42 ea 7f c3 a8 92 37 47 bb 2b 61 f4 af 51 |..B.....7G.+a..Q| +00000020 5c 90 13 24 a6 02 20 3d 47 07 ee 3a bd 33 04 4b |\..$.. =G..:.3.K| +00000030 a2 ab 94 e3 24 58 37 a4 e9 58 cd 28 08 55 82 c6 |....$X7..X.(.U..| +00000040 bc a5 5d 25 c2 e8 62 |..]%..b| +[40e8 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[40e9 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 11 98 1b 55 1e cf f6 ce 72 7b 22 |0D. ....U....r{"| +00000010 56 84 9b 3f 78 85 77 76 3b ae 0d f9 97 06 9f cc |V..?x.wv;.......| +00000020 55 f2 4c 96 02 20 74 17 9a 84 9f 54 39 f5 ab d6 |U.L.. t....T9...| +00000030 c4 33 02 41 f0 b1 ea 75 12 9f fc 0b 4b b0 9f 0c |.3.A...u....K...| +00000040 76 8d 8f ef 4e b0 |v...N.| +[40ea 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[40eb 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[40ec 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40ed 05-20 18:21:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40ee 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[40ef 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[40f0 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[40f1 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40f2 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40f3 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40f4 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40f5 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40f6 05-20 18:21:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40f7 05-20 18:21:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[40f8 05-20 18:21:29.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40f9 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[40fa 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[40fb 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40fc 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[40fd 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[40fe 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ff 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4100 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4101 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4102 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4103 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4104 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4105 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 gate 1589998889187919100 evaluation starts +[4106 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 signed by 0 principal evaluation starts (used [false]) +[4107 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 processing identity 0 with bytes of 115a110 +[4108 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 principal matched by identity 0 +[4109 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +[410a 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +00000040 c8 23 ab 1d 51 fb |.#..Q.| +[410b 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 principal evaluation succeeds for identity 0 +[410c 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004734710 gate 1589998889187919100 evaluation succeeds +[410d 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[410e 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[410f 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4110 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4111 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4112 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4113 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4114 05-20 18:21:29.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4115 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4116 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4117 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4118 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[4119 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[411a 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[411b 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[411c 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[411d 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[411e 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[411f 05-20 18:21:29.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4120 05-20 18:21:29.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4121 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[4122 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[4123 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4124 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610131801 +[4125 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C6C6791CF057AB8A95EAEE0C0E4A0DA8ED077EC2F3BC41BDB9629FE61AB2ADC1 +[4126 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[4127 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4128 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4129 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[412a 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[412b 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[412c 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[412d 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[412e 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[412f 05-20 18:21:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4130 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4131 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4132 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[4133 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4134 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4135 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4136 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4137 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4138 05-20 18:21:31.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4139 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[413a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[413b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[413c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[413d 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[413e 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[413f 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4140 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4141 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4142 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4143 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4144 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4145 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4146 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4147 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 gate 1589998891544892900 evaluation starts +[4148 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 signed by 0 principal evaluation starts (used [false]) +[4149 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 processing identity 0 with bytes of 115a110 +[414a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 principal matched by identity 0 +[414b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[414c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[414d 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 principal evaluation succeeds for identity 0 +[414e 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780740 gate 1589998891544892900 evaluation succeeds +[414f 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4150 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4151 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4152 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4153 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4154 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4155 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4156 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4157 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4158 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4159 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[415a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[415b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 gate 1589998891545743400 evaluation starts +[415c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 signed by 0 principal evaluation starts (used [false]) +[415d 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 processing identity 0 with bytes of 115a110 +[415e 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 principal matched by identity 0 +[415f 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[4160 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[4161 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 principal evaluation succeeds for identity 0 +[4162 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004781940 gate 1589998891545743400 evaluation succeeds +[4163 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4164 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4165 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4166 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4167 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4168 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4169 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[416a 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[416b 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[416c 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[416d 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[416e 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[416f 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4170 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4171 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4172 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4173 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 gate 1589998891546862300 evaluation starts +[4174 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 signed by 0 principal evaluation starts (used [false]) +[4175 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 processing identity 0 with bytes of 115a110 +[4176 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 principal matched by identity 0 +[4177 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[4178 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4179 05-20 18:21:31.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[417a 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 principal evaluation succeeds for identity 0 +[417b 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479aea0 gate 1589998891546862300 evaluation succeeds +[417c 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[417d 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[417e 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[417f 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4180 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[4181 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[4182 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[4183 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[4184 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4185 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4186 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4187 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4188 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4189 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[418a 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[418b 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[418c 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 gate 1589998891552992600 evaluation starts +[418d 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 signed by 0 principal evaluation starts (used [false]) +[418e 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 processing identity 0 with bytes of 115a110 +[418f 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 principal matched by identity 0 +[4190 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[4191 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[4192 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 principal evaluation succeeds for identity 0 +[4193 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bae80 gate 1589998891552992600 evaluation succeeds +[4194 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4195 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4196 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4197 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4198 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4199 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[419a 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[419b 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[419c 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[419d 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[419e 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[419f 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[41a0 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[41a1 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[41a2 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[41a3 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 gate 1589998891556850200 evaluation starts +[41a4 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 signed by 0 principal evaluation starts (used [false]) +[41a5 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 processing identity 0 with bytes of 115a110 +[41a6 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 principal matched by identity 0 +[41a7 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[41a8 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[41a9 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 principal evaluation succeeds for identity 0 +[41aa 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d82d0 gate 1589998891556850200 evaluation succeeds +[41ab 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[41ac 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[41ad 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[41ae 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[41af 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[41b0 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[41b1 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41b2 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41b3 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[41b4 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[41b5 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[41b6 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[41b7 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[41b8 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[41b9 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 gate 1589998891558372000 evaluation starts +[41ba 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 signed by 0 principal evaluation starts (used [false]) +[41bb 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 processing identity 0 with bytes of 115a110 +[41bc 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 principal matched by identity 0 +[41bd 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[41be 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[41bf 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 principal evaluation succeeds for identity 0 +[41c0 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047d9bc0 gate 1589998891558372000 evaluation succeeds +[41c1 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[41c2 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[41c3 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[41c4 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[41c5 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[41c6 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[41c7 05-20 18:21:31.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41c8 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41c9 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41ca 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[41cb 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41cc 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41cd 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[41ce 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[41cf 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d0 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[41d1 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[41d2 05-20 18:21:31.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[41d3 05-20 18:21:31.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d4 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41d5 05-20 18:21:31.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41d6 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41d7 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41d8 05-20 18:21:31.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d9 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41da 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41db 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41dc 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41dd 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41de 05-20 18:21:32.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41df 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41e0 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41e1 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41e2 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41e3 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41e4 05-20 18:21:32.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41e5 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[41e6 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[41e7 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[41e8 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[41e9 05-20 18:21:32.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ea 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[41eb 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[41ec 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[41ed 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[41ee 05-20 18:21:32.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ef 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247\233;" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[41f0 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\247\233;" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[41f1 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41f2 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\247\233;" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[41f3 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[41f4 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +[41f5 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +[41f6 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[41f7 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 97 fb c0 74 25 c8 28 41 0b e2 |0E.!.....t%.(A..| +00000010 e8 9c 0d 61 d8 35 67 28 38 1c 05 db 44 19 d6 27 |...a.5g(8...D..'| +00000020 d7 09 5e 6c be 02 20 04 d1 2f da 94 0a 82 ed b1 |..^l.. ../......| +00000030 bf f9 6c 69 50 4c 3f 8c a2 13 4d a0 df f6 14 74 |..liPL?...M....t| +00000040 cf 86 49 9b 5f 6d b6 |..I._m.| +[41f8 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[41f9 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[41fa 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[41fb 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[41fc 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[41fd 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41fe 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ff 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4200 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[4201 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4202 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4203 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[4204 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\247\233;" secret_envelope: > alive: +[4205 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4206 05-20 18:21:32.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4207 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4208 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4209 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[420a 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[420b 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[420c 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[420d 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[420e 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[420f 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4210 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[4211 05-20 18:21:32.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4212 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4213 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4214 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4215 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4216 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4217 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4218 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4219 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[421a 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[421b 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[421c 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[421d 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[421e 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[421f 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4220 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4221 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4222 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4223 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4224 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4225 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4226 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4227 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4228 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4229 05-20 18:21:32.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[422a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[422b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[422c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[422d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[422e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[422f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4230 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4231 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4232 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4233 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4234 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4235 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4236 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 gate 1589998892913712300 evaluation starts +[4237 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 signed by 0 principal evaluation starts (used [false]) +[4238 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 processing identity 0 with bytes of 115a110 +[4239 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 principal matched by identity 0 +[423a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +[423b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +00000040 2d 5b 92 8e 73 ae |-[..s.| +[423c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 principal evaluation succeeds for identity 0 +[423d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486d150 gate 1589998892913712300 evaluation succeeds +[423e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[423f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4240 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4241 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4242 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4243 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4244 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4245 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4246 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4247 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4248 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4249 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[424a 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[424b 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[424c 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[424d 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[424e 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[424f 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\247\233;" > alive: alive: +[4250 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[4251 05-20 18:21:32.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4252 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4253 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161038 +[4254 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A77BCBE7D8744E6863FA425A2DC9F43AD1E2395188C809C1610BE07377237BAB +[4255 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4256 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4257 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4258 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[4259 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[425a 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[425b 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[425c 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[425d 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[425e 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[425f 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4260 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4261 05-20 18:21:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[4262 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4263 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4264 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4265 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4266 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4267 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4268 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4269 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[426a 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[426b 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[426c 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[426d 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[426e 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[426f 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 gate 1589998893016570300 evaluation starts +[4270 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 signed by 0 principal evaluation starts (used [false]) +[4271 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 processing identity 0 with bytes of 115a110 +[4272 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 principal matched by identity 0 +[4273 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d b0 88 71 cd ef e9 06 fc 78 9e 64 af ff 57 da |-..q.....x.d..W.| +00000010 b5 37 95 5c 7b 12 99 b6 85 7c 3a 7d c1 1c 21 d5 |.7.\{....|:}..!.| +[4274 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 82 7a 28 37 92 b5 e5 6f c6 49 5c |0D. *.z(7...o.I\| +00000010 b7 dc a5 8d f0 35 24 86 bb bd b4 6f c2 e5 43 63 |.....5$....o..Cc| +00000020 e2 71 90 f3 02 20 34 50 9c 67 33 eb 26 8f de aa |.q... 4P.g3.&...| +00000030 2e ff a3 1e ab da a9 e1 b4 47 bb d6 8b 16 e0 aa |.........G......| +00000040 2d 5b 92 8e 73 ae |-[..s.| +[4275 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 principal evaluation succeeds for identity 0 +[4276 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b0af0 gate 1589998893016570300 evaluation succeeds +[4277 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4278 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4279 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[427a 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[427b 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[427c 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[427d 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[427e 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[427f 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4280 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +[4281 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +00000040 5c 0c f4 3b 58 db 03 |\..;X..| +[4282 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4283 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4284 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4285 05-20 18:21:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4286 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +[4287 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +[4288 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4289 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[428a 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[428b 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[428c 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[428d 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[428e 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +[428f 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +00000040 5c 0c f4 3b 58 db 03 |\..;X..| +[4290 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[4291 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 58 72 83 0f a2 1c 38 74 20 70 |0E.!..Xr....8t p| +00000010 48 2a ef 7f d5 22 08 66 f3 65 87 9f 7d 24 8f 31 |H*...".f.e..}$.1| +00000020 74 9c d3 cb 3a 02 20 71 30 8f 95 07 cf aa 90 5c |t...:. q0......\| +00000030 ed 23 20 ea 65 1e e0 26 4d b5 59 47 a5 3b f2 0a |.# .e..&M.YG.;..| +00000040 bc 73 67 43 ad 88 a4 |.sgC...| +[4292 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[4293 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[4294 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4295 05-20 18:21:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4296 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4297 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4298 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4299 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[429a 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[429b 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[429c 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[429d 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[429e 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[429f 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42a0 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42a1 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42a2 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 gate 1589998893031913800 evaluation starts +[42a3 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 signed by 0 principal evaluation starts (used [false]) +[42a4 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 processing identity 0 with bytes of 115a110 +[42a5 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 principal matched by identity 0 +[42a6 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 96 a5 bf e1 61 ba 47 51 d6 ff 3f 2b b4 ec 88 |.....a.GQ..?+...| +00000010 38 99 70 1a 2e dc e0 4c 68 3d 8d 0c 96 e0 87 03 |8.p....Lh=......| +[42a7 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f b7 dc e3 c9 d5 43 ce dd bc 65 15 |0D. _.....C...e.| +00000010 d3 df ae 21 9f 5a ae 3f a8 27 8e 84 72 69 1a c2 |...!.Z.?.'..ri..| +00000020 ad bb 21 eb 02 20 0c 86 da 2b 4a eb 85 cf a8 7b |..!.. ...+J....{| +00000030 5e e1 5f 2c 5d be f0 10 54 9d 1c 1e f4 10 0c b0 |^._,]...T.......| +00000040 c8 23 ab 1d 51 fb |.#..Q.| +[42a8 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 principal evaluation succeeds for identity 0 +[42a9 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f46c0 gate 1589998893031913800 evaluation succeeds +[42aa 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42ab 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[42ac 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[42ad 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[42ae 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[42af 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42b0 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[42b1 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 9d a1 02 e9 0a 24 05 88 bd 66 fc e3 23 64 a6 |\.....$...f..#d.| +00000010 1c d6 5c cd 15 c4 d3 95 6e 96 82 2f 5e 95 69 63 |..\.....n../^.ic| +[42b2 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 c4 61 71 4a b3 0a 87 57 b2 80 |0E.!...aqJ...W..| +00000010 48 8b d4 fd 08 13 ab 38 73 ea e2 88 f8 c7 05 69 |H......8s......i| +00000020 46 42 5d a6 b3 02 20 54 2c 23 dc 28 45 68 f8 f8 |FB]... T,#.(Eh..| +00000030 4f cf 8c a4 df cf af 29 d0 e9 f0 6c 37 a7 9f 57 |O......)...l7..W| +00000040 3a 89 64 3e a7 9b 3b |:.d>..;| +[42b3 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[42b4 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42b5 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[42b6 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 7b cb e7 d8 74 4e 68 63 fa 42 5a 2d c9 f4 3a |.{...tNhc.BZ-..:| +00000010 d1 e2 39 51 88 c8 09 c1 61 0b e0 73 77 23 7b ab |..9Q....a..sw#{.| +[42b7 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 2d 1f 39 bd ef 2e fd 19 ee f9 |0E.!..-.9.......| +00000010 fb 4b 09 d1 14 98 28 03 d6 1a ef eb 3a be 57 c1 |.K....(.....:.W.| +00000020 56 6a 09 87 e6 02 20 6b db e0 87 98 b4 13 d6 14 |Vj.... k........| +00000030 a7 62 e5 67 c5 de 8b 94 d8 bc 9b dd 8b 4d a9 50 |.b.g.........M.P| +00000040 5c 0c f4 3b 58 db 03 |\..;X..| +[42b8 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[42b9 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[42ba 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42bb 05-20 18:21:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42bc 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[42bd 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[42be 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[42bf 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42c0 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42c1 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42c2 05-20 18:21:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42c3 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42c4 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42c5 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[42c6 05-20 18:21:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42c7 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[42c8 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[42c9 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42ca 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[42cb 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[42cc 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42cd 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[42ce 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[42cf 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[42d0 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42d1 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42d2 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42d3 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 gate 1589998893185933600 evaluation starts +[42d4 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 signed by 0 principal evaluation starts (used [false]) +[42d5 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 processing identity 0 with bytes of 115a110 +[42d6 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 principal matched by identity 0 +[42d7 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 53 0b 00 f7 89 a5 eb 6a 24 a7 c9 74 38 68 f1 |4S......j$..t8h.| +00000010 04 1d 36 bb 9c c6 aa 18 31 cb 8f 86 e3 b5 66 7e |..6.....1.....f~| +[42d8 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a5 74 b6 f9 29 0d 09 5e 35 99 d9 |0D. &.t..)..^5..| +00000010 c8 29 65 f1 b3 f7 14 c1 19 e2 72 cc 9e 56 a3 83 |.)e.......r..V..| +00000020 9c db 2e 98 02 20 37 8d 3b 4f fa c7 9a 97 c1 ee |..... 7.;O......| +00000030 fe 46 6d 7e b5 69 19 59 ba 22 cc 4e 33 2c 93 cf |.Fm~.i.Y.".N3,..| +00000040 a0 10 16 eb 60 1f |....`.| +[42d9 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 principal evaluation succeeds for identity 0 +[42da 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004908fd0 gate 1589998893185933600 evaluation succeeds +[42db 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42dc 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[42dd 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[42de 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[42df 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[42e0 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[42e1 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[42e2 05-20 18:21:33.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[42e3 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[42e4 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42e5 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42e6 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42e7 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[42e8 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42e9 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42ea 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42eb 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[42ec 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\247\233;" > alive: alive: alive: +[42ed 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[42ee 05-20 18:21:33.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42ef 05-20 18:21:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[42f0 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[42f1 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42f2 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[42f3 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[42f4 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 21 81 35 80 98 f0 d0 31 04 37 02 0e 74 1f 1a |.!.5....1.7..t..| +00000010 15 9a 2c a5 da 2c 90 32 99 f3 c9 81 0e a0 4f f6 |..,..,.2......O.| +[42f5 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 61 d6 7b ec af 4b cf d3 c9 71 4f |0D. 6a.{..K...qO| +00000010 6c 28 98 49 10 ae a8 27 e9 69 a8 bc 57 49 36 1f |l(.I...'.i..WI6.| +00000020 e4 8c ee 45 02 20 59 72 38 db a2 29 89 8f 97 52 |...E. Yr8..)...R| +00000030 95 29 e9 7e 53 56 c2 89 ab 42 a9 00 b0 2b 3d e6 |.).~SV...B...+=.| +00000040 22 6a 03 6c 28 06 |"j.l(.| +[42f6 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[42f7 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[42f8 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[42f9 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[42fa 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[42fb 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42fc 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42fd 05-20 18:21:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42fe 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42ff 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4300 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4301 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4302 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4303 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4304 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4305 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4306 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4307 05-20 18:21:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4308 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4309 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[430a 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[430b 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[430c 05-20 18:21:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[430d 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[430e 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[430f 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4310 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4311 05-20 18:21:33.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4312 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4313 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4314 05-20 18:21:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4315 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4316 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4317 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4318 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4319 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[431a 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[431b 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[431c 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[431d 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[431e 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 gate 1589998893650847300 evaluation starts +[431f 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 signed by 0 principal evaluation starts (used [false]) +[4320 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 processing identity 0 with bytes of 115a110 +[4321 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 principal matched by identity 0 +[4322 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4324 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4323 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 2e 5d 5f 01 69 3b 83 25 71 a8 91 35 1e c2 7f |..]_.i;.%q..5...| +00000010 1c 5b f6 1a b8 2a 22 f3 6f d8 05 28 c1 95 9e 5a |.[...*".o..(...Z| +[4325 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 da 1b 61 14 be 37 c0 12 2f cc b2 |0D. 0..a..7../..| +00000010 39 66 1e 18 39 19 ed ad 44 02 51 66 6a c6 09 37 |9f..9...D.Qfj..7| +00000020 d9 a9 a6 e3 02 20 41 36 56 18 0b 4e 83 90 d7 dd |..... A6V..N....| +00000030 eb c5 67 42 bc 75 ae 58 55 79 f4 cd ae 33 80 dd |..gB.u.XUy...3..| +00000040 e2 02 0f e5 5b e4 |....[.| +[4326 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 principal evaluation succeeds for identity 0 +[4327 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004941db0 gate 1589998893650847300 evaluation succeeds +[4328 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4329 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[432a 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[432b 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[432c 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[432d 05-20 18:21:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[432e 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[432f 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4330 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4331 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4332 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4333 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4334 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4335 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4336 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4337 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4338 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4339 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[433a 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[433b 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[433c 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[433d 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[433e 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[433f 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4340 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4341 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4342 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4343 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4344 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4345 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4346 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4347 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4348 05-20 18:21:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4349 05-20 18:21:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[434a 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[434b 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[434c 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[434d 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[434e 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[434f 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4350 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4351 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4352 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4353 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4354 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4355 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4356 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 gate 1589998893887588700 evaluation starts +[4357 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 signed by 0 principal evaluation starts (used [false]) +[4358 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 processing identity 0 with bytes of 115a110 +[4359 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 principal matched by identity 0 +[435a 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 40 5e d8 c2 f2 23 07 a8 9e 95 1f e2 cc be 4f |r@^...#........O| +00000010 eb 2d 03 a9 44 50 df 1c 22 f9 bd 8e 2f 09 4f 0b |.-..DP..".../.O.| +[435b 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 ec 28 4d b9 67 61 5f 45 e3 c3 |0E.!...(M.ga_E..| +00000010 87 71 18 3f e3 14 d2 9c c2 16 e7 10 b3 46 1c 1a |.q.?.........F..| +00000020 27 a9 50 fc 0f 02 20 00 b1 c1 a8 fb 8f 39 28 e7 |'.P... ......9(.| +00000030 d5 a5 45 61 49 b5 ba 66 6d f5 b4 8f bf 86 20 d8 |..EaI..fm..... .| +00000040 97 55 fe 9a 6d 5d ce |.U..m].| +[435c 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 principal evaluation succeeds for identity 0 +[435d 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a4980 gate 1589998893887588700 evaluation succeeds +[435e 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[435f 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4360 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4361 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4362 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4363 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4364 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4365 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4366 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4367 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4368 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4369 05-20 18:21:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[436a 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[436b 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[436c 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[436d 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[436e 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[436f 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4370 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4371 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4372 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4374 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4373 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4375 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4376 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4377 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4378 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4379 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[437a 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[437b 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[437c 05-20 18:21:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[437d 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[437e 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[437f 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4380 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4381 05-20 18:21:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4382 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4383 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161039 +[4384 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1954A727ACC328B5799BB52EE8E5613F36D6D5193E0A9A31C1969D84CEBC0429 +[4385 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4386 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4387 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4388 05-20 18:21:34.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[4389 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[438a 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[438b 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[438c 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[438d 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[438e 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[438f 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4390 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4391 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4392 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4393 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4394 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4395 05-20 18:21:34.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4396 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4397 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[4398 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[4399 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[439a 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[439b 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 gate 1589998895222381800 evaluation starts +[439c 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 signed by 0 principal evaluation starts (used [false]) +[439d 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 processing identity 0 with bytes of 115a110 +[439e 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 principal matched by identity 0 +[439f 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 87 87 7f 13 5e f6 db 66 b0 b1 bd 66 9e 18 bc |.....^..f...f...| +00000010 13 91 ed 8a 3e 67 f7 03 4c ad 6d 05 df 46 a9 d9 |....>g..L.m..F..| +[43a0 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 e0 45 06 b2 29 ae 57 9a fc 76 4e |0D. s.E..).W..vN| +00000010 5c 64 0c b0 3c 09 f7 2a f4 bc e4 e5 89 75 c1 d1 |\d..<..*.....u..| +00000020 5e 26 5e 2f 02 20 2c 28 c9 85 45 c5 aa 13 24 53 |^&^/. ,(..E...$S| +00000030 60 fe 99 55 99 cc 33 f0 40 a6 78 f7 f7 58 04 a9 |`..U..3.@.x..X..| +00000040 f3 97 5b 74 de 1b |..[t..| +[43a1 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 principal evaluation succeeds for identity 0 +[43a2 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497b060 gate 1589998895222381800 evaluation succeeds +[43a3 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[43a4 05-20 18:21:35.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[43a5 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[43a6 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[43a7 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +[43a8 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +[43a9 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[43aa 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +[43ab 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +[43ac 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +[43ad 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +[43ae 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +[43af 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[43b0 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0049486c0 env 0xc004901b30 txn 0 +[43b1 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004901b30 +[43b2 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +[43b3 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[43b4 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[43b5 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[43b6 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43b7 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[43b8 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[43b9 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[43ba 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[43bb 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[43bc 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e1 49 49 4f 23 4c 66 ab 43 40 69 01 b9 28 34 2c |.IIO#Lf.C@i..(4,| +00000010 71 2d cf eb 11 06 d8 cc 15 14 32 60 e9 81 58 21 |q-........2`..X!| +[43bd 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 51 e2 c7 48 26 65 f8 8c 6e 5a 85 |0D. .Q..H&e..nZ.| +00000010 8a 41 ca a0 4b 9c 5c 82 d8 9b c8 b3 00 54 02 d4 |.A..K.\......T..| +00000020 81 5b 50 d2 02 20 01 14 a5 f1 ad ed ae d1 ee fd |.[P.. ..........| +00000030 6f ef 05 30 85 7c 16 66 26 77 a5 98 56 0f 7e 61 |o..0.|.f&w..V.~a| +00000040 43 ae 34 84 59 de |C.4.Y.| +[43be 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[43bf 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc004b1c000, header channel_header:"\010\001\032\006\010\257\352\225\366\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\2168\037\336\356|\0245[69\330HQ\010$C@<\005my\226\313" +[43c0 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[43c1 05-20 18:21:35.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +[43c2 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes to the block puller +[43c3 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +[43c4 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[43c5 05-20 18:21:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[43c6 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[43c7 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[43c8 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[43c9 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[43ca 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[43cb 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[43cc 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[43cd 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[43ce 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[43cf 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[43d1 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[43d0 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d2 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d3 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d4 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d5 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[43d6 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes to 1 peers +[43d7 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d8 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d9 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[43da 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +[43db 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41187 bytes, seq: 6}, Envelope: 41220 bytes, Signature: 0 bytes +[43dc 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43dd 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +[43de 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +[43df 05-20 18:21:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +[43e0 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +[43e1 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +[43e2 05-20 18:21:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[43e3 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[43e4 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[43e5 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[43e6 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[43e7 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[43e8 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[43e9 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +[43ea 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +[43eb 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +[43ec 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +[43ed 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +[43ee 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +[43ef 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +[43f0 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[43f1 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[43f2 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[43f3 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[43f4 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[43f5 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[43f6 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[43f7 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[43f8 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +[43f9 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[43fa 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +[43fb 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +[43fc 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 gate 1589998895291193100 evaluation starts +[43fd 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 signed by 0 principal evaluation starts (used [false false false]) +[43fe 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 processing identity 0 with bytes of 115a110 +[43ff 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[4400 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 processing identity 1 with bytes of 115a110 +[4401 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +[4402 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +[4403 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[4404 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[4405 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +[4406 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[4407 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 principal matched by identity 1 +[4408 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 f8 2c 33 34 dd af 42 07 ea d8 3e dd da da 8b |(.,34..B...>....| +00000010 06 bd 74 1c 8e 2a 9b 7c e2 e6 e3 fb 98 33 b4 ad |..t..*.|.....3..| +[4409 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 53 e0 06 52 ca 80 e9 1d 0d c8 |0E.!..S..R......| +00000010 28 d2 c4 a8 5b 97 59 33 77 32 e6 df 87 69 f5 cd |(...[.Y3w2...i..| +00000020 95 3d 31 fe cf 02 20 5a 3e d3 38 4d e1 aa dc 1f |.=1... Z>.8M....| +00000030 e0 99 9a 58 81 48 a7 d5 e2 46 93 82 15 88 c5 a7 |...X.H...F......| +00000040 72 24 fc be df 99 95 |r$.....| +[440a 05-20 18:21:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 principal evaluation succeeds for identity 1 +[440b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab88d0 gate 1589998895291193100 evaluation succeeds +[440c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +[440d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +[440e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +[440f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +[4410 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 gate 1589998895306708900 evaluation starts +[4411 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 signed by 0 principal evaluation starts (used [false false false]) +[4412 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 processing identity 0 with bytes of 115a110 +[4413 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 principal matched by identity 0 +[4414 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed 1b 2d 30 93 8f b5 ce a5 25 f1 4a 0f 24 36 16 |..-0.....%.J.$6.| +00000010 43 59 52 f6 30 f7 62 44 2b 40 be 46 83 fb 68 81 |CYR.0.bD+@.F..h.| +[4415 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 41 49 48 13 f1 22 62 6a d4 8c c8 |0D. \AIH.."bj...| +00000010 99 90 86 76 d7 ff 60 cc 90 64 3a 0b 4d 00 14 be |...v..`..d:.M...| +00000020 97 7f 24 33 02 20 59 8e ad 3f 57 a4 b9 c2 2e 97 |..$3. Y..?W.....| +00000030 46 80 f1 ff 44 f0 ba 1c e7 61 a4 b3 73 d6 d9 be |F...D....a..s...| +00000040 61 03 26 ae cc 43 |a.&..C| +[4416 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 principal evaluation succeeds for identity 0 +[4417 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab92c0 gate 1589998895306708900 evaluation succeeds +[4418 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +[4419 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +[441a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +[441b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +[441c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +[441d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +[441e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[441f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4420 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4421 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4422 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4423 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4424 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4425 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4426 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[4427 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4428 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[4429 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[442a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[442b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +[442c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +[442d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[442e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[442f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4430 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4431 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[4432 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4433 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4434 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4435 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4436 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4437 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[4438 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[4439 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[443a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[443b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[443c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[443d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[443e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[443f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4440 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4441 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4442 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4443 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4444 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +[4445 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +[4446 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4447 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4448 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +[4449 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- +[444a 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[444b 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[444c 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[444d 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[444e 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[444f 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[4450 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4451 05-20 18:21:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4452 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[4453 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[4454 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4455 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4456 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4457 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4458 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +[4459 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[445a 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[445b 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[445c 05-20 18:21:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[445d 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[445e 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[445f 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[4460 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[4461 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[4462 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[4463 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[4464 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4465 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[4466 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[4467 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4468 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4469 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[446a 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[446b 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[446c 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[446d 05-20 18:21:35.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[446e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +[446f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +[4470 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[4471 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[4472 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[4473 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[4474 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[4475 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[4476 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +[4477 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +[4478 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +[4479 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +[447a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[447b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[447c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[447d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[447e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[447f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[4480 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[4481 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[4482 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[4483 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[4484 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[4485 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[4486 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[4487 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[4488 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[4489 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[448a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[448b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[448c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[448d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[448e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[448f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[4490 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[4491 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[4492 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[4493 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[4494 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[4495 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[4496 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[4497 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[4498 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[4499 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[449a 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[449b 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +[449c 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +[449d 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +[449e 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +[449f 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +[44a0 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +[44a1 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[44a2 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[44a3 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[44a4 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[44a5 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[44a6 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[44a7 05-20 18:21:35.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[44a8 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[44a9 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[44aa 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[44ab 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[44ac 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[44ad 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[44ae 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[44af 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[44b0 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[44b1 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[44b2 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[44b3 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[44b4 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[44b5 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[44b6 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[44b7 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[44b8 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[44b9 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[44ba 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[44bb 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[44bc 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[44bd 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[44be 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[44bf 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[44c0 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[44c1 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[44c2 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[44c3 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[44c4 05-20 18:21:35.35 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[44c5 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[44c6 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[44c7 05-20 18:21:35.36 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +[44c8 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[44c9 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[44ca 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[44cb 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[44cc 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[44cd 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.375Z grpc.peer_address=172.18.0.5:34348 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=120.4µs +[44ce 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[44cf 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[44d0 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[44d1 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:34348 +[44d2 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34348 +[44d4 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44d5 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[44d3 05-20 18:21:35.37 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[44d7 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[44d6 05-20 18:21:35.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44d8 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[44d9 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[44da 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[44db 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[44dc 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[44de 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44dd 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[44df 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[44e1 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[44e2 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[44e3 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[44e4 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[44e5 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[44e6 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[44e0 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[44e7 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 gate 1589998895398067100 evaluation starts +[44e9 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 signed by 0 principal evaluation starts (used [false]) +[44e8 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[44ea 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[44ec 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +[44ed 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[44ee 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +[44ef 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[44f0 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[44f1 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[44f2 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[44f3 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[44f4 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[44f5 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.401Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=577.6µs +[44f6 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 gate 1589998895403264400 evaluation starts +[44f7 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 signed by 0 principal evaluation starts (used [false]) +[44f8 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 processing identity 0 with bytes of 115a110 +[44f9 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[44fa 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 principal evaluation fails +[44eb 05-20 18:21:35.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 processing identity 0 with bytes of 115a110 +[44fc 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 principal matched by identity 0 +[44fd 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[44fe 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc e8 90 f4 57 00 d9 e0 1b 08 5a |0E.!.....W.....Z| +00000010 23 42 af e5 0a 83 42 1a fe 37 73 aa 46 14 40 eb |#B....B..7s.F.@.| +00000020 c7 1e 93 66 a8 02 20 5a f5 91 e3 40 ba 06 a3 14 |...f.. Z...@....| +00000030 7c 11 74 80 06 7f 34 ab 57 cc 49 45 33 6b 49 8e ||.t...4.W.IE3kI.| +00000040 d7 04 1e 66 f3 b5 a9 |...f...| +[44ff 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 principal evaluation succeeds for identity 0 +[4500 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbdc20 gate 1589998895398067100 evaluation succeeds +[4501 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4502 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4503 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4504 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4505 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34348 +[4506 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34348 +[44fb 05-20 18:21:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cde850 gate 1589998895403264400 evaluation fails +[4507 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[4508 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4509 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[450a 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[450b 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[450c 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 gate 1589998895414067400 evaluation starts +[450e 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 signed by 0 principal evaluation starts (used [false]) +[450d 05-20 18:21:35.41 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[450f 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 processing identity 0 with bytes of 115a110 +[4510 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 principal matched by identity 0 +[4511 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[4512 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[4514 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4513 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 principal evaluation succeeds for identity 0 +[4515 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf0980 gate 1589998895414067400 evaluation succeeds +[4516 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[4517 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4518 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[451a 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[451b 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[451c 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[451d 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[451e 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[451f 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4520 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4521 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 gate 1589998895426137000 evaluation starts +[4522 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 signed by 0 principal evaluation starts (used [false]) +[4523 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 processing identity 0 with bytes of 115a110 +[4524 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 principal matched by identity 0 +[4525 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[4526 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[4527 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 principal evaluation succeeds for identity 0 +[4528 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cdf820 gate 1589998895426137000 evaluation succeeds +[4529 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[452a 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[452b 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[452c 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4519 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[452d 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[452e 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:34150 +[452f 05-20 18:21:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4530 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4531 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4533 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4532 05-20 18:21:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:34150 +[4535 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4536 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4534 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.442Z grpc.peer_address=172.18.0.8:58136 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.1µs +[4537 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4538 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 gate 1589998895444882600 evaluation starts +[4539 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 signed by 0 principal evaluation starts (used [false]) +[453a 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 processing identity 0 with bytes of 115a110 +[453b 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 principal matched by identity 0 +[453c 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[453d 05-20 18:21:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[453e 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[453f 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 principal evaluation succeeds for identity 0 +[4540 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf17d0 gate 1589998895444882600 evaluation succeeds +[4541 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4542 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4543 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4544 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4547 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4545 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[4546 05-20 18:21:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17654572624681692194 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[4548 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +[4549 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:17654572624681692194 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[454b 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[454c 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17654572624681692194 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes +[454d 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[454e 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[454f 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4550 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4551 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4552 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4553 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4554 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4555 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 gate 1589998895470006700 evaluation starts +[4556 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 signed by 0 principal evaluation starts (used [false]) +[454a 05-20 18:21:35.46 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[4557 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 processing identity 0 with bytes of 115a110 +[455c 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 principal matched by identity 0 +[455d 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +[455e 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +[455f 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 principal evaluation succeeds for identity 0 +[4558 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[4559 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[455a 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34348 disconnected +[455b 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[4560 05-20 18:21:35.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d50ea0 gate 1589998895470006700 evaluation succeeds +[4561 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +[4562 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.378Z grpc.peer_address=172.18.0.5:34348 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=104.7331ms +[4563 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[4564 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4565 05-20 18:21:35.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +[4566 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4567 05-20 18:21:35.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4568 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[456a 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[456b 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[456c 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[456d 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[456e 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[456f 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4570 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4571 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4572 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4573 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[4574 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4575 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4576 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4569 05-20 18:21:35.50 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +[4577 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[4578 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 17654572624681692194, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +[4579 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[457a 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17654572624681692194, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[457b 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[457c 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[457d 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[457e 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[457f 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[4580 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[4581 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d876c0, CONNECTING +[4582 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4583 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4584 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[4585 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[4586 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4587 05-20 18:21:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:58136 +[4588 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:58136 +[4589 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[458a 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[458b 05-20 18:21:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[458c 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[458d 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd a9 08 66 c5 36 b5 3b 9e f5 a4 |0E.!....f.6.;...| +00000010 3f c7 f0 4a 35 0f d9 0e 8d 8a 44 cc d4 ea 8d ab |?..J5.....D.....| +00000020 75 2c 62 a6 36 02 20 20 2e 77 e7 8a 70 71 47 5e |u,b.6. .w..pqG^| +00000030 80 c9 2f 49 9f a8 4a 15 98 79 19 fb b7 52 7c 10 |../I..J..y...R|.| +00000040 ef b5 a2 1e b9 57 82 |.....W.| +[458e 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:58136 +[458f 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:58136 +[4590 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4591 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4592 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4593 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4594 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4595 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4596 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4597 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 gate 1589998895535493100 evaluation starts +[4598 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 signed by 0 principal evaluation starts (used [false]) +[4599 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 processing identity 0 with bytes of 115a110 +[459a 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 principal matched by identity 0 +[459b 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[459c 05-20 18:21:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 7e f8 f7 38 97 4d 3c 2f e6 bb ae |0D. .~..8.M DEBU 0xc004e0e5c0 principal evaluation succeeds for identity 0 +[459e 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e5c0 gate 1589998895535493100 evaluation succeeds +[459f 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[45a0 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[45a1 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[45a2 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[45a3 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:34150 +[45a4 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:34150 +[45a5 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[45a6 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +[45a7 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[45a8 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[45a9 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[45aa 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:34150 disconnected +[45ab 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.422Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=123.7346ms +[45ac 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[45ad 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[45ae 05-20 18:21:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[45af 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[45b0 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[45b1 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-05-20T18:21:37.55Z grpc.peer_address=172.18.0.5:34358 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=314.5µs +[45b2 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b3 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b4 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[45b5 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[45b6 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[45b7 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[45b8 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +[45b9 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[45ba 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[45bb 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:58136 disconnected +[45bc 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-05-20T18:21:45.514Z grpc.peer_address=172.18.0.8:58136 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.7427ms +[45bd 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[45be 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[45bf 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[45c0 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[45c1 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[45c2 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +[45c3 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[45c4 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e88880, CONNECTING +[45c5 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[45c6 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[45c7 05-20 18:21:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[45c8 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[45c9 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[45cc 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[45cd 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d876c0, READY +[45cb 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[45ce 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e8cb20, CONNECTING +[45ca 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[45cf 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[45d0 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +[45d1 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[45d2 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e8ce00, CONNECTING +[45d3 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[45d4 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[45d5 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[45d6 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:34358 +[45d7 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:34358 +[45d8 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45d9 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[45da 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45db 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[45dc 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45dd 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[45de 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[45df 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[45e0 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[45e1 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[45e2 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[45e3 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 gate 1589998895569020200 evaluation starts +[45e4 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 signed by 0 principal evaluation starts (used [false]) +[45e5 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 processing identity 0 with bytes of 115a110 +[45e6 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 principal matched by identity 0 +[45e7 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[45e8 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 f7 29 0e 20 12 7b 7c a0 93 b3 |0E.!...). .{|...| +00000010 50 24 08 5d b1 09 e5 b7 d4 cb b0 35 3f 19 b4 d1 |P$.].......5?...| +00000020 44 33 eb 6b c2 02 20 5e 53 79 79 de a8 e7 36 38 |D3.k.. ^Syy...68| +00000030 0c 4a c9 14 7f 71 6c 5c 49 be 9b c0 10 8d c7 10 |.J...ql\I.......| +00000040 b5 2d 37 bf 46 c4 10 |.-7.F..| +[45e9 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 principal evaluation succeeds for identity 0 +[45ea 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f3ac70 gate 1589998895569020200 evaluation succeeds +[45eb 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[45ec 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[45ed 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[45ee 05-20 18:21:35.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[45ef 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:34358 +[45f0 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:34358 +[45f1 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[45f2 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0049486c0 env 0xc004901b30 txn 0 +[45f3 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[45f4 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 336ms +[45f5 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[45f6 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[45f7 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[45f8 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +[45f9 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[45fa 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[45fb 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[45fc 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +[45fd 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[45fe 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:34358 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:17781309580720699216 tag:EMPTY mem_req:\t\276\236\206\335\377\022\337\233\236Z\032\206 \230\314\263+\035\001\266_\3230\007\270\n\333\330]3" > > , Envelope: 176 bytes, Signature: 0 bytes +[45ff 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4600 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17781309580720699216 tag:EMPTY mem_req:\t\276\236\206\335\377\022\337\233\236Z\032\206 \230\314\263+\035\001\266_\3230\007\270\n\333\330]3" > > , Envelope: 176 bytes, Signature: 0 bytes +[4601 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4602 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4603 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4604 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- +[4605 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[4606 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[4607 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4608 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4609 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[460a 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[460b 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[460c 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[460d 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 gate 1589998895583052600 evaluation starts +[460e 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 signed by 0 principal evaluation starts (used [false]) +[460f 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 processing identity 0 with bytes of 115a110 +[4610 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4611 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 principal evaluation fails +[4612 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97960 gate 1589998895583052600 evaluation fails +[4613 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4614 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4615 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4616 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 gate 1589998895583830800 evaluation starts +[4617 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 signed by 0 principal evaluation starts (used [false]) +[4618 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 processing identity 0 with bytes of 115a110 +[4619 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[461a 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[461b 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[461c 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 principal matched by identity 0 +[461d 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ff d0 be 02 d5 d3 61 bf 0b 8a 9b 39 4c 44 9c |.......a....9LD.| +00000010 6a 4b 01 a2 b4 7d 05 8b 56 5d a2 7f 5a 5d f5 5b |jK...}..V]..Z].[| +[461e 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 2d b6 fc 61 be 82 8d 46 cb 12 29 |0D. +-..a...F..)| +00000010 27 dc 5b 1a df 0e 90 35 fd 07 ac 1a 79 07 83 b1 |'.[....5....y...| +00000020 9d fb 72 17 02 20 3e 09 be 9e 86 dd ff 12 df 9b |..r.. >.........| +00000030 9e 5a 1a 86 20 98 cc b3 2b 1d 01 b6 5f d3 30 07 |.Z.. ...+..._.0.| +00000040 b8 0a db d8 5d 33 |....]3| +[461f 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 principal evaluation succeeds for identity 0 +[4620 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f97ef0 gate 1589998895583830800 evaluation succeeds +[4621 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4623 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4624 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4625 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4626 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4627 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[4628 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[4629 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[462a 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:7051 +[462b 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[462c 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[462e 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e8cb20, READY +[4631 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +[4632 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[462d 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e88880, READY +[4633 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4634 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4635 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4636 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4637 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4638 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4639 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[463a 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[463b 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[463c 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[463d 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 gate 1589998895599956500 evaluation starts +[463e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 signed by 0 principal evaluation starts (used [false]) +[463f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 processing identity 0 with bytes of 115a110 +[4640 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4641 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 principal evaluation fails +[4642 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a400 gate 1589998895599956500 evaluation fails +[4643 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4644 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4645 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4646 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 gate 1589998895600772900 evaluation starts +[4647 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 signed by 0 principal evaluation starts (used [false]) +[4648 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 processing identity 0 with bytes of 115a110 +[4649 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 principal matched by identity 0 +[464a 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[464b 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 a0 b2 67 7a 45 fc 40 6c 44 f8 |0E.!....gzE.@lD.| +00000010 a5 3a ab ca 50 c3 4c 3f b6 08 d5 67 ed 67 9f 05 |.:..P.L?...g.g..| +00000020 ff 52 49 39 26 02 20 5a 9b 3e 54 15 b4 74 e1 e7 |.RI9&. Z.>T..t..| +00000030 63 a8 d5 93 56 94 c6 75 d0 7c ca 02 4e f0 3b 41 |c...V..u.|..N.;A| +00000040 90 96 7a 6e df b4 b0 |..zn...| +[464c 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 principal evaluation succeeds for identity 0 +[464d 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00506a970 gate 1589998895600772900 evaluation succeeds +[464e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[464f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4650 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4651 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4652 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +[4653 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4654 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[462f 05-20 18:21:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4630 05-20 18:21:35.57 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[4622 05-20 18:21:35.58 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004e8ce00, READY +[4655 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4656 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +[4657 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:34358 disconnected +[4658 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[4659 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[465a 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[465f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4660 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4661 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[4662 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4663 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4664 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4665 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4666 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- +[4667 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 17781309580720699216, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +[4668 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\t\276\236\206\335\377\022\337\233\236Z\032\206 \230\314\263+\035\001\266_\3230\007\270\n\333\330]3" > alive: alive: alive: +[4669 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17781309580720699216, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[465b 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[466a 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816103E +[466b 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC7A2CECA1002317405A900A42CE8C74A90063C1095F8994A53695ED62695F98 +[466c 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[466d 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[466e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4670 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[4671 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[4672 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +[466f 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4673 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4674 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4675 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[4676 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[4677 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:17748581153308284860 tag:EMPTY mem_req:" signature:"0E\002!\000\271\210\037e\224\346Lc\220\344/P==\313\222\252\234%\216G\006\217\367+\232\330_r\214\347\205\002 \036V,\256K\332\361\360\206\250\014\341\264\277^\253l\336Mei\313T\013K\1774(\220\004\342H" > > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +[4678 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:7051 +[4679 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:17748581153308284860 tag:EMPTY mem_req:" signature:"0E\002!\000\271\210\037e\224\346Lc\220\344/P==\313\222\252\234%\216G\006\217\367+\232\330_r\214\347\205\002 \036V,\256K\332\361\360\206\250\014\341\264\277^\253l\336Mei\313T\013K\1774(\220\004\342H" > > , Envelope: 177 bytes, Signature: 0 bytes +[465c 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:34358 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=39.0283ms +[467a 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[467b 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[467c 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[467d 05-20 18:21:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:7051 +[465d 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[465e 05-20 18:21:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[467e 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[467f 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[4680 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[4681 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[4682 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[4683 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[4684 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +[4685 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc005059240)} +[4686 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[4687 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[4688 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[4689 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +[468a 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +[468b 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +[468c 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.5:7051 +[468d 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[468e 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[468f 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4690 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4691 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4692 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4693 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4694 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4695 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4696 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4697 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4698 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 gate 1589998895628728900 evaluation starts +[4699 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 signed by 0 principal evaluation starts (used [false]) +[469a 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 processing identity 0 with bytes of 115a110 +[469b 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[469c 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 principal evaluation fails +[469d 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051742e0 gate 1589998895628728900 evaluation fails +[469e 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[469f 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[46a0 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[46a1 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 gate 1589998895628995700 evaluation starts +[46a2 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 signed by 0 principal evaluation starts (used [false]) +[46a3 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 processing identity 0 with bytes of 115a110 +[46a4 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 principal matched by identity 0 +[46a5 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[46a6 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 0e 1b 45 09 70 3a 55 5e 23 e2 b8 |0D. )..E.p:U^#..| +00000010 38 04 1a ed 49 fc 39 96 9f cd bc fb bf b5 27 ef |8...I.9.......'.| +00000020 0d cb ea 5c 02 20 38 ea 6a 80 01 19 87 90 92 19 |...\. 8.j.......| +00000030 53 5b 95 b6 30 5a b6 ea 2f ca 2f 21 3b 5c df a7 |S[..0Z.././!;\..| +00000040 10 f2 71 1c 45 cd |..q.E.| +[46a7 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 principal evaluation succeeds for identity 0 +[46a8 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005174850 gate 1589998895628995700 evaluation succeeds +[46a9 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[46aa 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[46ab 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[46ac 05-20 18:21:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[46ad 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +[46ae 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46af 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[46b0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46b1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +[46b2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46b3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +[46b4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[46b5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[46b6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[46b7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46b8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[46b9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46ba 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[46bb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[46bc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[46bd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[46be 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[46bf 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[46c0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 gate 1589998895631868900 evaluation starts +[46c1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 signed by 0 principal evaluation starts (used [false]) +[46c2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 processing identity 0 with bytes of 115a110 +[46c3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[46c4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 principal evaluation fails +[46c5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4c40 gate 1589998895631868900 evaluation fails +[46c6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[46c7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[46c8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[46c9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 gate 1589998895632326800 evaluation starts +[46ca 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 signed by 0 principal evaluation starts (used [false]) +[46cb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 processing identity 0 with bytes of 115a110 +[46cc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xd4, 0xd4, 0x5b, 0x4, 0x4e, 0x8a, 0x13, 0x2b, 0x2, 0xd9, 0x3, 0xc3, 0x1e, 0x8, 0xa3, 0x0, 0x38, 0xa2, 0x72, 0xe6, 0xd8, 0x7f, 0xf1, 0x5f, 0x4f, 0x51, 0x17, 0xe3, 0xb7, 0xa8, 0x82, 0xb3} txOffsets= +txId=987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2 locPointer=offset=71, bytesLength=40146 +] +[46cd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[46ce 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97620, bytesLength=40146] for tx ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to txid-index +[46cf 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[46d0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97620, bytesLength=40146] for tx number:[0] ID: [987e573d1ca0c3ee404c5f6e6801d8cd937db4ef22e60eb015ede9149285e4f2] to blockNumTranNum index +[46d1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[46d2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 principal matched by identity 0 +[46d3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[46d4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 f1 b6 4a 11 98 ca 33 5c 3a 35 7d |0D. g..J...3\:5}| +00000010 ca 5a 5c cb 66 fa d6 07 1b b1 27 b4 c8 df 52 8e |.Z\.f.....'...R.| +00000020 e7 df 74 1a 02 20 50 47 a8 63 2a 73 34 a1 b7 9f |..t.. PG.c*s4...| +00000030 f2 0b ec 64 9f 44 35 0d 92 e3 9c 4b 84 12 ad 38 |...d.D5....K...8| +00000040 fe 97 ec 49 c0 a0 |...I..| +[46d5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 principal evaluation succeeds for identity 0 +[46d6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b51d0 gate 1589998895632326800 evaluation succeeds +[46d7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[46d8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[46d9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[46da 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[46db 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +[46dc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46dd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[46de 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46df 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +[46e0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[46e1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 88 7c 60 3d 90 2f f9 01 fd 8a ec |0D. ..|`=./.....| +00000010 6b f1 6d 8b d4 fd f2 dd 10 05 90 54 b5 cf 03 ab |k.m........T....| +00000020 a7 44 1b cf 02 20 2a a3 a6 0f 9a ca 15 e2 13 66 |.D... *........f| +00000030 8f 4a 33 18 cb 9c e9 87 01 e1 07 cd 70 92 8b 16 |.J3.........p...| +00000040 18 7c a1 54 f9 d7 |.|.T..| +[46e2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138758], isChainEmpty=[false], lastBlockNumber=[6] +[46e3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +[46e4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46e5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[46e6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +[46e7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46e8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46e9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46ea 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[46eb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[46ec 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[46ed 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610141801 +[46ee 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 140BE8723098DEC3191257F331FA04654B962DB74E276C643B290641149C7A38 +[46ef 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[46f0 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +[46f1 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +[46f2 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[46f3 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[46f4 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[46f5 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[46f6 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[46f7 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[46f8 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +[46f9 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +[46fa 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +[46fb 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[46fc 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +[46fd 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +[46fe 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[46ff 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +[4700 05-20 18:21:35.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 61ms (state_validation=50ms block_and_pvtdata_commit=8ms state_commit=1ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +[4701 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4702 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8EB97EEBEEFB38816...08071A0C0A0565787030321203312E30 +[4703 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E9683A820B1F519226D3E1D84070E94AA5FBE2B2E03CBDC211CB2DB98C53A82 +[4704 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +[4705 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4706 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4707 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4708 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4709 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[470a 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[470b 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[470c 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[470d 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[470e 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[470f 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17748581153308284860, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[4710 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4711 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4712 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[4713 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[4714 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[4715 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[4716 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4717 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4718 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4719 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[471a 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[471b 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[471c 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[471d 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[471e 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 gate 1589998895648818500 evaluation starts +[471f 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 signed by 0 principal evaluation starts (used [false]) +[4720 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 processing identity 0 with bytes of 115a110 +[4721 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4722 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 principal evaluation fails +[4723 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005239b40 gate 1589998895648818500 evaluation fails +[4724 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4725 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4726 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4727 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 gate 1589998895649087800 evaluation starts +[4728 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 signed by 0 principal evaluation starts (used [false]) +[4729 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 processing identity 0 with bytes of 115a110 +[472a 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 principal matched by identity 0 +[472b 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[472c 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[472d 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 principal evaluation succeeds for identity 0 +[472e 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525c0b0 gate 1589998895649087800 evaluation succeeds +[472f 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4730 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4731 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4732 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4733 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4734 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4735 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4736 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4737 05-20 18:21:35.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4738 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4739 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[473a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[473b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[473c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[473d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 gate 1589998895653462500 evaluation starts +[473e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 signed by 0 principal evaluation starts (used [false]) +[473f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 processing identity 0 with bytes of 115a110 +[4740 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4741 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 principal evaluation fails +[4742 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d2b0 gate 1589998895653462500 evaluation fails +[4743 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4744 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4745 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4746 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 gate 1589998895654332700 evaluation starts +[4747 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 signed by 0 principal evaluation starts (used [false]) +[4748 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 processing identity 0 with bytes of 115a110 +[4749 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 principal matched by identity 0 +[474a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[474b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[474c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 principal evaluation succeeds for identity 0 +[474d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525d820 gate 1589998895654332700 evaluation succeeds +[474e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[474f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4750 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4751 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4752 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4753 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4754 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4755 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4756 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4757 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4758 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 gate 1589998895655441100 evaluation starts +[4759 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 signed by 0 principal evaluation starts (used [false]) +[475a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 processing identity 0 with bytes of 115a110 +[475b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[475c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 principal evaluation fails +[475d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a360 gate 1589998895655441100 evaluation fails +[475e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[475f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4760 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4761 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 gate 1589998895655844500 evaluation starts +[4762 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 signed by 0 principal evaluation starts (used [false]) +[4763 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 processing identity 0 with bytes of 115a110 +[4764 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 principal matched by identity 0 +[4765 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[4766 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[4767 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 principal evaluation succeeds for identity 0 +[4768 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527a8d0 gate 1589998895655844500 evaluation succeeds +[4769 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[476a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[476b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[476c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[476d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[476e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 17748581153308284860, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[476f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4770 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17748581153308284860, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[4771 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4772 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4773 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4774 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4775 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4776 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4777 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4778 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4779 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 gate 1589998895657366900 evaluation starts +[477a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 signed by 0 principal evaluation starts (used [false]) +[477b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 processing identity 0 with bytes of 115a110 +[477c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[477d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 principal evaluation fails +[477e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd5330 gate 1589998895657366900 evaluation fails +[477f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4780 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4781 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4782 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 gate 1589998895657666700 evaluation starts +[4783 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 signed by 0 principal evaluation starts (used [false]) +[4784 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 processing identity 0 with bytes of 115a110 +[4785 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 principal matched by identity 0 +[4786 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +[4787 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +[4788 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 principal evaluation succeeds for identity 0 +[4789 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd58a0 gate 1589998895657666700 evaluation succeeds +[478a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[478b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[478c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[478d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[478e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[478f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4790 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4791 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 7a 2c ec a1 00 23 17 40 5a 90 0a 42 ce 8c 74 |.z,...#.@Z..B..t| +00000010 a9 00 63 c1 09 5f 89 94 a5 36 95 ed 62 69 5f 98 |..c.._...6..bi_.| +[4792 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 88 1f 65 94 e6 4c 63 90 e4 2f |0E.!....e..Lc../| +00000010 50 3d 3d cb 92 aa 9c 25 8e 47 06 8f f7 2b 9a d8 |P==....%.G...+..| +00000020 5f 72 8c e7 85 02 20 1e 56 2c ae 4b da f1 f0 86 |_r.... .V,.K....| +00000030 a8 0c e1 b4 bf 5e ab 6c de 4d 65 69 cb 54 0b 4b |.....^.l.Mei.T.K| +00000040 7f 34 28 90 04 e2 48 |.4(...H| +[4793 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4794 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4795 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4796 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4797 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4798 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[4799 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[479a 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[479b 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[479c 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[479d 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[479e 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[479f 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[47a0 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[47a1 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[47a2 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 gate 1589998895659814800 evaluation starts +[47a3 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 signed by 0 principal evaluation starts (used [false]) +[47a4 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 processing identity 0 with bytes of 115a110 +[47a5 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[47a6 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 principal evaluation fails +[47a7 05-20 18:21:35.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a84f0 gate 1589998895659814800 evaluation fails +[47a8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[47a9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[47aa 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[47ab 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 gate 1589998895660159200 evaluation starts +[47ac 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 signed by 0 principal evaluation starts (used [false]) +[47ad 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 processing identity 0 with bytes of 115a110 +[47ae 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 principal matched by identity 0 +[47af 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 8a 1c fe 10 f2 9e e0 76 86 b7 10 be 83 ad e0 |&.......v.......| +00000010 7f 81 1b 4f 26 23 3b c2 cd 64 2c 72 e9 61 d2 28 |...O&#;..d,r.a.(| +[47b0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 98 62 e1 ca 28 ae 5f 94 e1 11 9d |0E.!..b..(._....| +00000010 11 a1 16 62 15 e9 59 90 a4 c5 f8 b9 d6 aa 68 b4 |...b..Y.......h.| +00000020 e1 f8 46 93 19 02 20 7a d1 75 03 b1 72 02 dd 2c |..F... z.u..r..,| +00000030 33 c8 1f f4 e4 06 50 3d 79 54 dd be 5d 89 4d 04 |3.....P=yT..].M.| +00000040 06 08 5c 29 da 83 b8 |..\)...| +[47b1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 principal evaluation succeeds for identity 0 +[47b2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a8a60 gate 1589998895660159200 evaluation succeeds +[47b3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[47b4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[47b5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[47b6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[47b7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47b8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47b9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[47ba 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[47bb 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[47bc 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[47bd 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[47be 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[47bf 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 gate 1589998895661226700 evaluation starts +[47c0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 signed by 0 principal evaluation starts (used [false]) +[47c1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 processing identity 0 with bytes of 115a110 +[47c2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[47c3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 principal evaluation fails +[47c4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052a9c60 gate 1589998895661226700 evaluation fails +[47c5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[47c6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[47c7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[47c8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 gate 1589998895661525800 evaluation starts +[47c9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 signed by 0 principal evaluation starts (used [false]) +[47ca 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 processing identity 0 with bytes of 115a110 +[47cb 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 principal matched by identity 0 +[47cc 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[47cd 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[47ce 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 principal evaluation succeeds for identity 0 +[47cf 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c01d0 gate 1589998895661525800 evaluation succeeds +[47d0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[47d1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[47d2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[47d3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[47d4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[47d5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[47d6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[47d7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[47d8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[47d9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[47da 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[47db 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47dc 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[47dd 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 gate 1589998895663307400 evaluation starts +[47de 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 signed by 0 principal evaluation starts (used [false]) +[47df 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 processing identity 0 with bytes of 115a110 +[47e0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[47e1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[47e2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[47e3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 principal matched by identity 0 +[47e4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[47e5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[47e6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 principal evaluation succeeds for identity 0 +[47e7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052c1350 gate 1589998895663307400 evaluation succeeds +[47e8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[47e9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[47ea 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[47eb 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[47ec 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47ed 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[47ee 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47ef 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 87 bd 74 dc 1c e2 e5 27 34 74 64 d8 2d b7 09 |...t....'4td.-..| +00000010 78 99 88 0e 93 71 03 c3 70 66 a9 4c b2 e3 c9 af |x....q..pf.L....| +[47f0 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 61 5c 62 6b bc 6e 85 de b2 e9 |0E.!..a\bk.n....| +00000010 3f e4 fb 50 b9 f7 d4 98 65 ee ca b4 2e 3b ae 7f |?..P....e....;..| +00000020 0b 79 af b9 cd 02 20 2e e3 4a 8a 6d 58 1e e3 2d |.y.... ..J.mX..-| +00000030 9a b1 08 d8 3e c9 28 0c 5b 08 c5 68 45 98 6c 16 |....>.(.[..hE.l.| +00000040 11 94 cc da c0 51 37 |.....Q7| +[47f1 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47f2 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47f3 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[47f4 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[47f5 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[47f6 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[47f7 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[47f8 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[47f9 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 gate 1589998895665520900 evaluation starts +[47fa 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 signed by 0 principal evaluation starts (used [false]) +[47fb 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 processing identity 0 with bytes of 115a110 +[47fc 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[47fd 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 principal evaluation fails +[47fe 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e19e0 gate 1589998895665520900 evaluation fails +[47ff 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4800 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4801 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4802 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 gate 1589998895665902200 evaluation starts +[4803 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 signed by 0 principal evaluation starts (used [false]) +[4804 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 processing identity 0 with bytes of 115a110 +[4805 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 principal matched by identity 0 +[4806 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 4e 4e 5c 7d e9 2f eb 0e bc 3f 27 a1 10 7c 7c |.NN\}./...?'..||| +00000010 87 42 9c 93 81 62 45 9c e1 b2 ef 67 7b 48 eb d3 |.B...bE....g{H..| +[4807 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 15 55 f9 4b ad 5e db c6 13 26 61 |0D. h.U.K.^...&a| +00000010 47 b2 9c d6 c5 e7 46 82 ac 1b 48 86 f0 35 9d c6 |G.....F...H..5..| +00000020 8e bc 99 f4 02 20 7c 14 63 3e 5f 23 22 16 1f 3a |..... |.c>_#"..:| +00000030 c7 06 21 cc 48 1a 1b 9d 9f bd 93 fa d0 21 39 58 |..!.H........!9X| +00000040 02 20 e5 4b b0 d8 |. .K..| +[4808 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 principal evaluation succeeds for identity 0 +[4809 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e1f50 gate 1589998895665902200 evaluation succeeds +[480a 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[480b 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[480c 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[480d 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[480e 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 4b c1 aa 61 cf c2 e1 d8 ca be b0 c0 a9 2d 68 |.K..a.........-h| +00000010 86 28 e6 92 ba 44 af 8d 66 d9 c4 64 a7 95 9a e9 |.(...D..f..d....| +[480f 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 52 c3 8a 5a 68 5b 43 62 a1 76 19 |0D. %R..Zh[Cb.v.| +00000010 22 9a 67 b4 bd 63 6d 1c 48 96 9c 34 5e f9 1d 70 |".g..cm.H..4^..p| +00000020 98 5f 3b 98 02 20 36 80 86 5c b5 ce b3 93 60 44 |._;.. 6..\....`D| +00000030 29 34 d5 67 b7 1d c3 e4 9f f5 f0 d3 4e 31 28 1a |)4.g........N1(.| +00000040 b2 b9 f9 6c 2a cd |...l*.| +[4810 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4811 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4812 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4813 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4814 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4815 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4816 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4817 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4818 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 gate 1589998895667800500 evaluation starts +[4819 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 signed by 0 principal evaluation starts (used [false]) +[481a 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 processing identity 0 with bytes of 115a110 +[481b 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[481c 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 principal evaluation fails +[481d 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fd840 gate 1589998895667800500 evaluation fails +[481e 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[481f 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4820 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4821 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 gate 1589998895668233000 evaluation starts +[4822 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 signed by 0 principal evaluation starts (used [false]) +[4823 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 processing identity 0 with bytes of 115a110 +[4824 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 principal matched by identity 0 +[4825 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[4826 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[4827 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 principal evaluation succeeds for identity 0 +[4828 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052fddb0 gate 1589998895668233000 evaluation succeeds +[4829 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[482a 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[482b 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[482c 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[482d 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[482e 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[482f 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4830 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4831 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4832 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4833 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 gate 1589998895669075700 evaluation starts +[4834 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 signed by 0 principal evaluation starts (used [false]) +[4835 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 processing identity 0 with bytes of 115a110 +[4836 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4837 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 principal evaluation fails +[4838 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053128f0 gate 1589998895669075700 evaluation fails +[4839 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[483a 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[483b 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[483c 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 gate 1589998895669845900 evaluation starts +[483d 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 signed by 0 principal evaluation starts (used [false]) +[483e 05-20 18:21:35.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 processing identity 0 with bytes of 115a110 +[483f 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 principal matched by identity 0 +[4840 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[4841 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[4842 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 principal evaluation succeeds for identity 0 +[4843 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005312e60 gate 1589998895669845900 evaluation succeeds +[4844 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4845 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4846 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4847 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4848 05-20 18:21:35.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4849 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[484a 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[484b 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[484c 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[484d 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[484e 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[484f 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4850 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4851 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4852 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4853 05-20 18:21:35.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4854 05-20 18:21:35.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4855 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4856 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4857 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4858 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4859 05-20 18:21:35.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[485a 05-20 18:21:35.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[485b 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[485c 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[485d 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[485e 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[485f 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[4860 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[4861 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[4862 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[4863 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4864 05-20 18:21:35.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4865 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4866 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4867 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4868 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4869 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[486a 05-20 18:21:36.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[486b 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[486c 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[486d 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[486e 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[486f 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4870 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4871 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4872 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4873 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4874 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 gate 1589998896099408700 evaluation starts +[4875 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 signed by 0 principal evaluation starts (used [false]) +[4876 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 processing identity 0 with bytes of 115a110 +[4877 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4878 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 principal evaluation fails +[4879 05-20 18:21:36.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364310 gate 1589998896099408700 evaluation fails +[487a 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[487b 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[487c 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[487d 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 gate 1589998896100427900 evaluation starts +[487e 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 signed by 0 principal evaluation starts (used [false]) +[487f 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 processing identity 0 with bytes of 115a110 +[4880 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 principal matched by identity 0 +[4881 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[4882 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[4883 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 principal evaluation succeeds for identity 0 +[4884 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005364880 gate 1589998896100427900 evaluation succeeds +[4885 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4886 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4887 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4888 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4889 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[488a 05-20 18:21:36.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[488b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[488c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[488d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[488e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[488f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4890 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4891 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4892 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4893 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4894 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 gate 1589998896153892400 evaluation starts +[4895 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 signed by 0 principal evaluation starts (used [false]) +[4896 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 processing identity 0 with bytes of 115a110 +[4897 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4898 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 principal evaluation fails +[4899 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005337a90 gate 1589998896153892400 evaluation fails +[489a 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[489b 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[489c 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[489d 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 gate 1589998896154946400 evaluation starts +[489e 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 signed by 0 principal evaluation starts (used [false]) +[489f 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 processing identity 0 with bytes of 115a110 +[48a0 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 principal matched by identity 0 +[48a1 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[48a2 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[48a3 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 principal evaluation succeeds for identity 0 +[48a4 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005388000 gate 1589998896154946400 evaluation succeeds +[48a5 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[48a6 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[48a7 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[48a8 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[48a9 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48aa 05-20 18:21:36.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ab 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[48ac 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[48ad 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48ae 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48af 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48b0 05-20 18:21:36.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48b1 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[48b2 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[48b3 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48b4 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[48b5 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[48b6 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[48b7 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[48b8 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[48b9 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[48ba 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 gate 1589998896398281500 evaluation starts +[48bb 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 signed by 0 principal evaluation starts (used [false]) +[48bc 05-20 18:21:36.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 processing identity 0 with bytes of 115a110 +[48bd 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[48be 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 principal evaluation fails +[48bf 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005365ca0 gate 1589998896398281500 evaluation fails +[48c0 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[48c1 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[48c2 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[48c3 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 gate 1589998896403419800 evaluation starts +[48c4 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 signed by 0 principal evaluation starts (used [false]) +[48c5 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 processing identity 0 with bytes of 115a110 +[48c6 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 principal matched by identity 0 +[48c7 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[48c8 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[48c9 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 principal evaluation succeeds for identity 0 +[48ca 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053a8210 gate 1589998896403419800 evaluation succeeds +[48cb 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[48cc 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[48cd 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[48ce 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[48cf 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48d0 05-20 18:21:36.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48d1 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[48d2 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[48d3 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[48d4 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[48d5 05-20 18:21:36.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48d6 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[48d7 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[48d8 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[48d9 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[48da 05-20 18:21:36.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48db 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[48dc 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[48dd 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48de 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[48df 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[48e0 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +[48e1 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +00000040 e0 0a 77 e4 aa d8 81 |..w....| +[48e2 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[48e3 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 43 36 2c 59 3f 58 4a bf 2e 0b |0E.!..C6,Y?XJ...| +00000010 fb 6b 5d ff 01 89 c6 8d f7 0e 34 c0 a2 61 84 57 |.k].......4..a.W| +00000020 ab ee 94 55 c9 02 20 71 55 8b 1b 85 02 4c 85 97 |...U.. qU....L..| +00000030 fc f1 27 9d 99 58 08 0a 6a 86 8e 4c 50 5d 95 6c |..'..X..j..LP].l| +00000040 9b 22 85 47 6f 16 01 |.".Go..| +[48e4 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[48e5 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[48e6 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[48e7 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[48e8 05-20 18:21:36.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[48e9 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ea 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48eb 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ec 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[48ed 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48ee 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48ef 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[48f0 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[48f1 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[48f2 05-20 18:21:36.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48f3 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[48f4 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[48f5 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[48f6 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48f7 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48f8 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48f9 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48fa 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48fb 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48fc 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[48fd 05-20 18:21:36.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48fe 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[48ff 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4900 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4901 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4902 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4903 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4904 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4905 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4906 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4907 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4908 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4909 05-20 18:21:36.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[490a 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[490b 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[490c 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[490d 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[490e 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[490f 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4911 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4910 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4912 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4913 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4914 05-20 18:21:36.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4915 05-20 18:21:36.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4916 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4917 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4918 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4919 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[491a 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[491b 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[491c 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[491d 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[491e 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[491f 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4920 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4921 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4922 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 gate 1589998896927730000 evaluation starts +[4923 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 signed by 0 principal evaluation starts (used [false]) +[4924 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 processing identity 0 with bytes of 115a110 +[4925 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4926 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 principal evaluation fails +[4927 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053c9d50 gate 1589998896927730000 evaluation fails +[4928 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4929 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[492a 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[492b 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 gate 1589998896929391800 evaluation starts +[492c 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 signed by 0 principal evaluation starts (used [false]) +[492d 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 processing identity 0 with bytes of 115a110 +[492e 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 principal matched by identity 0 +[492f 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +[4930 05-20 18:21:36.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +00000040 f9 97 be 8e a5 7e 4d |.....~M| +[4931 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 principal evaluation succeeds for identity 0 +[4932 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054022c0 gate 1589998896929391800 evaluation succeeds +[4933 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4934 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4935 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4936 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4937 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4938 05-20 18:21:36.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4939 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[493a 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[493b 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[493c 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[493d 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[493e 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[493f 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[4940 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4941 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4942 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4943 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[4944 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4945 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4946 05-20 18:21:36.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[4947 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4948 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB38816103F +[4949 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA63AEC70BC1C77F267A85D52C48ED1C76C7A86F8CCC8F2BE13CA4D9597DF835 +[494a 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[494b 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[494c 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[494d 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364.\033B&" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[494e 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[494f 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4950 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4951 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4952 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes +[4953 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4954 05-20 18:21:37.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364.\033B&" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[4956 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4955 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364.\033B&" > > , Envelope: 165 bytes, Signature: 0 bytes +[4957 05-20 18:21:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4958 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4959 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[495a 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[495b 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[495c 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[495d 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[495e 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[495f 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4960 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4961 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4962 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4963 05-20 18:21:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4964 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 gate 1589998897031889800 evaluation starts +[4965 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 signed by 0 principal evaluation starts (used [false]) +[4966 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 processing identity 0 with bytes of 115a110 +[4967 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4968 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 principal evaluation fails +[4969 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005438330 gate 1589998897031889800 evaluation fails +[496a 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[496b 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[496c 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[496d 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 gate 1589998897035440500 evaluation starts +[496e 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 signed by 0 principal evaluation starts (used [false]) +[496f 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 processing identity 0 with bytes of 115a110 +[4970 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 principal matched by identity 0 +[4971 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 3c 07 f6 27 a6 d3 7b 0a 6b 81 3b 33 35 63 be |.<..'..{.k.;35c.| +00000010 49 4c 72 45 cb aa bd 8e f6 a9 48 4b c0 4c 4c 3c |ILrE......HK.LL<| +[4972 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e f9 69 33 4f ab 54 42 5f c5 35 |0E.!...i3O.TB_.5| +00000010 57 13 bf 67 46 29 98 61 9f 28 2b a9 f3 5f 88 2a |W..gF).a.(+.._.*| +00000020 44 5d 5d 6c c2 02 20 55 7c 1c a4 ad ff 26 52 bc |D]]l.. U|....&R.| +00000030 c3 e5 c2 68 ec e3 53 15 08 2f c2 3d 98 dd 77 00 |...h..S../.=..w.| +00000040 f9 97 be 8e a5 7e 4d |.....~M| +[4973 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 principal evaluation succeeds for identity 0 +[4974 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054388a0 gate 1589998897035440500 evaluation succeeds +[4975 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4976 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4977 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4978 05-20 18:21:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4979 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[497a 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[497b 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[497c 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +[497d 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +00000040 3e f4 2e 1b 42 26 |>...B&| +[497e 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[4981 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[497f 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4982 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4980 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4983 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4984 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4985 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +[4986 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +00000040 e0 0a 77 e4 aa d8 81 |..w....| +[4987 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4988 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4989 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[498a 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[498b 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[498c 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[498e 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +[498f 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +00000040 3e f4 2e 1b 42 26 |>...B&| +[4990 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[4991 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 5b 71 c9 07 f3 23 81 a7 2b 11 b2 |0D. .[q...#..+..| +00000010 dc 11 ac f2 1b 4c c6 59 9e f3 ec c9 5a a5 df 52 |.....L.Y....Z..R| +00000020 4c ae 3c 45 02 20 21 8f 82 7c f7 d4 e4 c4 2a 03 |L. DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4992 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4993 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4994 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4995 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4996 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4997 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4998 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4999 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[499a 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[499b 05-20 18:21:37.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[499c 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[499d 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[499e 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[499f 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[49a0 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 gate 1589998897050919800 evaluation starts +[49a1 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 signed by 0 principal evaluation starts (used [false]) +[49a2 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 processing identity 0 with bytes of 115a110 +[49a3 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[49a4 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 principal evaluation fails +[49a5 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054720c0 gate 1589998897050919800 evaluation fails +[49a6 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[49a7 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[49a8 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[49a9 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 gate 1589998897053259800 evaluation starts +[49aa 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 signed by 0 principal evaluation starts (used [false]) +[49ab 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 processing identity 0 with bytes of 115a110 +[49ac 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 principal matched by identity 0 +[49ad 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 80 bc 9c d3 e1 c7 ce 87 bc eb 99 00 fa 86 1c |................| +00000010 58 7c b0 8b f3 6e 4e ba e9 09 4d a0 2b 35 b2 8c |X|...nN...M.+5..| +[49ae 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 61 6e 43 2b 2e 8d 81 51 9c 8d |0E.!..anC+...Q..| +00000010 85 3d 54 35 01 17 b5 ca 52 c7 3f 9d a7 0e d6 9c |.=T5....R.?.....| +00000020 b6 bc bb 0e 98 02 20 75 28 93 8b 35 fd 6a a3 fc |...... u(..5.j..| +00000030 54 e1 44 20 03 77 f9 fd ba c9 c2 a2 32 9a 15 04 |T.D .w......2...| +00000040 b8 38 ca 27 73 70 bc |.8.'sp.| +[49af 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 principal evaluation succeeds for identity 0 +[49b0 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005472630 gate 1589998897053259800 evaluation succeeds +[49b1 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[49b2 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[49b3 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[49b4 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[49b5 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[49b6 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49b7 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[49b8 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 b1 ea cc 31 4b a1 84 f6 a0 74 f9 23 c0 4e c0 |....1K....t.#.N.| +00000010 a7 ae 57 23 c0 00 1f 62 ee c4 eb dc 34 00 a5 b3 |..W#...b....4...| +[49b9 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 03 2b 0a ae 6e 84 8d bc 51 3b |0E.!...+..n...Q;| +00000010 19 91 f7 d7 d5 a1 c5 0d e1 8a 48 d5 e2 11 3f 14 |..........H...?.| +00000020 e1 cf 21 13 51 02 20 03 70 e6 a3 0b 02 df 44 30 |..!.Q. .p.....D0| +00000030 5e 32 37 19 78 05 06 35 5d 63 f4 47 0d da 65 da |^27.x..5]c.G..e.| +00000040 e0 0a 77 e4 aa d8 81 |..w....| +[49ba 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[49bb 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49bc 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[49bd 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 63 ae c7 0b c1 c7 7f 26 7a 85 d5 2c 48 ed 1c |.c......&z..,H..| +00000010 76 c7 a8 6f 8c cc 8f 2b e1 3c a4 d9 59 7d f8 35 |v..o...+.<..Y}.5| +[49be 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 15 12 6e b4 d0 68 53 84 43 34 25 |0D. y..n..hS.C4%| +00000010 80 aa 22 6e 7b 24 20 b6 ae f1 10 15 c1 b5 bd 75 |.."n{$ ........u| +00000020 f8 a6 38 c4 02 20 53 82 d4 af 20 5c 73 ec 04 9d |..8.. S... \s...| +00000030 1b 2b 45 20 87 5f dd 4c 5e a2 f8 4e 32 d0 1a 54 |.+E ._.L^..N2..T| +00000040 3e f4 2e 1b 42 26 |>...B&| +[49bf 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[49c0 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[49c1 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49c2 05-20 18:21:37.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49c3 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[49c4 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[49c5 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[49c6 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49c7 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49c8 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49c9 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49ca 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49cb 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49cc 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[49cd 05-20 18:21:37.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49ce 05-20 18:21:37.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[49cf 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[49d0 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49d1 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[49d2 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[49d3 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49d4 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[49d5 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[49d6 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[49d7 05-20 18:21:37.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[49d8 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[49d9 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[49da 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 gate 1589998897211196200 evaluation starts +[49db 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 signed by 0 principal evaluation starts (used [false]) +[49dc 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 processing identity 0 with bytes of 115a110 +[49dd 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[49de 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 principal evaluation fails +[49df 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6590 gate 1589998897211196200 evaluation fails +[49e0 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[49e1 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[49e2 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[49e3 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 gate 1589998897212736700 evaluation starts +[49e4 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 signed by 0 principal evaluation starts (used [false]) +[49e5 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 processing identity 0 with bytes of 115a110 +[49e6 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 principal matched by identity 0 +[49e7 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 11 3f d7 a4 00 f7 4e 9d cb af d7 2f c5 f6 25 |..?....N..../..%| +00000010 71 2b c5 89 c1 36 c3 82 83 b7 2a 73 6f 30 42 92 |q+...6....*so0B.| +[49e8 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 fc 7c ce 9e 88 61 08 c3 5d ce |0E.!...|...a..].| +00000010 26 19 a5 e3 4e e9 73 09 8a d5 6e 0c 40 76 d0 6c |&...N.s...n.@v.l| +00000020 2b fd b8 c5 c3 02 20 27 09 ea e2 44 a2 e8 55 5a |+..... '...D..UZ| +00000030 e1 29 e0 aa 3d bf eb b8 9a 06 bf aa 2a de 1e ec |.)..=.......*...| +00000040 a1 18 53 1f 04 82 f0 |..S....| +[49e9 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 principal evaluation succeeds for identity 0 +[49ea 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054a6b00 gate 1589998897212736700 evaluation succeeds +[49eb 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[49ec 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[49ed 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[49ee 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[49ef 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[49f0 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[49f1 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[49f2 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[49f3 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[49f4 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49f5 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49f6 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49f7 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[49f8 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49f9 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49fa 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49fb 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[49fc 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[49fd 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[49fe 05-20 18:21:37.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49ff 05-20 18:21:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a00 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a01 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a02 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a03 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4a04 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 82 51 e7 cf 80 b5 56 b9 3f d3 c0 21 8d 63 fe |..Q....V.?..!.c.| +00000010 ff 95 75 d0 7b 64 8d 53 28 22 d8 43 c2 aa 00 8f |..u.{d.S(".C....| +[4a05 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 b2 c5 04 0c 4f dc 56 0c bc 68 |0E.!......O.V..h| +00000010 e2 d2 89 56 cb 33 e7 aa a4 7d 85 b2 ce 03 fc fd |...V.3...}......| +00000020 b2 9b fb b1 e5 02 20 26 1e 92 c1 a0 4e d2 4b f5 |...... &....N.K.| +00000030 7a 10 59 3e 14 33 ba e6 57 56 65 50 04 a1 c4 2e |z.Y>.3..WVeP....| +00000040 19 ba 80 f9 b6 25 dc |.....%.| +[4a06 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a07 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4a08 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4a09 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4a0a 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[4a0b 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a0c 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a0d 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a0e 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a0f 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a10 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a11 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a12 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a13 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a14 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a15 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a16 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a17 05-20 18:21:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a18 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a19 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a1a 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a1b 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a1c 05-20 18:21:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a1d 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a1e 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a1f 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a20 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a21 05-20 18:21:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a22 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a23 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a24 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a25 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a26 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4a27 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a28 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4a29 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4a2a 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4a2b 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4a2c 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4a2d 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4a2e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 gate 1589998898651819500 evaluation starts +[4a2f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 signed by 0 principal evaluation starts (used [false]) +[4a30 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 processing identity 0 with bytes of 115a110 +[4a31 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4a32 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 principal evaluation fails +[4a33 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f2d30 gate 1589998898651819500 evaluation fails +[4a34 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4a35 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4a36 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4a37 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 gate 1589998898652064800 evaluation starts +[4a38 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 signed by 0 principal evaluation starts (used [false]) +[4a39 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 processing identity 0 with bytes of 115a110 +[4a3a 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 principal matched by identity 0 +[4a3b 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 09 99 50 89 ca 76 a5 96 7b d2 84 6e 28 36 95 |9..P..v..{..n(6.| +00000010 97 b8 5f ac 2f 19 53 1d ce c6 55 32 15 45 6b 53 |.._./.S...U2.EkS| +[4a3c 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 eb 65 95 8e ae 99 55 73 35 65 |0E.!...e....Us5e| +00000010 84 6b fa 18 b7 70 05 e9 52 fb 9e 58 d2 72 a5 9d |.k...p..R..X.r..| +00000020 f0 65 75 9d d6 02 20 09 0f a7 3e 2e f1 c8 80 d7 |.eu... ...>.....| +00000030 f4 86 a1 27 58 c9 ef 02 b9 11 c5 69 84 27 38 72 |...'X......i.'8r| +00000040 66 17 8e c2 0a ea 8a |f......| +[4a3d 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 principal evaluation succeeds for identity 0 +[4a3e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054f32a0 gate 1589998898652064800 evaluation succeeds +[4a3f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4a40 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4a41 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4a42 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4a43 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a44 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4a45 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4a46 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4a47 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4a48 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a49 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a4a 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a4b 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a4c 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a4d 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a4e 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a4f 05-20 18:21:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a50 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a51 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a52 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a53 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a54 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a55 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a56 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a57 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a58 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a59 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a5a 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a5b 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a5c 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a5d 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a5e 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a5f 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a60 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a61 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a62 05-20 18:21:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a63 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a64 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a65 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a67 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4a66 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a68 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a69 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4a6a 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4a6b 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4a6c 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4a6d 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4a6e 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4a6f 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 gate 1589998898896281500 evaluation starts +[4a70 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 signed by 0 principal evaluation starts (used [false]) +[4a71 05-20 18:21:38.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 processing identity 0 with bytes of 115a110 +[4a72 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4a73 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 principal evaluation fails +[4a74 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e9de0 gate 1589998898896281500 evaluation fails +[4a75 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4a76 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4a77 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4a78 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 gate 1589998898906152500 evaluation starts +[4a79 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 signed by 0 principal evaluation starts (used [false]) +[4a7a 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 processing identity 0 with bytes of 115a110 +[4a7b 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 principal matched by identity 0 +[4a7c 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 26 a8 89 be 83 3f 9b fe bf 72 c9 ef ff 7c 93 |.&....?...r...|.| +00000010 67 5c 9c ae a9 c4 ab 34 9e a4 f7 94 c8 83 98 05 |g\.....4........| +[4a7d 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 cb ec 37 a8 5c 24 78 2c e4 f5 |0E.!....7.\$x,..| +00000010 ce 50 b4 f7 d1 6c 0d d6 51 67 20 fb a1 76 75 3e |.P...l..Qg ..vu>| +00000020 ad 42 a9 9f 7e 02 20 75 fa e6 bf cb 3e 60 4e 42 |.B..~. u....>`NB| +00000030 88 a2 b2 4f e8 f2 9d aa ec 98 89 92 45 b9 cb 8c |...O........E...| +00000040 4e 65 8a 37 a0 53 57 |Ne.7.SW| +[4a7e 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 principal evaluation succeeds for identity 0 +[4a7f 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005530350 gate 1589998898906152500 evaluation succeeds +[4a80 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4a81 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4a82 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4a83 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4a84 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a85 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4a86 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4a87 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4a88 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4a89 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a8a 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a8b 05-20 18:21:38.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a8c 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a8d 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a8e 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a8f 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a90 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a91 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a92 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a93 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a94 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a95 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a96 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a97 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a98 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a99 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a9a 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a9b 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a9c 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a9d 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a9e 05-20 18:21:38.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a9f 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4aa0 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4aa1 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4aa2 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4aa3 05-20 18:21:38.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4aa4 05-20 18:21:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4aa5 05-20 18:21:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161040 +[4aa6 05-20 18:21:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DDE8334407C3E865BEA189EFB8784C67AB5E8A6A5D266ACF85BC60F757CAAD7E +[4aa7 05-20 18:21:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4aa8 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4aa9 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4aaa 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[4aab 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4aac 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4aad 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[4aae 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4aaf 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4ab0 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ab2 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ab1 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ab3 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ab4 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4ab5 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ab6 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ab7 05-20 18:21:39.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ab8 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ab9 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4aba 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4abb 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4abc 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd e8 33 44 07 c3 e8 65 be a1 89 ef b8 78 4c 67 |..3D...e.....xLg| +00000010 ab 5e 8a 6a 5d 26 6a cf 85 bc 60 f7 57 ca ad 7e |.^.j]&j...`.W..~| +[4abd 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 45 15 f2 f6 45 a4 92 3a b9 a1 2a |0D. .E...E..:..*| +00000010 aa 13 89 d2 6d a3 50 fc 08 17 a1 dc 3d bb 3f 73 |....m.P.....=.?s| +00000020 ed 38 7b 9b 02 20 0c ec 28 8a b9 95 56 58 d4 95 |.8{.. ..(...VX..| +00000030 c0 4c 6b a9 18 33 38 7f 30 70 f8 6a b6 ac 75 d0 |.Lk..38.0p.j..u.| +00000040 41 1f d0 af da c2 |A.....| +[4abe 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4abf 05-20 18:21:39.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ac0 05-20 18:21:39.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ac1 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac2 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac3 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[4ac4 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4ac5 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ac6 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4ac7 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ac8 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4ac9 05-20 18:21:39.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4aca 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4acd 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4ace 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4acf 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ad0 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ad1 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4ad2 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4ad3 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4ad4 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4ad5 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4ad6 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4ad7 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 gate 1589998899547751900 evaluation starts +[4ad8 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 signed by 0 principal evaluation starts (used [false]) +[4ad9 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 processing identity 0 with bytes of 115a110 +[4ada 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4adb 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 principal evaluation fails +[4adc 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005578d80 gate 1589998899547751900 evaluation fails +[4add 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4acb 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4acc 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4ade 05-20 18:21:39.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4adf 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4ae0 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 gate 1589998899550529800 evaluation starts +[4ae1 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ae3 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ae4 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +[4ae5 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ae6 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ae7 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[4ae8 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ae2 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 signed by 0 principal evaluation starts (used [false]) +[4ae9 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 processing identity 0 with bytes of 115a110 +[4aea 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 principal matched by identity 0 +[4aeb 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[4aec 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[4aed 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 principal evaluation succeeds for identity 0 +[4aee 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055792f0 gate 1589998899550529800 evaluation succeeds +[4aef 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4af0 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4af1 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4af2 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4af3 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[4af4 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[4af5 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[4af6 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[4af7 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[4af8 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4af9 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[4afa 05-20 18:21:39.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4afb 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4afc 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4afd 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4afe 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4aff 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4b00 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4b01 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4b02 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4b03 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 gate 1589998899563914600 evaluation starts +[4b04 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 signed by 0 principal evaluation starts (used [false]) +[4b05 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 processing identity 0 with bytes of 115a110 +[4b06 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4b07 05-20 18:21:39.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 principal evaluation fails +[4b08 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055acc30 gate 1589998899563914600 evaluation fails +[4b09 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4b0a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4b0b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4b0c 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 gate 1589998899570554500 evaluation starts +[4b0d 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 signed by 0 principal evaluation starts (used [false]) +[4b0e 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 processing identity 0 with bytes of 115a110 +[4b0f 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 principal matched by identity 0 +[4b10 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[4b11 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[4b12 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 principal evaluation succeeds for identity 0 +[4b13 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055ad1a0 gate 1589998899570554500 evaluation succeeds +[4b14 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4b15 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4b16 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4b17 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4b18 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4b19 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4b1a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b1b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b1c 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b1d 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4b1e 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4b1f 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4b20 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4b21 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4b22 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4b23 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 gate 1589998899574039900 evaluation starts +[4b24 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 signed by 0 principal evaluation starts (used [false]) +[4b25 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 processing identity 0 with bytes of 115a110 +[4b26 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4b27 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 principal evaluation fails +[4b28 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c65f0 gate 1589998899574039900 evaluation fails +[4b29 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4b2a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4b2b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4b2c 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 gate 1589998899574918000 evaluation starts +[4b2d 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 signed by 0 principal evaluation starts (used [false]) +[4b2e 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 processing identity 0 with bytes of 115a110 +[4b2f 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 principal matched by identity 0 +[4b30 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[4b31 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[4b32 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 principal evaluation succeeds for identity 0 +[4b33 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055c6b60 gate 1589998899574918000 evaluation succeeds +[4b34 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4b35 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4b36 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4b37 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4b38 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[4b39 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[4b3a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b3b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b3c 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4b3d 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4b3e 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4b3f 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4b40 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4b41 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4b42 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 gate 1589998899579278100 evaluation starts +[4b43 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 signed by 0 principal evaluation starts (used [false]) +[4b44 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 processing identity 0 with bytes of 115a110 +[4b45 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4b46 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 principal evaluation fails +[4b47 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4450 gate 1589998899579278100 evaluation fails +[4b48 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4b49 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4b4a 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4b4b 05-20 18:21:39.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 gate 1589998899579955800 evaluation starts +[4b4c 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 signed by 0 principal evaluation starts (used [false]) +[4b4d 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 processing identity 0 with bytes of 115a110 +[4b4e 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 principal matched by identity 0 +[4b4f 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[4b50 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[4b51 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 principal evaluation succeeds for identity 0 +[4b52 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e49c0 gate 1589998899579955800 evaluation succeeds +[4b53 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4b54 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4b55 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4b56 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4b57 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[4b58 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[4b59 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4b5a 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4b5b 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[4b5c 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[4b5d 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b5e 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b5f 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4b60 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4b61 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4b62 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4b63 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4b64 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4b65 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 gate 1589998899584150200 evaluation starts +[4b66 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 signed by 0 principal evaluation starts (used [false]) +[4b67 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 processing identity 0 with bytes of 115a110 +[4b68 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4b69 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 principal evaluation fails +[4b6a 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005604b40 gate 1589998899584150200 evaluation fails +[4b6b 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4b6c 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4b6d 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4b6e 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 gate 1589998899585428900 evaluation starts +[4b6f 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 signed by 0 principal evaluation starts (used [false]) +[4b70 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 processing identity 0 with bytes of 115a110 +[4b71 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 principal matched by identity 0 +[4b72 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[4b73 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[4b74 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 principal evaluation succeeds for identity 0 +[4b75 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056050b0 gate 1589998899585428900 evaluation succeeds +[4b76 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4b77 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4b78 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4b79 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4b7a 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[4b7b 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[4b7c 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b7d 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b7e 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4b7f 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4b80 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4b81 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4b82 05-20 18:21:39.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4b83 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4b84 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 gate 1589998899590487400 evaluation starts +[4b85 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 signed by 0 principal evaluation starts (used [false]) +[4b86 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 processing identity 0 with bytes of 115a110 +[4b87 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4b88 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 principal evaluation fails +[4b89 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561e9a0 gate 1589998899590487400 evaluation fails +[4b8a 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4b8b 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4b8c 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4b8d 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 gate 1589998899590814500 evaluation starts +[4b8e 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 signed by 0 principal evaluation starts (used [false]) +[4b8f 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 processing identity 0 with bytes of 115a110 +[4b90 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 principal matched by identity 0 +[4b91 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[4b92 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[4b93 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 principal evaluation succeeds for identity 0 +[4b94 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00561ef10 gate 1589998899590814500 evaluation succeeds +[4b95 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4b96 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4b97 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4b98 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4b99 05-20 18:21:39.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4b9a 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b9b 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b9c 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[4b9d 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b9e 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b9f 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[4ba0 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4ba1 05-20 18:21:39.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ba2 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4ba3 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4ba4 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4ba5 05-20 18:21:39.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ba6 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4ba7 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4ba8 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ba9 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4baa 05-20 18:21:39.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bab 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4bac 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4bad 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bae 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4baf 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bb0 05-20 18:21:40.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bb1 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4bb2 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4bb3 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bb4 05-20 18:21:40.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bb5 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bb6 05-20 18:21:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bb7 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4bb8 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4bb9 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4bba 05-20 18:21:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[4bbb 05-20 18:21:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bbc 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4bbd 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4bbe 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4bbf 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[4bc0 05-20 18:21:40.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bc1 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[4bc2 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[4bc3 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bc4 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[4bc5 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4bc6 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +00000040 e9 13 35 86 49 a6 94 |..5.I..| +[4bc8 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[4bc9 05-20 18:21:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 53 2a bc 7f 21 c4 d9 ff 88 46 |0E.!..S*..!....F| +00000010 dc 07 62 94 05 3f 03 90 11 6d 38 b7 4c 55 1b d4 |..b..?...m8.LU..| +00000020 db c0 81 88 5d 02 20 63 83 84 14 eb ad ba 54 dc |....]. c......T.| +00000030 31 f6 cd 62 4e 2d c3 b4 b1 b3 01 25 6e 6a 5c b8 |1..bN-.....%nj\.| +00000040 11 13 c5 1b ac e7 6b |......k| +[4bca 05-20 18:21:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[4bcb 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[4bcc 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4bcd 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4bce 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4bcf 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bd0 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bd1 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bd2 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[4bd3 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bd4 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bd5 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[4bd6 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[4bd7 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4bd8 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bd9 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[4bda 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[4bdb 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4bdc 05-20 18:21:40.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610151801 +[4bdd 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3F2118770F38C75CB337F7EA62340C7357B738B165264A29C1E16F69C6243A71 +[4bde 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[4bdf 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4be0 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4be1 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4be2 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4be3 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[4be4 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4be5 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4be6 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[4be7 05-20 18:21:40.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4be8 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4be9 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4bea 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4beb 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bec 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bed 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bee 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bef 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bf0 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4bf1 05-20 18:21:40.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[4bf2 05-20 18:21:40.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bf3 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4bf4 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4bf5 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4bf6 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4bf7 05-20 18:21:40.87 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4bf8 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4bf9 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4bfa 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bfb 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4bfc 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bfd 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4bfe 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4bff 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4c00 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4c01 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4c02 05-20 18:21:40.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c03 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4c04 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4c05 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4c06 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c07 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4c08 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4c09 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4c0a 05-20 18:21:40.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c0b 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4c0c 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4c0d 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c0e 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4c0f 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4c10 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c11 05-20 18:21:40.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4c12 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4c13 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4c14 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4c15 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4c16 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4c17 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 gate 1589998900931216500 evaluation starts +[4c18 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 signed by 0 principal evaluation starts (used [false]) +[4c19 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 processing identity 0 with bytes of 115a110 +[4c1a 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4c1b 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 principal evaluation fails +[4c1c 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ae530 gate 1589998900931216500 evaluation fails +[4c1d 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4c1e 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4c1f 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4c20 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 gate 1589998900931508800 evaluation starts +[4c21 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 signed by 0 principal evaluation starts (used [false]) +[4c22 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 processing identity 0 with bytes of 115a110 +[4c23 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 principal matched by identity 0 +[4c24 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +[4c25 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +00000040 e9 e7 b7 92 fe 9d c0 |.......| +[4c26 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 principal evaluation succeeds for identity 0 +[4c27 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056aeaa0 gate 1589998900931508800 evaluation succeeds +[4c28 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4c29 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4c2a 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4c2b 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4c2c 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4c2d 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4c2e 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4c2f 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4c30 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4c31 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c32 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c33 05-20 18:21:40.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c34 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[4c35 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c36 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c37 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c38 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[4c39 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\255B\251\237~\002 u\372\346\277\313>`NB\210\242\262O\350\362\235\252\354\230\211\222E\271\313\214Ne\2127\240SW" > alive: +[4c3a 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4c3b 05-20 18:21:40.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c3c 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4c3d 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161041 +[4c3e 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3BE966595C84DE7475129FDAE6C872425198584C4980E69C1BC3BD83CB531909 +[4c3f 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4c40 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4c41 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4c42 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[4c43 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c44 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4c45 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c46 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4c47 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4c49 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c48 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[4c4b 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c4a 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4c4c 05-20 18:21:41.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c4d 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4c4e 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4c4f 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c50 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4c51 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4c52 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +[4c53 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +00000040 14 88 56 f5 8e 65 |..V..e| +[4c54 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[4c55 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 9d 63 71 44 49 97 52 4a 24 a0 dc |0D. 1.cqDI.RJ$..| +00000010 d3 9b ab 37 13 20 15 8f 0b 05 11 d7 24 7c f8 54 |...7. ......$|.T| +00000020 73 dd 9a b8 02 20 54 a9 2d b3 76 9c b9 f6 5c 33 |s.... T.-.v...\3| +00000030 6a bd dd ef 84 f4 e2 54 1e 4d 0e 65 de 6a 35 fd |j......T.M.e.j5.| +00000040 f7 f0 b2 11 90 c9 |......| +[4c56 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4c57 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4c58 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c59 05-20 18:21:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c5a 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4c5b 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4c5c 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c5d 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4c5e 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4c5f 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +00000040 e9 13 35 86 49 a6 94 |..5.I..| +[4c61 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4c62 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c63 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4c64 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +[4c65 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +00000040 14 88 56 f5 8e 65 |..V..e| +[4c66 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4c67 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4c68 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4c6a 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4c69 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c6b 05-20 18:21:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c6c 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4c6d 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4c6e 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c6f 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b e9 66 59 5c 84 de 74 75 12 9f da e6 c8 72 42 |;.fY\..tu.....rB| +00000010 51 98 58 4c 49 80 e6 9c 1b c3 bd 83 cb 53 19 09 |Q.XLI........S..| +[4c70 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 1d f3 91 a4 4f 07 a5 90 2b 2b ad |0D. R....O...++.| +00000010 eb e8 d0 ac fe 9e b3 63 ca 69 84 ac bd f8 04 58 |.......c.i.....X| +00000020 12 ec b7 11 02 20 4a 4d a1 82 1d 88 af a2 50 58 |..... JM......PX| +00000030 b3 e7 0d 46 ee ec 84 d7 ad 00 be e7 1b d3 8a 1d |...F............| +00000040 14 88 56 f5 8e 65 |..V..e| +[4c71 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4c72 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4c73 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c74 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4c75 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 02 a1 7d 76 cf cd f2 77 8a 4c 07 3c 75 18 08 |F..}v...w.L. DEBU Verify: sig = 00000000 30 45 02 21 00 e4 46 3a 2e 06 2b 44 35 03 e3 da |0E.!..F:..+D5...| +00000010 d2 a5 70 84 42 cc cc 14 66 c6 4d 10 e5 ea 61 13 |..p.B...f.M...a.| +00000020 45 6a ff bc 42 02 20 5c e8 b4 e6 5d f2 ec ff 78 |Ej..B. \...]...x| +00000030 d0 ae f8 4c bc 52 fe 56 cb b9 06 ca 70 ce 13 d9 |...L.R.V....p...| +00000040 e9 13 35 86 49 a6 94 |..5.I..| +[4c77 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4c78 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c79 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4c7a 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c7b 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4c7c 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4c7d 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4c7e 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4c7f 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4c80 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4c81 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 gate 1589998901058433500 evaluation starts +[4c82 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 signed by 0 principal evaluation starts (used [false]) +[4c83 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 processing identity 0 with bytes of 115a110 +[4c84 05-20 18:21:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4c85 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 principal evaluation fails +[4c86 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fee00 gate 1589998901058433500 evaluation fails +[4c87 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4c88 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4c89 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4c8a 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 gate 1589998901061823200 evaluation starts +[4c8b 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 signed by 0 principal evaluation starts (used [false]) +[4c8c 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 processing identity 0 with bytes of 115a110 +[4c8d 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 principal matched by identity 0 +[4c8e 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 78 06 6b 77 d6 0a 2f 4e 01 71 72 f6 20 37 |..x.kw../N.qr. 7| +00000010 9e d8 2a 40 d5 73 b4 4d 7e 23 5d f4 35 9c dc 7c |..*@.s.M~#].5..|| +[4c8f 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba a9 88 e4 a1 70 b8 70 61 cc 70 |0E.!......p.pa.p| +00000010 e5 ef 4c 87 e9 c1 50 dc 69 1b 84 71 3b db 0c e4 |..L...P.i..q;...| +00000020 12 2d 03 67 1e 02 20 0e 94 6d 2f ee dc b4 27 49 |.-.g.. ..m/...'I| +00000030 d7 29 90 19 e9 51 d6 1a e9 40 b3 43 b8 c9 e7 31 |.)...Q...@.C...1| +00000040 e9 e7 b7 92 fe 9d c0 |.......| +[4c90 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 principal evaluation succeeds for identity 0 +[4c91 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ff370 gate 1589998901061823200 evaluation succeeds +[4c92 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4c93 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4c94 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4c95 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4c96 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4c97 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c98 05-20 18:21:41.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c99 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4c9a 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4c9b 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4c9c 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c9d 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c9e 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4c9f 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ca0 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ca1 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ca2 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[4ca3 05-20 18:21:41.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ca4 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4ca5 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4ca6 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ca7 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4ca8 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4ca9 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4caa 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4cab 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4cac 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4cad 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4cae 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4caf 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4cb0 05-20 18:21:41.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 gate 1589998901199432200 evaluation starts +[4cb1 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 signed by 0 principal evaluation starts (used [false]) +[4cb2 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 processing identity 0 with bytes of 115a110 +[4cb3 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4cb4 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 principal evaluation fails +[4cb5 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572ca40 gate 1589998901199432200 evaluation fails +[4cb6 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4cb7 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4cb8 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4cb9 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 gate 1589998901204930000 evaluation starts +[4cba 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 signed by 0 principal evaluation starts (used [false]) +[4cbb 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 processing identity 0 with bytes of 115a110 +[4cbc 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 principal matched by identity 0 +[4cbd 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 73 82 1e c1 5a 80 c0 69 90 25 27 15 6f d8 ea |os...Z..i.%'.o..| +00000010 c0 35 2c 6d c9 80 35 12 85 e1 b5 74 80 a0 93 29 |.5,m..5....t...)| +[4cbe 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 5a 29 65 a2 f7 7e 5b de e0 85 |0E.!..Z)e..~[...| +00000010 18 f5 1b bf 8d 7a 8f 3f af 34 53 df fe 45 23 ed |.....z.?.4S..E#.| +00000020 8d 59 58 4c ca 02 20 4e fb f7 56 49 f9 05 19 33 |.YXL.. N..VI...3| +00000030 65 72 94 04 07 dc e7 fb b5 87 b1 2a 38 19 b6 27 |er.........*8..'| +00000040 62 a1 6d e9 cb 41 98 |b.m..A.| +[4cbf 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 principal evaluation succeeds for identity 0 +[4cc0 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00572cfb0 gate 1589998901204930000 evaluation succeeds +[4cc1 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4cc2 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4cc3 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4cc4 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4cc5 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4cc6 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4cc7 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4cc8 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4cc9 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4cca 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ccb 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ccc 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ccd 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[4cce 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ccf 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4cd0 05-20 18:21:41.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4cd1 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[4cd2 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4cd4 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cd3 05-20 18:21:41.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[4cd5 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cd6 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cd7 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cd8 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cd9 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4cda 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 63 4b 2b 9f 23 a7 43 6f be a1 6b 0b b1 0f 0c 16 |cK+.#.Co..k.....| +00000010 ba bc 0f 7b 1b 6e d1 9b fd a5 d5 b7 69 dd 65 a8 |...{.n......i.e.| +[4cdb 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 00 f3 a7 29 10 8a f3 4c 82 bc 92 |0D. S...)...L...| +00000010 ae 04 32 ff 35 a2 9c a6 ee be 7c 17 2b f3 8e d3 |..2.5.....|.+...| +00000020 0c 14 f3 2d 02 20 35 53 21 9a 97 61 cd ac 4f 15 |...-. 5S!..a..O.| +00000030 ca e0 88 eb 61 de d8 b8 ff b7 94 86 7e 3e 60 58 |....a.......~>`X| +00000040 c3 c3 38 f5 87 80 |..8...| +[4cdc 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cdd 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4cde 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4cdf 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4ce0 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[4ce1 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ce2 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ce3 05-20 18:21:43.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ce4 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ce5 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ce6 05-20 18:21:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ce7 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4ce8 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ce9 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4cea 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ceb 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cec 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ced 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cee 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cef 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cf0 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cf1 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cf2 05-20 18:21:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cf3 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cf4 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cf5 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cf6 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4cf7 05-20 18:21:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cf8 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4cf9 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4cfa 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[4cfb 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4cfc 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4cfd 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4cfe 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4cff 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4d00 05-20 18:21:43.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4d01 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4d02 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4d03 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d04 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d05 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d06 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4d07 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4d08 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4d09 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4d0a 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4d0b 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4d0c 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4d0d 05-20 18:21:43.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 gate 1589998903547475900 evaluation starts +[4d0e 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4d0f 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 signed by 0 principal evaluation starts (used [false]) +[4d10 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 processing identity 0 with bytes of 115a110 +[4d11 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4d12 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 principal evaluation fails +[4d13 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005786080 gate 1589998903547475900 evaluation fails +[4d14 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4d15 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4d16 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4d17 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 gate 1589998903555905200 evaluation starts +[4d18 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 signed by 0 principal evaluation starts (used [false]) +[4d19 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 processing identity 0 with bytes of 115a110 +[4d1a 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 principal matched by identity 0 +[4d1b 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[4d1c 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[4d1d 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 principal evaluation succeeds for identity 0 +[4d1e 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005753a60 gate 1589998903555905200 evaluation succeeds +[4d1f 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4d20 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4d21 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4d22 05-20 18:21:43.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4d23 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[4d24 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[4d25 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d26 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d27 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4d28 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4d29 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4d2a 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4d2b 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4d2c 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4d2d 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 gate 1589998903563666800 evaluation starts +[4d2e 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 signed by 0 principal evaluation starts (used [false]) +[4d2f 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 processing identity 0 with bytes of 115a110 +[4d30 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4d31 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 principal evaluation fails +[4d32 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f350 gate 1589998903563666800 evaluation fails +[4d33 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4d34 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4d35 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4d36 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 gate 1589998903566801000 evaluation starts +[4d37 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 signed by 0 principal evaluation starts (used [false]) +[4d38 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 processing identity 0 with bytes of 115a110 +[4d39 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 principal matched by identity 0 +[4d3a 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[4d3b 05-20 18:21:43.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[4d3c 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 principal evaluation succeeds for identity 0 +[4d3d 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00578f8c0 gate 1589998903566801000 evaluation succeeds +[4d3e 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4d3f 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4d40 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4d41 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4d42 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[4d43 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[4d44 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4d45 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4d46 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[4d47 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[4d48 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d49 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d4a 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4d4b 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4d4c 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4d4d 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4d4e 05-20 18:21:43.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4d4f 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4d50 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 gate 1589998903580576900 evaluation starts +[4d51 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 signed by 0 principal evaluation starts (used [false]) +[4d52 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 processing identity 0 with bytes of 115a110 +[4d53 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4d54 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 principal evaluation fails +[4d55 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057afa40 gate 1589998903580576900 evaluation fails +[4d56 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4d57 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4d58 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4d59 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 gate 1589998903587716300 evaluation starts +[4d5a 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 signed by 0 principal evaluation starts (used [false]) +[4d5b 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 processing identity 0 with bytes of 115a110 +[4d5c 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 principal matched by identity 0 +[4d5d 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[4d5e 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[4d5f 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 principal evaluation succeeds for identity 0 +[4d60 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057affb0 gate 1589998903587716300 evaluation succeeds +[4d61 05-20 18:21:43.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4d62 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4d63 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4d64 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4d65 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[4d66 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[4d67 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d68 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d69 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4d6a 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4d6b 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4d6c 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4d6d 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4d6e 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4d6f 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 gate 1589998903592433700 evaluation starts +[4d70 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 signed by 0 principal evaluation starts (used [false]) +[4d71 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 processing identity 0 with bytes of 115a110 +[4d72 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4d73 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 principal evaluation fails +[4d74 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cd8a0 gate 1589998903592433700 evaluation fails +[4d75 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4d76 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4d77 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4d78 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 gate 1589998903593588900 evaluation starts +[4d79 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 signed by 0 principal evaluation starts (used [false]) +[4d7a 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 processing identity 0 with bytes of 115a110 +[4d7b 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 principal matched by identity 0 +[4d7c 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[4d7d 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[4d7e 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 principal evaluation succeeds for identity 0 +[4d7f 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cde10 gate 1589998903593588900 evaluation succeeds +[4d80 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4d81 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4d82 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4d83 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4d84 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4d85 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4d86 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d87 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d88 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4d89 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4d8a 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4d8b 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4d8c 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4d8d 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4d8e 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4d8f 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 gate 1589998903596824100 evaluation starts +[4d90 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 signed by 0 principal evaluation starts (used [false]) +[4d91 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 processing identity 0 with bytes of 115a110 +[4d92 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4d93 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 principal evaluation fails +[4d94 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e3260 gate 1589998903596824100 evaluation fails +[4d95 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4d96 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4d97 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4d98 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 gate 1589998903597337900 evaluation starts +[4d99 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 signed by 0 principal evaluation starts (used [false]) +[4d9a 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 processing identity 0 with bytes of 115a110 +[4d9b 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 principal matched by identity 0 +[4d9c 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[4d9d 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[4d9e 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 principal evaluation succeeds for identity 0 +[4d9f 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057e37d0 gate 1589998903597337900 evaluation succeeds +[4da0 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4da1 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4da2 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4da3 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4da4 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[4da5 05-20 18:21:43.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[4da6 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[4da7 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[4da8 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4da9 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4daa 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4dab 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4dac 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4dad 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4dae 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4daf 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4db0 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 gate 1589998903601745000 evaluation starts +[4db1 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 signed by 0 principal evaluation starts (used [false]) +[4db2 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 processing identity 0 with bytes of 115a110 +[4db3 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4db4 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 principal evaluation fails +[4db5 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ff7b0 gate 1589998903601745000 evaluation fails +[4db6 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4db7 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4db8 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4db9 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 gate 1589998903602348800 evaluation starts +[4dba 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 signed by 0 principal evaluation starts (used [false]) +[4dbb 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 processing identity 0 with bytes of 115a110 +[4dbc 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 principal matched by identity 0 +[4dbd 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[4dbe 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[4dbf 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 principal evaluation succeeds for identity 0 +[4dc0 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ffd20 gate 1589998903602348800 evaluation succeeds +[4dc1 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4dc2 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4dc3 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4dc4 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4dc5 05-20 18:21:43.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4dc6 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4dc7 05-20 18:21:43.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4dc8 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4dc9 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4dca 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4dcb 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4dcc 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4dcd 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4dce 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4dcf 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4dd0 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4dd1 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4dd2 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 gate 1589998903658621900 evaluation starts +[4dd3 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 signed by 0 principal evaluation starts (used [false]) +[4dd4 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 processing identity 0 with bytes of 115a110 +[4dd5 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4dd6 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 principal evaluation fails +[4dd7 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005825260 gate 1589998903658621900 evaluation fails +[4dd8 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4dd9 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4dda 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4ddb 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 gate 1589998903659653900 evaluation starts +[4ddc 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 signed by 0 principal evaluation starts (used [false]) +[4ddd 05-20 18:21:43.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 processing identity 0 with bytes of 115a110 +[4dde 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 principal matched by identity 0 +[4ddf 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b 7e 05 ba df ab bc 44 10 f3 cf 33 c6 58 33 1c |+~.....D...3.X3.| +00000010 05 5a 6c f6 c2 ad 21 05 03 05 3a c1 7b c4 5d 04 |.Zl...!...:.{.].| +[4de0 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c2 02 c9 a5 53 05 3e 8f 82 fa 1b |0D. *....S.>....| +00000010 b6 f8 ba e7 37 97 2a a4 f4 bc bd c4 af 50 f9 52 |....7.*......P.R| +00000020 37 f8 1f 89 02 20 6c 9a f0 e3 0f 86 b2 6e b8 f6 |7.... l......n..| +00000030 d2 8a 47 1d 5a 07 25 b1 89 13 37 c4 51 20 f2 9c |..G.Z.%...7.Q ..| +00000040 37 f3 17 03 6b c0 |7...k.| +[4de1 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 principal evaluation succeeds for identity 0 +[4de2 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058257d0 gate 1589998903659653900 evaluation succeeds +[4de3 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4de4 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4de5 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4de6 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4de7 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4de8 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4de9 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4dea 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4deb 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4dec 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ded 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4dee 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4def 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4df0 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4df1 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4df2 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4df3 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4df4 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4df5 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4df6 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4df7 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4df8 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4df9 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4dfa 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4dfb 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4dfc 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4dfd 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4dfe 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4dff 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e00 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e01 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e02 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e03 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e04 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e05 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e06 05-20 18:21:43.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e07 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e08 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e09 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[4e0a 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e0b 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e0c 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[4e0d 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4e0e 05-20 18:21:43.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e0f 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4e10 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4e11 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4e12 05-20 18:21:43.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e13 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4e14 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4e15 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e16 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e17 05-20 18:21:43.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e18 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e19 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e1a 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e1b 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e1c 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4e1d 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e1e 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4e1f 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4e20 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4e21 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4e22 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4e23 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4e24 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 gate 1589998903894876600 evaluation starts +[4e25 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 signed by 0 principal evaluation starts (used [false]) +[4e26 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 processing identity 0 with bytes of 115a110 +[4e27 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4e28 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 principal evaluation fails +[4e29 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787640 gate 1589998903894876600 evaluation fails +[4e2a 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4e2b 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4e2c 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4e2d 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 gate 1589998903895530100 evaluation starts +[4e2e 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 signed by 0 principal evaluation starts (used [false]) +[4e2f 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 processing identity 0 with bytes of 115a110 +[4e30 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 principal matched by identity 0 +[4e31 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d ba 8c 28 4e d0 9c c1 ca 80 f9 b5 1b 29 85 cd |=..(N........)..| +00000010 db 85 4f c2 bb ed 7f e4 80 43 15 ef d4 92 d5 7c |..O......C.....|| +[4e32 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 98 2b fd 76 99 5b 26 b8 51 91 06 |0D. z.+.v.[&.Q..| +00000010 96 f7 2a 73 51 e9 e0 6d e3 b8 54 b1 74 a6 0a ff |..*sQ..m..T.t...| +00000020 cf cd 3e b3 02 20 7d ad 8f d6 d3 86 83 b6 2c 62 |..>.. }.......,b| +00000030 96 61 2f b2 d6 c7 33 66 b5 f5 0a e3 2d 85 c1 95 |.a/...3f....-...| +00000040 25 01 3a 4a 9b f6 |%.:J..| +[4e33 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 principal evaluation succeeds for identity 0 +[4e34 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005787bb0 gate 1589998903895530100 evaluation succeeds +[4e35 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4e36 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4e37 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4e38 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4e39 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e3a 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4e3b 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4e3c 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4e3d 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4e3e 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e3f 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e40 05-20 18:21:43.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e41 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e42 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e43 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e44 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e45 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e46 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e47 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e48 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e49 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e4a 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e4b 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e4c 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4e4d 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e4e 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e4f 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4e50 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e51 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e52 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e53 05-20 18:21:43.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e54 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e55 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e56 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e57 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4e58 05-20 18:21:43.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e59 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4e5a 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161042 +[4e5b 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 093474BA294BD012CE333DAC81B5FD6AC2B77A09DC9934E43F32E5B50846C399 +[4e5c 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4e5d 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4e5e 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4e5f 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[4e60 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e61 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e62 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e63 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4e64 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e65 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4e66 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4e67 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4e68 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e69 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4e6a 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e6b 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4e6c 05-20 18:21:44.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e6d 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4e6e 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4e6f 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e70 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e71 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e72 05-20 18:21:44.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e73 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4e74 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4e75 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e76 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e77 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e78 05-20 18:21:44.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e79 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4e7a 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4e7b 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4e7c 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[4e7d 05-20 18:21:44.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e7e 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4e7f 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4e80 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4e81 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[4e82 05-20 18:21:44.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e83 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > > , Envelope: 271 bytes, Signature: 0 bytes +[4e84 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > > , Envelope: 271 bytes, Signature: 0 bytes +[4e85 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e86 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > > , Envelope: 271 bytes, Signature: 0 bytes +[4e87 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4e88 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +[4e89 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +[4e8a 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[4e8b 05-20 18:21:44.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 18 e5 97 e0 1d da 2f 1a df 32 5b |0D. a....../..2[| +00000010 12 ec 93 30 3e 0d 70 a9 45 53 f3 f7 51 9e 9d 90 |...0>.p.ES..Q...| +00000020 63 bd 46 6a 02 20 39 36 bf 9a 98 aa 2d 8a 40 7f |c.Fj. 96....-.@.| +00000030 9f a9 f5 45 58 34 19 25 24 52 b8 bd 50 98 60 a6 |...EX4.%$R..P.`.| +00000040 a2 ac b2 8d 51 be |....Q.| +[4e8c 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4e8d 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[4e8e 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4e8f 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4e90 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4e91 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e92 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e93 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e94 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[4e95 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e96 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e97 05-20 18:21:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[4e98 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4e99 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4e9a 05-20 18:21:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" secret_envelope:\rp\251ES\363\367Q\236\235\220c\275Fj\002 96\277\232\230\252-\212@\177\237\251\365EX4\031%$R\270\275P\230`\246\242\254\262\215Q\276" > > alive: +[4e9b 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4e9c 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4e9d 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4e9e 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4e9f 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ea0 05-20 18:21:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ea1 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ea2 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ea3 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ea4 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[4ea5 05-20 18:21:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ea6 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4ea7 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4ea8 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4eaa 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4ea9 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4eab 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4eac 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4ead 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4eae 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4eaf 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4eb0 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4eb1 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4eb2 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4eb3 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4eb4 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4eb5 05-20 18:21:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4eb6 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4eb7 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4eb8 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4eb9 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4eba 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4ebb 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4ebc 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4ebd 05-20 18:21:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ebe 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4ebf 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4ec0 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ec1 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4ec2 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4ec3 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ec4 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4ec5 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4ec6 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4ec7 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4ec8 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4ec9 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4eca 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 gate 1589998904946593700 evaluation starts +[4ecb 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 signed by 0 principal evaluation starts (used [false]) +[4ecc 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 processing identity 0 with bytes of 115a110 +[4ecd 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4ece 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 principal evaluation fails +[4ecf 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059032a0 gate 1589998904946593700 evaluation fails +[4ed0 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4ed1 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4ed2 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4ed3 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 gate 1589998904946853400 evaluation starts +[4ed4 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 signed by 0 principal evaluation starts (used [false]) +[4ed5 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 processing identity 0 with bytes of 115a110 +[4ed6 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 principal matched by identity 0 +[4ed7 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +[4ed8 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +00000040 b6 44 ea d4 19 a2 a2 |.D.....| +[4ed9 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 principal evaluation succeeds for identity 0 +[4eda 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005903810 gate 1589998904946853400 evaluation succeeds +[4edb 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4edc 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4edd 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4ede 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4edf 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4ee0 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4ee1 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4ee2 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4ee3 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4ee4 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ee5 05-20 18:21:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ee6 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[4ee7 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ee8 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ee9 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4eea 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[4eeb 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > alive: alive:\263\002 }\255\217\326\323\206\203\266,b\226a/\262\326\3073f\265\365\n\343-\205\301\225%\001:J\233\366" > alive: +[4eec 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4eed 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4eee 05-20 18:21:44.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4eef 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4ef0 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161043 +[4ef1 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3DF3A91BFAB6F160E17345B24A659EF887F7318A6726D0F769548EB7D208FED2 +[4ef2 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4ef3 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4ef4 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4ef5 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[4ef6 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[4ef7 05-20 18:21:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ef8 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ef9 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[4efa 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes +[4efb 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4efc 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4efd 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[4efe 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\223f\350{\212\3010\002 Ee\237MAG\006f\177H\227\002r\344\273\2474o\013\210\030\335\257\206#J\t\324\034\270\002\303" > > , Envelope: 166 bytes, Signature: 0 bytes +[4eff 05-20 18:21:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f00 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4f01 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4f02 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f03 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4f04 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4f06 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +[4f07 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +00000040 4a 09 d4 1c b8 02 c3 |J......| +[4f05 05-20 18:21:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4f08 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4f09 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[4f0a 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 95 32 d0 b5 b7 47 dc 74 76 6e |0E.!...2...G.tvn| +00000010 42 7e 9b d9 0b fa c0 b3 12 0f a3 2b 62 a9 5a 16 |B~.........+b.Z.| +00000020 4e 85 0b b3 7a 02 20 0c ef de a7 07 9e 0f ff cd |N...z. .........| +00000030 f6 f1 7b c9 74 b6 1e 19 30 c7 f8 23 3b ab c5 53 |..{.t...0..#;..S| +00000040 18 0a 18 5a c9 9c 58 |...Z..X| +[4f0b 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[4f0c 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[4f0d 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f0e 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f0f 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4f10 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4f12 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f11 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f13 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4f14 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4f15 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4f16 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4f17 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4f18 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4f19 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4f1a 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4f1b 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 gate 1589998905046353200 evaluation starts +[4f1c 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 signed by 0 principal evaluation starts (used [false]) +[4f1d 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 processing identity 0 with bytes of 115a110 +[4f1e 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4f1f 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 principal evaluation fails +[4f20 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005962b50 gate 1589998905046353200 evaluation fails +[4f21 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4f22 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4f23 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4f24 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 gate 1589998905047740100 evaluation starts +[4f25 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 signed by 0 principal evaluation starts (used [false]) +[4f26 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 processing identity 0 with bytes of 115a110 +[4f27 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 principal matched by identity 0 +[4f28 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 e6 5b 74 ce 0d ac 66 71 ab 23 b5 08 08 5d 0d |..[t...fq.#...].| +00000010 de 0e 76 7b 1e e2 d3 07 1f 90 31 32 17 23 a7 c5 |..v{......12.#..| +[4f29 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb ce 43 ac a0 f9 06 87 ff 29 f4 |0E.!...C......).| +00000010 b9 9f 60 b5 bd 03 d8 eb 88 0a 24 7c ec 95 f4 9a |..`.......$|....| +00000020 5d 94 4a ea f4 02 20 4f 66 41 a4 d6 4e 9f 70 eb |].J... OfA..N.p.| +00000030 72 ad f6 29 c0 ea 89 62 b4 51 69 fe 37 aa 8b ea |r..)...b.Qi.7...| +00000040 b6 44 ea d4 19 a2 a2 |.D.....| +[4f2a 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 principal evaluation succeeds for identity 0 +[4f2b 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059630c0 gate 1589998905047740100 evaluation succeeds +[4f2c 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4f2d 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4f2e 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4f2f 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4f30 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4f31 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f32 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4f33 05-20 18:21:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +[4f34 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +00000040 4a 09 d4 1c b8 02 c3 |J......| +[4f35 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4f36 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4f37 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f38 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4f39 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +[4f3a 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +[4f3b 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4f3c 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f3d 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f3e 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4f3f 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f40 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4f41 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 12 b8 ce 27 83 30 ef 0a 65 5e df 79 5f a6 d8 |....'.0..e^.y_..| +00000010 f4 70 94 31 89 bc df a4 05 16 2b 38 10 ef 7b 0b |.p.1......+8..{.| +[4f42 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 27 d7 77 90 a2 76 9c 2f 82 66 |0E.!..'.w..v./.f| +00000010 c9 2c 3e 55 29 71 c1 b7 1e 6f c2 8f e6 0e 45 27 |.,>U)q...o....E'| +00000020 3d 96 79 6a a5 02 20 40 46 cf 93 97 31 a7 24 22 |=.yj.. @F...1.$"| +00000030 85 d9 57 9e 9a c5 11 39 f4 48 e3 19 9d 1c 6c f0 |..W....9.H....l.| +00000040 1e 28 c5 76 66 37 7c |.(.vf7|| +[4f43 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4f44 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f45 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4f46 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d f3 a9 1b fa b6 f1 60 e1 73 45 b2 4a 65 9e f8 |=......`.sE.Je..| +00000010 87 f7 31 8a 67 26 d0 f7 69 54 8e b7 d2 08 fe d2 |..1.g&..iT......| +[4f47 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb 27 72 6c 65 53 b2 cf e8 47 |0E.!...'rleS...G| +00000010 fe 51 e3 01 53 67 ce 66 07 0f 51 79 db 3e 93 66 |.Q..Sg.f..Qy.>.f| +00000020 e8 7b 8a c1 30 02 20 45 65 9f 4d 41 47 06 66 7f |.{..0. Ee.MAG.f.| +00000030 48 97 02 72 e4 bb a7 34 6f 0b 88 18 dd af 86 23 |H..r...4o......#| +00000040 4a 09 d4 1c b8 02 c3 |J......| +[4f48 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4f49 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4f4a 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f4b 05-20 18:21:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f4c 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4f4d 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4f4e 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4f4f 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f50 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f51 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f52 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f53 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f54 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f55 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[4f56 05-20 18:21:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f57 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4f58 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4f59 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f5a 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4f5b 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4f5c 05-20 18:21:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f5d 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4f5e 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4f5f 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4f60 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4f61 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4f62 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4f63 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 gate 1589998905215816000 evaluation starts +[4f64 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 signed by 0 principal evaluation starts (used [false]) +[4f65 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 processing identity 0 with bytes of 115a110 +[4f66 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4f67 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 principal evaluation fails +[4f68 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005996dc0 gate 1589998905215816000 evaluation fails +[4f69 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4f6a 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4f6b 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4f6c 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 gate 1589998905216770900 evaluation starts +[4f6d 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 signed by 0 principal evaluation starts (used [false]) +[4f6e 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 processing identity 0 with bytes of 115a110 +[4f6f 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 principal matched by identity 0 +[4f70 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 a3 d6 57 4e 31 8d b9 e2 17 a5 a0 83 3f 8a 0d |...WN1.......?..| +00000010 1e 20 7a aa 5d 22 69 0d f6 61 ec a7 e0 23 65 be |. z.]"i..a...#e.| +[4f71 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 0f 6b ef e4 55 02 49 7d a2 e3 |0E.!...k..U.I}..| +00000010 e4 03 09 9e 29 d9 f0 c0 6f c6 e5 09 cc 49 eb f1 |....)...o....I..| +00000020 22 61 ce a1 5e 02 20 13 1a e8 d0 b8 0f e6 11 a7 |"a..^. .........| +00000030 c8 81 db e2 b0 04 22 06 21 b4 cf c6 f0 d1 e9 7e |......".!......~| +00000040 f3 d7 cd 17 ec 98 5d |......]| +[4f72 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 principal evaluation succeeds for identity 0 +[4f73 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005997330 gate 1589998905216770900 evaluation succeeds +[4f74 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4f75 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4f76 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4f77 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4f78 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4f79 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4f7a 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4f7b 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4f7c 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4f7d 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f7e 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f7f 05-20 18:21:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f80 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[4f81 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f82 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f83 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f84 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[4f85 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[4f86 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:U)q\301\267\036o\302\217\346\016E'=\226yj\245\002 @F\317\223\2271\247$\"\205\331W\236\232\305\0219\364H\343\031\235\034l\360\036(\305vf7|" > alive: alive: alive: +[4f87 05-20 18:21:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f88 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[4f89 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[4f8a 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4f8b 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0884D2B080BFEFB3881610161801 +[4f8c 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1A84F5AA905FCC58301807A5328146AC8A545AB5B5CA6F71F37E95CB31184F53 +[4f8d 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[4f8e 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f8f 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f90 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f91 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f92 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[4f93 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f94 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4f95 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[4f96 05-20 18:21:45.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4f97 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37276 +[4f98 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0059d23c0 +[4f99 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[4f9a 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[4f9b 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[4f9c 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[4f9d 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 a1 a4 cb 41 d4 05 5c 08 25 96 b9 73 1d 17 cf |....A..\.%..s...| +00000010 42 c0 51 33 6e 24 cb 42 9c e6 43 02 af f1 c2 54 |B.Q3n$.B..C....T| +[4f9e 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f f1 bc 0c 74 1d 7e f5 d9 92 a0 98 |0D. ....t.~.....| +00000010 be 75 da 76 c1 2a 6a b2 c3 b3 07 20 33 f0 69 9a |.u.v.*j.... 3.i.| +00000020 65 0e a4 58 02 20 46 70 5a cb 68 07 a8 11 58 70 |e..X. FpZ.h...Xp| +00000030 95 ab 15 a7 14 48 4c 99 c1 93 59 ce eb be fe ee |.....HL...Y.....| +00000040 5e 91 9e 51 d3 b9 |^..Q..| +[4f9f 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[4fa0 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0058a56c0, header 0xc0059d27d0 +[4fa1 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[4fa2 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [][4eb3abec] processing txid: 4eb3abec23e606d078141575362061ea09bc2c8d5b588bc2f67aa9d817171ac8 +[4fa3 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [][4eb3abec] Entry chaincode: name:"cscc" +[4fa4 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> INFO [][4eb3abec] Entry chaincode: name:"cscc" +[4fa5 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[4fa6 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[4fa7 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 a1 a4 cb 41 d4 05 5c 08 25 96 b9 73 1d 17 cf |....A..\.%..s...| +00000010 42 c0 51 33 6e 24 cb 42 9c e6 43 02 af f1 c2 54 |B.Q3n$.B..C....T| +[4fa8 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f f1 bc 0c 74 1d 7e f5 d9 92 a0 98 |0D. ....t.~.....| +00000010 be 75 da 76 c1 2a 6a b2 c3 b3 07 20 33 f0 69 9a |.u.v.*j.... 3.i.| +00000020 65 0e a4 58 02 20 46 70 5a cb 68 07 a8 11 58 70 |e..X. FpZ.h...Xp| +00000030 95 ab 15 a7 14 48 4c 99 c1 93 59 ce eb be fe ee |.....HL...Y.....| +00000040 5e 91 9e 51 d3 b9 |^..Q..| +[4fa9 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4eb3abec] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[4faa 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [4eb3abec] notifying Txid:4eb3abec23e606d078141575362061ea09bc2c8d5b588bc2f67aa9d817171ac8, channelID: +[4fab 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[4fac 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> INFO [][4eb3abec] Exit chaincode: name:"cscc" (1ms) +[4fad 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU [][4eb3abec] Exit +[4fae 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37276 +[4faf 05-20 18:21:46.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37276 grpc.code=OK grpc.call_duration=3.1993ms +[4fb0 05-20 18:21:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[4fb1 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37284 +[4fb2 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0059d32c0 +[4fb3 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[4fb4 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[4fb5 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[4fb6 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[4fb7 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 7f ec 39 7e 6c 03 08 c0 1c e8 40 ee 36 7d 24 |v..9~l.....@.6}$| +00000010 ca 34 8c 57 cc ca c7 5b 2a 33 17 1d 76 b1 16 08 |.4.W...[*3..v...| +[4fb8 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc c3 b7 d7 e9 82 c7 f6 cc 12 b9 |0E.!............| +00000010 e2 45 fa 27 5f 67 29 e8 8c 6e ea 32 e3 35 47 94 |.E.'_g)..n.2.5G.| +00000020 f5 2e aa bb 11 02 20 29 1e d1 e1 22 87 3d 9e fc |...... )...".=..| +00000030 33 f8 b5 17 02 d8 36 27 8c 36 0f 95 22 44 10 3c |3.....6'.6.."D.<| +00000040 60 58 02 08 02 d2 be |`X.....| +[4fb9 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[4fba 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0058a5ab0, header 0xc0059d36d0 +[4fbb 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[4fbc 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU [][26f424f3] processing txid: 26f424f34cf0c9ac953099154de9e99f9c6746a9247217cc1fdacdebf9e0f3c9 +[4fbd 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU [][26f424f3] Entry chaincode: name:"qscc" +[4fbe 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> INFO [][26f424f3] Entry chaincode: name:"qscc" +[4fbf 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[4fc0 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[4fc1 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[4fc2 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[4fc3 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4fc4 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4fc5 05-20 18:21:47.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4fc6 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4fc7 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[4fc8 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 gate 1589998907441256300 evaluation starts +[4fc9 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 signed by 0 principal evaluation starts (used [false]) +[4fca 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 processing identity 0 with bytes of 115a110 +[4fcb 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[4fcc 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[4fcd 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4fce 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 principal matched by identity 0 +[4fcf 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 7f ec 39 7e 6c 03 08 c0 1c e8 40 ee 36 7d 24 |v..9~l.....@.6}$| +00000010 ca 34 8c 57 cc ca c7 5b 2a 33 17 1d 76 b1 16 08 |.4.W...[*3..v...| +[4fd0 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc c3 b7 d7 e9 82 c7 f6 cc 12 b9 |0E.!............| +00000010 e2 45 fa 27 5f 67 29 e8 8c 6e ea 32 e3 35 47 94 |.E.'_g)..n.2.5G.| +00000020 f5 2e aa bb 11 02 20 29 1e d1 e1 22 87 3d 9e fc |...... )...".=..| +00000030 33 f8 b5 17 02 d8 36 27 8c 36 0f 95 22 44 10 3c |3.....6'.6.."D.<| +00000040 60 58 02 08 02 d2 be |`X.....| +[4fd1 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 principal evaluation succeeds for identity 0 +[4fd2 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a0d980 gate 1589998907441256300 evaluation succeeds +[4fd3 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[4fd4 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4fd5 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4fd6 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4fd7 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU [26f424f3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[4fd8 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU [26f424f3] notifying Txid:26f424f34cf0c9ac953099154de9e99f9c6746a9247217cc1fdacdebf9e0f3c9, channelID: +[4fd9 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[4fda 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> INFO [][26f424f3] Exit chaincode: name:"qscc" (8ms) +[4fdb 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU [][26f424f3] Exit +[4fdc 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37284 +[4fdd 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37284 grpc.code=OK grpc.call_duration=12.1048ms +[4fde 05-20 18:21:47.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[4fdf 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4fe0 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4fe1 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[4fe2 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4fe3 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4fe4 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4fe5 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4fe6 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4fe7 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4fe8 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4fe9 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4fea 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4feb 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4fec 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4fed 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4fee 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4fef 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4ff0 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4ff1 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4ff2 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4ff3 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 gate 1589998907539560500 evaluation starts +[4ff4 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 signed by 0 principal evaluation starts (used [false]) +[4ff5 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 processing identity 0 with bytes of 115a110 +[4ff6 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4ff7 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 principal evaluation fails +[4ff8 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62570 gate 1589998907539560500 evaluation fails +[4ff9 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4ffa 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4ffb 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4ffc 05-20 18:21:47.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 gate 1589998907539953700 evaluation starts +[4ffd 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 signed by 0 principal evaluation starts (used [false]) +[4ffe 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 processing identity 0 with bytes of 115a110 +[4fff 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 principal matched by identity 0 +[5000 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[5001 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[5002 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 principal evaluation succeeds for identity 0 +[5003 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a62ae0 gate 1589998907539953700 evaluation succeeds +[5004 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[5005 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[5006 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[5007 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[5008 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[5009 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[500a 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[500b 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[500c 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[500d 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[500e 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[500f 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[5010 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[5011 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[5012 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 gate 1589998907541734100 evaluation starts +[5013 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 signed by 0 principal evaluation starts (used [false]) +[5014 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 processing identity 0 with bytes of 115a110 +[5015 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[5016 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 principal evaluation fails +[5017 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a763d0 gate 1589998907541734100 evaluation fails +[5018 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[5019 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[501a 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[501b 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 gate 1589998907542247500 evaluation starts +[501c 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 signed by 0 principal evaluation starts (used [false]) +[501d 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 processing identity 0 with bytes of 115a110 +[501e 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 principal matched by identity 0 +[501f 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[5020 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[5021 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 principal evaluation succeeds for identity 0 +[5022 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a76940 gate 1589998907542247500 evaluation succeeds +[5023 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[5024 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[5025 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[5026 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[5027 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[5028 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[5029 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[502a 05-20 18:21:47.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[502b 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[502c 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[502d 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[502e 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[502f 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[5030 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[5031 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[5032 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[5033 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[5034 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[5035 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[5036 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 gate 1589998907558020100 evaluation starts +[5037 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 signed by 0 principal evaluation starts (used [false]) +[5038 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 processing identity 0 with bytes of 115a110 +[5039 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[503a 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 principal evaluation fails +[503b 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9c590 gate 1589998907558020100 evaluation fails +[503c 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[503d 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[503e 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[503f 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 gate 1589998907558474800 evaluation starts +[5040 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 signed by 0 principal evaluation starts (used [false]) +[5041 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 processing identity 0 with bytes of 115a110 +[5042 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 principal matched by identity 0 +[5043 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[5044 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[5045 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 principal evaluation succeeds for identity 0 +[5046 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a9cb00 gate 1589998907558474800 evaluation succeeds +[5047 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[5048 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[5049 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[504a 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[504b 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[504c 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[504d 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[504e 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[504f 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5050 05-20 18:21:47.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5051 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[5052 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[5053 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[5054 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[5055 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[5056 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[5057 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 gate 1589998907615257600 evaluation starts +[5058 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 signed by 0 principal evaluation starts (used [false]) +[5059 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 processing identity 0 with bytes of 115a110 +[505a 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[505b 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 principal evaluation fails +[505c 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab4ae0 gate 1589998907615257600 evaluation fails +[505d 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[505e 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[505f 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[5060 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 gate 1589998907615608600 evaluation starts +[5061 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 signed by 0 principal evaluation starts (used [false]) +[5062 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 processing identity 0 with bytes of 115a110 +[5063 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 principal matched by identity 0 +[5064 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[5065 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[5066 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 principal evaluation succeeds for identity 0 +[5067 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ab5050 gate 1589998907615608600 evaluation succeeds +[5068 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[5069 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[506a 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[506b 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[506c 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[506d 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[506e 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 50 57 41 f4 04 e3 41 a5 8a 40 c2 44 f5 37 9e |.PWA...A..@.D.7.| +00000010 a3 0d 3b 43 fa f5 19 d0 6f 95 27 3a 96 8a df f7 |..;C....o.':....| +[506f 05-20 18:21:47.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da de 0e bd 01 33 b4 bd 88 0c 24 |0E.!......3....$| +00000010 35 2f 77 49 cb 3a a7 5a 08 65 20 5d 4b 62 f8 2c |5/wI.:.Z.e ]Kb.,| +00000020 ec c2 bf af e1 02 20 4e 28 b7 9f 83 6d b1 f9 ff |...... N(...m...| +00000030 b4 72 97 5f 28 c3 3e 03 99 60 26 32 7e b1 39 af |.r._(.>..`&2~.9.| +00000040 18 99 83 c3 cf 7e e8 |.....~.| +[5070 05-20 18:21:47.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5071 05-20 18:21:47.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5072 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[5073 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[5074 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[5075 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[5076 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[5077 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[5078 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 gate 1589998907703753600 evaluation starts +[5079 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 signed by 0 principal evaluation starts (used [false]) +[507a 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 processing identity 0 with bytes of 115a110 +[507b 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[507c 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 principal evaluation fails +[507d 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005accae0 gate 1589998907703753600 evaluation fails +[507e 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[507f 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[5080 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[5081 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 gate 1589998907704080300 evaluation starts +[5082 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 signed by 0 principal evaluation starts (used [false]) +[5083 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 processing identity 0 with bytes of 115a110 +[5084 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 principal matched by identity 0 +[5085 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 3c cd 94 9f 09 dc a1 27 f5 83 ed d3 70 fb 30 |.<......'....p.0| +00000010 77 c7 4c 83 97 9d c6 35 15 f8 2a 9a e0 08 f6 42 |w.L....5..*....B| +[5086 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 1b 85 df 3e c9 09 8c f3 e1 3b 87 |0D. i...>.....;.| +00000010 a1 dc c7 df 9f f2 4a ef 88 9a a1 68 59 d9 bd 19 |......J....hY...| +00000020 57 03 bb d3 02 20 30 6b 2a 8c 54 87 5a 5c 70 7e |W.... 0k*.T.Z\p~| +00000030 21 16 3d 7c 6b c1 ef b6 a3 47 e8 20 1e 38 f2 2e |!.=|k....G. .8..| +00000040 f2 eb 3e aa a2 ca |..>...| +[5087 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 principal evaluation succeeds for identity 0 +[5088 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005acd050 gate 1589998907704080300 evaluation succeeds +[5089 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[508a 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[508b 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[508c 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[508d 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 96 83 a8 20 b1 f5 19 22 6d 3e 1d 84 07 0e 94 |^... ..."m>.....| +00000010 aa 5f be 2b 2e 03 cb dc 21 1c b2 db 98 c5 3a 82 |._.+....!.....:.| +[508e 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 c6 92 72 eb 0d e2 92 06 1f 78 5d |0D. x..r......x]| +00000010 a1 6b 3c 10 15 a2 af 12 3f ea 3f b3 9e 00 0e 46 |.k<.....?.?....F| +00000020 bd e9 c8 aa 02 20 12 40 b9 67 90 2e 20 ff 18 0c |..... .@.g.. ...| +00000030 cc fc a5 ab 60 64 e1 bc 10 fb 89 a6 e3 ed 62 47 |....`d........bG| +00000040 43 f7 19 da 7f c7 |C.....| +[508f 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5090 05-20 18:21:47.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5091 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[5092 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[5093 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[5094 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[5095 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[5096 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[5097 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 gate 1589998907712302300 evaluation starts +[5098 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 signed by 0 principal evaluation starts (used [false]) +[5099 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 processing identity 0 with bytes of 115a110 +[509a 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[509b 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 principal evaluation fails +[509c 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2940 gate 1589998907712302300 evaluation fails +[509d 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[509e 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[509f 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[50a0 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 gate 1589998907715339900 evaluation starts +[50a1 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 signed by 0 principal evaluation starts (used [false]) +[50a2 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 processing identity 0 with bytes of 115a110 +[50a3 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 principal matched by identity 0 +[50a4 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 24 11 58 09 4c 1c 3f 65 00 8f 07 75 e5 6a b0 |.$.X.L.?e...u.j.| +00000010 f2 8a 47 30 4b 2a a6 7f 7d dc 6a 42 65 0a 52 49 |..G0K*..}.jBe.RI| +[50a5 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 50 b9 d6 67 8d dc 24 c0 e1 19 |0E.!..P..g..$...| +00000010 2a 97 4e 0a 8a d8 98 03 ad f4 6f d8 7a 08 b5 42 |*.N.......o.z..B| +00000020 16 4d 57 04 8e 02 20 68 e3 f8 ac 09 71 67 e7 6a |.MW... h....qg.j| +00000030 48 ad 04 7b 4c 23 05 6a 61 83 95 e9 c0 78 33 14 |H..{L#.ja....x3.| +00000040 4e b8 31 f6 de 34 4f |N.1..4O| +[50a6 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 principal evaluation succeeds for identity 0 +[50a7 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af2eb0 gate 1589998907715339900 evaluation succeeds +[50a8 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[50a9 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[50aa 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[50ab 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[50ac 05-20 18:21:47.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50ad 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50ae 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50af 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[50b0 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50b1 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50b2 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[50b3 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[50b4 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50b5 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[50b6 05-20 18:21:47.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[50b7 05-20 18:21:47.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[50b8 05-20 18:21:47.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50b9 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[50ba 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[50bb 05-20 18:21:47.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50bc 05-20 18:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50bd 05-20 18:21:47.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50be 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[50bf 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[50c0 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50c1 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50c2 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50c3 05-20 18:21:48.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50c4 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50c5 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50c6 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50c7 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50c8 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[50c9 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 a7 01 af e8 41 b4 5f 35 04 51 14 4d 3b 2d ab |.....A._5.Q.M;-.| +00000010 7c 17 8c 4c 41 e5 55 51 8e 4c 03 a2 ee c2 1b d5 ||..LA.UQ.L......| +[50ca 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 4c a3 49 9b 70 a6 f0 47 5c 03 |0E.!..L.I.p..G\.| +00000010 6d a6 13 9e f0 7a ad 66 a5 2f b0 e1 81 68 14 a5 |m....z.f./...h..| +00000020 00 f6 e5 47 d1 02 20 7d 3e ad 47 c1 ff 9a d4 6a |...G.. }>.G....j| +00000030 1a d9 87 bb 20 b6 0c ff 52 85 f6 02 42 d7 79 a0 |.... ...R...B.y.| +00000040 ec fe d3 0e 27 3a a5 |....':.| +[50cb 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50cc 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[50cd 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[50ce 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[50cf 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[50d0 05-20 18:21:48.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[50d2 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[50d3 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50d4 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50d5 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50d6 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50d1 05-20 18:21:48.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50d7 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50d8 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50d9 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50da 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50db 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50dc 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[50dd 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[50de 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[50df 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50e0 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50e1 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50e2 05-20 18:21:48.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50e3 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[50e4 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[50e5 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[50e6 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[50e7 05-20 18:21:48.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50e8 05-20 18:21:48.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50e9 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50ea 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50eb 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50ec 05-20 18:21:48.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50ed 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[50ee 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[50ef 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[50f0 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[50f1 05-20 18:21:48.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50f2 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50f3 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50f4 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50f5 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[50f6 05-20 18:21:48.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50f7 05-20 18:21:48.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[50f8 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[50f9 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[50fa 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[50fb 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[50fc 05-20 18:21:48.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +[50fd 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +00000040 b5 53 ae f9 1c 9a |.S....| +[50fe 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[50ff 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 73 9e ab d5 20 c7 6a 93 d0 f2 |0E.!..s... .j...| +00000010 a9 f2 4f 1c 05 98 2e 01 ca f1 2d dd f0 9c 2b 64 |..O.......-...+d| +00000020 1b e5 93 20 98 02 20 76 64 1b 1b af 08 e0 93 ff |... .. vd.......| +00000030 65 1d c4 67 00 17 d6 70 d7 b5 6f d1 61 2d e0 e7 |e..g...p..o.a-..| +00000040 f6 18 0b 99 92 53 27 |.....S'| +[5100 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[5101 05-20 18:21:48.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[5102 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[5103 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[5104 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[5105 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5106 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5108 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[5109 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[510a 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[510b 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[510c 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[510d 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[510e 05-20 18:21:48.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5107 05-20 18:21:48.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[510f 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5110 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5111 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5112 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5113 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[5114 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5115 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[5116 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[5117 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[5118 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[5119 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[511a 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[511b 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 gate 1589998908837856800 evaluation starts +[511c 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 signed by 0 principal evaluation starts (used [false]) +[511d 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 processing identity 0 with bytes of 115a110 +[511e 05-20 18:21:48.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[511f 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 principal evaluation fails +[5120 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43510 gate 1589998908837856800 evaluation fails +[5121 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[5122 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[5123 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[5124 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 gate 1589998908859773000 evaluation starts +[5125 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 signed by 0 principal evaluation starts (used [false]) +[5126 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 processing identity 0 with bytes of 115a110 +[5127 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 principal matched by identity 0 +[5128 05-20 18:21:48.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 a4 c4 7f 81 30 05 a6 a4 40 bf 11 9b bb 91 df |'....0...@......| +00000010 52 5b 4d 1d dd f5 26 91 a6 c1 6f 9c 2e 1b e4 75 |R[M...&...o....u| +[5129 05-20 18:21:48.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 60 c8 2c 6c 80 0b 87 74 0b 17 5b |0D. U`.,l...t..[| +00000010 72 1b aa 8b c2 6f 79 7a 13 07 70 6b d1 42 ec 25 |r....oyz..pk.B.%| +00000020 99 a9 7e ae 02 20 35 28 3e a3 1c bc 13 4d c3 fe |..~.. 5(>....M..| +00000030 53 61 4c 1e a2 55 ff 29 d9 cf 5a db 2f 17 09 c7 |SaL..U.)..Z./...| +00000040 31 0e 08 2a 96 7c |1..*.|| +[512a 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 principal evaluation succeeds for identity 0 +[512b 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b43a80 gate 1589998908859773000 evaluation succeeds +[512c 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[512d 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[512e 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[512f 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[5130 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5131 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[5132 05-20 18:21:48.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[5133 05-20 18:21:48.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[5134 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[5135 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5136 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5137 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5138 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[5139 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[513a 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[513b 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[513c 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[5141 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[5142 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[5143 05-20 18:21:48.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[513d 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[5144 05-20 18:21:48.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[513e 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[513f 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5145 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5140 05-20 18:21:48.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[5146 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5147 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5148 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5149 05-20 18:21:48.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[514a 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[514b 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[514c 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[514d 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[514e 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[514f 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5150 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5151 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5152 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[5153 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5154 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5155 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[5156 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5157 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5158 05-20 18:21:48.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5159 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[515a 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[515b 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[515c 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[515d 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[515e 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[515f 05-20 18:21:48.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[5160 05-20 18:21:48.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5161 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[5163 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[5164 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[5165 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5162 05-20 18:21:48.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[5166 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[5167 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5168 05-20 18:21:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[5169 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[516a 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[516b 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[516d 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[516e 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[516f 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[5170 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[5171 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[5172 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 gate 1589998908994619700 evaluation starts +[5173 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 signed by 0 principal evaluation starts (used [false]) +[516c 05-20 18:21:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[5174 05-20 18:21:49.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[5175 05-20 18:21:48.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 processing identity 0 with bytes of 115a110 +[5176 05-20 18:21:49.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[5177 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[517c 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161044 +[517e 05-20 18:21:49.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 principal evaluation fails +[517f 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbc930 gate 1589998908994619700 evaluation fails +[5180 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[5181 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[5182 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[5183 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 gate 1589998909167897100 evaluation starts +[5184 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 signed by 0 principal evaluation starts (used [false]) +[5185 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 processing identity 0 with bytes of 115a110 +[5186 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 principal matched by identity 0 +[5187 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +[5188 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +00000040 b8 39 f0 63 a1 80 |.9.c..| +[517d 05-20 18:21:49.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1E086040D84D097DED612FD177DFCF5D45A2FCA8806692D4E66AE3618A91CEC5 +[5189 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[518a 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[518b 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[518c 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[5179 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[517a 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[518d 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 principal evaluation succeeds for identity 0 +[518e 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bbcea0 gate 1589998909167897100 evaluation succeeds +[518f 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[5190 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[5191 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[5192 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[5193 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5194 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5195 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[5196 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[5178 05-20 18:21:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[5197 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[5198 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C08DCCD8BCE96EFB388161045 +[5199 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[519a 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A75E0EDF0F77AAF07340A27381B738812642B60E14004E31EC4787B3434B432D +[519b 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[519c 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[519d 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[519e 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[519f 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51a0 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[51a1 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[51a2 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[51a3 05-20 18:21:49.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[51a4 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51a5 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[51a6 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[51a7 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[51a8 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[51a9 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[51aa 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[51ab 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 gate 1589998909183847400 evaluation starts +[51ac 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 signed by 0 principal evaluation starts (used [false]) +[51ad 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 processing identity 0 with bytes of 115a110 +[51ae 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[51af 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 principal evaluation fails +[51b0 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0640 gate 1589998909183847400 evaluation fails +[51b1 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[51b2 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[51b3 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[51b4 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 gate 1589998909184152900 evaluation starts +[51b5 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 signed by 0 principal evaluation starts (used [false]) +[51b6 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 processing identity 0 with bytes of 115a110 +[51b7 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 principal matched by identity 0 +[51b8 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 80 70 aa 7d 55 1d fd 38 8e 08 53 48 10 8a 61 |..p.}U..8..SH..a| +00000010 e3 ad e6 10 47 25 4c b1 61 4b e6 23 3d 3b 87 c3 |....G%L.aK.#=;..| +[51b9 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 fb 71 2b 8b 3a 90 f3 45 b4 e6 |0E.!...q+.:..E..| +00000010 c3 fe 0d 84 fa 40 cd 7e 3c bb 51 d9 f2 6b 55 82 |.....@.~<.Q..kU.| +00000020 51 8f 6d 81 9b 02 20 51 7a 21 9d 30 4e 81 25 f9 |Q.m... Qz!.0N.%.| +00000030 3c c7 38 b5 c5 4d 90 35 cc d9 67 be 32 83 be a9 |<.8..M.5..g.2...| +00000040 bb 5d 86 86 59 0e 5c |.]..Y.\| +[51ba 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 principal evaluation succeeds for identity 0 +[51bb 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bf0bb0 gate 1589998909184152900 evaluation succeeds +[51bc 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[51bd 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[51be 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[51bf 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[51c0 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[51c1 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[51c2 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[51c3 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[51c4 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[51c5 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51c6 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51c7 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51c8 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51c9 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[51ca 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51cb 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[51cc 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51cd 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[51ce 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51cf 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51d0 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51d1 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[51d2 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[51d4 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[51d5 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51d6 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51d7 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51d8 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51d9 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[51da 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[51db 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51dc 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[51dd 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51de 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51df 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51e0 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51e1 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[51e2 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51e3 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51e4 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[51e5 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[51e6 05-20 18:21:49.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51e7 05-20 18:21:49.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[51e8 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51e9 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[51ea 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51eb 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[517b 05-20 18:21:49.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[51ed 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[51ee 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51ec 05-20 18:21:49.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[51f0 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51ef 05-20 18:21:49.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[51f1 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[51f2 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51f3 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[51f4 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51d3 05-20 18:21:49.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[51f5 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51f6 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[51f7 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[51f8 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[51f9 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[51fa 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51fb 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[51fc 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51fd 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[51fe 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[51ff 05-20 18:21:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[5200 05-20 18:21:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5201 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5202 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[5203 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5204 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5205 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5206 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5207 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[5208 05-20 18:21:49.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[5209 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[520a 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[520b 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[520c 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[520d 05-20 18:21:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[520e 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[520f 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5210 05-20 18:21:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[5211 05-20 18:21:49.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5212 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[5213 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5214 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[5215 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5216 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[5217 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[5218 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5219 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[521a 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[521b 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[521c 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[521d 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[521e 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[521f 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 gate 1589998909303947300 evaluation starts +[5220 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 signed by 0 principal evaluation starts (used [false]) +[5221 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 processing identity 0 with bytes of 115a110 +[5222 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[5223 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 principal evaluation fails +[5224 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52770 gate 1589998909303947300 evaluation fails +[5225 05-20 18:21:49.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[5227 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[5228 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[5229 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 gate 1589998909327689500 evaluation starts +[522a 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 signed by 0 principal evaluation starts (used [false]) +[522b 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 processing identity 0 with bytes of 115a110 +[5226 05-20 18:21:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[522c 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[522d 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 principal matched by identity 0 +[522e 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +[522f 05-20 18:21:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +[5230 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 principal evaluation succeeds for identity 0 +[5231 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c52ce0 gate 1589998909327689500 evaluation succeeds +[5232 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[5233 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[5234 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[5235 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[5236 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[5237 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[5238 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[5239 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[523a 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[523b 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[523c 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[523d 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[523e 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[523f 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[5240 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +[5241 05-20 18:21:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +00000040 f5 4a 8c da c5 43 |.J...C| +[5242 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[5243 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 38 5f c7 30 5b da ef 5c ef 94 |0E.!..8_.0[..\..| +00000010 fa 3a 3c a1 45 a8 84 89 12 c1 76 ed 60 c9 b5 43 |.:<.E.....v.`..C| +00000020 69 51 21 c9 7e 02 20 0d b8 7c 38 68 0f c8 da c6 |iQ!.~. ..|8h....| +00000030 d4 c0 6a 33 af 5b f3 7c e2 a1 a4 c3 54 7f fd 00 |..j3.[.|....T...| +00000040 c1 4d d9 46 03 28 54 |.M.F.(T| +[5244 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[5245 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[5246 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5247 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5248 05-20 18:21:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5249 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[524a 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[524b 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[524c 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[524d 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[524e 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[524f 05-20 18:21:49.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5250 05-20 18:21:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[5251 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[5252 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[5253 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5254 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[5255 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[5256 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5257 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[5258 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[5259 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[525a 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[525b 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[525c 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[525d 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 gate 1589998909475432700 evaluation starts +[525e 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 signed by 0 principal evaluation starts (used [false]) +[525f 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 processing identity 0 with bytes of 115a110 +[5260 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[5261 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 principal evaluation fails +[5262 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c69e40 gate 1589998909475432700 evaluation fails +[5263 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[5264 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[5265 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[5266 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 gate 1589998909476525700 evaluation starts +[5267 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 signed by 0 principal evaluation starts (used [false]) +[5268 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 processing identity 0 with bytes of 115a110 +[5269 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 principal matched by identity 0 +[526a 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bb 45 38 6a 4d de c3 fa 9c fd 85 9c 16 76 18 4b |.E8jM........v.K| +00000010 8b 45 1b 99 51 1b f6 34 e0 af ef ac 4b 97 53 47 |.E..Q..4....K.SG| +[526b 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 df 60 16 96 07 d6 f9 5b 83 89 e1 |0D. F.`.....[...| +00000010 66 8b af 5f 9c f0 60 b1 d8 cb d2 c8 a3 65 a5 64 |f.._..`......e.d| +00000020 dc fc 3b cb 02 20 14 a1 d0 e2 30 62 93 9b 75 df |..;.. ....0b..u.| +00000030 db a3 ae e2 3c 93 7e a5 7f e2 df 31 ad 05 31 0f |....<.~....1..1.| +00000040 b8 39 f0 63 a1 80 |.9.c..| +[526c 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 principal evaluation succeeds for identity 0 +[526d 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c863b0 gate 1589998909476525700 evaluation succeeds +[526e 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[526f 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[5270 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[5271 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[5272 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5273 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5274 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[5275 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +[5276 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +00000040 f5 4a 8c da c5 43 |.J...C| +[5277 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5278 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5279 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[527a 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[527b 05-20 18:21:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[527c 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[527d 05-20 18:21:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +[527e 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +00000040 b5 53 ae f9 1c 9a |.S....| +[527f 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[5280 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5281 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5282 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[5283 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[5284 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5285 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[5286 05-20 18:21:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[5287 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[5288 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[5289 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[528a 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[528b 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[528c 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 gate 1589998909510812100 evaluation starts +[528d 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 signed by 0 principal evaluation starts (used [false]) +[528e 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 processing identity 0 with bytes of 115a110 +[528f 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[5290 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 principal evaluation fails +[5291 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca0ac0 gate 1589998909510812100 evaluation fails +[5292 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[5293 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[5294 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[5295 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 gate 1589998909511186800 evaluation starts +[5296 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 signed by 0 principal evaluation starts (used [false]) +[5297 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 processing identity 0 with bytes of 115a110 +[5298 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 principal matched by identity 0 +[5299 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 60 62 a9 f6 4a 0f 17 75 fe 2a c1 03 f4 42 eb |.`b..J..u.*...B.| +00000010 24 82 1c e8 8c 28 2a 6e d5 45 b1 3d 16 ac e1 be |$....(*n.E.=....| +[529a 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 ef 16 18 da be e0 66 43 86 0c |0E.!........fC..| +00000010 6c e4 af d5 1d 24 88 7d 8a 04 03 df b4 dc 3a ee |l....$.}......:.| +00000020 5a e4 d3 ee 89 02 20 48 57 13 cc cb f1 e3 2b 82 |Z..... HW.....+.| +00000030 d0 07 ed e4 e6 91 51 ec bb 8a e0 4c 6c 7e 61 b7 |......Q....Ll~a.| +00000040 db 66 15 5a 12 77 b4 |.f.Z.w.| +[529b 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 principal evaluation succeeds for identity 0 +[529c 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ca1030 gate 1589998909511186800 evaluation succeeds +[529d 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[529e 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[529f 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[52a0 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[52a1 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[52a2 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[52a3 05-20 18:21:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[52a4 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c ab 7b e6 46 e4 58 bc 84 5b f5 e8 10 07 e1 da |..{.F.X..[......| +00000010 df d7 8a 72 bb 16 d5 9e ee 4e 44 38 f6 7d 3e 5d |...r.....ND8.}>]| +[52a5 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 f3 67 04 12 90 a9 2c 21 f8 99 |0D. k..g....,!..| +00000010 9e 61 a0 c8 ca 7e 8a ab 92 c0 fe 7c 01 c0 79 14 |.a...~.....|..y.| +00000020 df 1b 7d 78 02 20 70 0d 81 c9 23 57 66 93 81 f6 |..}x. p...#Wf...| +00000030 6a 2e b7 00 16 3a a2 54 8a 1c 07 20 79 44 12 39 |j....:.T... yD.9| +00000040 b5 53 ae f9 1c 9a |.S....| +[52a6 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[52a7 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[52a8 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[52a9 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 5e 0e df 0f 77 aa f0 73 40 a2 73 81 b7 38 81 |.^...w..s@.s..8.| +00000010 26 42 b6 0e 14 00 4e 31 ec 47 87 b3 43 4b 43 2d |&B....N1.G..CKC-| +[52aa 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 01 4d 99 fd a0 a2 11 46 4f 6a f9 |0D. \.M.....FOj.| +00000010 92 62 5d b2 82 fb b9 1c 4f 40 b7 b6 a1 8f d4 01 |.b].....O@......| +00000020 d7 cf 69 12 02 20 5b ac 76 3d d8 87 ac a7 eb 95 |..i.. [.v=......| +00000030 3f 4c 24 d3 c5 6f 12 b2 e7 ce 18 4c 22 0f 73 9f |?L$..o.....L".s.| +00000040 f5 4a 8c da c5 43 |.J...C| +[52ab 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[52ac 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[52ad 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[52ae 05-20 18:21:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting diff --git a/hyperledger_fabric/v1.4.7/scripts/download_images.sh b/hyperledger_fabric/v1.4.7/scripts/download_images.sh new file mode 100644 index 00000000..13e2df34 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/download_images.sh @@ -0,0 +1,73 @@ +#!/usr/bin/env bash + +# peer/orderer/ca/ccenv/tools/javaenv/baseos: 1.4, 1.4.0, 1.4.1, 2.0.0, latest +# baseimage (runtime for golang chaincode)/couchdb: 0.4.15, latest +# Noted: +# * the fabric-baseos 1.4/2.0 tags are not available at dockerhub yet, only latest/0.4.15 now +# * the fabric-nodeenv is not available at dockerhub yet + +# In core.yaml, it requires: +# * fabric-ccenv:$(PROJECT_VERSION) +# * fabric-baseos:$(PROJECT_VERSION) +# * fabric-javaenv:latest +# * fabric-nodeenv:latest + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# pull_image image_name +pull_image() { + IMG=$1 + FORCED="false" + if [ "$#" -eq 2 ]; then + FORCED=$2 + fi + if [ ! -z "$(docker images -q ${IMG} 2> /dev/null)" ] && [ "$FORCED" != "true" ]; then # existed and not forced to update + echo "${IMG} already exists and not forced to update " + else + docker pull ${IMG} + fi +} + +echo "Downloading images from DockerHub... need a while" + +# TODO: we may need some checking on pulling result? +echo "=== Pulling yeasy/hyperledger-fabric-* images with tag ${FABRIC_IMG_TAG}... ===" +for IMG in base peer orderer ca; do + pull_image "yeasy/hyperledger-fabric-${IMG}:$FABRIC_IMG_TAG" "true" & +done + +pull_image yeasy/hyperledger-fabric:$FABRIC_IMG_TAG + +# pull_image yeasy/blockchain-explorer:0.1.0-preview # TODO: wait for official images +echo "=== Pulling fabric core images ${FABRIC_IMG_TAG} from fabric repo... ===" +for IMG in peer orderer ca ccenv tools baseos javaenv nodeenv; do + pull_image hyperledger/fabric-${IMG}:$FABRIC_IMG_TAG & # e.g., v1.4.4 +done + +# core.yaml requires a PROJECT_VERSION tag, only need when testing latest code +docker tag hyperledger/fabric-ccenv:$FABRIC_IMG_TAG hyperledger/fabric-ccenv:${PROJECT_VERSION} + +echo "=== Pulling base/3rd-party images with tag ${BASE_IMG_TAG} from fabric repo... ===" +for IMG in baseimage baseos couchdb kafka zookeeper; do + pull_image hyperledger/fabric-${IMG}:$BASE_IMG_TAG & # e.g., 0.4.18 +done + +if [ ${PROJECT_VERSION} == "2.0.0" ]; then + pull_image hyperledger/fabric-javaenv:latest # core.yaml requires a latest tag + # core.yaml requires a latest tag, but nodeenv is not available in docker hub yet + # pull_image hyperledger/fabric-nodeenv:latest + pull_image hyperledger/fabric-baseos:latest # fabric-baseos does not have 1.4/2.0 tag yet, but core.yaml requires a PROJECT_VERSION tag + docker tag hyperledger/fabric-baseos:latest hyperledger/fabric-baseos:${PROJECT_VERSION} +fi + +echo "Image pulling done, now can startup the network using make start..." + +exit 0 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/scripts/env_cleanup.sh b/hyperledger_fabric/v1.4.7/scripts/env_cleanup.sh new file mode 100644 index 00000000..c9ec1766 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/env_cleanup.sh @@ -0,0 +1,17 @@ +#!/usr/bin/env bash + +# This script will remove all containers and hyperledger related images + +echo "Clean up all containers..." +docker rm -f `docker ps -qa` + +echo "Clean up all chaincode images..." +docker rmi -f $(docker images |grep 'dev-peer'|awk '{print $3}') + +echo "Clean up all hyperledger related images..." +docker rmi -f $(docker images |grep 'hyperledger'|awk '{print $3}') + +echo "Clean up dangling images..." +docker rmi $(docker images -q -f dangling=true) + +echo "Env cleanup done!" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/scripts/env_setup.sh b/hyperledger_fabric/v1.4.7/scripts/env_setup.sh new file mode 100644 index 00000000..58888918 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/env_setup.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# Install docker on Ubuntu/Debian system + +install_docker() { + echo "Install Docker..." + wget -qO- https://get.docker.com/ | sh + sudo service docker stop + #nohup sudo docker daemon --api-cors-header="*" -H tcp://0.0.0.0:2375 -H unix:///var/run/docker.sock& + echo "Docker Installation Done" +} + +install_docker_compose() { + echo "Install Docker-Compose..." + command -v "curl" >/dev/null 2>&1 || sudo apt-get update && apt-get install curl -y + curl -L https://github.com/docker/compose/releases/download/1.17.0/docker-compose-`uname -s`-`uname -m` > /usr/local/bin/docker-compose + sudo chmod +x /usr/local/bin/docker-compose + docker-compose --version + echo "Docker-Compose Installation Done" +} + +command -v "docker" >/dev/null 2>&1 && echo "Docker already installed" || install_docker + +command -v "docker-compose" >/dev/null 2>&1 && echo "Docker-Compose already installed" || install_docker_compose + +command -v "jq" >/dev/null 2>&1 && echo "jq already installed" || sudo apt-get install jq + + +echo "Create default docker network for usage" +docker network create hlf_net diff --git a/hyperledger_fabric/v1.4.7/scripts/func.sh b/hyperledger_fabric/v1.4.7/scripts/func.sh new file mode 100644 index 00000000..49c43a71 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/func.sh @@ -0,0 +1,978 @@ +#!/usr/bin/env bash + +echo_r () { + [ $# -ne 1 ] && return 0 + echo -e "\033[31m$1\033[0m" +} +echo_g () { + [ $# -ne 1 ] && return 0 + echo -e "\033[32m$1\033[0m" +} +echo_y () { + [ $# -ne 1 ] && return 0 + echo -e "\033[33m$1\033[0m" +} +echo_b () { + [ $# -ne 1 ] && return 0 + echo -e "\033[34m$1\033[0m" +} + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# Verify $1 is not 0, then output error msg $2 and exit +verifyResult () { + if [ $1 -ne 0 ] ; then + echo "$2" + echo_r "=== ERROR !!! FAILED to execute End-2-End Scenario ===" + exit 1 + fi +} + +# set env to use orderOrg's identity +setOrdererEnvs () { + export CORE_PEER_LOCALMSPID="OrdererMSP" + export CORE_PEER_MSPCONFIGPATH=${ORDERER0_ADMIN_MSP} + export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER0_TLS_ROOTCERT} + #t="\${ORG${org}_PEER${peer}_URL}" && CORE_PEER_ADDRESS=`eval echo $t` +} + +# Set global env variables for fabric cli, after setting: +# client is the admin as given org +# TLS root cert is configured to given peer's tls ca +# remote peer address is configured to given peer's + +# CORE_PEER_LOCALMSPID=Org1MSP # local msp id to use +# CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp # local msp path to use +# CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt # local trusted tls ca cert +# CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # remote peer to send proposal to + +# Usage: setEnvs org peer +setEnvs () { + local org=$1 # 1 or 2 + local peer=$2 # 0 or 1 + [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + local t="" + export CORE_PEER_LOCALMSPID="Org${org}MSP" + #CORE_PEER_MSPCONFIGPATH=\$${ORG${org}_ADMIN_MSP} + t="\${ORG${org}_PEER${peer}_URL}" && export CORE_PEER_ADDRESS=`eval echo $t` + t="\${ORG${org}_ADMIN_MSP}" && export CORE_PEER_MSPCONFIGPATH=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && export CORE_PEER_TLS_ROOTCERT_FILE=`eval echo $t` + + #env |grep CORE +} + +# Internal func called by channelCreate +# channelCreateAction channel tx orderer_url orderer_tls_rootcert +channelCreateAction(){ + local channel=$1 + local channel_tx=$2 + local orderer_url=$3 + local orderer_tls_rootcert=$4 + + if [ -z "$CORE_PEER_TLS_ENABLED" ] || [ "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" + else + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" \ + --tls \ + --cafile ${orderer_tls_rootcert} + fi + return $? +} + +# Use peer0/org1's identity to create a channel +# channelCreate APP_CHANNEL APP_CHANNEL.tx org peer orderer_url orderer_tls_rootcert +channelCreate() { + local channel=$1 + local tx=$2 + local org=$3 + local peer=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Create Channel ${channel} by org $org/peer $peer === " + setEnvs $org $peer + local rc=1 + local counter=0 + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + channelCreateAction ${channel} ${tx} ${orderer_url} ${orderer_tls_rootcert} + rc=$? + let counter=${counter}+1 + #COUNTER=` expr $COUNTER + 1` + [ $rc -ne 0 ] && echo "Failed to create channel $channel, retry after 3s" && sleep 3 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "Channel ${channel} creation failed" + echo "=== Channel ${channel} is created. === " +} + +# called by channelJoinWithRetry +channelJoinAction () { + local channel=$1 + peer channel join \ + -b ${channel}.block \ + >&log.txt +} + +## Sometimes Join takes time hence RETRY atleast for 5 times +channelJoinWithRetry () { + local channel=$1 + local peer=$2 + local counter=0 + channelJoinAction ${channel} + local rc=$? + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + echo "peer${peer} failed to join channel ${channel}, retry after 2s" + sleep 2 + channelJoinAction ${channel} + rc=$? + let counter=${counter}+1 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "After $MAX_RETRY attempts, peer${peer} failed to Join the Channel" +} + +# Join given (by default all) peers into the channel +# channelJoin channel org peer +channelJoin () { + local channel=$1 + local org=$2 + local peer=$3 + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Join org $org/peer $peer into channel ${channel} === " + setEnvs $org $peer + channelJoinWithRetry ${channel} $peer + echo "=== org $org/peer $peer joined into channel ${channel} === " +} + +getShasum () { + [ ! $# -eq 1 ] && exit 1 + shasum ${1} | awk '{print $1}' +} + +# List the channel that the peer joined +# E.g., for peer 0 at org 1, will do +# channelList 1 0 +channelList () { + local org=$1 + local peer=$2 + echo "=== List the channels that org${org}/peer${peer} joined === " + + setEnvs $org $peer + + peer channel list >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Failed to list the channels that org${org}/peer${peer} joined === " + else + echo "=== Done to list the channels that org${org}/peer${peer} joined === " + fi +} + +# Get the info of specific channel, including {height, currentBlockHash, previousBlockHash}. +# E.g., for peer 0 at org 1, get info of business channel will do +# channelGetInfo businesschannel 1 0 +channelGetInfo () { + local channel=$1 + local org=$2 + local peer=$3 + echo "=== Get channel info (height, currentBlockHash, previousBlockHash) of ${channel} with id of org${org}/peer${peer} === " + + setEnvs $org $peer + + peer channel getinfo -c ${channel} >&log.txt + rc=$? + cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Fail to get channel info of ${channel} with id of org${org}/peer${peer} === " + else + echo "=== Done to get channel info of ${channel} with id of org${org}/peer${peer} === " + fi +} + +# Fetch all blocks for a channel +# Usage: channelFetchAll channel org peer orderer_url orderer_tls_rootcert +channelFetchAll () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + + echo "=== Fetch all block for channel $channel === " + + local block_file=/tmp/${channel}_newest.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "newest" ${block_file} + [ $? -ne 0 ] && exit 1 + newest_block_shasum=$(getShasum ${block_file}) + echo "fetch newest block ${block_file} with shasum=${newest_block_shasum}" + + block_file=${CHANNEL_ARTIFACTS}/${channel}_config.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "config" ${block_file} + [ $? -ne 0 ] && exit 1 + echo "fetch config block ${block_file}" + + for i in $(seq 0 16); do # we at most fetch 16 blocks + block_file=${CHANNEL_ARTIFACTS}/${channel}_${i}.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} $i ${block_file} + [ $? -ne 0 ] && exit 1 + [ -f $block_file ] || break + echo "fetch block $i and saved into ${block_file}" + block_shasum=$(getShasum ${block_file}) + [ ${block_shasum} = ${newest_block_shasum} ] && { echo "Block $i is the last one for channel $channel"; break; } + done +} + +# Fetch some block from a given channel +# channelFetch channel org peer orderer_url blockNum block_file +channelFetch () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local num=$6 + local block_file=$7 + echo "=== Fetch block $num of channel $channel === " + + #setEnvs $org $peer + setOrdererEnvs # system channel required id from ordererOrg + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "${CORE_PEER_TLS_ENABLED}" ] || [ "${CORE_PEER_TLS_ENABLED}" = "false" ]; then + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + >&log.txt + else + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + if [ $? -ne 0 ]; then + cat log.txt + echo_r "Fetch block $num of channel $channel failed" + return 1 + else + echo "=== Fetch block $num of channel $channel OK === " + return 0 + fi +} + +# Sign a channel config tx +# Usage: channelSignConfigTx channel org peer transaction +channelSignConfigTx () { + local channel=$1 + local org=$2 + local peer=$3 + local tx=$4 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + echo "=== Sign channel config tx $tx for channel $channel by org $org/peer $peer === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + + setEnvs $org $peer + + peer channel signconfigtx -f ${CHANNEL_ARTIFACTS}/${tx} >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo_r "Sign channel config tx for channel $channel by org $org/peer $peer failed" + else + echo "=== Sign channel config tx channel $channel by org $org/peer $peer is successful === " + fi +} + +# Update a channel config +# Usage: channelUpdate channel org peer orderer_url orderer_tls_rootcert transaction_file +channelUpdate() { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local tx=$6 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + setEnvs $org $peer + echo "=== Update config on channel ${channel} === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + >&log.txt + else + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "peer channel update failed" + echo "=== Channel ${channel} is updated. === " + sleep 2 +} + +# Install chaincode on the peer node +# In v2.x it will package, install and approve +# chaincodeInstall peer cc_name version path [lang] +chaincodeInstall () { + if [ "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode install" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local name=$5 + local version=$6 + local path=$7 + local lang="golang" + if [ "$#" -eq 8 ]; then + local lang=$8 + fi + + [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $version ] && [ -z $path ] && echo_r "input param invalid" && exit -1 + echo "=== Install Chaincode on org ${org}/peer ${peer} === " + echo "name=${name}, version=${version}, path=${path}" + setEnvs $org $peer + peer chaincode install \ + -n ${name} \ + -v $version \ + -p ${path} \ + -l ${lang} \ + >&log.txt + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode installation on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is installed on org ${org}/peer $peer === " +} + +# Approve the chaincode definition +# chaincodeApprove channel org peer peer_url peer_tls_root_cert orderer_url orderer_tls_rootcert channel name version +chaincodeApprove () { + if [ "$#" -ne 9 -a "$#" -ne 11 ]; then + echo_r "Wrong param number for chaincode approve" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + local channel=$7 + local name=$8 + local version=$9 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "${10}" ]; then + collection_config=${10} + fi + + if [ ! -z "${11}" ]; then + policy=${12} + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + cat query.log + local label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + echo "Approve package id=${package_id} by Org ${org}/Peer ${peer}" + + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} >&log.txt + else + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Approval on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is approved on remote peer$peer === " +} + +# Query the Approve the chaincode definition +# chaincodeQueryApprove channel org peer name version +chaincodeQueryApprove () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode queryapproval" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + local version=$7 + + setEnvs $org $peer + + echo "Query the approval status of the chaincode $name $version" + peer lifecycle chaincode queryapprovalstatus \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryApproval Failed: org ${org}/peer$peer" +} + +# Anyone can commit the chaincode definition once it's approved by major +# chaincodeCommit org peer channel orderer_url orderer_tls_rootcert name version [collection-config] [endorse-policy] +chaincodeCommit () { + if [ "$#" -ne 7 -a "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode commit" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local name=$6 + local version=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 # chaincode endorsement policy + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + + echo "Committing package id=${package_id} by Org ${org}/Peer ${peer}" + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" + else + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Commit on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is committed on channel $channel === " +} + +# Query the Commit the chaincode definition +# chaincodeQueryCommitted org peer peer_url peer_tls_root_cert channel cc_name +chaincodeQueryCommitted () { + if [ "$#" -ne 6 ]; then + echo_r "Wrong param number for chaincode querycommit" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + + setEnvs $org $peer + + echo "Query the committed status of chaincode $name with ${ORG1_PEER0_URL} " + peer lifecycle chaincode querycommitted \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryCommit Failed: org ${org}/peer$peer" +} + + +# Instantiate chaincode on specifized peer node +# chaincodeInstantiate channel org peer orderer_url name version args +chaincodeInstantiate () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 + fi + + setEnvs $org $peer + echo "=== chaincodeInstantiate for channel ${channel} on org $org/peer $peer ====" + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeInstantiation on org $org/peer$peer in channel ${channel} failed" + echo "=== Chaincode Instantiated in channel ${channel} by peer$peer ===" +} + +# Invoke the Init func of chaincode to start the container +# Usage: chaincodeInit org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInit () { + if [ "$#" -ne 8 ]; then + echo_r "Wrong param number for chaincode Init" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer=$4 + local name=$5 + local args=$6 + local peer_url=$7 + local peer_org_tlsca=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInit to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Init failed: peer$peer in channel ${channel}" + echo "=== Chaincode Init done: peer$peer in channel ${channel} === " +} + +# Usage: chaincodeInvoke org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInvoke () { + if [ "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode Invoke" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local orderer_url=$6 + local orderer_tls_rootcert=$7 + local name=$8 + local args=$9 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInvoke to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Invoke execution on peer$peer failed " + echo "=== Invoke transaction on peer$peer in channel ${channel} is successful === " +} + +# query org peer channel name args expected_result +chaincodeQuery () { + if [ "$#" -ne 7 -a "$#" -ne 8 ]; then + echo_r "Wrong param number $# for chaincode Query" + echo $* + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local name=$6 + local args=$7 + local expected_result="" + + [ $# -eq 8 ] && local expected_result=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + + echo "=== chaincodeQuery to org $org/peer $peer === " + echo "channel=${channel}, name=${name}, args=${args}, expected_result=${expected_result}" + local rc=1 + local starttime=$(date +%s) + + setEnvs $org $peer + + # we either get a successful response, or reach TIMEOUT + while [ "$(($(date +%s)-starttime))" -lt "$TIMEOUT" -a $rc -ne 0 ]; do + echo "Attempting to Query org ${org}/peer ${peer} ...$(($(date +%s)-starttime)) secs" + peer chaincode query \ + -C "${channel}" \ + -n "${name}" \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c "${args}" \ + >&log.txt + rc=$? + if [ -n "${expected_result}" ]; then # need to check the result + test $? -eq 0 && VALUE=$(cat log.txt | awk 'END {print $NF}') + if [ "$VALUE" = "${expected_result}" ]; then + let rc=0 + echo_b "$VALUE == ${expected_result}, passed" + else + let rc=1 + echo_b "$VALUE != ${expected_result}, will retry" + fi + fi + if [ $rc -ne 0 ]; then + cat log.txt + sleep 2 + fi + done + + # rc==0, or timeout + if [ $rc -eq 0 ]; then + echo "=== Query is done: org $org/peer$peer in channel ${channel} === " + else + echo_r "=== Query failed: org $org/peer$peer, run `make stop clean` to clean ===" + exit 1 + fi +} + +# List Installed chaincode on specified peer node, and instantiated chaincodes at specific channel +# chaincodeList org1 peer0 businesschannel +chaincodeList () { + local org=$1 + local peer=$2 + local channel=$3 + + [ -z $org ] && [ -z $peer ] && [ -z $channel ] && echo_r "input param invalid" && exit -1 + echo "=== ChaincodeList on org ${org}/peer ${peer} === " + setEnvs $org $peer + echo_b "Get installed chaincodes at peer$peer.org$org" + peer chaincode list \ + --installed > log.txt & + # \ + #--peerAddresses "peer${peer}.org${org}.example.com" --tls false + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + + echo_b "Get instantiated chaincodes at channel $org" + peer chaincode list \ + --instantiated \ + -C ${channel} > log.txt & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + echo "=== ChaincodeList is done at peer${peer}.org${org} === " +} + +# Start chaincode with dev mode +# TODO: use variables instead of hard-coded value +chaincodeStartDev () { + local peer=$1 + local version=$2 + [ -z $peer ] && [ -z $version ] && echo_r "input param invalid" && exit -1 + setEnvs 1 0 + CORE_CHAINCODE_LOGLEVEL=debug \ + CORE_PEER_ADDRESS=peer${peer}.org1.example.com:7052 \ + CORE_CHAINCODE_ID_NAME=${CC_02_NAME}:${version} \ + nohup ./scripts/chaincode_example02 > chaincode_dev.log & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode start in dev mode has Failed" + echo "=== Chaincode started in dev mode === " +} + +# chaincodeUpgrade channel org peer orderer_url name version args +chaincodeUpgrade () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + echo "=== chaincodeUpgrade to orderer by id of org ${org}/peer $peer === " + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Upgrade execution on peer$peer failed " + echo "=== Upgrade transaction on peer$peer in channel ${channel} is successful === " +} + +# configtxlator encode json to pb +# Usage: configtxlatorEncode msgType input output +configtxlatorEncode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Encode $input --> $output using type $msgType" + docker exec -it ${CTL_CONTAINER} configtxlator proto_encode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @${input} \ + # ${CTL_ENCODE_URL}/${msgType} \ + # >${output} +} + +# configtxlator decode pb to json +# Usage: configtxlatorEncode msgType input output +configtxlatorDecode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Config Decode $input --> $output using type $msgType" + if [ ! -f $input ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator proto_decode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @"${input}" \ + # "${CTL_DECODE_URL}/${msgType}" \ + # > "${output}" +} + +# compute diff between two pb +# Usage: configtxlatorCompare channel origin updated output +configtxlatorCompare() { + local channel=$1 + local origin=$2 + local updated=$3 + local output=$4 + + echo "Config Compare $origin vs $updated > ${output} in channel $channel" + if [ ! -f $origin ] || [ ! -f $updated ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator compute_update \ + --original=${origin} \ + --updated=${updated} \ + --channel_id=${channel} \ + --output=${output} + + #curl -sX POST \ + # -F channel="${channel}" \ + # -F "original=@${origin}" \ + # -F "updated=@${updated}" \ + # "${CTL_COMPARE_URL}" \ + # > "${output}" + + [ $? -eq 0 ] || echo_r "Failed to compute config update" +} + +# Run cmd inside the config generator container +gen_con_exec() { + docker exec -it $GEN_CONTAINER "$@" +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/scripts/gen_channelArtifacts.sh b/hyperledger_fabric/v1.4.7/scripts/gen_channelArtifacts.sh new file mode 100644 index 00000000..052d1e2b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/gen_channelArtifacts.sh @@ -0,0 +1,81 @@ +#!/usr/bin/env bash + +# Use ${FABRIC_CFG_PATH}/configtx.yaml to generate following materials, +# and put under /tmp/$CHANNEL_ARTIFACTS: +# system channel genesis block +# new app channel tx +# update anchor peer tx + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f /scripts/variables.sh ]; then + source /scripts/variables.sh +else + echo "Cannot find the variables.sh files, pls check" + exit 1 +fi + +cd /tmp/${CHANNEL_ARTIFACTS} # all generated materials will be put under /tmp/$CHANNEL_ARTIFACTS + +echo "Generate genesis block of system channel using configtx.yaml" +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && \ +configtxgen \ + -configPath /tmp \ + -channelID ${SYS_CHANNEL} \ + -profile ${ORDERER_GENESIS_PROFILE} \ + -outputBlock ${ORDERER0_GENESIS_BLOCK} +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && echo "Fail to generate genesis block ${ORDERER0_GENESIS_BLOCK}" && exit -1 +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER1_GENESIS_BLOCK} +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER2_GENESIS_BLOCK} + +#for (( i=1; i<150; i++ )); +#do +#APP_CHANNEL="channel"$i +#APP_CHANNEL_TX=${APP_CHANNEL}".tx" +echo "Create the new app channel ${APP_CHANNEL} tx using configtx.yaml" +[ ! -f ${APP_CHANNEL_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -outputCreateChannelTx ${APP_CHANNEL_TX} +[ ! -f ${APP_CHANNEL_TX} ] && echo "Fail to generate app channel tx file" && exit -1 +#done + +[ ! -f ${APP_CHANNEL_TX}.json ] && \ +configtxgen \ + -inspectChannelCreateTx ${APP_CHANNEL_TX} > ${APP_CHANNEL_TX}.json + +echo "Create the anchor peer configuration tx for org1 and org2" +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG1MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG1_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG2MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG2_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +echo "Output the json for org1, org2 and org3" +declare -a msps=("${ORG1MSP}" + "${ORG2MSP}" + "${ORG3MSP}") +for msp in "${msps[@]}" +do +[ ! -f ${msp}.json ] && \ +configtxgen \ + -configPath /tmp \ + -printOrg ${msp} >${msp}.json +done diff --git a/hyperledger_fabric/v1.4.7/scripts/gen_config_channel.sh b/hyperledger_fabric/v1.4.7/scripts/gen_config_channel.sh new file mode 100644 index 00000000..797f6e40 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/gen_config_channel.sh @@ -0,0 +1,44 @@ +#! /bin/bash +# Generating +# * channel-artifacts +# * orderer.genesis.block +# * channel.tx +# * Org1MSPanchors.tx +# * Org2MSPanchors.tx + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +[ $# -ne 1 ] && echo_r "[Usage] $0 solo|kafka" && exit 1 || MODE=$1 + +echo_b "Generating channel artifacts with ${GEN_IMG} in mode ${MODE}" + +[ ! -d ${MODE}/${CHANNEL_ARTIFACTS} ] && mkdir -p ${MODE}/${CHANNEL_ARTIFACTS} + +echo_b "Make sure channel-artifacts dir exists already" +if [ -d ${MODE}/${CHANNEL_ARTIFACTS} -a ! -z "$(ls -A ${MODE}/${CHANNEL_ARTIFACTS})" ]; then + echo_b "${CHANNEL_ARTIFACTS} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CHANNEL_ARTIFACTS}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "FABRIC_LOGGING_SPEC=common.tools.configtxgen=DEBUG:INFO" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/${MODE}/configtx.yaml:/tmp/configtx.yaml \ + -v $PWD/${MODE}/${CHANNEL_ARTIFACTS}:/tmp/${CHANNEL_ARTIFACTS} \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/variables.sh:/scripts/variables.sh \ + -v $PWD/scripts/gen_channelArtifacts.sh:/scripts/gen_channelArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_channelArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_g "Generate channel artifacts with $0 done" diff --git a/hyperledger_fabric/v1.4.7/scripts/gen_config_crypto.sh b/hyperledger_fabric/v1.4.7/scripts/gen_config_crypto.sh new file mode 100644 index 00000000..e4a4c91c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/gen_config_crypto.sh @@ -0,0 +1,41 @@ +#! /bin/bash +# Generating +# * crypto-config/* + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo_b "Clean existing container $GEN_CONTAINER" +[ "$(docker ps -a | grep $GEN_CONTAINER)" ] && docker rm -f $GEN_CONTAINER + +[ ! -d ${CRYPTO_CONFIG} ] && mkdir -p ${CRYPTO_CONFIG} +[ ! -d org3/${CRYPTO_CONFIG} ] && mkdir -p org3/${CRYPTO_CONFIG} + +echo_b "Make sure crypto-config dir exists already" +if [ -d ${CRYPTO_CONFIG} -a ! -z "$(ls -A ${CRYPTO_CONFIG})" ]; then # No need to regen + echo_b "${CRYPTO_CONFIG} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CRYPTO_CONFIG}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "CONFIGTX_LOGGING_LEVEL=DEBUG" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/crypto-config.yaml:/tmp/crypto-config.yaml \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/gen_cryptoArtifacts.sh:/scripts/gen_cryptoArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_cryptoArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_b "Copy org3's crypto config outside" +cp -r org3/${CRYPTO_CONFIG}/* ${CRYPTO_CONFIG}/ + +echo_g "Generate crypto configs with $0 done" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/scripts/gen_cryptoArtifacts.sh b/hyperledger_fabric/v1.4.7/scripts/gen_cryptoArtifacts.sh new file mode 100644 index 00000000..bd1de7ca --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/gen_cryptoArtifacts.sh @@ -0,0 +1,37 @@ +#!/usr/bin/env bash + +# use /tmp/crypto-config.yaml to generate /tmp/crypto-config +# use /tmp/org3/crypto-config.yaml to generate /tmp/org3/crypto-config + +cd /tmp # we use /tmp as the base working path + +# The crypto-config will be used by channel artifacts generation later +CRYPTO_CONFIG=crypto-config + +echo "Generating crypto-config for org1 and org2..." +ls -l ${CRYPTO_CONFIG} + +cryptogen generate \ + --config=crypto-config.yaml \ + --output ${CRYPTO_CONFIG} + +#cryptogen extend \ +# --input ${CRYPTO_CONFIG} \ +# --config=crypto-config.yaml + +if [ $? -ne 0 ]; then + echo "Failed to generate certificates for org1 and org2..." + exit 1 +fi + +echo "Generating crypto-config for org3..." +cryptogen generate \ + --config=org3/crypto-config.yaml \ + --output org3/${CRYPTO_CONFIG} + +if [ $? -ne 0 ]; then + echo_r "Failed to generate certificates for org3..." + exit 1 +fi + +echo "Generated credential files and saved to ${CRYPTO_CONFIG}." diff --git a/hyperledger_fabric/v1.4.7/scripts/init_chaincode_dev.sh b/hyperledger_fabric/v1.4.7/scripts/init_chaincode_dev.sh new file mode 100644 index 00000000..006645a5 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/init_chaincode_dev.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will build and start and test chaincode in DEV mode + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo +echo " ============================================== " +echo " ==========initialize businesschannel========== " +echo " ============================================== " +echo + +echo_b "Channel name: "${APP_CHANNEL} + +## Create channel +echo_b "Creating channel..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +sleep 1 + +## Set the anchor peers for each org in the channel +#echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +#updateAnchorPeers 0 + +# We suppose the binary is there, otherwise, run `go build` under the chaincode path +chaincodeStartDev 0 1.0 +sleep 1 + +## Install chaincode on all peers +echo_b "Installing chaincode on peer0..." +chaincodeInstall 0 1.0 + +sleep 1 + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate 0 + +sleep 1 + +echo +echo_g "===================== All GOOD, initialization completed ===================== " +echo + +echo +echo " _____ _ _ ____ " +echo "| ____| | \ | | | _ \ " +echo "| _| | \| | | | | |" +echo "| |___ | |\ | | |_| |" +echo "|_____| |_| \_| |____/ " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.7/scripts/initialize_peer0.sh b/hyperledger_fabric/v1.4.7/scripts/initialize_peer0.sh new file mode 100644 index 00000000..c575e294 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/initialize_peer0.sh @@ -0,0 +1,40 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b " ========== Network initialization start ========== " + +## Create channel +echo_b "Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +## Set the anchor peers for each org in the channel +echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +## Install chaincode on all peers +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +echo_b "Installing chaincode ${CC_NAME} on peer0..." +chaincodeInstall 1 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate ${APP_CHANNEL} 0 + +echo_g "=============== All GOOD, network initialization done =============== " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.7/scripts/json_flatter.py b/hyperledger_fabric/v1.4.7/scripts/json_flatter.py new file mode 100644 index 00000000..c931d7a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/json_flatter.py @@ -0,0 +1,104 @@ +import base64 +import binascii +import json +import os +import sys + + +def decode_if_b64(raw): + """ + Decode a string if it's base 64 + :param raw: original bytes + :return: True, decoded_result or False, Orignal bytes + """ + success = False + result = raw + try: + if isinstance(raw, str): + result = base64.decodebytes(bytes(raw, 'utf-8')) + success = True + except binascii.Error: + success = False + + #if success: # result_bytes = b'xxxx\xx' + #print('===================Start==================================') + #print(raw) + #print(result) + #print('=====================End===================================') + return success, result + + +def check_tree(tree, prefix, f_write): + """ + Print the tree recursively with given path prefix + :param tree: the tree to check + :param prefix: path prefix to the root of this tree + :param f_write: Which file to write into + :return: + """ + if isinstance(tree, dict): + for k, v in tree.items(): + prefix_path = prefix + "." + k + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'cert' in k or 'id_bytes' in k or 'value' in k and 'hash' not in k: + #print(prefix_path) + success, result = decode_if_b64(v) + if success: + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + elif isinstance(tree, list): + for i, v in enumerate(tree): + prefix_path = "{}[{}]".format(prefix, i) + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'metadata' not in prefix_path: + success, result = decode_if_b64(v) + if success: + # print(prefix_path) + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + else: # json only allow dict or list structure + print("Wrong format of json tree") + + +def process(directory): + """ + Process all json files under the path + :param directory: Check json files under which directory + :return: + """ + for f in os.listdir(directory): + if f.endswith(".block.json"): + file_name = os.path.join(json_dir, f) + f_read = open(file=file_name, mode="r", encoding='utf-8') + f_write = open(file=file_name+"-flat.json", mode="w", encoding='utf-8') + check_tree(json.load(f_read), "", f_write) + f_read.close() + f_write.close() + else: + print("Ignore non-json file {}".format(f)) + + +# Usage python json_flatter.py [path_containing_json_files] +# Print all json elements in flat structure +# e.g., +# { +# "a": { +# "b": ["c", "d"] +# } +# } +# ==> +# a.b[0]=c +# a.b[1]=d +if __name__ == '__main__': + json_dir = "../raft/channel-artifacts/" + if len(sys.argv) > 1: + json_dir = sys.argv[1] + + print("Will process json files under {}".format(json_dir)) + process(json_dir) diff --git a/hyperledger_fabric/v1.4.7/scripts/start_eventsclient.sh b/hyperledger_fabric/v1.4.7/scripts/start_eventsclient.sh new file mode 100644 index 00000000..51eecf54 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/start_eventsclient.sh @@ -0,0 +1,24 @@ +#!/usr/bin/env bash + +# This script will start the eventsclient + +# Importing useful functions +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_g "=== Testing eventsclient in a loop ===" + +CORE_PEER_LOCALMSPID=${ORG1MSP} \ +CORE_PEER_MSPCONFIGPATH=${ORG1_ADMIN_MSP} \ +eventsclient \ + -server=${ORG1_PEER0_URL} \ + -channelID=${APP_CHANNEL} \ + -filtered=true \ + -tls=true \ + -clientKey=${ORG1_ADMIN_TLS_CLIENT_KEY} \ + -clientCert=${ORG1_ADMIN_TLS_CLIENT_CERT} \ + -rootCert=${ORG1_ADMIN_TLS_CA_CERT} + diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_approve.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_approve.sh new file mode 100644 index 00000000..2b1c227e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_approve.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Approve chaincode definition ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Approve chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_commit.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_commit.sh new file mode 100644 index 00000000..7c7fc520 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_commit.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} + +# Once a sufficient number of organizations (in this case, a majority) have +# approved a chaincode definition, one organization commit the definition to the +# channel. + +echo_b "=== Commit chaincode definition ${CC_NAME} to channel ${APP_CHANNEL} ... ===" + +chaincodeCommit "${ORGS[0]}" "${PEERS[0]}" "${APP_CHANNEL}" "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INIT_VERSION} + +echo_g "=== Commit Chaincode done, now you can invoke chaincode to start the container ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_install.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_install.sh new file mode 100644 index 00000000..5a0df459 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_install.sh @@ -0,0 +1,28 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + t="\${ORG${org}_PEER${peer}_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeInstall $org $peer "${peer_url}" "${peer_tls_rootcert}" ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_instantiate.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_instantiate.sh new file mode 100644 index 00000000..f15d658b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_instantiate.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INIT_ARGS=${CC_INIT_ARGS:-$CC_02_INIT_ARGS} + +# Instantiate chaincode in the channel, executed once on any node is enough +# (once for each channel is enough, we make it concurrent here) +echo_b "=== Instantiating chaincode on channel ${APP_CHANNEL}... ===" + +# Instantiate at org1.peer0 and org2.peer0, actually it can be triggered once per channel +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} +#chaincodeInstantiate "${APP_CHANNEL}" 2 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} + +echo_g "=== Instantiate chaincode on channel ${APP_CHANNEL} done ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_invoke_query.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_invoke_query.sh new file mode 100644 index 00000000..5c0c79b4 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_invoke_query.sh @@ -0,0 +1,37 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Query on chaincode on Peer0/Org1 +echo_b "=== Testing Chaincode invoke/query ===" + +# Non-side-DB testing +echo_b "Query chaincode ${CC_NAME} on peer org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +#Invoke on chaincode on Peer0/Org1 +echo_b "Invoke transaction (transfer 10) by org1/peer0..." +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 90 +echo_b "Query chaincode on org2/peer1..." +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +#Invoke on chaincode on Peer1/Org2 +echo_b "Send invoke transaction on org2/peer1..." +chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 80 +echo_b "Query chaincode on org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 80 + +echo_g "=== Chaincode invoke/query done ===" diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_list.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_list.sh new file mode 100644 index 00000000..c7ee2898 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_list.sh @@ -0,0 +1,16 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ../../v1.1.0/scripts/func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "=== List chaincode on all peer0.org1... ===" + +chaincodeList 1 0 ${APP_CHANNEL} + +echo_g "=== List chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_peer0.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_peer0.sh new file mode 100644 index 00000000..b9064612 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_peer0.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +echo_b "Channel name: "${APP_CHANNEL} + +echo_b "Query the existing value of a" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +sleep 1 + +echo_b "Invoke a transaction to transfer 10 from a to b" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} + +sleep 1 + +echo_b "Check if the result of a is 90" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +echo +echo_g "All GOOD, MVE Test completed" +echo +exit 0 diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_queryapprove.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_queryapprove.sh new file mode 100644 index 00000000..d032a96e --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_queryapprove.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode approve status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Query Chaincode approve status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_querycommit.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_querycommit.sh new file mode 100644 index 00000000..766c4b93 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_querycommit.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode commit status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryCommit "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} +done + +echo_g "=== Query Chaincode commit status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cc_upgrade.sh b/hyperledger_fabric/v1.4.7/scripts/test_cc_upgrade.sh new file mode 100644 index 00000000..fb42b2b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cc_upgrade.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} +CC_UPGRADE_ARGS=${CC_UPGRADE_ARGS:-$CC_02_UPGRADE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Upgrade to new version +echo_b "=== Upgrade chaincode ${CC_NAME} to new version... ===" + +chaincodeInstall 1 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 1 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" + +# Upgrade on one peer of the channel will update all +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" + +# Query new value, should refresh through all peers in the channel +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 + +echo_g "=== chaincode ${CC_NAME} Upgrade completed ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_channel_create.sh b/hyperledger_fabric/v1.4.7/scripts/test_channel_create.sh new file mode 100644 index 00000000..0121957c --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_channel_create.sh @@ -0,0 +1,22 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}... ===" + +#for (( i=1; i<150; i++ )); +#do + #APP_CHANNEL="channel"$i + #APP_CHANNEL_TX=${APP_CHANNEL}".tx" +channelCreate "${APP_CHANNEL}" "${APP_CHANNEL_TX}" 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} +#done + +echo_g "=== Created channel ${APP_CHANNEL} with ${APP_CHANNEL_TX} ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_channel_getinfo.sh b/hyperledger_fabric/v1.4.7/scripts/test_channel_getinfo.sh new file mode 100644 index 00000000..7258391a --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_channel_getinfo.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Getting info of channel ${APP_CHANNEL}... ===" + +#set -x + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelGetInfo ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Get info of channel ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_channel_join.sh b/hyperledger_fabric/v1.4.7/scripts/test_channel_join.sh new file mode 100644 index 00000000..e7b78bec --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_channel_join.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL}... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelJoin ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_channel_list.sh b/hyperledger_fabric/v1.4.7/scripts/test_channel_list.sh new file mode 100644 index 00000000..099460ee --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_channel_list.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Listing joined channels... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelList $org $peer + done +done + +echo_g "=== Done listing joined channels ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_channel_update.sh b/hyperledger_fabric/v1.4.7/scripts/test_channel_update.sh new file mode 100644 index 00000000..3b6c6fb7 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_channel_update.sh @@ -0,0 +1,43 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Updating config of channel ${APP_CHANNEL}... ===" + +echo_b "Sign the channel update tx by Org1/Peer0 and Org2/Peer0" +channelSignConfigTx ${APP_CHANNEL} "1" "0" "${CFG_DELTA_ENV_PB}" +channelSignConfigTx ${APP_CHANNEL} "2" "0" "${CFG_DELTA_ENV_PB}" + +channelUpdate ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} ${CFG_DELTA_ENV_PB} + +sleep 1 # wait till the update takes effect + +# use org1.peer0's id to get latest block from orderer +newest_block_file1=/tmp/${APP_CHANNEL}_newest1.block +channelFetch ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file1} +[ -f ${newest_block_file1} ] || exit 1 + +# use org3.peer0's id to get latest block from orderer +newest_block_file2=/tmp/${APP_CHANNEL}_newest2.block +channelFetch ${APP_CHANNEL} "3" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file2} +[ -f ${newest_block_file2} ] || exit 1 + +if [ $(getShasum ${newest_block_file1}) = $(getShasum ${newest_block_file2}) ]; then + echo_g "Block matched, new org joined channel successfully" +else + echo_r "Block not matched, new org joined channel failed" + exit 1 +fi + +# Now new org is valid to join the channel +# channelJoin ${APP_CHANNEL} "3" "0" + +echo_g "=== Updated config of channel ${APP_CHANNEL}... ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_config_update.sh b/hyperledger_fabric/v1.4.7/scripts/test_config_update.sh new file mode 100644 index 00000000..581cacb9 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_config_update.sh @@ -0,0 +1,85 @@ +#!/bin/bash +# Demo to use configtxlator to add some new organization +# Usage: +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +# clean env and exit +clean_exit() { + echo_b "Stop configtxlator service" + docker rm -f $CTL_CONTAINER + exit 0 +} + +BLOCK_FILE=${APP_CHANNEL}_config.block +if [ ! -f ${BLOCK_FILE} ]; then + echo_r "${BLOCK_FILE} not exist" + clean_exit +fi + +echo_b "Decode latest config block ${BLOCK_FILE} into json..." +configtxlatorDecode "common.Block" ${BLOCK_FILE} ${BLOCK_FILE}.json +[ $? -ne 0 ] && { echo_r "Decode ${BLOCK_FILE} failed"; clean_exit; } + +echo_b "Parse config data from block payload and encode into pb..." +[ -f ${ORIGINAL_CFG_JSON} ] || jq "$PAYLOAD_CFG_PATH" ${BLOCK_FILE}.json > ${ORIGINAL_CFG_JSON} +jq . ${ORIGINAL_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${ORIGINAL_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${ORIGINAL_CFG_JSON} ${ORIGINAL_CFG_PB} + +echo_b "Update the config with new org, and encode into pb" +[ -f ${UPDATED_CFG_JSON} ] || jq -s '.[0] * {"channel_group":{"groups":{"Application":{"groups": {"Org3MSP":.[1]}}}}}' ${ORIGINAL_CFG_JSON} ./Org3MSP.json >& ${UPDATED_CFG_JSON} +jq . ${UPDATED_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${UPDATED_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${UPDATED_CFG_JSON} ${UPDATED_CFG_PB} + +echo_b "Calculate the config delta between pb files" +configtxlatorCompare ${APP_CHANNEL} ${ORIGINAL_CFG_PB} ${UPDATED_CFG_PB} ${CFG_DELTA_PB} + +echo_b "Decode the config delta pb into json" +[ -f ${CFG_DELTA_JSON} ] || configtxlatorDecode "common.ConfigUpdate" ${CFG_DELTA_PB} ${CFG_DELTA_JSON} +jq . ${CFG_DELTA_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${CFG_DELTA_JSON} is invalid"; clean_exit; } + +echo_b "Wrap the config update as envelope" +[ -f ${CFG_DELTA_ENV_JSON} ] || echo '{"payload":{"header":{"channel_header":{"channel_id":"'"$APP_CHANNEL"'", "type":2}},"data":{"config_update":'$(cat ${CFG_DELTA_JSON})'}}}' | jq . > ${CFG_DELTA_ENV_JSON} + +echo_b "Encode the config update envelope into pb" +configtxlatorEncode "common.Envelope" ${CFG_DELTA_ENV_JSON} ${CFG_DELTA_ENV_PB} + +echo_g "Test configtxlator for $MODE Passed, now ready for peer to send the update transaction" + +clean_exit \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/scripts/test_configtxlator.sh b/hyperledger_fabric/v1.4.7/scripts/test_configtxlator.sh new file mode 100644 index 00000000..24f8857d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_configtxlator.sh @@ -0,0 +1,64 @@ +#!/bin/bash +# Demo to use configtxlator to modify orderer config +# Usage: bash test_configtxlator solo|kafka +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +echo_b "Convert all block files into json" +for block_file in *.block; do + [ -f ${block_file}.json ] || configtxlatorDecode "common.Block" ${block_file} ${block_file}.json + decode_result=$? + #echo_b "Parse payload..." + #[ ${decode_result} -eq 0 ] && jq "$PAYLOAD_PATH" ${block_file}.json > ${block_file}_payload.json +done + +echo_b "Update the content of orderer genesis file" +if [ -f ${ORDERER0_GENESIS_BLOCK} ]; then + echo_b "Checking existing Orderer.BatchSize.max_message_count in the genesis json" + jq "$MAX_BATCH_SIZE_PATH" ${ORDERER0_GENESIS_BLOCK}.json + + echo_b "Creating new genesis json with updated Orderer.BatchSize.max_message_count" + jq "$MAX_BATCH_SIZE_PATH=100" ${ORDERER0_GENESIS_BLOCK}.json > ${ORDERER0_GENESIS_BLOCK}_updated.json + + echo_b "Re-Encoding the updated orderer genesis json to block" + configtxlatorEncode "common.Block" ${ORDERER0_GENESIS_BLOCK}_updated.json ${ORDERER0_GENESIS_BLOCK}_updated.block +fi + +echo_b "Stop configtxlator service" +docker rm -f $CTL_CONTAINER + +echo_g "Test configtxlator for $MODE Passed" diff --git a/hyperledger_fabric/v1.4.7/scripts/test_cscc.sh b/hyperledger_fabric/v1.4.7/scripts/test_cscc.sh new file mode 100644 index 00000000..20fd64d5 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_cscc.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "CSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n cscc \ +# -c '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetConfigBlock" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetChannels" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetChannels"]}' + +echo_g "CSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_fetch_blocks.sh b/hyperledger_fabric/v1.4.7/scripts/test_fetch_blocks.sh new file mode 100644 index 00000000..97006a48 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_fetch_blocks.sh @@ -0,0 +1,23 @@ +#!/usr/bin/env bash + +# This script will fetch blocks for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +org=1 +peer=0 + +echo_b "=== Fetching blocks of channel ${APP_CHANNEL} and ${SYS_CHANNEL} ===" + +channelFetchAll ${APP_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +channelFetchAll ${SYS_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +echo_g "=== Fetched Blocks from channels done! ===" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_lscc.sh b/hyperledger_fabric/v1.4.7/scripts/test_lscc.sh new file mode 100644 index 00000000..7a434190 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_lscc.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will run some lscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "LSCC testing" + +org=1 +peer=0 + +# invoke required following params + #-o orderer.example.com:7050 \ + #--tls "true" \ + #--cafile ${ORDERER_TLS_CA} \ + +CC_NAME=${CC_02_NAME} + +echo_b "LSCC Get id" +chaincodeQuery "$org" "$peer" "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getid","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc ChaincodeDeploymentSpec" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getdepspec","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc bytes" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getccdata","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get all chaincodes (with all versions) installed on the peer" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getinstalledchaincodes"]}' + +echo_b "LSCC Get all chaincodes instantiated on the channel" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getchaincodes"]}' + + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getid","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getdepspec","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getccdata","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getinstalledchaincodes"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getchaincodes"]}' + +echo_g "LSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_qscc.sh b/hyperledger_fabric/v1.4.7/scripts/test_qscc.sh new file mode 100644 index 00000000..bd127457 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_qscc.sh @@ -0,0 +1,35 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "QSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +echo_b "QSCC GetChainInfo" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_b "QSCC GetBlockByNumber 2" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_g "QSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.7/scripts/test_sideDB.sh b/hyperledger_fabric/v1.4.7/scripts/test_sideDB.sh new file mode 100644 index 00000000..8bee8fde --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_sideDB.sh @@ -0,0 +1,72 @@ +#!/bin/bash +# test sideDB feature: https://jira.hyperledger.org/browse/FAB-10231 + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_MARBLES_NAME} +CC_PATH=${CC_MARBLES_PATH} +CC_INIT_ARGS=${CC_MARBLES_INIT_ARGS} + +echo_b "=== Testing the private data feature ===" + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +# test sideDB feature +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} +echo_g "=== Instantiate chaincode done ===" +sleep 2 + +# both org1 and org2 can invoke, but gossip is the problem to cross org +echo_b "Invoke chaincode with collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} +echo_g "=== Invoke chaincode done ===" + +# both org1 and org2 can do normal read +echo_b "Query chaincode with collection collectionMarbles on org1/peer1" +chaincodeQuery 2 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +echo_g "=== Query read chaincode done ===" + +# only org1 can do detailed read +echo_b "Query chaincode with collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +echo_g "=== Query read details chaincode done ===" + +echo_b "Install chaincode with new collection config" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_PATH} + done +done +echo_g "Install chaincode with new collection config done" + +echo_b "Update chaincode with new collection on org1/peer0" +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG_NEW} +echo_g "Update chaincode with new collection on org1/peer0 done" + +echo_b "Invoke chaincode with new key and new collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS_2} +echo_g "=== Invoke chaincode done ===" + +# now both org1 and org2 should be able to readpvtdetails of new data, noticed the read of old data is available since v1.3.0 +echo_b "Query chaincode with new key and new collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} +echo_g "=== Query read details chaincode done ===" + +echo_g "=== Testing the private data feature done ===" diff --git a/hyperledger_fabric/v1.4.7/scripts/test_temp.sh b/hyperledger_fabric/v1.4.7/scripts/test_temp.sh new file mode 100644 index 00000000..aaaaa937 --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_temp.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +# test sideDB feature + +#chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_MARBLES_NAME} ${CC_INIT_VERSION} ${CC_MARBLES_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} + +# both org1 and org2 can invoke +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +#chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +#chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} + +exit diff --git a/hyperledger_fabric/v1.4.7/scripts/test_update_anchors.sh b/hyperledger_fabric/v1.4.7/scripts/test_update_anchors.sh new file mode 100644 index 00000000..239b983d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/test_update_anchors.sh @@ -0,0 +1,19 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Set the anchor peers for each org in the channel +echo_b "=== Updating anchor peers to peer0 for org1... ===" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +echo_b "=== Updating anchor peers to peer0 for org2... ===" +channelUpdate ${APP_CHANNEL} 2 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org2MSPanchors.tx + +echo_b "=== Updated anchor peers ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.7/scripts/variables.sh b/hyperledger_fabric/v1.4.7/scripts/variables.sh new file mode 100644 index 00000000..e5af622f --- /dev/null +++ b/hyperledger_fabric/v1.4.7/scripts/variables.sh @@ -0,0 +1,145 @@ +#!/usr/bin/env bash +# Before running `make`, config this files +# Define some global variables for usage. Will be included by func.sh. + +ARCH=amd64 + +# for the base images, including baseimage, couchdb, kafka, zookeeper +BASE_IMG_TAG=0.4.20 + +# For fabric images, including peer, orderer, ca +FABRIC_IMG_TAG=1.4.7 + +# Keep the same as in core.yaml, will tag ccenv with this value +PROJECT_VERSION=1.4.7 + +# Name of app channel, need to align with the gen_artifacts.sh +SYS_CHANNEL="testchainid" +APP_CHANNEL="businesschannel" +APP_CHANNEL1="businesschannel1" +APP_CHANNEL2="businesschannel2" + +# Client cmd execute timeout and retry times +TIMEOUT="90" +MAX_RETRY=10 + +# Organization and peers +ORGS=( 1 2 ) +PEERS=( 0 1 ) +#: "${ORGS:=( 1 2 )}" +#: "${PEERS:=( 0 1 )}" + +ORG1MSP="Org1MSP" +ORG2MSP="Org2MSP" +ORG3MSP="Org3MSP" + +# Orderer0 related paths +ORDERER0_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp +ORDERER0_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp +ORDERER0_TLS_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem +ORDERER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt + +# Org1 related path +ORG1_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp +ORG1_PEER0_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.Org1.example.com/msp +ORG1_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt +ORG1_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt +ORG1_ADMIN_TLS_CLIENT_KEY=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.key +ORG1_ADMIN_TLS_CLIENT_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.crt +ORG1_ADMIN_TLS_CA_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/ca.crt + +# Org2 related path +ORG2_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp +ORG2_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt +ORG2_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt + +# Node URLS +ORDERER0_URL="orderer0.example.com:7050" +ORDERER1_URL="orderer1.example.com:7050" +ORDERER2_URL="orderer2.example.com:7050" +ORG1_PEER0_URL="peer0.org1.example.com:7051" +ORG1_PEER1_URL="peer1.org1.example.com:7051" +ORG2_PEER0_URL="peer0.org2.example.com:7051" +ORG2_PEER1_URL="peer1.org2.example.com:7051" + +# Chaincode exp02 related +CC_02_NAME="exp02" +CC_02_PATH="examples/chaincode/go/chaincode_example02" +CC_02_INIT_ARGS='{"Args":["init","a","100","b","200"]}' +CC_02_UPGRADE_ARGS='{"Args":["upgrade","a","100","b","200"]}' +CC_02_INVOKE_ARGS='{"Args":["invoke","a","b","10"]}' +CC_02_QUERY_ARGS='{"Args":["query","a"]}' + +# Chaincode map related +CC_MAP_NAME="map" +CC_MAP_PATH="examples/chaincode/go/map" +CC_MAP_INIT_ARGS='{"Args":["init",""]}' +CC_MAP_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MAP_INVOKE_ARGS='{"Args":["invoke","put","key","value"]}' +CC_MAP_QUERY_ARGS='{"Args":["get","key"]}' + +# Chaincode marbles related +CC_MARBLES_NAME="marblesp" +CC_MARBLES_PATH="examples/chaincode/go/marbles02_private/go" +CC_MARBLES_INIT_ARGS='{"Args":["init"]}' +CC_MARBLES_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MARBLES_INVOKE_INIT_ARGS='{"Args":["initMarble","marble1","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_INIT_ARGS_2='{"Args":["initMarble","marble2","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_TRANSFER_ARGS='{"Args":["transferMarble","marble1","jerry"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_QUERY_READ_ARGS='{"Args":["readMarble","marble1"]}' # this requires 'collectionMarbles' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS='{"Args":["readMarblePrivateDetails","marble1"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2='{"Args":["readMarblePrivateDetails","marble2"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_COLLECTION_CONFIG="/go/src/examples/chaincode/go/marbles02_private/collections_config.json" +CC_MARBLES_COLLECTION_CONFIG_NEW="/go/src/examples/chaincode/go/marbles02_private/collections_config_new.json" + +# unique chaincode params +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +CC_INIT_ARGS=${CC_02_INIT_ARGS} +CC_INIT_VERSION=1.0 +CC_UPGRADE_ARGS=${CC_02_UPGRADE_ARGS} +CC_UPGRADE_VERSION=1.1 +CC_INVOKE_ARGS=${CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_02_QUERY_ARGS} + +# Generate configs +GEN_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} # working dir is `/go/src/github.com/hyperledger/fabric` +GEN_CONTAINER=generator +FABRIC_CFG_PATH=/etc/hyperledger/fabric +CHANNEL_ARTIFACTS=channel-artifacts +CRYPTO_CONFIG=crypto-config +ORDERER0_GENESIS=orderer0.genesis +ORDERER1_GENESIS=orderer1.genesis +ORDERER2_GENESIS=orderer2.genesis +ORDERER0_GENESIS_BLOCK=${ORDERER0_GENESIS}.block +ORDERER1_GENESIS_BLOCK=${ORDERER1_GENESIS}.block +ORDERER2_GENESIS_BLOCK=${ORDERER2_GENESIS}.block +ORDERER_GENESIS_PROFILE=TwoOrgsOrdererGenesis +APP_CHANNEL_PROFILE=TwoOrgsChannel +APP_CHANNEL_TX=${APP_CHANNEL}.tx +APP_CHANNEL1_TX=${APP_CHANNEL1}.tx +APP_CHANNEL2_TX=${APP_CHANNEL2}.tx +UPDATE_ANCHOR_ORG1_TX=Org1MSPanchors.tx +UPDATE_ANCHOR_ORG2_TX=Org2MSPanchors.tx + +# CONFIGTXLATOR +CTL_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} +CTL_CONTAINER=configtxlator +CTL_BASE_URL=http://127.0.0.1:7059 +CTL_ENCODE_URL=${CTL_BASE_URL}/protolator/encode +CTL_DECODE_URL=${CTL_BASE_URL}/protolator/decode +CTL_COMPARE_URL=${CTL_BASE_URL}/configtxlator/compute/update-from-configs + +PAYLOAD_PATH=".data.data[0].payload" +PAYLOAD_CFG_PATH=".data.data[0].payload.data.config" +MAX_BATCH_SIZE_PATH=".data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count" + +# channel update config +ORIGINAL_CFG_JSON=original_config.json +ORIGINAL_CFG_PB=original_config.pb +UPDATED_CFG_JSON=updated_config.json +UPDATED_CFG_PB=updated_config.pb +CFG_DELTA_JSON=config_delta.json +CFG_DELTA_PB=config_delta.pb +CFG_DELTA_ENV_JSON=config_delta_env.json +CFG_DELTA_ENV_PB=config_delta_env.pb diff --git a/hyperledger_fabric/v1.4.7/solo/README.md b/hyperledger_fabric/v1.4.7/solo/README.md new file mode 100644 index 00000000..6dde3c1b --- /dev/null +++ b/hyperledger_fabric/v1.4.7/solo/README.md @@ -0,0 +1,7 @@ +## Start a network base on solo + +### Quick testing +```bash +$ HLF_MODE=solo make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.7/solo/configtx.yaml b/hyperledger_fabric/v1.4.7/solo/configtx.yaml new file mode 100644 index 00000000..6f32421d --- /dev/null +++ b/hyperledger_fabric/v1.4.7/solo/configtx.yaml @@ -0,0 +1,775 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: solo + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: raft0.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert0 + ServerTLSCert: path/to/ServerTLSCert0 + - Host: raft1.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert1 + ServerTLSCert: path/to/ServerTLSCert1 + - Host: raft2.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert2 + ServerTLSCert: path/to/ServerTLSCert2 + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities